I use a dedicated machine. It’s not recommended to dual-boot Qubes because even if the Qubes install is encrypted, /boot isn’t. A second OS can modify it and compromise Qubes before it loads. Sharing hardware also means the other OS can tamper with BIOS/UEFI firmware, which puts the entire system at risk. Anti Evil Maid can alert you if /boot was changed, but it can’t prevent it or undo the damage. It’s also recommended to buy new hardware if you’re serious about security. And if you’re looking to run QubesOS on a dedicated machine, the hardware compatibility list is your friend. With Qubes, newer doesn’t always mean compatible. It should be noted that the unofficial community-recommended hardware list is for 4.1, and we are on 4.2.4 with 4.3-rc3 already released for testing, but you can find good recommendations and answers on the forum.

Replies (3)

Isn't the BIOS/UEFI firmware closed source? Meaning the attack vector is by intelligence agencies being allowed to install their blobs into the image pre signing?
That's not exactly correct. I provided links to the hardware lists. As far as Heads is concerned... whether I use Heads or Tails largely depends on convenience, compatibility, and threat model.