Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
Security focused Qubes OS
Message
<blockquote data-quote="bazang" data-source="post: 1118353" data-attributes="member: 114717"><p>One (1) user. Provide examples of more please.</p><p></p><p>Create a poll here on the forum and ask "Do you use QubesOS - YES or NO?" Such a poll is going to quickly confirm what I meant when I stated "people at MT cannot use Qubes."</p><p></p><p>I never said that people are incapable of figuring out and using Qubes. But that is how you interpreted it or deliberately spun what I posted into something I never said. The first of many instances.</p><p></p><p></p><p></p><p>Proofs? Provide receipts please.</p><p></p><p></p><p></p><p>Less than 0.00001% of the global user base. Despite that small fringe user-base still using obsolete Windows, it still does not change the fact that malicious campaigns targeting home users are not the top priority of the vast majority of threat actors.</p><p></p><p>Not sure what your point is. What OS is used is not relevant to the trends in malicious digital campaigns.</p><p></p><p></p><p></p><p>I never said that. That is your interpretation of what I said.</p><p></p><p>What I said is that malicious campaigns directed at home users are not the predominant global activity of threat actors. Which is 100% correct. They stopped focusing on home users a very long time ago.</p><p></p><p></p><p></p><p>QubesOS, despite its strong security features, faces several challenges that contribute to its lack of popularity:</p><ol> <li data-xf-list-type="ol"><strong>Performance Issues</strong>: QubesOS is known to be a resource hog, requiring significant system resources to run smoothly. Users have reported that even high-end hardware struggles with tasks like playing high-resolution videos.</li> <li data-xf-list-type="ol"><strong>Complex Configuration</strong>: The constant need for configuration and maintenance can be daunting for users. Setting up and managing QubesOS requires a steep learning curve and a lot of time.</li> <li data-xf-list-type="ol"><strong>Hardware Compatibility</strong>: QubesOS has specific hardware requirements, and not all devices are compatible. This limits the number of users who can effectively run the OS.</li> <li data-xf-list-type="ol"><strong>Battery Life</strong>: Users have reported poor battery life when using QubesOS, which can be a significant drawback for those who rely on their laptops for extended periods.</li> <li data-xf-list-type="ol"><strong>Lack of Certain Features</strong>: Some users find the lack of features like Bluetooth support and GPU utilization to be a dealbreaker. These limitations can hinder the overall user experience.</li> <li data-xf-list-type="ol"><strong>Usability</strong>: The unconventional way of using QubesOS, with its compartmentalized approach, can be challenging for users who are accustomed to more traditional operating systems.</li> </ol><p></p><p></p><p>I do. What do you expect? That I post images of my security clearance and officer badges? "Take a pic or it's just not true..." sortah thing for you, right?</p><p></p><p></p><p></p><p>You do realize that governments have programs that do exactly that - continuous global monitoring, right? Those operational threat monitoring, aggregation, and analysis programs have been running continuously for well over 20 years and the data collected shows the trends that I spoke of. Actually, the UK, US, Israel, Canada, Australia, New Zealand, Netherlands, France, Spain, Norway and others have threat intelligence sharing agreements.</p><p></p><p>Go back 10 to 15 years, and malware was not <em>the</em> primary global, systemic digital pariah. It was PUPs and PUAs.</p><p></p><p>I never said that "ALL the feeds/statistics gathered in all that time revealed home user are secure since the release of Windows XP (2001)." You are straight-up, purposefully mis-stating what I posted.</p><p></p><p>Threat intelligence has been around for many decades at this point. Threat actors go after targets with a good return on effort nowadays, which was my point. And which you state yourself here. So thank you for proving my point, and you didn't even need threat intelligence or statistics to figure it out.</p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p>There are aspects of QubesOS that - in order to work completely as expected - requires installation on bare metal hardware. The nested virtualization only works as intended when installed directly onto the required hardware.</p><p></p><p>Even on a super high-end tower PC, QubesOS runs wonky - resource wonky - in a virtual machine.</p><p></p><p>[URL unfurl="true"]https://www.qubes-os.org/doc/installation-guide/[/URL]</p><p></p><p>[ATTACH=full]287562[/ATTACH]</p></blockquote><p></p>
[QUOTE="bazang, post: 1118353, member: 114717"] One (1) user. Provide examples of more please. Create a poll here on the forum and ask "Do you use QubesOS - YES or NO?" Such a poll is going to quickly confirm what I meant when I stated "people at MT cannot use Qubes." I never said that people are incapable of figuring out and using Qubes. But that is how you interpreted it or deliberately spun what I posted into something I never said. The first of many instances. Proofs? Provide receipts please. Less than 0.00001% of the global user base. Despite that small fringe user-base still using obsolete Windows, it still does not change the fact that malicious campaigns targeting home users are not the top priority of the vast majority of threat actors. Not sure what your point is. What OS is used is not relevant to the trends in malicious digital campaigns. I never said that. That is your interpretation of what I said. What I said is that malicious campaigns directed at home users are not the predominant global activity of threat actors. Which is 100% correct. They stopped focusing on home users a very long time ago. QubesOS, despite its strong security features, faces several challenges that contribute to its lack of popularity: [LIST=1] [*][B]Performance Issues[/B]: QubesOS is known to be a resource hog, requiring significant system resources to run smoothly. Users have reported that even high-end hardware struggles with tasks like playing high-resolution videos. [*][B]Complex Configuration[/B]: The constant need for configuration and maintenance can be daunting for users. Setting up and managing QubesOS requires a steep learning curve and a lot of time. [*][B]Hardware Compatibility[/B]: QubesOS has specific hardware requirements, and not all devices are compatible. This limits the number of users who can effectively run the OS. [*][B]Battery Life[/B]: Users have reported poor battery life when using QubesOS, which can be a significant drawback for those who rely on their laptops for extended periods. [*][B]Lack of Certain Features[/B]: Some users find the lack of features like Bluetooth support and GPU utilization to be a dealbreaker. These limitations can hinder the overall user experience. [*][B]Usability[/B]: The unconventional way of using QubesOS, with its compartmentalized approach, can be challenging for users who are accustomed to more traditional operating systems. [/LIST] I do. What do you expect? That I post images of my security clearance and officer badges? "Take a pic or it's just not true..." sortah thing for you, right? You do realize that governments have programs that do exactly that - continuous global monitoring, right? Those operational threat monitoring, aggregation, and analysis programs have been running continuously for well over 20 years and the data collected shows the trends that I spoke of. Actually, the UK, US, Israel, Canada, Australia, New Zealand, Netherlands, France, Spain, Norway and others have threat intelligence sharing agreements. Go back 10 to 15 years, and malware was not [I]the[/I] primary global, systemic digital pariah. It was PUPs and PUAs. I never said that "ALL the feeds/statistics gathered in all that time revealed home user are secure since the release of Windows XP (2001)." You are straight-up, purposefully mis-stating what I posted. Threat intelligence has been around for many decades at this point. Threat actors go after targets with a good return on effort nowadays, which was my point. And which you state yourself here. So thank you for proving my point, and you didn't even need threat intelligence or statistics to figure it out. There are aspects of QubesOS that - in order to work completely as expected - requires installation on bare metal hardware. The nested virtualization only works as intended when installed directly onto the required hardware. Even on a super high-end tower PC, QubesOS runs wonky - resource wonky - in a virtual machine. [URL unfurl="true"]https://www.qubes-os.org/doc/installation-guide/[/URL] [ATTACH type="full"]287562[/ATTACH] [/QUOTE]
Insert quotes…
Verification
Post reply
Top