+
+
+
+---
+
+# Supporting Contributor
+
+* ## StarApps Ltd
+
+We are grateful for the support from StarApps Ltd., company which use and rely
+on Qubes OS and support FOSS philosophy.
+
+---
+
+
+
+
+
+
+
+
+
+
+
+
+
+---
+
+# Accomplishments - 2023-2024
+
+* Recap of vision and challenges presented last year.
+* We added 50% to Qubes OS Certified Hardware (from 6 to 9)
+ - although we have to admit that some old certified hardware is no longer
+available,
+* Qubes HCL statistics: 1055 (+61)
+* Released Qubes OS 4.2 and three subsequent point releases
+* Greatly improved updates experience
+* Several UX improvements and new GUI tools - including new Qubes Global
+ Config, more to come
+* fwupd integration installed by default
+* Community projects:
+ - Automated configurability extended thanks to community contribution from Ben
+ Grande in form of [qusal](https://github.com/ben-grande/qusal) based on
+ previous unman work.
+
+
+---
+
+# Accomplishments - 2023-2024
+
+* Event organization improved:
+ - A lot external talks in CfP, we had to reject some.
+* Coming soon:
+ - UEFI Secure Boot integration - more about that in tomorrow's talk.
+ + TL;DR we are not there yet, but we are close. safeboot approach is still
+ alive.
+ - TrenchBoot AEM - we have some exciting news and demo for you.
+ - Certified Hardware with Intel Boot Guard and UEFI Capsule Update coming in
+ following months.
+ - As mentioned last year SMI Transfer Monitor was integrated for Qubes OS
+ Certified Hardware MSI PRO Z690-A by Brian Delgado.
+ + code is PoC, but it was presented at [vPub 0xB](https://youtu.be/3PmOcjQX-9Y)
+ + the challenge would be to make Xen and dom0 aware of that,
+
+
+---
+transition: fade
+---
+
+
+# Accomplishments - 2022-2023
+
+
+
+---
+
+# Accomplishments - 2023-2024
+
+
+
+---
+
+
+
+
+
+
+
+
+
+---
+
+# Vision and challenges - 2024-2025
+
+* Continue growth of number of Qubes OS Certified Hardware
+ - Dell OptiPlex 7010/9010 with AEM
+ - Odroid H4?
+ - Novacustom Laptops
+* Finalize Qubes AEM support for Intel
+ - Legacy BIOS (through SeaBIOS) is close to be completed.
+ - UEFI is planned and founded.
+* Finalize Qubes AEM for AMD
+ - Waiting for release of documentation by AMD
+ - If it would not happen early we have to rely on existing documentation and
+ will adjust after that.
+* UEFI Secure Boot have to become first-class citizen in Qubes OS.
+* Qubes Security Report - road to OSS security leadership.
+* More in Marek's talk dedicated to Qubes OS Project plans.
+
+
+
+---
+
+# What is our lineup this year?
+
+
+
+* ## September 20th: Conference Day 1 and Afterparty
+
+
+
+* ## September 21th: Conference Day 2
+
+
+
+* ## September 22th: Hackathon
+
+
+
+---
+
+# Day 1 agenda
+
+### 10:00-10:25
+
+#### **_Welcome to Qubes OS Summit 2024 Day 1_** - Piotr (3mdeb), Marek (ITL)
+
+### 10:30-11:00
+
+#### **_Qubes OS development status update_** - Marek (ITL)
+
+### 11:10-11:30
+
+#### **_Qubes OS GUI Changes and Future Perspectives_** - Marta (ITL)
+
+### 11:40-12:10
+
+#### **_Enhancing OS Awareness of Hardware Security Capabilities in Qubes OS_** - Piotr (3mdeb)
+
+### 12:15-13:00
+
+#### **_Passwordless encrypted Qubes? Exploring some concepts_** - nestire (Nitrokey)
+
+### 13:00-14:30
+
+#### **_Lunch_**
+
+---
+
+# Day 1 agenda
+
+### 14:30-15:00
+
+#### **_How to architect your Qubes OS with SaltStack_** - Ben (FOSS Maintainer)
+
+### 15:10-15:40
+
+#### **_FlashKeeper: where SpiSpy meets Stateless Laptop jaded dreams: A retrofit plan first_** - Thierry (Heads Maintainer)
+
+### 15:50-16:20
+
+#### **_Anti Evil Maid status and future plans_** - Michał (3mdeb)
+
+### 16:30-17:00
+
+#### **_Rolling out Qubes_** - unman (Qubes OS Maintainer)
+
+### 17:10-17:40
+
+#### **_Update on Qubes Air_** - Marek&Frédéric (ITL/Qubes Team)
+
+### 17:50-18:00
+
+#### **_Closing Notes_** - Piotr (3mdeb)
+
+### 19:30+
+
+#### **_Afterparty_**
+
+
+---
+layout: cover
+background: /intro.png
+class: text-center
+---
+
+## Details on
+
+### https://cfp.3mdeb.com/qubes-os-summit-2024/
+
+### https://vpub.dasharo.com/e/16/qubes-os-summit-2024#schedule
+
+---
+
+
+
+
+
+
+
+
+ Photo by Maciej Klimiuk
+
+
+---
+
+
+
+
+
+https://vpub.dasharo.com
+
+
+
+* Respect Code of Conduct.
