<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Qubes OS</title>
    <description>Qubes is a security-oriented, free and open-source operating system for personal computers that allows you to securely compartmentalize your digital life.
</description>
    <link>https://www.qubes-os.org/</link>
    <atom:link href="https://www.qubes-os.org/feed.xml" rel="self" type="application/rss+xml"/>
    <pubDate>Fri, 06 Feb 2026 19:11:13 +0000</pubDate>
    <lastBuildDate>Fri, 06 Feb 2026 19:11:13 +0000</lastBuildDate>
    <generator>Jekyll v3.10.0</generator>
    
      <item>
        <title>Fedora 43 templates available for Qubes OS 4.3</title>
        <description>&lt;p&gt;The following new &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/fedora/fedora.html&quot;&gt;Fedora 43 templates&lt;/a&gt; are now available for Qubes OS 4.3:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;fedora-43-xfce&lt;/code&gt; (default Fedora template with the &lt;a href=&quot;https://xfce.org/&quot;&gt;Xfce&lt;/a&gt; desktop environment)&lt;/li&gt;
  &lt;li&gt;&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;fedora-43&lt;/code&gt; (alternative Fedora template with the &lt;a href=&quot;https://www.gnome.org/&quot;&gt;GNOME&lt;/a&gt; desktop environment)&lt;/li&gt;
  &lt;li&gt;&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;fedora-43-minimal&lt;/code&gt; (&lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/minimal-templates.html&quot;&gt;minimal template&lt;/a&gt; for advanced users)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Fedora 43 template availability for Qubes OS 4.2 will be announced separately.&lt;/p&gt;

&lt;p&gt;There are two ways to upgrade a template to a new Fedora release:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Recommended:&lt;/strong&gt; &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/fedora/fedora.html#installing&quot;&gt;Install a fresh template to replace an existing one.&lt;/a&gt; This option is simpler for less experienced users, but it won’t preserve any modifications you’ve made to your template. After you install the new template, you’ll have to redo your desired template modifications (if any) and &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/templates.html#switching&quot;&gt;switch everything that was set to the old template to the new template&lt;/a&gt;. If you choose to modify your template, you may wish to write those modifications down so that you remember what to redo on each fresh install. To see a log of package manager actions, open a terminal in the template and use the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;dnf history&lt;/code&gt; command.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Advanced:&lt;/strong&gt; &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/fedora/fedora-upgrade.html&quot;&gt;Perform an in-place upgrade of an existing Fedora template.&lt;/a&gt; This option will preserve any modifications you’ve made to the template, but it may be more complicated for less experienced users.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; No user action is required regarding the OS version in dom0 (see our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/supported-releases.html#note-on-dom0-and-eol&quot;&gt;note on dom0 and EOL&lt;/a&gt;).&lt;/p&gt;
</description>
        <pubDate>Fri, 06 Feb 2026 00:00:00 +0000</pubDate>
        <link>https://www.qubes-os.org/news/2026/02/06/fedora-43-templates-available/</link>
        <guid isPermaLink="true">https://www.qubes-os.org/news/2026/02/06/fedora-43-templates-available/</guid>
        
        
        <category>announcements</category>
        
      </item>
    
      <item>
        <title>XSAs released on 2026-01-27</title>
        <description>&lt;p&gt;The &lt;a href=&quot;https://xenproject.org/&quot;&gt;Xen Project&lt;/a&gt; has released one or more &lt;a href=&quot;https://xenbits.xen.org/xsa/&quot;&gt;Xen security advisories (XSAs)&lt;/a&gt;.
The security of Qubes OS is &lt;strong&gt;not&lt;/strong&gt; affected.&lt;/p&gt;

&lt;h2 id=&quot;xsas-that-do-affect-the-security-of-qubes-os&quot;&gt;XSAs that DO affect the security of Qubes OS&lt;/h2&gt;

&lt;p&gt;The following XSAs &lt;strong&gt;do affect&lt;/strong&gt; the security of Qubes OS:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;(none)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;xsas-that-do-not-affect-the-security-of-qubes-os&quot;&gt;XSAs that DO NOT affect the security of Qubes OS&lt;/h2&gt;

&lt;p&gt;The following XSAs &lt;strong&gt;do not affect&lt;/strong&gt; the security of Qubes OS, and no user action is necessary:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https://xenbits.xen.org/xsa/advisory-477.html&quot;&gt;XSA-477&lt;/a&gt;
    &lt;ul&gt;
      &lt;li&gt;This XSA affects only HVMs with shadow paging and tracing enabled. In Qubes OS, shadow paging and
tracing are disabled at build time.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;https://xenbits.xen.org/xsa/advisory-478.html&quot;&gt;XSA-478&lt;/a&gt;
    &lt;ul&gt;
      &lt;li&gt;This XSA affects only XAPI, which is an alternative toolstack. Qubes OS uses libxl instead of XAPI.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;https://xenbits.xen.org/xsa/advisory-479.html&quot;&gt;XSA-479&lt;/a&gt;
    &lt;ul&gt;
      &lt;li&gt;This XSA affects only in-VM isolation, which Qubes OS does not rely on for security. We will still provide the fix for this issue at a later date, but it will not be accompanied by a &lt;a href=&quot;/security/qsb/&quot;&gt;Qubes security bulletin (QSB)&lt;/a&gt;.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;about-this-announcement&quot;&gt;About this announcement&lt;/h2&gt;

&lt;p&gt;Qubes OS uses the &lt;a href=&quot;https://wiki.xenproject.org/wiki/Xen_Project_Software_Overview&quot;&gt;Xen hypervisor&lt;/a&gt; as part of its &lt;a href=&quot;/doc/architecture/&quot;&gt;architecture&lt;/a&gt;. When the &lt;a href=&quot;https://xenproject.org/&quot;&gt;Xen Project&lt;/a&gt; publicly discloses a vulnerability in the Xen hypervisor, they issue a notice called a &lt;a href=&quot;https://xenproject.org/developers/security-policy/&quot;&gt;Xen security advisory (XSA)&lt;/a&gt;. Vulnerabilities in the Xen hypervisor sometimes have security implications for Qubes OS. When they do, we issue a notice called a &lt;a href=&quot;/security/qsb/&quot;&gt;Qubes security bulletin (QSB)&lt;/a&gt;. (QSBs are also issued for non-Xen vulnerabilities.) However, QSBs can provide only &lt;em&gt;positive&lt;/em&gt; confirmation that certain XSAs &lt;em&gt;do&lt;/em&gt; affect the security of Qubes OS. QSBs cannot provide &lt;em&gt;negative&lt;/em&gt; confirmation that other XSAs do &lt;em&gt;not&lt;/em&gt; affect the security of Qubes OS. Therefore, we also maintain an &lt;a href=&quot;/security/xsa/&quot;&gt;XSA tracker&lt;/a&gt;, which is a comprehensive list of all XSAs publicly disclosed to date, including whether each one affects the security of Qubes OS. When new XSAs are published, we add them to the XSA tracker and publish a notice like this one in order to inform Qubes users that a new batch of XSAs has been released and whether each one affects the security of Qubes OS.&lt;/p&gt;
</description>
        <pubDate>Tue, 27 Jan 2026 00:00:00 +0000</pubDate>
        <link>https://www.qubes-os.org/news/2026/01/27/xsas-released-on-2026-01-27/</link>
        <guid isPermaLink="true">https://www.qubes-os.org/news/2026/01/27/xsas-released-on-2026-01-27/</guid>
        
        
        <category>security</category>
        
      </item>
    
      <item>
        <title>Qubes OS 4.3.0 has been released!</title>
        <description>&lt;p&gt;We’re pleased to announce the stable release of Qubes OS 4.3.0! This minor release includes a host of new features, improvements, and bug fixes. The ISO and associated &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/verifying-signatures.html&quot;&gt;verification files&lt;/a&gt; are available on the &lt;a href=&quot;https://www.qubes-os.org/downloads/&quot;&gt;downloads&lt;/a&gt; page.&lt;/p&gt;

