![]() Moreover, Hyperbola put high emphasis on Keep It Simple Stupid (KISS) methodology. v0.1 of Hyperbola was the first and the last version to support Systemd. Most importantly, Hyperbola is also one of the distributions without Systemd init system.Įven though the Systemd is widely adopted by major Linux distributions like Ubuntu, Hyperbola replaced it with OpenRC as the default init system. It was based on Arch Linux snapshots combining Debian development.īut, unlike Arch having a rolling release model, Hyperbola GNU/Linux-libre follows a Long Term Support (LTS) model.Īlso, instead of a generic Linux kernel, it includes GNU operating system components and the Linux-libre kernel. Subsequently, the first stable version of Hyperbola GNU/Linux-libre arrived in July 2017. (You have to get really, really, really owned for an attacker who compromised Qubes to then compromise Ubuntu.Back in April 2017, the Hyperbola project was started by its six co-founders with an aim to deliver a lightweight, stable, secure, software freedom, and privacy focussed operating system. Keep in mind that if you’re booted into Ubuntu and you get owned, it’s possible for the attacker to then compromise Qubes. You should be able to adopt this same technique to dual-boot pretty much any two GNU/Linux distros with disk encryption. So here are instructions for how to dual-boot Qubes R2 rc1 and Ubuntu 14.04 LTS, using disk encryption for both. You normally don’t have any reason to do this, except for very specific cases, like software development with Vagrant. ![]() You also can’t run VirtualBox inside of Qubes. And Qubes VMs don’t support 3D acceleration, which you might occasionally need. It’s hard to get certain hardware working the way you expect in Qubes, like webcams or non-disk USB devices. Qubes is my preferred operating system, but occasionally you need to run something else. Basically, it’s designed to be an easy-to-use Linux distro that’s extremely secure.ĭual-booting Qubes and Ubuntu with Encrypted Disks Subgraph OS also includes the Subgraph Firewall, an application firewall similar to Little Snitch for macOS - something that’s pretty awesome, and hasn’t really existed in the Linux ecosystem before. It uses a grsecurity Linux kernel, and many apps run in “oz sandboxes”, a homebrew sandbox solution that protects you even if an attacker manages to exploit a bug in one of these apps. Subgraph OS is an “adversary resistant computing platform.” It’s similar to Tails in that it’s based on Debian and all traffic is forced through Tor (that’s changing though: there’s now basic support for clearnet Chromium and OpenVPN). I had only briefly messed with it before, and there’s no better way to learn about a new operating system than by forcing yourself to actually use it for a few days. My primary laptop runs Qubes, but this time I decided to install Subgraph OS on my travel laptop. Before trips like this, I prepare a separate travel computer, only bringing with me data and credentials that I might need during my trip. I recently traveled to Amsterdam to attend a meeting with Tor Project staff, volunteers, and other members of the wider Tor community. Breaking the Security Model of Subgraph OS
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |