the most secure OS in the world.....I hate it
Based on NetworkChuck's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.
Cubes OS is built around confinement: each task runs in its own isolated cube so compromise stays contained.
Briefing
Cubes OS aims for extreme security by treating compromise as inevitable and then hard-limiting what any hacked app can touch. Instead of running everything in one operating system space, it spins up isolated “cubes” (compartmentalized environments) for different tasks—work, browsing, anonymity-related browsing—so malware in one compartment can’t interfere with others. The system’s paranoia is explicit: it assumes software bugs will be exploited and that “nothing is secure unless you unplug the internet,” then counters that risk with confinement and control.
At the center of the approach is virtualization. Cubes OS is built around a type-1 hypervisor model using Zen-based virtualization derived from the Zen Project Hypervisor, and it runs each application inside its own isolated compartment. When a user launches an app cube (for example, a work Firefox or a separate “weird” Firefox), Cubes OS creates a new isolated environment for that app. Color-coded cube labels make it clear which compartment is active, while separate cubes prevent cross-contamination—dark-web browsing doesn’t mess with the “weird” environment, and neither can reach work-related apps.
Security also depends on how Cubes OS structures system components. App cubes are based on template cubes: a shared base OS plus a set of common apps. That template system lets users update core components in one place so every cube that relies on the template automatically benefits. If a cube gets infected, the response is simple: shut it down. The design prevents app cubes from modifying the underlying template, so the blast radius stays small.
Beyond app cubes, Cubes OS introduces service cubes and specialized control points for hardware and networking. USB devices and network access are isolated through dedicated cubes (for example, a firewall cube for inbound control, or a Tor network cube for onion routing). The system also includes a management cube for background administration and a “dom0” admin cube that acts like the root control plane. Dom0 is treated as the most trusted and most sensitive component: it has no internet connection and should only run the desktop environment and window manager. If dom0 is compromised, the system’s security model collapses.
The tradeoff is usability and resource cost. The setup is described as painful and slow, especially when running inside a VM. Hardware requirements include a 64-bit CPU with Intel VT-x (EPT) or AMD-V with RVI, plus IOMMU. Memory and storage demands are steep: at least 6 GB RAM (16 GB recommended) and 32 GB storage (128 GB recommended), with virtual machines requiring extra RAM and large disk allocations. The transcript also notes that Cubes OS officially discourages running inside a virtual machine, though it can be attempted via nested virtualization.
Installation proceeds via downloading the stable ISO, writing it to USB using Rufus in DD image mode, and then configuring BIOS settings such as enabling CPU virtualization and disabling Secure Boot for external installs. After installation, users select template cubes (Fedora, Debian 11, and Whonix by default in the walkthrough), then connect to networks as needed. Disposable cubes add another layer by wiping changes when stopped. Even with all that, the creator concludes that the security benefits come with performance and convenience costs, and suggests that for some users, running separate conventional VMs may be a simpler alternative—while still acknowledging Cubes OS’s strong confinement model.
Cornell Notes
Cubes OS pursues security by assuming compromise is inevitable and then containing damage through isolation. It runs applications in separate “cubes” (compartmentalized environments) so one hacked app can’t reach other tasks like work browsing or Tor-related activity. The system relies on virtualization (Zen-based, type-1 hypervisor model) and uses template cubes so updates to core apps propagate across many cubes. Specialized cubes handle networking and USB access, while dom0 acts as the trusted admin control plane with no internet connection. The main downside is setup complexity and heavy resource requirements, especially when attempting nested virtualization in a VM.
How does Cubes OS limit the damage if an app gets hacked?
What role do template cubes play in both security and maintenance?
Why are service cubes important for USB and networking security?
What makes dom0 uniquely sensitive in Cubes OS?
What hardware and virtualization settings are required to run Cubes OS?
What are the practical installation and setup steps highlighted?
Review Questions
- What containment mechanism in Cubes OS prevents a compromised app cube from affecting other cubes or the template cube?
- How do template cubes change the way updates and security boundaries work across multiple app cubes?
- Why is dom0 treated as the most critical component, and what restrictions are placed on it?
Key Points
- 1
Cubes OS is built around confinement: each task runs in its own isolated cube so compromise stays contained.
- 2
The system assumes bugs and exploitation are inevitable, then reduces blast radius through compartmentalization.
- 3
Template cubes centralize base OS and common apps, enabling consistent updates while preventing app cubes from modifying templates.
- 4
Service cubes isolate USB and networking access, routing device and connectivity permissions through dedicated compartments.
- 5
Dom0 is the trusted admin control plane with no internet connection; compromising it undermines the security model.
- 6
Running Cubes OS requires virtualization features (Intel VT-x/EPT or AMD-V/RVI) and IOMMU, and it can be resource-intensive.
- 7
Installation on physical hardware often requires disabling Secure Boot for external boot, then potentially re-enabling it afterward.