&lt;h2 id=&quot;whats-new-in-qubes-43&quot;&gt;What’s new in Qubes 4.3?&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;Dom0 upgraded to Fedora 41 (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/9402&quot;&gt;#9402&lt;/a&gt;).&lt;/li&gt;
  &lt;li&gt;Xen upgraded to version 4.19 (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/9420&quot;&gt;#9420&lt;/a&gt;).&lt;/li&gt;
  &lt;li&gt;Default Fedora template upgraded to Fedora 42 (older versions not supported).&lt;/li&gt;
  &lt;li&gt;Default Debian template upgraded to Debian 13 (versions older than 12 not supported).&lt;/li&gt;
  &lt;li&gt;Default Whonix templates upgraded to Whonix 18 (older versions not supported).&lt;/li&gt;
  &lt;li&gt;Preloaded disposables (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/1512&quot;&gt;#1512&lt;/a&gt;)&lt;/li&gt;
  &lt;li&gt;Device “self-identity oriented” assignment (a.k.a. New Devices API) (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/9325&quot;&gt;#9325&lt;/a&gt;)&lt;/li&gt;
  &lt;li&gt;Qubes Windows Tools reintroduced with improved features (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/1861&quot;&gt;#1861&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are just a few highlights from the many changes included in this release. For a more comprehensive list of changes, see the &lt;a href=&quot;https://doc.qubes-os.org/en/latest/developer/releases/4_3/release-notes.html&quot;&gt;Qubes OS 4.3 release notes&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;how-to-get-qubes-os-430&quot;&gt;How to get Qubes OS 4.3.0&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;If you’d like to install Qubes OS for the first time or perform a clean reinstallation on an existing system, there’s never been a better time to do so! Simply &lt;a href=&quot;https://www.qubes-os.org/downloads/&quot;&gt;download&lt;/a&gt; the Qubes 4.3.0 ISO and follow our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/installation-guide.html&quot;&gt;installation guide&lt;/a&gt;.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;If you’re currently using Qubes 4.2, learn &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/upgrade/4_3.html&quot;&gt;how to upgrade to Qubes 4.3&lt;/a&gt;.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;If you’re currently using a Qubes 4.3 release candidate (RC), &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/how-to-guides/how-to-update.html&quot;&gt;update normally&lt;/a&gt; (which includes &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/how-to-guides/how-to-update.html#upgrading-to-avoid-eol&quot;&gt;upgrading any EOL templates and standalones&lt;/a&gt; you might have) in order to make your system effectively equivalent to the stable Qubes 4.3.0 release. No reinstallation or other special action is required.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In all cases, we strongly recommend &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/how-to-guides/how-to-back-up-restore-and-migrate.html&quot;&gt;making a full backup&lt;/a&gt; beforehand.&lt;/p&gt;

&lt;h2 id=&quot;known-issues-in-qubes-os-430&quot;&gt;Known issues in Qubes OS 4.3.0&lt;/h2&gt;

&lt;p&gt;Templates restored in 4.3.0 from a pre-4.3 backup may continue to target their original Qubes OS release repos (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/8701&quot;&gt;#8701&lt;/a&gt;). After restoring such templates in 4.3.0, you must enter the following additional commands in a dom0 terminal:&lt;/p&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;sudo qubes-dom0-update -y qubes-dist-upgrade
sudo qubes-dist-upgrade --releasever=4.3 --template-standalone-upgrade -y
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;This will automatically choose the templates that need to be updated. The templates will be shut down during this process.&lt;/p&gt;

&lt;p&gt;Fresh templates on a clean 4.3.0 installation are not affected. Users who perform an in-place upgrade from 4.2 to 4.3 (instead of restoring templates from a backup) are also not affected, since the in-place upgrade process already includes the above fix in stage 4. For more information, see issue &lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/8701&quot;&gt;#8701&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue%20type%3ABug%20label%3Aaffects-4.3%20-label%3A%22R%3A%20cannot%20reproduce%22%20-label%3A%22R%3A%20declined%22%20-label%3A%22R%3A%20duplicate%22%20-label%3A%22R%3A%20not%20applicable%22%20-label%3A%22R%3A%20self-closed%22%20-label%3A%22R%3A%20upstream%20issue%22&quot;&gt;View the full list of known bugs affecting Qubes 4.3&lt;/a&gt; in our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/introduction/issue-tracking.html&quot;&gt;issue tracker&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;support-for-older-releases&quot;&gt;Support for older releases&lt;/h2&gt;

&lt;p&gt;In accordance with our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/supported-releases.html#qubes-os&quot;&gt;release support policy&lt;/a&gt;, Qubes 4.2 will remain supported for six months after the release of Qubes 4.3, until 2026-06-21. After that, Qubes 4.2 will no longer receive security updates or bug fixes.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.whonix.org/wiki/Qubes&quot;&gt;Whonix templates&lt;/a&gt; are created and supported by our partner, the &lt;a href=&quot;https://www.whonix.org/&quot;&gt;Whonix Project&lt;/a&gt;. The Whonix Project has set its own support policy for Whonix templates in Qubes. For more information, see the &lt;a href=&quot;https://www.whonix.org/wiki/About#Support_Schedule&quot;&gt;Whonix Support Schedule&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;thank-you-to-our-partners-donors-contributors-and-testers&quot;&gt;Thank you to our partners, donors, contributors, and testers!&lt;/h2&gt;

&lt;p&gt;This release would not be possible without generous support from our &lt;a href=&quot;https://www.qubes-os.org/partners/&quot;&gt;partners&lt;/a&gt; and &lt;a href=&quot;https://www.qubes-os.org/donate/&quot;&gt;donors&lt;/a&gt;, as well as &lt;a href=&quot;https://doc.qubes-os.org/en/latest/introduction/contributing.html&quot;&gt;contributions&lt;/a&gt; from our active community members, especially &lt;a href=&quot;https://doc.qubes-os.org/en/latest/introduction/issue-tracking.html&quot;&gt;bug reports&lt;/a&gt; from our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/testing.html&quot;&gt;testers&lt;/a&gt;. We are eternally grateful to our excellent community for making the Qubes OS Project a great example of open-source collaboration.&lt;/p&gt;
</description>
        <pubDate>Sun, 21 Dec 2025 00:00:00 +0000</pubDate>
        <link>https://www.qubes-os.org/news/2025/12/21/qubes-os-4-3-0-has-been-released/</link>
        <guid isPermaLink="true">https://www.qubes-os.org/news/2025/12/21/qubes-os-4-3-0-has-been-released/</guid>
        
        
        <category>releases</category>
        
      </item>
    
      <item>
        <title>Qubes Canary 045</title>
        <description>&lt;p&gt;We have published &lt;a href=&quot;https://github.com/QubesOS/qubes-secpack/blob/0f5dca5cdda47470258bac82e204df971d5fdd9d/canaries/canary-045-2025.txt&quot;&gt;Qubes Canary 045&lt;/a&gt;. The text of this canary and its accompanying cryptographic signatures are reproduced below. For an explanation of this announcement and instructions for authenticating this canary, please see the end of this announcement.&lt;/p&gt;

&lt;h2 id=&quot;qubes-canary-045&quot;&gt;Qubes Canary 045&lt;/h2&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;
                    ---===[ Qubes Canary 045 ]===---


Statements
-----------

The Qubes security team members who have digitally signed this file [1]
state the following:

1. The date of issue of this canary is December 10, 2025.

2. There have been 109 Qubes security bulletins published so far.

3. The Qubes Master Signing Key fingerprint is:

       427F 11FD 0FAA 4B08 0123  F01C DDFA 1A3E 3687 9494

4. No warrants have ever been served to us with regard to the Qubes OS
   Project (e.g. to hand out the private signing keys or to introduce
   backdoors).

5. We plan to publish the next of these canary statements in the first
   fourteen days of March 2026. Special note should be taken if no new
   canary is published by that time or if the list of statements changes
   without plausible explanation.


Special announcements
----------------------

None.


Disclaimers and notes
----------------------

We would like to remind you that Qubes OS has been designed under the
assumption that all relevant infrastructure is permanently compromised.
This means that we assume NO trust in any of the servers or services
which host or provide any Qubes-related data, in particular, software
updates, source code repositories, and Qubes ISO downloads.

This canary scheme is not infallible. Although signing the declaration
makes it very difficult for a third party to produce arbitrary
declarations, it does not prevent them from using force or other means,
like blackmail or compromising the signers&apos; laptops, to coerce us to
produce false declarations.

The proof of freshness provided below serves to demonstrate that this
canary could not have been created prior to the date stated. It shows
that a series of canaries was not created in advance.

This declaration is merely a best effort and is provided without any
guarantee or warranty. It is not legally binding in any way to anybody.
None of the signers should be ever held legally responsible for any of
the statements made here.


