🕷️ Crawler Inspector

URL Lookup

Direct Parameter Lookup

Raw Queries and Responses

1. Shard Calculation

Query:
Response:
Calculated Shard: 30 (from laksa114)

2. Crawled Status Check

Query:
Response:

3. Robots.txt Check

Query:
Response:

4. Spam/Ban Check

Query:
Response:

5. Seen Status Check

ℹ️ Skipped - page is already crawled

📄
INDEXABLE
CRAWLED
5 hours ago
🤖
ROBOTS ALLOWED

Page Info Filters

FilterStatusConditionDetails
HTTP statusPASSdownload_http_code = 200HTTP 200
Age cutoffPASSdownload_stamp > now() - 6 MONTH0 months ago
History dropPASSisNull(history_drop_reason)No drop reason
Spam/banPASSfh_dont_index != 1 AND ml_spam_score = 0ml_spam_score=0
CanonicalPASSmeta_canonical IS NULL OR = '' OR = src_unparsedNot set

Page Details

PropertyValue
URLhttps://www.qubes-os.org/
Last Crawled2026-04-13 01:34:03 (5 hours ago)
First Indexed2014-08-04 07:03:59 (11 years ago)
HTTP Status Code200
Meta TitleQubes OS: A reasonably secure operating system | Qubes OS
Meta DescriptionQubes is a security-oriented, free and open-source operating system for personal computers that allows you to securely compartmentalize your digital life.
Meta Canonicalnull
Boilerpipe Text
What others are saying "SecureDrop depends on Qubes OS for best-in-class isolation of sensitive workloads on journalist workstations. Providing journalists with a sane way to handle untrusted content from unknown sources is part of our job, and Qubes gives us the tools we need to do that job well." "When I use Qubes I feel like a god. Software thinks that it's in control, that it can do what it wants? It can't. I'm in control." "Qubes OS gives us greater confidence in the security of systems being used to remotely access our servers, mainly because powerful physical and logical privilege separation between workspaces allows our engineers to select appropriate degrees of isolation for different processes." News & Announcements XSAs released on 2026-03-24 Posted in Security on 2026-03-24 XSAs released on 2026-03-17 Posted in Security on 2026-03-17 QSB-110: Use after free of paging structures in EPT (XSA-480) Posted in Security on 2026-03-17 Fedora 43 templates available for Qubes OS 4.2 Posted in Announcements on 2026-03-16 Fedora 42 approaching end of life Posted in Announcements on 2026-03-13 Qubes Canary 046 Posted in Security on 2026-03-13 Fedora 43 templates available for Qubes OS 4.3 Posted in Announcements on 2026-02-06 More News & Announcements What's Inside of Qubes? Secure Compartmentalization Qubes brings to your personal computer the security of the Xen hypervisor, the same software relied on by many major hosting providers to isolate websites and services from each other. Learn more Operating System Freedom Can't decide which Linux distribution you prefer? Still need that one Windows program for work? With Qubes, you're not limited to just one OS. Learn more Serious Privacy With Whonix integrated into Qubes, using the Internet anonymously over the Tor network is safe and easy. Learn more Research Qubes virtual mini-summit 2021 3mdeb and the Qubes team , August 2021 Qubes Air: Generalizing the Qubes Architecture Joanna Rutkowska , January 2018 Introducing the Next Generation Qubes Core Stack Joanna Rutkowska , October 2017 Introducing the Qubes Admin API Joanna Rutkowska , June 2017 Thoughts on the "physically secure" ORWL computer Joanna Rutkowska , September 2016 Security challenges for the Qubes build process Joanna Rutkowska , May 2016 Read More Research Join the Community! Have questions or need a hand? As a free and open-source project, our valued community of users and contributors from around the world are in the best position to help. Before diving in, we encourage you to read about staying safe , our discussion guidelines , and our code of conduct to help keep things positive and on-track. We welcome newcomers and returning users wanting to discuss Qubes and seeking to contribute .
Markdown
Toggle navigation [![Qubes OS Project](https://www.qubes-os.org/attachment/icons/128x128/apps/qubes-logo-icon.png) **Qubes** OS](https://www.qubes-os.org/) - [Introduction](https://www.qubes-os.org/intro/) - [Downloads](https://www.qubes-os.org/downloads/) - [Documentation](https://www.qubes-os.org/doc/) - [News](https://www.qubes-os.org/news/) - [Team](https://www.qubes-os.org/team/) - [Donate](https://www.qubes-os.org/donate/) # **Qubes** OS A reasonably secure operating system [Download & Install Version 4.3.0](https://www.qubes-os.org/downloads/) ## What others are saying [![](https://www.qubes-os.org/attachment/site/endorsement-edward-snowden.jpg)](https://twitter.com/Snowden/status/781493632293605376) ["If you're serious about security, @QubesOS is the best OS available today. It's what I use, and free." **Edward Snowden**, whistleblower and privacy advocate](https://twitter.com/Snowden/status/781493632293605376) [![](https://www.qubes-os.org/attachment/site/fpf-logo-square.png)]() > "SecureDrop depends on Qubes OS for best-in-class isolation of sensitive workloads on journalist workstations. Providing journalists with a sane way to handle untrusted content from unknown sources is part of our job, and Qubes gives us the tools we need to do that job well." > > **Freedom of the Press Foundation**, non-profit dedicated to supporting free speech and public-interest journalism [![](https://www.qubes-os.org/attachment/site/endorsement-micah-lee.jpg)]() > "When I use Qubes I feel like a god. Software thinks that it's in control, that it can do what it wants? It can't. I'm in control." > > **Micah Lee**, Director of Information Security at The Intercept, advisor to DDoSecrets [![](https://www.qubes-os.org/attachment/site/lets-encrypt-logo.svg)]() > "Qubes OS gives us greater confidence in the security of systems being used to remotely access our servers, mainly because powerful physical and logical privilege separation between workspaces allows our engineers to select appropriate degrees of isolation for different processes." > > **Let's Encrypt**, non-profit, world's largest certificate authority [More endorsements](https://www.qubes-os.org/endorsements/) *** ## Media & Press [![](https://www.qubes-os.org/attachment/site/motherboard-logo.png) "The world's most secure operating system assumes you've been owned." by J.M. Porup](https://www.vice.com/en_us/article/kbz43x/finally-a-reasonably-secure-operating-system-qubes-r3) [![](https://www.qubes-os.org/attachment/site/the-economist-logo.png) "For those willing to put in the effort, Qubes is more secure than almost any other operating system available today." by J. M. P.](https://www.economist.com/babbage/2014/03/28/a-digital-fortress) [![](https://www.qubes-os.org/attachment/site/wired-magazine-logo.png) "So Rutkowska flipped the game, this time in favor of the defenders." by Andy Greenberg](https://www.wired.com/2014/11/protection-from-hackers/) [More Media & Press](https://www.qubes-os.org/news/) ## News & Announcements - [XSAs released on 2026-03-24 Posted in Security on 2026-03-24](https://www.qubes-os.org/news/2026/03/24/xsas-released-on-2026-03-24/) - [XSAs released on 2026-03-17 Posted in Security on 2026-03-17](https://www.qubes-os.org/news/2026/03/17/xsas-released-on-2026-03-17/) - [QSB-110: Use after free of paging structures in EPT (XSA-480) Posted in Security on 2026-03-17](https://www.qubes-os.org/news/2026/03/17/qsb-110/) - [Fedora 43 templates available for Qubes OS 4.2 Posted in Announcements on 2026-03-16](https://www.qubes-os.org/news/2026/03/16/fedora-43-templates-available-for-qubes-os-4-2/) - [Fedora 42 approaching end of life Posted in Announcements on 2026-03-13](https://www.qubes-os.org/news/2026/03/13/fedora-42-approaching-end-of-life/) - [Qubes Canary 046 Posted in Security on 2026-03-13](https://www.qubes-os.org/news/2026/03/13/canary-046/) - [Fedora 43 templates available for Qubes OS 4.3 Posted in Announcements on 2026-02-06](https://www.qubes-os.org/news/2026/02/06/fedora-43-templates-available/) - [More News & Announcements](https://www.qubes-os.org/news/) *** ## What's Inside of Qubes? ![](https://www.qubes-os.org/attachment/site/xen-logo.svg) ### Secure Compartmentalization Qubes brings to your personal computer the security of the Xen hypervisor, the same software relied on by many major hosting providers to isolate websites and services from each other. [Learn more](https://www.qubes-os.org/doc/architecture/) ![](https://www.qubes-os.org/attachment/site/OS-logos.svg) ### Operating System Freedom Can't decide which Linux distribution you prefer? Still need that one Windows program for work? With Qubes, you're not limited to just one OS. [Learn more](https://www.qubes-os.org/doc/templates/) ![](https://www.qubes-os.org/attachment/site/whonix-tor.svg) ### Serious Privacy With Whonix integrated into Qubes, using the Internet anonymously over the Tor network is safe and easy. [Learn more](https://www.whonix.org/wiki/Qubes) *** ### Research - [Qubes virtual mini-summit 2021 **3mdeb and the Qubes team**, August 2021](https://www.qubes-os.org/news/2021/07/30/minisummit-agenda/) - [Qubes Air: Generalizing the Qubes Architecture **Joanna Rutkowska**, January 2018](https://www.qubes-os.org/news/2018/01/22/qubes-air/) - [Introducing the Next Generation Qubes Core Stack **Joanna Rutkowska**, October 2017](https://www.qubes-os.org/news/2017/10/03/core3/) - [Introducing the Qubes Admin API **Joanna Rutkowska**, June 2017](https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/) - [Thoughts on the "physically secure" ORWL computer **Joanna Rutkowska**, September 2016](https://blog.invisiblethings.org/2016/09/03/thoughts-about-orwl.html) - [Security challenges for the Qubes build process **Joanna Rutkowska**, May 2016](https://blog.invisiblethings.org/2016/05/30/build-security.html) - [Read More Research](https://www.qubes-os.org/research/) ### Partners - [![](https://www.qubes-os.org/attachment/site/mullvad-logo.svg) Mullvad](https://mullvad.net/) - [![](https://www.qubes-os.org/attachment/site/fpf-logo.svg) Freedom of the Press Foundation](https://www.freedom.press/) - [![](https://www.qubes-os.org/attachment/site/itl.png) Invisible Things Lab](https://www.invisiblethingslab.com/) - [![](https://www.qubes-os.org/attachment/site/partners-shake.svg) We would love for you to fund or partner with us](https://www.qubes-os.org/partners/) *** ## Join the Community\! Have questions or need a hand? As a free and open-source project, our valued community of users and contributors from around the world are in the best position to help. Before diving in, we encourage you to read about [staying safe](https://doc.qubes-os.org/en/latest/introduction/support.html#staying-safe), our [discussion guidelines](https://doc.qubes-os.org/en/latest/introduction/support.html#discussion-guidelines), and our [code of conduct](https://www.qubes-os.org/code-of-conduct/) to help keep things positive and on-track. We welcome newcomers and returning users wanting to discuss Qubes and [seeking to contribute](https://www.qubes-os.org/doc/contributing/). [Visit the Qubes Forum](https://forum.qubes-os.org/) #### Search qubes-os.org [Introduction](https://www.qubes-os.org/intro/) - [What is Qubes OS?](https://www.qubes-os.org/intro/) - [Endorsements](https://www.qubes-os.org/endorsements/) - [Getting started](https://www.qubes-os.org/doc/getting-started/) - [Video tours](https://www.qubes-os.org/video-tours/) - [Screenshots](https://www.qubes-os.org/screenshots/) - [FAQ](https://www.qubes-os.org/faq/) - [Help and support](https://www.qubes-os.org/support/) - [Security center](https://www.qubes-os.org/security/) - [Architecture](https://www.qubes-os.org/doc/architecture/) - [Code of conduct](https://www.qubes-os.org/code-of-conduct/) [Downloads](https://www.qubes-os.org/downloads/) - [System requirements](https://www.qubes-os.org/doc/system-requirements/) - [Certified