CONTINGENCYPLAN.AI
WHEN TO LEAVE
WHERE TO GO
HOW TO EXIT
Settings
WHEN
WHERE
HOW
CONTINGENCYPLAN.AI
WHEN TO LEAVE
WHERE TO GO
HOW TO EXIT
Settings
Back to Privacy Toolkit
📱Device

Qubes OS

A security-through-compartmentalization desktop OS that isolates every activity in separate virtual machines — maximum desktop security at the cost of steep hardware and learning requirements.

Domain Rank
#3
Score
7.25

This toolkit is for informational purposes. Security needs vary by situation. No tool guarantees complete privacy or anonymity.

Evaluation Scores

Encryption Architecture8

Full-disk LUKS encryption with Xen hypervisor isolation; each VM has independent encryption boundaries.

Anonymous Usage7

Whonix integration routes designated VMs through Tor; compartmentalization prevents cross-activity identity linking.

Open Source & Auditability10

Fully open source, built on Xen, Fedora, and Debian; every component is auditable and community-reviewed.

Jurisdiction & Legal Protection8

Developed by the Invisible Things Lab in Poland; open source nature means no jurisdiction dependency.

Track Record & Trust8

Recommended by Edward Snowden; under active development since 2012 by Joanna Rutkowska's team with a strong security research pedigree.

Usability & Accessibility3

Steep learning curve with VM-based workflow; requires understanding compartmentalization concepts and managing multiple environments.

Cross-Platform Support4

x86_64 desktop only with strict hardware compatibility requirements; no laptop trackpad or WiFi support on many models.

Anonymous Payment10

Completely free and open source; no account, payment, or identity needed.

Overview

Qubes OS is a security-focused desktop operating system that uses hardware-level virtualization to compartmentalize every activity into isolated virtual machines (called "qubes"). Your email runs in one qube, your banking in another, your anonymous browsing in a third, and your sensitive documents in a fourth. If any single qube is compromised — through malware, a browser exploit, or a phishing attack — the attacker is trapped in that compartment and cannot access data in any other qube. This is security through isolation, and it's the most effective defense against targeted attacks available in a desktop operating system.

For crisis preparedness, Qubes OS addresses the fundamental problem with conventional computers: everything runs in the same environment. On a regular laptop, malware in your email can access your files, your browser history, your password manager, and your VPN configuration. On Qubes, these are physically separated by the Xen hypervisor — the same technology that powers Amazon's AWS cloud infrastructure. An attacker who compromises your web browsing qube gets access to that browser session and nothing else. When you close the qube, the compromised environment is destroyed.

Qubes OS is the most technically demanding tool on this list. It requires dedicated hardware, significant RAM (16 GB minimum, 32 GB recommended), and a willingness to work with a Linux-based interface that's more complex than macOS or Windows. It is recommended for users who face targeted threats — journalists with state-level adversaries, activists in high-risk environments, or anyone whose threat model includes sophisticated malware and targeted exploitation. For most crisis scenarios, GrapheneOS on mobile and Tails for sensitive tasks provide adequate protection with far less complexity.

Encryption Architecture

Qubes OS encrypts the entire disk using LUKS2 with AES-256-XTS, protected by a passphrase entered at boot. Each qube (virtual machine) has its own encrypted virtual disk that exists as a file on the encrypted host filesystem, providing two layers of encryption. The inter-qube communication protocol is mediated by the hypervisor and uses a minimal, audited interface — qubes cannot directly access each other's memory, network connections, or filesystems.

The Xen hypervisor provides hardware-level isolation using Intel VT-x or AMD-V virtualization extensions. This is the same isolation technology that prevents one AWS customer from reading another's data — it's enforced by the CPU hardware, not just software. Qubes extends this with a split-architecture security model: the network stack runs in a dedicated, untrusted qube (sys-net), the firewall runs in another (sys-firewall), and your Tor traffic routes through a Whonix gateway qube (sys-whonix). If your network connection is compromised, the attacker reaches sys-net — a disposable virtual machine with no access to your data.