Proof of freshness
-------------------

Wed, 10 Dec 2025 01:14:56 +0000

Source: DER SPIEGEL - International (https://www.spiegel.de/international/index.rss)
Confidential Conference on Ukraine Peace: &quot;We Must Not Leave Ukraine and Volodymyr Alone with These Guys&quot;
Project 2025 Author: &quot;We Won&apos;t Let Anyone Stop US from Using Our Oil and Gas&quot;
Remnants of the War: Syrians from Germany Helping with Reconstruction - But Remain Wary of Moving Back
Germany&apos;s Queen Mum: Nostalgia for the Merkel Era Alive and Well
Director Nadav Lapid on Israel after Gaza: It Was Our Duty to Scream

Source: NYT &amp;gt; World News (https://rss.nytimes.com/services/xml/rss/nyt/World.xml)
Hundreds of Thousands of Thais and Cambodians Flee
Canada’s Northwest Territories Diamond Mines Are Closing
Another Front in the War in Ukraine: Who Gets to Claim a Famed Artist?
With Cheap Tickets and Lax Etiquette, a Theater Builds an Older Fan Base
Between Pakistan and Afghanistan, a Trade War With No End in Sight

Source: BBC News (https://feeds.bbci.co.uk/news/world/rss.xml)
Trump criticises &apos;decaying&apos; European countries and &apos;weak&apos; leaders
Nobel officials unsure when Peace Prize winner will arrive for ceremony
Congress ups pressure to release boat strike video with threat to Hegseth&apos;s travel budget
French feminists outraged by Brigitte Macron&apos;s comment about activists
&apos;What&apos;s your name?&apos; - Moment police confront Luigi Mangione at McDonald&apos;s

Source: Blockchain.info
0000000000000000000028650dc7d328ea9c1b7e2b5376ce14089586c8ca3041


Footnotes
----------

[1] This file should be signed in two ways: (1) via detached PGP
signatures by each of the signers, distributed together with this canary
in the qubes-secpack.git repo, and (2) via digital signatures on the
corresponding qubes-secpack.git repo tags. [2]

[2] Don&apos;t just trust the contents of this file blindly! Verify the
digital signatures! Instructions for doing so are documented here:
https://www.qubes-os.org/security/pack/

--
The Qubes Security Team
https://www.qubes-os.org/security/

&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Source: &lt;a href=&quot;https://github.com/QubesOS/qubes-secpack/blob/0f5dca5cdda47470258bac82e204df971d5fdd9d/canaries/canary-045-2025.txt&quot;&gt;canary-045-2025.txt&lt;/a&gt;&lt;/p&gt;

&lt;h2 id=&quot;marek-marczykowski-góreckis-pgp-signature&quot;&gt;&lt;a href=&quot;https://www.qubes-os.org/team/#marek-marczykowski-górecki&quot;&gt;Marek Marczykowski-Górecki&lt;/a&gt;’s PGP signature&lt;/h2&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;-----BEGIN PGP SIGNATURE-----
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=JXd7
-----END PGP SIGNATURE-----
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Source: &lt;a href=&quot;https://github.com/QubesOS/qubes-secpack/blob/0f5dca5cdda47470258bac82e204df971d5fdd9d/canaries/canary-045-2025.txt.sig.marmarek&quot;&gt;canary-045-2025.txt.sig.marmarek&lt;/a&gt;&lt;/p&gt;

&lt;h2 id=&quot;simon-gaiser-aka-hw42s-pgp-signature&quot;&gt;&lt;a href=&quot;https://www.qubes-os.org/team/#simon-gaiser-aka-hw42&quot;&gt;Simon Gaiser (aka HW42)&lt;/a&gt;’s PGP signature&lt;/h2&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;-----BEGIN PGP SIGNATURE-----
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=a3wa
-----END PGP SIGNATURE-----
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Source: &lt;a href=&quot;https://github.com/QubesOS/qubes-secpack/blob/0f5dca5cdda47470258bac82e204df971d5fdd9d/canaries/canary-045-2025.txt.sig.simon&quot;&gt;canary-045-2025.txt.sig.simon&lt;/a&gt;&lt;/p&gt;

&lt;h2 id=&quot;what-is-the-purpose-of-this-announcement&quot;&gt;What is the purpose of this announcement?&lt;/h2&gt;

&lt;p&gt;The purpose of this announcement is to inform the Qubes community that a new Qubes canary has been published.&lt;/p&gt;

&lt;h2 id=&quot;what-is-a-qubes-canary&quot;&gt;What is a Qubes canary?&lt;/h2&gt;

&lt;p&gt;A &lt;a href=&quot;https://www.qubes-os.org/security/canary/&quot;&gt;Qubes canary&lt;/a&gt; is a security announcement periodically issued by the &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/security.html#qubes-security-team&quot;&gt;Qubes security team&lt;/a&gt; consisting of several statements to the effect that the signers of the canary have not been compromised. The idea is that, as long as signed canaries including such statements continue to be published, all is well. However, if the canaries should suddenly cease, if one or more signers begin declining to sign them, or if the included statements change significantly without plausible explanation, then this may indicate that something has gone wrong.&lt;/p&gt;

&lt;p&gt;The name originates from the practice in which miners would bring caged canaries into coal mines. If the level of methane gas in the mine reached a dangerous level, the canary would die, indicating to miners that they should evacuate. (See the &lt;a href=&quot;https://en.wikipedia.org/wiki/Warrant_canary&quot;&gt;Wikipedia article on warrant canaries&lt;/a&gt; for more information, but bear in mind that Qubes Canaries are not strictly limited to legal warrants.)&lt;/p&gt;

&lt;h2 id=&quot;why-should-i-care-about-canaries&quot;&gt;Why should I care about canaries?&lt;/h2&gt;

&lt;p&gt;Canaries provide an important indication about the security status of the project. If the canary is healthy, it’s a strong sign that things are running normally. However, if the canary is unhealthy, it could mean that the project or its members are being coerced in some way.&lt;/p&gt;

&lt;h2 id=&quot;what-are-some-signs-of-an-unhealthy-canary&quot;&gt;What are some signs of an unhealthy canary?&lt;/h2&gt;

&lt;p&gt;Here is a non-exhaustive list of examples:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Dead canary.&lt;/strong&gt; In each canary, we state a window of time during which you should expect the next canary to be published. If no canary is published within that window of time and no good explanation is provided for missing the deadline, then the canary has died.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Missing statement(s).&lt;/strong&gt; Canaries include a set of numbered statements at the top. These statements are generally the same across canaries, except for specific numbers and dates that have changed since the previous canary. If an important statement was present in older canaries but suddenly goes missing from new canaries with no correction or explanation, then this may be an indication that the signers can no longer truthfully make that statement.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Missing signature(s).&lt;/strong&gt; Qubes canaries are signed by the members of the &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/security.html#qubes-security-team&quot;&gt;Qubes security team&lt;/a&gt; (see below). If one of them has been signing all canaries but suddenly and permanently stops signing new canaries without any explanation, then this may indicate that this person is under duress or can no longer truthfully sign the statements contained in the canary.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;does-every-unexpected-or-unusual-occurrence-related-to-a-canary-indicate-something-bad&quot;&gt;Does every unexpected or unusual occurrence related to a canary indicate something bad?&lt;/h2&gt;

&lt;p&gt;No, there are many canary-related possibilities that should &lt;em&gt;not&lt;/em&gt; worry you. Here is a non-exhaustive list of examples:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Unusual reposts.&lt;/strong&gt; The only canaries that matter are the ones that are validly signed in the &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/security-pack.html&quot;&gt;Qubes security pack (qubes-secpack)&lt;/a&gt;. Reposts of canaries (like the one in this announcement) do not have any authority (except insofar as they reproduce validly-signed text from the qubes-secpack). If the actual canary in the qubes-secpack is healthy, but reposts are late, absent, or modified on the website, mailing lists, forum, or social media platforms, you should not be concerned about the canary.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Last-minute signature(s).&lt;/strong&gt; If the canary is signed at the last minute but before the deadline, that’s okay. (People get busy and procrastinate sometimes.)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Signatures at different times.&lt;/strong&gt; If one signature is earlier or later than the other, but both are present within a reasonable period of time, that’s okay. (For example, sometimes one signer is out of town, but we try to plan the deadlines around this.)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Permitted changes.&lt;/strong&gt; If something about a canary changes without violating any of the statements in prior canaries, that’s okay. (For example, canaries are usually scheduled for the first fourteen days of a given month, but there’s no rule that says they have to be.)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Unusual but planned changes.&lt;/strong&gt; If something unusual happens, but it was announced in advance, and the appropriate statements are signed, that’s okay (e.g., when Joanna left the security team and Simon joined it).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In general, it would not be realistic for an organization to exist that never changed, had zero turnover, and never made mistakes. Therefore, it would be reasonable to expect such events to occur periodically, and it would be unreasonable to regard &lt;em&gt;every&lt;/em&gt; unusual or unexpected canary-related event as a sign of compromise. For example, if something usual happens with a canary, and we say it was a mistake and correct it (with valid signatures), you will have to decide for yourself whether it’s more likely that it really was just a mistake or that something is wrong and that this is how we chose to send you a subtle signal about it. This will require you to think carefully about which among many possible scenarios is most likely given the evidence available to you. Since this is fundamentally a matter of judgment, canaries are ultimately a &lt;em&gt;social&lt;/em&gt; scheme, not a technical one.&lt;/p&gt;

