

Xen is also thin and has driver domain support.Ī Qubes user may create different domains for different activities, each in its own virtual machine. The Xen Hypervisor allows fully virtualized and para-virtualized virtual machines. Qubes uses the Xen Hypervisor for a number of reasons.

The single most important component of the operating system is probably the hypervisor because it is what enables isolation.

(Mind you, there are measures to ensure resources are not wasted.) This reduces the surface of attack, as what happens in one compartment has little or nothing at all to do with other compartments. These compartments run in their own lightweight virtual machines and are called qubes. This approach separates various parts of the operating system into compartments. The OS tackles security with the concept of security by compartmentalization. Qubes is a security-oriented operating system based on Fedora. The ability to choose distros based on security needs is one of the things that makes Linux appealing. Subgraph comes with an application firewall that detects outbound connections by applications, ensuring that they aren’t sending out information they shouldn’t. Another such distro is Subgraph, designed with a hardened kernel so it is resistant to network-borne exploits and malware attacks. However, since Tails is a live operating system, it doesn’t really become an OS one uses regularly. Tails, for example, is a live operating system that uses the Tor network and several other cryptographic tools to protect privacy and ensure anonymity. These Linux distros take different approaches to security and come with various pros and cons. Several Linux distributions aim at providing the best security to users.