+* Please follow Safety and Health protocols and respect others.
+* Talks are streamed and recorded and will be published on Youtube.
+* Drinks and sweets are free.
+* Matrix `#qubes-summit:matrix.org` will be used for communication during event.
+* In case of any issues please contact with organizers.
+
+---
+
+# Merchandise
+
+
+
+
+
+
+* Paid and free merchandise available (at location and in 3mdeb Shop).
+* There are also partners selling their merchandise.
+
+
+---
+layout: cover
+background: /intro.png
+class: text-center
+---
+
+
+# Q&A
diff --git a/2025/qoss/day-2-closing-notes.md b/2025/qoss/day-2-closing-notes.md
new file mode 100644
index 00000000..9571357a
--- /dev/null
+++ b/2025/qoss/day-2-closing-notes.md
@@ -0,0 +1,85 @@
+---
+theme: slidev-template/theme
+layout: cover
+background: /intro.png
+class: text-center
+
+---
+## Qubes OS Summit 2024 Day 2: Closing Notes
+
+### Piotr Król
+
+---
+
+
+layout: cover
+background: /intro.png
+class: text-center
+---
+
+
+# Platinum Sponsors
+
+---
+
+
+
+
+
+
+
+
+
+---
+
+
+
+
+
+
+
+---
+
+
+
+
+
+
+
+
+
+
+Photo by Maciej Klimiuk
+
+
+
+---
+layout: cover
+background: /intro.png
+class: text-center
+---
+
+
+# Thank you and see you next year
+
+## (or on tomorrows hackathon)
diff --git a/2025/qoss/day-2-welcome.md b/2025/qoss/day-2-welcome.md
new file mode 100644
index 00000000..6085c874
--- /dev/null
+++ b/2025/qoss/day-2-welcome.md
@@ -0,0 +1,158 @@
+---
+theme: slidev-template/theme
+layout: cover
+background: /intro.png
+class: text-center
+
+---
+## Welcome to Qubes OS Summit 2024 Day 2
+
+### Piotr Król and Marek Marczykowski Górecki
+
+
+---
+layout: cover
+background: /@fs/repo/public/2024/QubesOSsummit/qoss_welcome.png
+---
+
+---
+layout: cover
+background: /intro.png
+class: text-center
+---
+
+
+# Platinum Sponsors
+
+---
+
+
+
+Our mission is to enhance platform security using the expertise we gained in
+Root of Trust, Chain of Trust, Trusted Computing, TPM, coreboot, UEFI/EDK II,
+Yocto, U-Boot, and Linux. Pace Enterprise Training (PET), Dasharo and Zarhus,
+are products designed to enhance the trustworthiness of every computing device
+through open development principles. We prioritize transparency, digital
+sovereignty, and the right to repair in creating resilient embedded firmware
+solutions, ensuring secure systems for the community and our clients.
+
+
+
+---
+layout: cover
+background: /intro.png
+class: text-center
+---
+
+## Problem Statement (aka Frictions)
+
+---
+clicks: 2
+---
+
+
+
+
+
+- Expert
+ + maintainers of security related software
+ + incident response teams
+- Adversary
+ + internal or external
+- Auditor
+ + governments, certification/compliance org, insurer
+
+
+
+---
+
+
+
+
+
+
+
+
+
+
+
+
+
+Documentation of
+[Threat Model Persona](https://github.com/3mdeb/verified-boot/blob/master/threat-model-persona.md)
+of **Expert** and
+[Threat Model](https://github.com/3mdeb/verified-boot/blob/master/threat-model.md),
+that can be exercised by some **Adversaries** was funded by PowerUpPrivacy and
+reviewed by Whonix/Kicksecure Maintainers.
+
+
+
+---
+clicks: 4
+---
+
+
+
+
+
+
+
+---
+clicks: 4
+---
+
+
+
+
+
+
+
+---
+
+
+
+
+
+
+
+Of course, that equation works only under specific (_opinionated_) computation
+systems. In this case, I mean systems where trustworthiness for computing is
+not an option; it is a requirement. If that happens, controlling the Root of
+Trust and Chain of Trust is paramount.