&lt;h2 id=&quot;what-are-the-pgp-signatures-that-accompany-canaries&quot;&gt;What are the PGP signatures that accompany canaries?&lt;/h2&gt;

&lt;p&gt;A &lt;a href=&quot;https://en.wikipedia.org/wiki/Pretty_Good_Privacy&quot;&gt;PGP&lt;/a&gt; signature is a cryptographic &lt;a href=&quot;https://en.wikipedia.org/wiki/Digital_signature&quot;&gt;digital signature&lt;/a&gt; made in accordance with the &lt;a href=&quot;https://en.wikipedia.org/wiki/Pretty_Good_Privacy#OpenPGP&quot;&gt;OpenPGP&lt;/a&gt; standard. PGP signatures can be cryptographically verified with programs like &lt;a href=&quot;https://en.wikipedia.org/wiki/GNU_Privacy_Guard&quot;&gt;GNU Privacy Guard (GPG)&lt;/a&gt;. The Qubes security team cryptographically signs all canaries so that Qubes users have a reliable way to check whether canaries are genuine. The only way to be certain that a canary is authentic is by verifying its PGP signatures.&lt;/p&gt;

&lt;h2 id=&quot;why-should-i-care-whether-a-canary-is-authentic&quot;&gt;Why should I care whether a canary is authentic?&lt;/h2&gt;

&lt;p&gt;If you fail to notice that a canary is unhealthy or has died, you may continue to trust the Qubes security team even after they have signaled via the canary (or lack thereof) that they been compromised or coerced.&lt;/p&gt;

&lt;p&gt;Alternatively, an adversary could fabricate a canary in an attempt to deceive the public. Such a canary would not be validly signed, but users who neglect to check the signatures on the fake canary would not be aware of this, so they may mistakenly believe it to be genuine, especially if it closely mimics the language of authentic canaries. Such falsified canaries could include manipulated text designed to sow fear, uncertainty, and doubt about the security of Qubes OS or the status of the Qubes OS Project.&lt;/p&gt;

&lt;h2 id=&quot;how-do-i-verify-the-pgp-signatures-on-a-canary&quot;&gt;How do I verify the PGP signatures on a canary?&lt;/h2&gt;

&lt;p&gt;The following command-line instructions assume a Linux system with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;git&lt;/code&gt; and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gpg&lt;/code&gt; installed. (For Windows and Mac options, see &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/verifying-signatures.html#openpgp-software&quot;&gt;OpenPGP software&lt;/a&gt;.)&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;Obtain the Qubes Master Signing Key (QMSK), e.g.:&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--fetch-keys&lt;/span&gt; https://keys.qubes-os.org/keys/qubes-master-signing-key.asc
&lt;span class=&quot;go&quot;&gt;gpg: directory &apos;/home/user/.gnupg&apos; created
gpg: keybox &apos;/home/user/.gnupg/pubring.kbx&apos; created
gpg: requesting key from &apos;https://keys.qubes-os.org/keys/qubes-master-signing-key.asc&apos;
gpg: /home/user/.gnupg/trustdb.gpg: trustdb created
gpg: key DDFA1A3E36879494: public key &quot;Qubes Master Signing Key&quot; imported
gpg: Total number processed: 1
gpg:               imported: 1
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;

    &lt;p&gt;(For more ways to obtain the QMSK, see &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/verifying-signatures.html#how-to-import-and-authenticate-the-qubes-master-signing-key&quot;&gt;How to import and authenticate the Qubes Master Signing Key&lt;/a&gt;.)&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;View the fingerprint of the PGP key you just imported. (Note: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gpg&amp;gt;&lt;/code&gt; indicates a prompt inside of the GnuPG program. Type what appears after it when prompted.)&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--edit-key&lt;/span&gt; 0x427F11FD0FAA4B080123F01CDDFA1A3E36879494
&lt;span class=&quot;gp&quot;&gt;gpg (GnuPG) 2.2.27;&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;Copyright &lt;span class=&quot;o&quot;&gt;(&lt;/span&gt;C&lt;span class=&quot;o&quot;&gt;)&lt;/span&gt; 2021 Free Software Foundation, Inc.
&lt;span class=&quot;go&quot;&gt;This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
   
   
pub  rsa4096/DDFA1A3E36879494
     created: 2010-04-01  expires: never       usage: SC
     trust: unknown       validity: unknown
[ unknown] (1). Qubes Master Signing Key
   
&lt;/span&gt;&lt;span class=&quot;gp&quot;&gt;gpg&amp;gt;&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;fpr
&lt;span class=&quot;go&quot;&gt;pub   rsa4096/DDFA1A3E36879494 2010-04-01 Qubes Master Signing Key
 Primary key fingerprint: 427F 11FD 0FAA 4B08 0123  F01C DDFA 1A3E 3687 9494
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Important:&lt;/strong&gt; At this point, you still don’t know whether the key you just imported is the genuine QMSK or a forgery. In order for this entire procedure to provide meaningful security benefits, you &lt;em&gt;must&lt;/em&gt; authenticate the QMSK out-of-band. &lt;strong&gt;Do not skip this step!&lt;/strong&gt; The standard method is to obtain the QMSK fingerprint from &lt;em&gt;multiple independent sources in several different ways&lt;/em&gt; and check to see whether they match the key you just imported. For more information, see &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/verifying-signatures.html#how-to-import-and-authenticate-the-qubes-master-signing-key&quot;&gt;How to import and authenticate the Qubes Master Signing Key&lt;/a&gt;.&lt;/p&gt;

    &lt;p&gt;&lt;strong&gt;Tip:&lt;/strong&gt; After you have authenticated the QMSK out-of-band to your satisfaction, record the QMSK fingerprint in a safe place (or several) so that you don’t have to repeat this step in the future.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Once you are satisfied that you have the genuine QMSK, set its trust level to 5 (“ultimate”), then quit GnuPG with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;q&lt;/code&gt;.&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;gpg&amp;gt;&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;trust
&lt;span class=&quot;go&quot;&gt;pub  rsa4096/DDFA1A3E36879494
     created: 2010-04-01  expires: never       usage: SC
     trust: unknown       validity: unknown
[ unknown] (1). Qubes Master Signing Key
   
Please decide how far you trust this user to correctly verify other users&apos; keys
(by looking at passports, checking fingerprints from different sources, etc.)
   
  1 = I don&apos;t know or won&apos;t say
  2 = I do NOT trust
  3 = I trust marginally
  4 = I trust fully
  5 = I trust ultimately
  m = back to the main menu
   
Your decision? 5
Do you really want to set this key to ultimate trust? (y/N) y
   
pub  rsa4096/DDFA1A3E36879494
     created: 2010-04-01  expires: never       usage: SC
     trust: ultimate      validity: unknown
[ unknown] (1). Qubes Master Signing Key
Please note that the shown key validity is not necessarily correct
unless you restart the program.
   
