![]() ![]() We did this because we believe people should be able to communicate with each other privately. We designed Subgraph OS with these concerns in mind. We have no way to trust the systems and networks that relay our communications over the Internet. They transmit this information over the Internet without our knowledge and consent. Our computers and other devices gather a great deal of information about our thoughts, our lives, and our social networks. Privacy also relies heavily on the integrity of communications. Integrity assures that information cannot be modified or tampered with by anybody who is not authorizedĪvailability assures that information can be reliably accessed by those who are authorized In computer security, a secure system is one that assures the confidentiality, integrity, and availability of information it stores, processes, or communicates.Ĭonfidentiality assures that information is not revealed to anybody who is not authorized People attach different meanings to the words security and privacy. Subgraph runs many desktop applications in a security sandbox to limit their risk in case of compromiseĢ.2 What do we mean by security and privacy?.Security hardening makes Subgraph OS more resistant to security vulnerabilities.Subgraph OS anonymizes Internet traffic by sending it through the Tor network.Subgraph OS also has key differences from conventional Linux operating systems. These similarities make Subgraph OS easy to adopt, especially for users with prior Linux experience. Subgraph OS includes applications found in other Linux distributions. It provides the familiar GNOME desktop environment as its graphical user interface. In some ways, Subgraph OS is like other operating systems - it is derived from Debian GNU/Linux. ![]() We designed it so that our users can safely perform their day-to-day tasks securely and privately. Subgraph OS empowers people to communicate, share, and collaborate without fear of surveillance and interference. Subgraph OS is an adversary resistant computing platform. 5.8.4 Setting up simple networking in Qemu/KVM.5.8.3 Creating an advanced Debian Stretch virtual machine using debootstrap.5.8.2 Creating a basic Linux virtual machine.5.8.1 Creating a virtual machine with Qemu.5.8 Using virtual machines in Subgraph OS.5.7 Preventing unauthorized USB access with USB Lockout.5.6 Anonymizing MAC addresses with Macouflage.5.5.1 Configuring PaX flags with Paxrat.5.5 Hardening the operating system and applications with Grsecurity. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |