I followed the user guide here for creating a usb VM because for some
reason qubes will otherwise automatically connect a possibly malicious USB
to DOM0 for some unknown reason. My qubes is installed onto a USB so i
dont know what good any of that would do.
-----------
https://www.qubes-os.org/doc/usb/
Alternatively, you can create a USB qube manually as follows:
In a dom0 terminal, type lsusb to check if you have a USB controller
free of input devices or programmable devices. If you find such free
controller, note its name and proceed to step 2.
Create a new qube. Give it an appropriate name and color label
(recommended: sys-usb, red).
In the qube’s settings, go to the “Devices” tab. Find your USB
controller in the “Available” list. Move it to the “Selected” list.
Click “OK.” Restart the qube.
Recommended: Check the box on the “Basic” tab which says “Start VM
automatically on boot.” (This will help to mitigate attacks in which
someone forces your system to reboot, then plugs in a malicious USB
device.)
------------------
LSUSB shows a list of devices and my usb connected to it, i could see my
controllers listed and my qubes usb, it did not specify which controller
its connected to, which even if it did would be of no help, as the devices
tab of the USB vm i created uses different names for the controllers.
I selected both controllers figuring there is no fault in protected all
usb ports. Then i selected 'start vm automatically' to protect against
some obscure attack. What the instructions failed to document is that a
usb VM will put your USB's into read-only mode which immediately began to
brick my qubes usb. I restarted hoping to fix the problem, but having set
it to start automatically as instructed forced the system to brick itself.
Im severely disappointed in the failure of the qubes development team to
forsee this simple problem and its failure to document the read-only
property of a usb vm. If it cannot even ascertain that its instructions
will lead to a fatal outcome how can anyone possibly believe they can
secure an entire operating system.