&lt;/span&gt;&lt;span class=&quot;gp&quot;&gt;gpg&amp;gt;&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;q
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Use Git to clone the qubes-secpack repo.&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;git clone https://github.com/QubesOS/qubes-secpack.git
&lt;span class=&quot;go&quot;&gt;Cloning into &apos;qubes-secpack&apos;...
remote: Enumerating objects: 4065, done.
remote: Counting objects: 100% (1474/1474), done.
remote: Compressing objects: 100% (742/742), done.
remote: Total 4065 (delta 743), reused 1413 (delta 731), pack-reused 2591
Receiving objects: 100% (4065/4065), 1.64 MiB | 2.53 MiB/s, done.
Resolving deltas: 100% (1910/1910), done.
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Import the included PGP keys. (See our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/project-security/security-pack.html#pgp-key-policies&quot;&gt;PGP key policies&lt;/a&gt; for important information about these keys.)&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--import&lt;/span&gt; qubes-secpack/keys/&lt;span class=&quot;k&quot;&gt;*&lt;/span&gt;/&lt;span class=&quot;k&quot;&gt;*&lt;/span&gt;
&lt;span class=&quot;go&quot;&gt;gpg: key 063938BA42CFA724: public key &quot;Marek Marczykowski-Górecki (Qubes OS signing key)&quot; imported
gpg: qubes-secpack/keys/core-devs/retired: read error: Is a directory
gpg: no valid OpenPGP data found.
gpg: key 8C05216CE09C093C: 1 signature not checked due to a missing key
gpg: key 8C05216CE09C093C: public key &quot;HW42 (Qubes Signing Key)&quot; imported
gpg: key DA0434BC706E1FCF: public key &quot;Simon Gaiser (Qubes OS signing key)&quot; imported
gpg: key 8CE137352A019A17: 2 signatures not checked due to missing keys
gpg: key 8CE137352A019A17: public key &quot;Andrew David Wong (Qubes Documentation Signing Key)&quot; imported
gpg: key AAA743B42FBC07A9: public key &quot;Brennan Novak (Qubes Website &amp;amp; Documentation Signing)&quot; imported
gpg: key B6A0BB95CA74A5C3: public key &quot;Joanna Rutkowska (Qubes Documentation Signing Key)&quot; imported
gpg: key F32894BE9684938A: public key &quot;Marek Marczykowski-Górecki (Qubes Documentation Signing Key)&quot; imported
gpg: key 6E7A27B909DAFB92: public key &quot;Hakisho Nukama (Qubes Documentation Signing Key)&quot; imported
gpg: key 485C7504F27D0A72: 1 signature not checked due to a missing key
gpg: key 485C7504F27D0A72: public key &quot;Sven Semmler (Qubes Documentation Signing Key)&quot; imported
gpg: key BB52274595B71262: public key &quot;unman (Qubes Documentation Signing Key)&quot; imported
gpg: key DC2F3678D272F2A8: 1 signature not checked due to a missing key
gpg: key DC2F3678D272F2A8: public key &quot;Wojtek Porczyk (Qubes OS documentation signing key)&quot; imported
gpg: key FD64F4F9E9720C4D: 1 signature not checked due to a missing key
gpg: key FD64F4F9E9720C4D: public key &quot;Zrubi (Qubes Documentation Signing Key)&quot; imported
gpg: key DDFA1A3E36879494: &quot;Qubes Master Signing Key&quot; not changed
gpg: key 1848792F9E2795E9: public key &quot;Qubes OS Release 4 Signing Key&quot; imported
gpg: qubes-secpack/keys/release-keys/retired: read error: Is a directory
gpg: no valid OpenPGP data found.
gpg: key D655A4F21830E06A: public key &quot;Marek Marczykowski-Górecki (Qubes security pack)&quot; imported
gpg: key ACC2602F3F48CB21: public key &quot;Qubes OS Security Team&quot; imported
gpg: qubes-secpack/keys/security-team/retired: read error: Is a directory
gpg: no valid OpenPGP data found.
gpg: key 4AC18DE1112E1490: public key &quot;Simon Gaiser (Qubes Security Pack signing key)&quot; imported
gpg: Total number processed: 17
gpg:               imported: 16
gpg:              unchanged: 1
gpg: marginals needed: 3  completes needed: 1  trust model: pgp
gpg: depth: 0  valid:   1  signed:   6  trust: 0-, 0q, 0n, 0m, 0f, 1u
gpg: depth: 1  valid:   6  signed:   0  trust: 6-, 0q, 0n, 0m, 0f, 0u
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Verify signed Git tags.&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;nb&quot;&gt;cd &lt;/span&gt;qubes-secpack/
&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;git tag &lt;span class=&quot;nt&quot;&gt;-v&lt;/span&gt; &lt;span class=&quot;sb&quot;&gt;`&lt;/span&gt;git describe&lt;span class=&quot;sb&quot;&gt;`&lt;/span&gt;
&lt;span class=&quot;go&quot;&gt;object 266e14a6fae57c9a91362c9ac784d3a891f4d351
type commit
tag marmarek_sec_266e14a6
tagger Marek Marczykowski-Górecki 1677757924 +0100
   
Tag for commit 266e14a6fae57c9a91362c9ac784d3a891f4d351
gpg: Signature made Thu 02 Mar 2023 03:52:04 AM PST
gpg:                using RSA key 2D1771FE4D767EDC76B089FAD655A4F21830E06A
gpg: Good signature from &quot;Marek Marczykowski-Górecki (Qubes security pack)&quot; [full]
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;

    &lt;p&gt;The exact output will differ, but the final line should always start with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gpg: Good signature from...&lt;/code&gt; followed by an appropriate key. The &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;[full]&lt;/code&gt; indicates full trust, which this key inherits in virtue of being validly signed by the QMSK.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;Verify PGP signatures, e.g.:&lt;/p&gt;

    &lt;div class=&quot;language-shell_session highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;nb&quot;&gt;cd &lt;/span&gt;QSBs/
&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--verify&lt;/span&gt; qsb-087-2022.txt.sig.marmarek qsb-087-2022.txt
&lt;span class=&quot;go&quot;&gt;gpg: Signature made Wed 23 Nov 2022 04:05:51 AM PST
gpg:                using RSA key 2D1771FE4D767EDC76B089FAD655A4F21830E06A
gpg: Good signature from &quot;Marek Marczykowski-Górecki (Qubes security pack)&quot; [full]
&lt;/span&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--verify&lt;/span&gt; qsb-087-2022.txt.sig.simon qsb-087-2022.txt
&lt;span class=&quot;go&quot;&gt;gpg: Signature made Wed 23 Nov 2022 03:50:42 AM PST
gpg:                using RSA key EA18E7F040C41DDAEFE9AA0F4AC18DE1112E1490
gpg: Good signature from &quot;Simon Gaiser (Qubes Security Pack signing key)&quot; [full]
&lt;/span&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;nb&quot;&gt;cd&lt;/span&gt; ../canaries/
&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--verify&lt;/span&gt; canary-034-2023.txt.sig.marmarek canary-034-2023.txt
&lt;span class=&quot;go&quot;&gt;gpg: Signature made Thu 02 Mar 2023 03:51:48 AM PST
gpg:                using RSA key 2D1771FE4D767EDC76B089FAD655A4F21830E06A
gpg: Good signature from &quot;Marek Marczykowski-Górecki (Qubes security pack)&quot; [full]
&lt;/span&gt;&lt;span class=&quot;gp&quot;&gt;$&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;gpg &lt;span class=&quot;nt&quot;&gt;--verify&lt;/span&gt; canary-034-2023.txt.sig.simon canary-034-2023.txt
&lt;span class=&quot;go&quot;&gt;gpg: Signature made Thu 02 Mar 2023 01:47:52 AM PST
gpg:                using RSA key EA18E7F040C41DDAEFE9AA0F4AC18DE1112E1490
gpg: Good signature from &quot;Simon Gaiser (Qubes Security Pack signing key)&quot; [full]
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;    &lt;/div&gt;

    &lt;p&gt;Again, the exact output will differ, but the final line of output from each &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gpg --verify&lt;/code&gt; command should always start with &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;gpg: Good signature from...&lt;/code&gt; followed by an appropriate key.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For this announcement (Qubes Canary 045), the commands are:&lt;/p&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;$ gpg --verify canary-045-2025.txt.sig.marmarek canary-045-2025.txt
$ gpg --verify canary-045-2025.txt.sig.simon canary-045-2025.txt
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;You can also verify the signatures directly from this announcement in addition to or instead of verifying the files from the qubes-secpack. Simply copy and paste the Qubes Canary 045 text into a plain text file and do the same for both signature files. Then, perform the same authentication steps as listed above, substituting the filenames above with the names of the files you just created.&lt;/p&gt;
</description>
        <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate>
        <link>https://www.qubes-os.org/news/2025/12/10/canary-045/</link>
        <guid isPermaLink="true">https://www.qubes-os.org/news/2025/12/10/canary-045/</guid>
        