Anonymous Usage

Qubes OS requires no account, no registration, and no telemetry. The operating system is downloaded, installed, and used entirely offline (internet is only needed for downloading the image and for updates). There is no identifier linking you to your installation. Qubes does not phone home, send analytics, or check in with any server. Your usage is entirely local to your hardware.

Qubes integrates Whonix — a Tor-focused operating system — as a built-in option. You can route any qube's traffic through Tor by connecting it to the Whonix gateway, which provides system-level Tor integration similar to Tails but with the flexibility of selecting which activities use Tor and which use a VPN. This allows you to maintain separate network identities: one qube's traffic exits through Tor in Germany, another through a VPN in Switzerland, and a third through your direct connection. Each qube has its own network identity, and none can see the others' traffic.

Open Source & Auditability

Qubes OS is fully open source under the GPLv2 license. The operating system code, the qube management system, the inter-qube communication protocols, and all included applications are available on GitHub. The Xen hypervisor (which provides the foundation for Qubes' security model) is also open source and has been independently audited by multiple organizations as part of its use in major cloud infrastructure.

Qubes has been audited by Cure53 (2015) and Open Technology Fund (2018), with results published publicly. The project's security model has been the subject of academic research at multiple universities. Qubes' approach to security — assuming that all software is potentially compromised and using hardware isolation to contain breaches — has been validated by real-world incidents where Qubes users survived attacks that would have fully compromised conventional operating systems. The project's founder, Joanna Rutkowska, is one of the most respected security researchers in the world, known for her work on Blue Pill and other hardware-level security research.

Jurisdiction & Legal Protection

Qubes OS is developed by the Invisible Things Lab (ITL), a company founded by Joanna Rutkowska, with distributed contributors worldwide. ITL was originally based in Poland, though the project operates as a global open-source effort. There is no server infrastructure, no cloud services, and no user data collection — Qubes runs entirely on your hardware. Like GrapheneOS and Tails, the jurisdictional question is moot because there is nothing for any government to compel.

The open-source nature of the project means any attempt to insert a backdoor would be publicly visible. Qubes receives funding from the Open Technology Fund, the Knight Foundation, and community donations. The diversified funding model and open governance prevent any single entity from exerting control over the project. Because all security-critical isolation is handled by the hardware (via the CPU's virtualization extensions) and the open-source Xen hypervisor, the trust boundary is well-defined and auditable.

Track Record & Trust

Qubes OS has been under active development since 2010, with stable releases since 2012. Joanna Rutkowska's background in offensive security (she demonstrated attacks that fundamentally changed how the industry thinks about hardware security) gives the project deep technical credibility. The philosophy of "security by compartmentalization" has been validated repeatedly as targeted attacks have become more sophisticated — Qubes' architecture is specifically designed for the kind of threat landscape that high-risk individuals face.

Edward Snowden has endorsed Qubes OS as the best desktop operating system for security. Freedom of the Press Foundation, which operates SecureDrop (the whistleblower submission system used by major news organizations), recommends Qubes for journalists handling sensitive sources. No fundamental security breach of the Qubes compartmentalization model has been demonstrated in the wild, though the Xen hypervisor has had vulnerabilities (which Qubes responds to with rapid patches). The project maintains detailed security advisories and has a responsible disclosure process.

Usability & Accessibility

Qubes OS is the most difficult tool on this list to set up and use. The installation process requires compatible hardware (not all laptops work — check the hardware compatibility list at qubes-os.org/hcl), UEFI/BIOS configuration, and a full disk installation. The learning curve is significant: you need to understand the concept of qubes, domains, templates, and disposable VMs. The UI is based on Xfce (a Linux desktop environment) with a custom qube management interface. Windows are color-coded by security domain — red borders for untrusted qubes, green for personal, blue for work — which provides visual clarity about what security context you're operating in.

