This article was automatically translated from the original Turkish version.
Qubes OS is a free and open-source desktop operating system developed for individual users with strong security features. Its primary goal is to ensure users’ digital security through isolation. Unlike traditional security solutions, Qubes OS adopts the principle of compartmentalization at the operating system level. This ensures that potential threats are confined to isolated segments rather than compromising the entire system. First publicly announced in 2012, Qubes OS was developed by Invisible Things Lab, founded by cybersecurity expert Joanna Rutkowska.

Desktop Interface (QubesOS)
The architecture of Qubes OS is based on modern virtualization technologies. The system runs user environments on isolated virtual machines (VMs), each called a “qube.” These qubes can be customized for different tasks—for example, designated with distinct security levels for personal use, work, financial transactions, or software development.
Qubes OS uses the open-source Xen hypervisor for hardware virtualization. Xen enables each qube to operate independently of the host operating system. Within the system, only one management domain, called Dom0, has full privileges and runs the graphical server and user interface. Dom0 has no network or internet access, making it more resistant to external attacks.
Instead of installing applications directly into qubes, Qubes OS manages software installations through special virtual machines called “template VMs.” When a template VM is updated, all qubes linked to it automatically benefit from the updates. This simplifies system management and minimizes security vulnerabilities.
Each qube is represented by a different color in the user interface. For instance, high-risk activities are shown in red, while secure activities are indicated in green or blue. This visual approach allows users to easily track which operations are being performed within which security context.
The core philosophy of Qubes OS is based on the principle: “If no system is trustworthy, isolate everything.” This approach is particularly effective in scenarios involving exploitation of zero-day vulnerabilities. All applications within the system run exclusively within their own qubes. For example, a “PDF View” qube created to open PDF files cannot communicate with external systems. Thus, attacks originating from malicious documents are contained and cannot spread across the broader system. Rather than relying on traditional protections such as antivirus software, Qubes OS argues that security boundaries must be defined by digital barriers—namely, VMs. Thanks to this isolation, user errors or malware can affect only a limited virtual environment, not the entire system.
Qubes OS is particularly favored by the following user profiles:

Qubes in Use (QubesOS)
Qubes OS supports popular Linux distributions such as Fedora, Debian, Ubuntu, and Whonix as templates. In certain cases, it is also possible to run Windows qubes. However, Windows support is limited and may require specific licensing.
In terms of hardware compatibility, Qubes OS performs best on devices that support UEFI and hardware-based virtualization features such as VT-d or AMD-Vi. The official Qubes documentation includes a list of tested hardware configurations.
Architecture and Technical Structure
Xen Hypervisor
Template-Based Application Management
Security Color Coding
Security Approach
Use Cases
Supported Systems and Compatibility