        
        <category>security</category>
        
      </item>
    
      <item>
        <title>Qubes OS 4.3.0-rc4 is available for testing</title>
        <description>&lt;p&gt;We’re pleased to announce that the fourth release candidate (RC) for Qubes OS 4.3.0 is now available for testing. This minor release includes many new features and improvements over Qubes OS 4.2.&lt;/p&gt;

&lt;h2 id=&quot;whats-new-in-qubes-43&quot;&gt;What’s new in Qubes 4.3?&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;Dom0 upgraded to Fedora 41 (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/9402&quot;&gt;#9402&lt;/a&gt;).&lt;/li&gt;
  &lt;li&gt;Xen upgraded to version 4.19 (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/9420&quot;&gt;#9420&lt;/a&gt;).&lt;/li&gt;
  &lt;li&gt;Default Fedora template upgraded to Fedora 42 (older versions not supported).&lt;/li&gt;
  &lt;li&gt;Default Debian template upgraded to Debian 13 (versions older than 12 not supported).&lt;/li&gt;
  &lt;li&gt;Default Whonix templates upgraded to Whonix 18 (upgraded from 17.4.3 in RC2; versions older than 18 no longer supported).&lt;/li&gt;
  &lt;li&gt;Preloaded disposables (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/1512&quot;&gt;#1512&lt;/a&gt;)&lt;/li&gt;
  &lt;li&gt;Device “self-identity oriented” assignment (a.k.a. New Devices API) (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/9325&quot;&gt;#9325&lt;/a&gt;)&lt;/li&gt;
  &lt;li&gt;Qubes Windows Tools reintroduced with improved features (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/1861&quot;&gt;#1861&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are just a few highlights from the many changes included in this release. For a more comprehensive list of changes, see the &lt;a href=&quot;https://doc.qubes-os.org/en/latest/developer/releases/4_3/release-notes.html&quot;&gt;Qubes OS 4.3 release notes&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;when-is-the-stable-release&quot;&gt;When is the stable release?&lt;/h2&gt;

&lt;p&gt;That depends on the number of bugs discovered in this RC and their severity. As explained in our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/developer/releases/version-scheme.html#release-schedule&quot;&gt;release schedule&lt;/a&gt; documentation, our usual process after issuing a new RC is to collect bug reports, triage the bugs, and fix them. If warranted, we then issue a new RC that includes the fixes and repeat the process. We continue this iterative procedure until we’re left with an RC that’s good enough to be declared the stable release. No one can predict, at the outset, how many iterations will be required (and hence how many RCs will be needed before a stable release), but we tend to get a clearer picture of this as testing progresses.&lt;/p&gt;

&lt;p&gt;Barring any surprises uncovered by testing, we expect this fourth RC to be the final one, which means that we hope to declare this RC to be the stable 4.3.0 release at the conclusion of its testing period.&lt;/p&gt;

&lt;h2 id=&quot;how-to-test-qubes-430-rc4&quot;&gt;How to test Qubes 4.3.0-rc4&lt;/h2&gt;

&lt;p&gt;Thanks to those who tested earlier 4.3 RCs and &lt;a href=&quot;https://doc.qubes-os.org/en/latest/introduction/issue-tracking.html&quot;&gt;reported bugs they encountered&lt;/a&gt;, 4.3.0-rc4 now includes fixes for several bugs that were present in those prior RCs!&lt;/p&gt;

&lt;p&gt;If you’d like to help us &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/testing.html&quot;&gt;test&lt;/a&gt; this RC, you can &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/upgrade/4_3.html&quot;&gt;upgrade to Qubes 4.3.0-rc4&lt;/a&gt; with either a clean installation or an in-place upgrade from Qubes 4.2. (Note for in-place upgrade testers: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;qubes-dist-upgrade&lt;/code&gt; now requires &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;--releasever=4.3&lt;/code&gt; and may require &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;--enable-current-testing&lt;/code&gt; for testing releases like this RC.) As always, we strongly recommend &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/how-to-guides/how-to-back-up-restore-and-migrate.html&quot;&gt;making a full backup&lt;/a&gt; beforehand and &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/how-to-guides/how-to-update.html&quot;&gt;updating Qubes OS&lt;/a&gt; immediately afterward in order to apply all available bug fixes.&lt;/p&gt;

&lt;p&gt;If you’re currently using an earlier 4.3 RC and wish to update to 4.3.0-rc4, please &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/how-to-guides/how-to-update.html&quot;&gt;update normally&lt;/a&gt; with &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/testing.html#updates&quot;&gt;&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;current-testing&lt;/code&gt; enabled&lt;/a&gt;. If you use Whonix, please also &lt;a href=&quot;https://www.whonix.org/wiki/Release_Upgrade_17_to_18&quot;&gt;upgrade from Whonix 17 to 18&lt;/a&gt;, if you have not already done so.&lt;/p&gt;

&lt;p&gt;Please help us improve the eventual stable release by &lt;a href=&quot;https://doc.qubes-os.org/en/latest/introduction/issue-tracking.html&quot;&gt;reporting any bugs you encounter&lt;/a&gt;. If you’re an experienced user, we encourage you to &lt;a href=&quot;https://forum.qubes-os.org/t/joining-the-testing-team/5190&quot;&gt;join the testing team&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;known-issues-in-qubes-os-430-rc4&quot;&gt;Known issues in Qubes OS 4.3.0-rc4&lt;/h2&gt;

&lt;p&gt;It is possible that templates restored in 4.3.0-rc4 from a pre-4.3 backup may continue to target their original Qubes OS release repos. This does not affect fresh templates on a clean 4.3.0-rc4 installation. For more information, see issue &lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/8701&quot;&gt;#8701&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue%20type%3ABug%20label%3Aaffects-4.3%20-label%3A%22R%3A%20cannot%20reproduce%22%20-label%3A%22R%3A%20declined%22%20-label%3A%22R%3A%20duplicate%22%20-label%3A%22R%3A%20not%20applicable%22%20-label%3A%22R%3A%20self-closed%22%20-label%3A%22R%3A%20upstream%20issue%22&quot;&gt;View the full list of known bugs affecting Qubes 4.3&lt;/a&gt; in our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/introduction/issue-tracking.html&quot;&gt;issue tracker&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;whats-a-release-candidate&quot;&gt;What’s a release candidate?&lt;/h2&gt;

&lt;p&gt;A release candidate (RC) is a software build that has the potential to become a stable release, unless significant bugs are discovered in testing. RCs are intended for more advanced (or adventurous!) users who are comfortable testing early versions of software that are potentially buggier than stable releases. You can read more about Qubes OS &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/supported-releases.html&quot;&gt;supported releases&lt;/a&gt; and the &lt;a href=&quot;https://doc.qubes-os.org/en/latest/developer/releases/version-scheme.html&quot;&gt;version scheme&lt;/a&gt; in our documentation.&lt;/p&gt;

&lt;h2 id=&quot;whats-a-minor-release&quot;&gt;What’s a minor release?&lt;/h2&gt;

&lt;p&gt;The Qubes OS Project uses the &lt;a href=&quot;https://semver.org/&quot;&gt;semantic versioning&lt;/a&gt; standard. Version numbers are written as &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;[major].[minor].[patch]&lt;/code&gt;. Hence, releases that increment the second value are known as “minor releases.” Minor releases generally include new features, improvements, and bug fixes that are backward-compatible with earlier versions of the same major release. See our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/supported-releases.html&quot;&gt;supported releases&lt;/a&gt; for a comprehensive list of major and minor releases and our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/developer/releases/version-scheme.html&quot;&gt;version scheme&lt;/a&gt; documentation for more information about how Qubes OS releases are versioned.&lt;/p&gt;
</description>
        <pubDate>Sat, 06 Dec 2025 00:00:00 +0000</pubDate>
        <link>https://www.qubes-os.org/news/2025/12/06/qubes-os-4-3-0-rc4-available-for-testing/</link>
        <guid isPermaLink="true">https://www.qubes-os.org/news/2025/12/06/qubes-os-4-3-0-rc4-available-for-testing/</guid>
        
        
        <category>releases</category>
        
      </item>
    
      <item>
        <title>The Qubes OS Project will be at FOSDEM 2026!</title>
        <description>&lt;p&gt;The Qubes OS Project &lt;a href=&quot;https://fosdem.org/2026/news/2025-11-16-accepted-stands/&quot;&gt;will have a stand&lt;/a&gt; at &lt;a href=&quot;https://fosdem.org/2026/&quot;&gt;FOSDEM 2026&lt;/a&gt;, which will take place in Brussels, Belgium on January 31 and February 1, 2026. FOSDEM is a top annual meeting for free and open source software developers. Entry is free, and no registration is required. If you attend, stop by and say hello!&lt;/p&gt;
</description>
        <pubDate>Sun, 16 Nov 2025 00:00:00 +0000</pubDate>
        <link>https://www.qubes-os.org/news/2025/11/16/qubes-at-fosdem-2026/</link>
        <guid isPermaLink="true">https://www.qubes-os.org/news/2025/11/16/qubes-at-fosdem-2026/</guid>
        