Day-to-day usage requires a mental shift: you don't just "open a browser," you decide which qube to open it in. Copying files between qubes requires explicit commands (right-click > Copy to Other Qube). Copy-paste between qubes requires a two-step process through a secure clipboard to prevent clipboard-based attacks. This friction is intentional — it forces you to think about security boundaries. Once you internalize the model, Qubes becomes a powerful and flexible system, but the initial weeks require patience and a willingness to read documentation. The official docs at qubes-os.org are comprehensive and well-written.

Cross-Platform Support

Qubes OS runs on x86_64 hardware that supports Intel VT-x or AMD-V/AMD-Vi virtualization. It requires a bare-metal installation — it cannot run as a virtual machine inside another operating system (because it IS the hypervisor). The hardware compatibility list on qubes-os.org documents specific laptop and desktop models that have been tested. Lenovo ThinkPad laptops (T-series and X-series) are the most commonly recommended hardware due to their reliable compatibility, Linux driver support, and availability on the used market.

Qubes does not run on Apple Silicon Macs, ARM processors, phones, or tablets. It requires a dedicated machine — you cannot dual-boot Qubes alongside Windows or macOS. The minimum requirements are 4 GB RAM (realistically 16 GB for comfortable use with multiple qubes), 32 GB storage (128 GB+ recommended), and a 64-bit Intel or AMD processor with VT-x/AMD-V support. For crisis preparation, a used Lenovo ThinkPad T480 or T14 (available for $200-400) with a RAM upgrade to 32 GB is the standard recommendation.

Anonymous Payment

Qubes OS is completely free and open source. There is no cost associated with downloading, installing, or using the operating system. No payment method, no subscription, no premium features. The project is funded by grants from the Open Technology Fund, the Knight Foundation, and community donations.

The cost is in hardware. A compatible laptop ranges from $200 for a used ThinkPad to $1,500+ for a new, high-spec machine. This purchase can be made anonymously with cash at a retail electronics store. The investment in dedicated hardware is significant compared to tools that run on devices you already own, but for users who need compartmentalized security, there is no software alternative — the security properties Qubes provides are architecturally impossible to replicate on a conventional operating system.

Setup Guide

Before installing Qubes, check the hardware compatibility list at qubes-os.org/hcl to ensure your laptop is supported. A Lenovo ThinkPad T480, T14, or X1 Carbon is the safest choice. Ensure the laptop has at least 16 GB of RAM (32 GB is strongly recommended) and an SSD with at least 128 GB of storage. Enter the BIOS/UEFI settings and enable Intel VT-x (or AMD-V) and VT-d (or AMD-Vi) — these virtualization extensions are required for Qubes to function. Disable Secure Boot, as Qubes does not currently support it.

Download the Qubes OS ISO from qubes-os.org and verify it using the provided PGP signature. Write the ISO to a USB drive using a tool like Rufus (Windows) or dd (Linux/macOS). Boot from the USB drive and follow the installation wizard: select your language, configure disk encryption (use a strong passphrase — this protects everything on the machine), and choose which pre-configured qubes to create. The default selection includes personal, work, untrusted, and vault qubes, plus sys-net, sys-firewall, and sys-whonix for network management. Installation takes 20-40 minutes depending on hardware speed.

After installation, boot into Qubes and enter your disk encryption passphrase. You'll see the Xfce desktop with a qube management panel. Start by updating the system: open a terminal in dom0 (the administrative domain) and run sudo qubes-dom0-update. Then update your template qubes (the base images other qubes are built from). Create a dedicated qube for anonymous browsing by cloning the Whonix workstation template — this qube will route all traffic through Tor. Create another qube for VPN-protected browsing by installing Mullvad VPN in a template and connecting qubes to it. Install your critical tools: Mullvad VPN in a sys-vpn qube, Tor Browser in a disposable Whonix qube, a password manager in the vault qube (which has no network access), and your communication tools in a dedicated qube. Each activity exists in its own compartment — a compromise in one cannot spread to others.

Last evaluated: 2026-03-28
WHEN
WHERE
HOW