Qubes OS ProjectQubes OS Project
Home Intro Screenshots Contact Download Documentation Community

System Documentation for Developers

  1. Fundamentals:
    1. Qubes OS Architecture v0.3 ​(pdf) (The original 2009 document that started this all…)
    2. Security-critical elements of Qubes OS
    3. Qubes RPC framework (qrexec):
      1. The Qubes RPC/Service API
      2. Example for writing a qrexec service in Qubes OS ​blog post
      3. qrexec implementation in Qubes R2
      4. qrexec implementation in Qubes R3/Odyssey
    4. Qubes GUI virtualization protocol
    5. Networking in Qubes
    6. Implementation of template sharing and updating
  2. Services:
    1. Inter-domain file copying
    2. Dynamic memory management in Qubes
    3. Implementation of DisposableVMs
    4. ​Article about disposable VMs
    5. Dom0 secure update mechanism
    6. VM secure update mechanism?
  3. Debugging:
    1. Profiling python code
    2. Test environment in separate machine for automatic tests
    3. VM-dom0 internal configuration interface
    4. Debugging Windows VMs
  4. Building:
    1. Building Qubes
    2. Development Workflow
    3. KDE Dom0 packages for Qubes
    4. How to build Qubes installation ISO
    5. Building USB passthrough support (experimental)
    6. Building a TemplateVM based on a new OS (ArchLinux example)
    7. Building the Archlinux Template

Qubes OS Project

  • Qubes OS Project
  • https://www.qubes-os.org
  • QubesOS

Qubes OS is an open source operating system designed to provide strong security for desktop computing using Security by Compartmentalization approach. Qubes is based on Xen, X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers. It can also run Windows apps natively in Windows AppVMs (Beta).