I understand, it's just a Xen VM, but how is this any more secure than the default Whonix within Ubuntu? Does Qubes provide AppArmor profiles for...
@mirimir Thinkpads are solid. Yes BIOS passwords like the supervisor or power-on can easily be removed by shorting the BIOS chip upon bootup,...
I'd just like to point out that Whonix within Qubes probably doesn't offer much more security than Whonix in Ubuntu/Debian since Xen and...
You need a strong understanding of networking and Linux server administration, and a good amount of knowledge of cryptography. A little more than...
I second roger_m about Thinkpads, although Dell Latitudes are nice too. I would stick with second-gen i5 or newer since there was a big...
Pretty much, this is how hardware encryption is normally implemented, I don't understand your skeptical tone. What I can tell you is that...
@mirimir Most of that is probably true, although I don't think many normal people just start smuggling drugs out of the blue unless they were in...
Any standard corporate laptop made since the first-gen of i5/i7 was released should have the feature, typically it's called "Secure Chip" in...
@mirimir Well I was referring to that old story about their founder being a federal drug informant and animal "lover," not exactly the type of...
The encryption is handled between the SSD controller and the TPM chip, it's completely independent of the contents of the SSD. So it can be used...
From my understanding of the article, this method relies on the presence of a 128mb unencrypted MBR on the SSD, which could potentially be altered...
@deBoetie I believe that there is a huge distinction between passively logging and archiving all of your web traffic because you visit the wrong...
You're right, I hadn't yet read the news regarding the compromise of the key exchange upon which the security of both protocols depends. Still, I...
@mirimir I read through the CIN paper and it reminded me of the commercial malware made by Gamma, specifically this tool that is installed on an...
I didn't know that the Duck Dynasty guy was a hacker too :argh: I am dumbfounded how somebody with obvious talent (however misapplied) and...
Everybody and their mother have known that HideMyAss is awful for years now, shouldn't be surprising. What I find most concerning here is a...
I think what you've read is from several years ago, Core2Duo/Quad didn't have nested paging and other features present in most i5's/i7's dating...
@mirimir Agreed on everything but the Vbox --> QEMU idea. Two reasons, most importantly, the two share too much code for this to add to the...
@mirimir About the custom Pi top, I have a few questions/concerns- please take them as thoughts from a friend and not a criticism, I realize that...
You need to be clearer, I'm not sure what you just said. IMHO, online tests for DNS leaks are BS, use Wireshark to capture traffic on the first...
By recoverable I'm assuming you're asking whether anything would be readable from the hard drive if it were seized after the fact- definitely not...
The Pi setup is cool, novel, and probably very effective, but personally I need mobility. Physical hardening/security is critical, if you don't...
In order to enable hardware encryption, you need a TPM Security Chip, often not present in cheap consumer grade laptops as well as old ones. Your...
This isn't the direction I'd go in for added (but almost certainly unnecessary) security. First of all, using a LiveCD won't prevent exploits from...
Frankly, this is overkill. Whonix will never leak, short of a new exotic malware designed specifically to break through the Virtualbox hypervisor...
Separate names with a comma.