Respect! But have you ever considered using https://genode.org/ instead of Qubes? At least conceptually? Or even more crazy, because of 'chinesium':

https://en.wikipedia.org/wiki/HarmonyOS / https://en.wikipedia.org/wiki/HarmonyOS_NEXT /https://en.wikipedia.org/wiki/OpenHarmony / https://en.wikipedia.org/wiki/EulerOS / https://en.wikipedia.org/wiki/HongMeng_Kernel

At least by reading all of the above, it seems they have something like Genode (running on https://sel4.systems/ , amongst others ), but instead of some academic research thing, widely deployed commercially, running on consumer ready devices of all sorts.

Lately all based on that HongMeng kernel thing, comparable in performance to SEL4, utilizing containerized Linux-drivers by way of compatibility-shim, still fast.

Reads all very impressive and sexy, TBH.

I really appreciate the scorched earth efforts to redo computing with security from the start, but personally I have reached the conclusion that compatibility is key to adoption, and that desktop focused linux distros like ubuntu with yolo security being used for servers is the practice causing the most harm we must end as soon as possible.

QubesOS falls really short in supply chain integrity, and server solutions, but IMO the overall hypervisor/IOMMU isolation architecture is the most practical and compatible way forward though nowhere near as elegant as some of the ideas in Genode.

In EnclaveOS my team and I chose to focus on remote attestation and best available security isolation technologies available to most server CPUs while still using (hardened) linux kernels. We talk about this here: https://distrust.co/blog/enclaveos.html