To see our schedule with full functionality, like timezone conversion and personal scheduling, please enable JavaScript and go here.
10:00
10:00
25min
Welcome to Qubes OS Summit 2023 Day 1
Piotr Król, Marek Marczykowski-Górecki

Join us as we inaugurate the Qubes OS Summit 2023 with a hearty welcome, fostering connections and setting the stage for an exchange of ideas over the next few days. Here's a glimpse of what we'll delve into:

  • Reminisce the Past: A brief look back at the humble beginnings of the Qubes Summit and the simple idea of trustworthiness that brought us all together.
  • Reflect on the Journey: Since we last met, there have been small but significant strides in the Qubes OS community. We'll share the essence of what has changed, the lessons learned, and the paths forged.
  • Unfold the Schedule: We’ll unveil our simple yet engaging agenda for the next few days. From enlightening talks through open discussions, design sessions, and hackathon.
  • Appreciate the Support: A big shout out to our sponsors who share our common vision for a privacy-centric digital world.
Social Hub Main Room
10:30
10:30
30min
Qubes OS development status update
Marek Marczykowski-Górecki

This talk is a summary of projects Qubes team currently works on, a summary what we accomplished for 4.2 release, and what is left to be finished for the next release.

Social Hub Main Room
11:10
11:10
30min
A Collaborative Endeavor: Our Journey Towards Enhancing Trustworthiness of Computing Devices
Piotr Król

In the collaborative world of technology, progress is forged through partnerships and shared visions. 3mdeb, grounded in this philosophy, has been actively engaging with various stakeholders in its mission to enhance the trustworthiness of computing devices, with a spotlight on client-level solutions. This keynote, to be delivered by the founder of 3mdeb, narrates our collective journey, a path defined by collaborative endeavors, learning from partnerships, and a steadfast commitment to fostering security, privacy, and trust in the Qubes OS ecosystem and beyond. Join us as we share the milestones achieved, the lessons learned, and the road ahead in our collaborative journey towards a more secure and trustworthy computing landscape.

Social Hub Main Room
11:50
11:50
60min
Qubes OS and Ecosystem Changes: How Can We Change With Them?
Demi Marie Obenour

In the 13 years since Qubes OS was released, the broader desktop ecosystem has changed in many ways. Some are good for Qubes OS, such as broader hardware virtualization support and the rise of immutable OS. Others are problematic for Qubes OS, such as increasing dependence on GPU acceleration. Yet others are neutral but not backwards compatible, such as the switch from X11 to Wayland and from PulseAudio to PipeWire. In this talk, I will discuss how Qubes OS can adapt to the changing ecosystem and the new use-cases this will open up.

Social Hub Main Room
13:00
13:00
60min
Lunch break

Lunch break

Break
Social Hub Main Room
14:10
14:10
30min
Bad UX is Bad Security: Adventures in Qubes OS UX Design
Marta "marmarta" Marczykowska-Górecka

Qubes OS is good at being secure, but bad at UX - that's the common knowledge. However, I would like to argue that bad UX can actually be bad security, and that bad design decisions are not just annoying, but can be actively detrimental to the security of the system.

Social Hub Main Room
14:50
14:50
30min
From Zero to Hero: Video Tutorials for Qubes OS (fully recorded & edited on Qubes)
Deeplow

Deeplow will be presenting his ongoing work on video tutorials for Qubes OS and how he set up his computer to be able to record and edit fully on Qubes OS.

Social Hub Main Room
15:30
15:30
30min
Device UX Redesign
Marta "marmarta" Marczykowska-Górecka

Qubes OS device use flow leaves much to be desired - from confusing USB storage to eternal woes of connecting camera and microphone at the same time to the correct qube, it's all not quite as smooth as we would like. I am currently working on improving this situation with a more cohesive device UX for Qubes.

Social Hub Main Room
16:10
16:10
90min
Device UX Design Session
Marta "marmarta" Marczykowska-Górecka

Device UX Design Session

Design session
Social Hub Main Room
17:50
17:50
10min
Qubes OS Summit 2023 - Day 1 closing notes
Piotr Król

Closing notes

Social Hub Main Room
19:30
19:30
240min
Afterparty: Südblock

Admiralstraße 1-2, 10999 Berlin, Germany

https://maps.app.goo.gl/2rB2KUJWWJH7ENyFA

https://www.openstreetmap.org/way/65425822

https://www.suedblock.org

Break
Social Hub Main Room
10:00
10:00
10min
Welcome to Qubes OS Summit 2023 Day 2
Piotr Król, Marek Marczykowski-Górecki
  • Day 2 event schedule and organization announcements
  • Shout out to the sponsors
Social Hub Main Room
10:15
10:15
30min
Qubes OS contributing process
Marek Marczykowski-Górecki

A summary how to contribute to Qubes OS. The talk will focus on code changes, how it works currently and what we would like to change. Some non-code contributions like bug reports or documentation will also be covered.

Social Hub Main Room
10:55
10:55
15min
S0ix support for Qubes OS: A quick update
Simon Gaiser

A short overview of the current effort to get S0ix (suspend to idle) working on Qubes OS.

Social Hub Main Room
11:20
11:20
30min
TrenchBoot Anti Evil Maid: Roadmap, Challenges, and Advancements
Maciej Pijanowski

In this presentation, we will introduce AEM and TrenchBoot, shedding light on how TrenchBoot's DRTM technology aims to improve AEM. We'll discuss our journey, covering the roadmap for integrating TrenchBoot into Qubes OS, sharing the challenges we've encountered, and highlighting recent advancements. Join us to explore the synergy between AEM and TrenchBoot, shaping a more secure future for Qubes OS users.

Social Hub Main Room
12:00
12:00
25min
NovaCustom October 2023 update, anti-tamper solutions and Heads firmware demonstration
Wessel klein Snakenborg

NovaCustom is a leading supplier of secure laptops with Dasharo coreboot firmware. In this talk, Wessel will introduce some new Dasharo-NovaCustom October 2023 firmware update features. He will also give a demonstration of working Heads firmware, including a USB Security Device in combination with Qubes OS. Wessel will show some new physical privacy options during the installation, especially the new anti-tamper solution.

Social Hub Main Room
12:35
12:35
30min
Tailoring Your Qubes OS Environment: A Developer’s Guide to Leveraging SaltStack
Piotr Król

Creating and maintaining a Qubes OS configuration is no small feat, especially when striving for consistency across multiple devices or during device migrations. This tutorial delves into a developer's experience using the masterless configuration of SaltStack in Qubes OS to craft and manage a personalized set of AppVMs and TemplateVMs, aligning with a reasonably typical workflow, albeit less paranoid than the one suggested in the Qubes OS guide on organizing your qubes.

Social Hub Main Room
13:10
13:10
60min
Lunch break

Lunch break

Break
Social Hub Main Room
14:20
14:20
30min
Universal Second Factor and Qubes OS 4.2: can we still use our old U2F keys?
Piotr Bartman-Szwarc

During the talk, I will introduce the CTAP2 proxy service in the Qubes OS, which replaces the older U2F proxy. Our new service has been designed to ensure compatibility with the new Fido2 standard, thus enabling the full capabilities of newer hardware keys such as device PIN. Throughout the presentation, we will delve into the details of the newly introduced qrexec policies and consider the issue of backward compatibility. Spoiler alert: you may not even notice the upgrade.

Social Hub Main Room
15:00
15:00
30min
Multi VM application
Deeplow

Multi VM application

Design session
Social Hub Main Room
15:40
15:40
30min
Qubes OS Documentation Localization
m

This talk will present the recent progress of the Qubes OS Documentation Localization project, focusing on weblate and a future Qubes Localization Workflow.

Social Hub Main Room
16:20
16:20
10min
Creating a Tool to Check Platform Security Features for Qubes OS
Piotr Król

This tool will assess how well different hardware setups support platform security features like D-RTM, S-RTM, Intel Boot Guard, AMD Platform Secure Boot, and UEFI Secure Boot, and how they align with Qubes OS security standards. In the future parts of the tools or results reported by it could be presented directly within the Qubes OS User Interface, so users can easily understand the security readiness of their system. Through this session, we hope to take a step towards making security assessment more accessible and straightforward for all Qubes OS users both at the stage of evaluating potential hardware targets as well as for comparison between various vendors.

Social Hub Main Room
16:40
16:40
70min
Platform Security Design Session
Piotr Król

Platform Security Design Session

Design session
Social Hub Main Room
17:55
17:55
5min
Qubes OS Summit 2023 - Day 2 closing notes
Piotr Król

Closing notes

Social Hub Main Room