Qubes OS is a security-oriented, Fedora-based desktop Linux distribution whose main concept is "security by isolation" by using domains implemented as lightweight Xen virtual machines. It attempts to combine two contradictory goals: how to make the isolation between domains as strong as possible, mainly due to clever architecture that minimises the amount of trusted code, and how to make this isolation as seamless and easy as possible.
Andrew David Wong has announced the release of Qubes OS 4.0.4, an updated build of the projects security-focused Linux distribution that provides a way to "compartmentalise" computing tasks into isolated compartments called "qubes": "We are pleased to announce the release of Qubes OS 4.0.4. This is the fourth stable release of Qubes 4.0. It includes many updates over the initial 4.0 release, including: all 4.0 dom0 updates to date; Fedora 32 TemplateVM; Debian 10 TemplateVM; Whonix 15 Gateway and Workstation TemplateVMs; Linux kernel 5.4 by default. If you installed Qubes 4.0, 4.0.1, 4.0.2, or 4.0.3 and have fully updated, then your system is already equivalent to a Qubes 4.0.4 installation. No further action is required. Regardless of your current OS, if you wish to install (or reinstall) Qubes 4.0 for any reason, then the 4.0.4 ISO makes this more convenient and secure, since it bundles all Qubes 4.0 updates to date. Please see the installation guide for detailed instructions.
Once you have finished your software download we would appreciate you coming back and rating your chosen mirror by clicking on it's name and choosing an option that reflects your experience. The number beside each mirror below reflects the ratings given by other visitors, the higher the percentage the better the mirror.
Would you like to receive an email when a new version of Qubes OS is released? If so then click here.
Are you having a problem downloading Linux from LQ ISO? Let us know and we'd be happy to address the issue.
Qubes OS is a security-oriented, Fedora-based desktop Linux distribution whose main concept is "security by isolation" by using domains implemented as lightweight Xen virtual machines. It attempts to combine two contradictory goals: how to make the isolation between domains as strong as possible, mainly due to clever architecture that minimises the amount of trusted code, and how to make this isolation as seamless and easy as possible.