+
+---
+clicks: 4
+---
+
+
+
+
+
+---
+
+- This proves that upcoming to R4.3 contain working service call to a RemoteVM.
+- Reference materials
+ + [Service call to a RemoteVM](https://dev.qubes-os.org/projects/qubes-core-qrexec/en/latest/qrexec-remotevm.html) documentation
+ + [Matrix thread](https://matrix.to/#/!WtRrlYUTHOQjqGcSnn:invisiblethingslab.com/$UqxJhSaoM_EoyV5FFLWF1bba0_VfHKguyZcNb0GOljE?via=invisiblethingslab.com&via=matrix.org&via=nitro.chat)
+ + [Gist with instructions](https://gist.github.com/pietrushnic/53efd2923a87ee0c738f45958ead6c15)
+
+---
+
+# Conclusion
+
+- Hardware, firmware and software are reasonably mature for development of
+ vertically integrated applications.
+- For hardware vendors it is time to think how to deliver certified hardware
+ that will meet requirements of most valuable applications.
+ + Not in as single unit, but as a set of units
+- For firmware vendors how to deliver reasonably trustworthy code to fulfill
+ certification criteria, building on top of bleeding edge modern hardware
+ features.
+- For software developers it is to deliver applications which are ready to
+ accommodate to compartmentalized and distributed computing.
+
+
+
+---
+
+
+
+
+
+---
+layout: cover
+background: /intro.png
+class: text-center
+---
+
+# Q&A
+
+---
+layout: cover
+background: /intro.png
+class: text-center
+---
+
+# Backup
+
+---
+
+
diff --git a/img/dasharo_logo.png b/img/dasharo_logo.png
new file mode 100644
index 00000000..8763c796
Binary files /dev/null and b/img/dasharo_logo.png differ
diff --git a/img/pet_logo.png b/img/pet_logo.png
new file mode 100644
index 00000000..43207233
Binary files /dev/null and b/img/pet_logo.png differ
diff --git a/img/qoss2025/20250923_133840_7331634571389238541.jpg b/img/qoss2025/20250923_133840_7331634571389238541.jpg
new file mode 100644
index 00000000..183f0044
Binary files /dev/null and b/img/qoss2025/20250923_133840_7331634571389238541.jpg differ
diff --git a/img/qoss2025/20250923_133928_2621363651679297674.jpg b/img/qoss2025/20250923_133928_2621363651679297674.jpg
new file mode 100644
index 00000000..cafcfaf5
Binary files /dev/null and b/img/qoss2025/20250923_133928_2621363651679297674.jpg differ
diff --git a/img/qoss2025/20250923_134117_2004996325932768191.jpg b/img/qoss2025/20250923_134117_2004996325932768191.jpg
new file mode 100644
index 00000000..49b639e6
Binary files /dev/null and b/img/qoss2025/20250923_134117_2004996325932768191.jpg differ
diff --git a/img/qoss2025/actors.excalidraw.png b/img/qoss2025/actors.excalidraw.png
new file mode 100644
index 00000000..8b49e36b
Binary files /dev/null and b/img/qoss2025/actors.excalidraw.png differ
diff --git a/img/qoss2025/call_to_action.excalidraw.png b/img/qoss2025/call_to_action.excalidraw.png
new file mode 100644
index 00000000..fd053bfe
Binary files /dev/null and b/img/qoss2025/call_to_action.excalidraw.png differ
diff --git a/img/qoss2025/friction_1.excalidraw.png b/img/qoss2025/friction_1.excalidraw.png
new file mode 100644
index 00000000..45c4f370
Binary files /dev/null and b/img/qoss2025/friction_1.excalidraw.png differ
diff --git a/img/qoss2025/friction_1_plus_2.excalidraw.png b/img/qoss2025/friction_1_plus_2.excalidraw.png
new file mode 100644
index 00000000..605e20c5
Binary files /dev/null and b/img/qoss2025/friction_1_plus_2.excalidraw.png differ
diff --git a/img/qoss2025/friction_2.excalidraw.png b/img/qoss2025/friction_2.excalidraw.png
new file mode 100644
index 00000000..92cc78f2
Binary files /dev/null and b/img/qoss2025/friction_2.excalidraw.png differ
diff --git a/img/qoss2025/friction_3.excalidraw.png b/img/qoss2025/friction_3.excalidraw.png
new file mode 100644
index 00000000..7b527af2
Binary files /dev/null and b/img/qoss2025/friction_3.excalidraw.png differ
