sorted by: new top controversial old
[-] bsergay@discuss.online 2 points 1 week ago

To me, Endless OS seems to be the best fit for you; install it once and you never ever have to give it a second glance for troubleshooting or whatsoever. It achieves this through using "a read-only root file system managed by OSTree with apps installed using Flatpak.". This translates to:

  • The most important system-related files being protected from change by yourself and others.
  • Ensurance that your base installation is exactly the same as the one tested and used by its developers. And thus an (in-)direct quality control and maintenance by the very people that work on it.
  • As the base system is not changing beyond what is provided by the devs, installation of applications is relegated to flatpaks (see Flathub for the App Store).
    • Flatpak is a packaging format that doesn't interact with the base system to install software; think of it like how applications are installed on your phone. With this, you can still install software you need without compromising changes to the base system.
[-] bsergay@discuss.online 1 points 2 weeks ago

filesystem based encryption is really cool.

Can't agree more.

[-] bsergay@discuss.online 5 points 2 weeks ago

Sorry to be that guy, but you should just sit down and go over Qubes OS' documentation. Some specific entries that might prove useful:

If you ask me, read a lot more beyond these. But if you really got no time, then at least suffice with the aforementioned.

Wish ya good luck!

[-] bsergay@discuss.online 3 points 2 weeks ago

Mandatory read on the subject for the curious (also goes over Secure Boot, Boot Guard etc):

Trusted Boot (Anti-Evil-Maid, Heads, and PureBoot)

[-] bsergay@discuss.online 9 points 3 weeks ago

The pursuit of Freedom led me to Linux.

[-] bsergay@discuss.online 3 points 3 weeks ago

Are you referring to Qubes OS? If so, what do you mean exactly with hardware support?

[-] bsergay@discuss.online 1 points 1 month ago

I think we’ve probably already spoken on the matter.

That's definitely possible. Unfortunately, I don't recall it 😅.

Indeed, Lemmy has a serious dearth of users interested and using secure distros over the averages.

It's definitely better at this than the platform that starts with an "R" and rhymes with "shit".

Thanks for your efforts; I do not know how to follow users on Lemmy but if I did I’d follow you. Do you have a blog/any other forum you’re more active on?

That's such a compliment. This is definitely one of the nicest things I've read on Lemmy. I really appreciate it.

Unfortunately, I'm only somewhat active on Lemmy. FWIW, consider checking out the following places if you haven't yet:

  • dataswamp.org/~solene
  • privsec.dev
  • tech.michaelaltfield.net/

And, of course, Qubes OS' forums.

Personally, I find it difficult to justify the time to learn Secureblue (especially the immutable part) or NixOS on Qubes because custom DispVMs with curated salt states work so well already. I’m interested in use-cases that will improve my security but I haven’t found any dialogue on this yet. If you do have opinions on this and know where I can look, I would greatly appreciate it!

As I've previously alluded to, I don't have any hands-on experience with Qubes OS yet. So, I don't think I can contribute meaningfully in this discussion. However, IIRC, there are some discussions found on the forums/discussions page for Qubes OS.

[-] bsergay@discuss.online 2 points 1 month ago

Aight. I'm glad to hear that that has been resolved. I'd love to hear about your experiences on secureblue, so consider to report back. Finally, note that as a hardened distro, some things might work differently from what you'd expect. So be prepared to relearn a thing or two 😉.

[-] bsergay@discuss.online 4 points 1 month ago

Whonix is an OS exclusively meant to be used within a VM; at least, until Whonix-Host is released. Therefore, I didn't include it as it's not actually competing within the same space; as it can be run on any of the aforementioned systems within a VM. Finally, it's worth noting that by its own documentation, it's desirable to do so with Qubes OS.

[-] bsergay@discuss.online 3 points 1 month ago

Please allow me to link to an earlier comment of mine that goes over this in more length. You may also find it copied-and-pasted down below:


First of all, apologies for delaying this answer.

Disclaimer:

  • I'm not an expert. While I try to verify information and only accept it accordingly, I'm still human. Thus, some falsehoods may have slipped through, my memory may have failed me, and/or what's found below could be based on outdated data.
  • Additionally, I should note that I'm a huge nerd when it comes to 'immutable' distros. As a result, I'm very much biased towards secureblue, even if Kicksecure were to address all of their 'issues'.
  • Furthermore, for the sake of brevity, I've chosen to stick closely to the OOTB experience. At times, I may have diverged with Qubes OS, but Qubes OS is so far ahead of the others that it's in a league of its own.
  • Finally, it's important to mention that -ultimately- these three systems are Linux' finest when it comes to security. In a sense, they're all winners, each with its use cases based on hardware specifications, threat models, and priorities. However, if forced to rank them, I would order them as:

Qubes OS >> secureblue >~ Kicksecure

Context: Answering this question puts me in a genuinely conflicted position 😅. I have immense respect for the Kicksecure project, its maintainers and/or developers. Their contributions have been invaluable, inspiring many others to pursue similar goals. Unsurprisingly, some of their work is also found in secureblue. So, to me, it feels unappreciative and/or ungrateful to criticize them beyond what I've already done. However, I will honor your request for the sake of providing a comprehensive and balanced perspective on the project's current state and potential areas for improvement.