        
        <category>announcements</category>
        
      </item>
    
      <item>
        <title>Fedora 41 approaching end of life</title>
        <description>&lt;p&gt;Fedora 41 is currently &lt;a href=&quot;https://fedorapeople.org/groups/schedule/f-41/f-41-key-tasks.html&quot;&gt;scheduled&lt;/a&gt; to reach &lt;a href=&quot;https://fedoraproject.org/wiki/End_of_life&quot;&gt;end of life (EOL)&lt;/a&gt; on 2025-11-19 (approximately two weeks from the date of this announcement). Please upgrade all of your Fedora templates and standalones by that date. For more information, see &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/how-to-guides/how-to-update.html#upgrading-to-avoid-eol&quot;&gt;Upgrading to avoid EOL&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;There are two ways to upgrade a template to a new Fedora release:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Recommended:&lt;/strong&gt; &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/fedora/fedora.html#installing&quot;&gt;Install a new template to replace an existing one.&lt;/a&gt; This option is simpler for less experienced users, but it won’t preserve any modifications you’ve made to your template. After you install the new template, you’ll have to redo your desired template modifications (if any) and &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/templates.html#switching&quot;&gt;switch everything that was set to the old template to the new template&lt;/a&gt;. If you choose to modify your template, you may wish to write those modifications down so that you remember what to redo on each fresh install. To see a log of package manager actions, open a terminal in the old Fedora template and use the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;dnf history&lt;/code&gt; command.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Advanced:&lt;/strong&gt; &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/fedora/fedora-upgrade.html&quot;&gt;Perform an in-place upgrade of an existing Fedora template.&lt;/a&gt; This option will preserve any modifications you’ve made to the template, but it may be more complicated for less experienced users.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Please note that no user action is required regarding the OS version in dom0 (see our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/supported-releases.html#note-on-dom0-and-eol&quot;&gt;note on dom0 and EOL&lt;/a&gt;).&lt;/p&gt;
</description>
        <pubDate>Wed, 05 Nov 2025 00:00:00 +0000</pubDate>
        <link>https://www.qubes-os.org/news/2025/11/05/fedora-41-approaching-end-of-life/</link>
        <guid isPermaLink="true">https://www.qubes-os.org/news/2025/11/05/fedora-41-approaching-end-of-life/</guid>
        
        
        <category>announcements</category>
        
      </item>
    
      <item>
        <title>Debian 13 templates available</title>
        <description>&lt;p&gt;The following new &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/debian/debian.html&quot;&gt;Debian 13 templates&lt;/a&gt; are now available for both Qubes OS 4.2 (stable) and Qubes OS 4.3 (release candidates):&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;debian-13-xfce&lt;/code&gt; (default Debian template with the &lt;a href=&quot;https://xfce.org/&quot;&gt;Xfce&lt;/a&gt; desktop environment)&lt;/li&gt;
  &lt;li&gt;&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;debian-13&lt;/code&gt; (alternative Debian template with the &lt;a href=&quot;https://www.gnome.org/&quot;&gt;GNOME&lt;/a&gt; desktop environment)&lt;/li&gt;
  &lt;li&gt;&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;debian-13-minimal&lt;/code&gt; (&lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/minimal-templates.html&quot;&gt;minimal template&lt;/a&gt; for advanced users)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There are two ways to upgrade a template to a new Debian release:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Recommended:&lt;/strong&gt; &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/debian/debian.html#installing&quot;&gt;Install a fresh template to replace the existing one.&lt;/a&gt; This option is simpler for less experienced users, but it won’t preserve any modifications you’ve made to your template. After you install the new template, you’ll have to redo your desired template modifications (if any) and &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/templates.html#switching&quot;&gt;switch everything that was set to the old template to the new template&lt;/a&gt;. If you choose to modify your template, you may wish to write those modifications down so that you remember what to redo on each fresh install. In the old Debian template, see &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;/var/log/dpkg.log&lt;/code&gt; and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;/var/log/apt/history.log&lt;/code&gt; for logs of package manager actions.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Advanced:&lt;/strong&gt; &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/templates/debian/debian-upgrade.html&quot;&gt;Perform an in-place upgrade of an existing Debian template.&lt;/a&gt; This option will preserve any modifications you’ve made to the template, but it may be more complicated for less experienced users.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; No user action is required regarding the OS version in dom0 (see our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/supported-releases.html#note-on-dom0-and-eol&quot;&gt;note on dom0 and EOL&lt;/a&gt;).&lt;/p&gt;
</description>
        <pubDate>Thu, 30 Oct 2025 00:00:00 +0000</pubDate>
        <link>https://www.qubes-os.org/news/2025/10/30/debian-13-templates-available/</link>
        <guid isPermaLink="true">https://www.qubes-os.org/news/2025/10/30/debian-13-templates-available/</guid>
        
        
        <category>announcements</category>
        
      </item>
    
      <item>
        <title>Qubes OS 4.3.0-rc3 is available for testing</title>
        <description>&lt;p&gt;We’re pleased to announce that the third release candidate (RC) for Qubes OS 4.3.0 is now available for testing. This minor release includes many new features and improvements over Qubes OS 4.2.&lt;/p&gt;

&lt;h2 id=&quot;whats-new-in-qubes-43&quot;&gt;What’s new in Qubes 4.3?&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;Dom0 upgraded to Fedora 41 (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/9402&quot;&gt;#9402&lt;/a&gt;).&lt;/li&gt;
  &lt;li&gt;Xen upgraded to version 4.19 (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/9420&quot;&gt;#9420&lt;/a&gt;).&lt;/li&gt;
  &lt;li&gt;Default Fedora template upgraded to Fedora 42 (versions older than 41 not supported).&lt;/li&gt;
  &lt;li&gt;Default Debian template upgraded to Debian 13 (versions older than 12 not supported).&lt;/li&gt;
  &lt;li&gt;Default Whonix templates upgraded to Whonix 18 (upgraded from 17.4.3 in RC2; versions older than 18 no longer supported).&lt;/li&gt;
  &lt;li&gt;Preloaded disposables (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/1512&quot;&gt;#1512&lt;/a&gt;)&lt;/li&gt;
  &lt;li&gt;Device “self-identity oriented” assignment (a.k.a. New Devices API) (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/9325&quot;&gt;#9325&lt;/a&gt;)&lt;/li&gt;
  &lt;li&gt;Qubes Windows Tools reintroduced with improved features (&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/1861&quot;&gt;#1861&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are just a few highlights from the many changes included in this release. For a more comprehensive list of changes, see the &lt;a href=&quot;https://doc.qubes-os.org/en/latest/developer/releases/4_3/release-notes.html&quot;&gt;Qubes OS 4.3 release notes&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;when-is-the-stable-release&quot;&gt;When is the stable release?&lt;/h2&gt;

&lt;p&gt;That depends on the number of bugs discovered in this RC and their severity. As explained in our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/developer/releases/version-scheme.html#release-schedule&quot;&gt;release schedule&lt;/a&gt; documentation, our usual process after issuing a new RC is to collect bug reports, triage the bugs, and fix them. If warranted, we then issue a new RC that includes the fixes and repeat the process. We continue this iterative procedure until we’re left with an RC that’s good enough to be declared the stable release. No one can predict, at the outset, how many iterations will be required (and hence how many RCs will be needed before a stable release), but we tend to get a clearer picture of this as testing progresses.&lt;/p&gt;

&lt;p&gt;At this time, we expect that there will likely be a fourth release candidate, which will probably be the final one.&lt;/p&gt;

&lt;h2 id=&quot;how-to-test-qubes-430-rc3&quot;&gt;How to test Qubes 4.3.0-rc3&lt;/h2&gt;

&lt;p&gt;Thanks to those who tested earlier 4.3 RCs and &lt;a href=&quot;https://doc.qubes-os.org/en/latest/introduction/issue-tracking.html&quot;&gt;reported bugs they encountered&lt;/a&gt;, 4.3.0-rc3 now includes fixes for several bugs that were present in those prior RCs!&lt;/p&gt;

