Hey, in 2025 we had a wonderful time at the Hack-and-Hike :)I learned a lot and in the end I had a laptop with a satisfying SculptOS setup and the feeling that it’s achievable to use Genode as a hypervisor for my every day use cases.The following weeks I enjoyed configuring a declarative setup for systems with Genode + NixOS:https://github.com/johannesloetzsch/nixos-genode-hybridIn the future, I would be happy to build native apps using Goa. For now (the transition), I’m happy about using declarative builds of VMs running the software I’m familiar with. The Ambition for 2026 to build bridges to other open-source projects and new demographies really resonates with me :)I plan to improve my existing setup and would like to provide reusable modules to allow future users a smoother path to a usable setup.I'm thankfull about the hours of amazing support I received from core-developers during the last year :) However to make the potential in Genode available to a much broader community than now, the simple availability of common open source software should increase. I would love to have an community maintained distribution of a setup similar to Qubes OS, but based on Genode… This is a dream for a larger time period, but I would be happy to exchange thoughts and do some prototyping in 2026… It's so nice, to have other Genode users at our hackerspace, inspiring each other. They plan to start a „user group“ with regular meetups in 2026 :) Which topic is most interesting to me?To use Genode on my devices without relevant security regressions, I require secure boot.For now my setup allows booting the kernel via TrustedGRUB / Lanzaboote. However till now, the sculpt-iso-image and the configurations (from GENODE*-partition) are not signed. I have ideas how this could be implemented, but I would prefer a clean solution, applicable to everyone interested.In the end I want protect to the integrity up to starting VMs (with a static MBR + boot partition).
Cheers, Johannes
Hi Johannes,
very happy about your posting! Thanks for chiming in.
For me personally, the engagement with you guys at C3D2 was certainly one of the highlights of the past year. The theme of "building bridges" was indeed much inspired by the joyful experience with connecting our respective communities. I perceive this new bridge as hugely positive and motivating. Now, learning about the prospect of a Genode user group is really the icing on the cake!
source software should increase. I would love to have an community maintained distribution of a setup similar to Qubes OS, but based on Genode… This is a dream for a larger time period, but I would be happy to exchange thoughts and do some prototyping in 2026… It's so nice, to
Qubes OS has been a recurring theme during our road-map discussion. In mere two weeks, our projects have the chance to catch up with each other at our joint Qubes+Genode stand at FOSDEM. Your stated community interest in combining the strengths of both projects gives an additional motivating boost to stick our heads together.
Which topic is most interesting to me?To use Genode on my devices without relevant security regressions, I require secure boot.For now my setup allows booting the kernel via TrustedGRUB / Lanzaboote. However till now, the sculpt-iso-image and the configurations (from GENODE*-partition) are not signed. I have ideas how this could be implemented, but I would prefer a clean solution, applicable to everyone interested.In the end I want protect to the integrity up to starting VMs (with a static MBR + boot partition).
Thank you for bringing this up! I wholeheartedly agree that this topic just screams to be addressed in 2026. :)
Cheers Norman