@simmerskool Here's what I asked Chat and what she said. But note ChatGPT cusrtomizes answers knowing what I do professionally, by the questions I've asked before. So she could be tailoring the answer to my known demands of an OS. Roughly speaking speaking, she knows I prefers to be secure.
--------------------------------------------------------------------------------------------------
Using ProvMox as the hypervisor and running Fedora as a 'guest' os. Does that suite as a daily driver more than Qubes ?
Using
Proxmox as the hypervisor and running
Fedora as a guest can work as a daily driver, but it usually
doesn’t beat Qubes as a daily driver if your goal is “security through compartmentalization.” It’s closer to “a DIY VDI workstation” than “Qubes-but-better.”
The core difference
Qubes daily-driver model (what it’s optimized for)
Qubes is built to make it
easy to run many separate security domains (work/personal/banking/random-PDF, etc.) with strong isolation, plus safe inter-VM workflows (copy/paste, file move, app menus) via qrexec.
Qubes OS+2Qubes OS+2
It also has a
device-handling security model (e.g., isolating risky USB) that’s part of the design, not an afterthought.
Qubes OS
And it supports
Disposable VMs for “open this risky thing and throw it away.”
Qubes OS
Proxmox + Fedora guest model (what it’s optimized for)
Proxmox VE is a
Debian-based virtualization platform meant to run and manage VMs/containers using
KVM/QEMU with a web-based management stack.
Proxmox VE+1
Yes, Proxmox even documents “developer workstations with X11,” but that’s essentially: “turn the hypervisor host into a workstation and run desktop VMs.”
Proxmox VE
Why Proxmox+Fedora usually isn’t “more suitable than Qubes” as a daily driver
- If you run just one Fedora VM, you’re not getting Qubes’ main benefit
You’ve basically got “a Linux desktop, but inside a VM.” Qubes’ advantage is the many-VM workflow with low friction. Qubes OS+1
- Your Proxmox host becomes part of your daily-risk surface
Proxmox’s host is a full system running management services (web UI/API, etc.). That’s fine for a server, but it’s the opposite of the Qubes idea of keeping the most-trusted layer minimal and not used for daily browsing. Proxmox VE+1
- Desktop ergonomics are “possible,” but not the point
To feel like a normal workstation you’ll end up doing GPU passthrough, SPICE/remote console tuning, USB passthrough decisions, audio/display integration, etc. Proxmox can do this, but Qubes is designed around that end-user workflow. Proxmox VE+1
When Proxmox+Fedora
Choose Proxmox+Fedora if:
- You mainly want performance + a normal Fedora desktop, and your goal is “run Fedora” (not “run 8 isolated compartments all day”).
- You want easy snapshots/rollback of the whole workstation VM (a strong practical benefit of the Proxmox model). Proxmox VE+1
- You’re okay with “security = Fedora hardening + VM boundary,” rather than Qubes’ compartment-by-default approach.
Bottom line
- For “security daily driver” (lots of isolation compartments, disposable tasks, safer device handling): Qubes wins. Qubes OS+2Qubes OS+2
- For “I want Fedora as my main desktop, but I also want hypervisor features (snapshots, lab VMs, central management): Proxmox+Fedora can be great. Proxmox VE+1