diff --git a/img/qoss2025/friction_4_and_5.excalidraw.png b/img/qoss2025/friction_4_and_5.excalidraw.png
new file mode 100644
index 00000000..072ba923
Binary files /dev/null and b/img/qoss2025/friction_4_and_5.excalidraw.png differ
diff --git a/img/qoss2025/qoss2025_friction_1.excalidraw.svg b/img/qoss2025/qoss2025_friction_1.excalidraw.svg
new file mode 100644
index 00000000..ca479238
--- /dev/null
+++ b/img/qoss2025/qoss2025_friction_1.excalidraw.svg
@@ -0,0 +1,4 @@
+
+
+
\ No newline at end of file
diff --git a/img/qoss2025/qubes-cloud-hybrid.png b/img/qoss2025/qubes-cloud-hybrid.png
new file mode 100644
index 00000000..11eb3cce
Binary files /dev/null and b/img/qoss2025/qubes-cloud-hybrid.png differ
diff --git a/img/qoss2025/qubes-zones.png b/img/qoss2025/qubes-zones.png
new file mode 100644
index 00000000..9e85133f
Binary files /dev/null and b/img/qoss2025/qubes-zones.png differ
diff --git a/img/qoss2025/qubes_air_motivation_today.excalidraw.png b/img/qoss2025/qubes_air_motivation_today.excalidraw.png
new file mode 100644
index 00000000..f58da480
Binary files /dev/null and b/img/qoss2025/qubes_air_motivation_today.excalidraw.png differ
diff --git a/img/qoss2025/remotevm_qrexec_poc.excalidraw.png b/img/qoss2025/remotevm_qrexec_poc.excalidraw.png
new file mode 100644
index 00000000..e4b1e4ec
Binary files /dev/null and b/img/qoss2025/remotevm_qrexec_poc.excalidraw.png differ
diff --git a/img/qoss2025/state_of_qubes_air.excalidraw.png b/img/qoss2025/state_of_qubes_air.excalidraw.png
new file mode 100644
index 00000000..8e997f14
Binary files /dev/null and b/img/qoss2025/state_of_qubes_air.excalidraw.png differ
diff --git a/img/qoss2025/state_of_qubes_air2.excalidraw.png b/img/qoss2025/state_of_qubes_air2.excalidraw.png
new file mode 100644
index 00000000..b2045745
Binary files /dev/null and b/img/qoss2025/state_of_qubes_air2.excalidraw.png differ
diff --git a/public/2025/QubesOSsummit/Kicksecure-logo-text.svg b/public/2025/QubesOSsummit/Kicksecure-logo-text.svg
new file mode 100644
index 00000000..46d3cbdd
--- /dev/null
+++ b/public/2025/QubesOSsummit/Kicksecure-logo-text.svg
@@ -0,0 +1 @@
+
\ No newline at end of file
diff --git a/public/2025/QubesOSsummit/Whonix-logo-text.svg b/public/2025/QubesOSsummit/Whonix-logo-text.svg
new file mode 100644
index 00000000..0526edea
--- /dev/null
+++ b/public/2025/QubesOSsummit/Whonix-logo-text.svg
@@ -0,0 +1 @@
+
\ No newline at end of file
diff --git a/public/2025/QubesOSsummit/power-up-privacy-logo-light.png b/public/2025/QubesOSsummit/power-up-privacy-logo-light.png
new file mode 100644
index 00000000..ba3eeca5
Binary files /dev/null and b/public/2025/QubesOSsummit/power-up-privacy-logo-light.png differ
diff --git a/slides-template.md b/slides-template.md
new file mode 100644
index 00000000..8994c175
--- /dev/null
+++ b/slides-template.md
@@ -0,0 +1,25 @@
+---
+theme: ./theme
+background: /intro.png
+# some information about your slides (markdown enabled)
+title: "Qubes OS Summit 2025"
+info: false
+# apply unocss classes to the current slide
+class: text-center
+# https://sli.dev/features/drawing
+drawings:
+ persist: false
+# slide transition: https://sli.dev/guide/animations.html#slide-transitions
+transition: slide-left
+# enable MDC Syntax: https://sli.dev/features/mdc
+mdc: true
+copyright:
+---
+
+## 👋 Qubes OS Summit 2025 🎉
+
+
+---
+src:
+---
+
diff --git a/vite.config.ts b/vite.config.ts
index 02abb41a..0c7dfd3e 100644
--- a/vite.config.ts
+++ b/vite.config.ts
@@ -3,9 +3,11 @@ import MdItAdmon from 'markdown-it-admon';
export default defineConfig({
server: {
- fs: {
- strict: false,
- },
+ // make the dev server listen on all network interfaces
+ host: true, // or '0.0.0.0'
+ // all hosts are allowed
+ allowedHosts: true,
+ fs: { strict: false },
},
slidev: {
vue: {