Get AI summaries of any video or article — Sign up free
the most secure OS in the world.....I hate it thumbnail

the most secure OS in the world.....I hate it

NetworkChuck·
5 min read

Based on NetworkChuck's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.

TL;DR

Cubes OS is built around confinement: each task runs in its own isolated cube so compromise stays contained.

Briefing

Cubes OS aims for extreme security by treating compromise as inevitable and then hard-limiting what any hacked app can touch. Instead of running everything in one operating system space, it spins up isolated “cubes” (compartmentalized environments) for different tasks—work, browsing, anonymity-related browsing—so malware in one compartment can’t interfere with others. The system’s paranoia is explicit: it assumes software bugs will be exploited and that “nothing is secure unless you unplug the internet,” then counters that risk with confinement and control.

At the center of the approach is virtualization. Cubes OS is built around a type-1 hypervisor model using Zen-based virtualization derived from the Zen Project Hypervisor, and it runs each application inside its own isolated compartment. When a user launches an app cube (for example, a work Firefox or a separate “weird” Firefox), Cubes OS creates a new isolated environment for that app. Color-coded cube labels make it clear which compartment is active, while separate cubes prevent cross-contamination—dark-web browsing doesn’t mess with the “weird” environment, and neither can reach work-related apps.

Security also depends on how Cubes OS structures system components. App cubes are based on template cubes: a shared base OS plus a set of common apps. That template system lets users update core components in one place so every cube that relies on the template automatically benefits. If a cube gets infected, the response is simple: shut it down. The design prevents app cubes from modifying the underlying template, so the blast radius stays small.

Beyond app cubes, Cubes OS introduces service cubes and specialized control points for hardware and networking. USB devices and network access are isolated through dedicated cubes (for example, a firewall cube for inbound control, or a Tor network cube for onion routing). The system also includes a management cube for background administration and a “dom0” admin cube that acts like the root control plane. Dom0 is treated as the most trusted and most sensitive component: it has no internet connection and should only run the desktop environment and window manager. If dom0 is compromised, the system’s security model collapses.

The tradeoff is usability and resource cost. The setup is described as painful and slow, especially when running inside a VM. Hardware requirements include a 64-bit CPU with Intel VT-x (EPT) or AMD-V with RVI, plus IOMMU. Memory and storage demands are steep: at least 6 GB RAM (16 GB recommended) and 32 GB storage (128 GB recommended), with virtual machines requiring extra RAM and large disk allocations. The transcript also notes that Cubes OS officially discourages running inside a virtual machine, though it can be attempted via nested virtualization.

Installation proceeds via downloading the stable ISO, writing it to USB using Rufus in DD image mode, and then configuring BIOS settings such as enabling CPU virtualization and disabling Secure Boot for external installs. After installation, users select template cubes (Fedora, Debian 11, and Whonix by default in the walkthrough), then connect to networks as needed. Disposable cubes add another layer by wiping changes when stopped. Even with all that, the creator concludes that the security benefits come with performance and convenience costs, and suggests that for some users, running separate conventional VMs may be a simpler alternative—while still acknowledging Cubes OS’s strong confinement model.

Cornell Notes

Cubes OS pursues security by assuming compromise is inevitable and then containing damage through isolation. It runs applications in separate “cubes” (compartmentalized environments) so one hacked app can’t reach other tasks like work browsing or Tor-related activity. The system relies on virtualization (Zen-based, type-1 hypervisor model) and uses template cubes so updates to core apps propagate across many cubes. Specialized cubes handle networking and USB access, while dom0 acts as the trusted admin control plane with no internet connection. The main downside is setup complexity and heavy resource requirements, especially when attempting nested virtualization in a VM.

How does Cubes OS limit the damage if an app gets hacked?

It confines each activity inside its own isolated cube (a compartment/virtual machine). When launching an app like Firefox in a specific cube, Cubes OS spins up an isolated environment for that task. Because cubes are separated, malware in one cube can’t interfere with other cubes (e.g., a compromised “weird” cube can’t touch the “work” cube or the underlying template). If something goes wrong, the practical response is to shut down the infected cube.

What role do template cubes play in both security and maintenance?

App cubes are built from template cubes, which include a base OS plus a set of common apps. Updates to the template propagate to all app cubes that use it, so core components like Firefox can be updated in one place. Crucially, app cubes can’t modify the original template, so even if an app cube is compromised, the shared template remains protected from direct tampering.

Why are service cubes important for USB and networking security?

Cubes OS isolates hardware and network access through dedicated service cubes. USB devices and network connections are not treated as universal resources; instead, they’re routed through specific cubes such as a USB cube and network/firewall cubes. In the walkthrough, the personal cube can select which network cube it uses (e.g., a firewall cube with limited inbound rules, or a Tor network cube). This compartmentalizes attack paths tied to devices and connectivity.

What makes dom0 uniquely sensitive in Cubes OS?

Dom0 is the admin cube/root control plane that manages other cubes and much of the system. It’s treated as the most trusted component and should not be used for general browsing or risky tasks. The transcript emphasizes that dom0 has no internet connection and should only run the desktop environment and window manager. If dom0 is compromised, the security model is effectively lost.

What hardware and virtualization settings are required to run Cubes OS?

The requirements include a 64-bit CPU with virtualization support: Intel VT-x with EPT or AMD-V with RVI, plus IOMMU enabled (typically in virtualization settings). For VM attempts, nested virtualization is required—meaning the host’s BIOS must also have virtualization enabled. The transcript also notes that Cubes OS installation inside a VM is officially discouraged, even though it can be attempted with tools like VMware Workstation Player.

What are the practical installation and setup steps highlighted?

The walkthrough downloads the stable Cubes OS ISO, writes it to a USB stick using Rufus in DD image mode, then boots from USB to install. On physical hardware, BIOS/UEFI settings must enable CPU virtualization (SVM mode/VT-x) and disable Secure Boot to boot the external SSD/USB; Secure Boot may need re-enabling later to return to the original OS. After installation, users choose template cubes (Fedora, Debian 11, Whonix) and then connect to the appropriate network cube (including Tor-related setup when using Whonix).

Review Questions

  1. What containment mechanism in Cubes OS prevents a compromised app cube from affecting other cubes or the template cube?
  2. How do template cubes change the way updates and security boundaries work across multiple app cubes?
  3. Why is dom0 treated as the most critical component, and what restrictions are placed on it?

Key Points

  1. 1

    Cubes OS is built around confinement: each task runs in its own isolated cube so compromise stays contained.

  2. 2

    The system assumes bugs and exploitation are inevitable, then reduces blast radius through compartmentalization.

  3. 3

    Template cubes centralize base OS and common apps, enabling consistent updates while preventing app cubes from modifying templates.

  4. 4

    Service cubes isolate USB and networking access, routing device and connectivity permissions through dedicated compartments.

  5. 5

    Dom0 is the trusted admin control plane with no internet connection; compromising it undermines the security model.

  6. 6

    Running Cubes OS requires virtualization features (Intel VT-x/EPT or AMD-V/RVI) and IOMMU, and it can be resource-intensive.

  7. 7

    Installation on physical hardware often requires disabling Secure Boot for external boot, then potentially re-enabling it afterward.

Highlights

Cubes OS treats “getting hacked” as the starting assumption and counters it with containment—shut down the compromised cube rather than trying to disinfect it.
Each app runs in its own cube, so separate browsing identities (work vs. Tor-related) don’t share the same risk boundary.
Template cubes let updates flow to many cubes at once while blocking app cubes from altering the template itself.
USB and network access are compartmentalized through service cubes, not granted globally.
Dom0 is the security linchpin: it’s isolated, no internet, and should only handle the desktop/window manager.

Topics

  • Cubes OS Security Model
  • Virtualization and Hypervisors
  • Template Cubes
  • Service Cubes Networking USB
  • Dom0 Admin Cube
  • Installation Requirements

Mentioned

  • VM
  • VMware
  • VT-x
  • EPT
  • AMD-V
  • RVI
  • IOMMU
  • USB
  • Tor
  • VMware workstation player
  • DD
  • BIOS
  • SVM
  • UEFI
  • ISO
  • SSD