[ a / b / cf / cy / g / lain ] [ fresh / meta ] [ home / rules / faq / affiliates ]

/g/ - Technology

Programming and Electronics
Name
Subject
Comment
File
Embed
Password (For file deletion.)

Hop in to our IRC channel! #wirechan@rizon.net

File: 1603626092313.jpg (231.07 KB, 739x1000, 1465730450413.jpg)

 No.425

I wanted to use linux for everyday use while windows for gaming, so i dual booted manjaro and windows 10, but the parititon for manjaro is only 2gb and i cant increase it around 100gb, so now im going to use windows 10 for everything else normally while linux manjaro for tor browsing and wasting time ricing it up but i still want privacy + security on my linux so what should i know, install, or do in order to not be spied on by glowies?

 No.426

It sounds like you could use Qubes OS, Whonix, Tails, or some combination thereof.

 No.431

Why not install WINE or even use Steam Proton?

 No.433

Why can't you resize the partition?

 No.434

Resize your Windows partition and encrypt your linux partition with luks or something like that. Instead of default windows bootloader get grub ot refi

 No.435

shrink your windows partition and leave some space for linux. if it doesnt let you, it might be too fragmented

 No.561

File: 1613516063834.jpg (47.21 KB, 416x468, 1516166986546.jpg)

>>425
Basic security programs: icecat, anonsurf, onionshare, i2psnark, truecrypt 7.1a, KeepassXC.
Encrypt with luks. Add password to BIOS. Only store glowie shit on encrypted external drives. Use keepass to generate and store all passwords. Keep master pw in your head and no where else.
Good email providers: disroot and riseup. VPN of course.
Alternatively, do what >>426 said and keep tails on a bootable USB or create a partition for Qubes for fedposting purposes.

 No.562

Depending on threat model, making something like Manjaro "extremely secure" might be more trouble then it's worth. A lot of the hardening comes from the kernel and having the right dot files / configs in place to make best use of those features. Even if Manjaro offers hardened kernel in their repos, I'd imagine the OS might have to be tweaked a bit to take full advantage of it? And depending on how motivated the glow-in-the-darks are, hardware can also be a consideration. Many of the pros try and exploit the hardware as well as the software. Some red teams having designated driver experts writing custom exploits in assembly on a case by case basis.
These anons gave good advice
>>426
>Qubes OS, Whonix, Tails, or some combination thereof.
>>561
>Basic security programs…
There's also Kodachi live boot OS. I can't vouch for it since I haven't taken an in depth look at it, but it's a thing and thought it might be worth a mention ITT. Also, Parrot OS is an interesting project.
As an aside, one can even pick up some knowledge by looking at how Debian, and even Ubuntu, configure their distros. INB4 UBUNTU REEEEE! I know Ubuntu default desktop leaks meta-data and their implementation of systemd is bloated and would require a thread unto itself. I'm only referring to the fact that Debian and Ubuntu are commonly deployed as servers and have some sensible defaults in that regard that might be useful for some to look into.
Also, building upon a basic Alpine install is another interesting option. Potential to have something with a very small attack surface and somewhat of a security by obscurity factor compared to other distros.



[Return][Go to top] [Catalog] [Post a Reply]
Delete Post [ ]
[ a / b / cf / cy / g / lain ] [ fresh / meta ] [ home / rules / faq / affiliates ]