Hey, in 2025 we had a wonderful time at the Hack-and-Hike :)I learned a lot and in the end I had a laptop with a satisfying SculptOS setup and the feeling that it’s achievable to use Genode as a hypervisor for my every day use cases.The following weeks I enjoyed configuring a declarative setup for systems with Genode + NixOS:https://github.com/johannesloetzsch/nixos-genode-hybridIn the future, I would be happy to build native apps using Goa. For now (the transition), I’m happy about using declarative builds of VMs running the software I’m familiar with. The Ambition for 2026 to build bridges to other open-source projects and new demographies really resonates with me :)I plan to improve my existing setup and would like to provide reusable modules to allow future users a smoother path to a usable setup.I'm thankfull about the hours of amazing support I received from core-developers during the last year :) However to make the potential in Genode available to a much broader community than now, the simple availability of common open source software should increase. I would love to have an community maintained distribution of a setup similar to Qubes OS, but based on Genode… This is a dream for a larger time period, but I would be happy to exchange thoughts and do some prototyping in 2026… It's so nice, to have other Genode users at our hackerspace, inspiring each other. They plan to start a „user group“ with regular meetups in 2026 :) Which topic is most interesting to me?To use Genode on my devices without relevant security regressions, I require secure boot.For now my setup allows booting the kernel via TrustedGRUB / Lanzaboote. However till now, the sculpt-iso-image and the configurations (from GENODE*-partition) are not signed. I have ideas how this could be implemented, but I would prefer a clean solution, applicable to everyone interested.In the end I want protect to the integrity up to starting VMs (with a static MBR + boot partition).
Cheers, Johannes