![]() This level of hardware security is why VT-d and VT-x is required on your motherboard, by the way - it allows for complete hardware isolation. You use Dom0 to create, delete, launch and control other Domains. It has no network and while it fully controls all hardware, it is not exposed to that hardware. All the others are launched from there, and it is secure to a T - nothing touches Dom0. Your main and most important Domain is called Dom0. And should any Domain with network access become compromised or get infected by something nasty, it can't affect the rest of your Domains. There are Domains integrated with VPNs, and Tor. ![]() There are 'throwaway' Domains - so you can open a web browser, do some secure surfing, and when you're done it all disappears. For example, the Network Domain (and it is the network where bad things usually happen) has zero trust - and cannot access anything. These Domains are assigned various levels of trust: and stuff in Domains with lower levels of trust cannot get to higher levels. Domains can be thought of as virtual machines like when you use Oracle's VirtualBox or Apple's Boot Camp to run one operating system inside another. OK - now this is what you've got: you have a computer that is made up of several Domains. (I'm not 100% sure, but I think Windows users can use Unetbootin to burn ISOs onto a thumbdrive) Unlike BitMessage, this is mature software.) Follow the destructions.ĭownload (Version 2 Beta 2 works well - Ver. Just look at the hardware compatibility list. You can install it with very little trouble - like any other version of modern Linux - and the only thing that's really important is picking compatible hardware to install it on. It looks like Red Hat Linux and it is, sort of - but really, it's a Xen hypervisor. But, thinking about it, securing our email is really just a small part of what we need to do to keep ourselves safe from our own government.Ĭomplacency is not a characteristic that is naturally selected for. So I posted a diary a few days ago about an NSA-proof email system called BitMessage. And if just one person gets it and does it. I don't really expect much traction on this - but I feel an obligation to at least make the effort. ![]() There is a way, though: a way that is possible for we mere mortals. And keeping up is a labor of love - it does take considerable work. ![]() And while locking down Linux against incursions by some of the very best hackers in the world - those friendly folks at NSA - is actually possible (it isn't with Windows or iOS - period), it's constantly in flux. It's possible to lock Linux down, but it's very difficult - almost impossible - and intensely geeky (do you speak Snort?). You are owned.ĭo you use Linux? 1000 to 1 you're hosed. maybe you're flying totally under their radar? Mmmph. But maybe posting with a fake user name on a non-threatening site like DKos. yeah: they can do that too, if they want to. If they want to be inside your computer watching what you do in real time. ![]() They own your relatives, your friends, every plan you've ever made and how it turned out, every word you've ever written, every dime you've spent. They own every thought, all your dreams and aspirations. Let's start here: do you use Windows? Or an Apple operating system on your computer? You're hosed. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |