F5F Stay Refreshed Software Operating Systems Top secure operating system available

Top secure operating system available

Top secure operating system available

Pages (3): Previous 1 2 3 Next
D
daxl_fns
Junior Member
46
11-20-2023, 11:40 PM
#11
Many options exist to stop Microsoft telemetry collection, not just for privacy but for protecting your data from real threats beyond Microsoft.
D
daxl_fns
11-20-2023, 11:40 PM #11

Many options exist to stop Microsoft telemetry collection, not just for privacy but for protecting your data from real threats beyond Microsoft.

S
Sjender
Junior Member
3
11-21-2023, 01:25 AM
#12
Despite warnings, Windows 10 continues to engage with Microsoft in unexpected ways.
S
Sjender
11-21-2023, 01:25 AM #12

Despite warnings, Windows 10 continues to engage with Microsoft in unexpected ways.

A
anakindaur
Senior Member
576
11-21-2023, 10:00 AM
#13
Returning to the simpler times of Windows XP when the internet wasn’t accessible. Classic gaming sessions were safe—no viruses until the USB was connected.
A
anakindaur
11-21-2023, 10:00 AM #13

Returning to the simpler times of Windows XP when the internet wasn’t accessible. Classic gaming sessions were safe—no viruses until the USB was connected.

T
texer767
Junior Member
4
12-09-2023, 08:15 AM
#14
You can to some degree (Even though Microsoft overlooks many options), but I wouldn't store any confidential data there. What does "evil" mean? Criminals? Authoritarian regimes? NSA (or similar spy services, particularly those who disregard your privacy)? Edit: It really hinges on your risk profile. Whether it's a tight-knit group of thieves, a big company, local police, or even government officials (intelligence bodies or repressive states).
T
texer767
12-09-2023, 08:15 AM #14

You can to some degree (Even though Microsoft overlooks many options), but I wouldn't store any confidential data there. What does "evil" mean? Criminals? Authoritarian regimes? NSA (or similar spy services, particularly those who disregard your privacy)? Edit: It really hinges on your risk profile. Whether it's a tight-knit group of thieves, a big company, local police, or even government officials (intelligence bodies or repressive states).

D
DarckMoule
Member
160
12-09-2023, 01:03 PM
#15
This isn't true, look up: Air gap malware. (in Qubes OS you are in control of which VM has access to your network, and which traffic is accepted (for example for a mail VM I will only allow it to access the mailing server and nothing else), and there is by default a vault VM where you put your password manager and stuff)
D
DarckMoule
12-09-2023, 01:03 PM #15

This isn't true, look up: Air gap malware. (in Qubes OS you are in control of which VM has access to your network, and which traffic is accepted (for example for a mail VM I will only allow it to access the mailing server and nothing else), and there is by default a vault VM where you put your password manager and stuff)

Z
Zelda_Boy
Member
114
12-17-2023, 05:31 AM
#16
I understand where Xen is applied. However, escaping virtual machines remains fairly frequent. Here are some references: the Ars Technica article about a hack exploiting edge browser fetches, the one discussing bitflipping (though it mainly targets other VMs and the host), the Xen patch update from 2016, and the older piece on a serious VM bug affecting cloud services. Even with the mention of Subgraph, if an adversary gains access to your system and has exploits ready, they can target you. Placing all your software—including potential malware—into VMs is like hiding valuables under a tree: you assume no one will check that specific spot. If someone discovered you storing sensitive data in VMs and stole it, the responsibility lies with you. Similarly, if an attacker used a vulnerability to obtain your credentials or passwords stored in VMs, they would be at fault.
Z
Zelda_Boy
12-17-2023, 05:31 AM #16

I understand where Xen is applied. However, escaping virtual machines remains fairly frequent. Here are some references: the Ars Technica article about a hack exploiting edge browser fetches, the one discussing bitflipping (though it mainly targets other VMs and the host), the Xen patch update from 2016, and the older piece on a serious VM bug affecting cloud services. Even with the mention of Subgraph, if an adversary gains access to your system and has exploits ready, they can target you. Placing all your software—including potential malware—into VMs is like hiding valuables under a tree: you assume no one will check that specific spot. If someone discovered you storing sensitive data in VMs and stole it, the responsibility lies with you. Similarly, if an attacker used a vulnerability to obtain your credentials or passwords stored in VMs, they would be at fault.

K
kika_BR
Member
144
01-02-2024, 07:15 PM
#17
It’s considered less severe than typical exploits that fully compromise the whole system. The issue has been addressed in Subgraph. What makes Qubes more challenging is that it requires both a browser exploit and a VM exploit for Xen, making it significantly harder to achieve complete control.
K
kika_BR
01-02-2024, 07:15 PM #17

It’s considered less severe than typical exploits that fully compromise the whole system. The issue has been addressed in Subgraph. What makes Qubes more challenging is that it requires both a browser exploit and a VM exploit for Xen, making it significantly harder to achieve complete control.

Z
Zyu_UY
Member
100
01-02-2024, 11:11 PM
#18
It's referred to as air gapping, and secure firms actually implement this. They remove most components from the computers—like speakers—that can be exploited to send and receive malware, along with other parts.
Z
Zyu_UY
01-02-2024, 11:11 PM #18

It's referred to as air gapping, and secure firms actually implement this. They remove most components from the computers—like speakers—that can be exploited to send and receive malware, along with other parts.

C
CobraBlizard
Member
229
01-03-2024, 12:28 AM
#19
The safest operating systems are OpenBSD and Windows 10. Qubes OS remains problematic due to its use of a poorly maintained Linux kernel.
C
CobraBlizard
01-03-2024, 12:28 AM #19

The safest operating systems are OpenBSD and Windows 10. Qubes OS remains problematic due to its use of a poorly maintained Linux kernel.

V
Vicho_Op
Member
218
01-03-2024, 02:57 AM
#20
The concept comes from understanding how Qubes OS operates with Xen instead of a standard Linux kernel, which differs from typical monolithic systems. You might have heard this idea from discussions about virtualization and security layering.
V
Vicho_Op
01-03-2024, 02:57 AM #20

The concept comes from understanding how Qubes OS operates with Xen instead of a standard Linux kernel, which differs from typical monolithic systems. You might have heard this idea from discussions about virtualization and security layering.

Pages (3): Previous 1 2 3 Next