This article is for people who want more online privacy and security. If you are in a hurry to find your distro, skip ahead to “How to Choose Your Best Linux Privacy Distro.”
Why is Linux better than Windows or macOS?
Independent security experts favor Linux over either Windows or macOS, explaining all the reasons why is an article in itself. We’ll touch on two of the big reasons most pros favor Linux over Windows and macOS, then zoom in on Linux distros.
Two of the biggest reasons experts say Linux is more secure than Windows or macOS are that Linux:
- Is Built on Open Source Software
- Is a “Small” Target for Hackers
Linux is Built on Open Source Software
The code that Linux is built on is open-source software. That means anyone can read or modify the code. While that may sound like a privacy nightmare, it is actually the opposite. Independent programmers from all over the world work on Linux code. That makes it almost impossible for a bad actor to add malicious code to Linux without someone seeing it.
Contrast this to proprietary operating systems like Windows or macOS. The proprietary source code is controlled by the company and hidden from outsiders. If you use a proprietary operating system, you have to trust the company. Will they ensure that no malicious code gets added by outsiders? Will they add malicious code themselves?
Windows 10, for example, has code in it that records all sorts of information about how you use your computer. Microsoft inserted this code intentionally to gather this information for their own use. In the Linux world, a small army of programmers guards the source code against this kind of behavior.
Linux is a “Small” Target for Hackers
According to Statistica, in 2017, there were over 1.3 billion users of Microsoft Windows in the world. They also stated there were over 170 million users of MacOS 10.
What about Linux? Around 28 million users. In other words:
- There are about six times as many MacOS users as Linux users.
- There are almost 50 times as many Windows users as there are Linux users.
If you were a hacker, which target would you choose? The 1.3 billion Windows users or the 28 million Linux users?
Social Engineering May Be the Biggest Threat of All
While the operating system you use is important to your online privacy, social engineering might be an even bigger threat than some piece of malicious software.
“The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.” – Kevin Mitnick, Internet security expert and “world’s most famous hacker.”
Bad guys of all types use social engineering techniques to get around the protections built into your operating system. They take advantage of your trusting nature or curiosity to trick you into giving them the information they want.
See this article to learn about various social engineering attacks and how you can protect yourself from them.
Okay, so what exactly is Linux?
We’ve been talking about Linux and how it differs from Windows and macOS. But we haven’t said exactly what Linux is. Let’s do that now.
Linux is a family of free and open-source operating systems. It is based on core software called the Linux Kernel. Because the Kernel is free and open-source, anyone can use it to create their own version of Linux. When someone bundles together the Kernel and the rest of the software to make a fully functional operating system, it is called a Linux Distribution, or Linux Distro.
Developers have created hundreds of Linux Distros for a wide range of purposes. Some can replace Windows and macOS on the typical user’s desktop computers. Others run everything from the print server in your office to the most powerful supercomputers. Even the Android operating system running your smartphone is based on Linux.
While it is cool that Linux is used in so many places, that doesn’t help us much right now. So for the rest of this article, we’ll concentrate on Linux Distros that run on personal computers and are used for typical personal activities. We’ll ignore the versions running on smartphones, supercomputers, and other places.
Pros and Cons of Moving to Linux from Windows or macOS
|Most Linux Distros are free.||Support can be limited/disorganized.|
|Linux is considered more secure.||Most of the world runs Windows or macOS.|
|There is a Linux Distro for virtually any use case.||The most popular software runs on Windows.|
|There are free and open-source programs that work like most popular Windows programs.|
|Less malware is written for Linux.|
|Linux Distros are usually faster/more efficient.|
How to Choose Your Best Linux Privacy Distro
Choosing the best privacy distro is a personal thing. Perfect privacy is impossible to guarantee. And the greater the privacy you want, the more tradeoffs you will need to make.
In an ideal world, all our Personally Identifiable Information (PII) would be private. We would control who gets to see our information. The same goes for records of what we do and where we go when online.
Instead, all sorts of groups are trying to get their hands on this information for their own uses. You have to decide how much online privacy you need and how much you are willing to sacrifice to get that privacy.
The most popular operating systems and programs usually have the weakest privacy protections. But they also work with the most websites and have the most support. This makes them ideal targets for the bad guys.
Worse, the makers of these operating systems and programs often want your PII for their own uses. Remember the uproar when people saw what data Windows 10 collects about its users?
Moving to a Linux Distro eliminates many privacy and security problems. That said, every distro has its strengths and weaknesses. Read on to learn about several popular Linux Distros and the kind of privacy they give you.
Regular Linux Distros for Basic Privacy
If you use Windows or macOS, you can boost your privacy simply by moving to Linux. In this section, we’ll look at the privacy strengths and weaknesses of three popular Linux Distros.
Ubuntu is the most popular desktop Linux Distro. It is supported by a company called Canonical Ltd. Canonical funds development of Ubuntu with money earned, providing Ubuntu support to businesses. Unfortunately, Ubuntu has a spotty record when it comes to user privacy.
In 2012, Ubuntu recorded what users searched for in the files on their computers. It then sent that information to Canonical. Canonical used the information to run targeted Amazon ads on the user’s computer.
This prompted Richard Stallman, President of the Free Software Foundation, to call for the free software community to shun Ubuntu for spying on its users. Canonical eventually disabled this monitoring after much public pressure.
In 2018 Ubuntu began collecting a range of data from user’s computers and sending it back to Canonical. They say the data is anonymized, but the fact that they began collecting the data upset a lot of people. So did the way they set things up. New installations of Ubuntu 18.04 were set up to collect and send the data. Users should have to opt into giving up their data, not opt-out of Canonical taking it automatically.
Given this history, we recommend you look at other Linux distros if you value your privacy.
Linux Mint is perhaps the version of Linux that Windows users will find easiest to adjust to. In particular, Linux Mint Cinnamon looks and feels much like Windows 7 did.
But what about privacy? This could have been a problem since Linux Mint is built on Ubuntu code. However, in their April 2018 newsletter, the Linux Mint team announced, “Ubuntu ships with “ubuntu-report,” which collects metrics and usage data. This package won’t be present in Linux Mint, and no data will be collected or sent.”
While Linux Mint doesn’t have the potential privacy issues that Ubuntu does, it certainly doesn’t provide the ultimate in privacy protection. Among other things, while it comes with all open-source software by default, Linux Mint does allow you to install proprietary video drivers and other software. This increases the risks to your privacy.
Linux Mint also uses unencrypted, non-anonymized connections to the Internet by default. This gives you the maximum in compatibility with websites and other online resources. But it leaves you exposed to all sorts of snooping unless you install and correctly configure tools like a VPN of Tor.
But if you are looking for a more private open-source operating system that’s easy to switch over to from Windows, Linux Mint could be a good option. One of our team has been using Linux Mint for several years now on multiple computers and remembers the switchover from Windows 7 as being very easy.
Debian is a Linux Distro that offers significant privacy improvements over Ubuntu or Linux Mint. But those improvements come at the price of some compatibility issues. Debian does not support any proprietary drivers or other components. This means that some popular commercial software won’t run on Debian.
On the other hand, the Debian community has created open source replacements for most any proprietary product you might need. As we said, there is some tradeoff of convenience for privacy.
Debian ships with Firefox-ESR (Extended Support Release) as its web browser. The personal version of Firefox ships with Ubuntu and Linux Mint. Firefox-ESR doesn’t include some of the privacy-threatening features that the personal version has. This makes the ESR version safer, but it may not work with some websites.
Emphasizing the Debian focus on user security and privacy, the team maintains a very detailed,
“step-by-step guide for setting up a personal computer with Debian from scratch to a fully configured system with high security, usability, convenience, and privacy protection.”
This SecurePersonalComputer guide is designed to help you go as far as you wish in securing your system from basic installation to advanced topics like:
- Installing the OpenVPN client and using it with a commercial VPN service
- Hardening the Linux Kernel against attacks
- Installing an Intrusion Detection System and Security Auditing Tools
- Installing Electrum, a free and open-source Bitcoin wallet
If you are looking for solid privacy and are willing to put up with some inconvenience and incompatibilities with the latest and greatest stuff on the Internet, Debian could be the Linux Privacy Distro for you.
Specialized Linux Distros for Privacy, Anonymity, and Security
The following three Linux Distros are specialized ones for people with more serious privacy needs.
Tails (The Amnesic Incognito Live System) is a Linux Distro designed to keep you anonymously and safe while online. So what’s with the crazy name? It will actually make sense if we look at each piece in reverse order:
- Live System – A live system is an operating system that can runs from a USB Stick or DVD without being installed on the computer where it is running. A live system is also sometimes called a live OS.
