Qube Laptops & Desktops Driver Download For Windows
The Qubes OS Project aims to partner with a select few computer vendors to ensure that Qubes users have reliable hardware purchasing options.We aim for these vendors to be as diverse as possible in terms of geography, cost, and availability.Note, however, that we certify only that a particular hardware configuration is supported by Qubes.We take no responsibility for our partners’ manufacturing or shipping processes, nor can we control whether physical hardware is modified (whether maliciously or otherwise) en route to the user.
- Qube Laptops & Desktops Driver Download For Windows 10
- Qube Laptops & Desktops Driver Download For Windows
QUBE’s jaw-dropping immersive experience starts at 10.5 inches! Get a wider perspective and choose Windows 10, 8.1, 8, 7, Vista or XP. We have had significant penetration testing done by some of the largest financial institutions and corporations in the world and have passed. Just put it into your suitcase or backpack together with your Laptop and feel the freedom qube will have to offer. Qube can easily replace your favorite audio processing plugins and saves you a lot of precious CPU Power on your DAW. Qubes brings to your personal computer the security of the Xen hypervisor, the same software relied on by many major hosting providers to isolate websites and services from each other.
There are also other hardware models on which we have tested Qubes OS.See Hardware Testing for details.
Qubes-certified Laptops
Qubes-certified laptops are certified for a major version and regularly tested by the Qubes developers to ensure compatibility with all of Qubes’ features within that major version.The developers test all new updates within that major version to ensure that no regressions are introduced.
Insurgo PrivacyBeast X230
The Insurgo PrivacyBeast X230 meets and exceeds our hardware certification requirements for Qubes 4.Read our announcement of the certification for further details!
NitroPad X230
The NitroPad X230 satisfies all hardware certification requirements for Qubes 4, offering users extensive hardware security options.
Become Hardware Certified
If you are a hardware vendor, you can have your hardware certified as compatible with Qubes OS.The benefits of hardware certification include:
- Your customers can purchase with confidence, knowing that they can take full advantage of Qubes OS on your hardware for a specific major version.
- We will continue testing your hardware to ensure compatibility with the supported major version.In the course of this testing, we will also test your hardware against upcoming versions, which can help with future planning.
- Your hardware will continue to be compatible with Qubes OS as it further develops within that major version, and we will work with you toward preserving compatibility and certification in future releases.
- You can support the development of Qubes OS.
Hardware Certification Requirements
(Please note that these are the requirements for hardware certification, not the requirements for running Qubes.For the latter, please see the system requirements.)
One of the most important security improvements introduced with the release of Qubes 4.0 was to replace paravirtualization (PV) technology with hardware-enforced memory virtualization, which recent processors have made possible thanks to so-called Second Level Address Translation (SLAT), also known as EPT in Intel parlance.SLAT (EPT) is an extension to Intel VT-x virtualization, which originally was capable of only CPU virtualization but not memory virtualization and hence required a complex Shadow Page Tables approach.We hope that embracing SLAT-based memory virtualization will allow us to prevent disastrous security bugs, such as the infamous XSA-148, which — unlike many other major Xen bugs — regrettably did affect Qubes OS.Consequently, we require SLAT support of all certified hardware beginning with Qubes OS 4.0.
Another important requirement is that Qubes-certified hardware should run only open-source boot firmware (aka “the BIOS”), such as coreboot.The only exception is the use of (properly authenticated) CPU-vendor-provided blobs for silicon and memory initialization (see Intel FSP) as well as other internal operations (see Intel ME).However, we specifically require all code used for and dealing with the System Management Mode (SMM) to be open-source.
While we recognize the potential problems that proprietary CPU-vendor code can cause, we are also pragmatic enough to realize that we need to take smaller steps first, before we can implement even stronger countermeasures such as a stateless laptop.A switch to open source boot firmware is one such important step.To be compatible with Qubes OS, the BIOS must properly expose all the VT-x, VT-d, and SLAT functionality that the underlying hardware offers (and which we require).Among other things, this implies proper DMAR ACPI table construction.
Finally, we require that Qubes-certified hardware does not have any built-in USB-connected microphones (e.g. as part of a USB-connected built-in camera) that cannot be easily physically disabled by the user, e.g. via a convenient mechanical switch.Thankfully, the majority of laptops on the market that we have seen already satisfy this condition out-of-the-box, because their built-in microphones are typically connected to the internal audio device, which itself is a type of PCIe device.This is important, because such PCIe audio devices are — by default — assigned to Qubes’ (trusted) dom0 and exposed through our carefully designed protocol only to select AppVMs when the user explicitly chooses to do so.The rest of the time, they should be outside the reach of malware.
While we also recommend a physical kill switch on the built-in camera (or, if possible, not to have a built-in camera), we also recognize this isn’t a critical requirement, because users who are concerned about it can easily cover it a piece of tape (something that, regrettably, is far less effective on a microphone).
Similarly, we don’t consider physical kill switches on Wi-Fi and Bluetooth devices to be mandatory.Users who plan on using Qubes in an air-gap scenario would do best if they manually remove all such devices persistently (as well as the builtin speakers!), rather than rely on easy-to-flip-by-mistake switches, while others should benefit from the Qubes default sandboxing of all networking devices in dedicated VMs.
Qube Laptops & Desktops Driver Download For Windows 10
We hope these hardware requirements will encourage the development of more secure and trustworthy devices.
Hardware Certification Process
To have hardware certified, the vendor must:
- Send the Qubes team two (2) units for testing (non-returnable) for each configuration the vendor wishes to be offering.
- Offer to customers the very same configuration (same motherboard, same screen, same BIOS version, same Wi-Fi module, etc.) for at least one year.
- Pay the Qubes team a flat monthly rate, to be agreed upon between the hardware vendor and the Qubes team.
It is the vendor’s responsibility to ensure the hardware they wish to have certified can run Qubes OS, at the very least the latest stable version.This could be done by consulting the Hardware Compatibility List or trying to install it themselves before shipping any units to us.While we are willing to troubleshoot simple issues, we will need to charge a consulting fee for more in-depth work.
If you are interested in having your hardware certified, please contact us.
Today the Qubes team is pleased to announce a partnership with thelaptop maker Purism and the launch of theQubes-certification program.
In our work on Qubes OS, we have focused on creating a reasonably secureoperating system. A common barrier of entry to Qubes for new users isuncertainty whether their hardware can take advantage of all of Qubes’security features.
With the Qubes-certification program, we willpartner with a few select computer makers to ensure that Qubes iscompatible with them, so that new users have clear path towards gettingstarted with Qubes if they desire. We aim for these makers to be asdiverse as possible in terms of geography, cost, and availability.
As part of this partnership, the Qubes team will certify Purism’sLibrem laptops to ensure that they are compatible with Qubes.
This begins with the certification of theLibrem 13. For existing Librem 13 users, we haveprovided instructions on improving Qubescompatibility with the Librem 13. For users now who seek to buy aLibrem 13, there will be an option to have Qubes pre-installed ontheir Librem 13. This will include all the necessary tweaks for maximumcompatibility with Qubes.
In addition, the Qubes team will receive a small portion of the revenuefrom any Librem 13 sale that come with Qubes pre-installed.
Qube Laptops & Desktops Driver Download For Windows
Both organizations are interested in stable, long term support forQubes+Purism laptops. Going into the future, we plan with Purism toimprove the functionality and security of Purism laptops to ensure thatQubes users can have the best of freedom, security, and privacy in oneconvenient package.