&lt;p&gt;If you’d like to help us &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/testing.html&quot;&gt;test&lt;/a&gt; this RC, you can &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/upgrade/4_3.html&quot;&gt;upgrade to Qubes 4.3.0-rc3&lt;/a&gt; with either a clean installation or an in-place upgrade from Qubes 4.2. (Note for in-place upgrade testers: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;qubes-dist-upgrade&lt;/code&gt; now requires &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;--releasever=4.3&lt;/code&gt; and may require &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;--enable-current-testing&lt;/code&gt; for testing releases like this RC.) As always, we strongly recommend &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/how-to-guides/how-to-back-up-restore-and-migrate.html&quot;&gt;making a full backup&lt;/a&gt; beforehand and &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/how-to-guides/how-to-update.html&quot;&gt;updating Qubes OS&lt;/a&gt; immediately afterward in order to apply all available bug fixes.&lt;/p&gt;

&lt;p&gt;If you’re currently using an earlier 4.3 RC and wish to update to 4.3.0-rc3, please &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/how-to-guides/how-to-update.html&quot;&gt;update normally&lt;/a&gt; with &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/testing.html#updates&quot;&gt;&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;current-testing&lt;/code&gt; enabled&lt;/a&gt;. If you use Whonix, please also &lt;a href=&quot;https://www.whonix.org/wiki/Release_Upgrade_17_to_18&quot;&gt;upgrade from Whonix 17 to 18&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Please help us improve the eventual stable release by &lt;a href=&quot;https://doc.qubes-os.org/en/latest/introduction/issue-tracking.html&quot;&gt;reporting any bugs you encounter&lt;/a&gt;. If you’re an experienced user, we encourage you to &lt;a href=&quot;https://forum.qubes-os.org/t/joining-the-testing-team/5190&quot;&gt;join the testing team&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;known-issues-in-qubes-os-430-rc3&quot;&gt;Known issues in Qubes OS 4.3.0-rc3&lt;/h2&gt;

&lt;p&gt;It is possible that templates restored in 4.3.0-rc3 from a pre-4.3 backup may continue to target their original Qubes OS release repos. This does not affect fresh templates on a clean 4.3.0-rc3 installation. For more information, see issue &lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues/8701&quot;&gt;#8701&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue%20type%3ABug%20label%3Aaffects-4.3%20-label%3A%22R%3A%20cannot%20reproduce%22%20-label%3A%22R%3A%20declined%22%20-label%3A%22R%3A%20duplicate%22%20-label%3A%22R%3A%20not%20applicable%22%20-label%3A%22R%3A%20self-closed%22%20-label%3A%22R%3A%20upstream%20issue%22&quot;&gt;View the full list of known bugs affecting Qubes 4.3&lt;/a&gt; in our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/introduction/issue-tracking.html&quot;&gt;issue tracker&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;whats-a-release-candidate&quot;&gt;What’s a release candidate?&lt;/h2&gt;

&lt;p&gt;A release candidate (RC) is a software build that has the potential to become a stable release, unless significant bugs are discovered in testing. RCs are intended for more advanced (or adventurous!) users who are comfortable testing early versions of software that are potentially buggier than stable releases. You can read more about Qubes OS &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/supported-releases.html&quot;&gt;supported releases&lt;/a&gt; and the &lt;a href=&quot;https://doc.qubes-os.org/en/latest/developer/releases/version-scheme.html&quot;&gt;version scheme&lt;/a&gt; in our documentation.&lt;/p&gt;

&lt;h2 id=&quot;whats-a-minor-release&quot;&gt;What’s a minor release?&lt;/h2&gt;

&lt;p&gt;The Qubes OS Project uses the &lt;a href=&quot;https://semver.org/&quot;&gt;semantic versioning&lt;/a&gt; standard. Version numbers are written as &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;[major].[minor].[patch]&lt;/code&gt;. Hence, releases that increment the second value are known as “minor releases.” Minor releases generally include new features, improvements, and bug fixes that are backward-compatible with earlier versions of the same major release. See our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/user/downloading-installing-upgrading/supported-releases.html&quot;&gt;supported releases&lt;/a&gt; for a comprehensive list of major and minor releases and our &lt;a href=&quot;https://doc.qubes-os.org/en/latest/developer/releases/version-scheme.html&quot;&gt;version scheme&lt;/a&gt; documentation for more information about how Qubes OS releases are versioned.&lt;/p&gt;
</description>
        <pubDate>Mon, 27 Oct 2025 00:00:00 +0000</pubDate>
        <link>https://www.qubes-os.org/news/2025/10/27/qubes-os-4-3-0-rc3-available-for-testing/</link>
        <guid isPermaLink="true">https://www.qubes-os.org/news/2025/10/27/qubes-os-4-3-0-rc3-available-for-testing/</guid>
        
        
        <category>releases</category>
        
      </item>
    
      <item>
        <title>XSAs released on 2025-10-24</title>
        <description>&lt;p&gt;The &lt;a href=&quot;https://xenproject.org/&quot;&gt;Xen Project&lt;/a&gt; has released one or more &lt;a href=&quot;https://xenbits.xen.org/xsa/&quot;&gt;Xen security advisories (XSAs)&lt;/a&gt;.
The security of Qubes OS is &lt;strong&gt;not&lt;/strong&gt; affected.&lt;/p&gt;

&lt;h2 id=&quot;xsas-that-do-affect-the-security-of-qubes-os&quot;&gt;XSAs that DO affect the security of Qubes OS&lt;/h2&gt;

&lt;p&gt;The following XSAs &lt;strong&gt;do affect&lt;/strong&gt; the security of Qubes OS:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;(none)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;xsas-that-do-not-affect-the-security-of-qubes-os&quot;&gt;XSAs that DO NOT affect the security of Qubes OS&lt;/h2&gt;

&lt;p&gt;The following XSAs &lt;strong&gt;do not affect&lt;/strong&gt; the security of Qubes OS, and no user action is necessary:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https://xenbits.xen.org/xsa/advisory-476.html&quot;&gt;XSA-476&lt;/a&gt;
    &lt;ul&gt;
      &lt;li&gt;Qubes OS does not hot unplug PCI devices.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;about-this-announcement&quot;&gt;About this announcement&lt;/h2&gt;

&lt;p&gt;Qubes OS uses the &lt;a href=&quot;https://wiki.xenproject.org/wiki/Xen_Project_Software_Overview&quot;&gt;Xen hypervisor&lt;/a&gt; as part of its &lt;a href=&quot;/doc/architecture/&quot;&gt;architecture&lt;/a&gt;. When the &lt;a href=&quot;https://xenproject.org/&quot;&gt;Xen Project&lt;/a&gt; publicly discloses a vulnerability in the Xen hypervisor, they issue a notice called a &lt;a href=&quot;https://xenproject.org/developers/security-policy/&quot;&gt;Xen security advisory (XSA)&lt;/a&gt;. Vulnerabilities in the Xen hypervisor sometimes have security implications for Qubes OS. When they do, we issue a notice called a &lt;a href=&quot;/security/qsb/&quot;&gt;Qubes security bulletin (QSB)&lt;/a&gt;. (QSBs are also issued for non-Xen vulnerabilities.) However, QSBs can provide only &lt;em&gt;positive&lt;/em&gt; confirmation that certain XSAs &lt;em&gt;do&lt;/em&gt; affect the security of Qubes OS. QSBs cannot provide &lt;em&gt;negative&lt;/em&gt; confirmation that other XSAs do &lt;em&gt;not&lt;/em&gt; affect the security of Qubes OS. Therefore, we also maintain an &lt;a href=&quot;/security/xsa/&quot;&gt;XSA tracker&lt;/a&gt;, which is a comprehensive list of all XSAs publicly disclosed to date, including whether each one affects the security of Qubes OS. When new XSAs are published, we add them to the XSA tracker and publish a notice like this one in order to inform Qubes users that a new batch of XSAs has been released and whether each one affects the security of Qubes OS.&lt;/p&gt;
</description>
        <pubDate>Fri, 24 Oct 2025 00:00:00 +0000</pubDate>
        <link>https://www.qubes-os.org/news/2025/10/24/xsas-released-on-2025-10-24/</link>
        <guid isPermaLink="true">https://www.qubes-os.org/news/2025/10/24/xsas-released-on-2025-10-24/</guid>
        
        
        <category>security</category>
        
      </item>
    
  </channel>
</rss>