Considerations: It's important to approach this critique with nuance. Kicksecure has been around for over a decade, and their initial decisions likely made the most sense when they started. However, the Linux ecosystem has changed dramatically over the last few years, causing some of their choices to age less gracefully. Unfortunately, like most similar projects, there's insufficient manpower to retroactively redo some of their earlier work. Consequently, many current decisions might be made for pragmatic rather than idealistic reasons. Note that the criticisms raised below lean more towards the idealistic side. If resources allowed, I wouldn't be surprised if the team would love to address these issues. Finally, it's worth noting that the project has sound justifications for their decisions. It's simply not all black and white.

With that out of the way, here's my additional criticism along with comparisons to Qubes OS and secureblue:

  • Late adoption of beneficial security technologies: Being tied to Debian, while sensible in 2012, now presents a major handicap. Kicksecure is often late to adopt new technologies beneficial for security, such as PipeWire and Wayland. While well-tested products are preferred for security-sensitive systems, PulseAudio and X11 have significant exploits that are absent from PipeWire and Wayland by design. In this case, preferring the known threat over the unproven one is questionable.
    • Qubes OS: Its superior security model makes direct comparisons difficult. However, FWIW, Qubes OS defaults for its VMs to Debian and Fedora. The latter of which is known to push new technologies and adopt them first.
    • secureblue: Based on Fedora Atomic, therefore it also receives these new technologies first.
  • Lack of progress towards a stateless^[1]^ system: Stateless systems improve security by reducing the attack surface and making the system more predictable and easier to verify. They minimize persistent changes, impeding malware's ability to maintain a foothold and simplifying system recovery after potential compromises. While this is still relatively unexplored territory, NixOS's impermanence module is a prominent example.
    • Qubes OS: There's a community-driven step-by-step guide for achieving this.
    • secureblue: Based on Fedora Atomic, which has prioritized combating state since its inception^[2]^. Its immutable design inherently constrains state compared to traditional distros, with ongoing development promising further improvements.
  • Deprecation of hardened_malloc: This security feature, found in GrapheneOS, was long championed by Kicksecure for Linux on desktop. However, they've recently chosen to deprecate it.
    • Qubes OS: Supports VMs with hardened_malloc enabled OOTB, for which Kicksecure used to be a great candidate.
    • secureblue: Continues to support hardened_malloc and has innovatively extended its use to flatpaks.

  1. This paper provides a comprehensive (albeit slightly outdated) exposition on the matter. Note that it covers more than just this topic, so focus on the relevant parts.
  2. Colin Walters, a key figure behind Fedora CoreOS and Fedora Atomic, has written an excellent blog post discussing 'state'.
[-] bsergay@discuss.online 1 points 1 month ago

What are the main advantages of using this, that make it more secure?

More secure compared to your average distro? Or more secure compared to a specific set of distros? Unless, this is properly specified, this comment could become very unwieldy 😅.

Thanks in advance for specifying!

136
submitted 1 month ago by bsergay@discuss.online to c/linux@lemmy.ml
31
submitted 1 month ago by bsergay@discuss.online to c/linux@lemmy.ml
108
submitted 1 month ago by bsergay@discuss.online to c/linux@lemmy.ml

The Linux ecosystem is vast and diverse, offering a multitude of distributions to suit every need and preference. With hundreds of distros to choose from, it's a pity that most are rarely mentioned while the popular ones are constantly being regurgitated.

This thread aims to celebrate this diversity and shine a light on smaller projects with passionate developers. I invite you to pitch your favorite underappreciated distro and share your experiences with those lesser-known Linux distributions that deserve more attention.

While there are no strict rules or banlists, I encourage you to focus on truly niche or exotic distributions rather than the more commonly discussed ones. Consider touching upon what makes your chosen distro unique:

  • What features or philosophies set it apart?
  • Why do you favor it over other distros, including the popular ones? (Beyond "It just works.")
  • In what situations would you recommend it to others?

Whether it's a specialized distro for a particular use case or a general-purpose OS with a unique twist, let's explore the road less traveled in the Linux landscape. Your insights could introduce fellow enthusiasts to their next favorite distribution!

45
Linux Myths (linux-myths.pages.dev)
submitted 2 months ago* (last edited 2 months ago) by bsergay@discuss.online to c/linux@lemmy.ml
Linux Myths

A compilation of linux myths and misconceptions, busted and explained

Purpose

To catalog and provide useful responses to common linux misconceptions and myths. To serve as a useful reference for new and old users alike.


I'm not affiliated with the website or its creator(s).

116
submitted 2 months ago* (last edited 2 months ago) by bsergay@discuss.online to c/linux@lemmy.ml

NixOS' influence and importance at pushing Linux forward into the (previously) unexplored landscape of configuring your complete system through a single config file is undeniable. It's been a wild ride, but it was well worth it.

And although it has only been relatively recently that it has lost its niche status, the recent influx of so-called 'immutable' distros springing up like mushrooms is undeniably linked to and inspired by NixOS.

However, unfortunately, while this should have been very exciting times for what's yet to come, the recent drama surrounding the project has definitely tarnished how the project is perceived.

NixOS' ideas will definitely live on regardless. But how do you envision NixOS' own future? Any ETA's for when this drama will end? Which lessons have we learned (so far) from this drama? Are there any winners as a result of this drama? Could something like this happen to any distro?


In case you're out of the loop. Though, there's a lot that has transpired since but which hasn't been rigorously documented at a single place; like how 4 out of 5 NixOS board members have quit over the last 2 months or so.

view more: next ›

bsergay

joined 2 months ago