Qubes To Implement Disposable Virtual Machines

Now this is interesting. We only briefly touched upon Qubes two months ago, and now, the team behind the project have announced a very interesting feature: disposable virtual machines. The idea here is that you can tell your operating system to launch an application in a virtual machine that gets created specifically for opening that application. If you close the application, the VM is destroyed automatically – and this all in under one second.

Qubes is an interesting operating system that builds upon the strengths of Linux, the Xen hypervisor, and the X windowing system. Its goal is to create a secure system through the use of virtualisation. “Qubes lets the user define many security domains implemented as lightweight virtual machines, or ‘AppVMs’,” the website reads, “E.g. user can have ‘personal’, ‘work’, ‘shopping’, ‘bank’, and ‘random’ AppVMs and can use the applications from within those VMs just like if they were executing on the local machine, but at the same time they are well isolated from each other.”

Qubes supports secure copy and paste between these virtual machines. The virtual machines consist of a small X server running a dummy driver, so they take up relatively little RAM. Apart from the AppVMs, several system components are running inside special virtual machines too, such as the networking environment.

They’ve now taken all this a step further by announcing the disposable virtual machine concept. You can right click on any file or application, and select ‘open in a disposable VM’; the system will create a virtual machine and launch your application in it, which should take less than one second. Once you’re done and close the application, the VM will be destroyed automatically.

“Basic support for Disposable VMs is planned for Beta 1, which is scheduled sometime at the end of the summer holidays,” Joanna Rutkowska, the driving force behind Qubes, writes, “But I can tell that’s just the beginning. The ultimate goal, from the user’s point of view, would be to make Qubes OS to look and behave just like a regular mainstream OS like Linux, or Windows, or even Mac, but still with all the strong security that Qubes architecture provides, deployed behind the scene. Seamless support for Disposable VM is one of the first steps to achieve this goal.”

This is a very interesting approach, and in all honesty, I’m kind of wondering why none of the big boys have every thought of this – spelled out like this, it sounds like such a no-brainer.


  1. 2010-06-03 4:43 pm
    • 2010-06-03 4:53 pm
      • 2010-06-03 7:26 pm
        • 2010-06-03 8:33 pm
        • 2010-06-03 9:33 pm
    • 2010-06-03 7:14 pm
  2. 2010-06-03 6:45 pm
    • 2010-06-03 7:49 pm
  3. 2010-06-03 7:44 pm
  4. 2010-06-03 7:58 pm
    • 2010-06-03 9:36 pm
      • 2010-06-03 11:27 pm
        • 2010-06-04 5:23 am
          • 2010-06-04 9:16 am
          • 2010-06-04 5:30 pm
  5. 2010-06-03 9:09 pm
  6. 2010-06-03 11:50 pm
  7. 2010-06-04 2:48 am
    • 2010-06-04 7:31 am
      • 2010-06-04 6:33 pm
        • 2010-06-06 12:34 pm
  8. 2010-06-04 6:22 am
    • 2010-06-04 11:39 am
      • 2010-06-04 12:44 pm
        • 2010-06-04 2:16 pm
          • 2010-06-05 10:56 am