HIP 6

QubesOS Usage 102 - When your OS becomes introvert
02.03, 13:00–13:30 (Europe/Berlin), Vortragssaal

We're going to explore what makes QubesOS unique, its shortcomings but also what neat features are possible by its "Security-First" approach just as a side effect.
We'll go through some "recommended servings" of what can be achieved by gearing it to our needs.


In this talk we're going to explore some of QubesOS' features and I'll try to flesh them out. With some hands-on examples.

We'll learn about:

  1. What QubesOS is and how it shines (short intro really, it's 102)
  2. QubesOS' requirements and shortcomings
  3. Features
    - VM/Qubes- Types
    - bind-dirs
    - bind-mounts
    - the networking setup
    - qvm-tcp
    - qubesctl aka saltproject.io integration
    - qrexec-agent support
  4. Use cases
    - Usage Examples from the docs
    - using nix/guix inside AppVMs
    - split-*
    - GPU passthru
  5. Misc

Student @ HSBO -- University of Applied Sciences (Bochum, NRW, DE)

Strong advocate of "leave me the fuck alone" :tm:

Open Source Firmware supporter (yet to become enthusiast)

I <3 QubesOS

Diese(r) Vortragende hält außerdem: