Currently Dom0 plays the two roles:
1) Admin domain for the whole system
2) GUI domain (desktop composition, trusted decorations, input handling,
GPU handling)
Making the GUI domain is a highly-nontrivial challenge -- see e.g. this
article:
http://theinvisiblethings.blogspot.com/2010/09/untrusting-your-gui-subsystem.html
At when your GUI domain must be ultimately trusted, then it makes little
sense to divide it from the Admin domain (which is also ultimately trusted).
Yet, the GUI domain must really be based on some mainstream OS, because
it must have all the latest graphics drivers for all the latest GPUs,
as well as some reasonably nice desktop environment (window manager plus
some basic things like e.g. "Start menu"), which in turns implies e.g.
Xorg and all its dependencies.
In case of Qubes OS it is however not-so-bad, because Dom0 doesn't have
any networking, and generally exposes only very limited interfaces to
the VMs, all strictly controlled. Thus, we believe, that a chance to
exploit a bug in, say, some KDE applications or Xorg, is negligible even
if all those apps are terribly buggy (which they surly are).
I don't see any benefit with replacing Linux in Dom0 with Minix, because
you will likely need to bring some kind of GPU drivers,
Xorg-replacement, and KDE-replacement anyway.
For Qubes R3 we're considering to actually move the GUI domain out from
the dom0, but this is mostly for maintenance and other reasons.
joanna.