Categories
Qubes OS

Qubes OS – Overview/Demo

Qubes OS is a security-focused desktop operating system that aims to provide security through isolation. Virtualization is performed by Xen, and user environments can be based on Fedora, Debian, Whonix, and Microsoft Windows, among other operating systems.

Learn more: https://www.qubes-os.org

Categories
Qubes OS

Qubes OS: Security Oriented OS

Learn more: https://www.qubes-os.org/

Categories
Qubes OS

Qubes OS: The OS That Can Protect You Even If You Get Hacked

Learn more: https://www.qubes-os.org/

Categories
Tails

Chat on Tails

Learn more: https://tails.boum.org/

Categories
Tails

Introduction to Tails

Learn more: https://tails.boum.org/

Categories
Tails

Getting Tails

Learn more: https://tails.boum.org/

Categories
Tails

Persistence on Tails

Learn more: https://tails.boum.org/

Categories
Subgraph OS

Subgraph OS

Adversary-Resistant Computing Platform

Subgraph OS is a desktop computing and communications platform that is designed to be resistant to network-borne exploit and malware attacks. It is also meant to be familiar and easy to use. Even in alpha, Subgraph OS looks and feels like a modern desktop operating system.

Subgraph OS includes strong system-wide attack mitigations that protect all applications as well as the core operating system, and key applications are run in sandbox environments to reduce the impact of any attacks against applications that are successful.

Subgraph OS was designed to reduce the risks in endpoint systems so that individuals and organizations around the world can communicate, share, and collaborate without fear of surveillance or interference by sophisticated adversaries through network borne attacks. Subgraph OS is designed to be difficult to attack. This is accomplished through system hardening and proactive, ongoing research on defensible system design.

Learn more: https://subgraph.com

Categories
Pine64

Pine64

Pine64
PinePhone

Pine64 is an organization which designs, manufactures and sells single-board computers, notebook computers and smartphones. While Pine64 is a legal for-profit entity, it operates much like a non-profit organization in the sense that it does not draw profits from most device sales, operates with volunteers, and reinvests income from sales back into the company. Its name was inspired from the mathematical constants pi and e with a reference to 64-bit computing power.

The Pine64 community is large, vibrant and diverse. Independent and partner-project developers, hackers and hardware enthusiasts, privacy advocates and FOSS geeks – you name it, we’ve got ’em all. They all contribute to the project thereby shaping it and determining its course. This page is community run, as is the Wiki, the chats as well as the forums.

Our goal is to push the envelope and deliver Arm and RISC-V devices that you want to use and develop for. To this end, we actively work with the development community and champion end-user initiatives. Rather than applying business to a FOSS setting, we allow FOSS principles to guide our business.

Learn more: https://pine64.com

Categories
Whonix

Whonix

What is Whonix?

Whonix is software designed to preserve privacy and anonymity by helping users run applications anonymously. Whonix can be installed on Windows, macOS and Linux. Whonix also comes pre-installed in Qubes (Qubes-Whonix).

How does Whonix work?

To protect a user’s anonymity on the internet, all connections are forced through the Tor network and numerous security mechanisms are deployed.

What are the Advantages of Whonix?

Whonix realistically addresses common attack vectors.

An IP address is a label which is used to identify a computer on the Internet. A simple analogy is an IP address is similar to a car license plate.

Hiding IP addresses is technically difficult for software. There is always a risk of so-called IP leaks, whereby a user mistakenly thinks the IP address is hidden when it is actually not.

Whonix is the best solution to prevent IP leaks because it uses a more solid technical design. IP leak issues that previously applied to other software were not applicable to Whonix in a number of cases.

IP leaks are not the only issue that can break a user’s anonymity. Other threats include time attacks, keystroke deanonymization and data collection techniques. Whonix deploys numerous security mechanisms to mitigate such attacks.

How is Whonix different from a VPN?

Virtual Private Networks (VPNs) know your identity and online activity and can be compelled legally to share this information with authorities under various circumstances.

VPNs are usually faster than Tor, but they are not anonymity networks. VPN administrators can log both where a user is connecting from and the destination website, breaking anonymity in the process. Promises made by VPN operators are meaningless, since they cannot be verified. Tor provides anonymity by design rather than policy, making it impossible for a single point in the network to know both the origin and the destination of a connection. Anonymity by design provides much more security, since trust is removed from the equation.

Whonix isn’t a program like most of your applications. It’s a full operating system that runs inside your current one.

Learn more: https://www.whonix.org

Categories
System76

System76

System76 is an American computer manufacturer based in Denver, Colorado, specializing in the sale of notebooks, desktops, and servers. The company supports free and open-source software, offering either Ubuntu or their own Ubuntu-based Linux distribution, Pop!_OS, as the preinstalled operating system.

Learn more: https://system76.com