hardware](https://www.qubes-os.org/doc/certified-hardware/) - [Compatibility list](https://www.qubes-os.org/hcl/) - [Installation guide](https://www.qubes-os.org/doc/installation-guide/) - [Verifying signatures](https://www.qubes-os.org/security/verifying-signatures/) - [Supported releases](https://www.qubes-os.org/doc/supported-releases/) - [Version scheme](https://www.qubes-os.org/doc/version-scheme/) - [Source code](https://www.qubes-os.org/doc/source-code/) - [Software license](https://www.qubes-os.org/doc/license/) - [Download mirrors](https://www.qubes-os.org/downloads/#mirrors) [Documentation](https://www.qubes-os.org/doc/) - [Introduction](https://doc.qubes-os.org/en/latest/index.html#introduction) - [Choosing hardware](https://doc.qubes-os.org/en/latest/index.html#choosing-your-hardware) - [Installing and upgrading](https://doc.qubes-os.org/en/latest/index.html#downloading-installing-and-upgrading-qubes) - [How-to guides](https://doc.qubes-os.org/en/latest/index.html#how-to-guides) - [Templates](https://doc.qubes-os.org/en/latest/index.html#templates) - [Troubleshooting](https://doc.qubes-os.org/en/latest/index.html#troubleshooting) - [Security in Qubes](https://doc.qubes-os.org/en/latest/index.html#security-in-qubes) - [Project security](https://doc.qubes-os.org/en/latest/index.html#project-security) - [Developer docs](https://doc.qubes-os.org/en/latest/index.html#developer-documentation) - [External docs](https://doc.qubes-os.org/en/latest/index.html#external-documentation) [News](https://www.qubes-os.org/news/) - [Announcements](https://www.qubes-os.org/news/categories/#announcements) - [Userbase statistics](https://www.qubes-os.org/statistics/) - [Research](https://www.qubes-os.org/research/) - [GitHub](https://github.com/QubesOS) - [Qubes forum](https://forum.qubes-os.org/) - [Twitter](https://twitter.com/QubesOS) - [Mastodon](https://mastodon.social/@QubesOS) - [Reddit](https://www.reddit.com/r/Qubes/) - [LinkedIn](https://www.linkedin.com/company/qubes-os/) [Team](https://www.qubes-os.org/team/) - [Report a bug](https://www.qubes-os.org/doc/issue-tracking/) - [Report a security Issue](https://www.qubes-os.org/security/) - [Inquiries](https://www.qubes-os.org/team/#inquiries) - [Core team](https://www.qubes-os.org/team/#core-team) - [Former team members](https://www.qubes-os.org/team/#former-team-members) - [Community contributors](https://www.qubes-os.org/team/#community-contributors) [Donate](https://www.qubes-os.org/donate/) - [How to donate](https://www.qubes-os.org/donate/) - [Qubes Partners](https://www.qubes-os.org/partners/) - [How to contribute](https://www.qubes-os.org/doc/contributing/) [![Qubes](https://www.qubes-os.org/attachment/icons/logo-outline-small.svg) **Qubes** OS](https://www.qubes-os.org/) © The Qubes OS Project and others [Website source code](https://github.com/QubesOS/qubesos.github.io) \| [Tor onion service](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/) \| [Privacy policy](https://www.qubes-os.org/privacy/) \| [Report a problem](https://www.qubes-os.org/doc/issue-tracking/) \| [Terms of use](https://www.qubes-os.org/terms/) \| [Sitemap](https://www.qubes-os.org/sitemap.xml)
Readable Markdown
What others are saying [![](https://www.qubes-os.org/attachment/site/endorsement-edward-snowden.jpg)](https://twitter.com/Snowden/status/781493632293605376) [![](https://www.qubes-os.org/attachment/site/fpf-logo-square.png)]() > "SecureDrop depends on Qubes OS for best-in-class isolation of sensitive workloads on journalist workstations. Providing journalists with a sane way to handle untrusted content from unknown sources is part of our job, and Qubes gives us the tools we need to do that job well." [![](https://www.qubes-os.org/attachment/site/endorsement-micah-lee.jpg)]() > "When I use Qubes I feel like a god. Software thinks that it's in control, that it can do what it wants? It can't. I'm in control." [![](https://www.qubes-os.org/attachment/site/lets-encrypt-logo.svg)]() > "Qubes OS gives us greater confidence in the security of systems being used to remotely access our servers, mainly because powerful physical and logical privilege separation between workspaces allows our engineers to select appropriate degrees of isolation for different processes." *** ## News & Announcements - [XSAs released on 2026-03-24 Posted in Security on 2026-03-24](https://www.qubes-os.org/news/2026/03/24/xsas-released-on-2026-03-24/) - [XSAs released on 2026-03-17 Posted in Security on 2026-03-17](https://www.qubes-os.org/news/2026/03/17/xsas-released-on-2026-03-17/) - [QSB-110: Use after free of paging structures in EPT (XSA-480) Posted in Security on 2026-03-17](https://www.qubes-os.org/news/2026/03/17/qsb-110/) - [Fedora 43 templates available for Qubes OS 4.2 Posted in Announcements on 2026-03-16](https://www.qubes-os.org/news/2026/03/16/fedora-43-templates-available-for-qubes-os-4-2/) - [Fedora 42 approaching end of life Posted in Announcements on 2026-03-13](https://www.qubes-os.org/news/2026/03/13/fedora-42-approaching-end-of-life/) - [Qubes Canary 046 Posted in Security on 2026-03-13](https://www.qubes-os.org/news/2026/03/13/canary-046/) - [Fedora 43 templates available for Qubes OS 4.3 Posted in Announcements on 2026-02-06](https://www.qubes-os.org/news/2026/02/06/fedora-43-templates-available/) - [More News & Announcements](https://www.qubes-os.org/news/) *** What's Inside of Qubes? ![](https://www.qubes-os.org/attachment/site/xen-logo.svg) ### Secure Compartmentalization Qubes brings to your personal computer the security of the Xen hypervisor, the same software relied on by many major hosting providers to isolate websites and services from each other. [Learn more](https://www.qubes-os.org/doc/architecture/) ![](https://www.qubes-os.org/attachment/site/OS-logos.svg) ### Operating System Freedom Can't decide which Linux distribution you prefer? Still need that one Windows program for work? With Qubes, you're not limited to just one OS. [Learn more](https://www.qubes-os.org/doc/templates/) ![](https://www.qubes-os.org/attachment/site/whonix-tor.svg) ### Serious Privacy With Whonix integrated into Qubes, using the Internet anonymously over the Tor network is safe and easy. [Learn more](https://www.whonix.org/wiki/Qubes) *** ### Research - [Qubes virtual mini-summit 2021 **3mdeb and the Qubes team**, August 2021](https://www.qubes-os.org/news/2021/07/30/minisummit-agenda/) - [Qubes Air: Generalizing the Qubes Architecture **Joanna Rutkowska**, January 2018](https://www.qubes-os.org/news/2018/01/22/qubes-air/) - [Introducing the Next Generation Qubes Core Stack **Joanna Rutkowska**, October 2017](https://www.qubes-os.org/news/2017/10/03/core3/) - [Introducing the Qubes Admin API **Joanna Rutkowska**, June 2017](https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/) - [Thoughts on the "physically secure" ORWL computer **Joanna Rutkowska**, September 2016](https://blog.invisiblethings.org/2016/09/03/thoughts-about-orwl.html) - [Security challenges for the Qubes build process **Joanna Rutkowska**, May 2016](https://blog.invisiblethings.org/2016/05/30/build-security.html) - [Read More Research](https://www.qubes-os.org/research/) *** Join the Community\! Have questions or need a hand? As a free and open-source project, our valued community of users and contributors from around the world are in the best position to help. Before diving in, we encourage you to read about [staying safe](https://doc.qubes-os.org/en/latest/introduction/support.html#staying-safe), our [discussion guidelines](https://doc.qubes-os.org/en/latest/introduction/support.html#discussion-guidelines), and our [code of conduct](https://www.qubes-os.org/code-of-conduct/) to help keep things positive and on-track. We welcome newcomers and returning users wanting to discuss Qubes and [seeking to contribute](https://www.qubes-os.org/doc/contributing/).
Shard30 (laksa)
Root Hash1118147126145934030
Unparsed URLorg,qubes-os!www,/ s443