- Incognito – Tails uses the anonymous Tor network to connect to the Internet. Only the most powerful adversaries have the money and tech to defeat the Tor network. That means Tails can travel the Internet “incognito.”
- Amnesic – Tails does not leave any traces of its presence on the computer you are using. Not only that, but by design, Tails itself doesn’t remember anything either. All the data from your current session in Tails is in the RAM of the computer you are using. As soon as you power down the computer, everything is forgotten, making Tails “amnesic.”
Just from decoding the name, we can see that Tails is off to a good start when it comes to protecting your privacy. Beyond those in its name, Tails has these additional privacy features:
- Tails are based on Debian, itself a strong privacy distro.
- Tails comes with state of the art encryption tech built-in, including PGP and OTR support, automatic HTTPS, the KeePassX password manager, and much more.
With all this built-in privacy and anonymity in a mobile, use-anywhere package, Tails far surpasses distros like Linux Mint and even Debian. In case you’re still not convinced that this is a powerful Linux Privacy Distro, you should know that Edward Snowden used Tails to keep himself safe when he was passing NSA secrets to reporters a few years ago.
This doesn’t mean that Tails is foolproof. Researchers find security issues in Tails from time to time. The Tails team fixes them, of course, but there is no guarantee that all the possible issues have been found and fixed.
How safe you are when using Tails (or any other privacy distro) depends in part upon who wants you, and how badly they want you. If you want to protect yourself from a typical threat (you ex’s lawyer perhaps), Tails is likely more than sufficient.
But if you want to protect yourself from a global adversary (like the NSA) who wants you really badly, it isn’t clear that Tails is sufficient to save you. To help you understand the risks, the Tails team has a page dedicated to warnings.
To summarize, if you need robust privacy protection, and you’re not being pursued by the NSA, the 5 Eyes, or some other gigantic adversary with a global reach, Tails could be your answer.
While you are running a live system like Tails, it is the only operating system running on your computer. You don’t have to worry about the security of the operating system and programs that usually run on the computer.
At the same time, running from a live system has drawbacks. You are limited to the software that comes with the live system. This software is designed to give you privacy but usually doesn’t include the latest features and technologies.
Normally, a live system like Tails won’t even keep data from session to session (remember the Amnesic part of the name). Setting up a Persistent Storage partition gives Tails the ability to remember data from session to session, but introduces its own security vulnerabilities.
Whonix isn’t a live system. It typically runs as two VirtualBox virtual machines (VMs) on top of the computer’s normal operating system. It relies on the VirtualBox virtualization program to keep the software running in Whonix isolated from the rest of the software on the computer.
Like Tails, Whonix is based on a modified version of Debian.
Whonix protects you by dividing communications and your workspace between the VMs. Whonix-Gateway is the communications part of the system. It uses the Tor network to handle all connections with the outside world. The other VM is called Whonix-Workstation. This VM comes with common applications that are installed and configured and ready to run. You do all your work within the Workstation VM.
Because it uses VirtualBox VMs, Whonix can run on the vast majority of computers. You can work in the secure Whonix Workstation and still use the computer normally. This is convenient but dangerous.
Have you ever accidentally typed in the wrong window on your computer? Imagine doing this on a computer running Whonix. Only the software running in the Workstation VM is secure. The software outside Whonix is just as vulnerable to spyware, keyloggers, and other spying as ever.
And remember, any programs using the Whonix Gateway communicate through Tor. But programs running outside Whonix do not. Your ISP and anyone else who happens to be monitoring your computer will be able to see these communications.
We think Whonix by itself is risky due to running on the (probably insecure) regular operating system of the computer you use it on. However, there is a pretty elegant solution to this problem. We’ll tell you about it shortly. But before we do, we need to talk about Qubes.
With much of the Western security apparatus (spy agencies) out to get him, Edward Snowden is one guy who has to stay on top of Internet privacy and security. As you just saw, Snowden used Tails when he was first leaking information from the NSA.
But Edward Snowden has stopped using Tails and now relies on the Qubes OS. While the Qubes team bills their product as “a reasonably secure operating system,” Snowden and other experts take it much further:
Qubes protect you using the “Security by Isolation” approach. Using Qubes, you define security domains, each of which runs in a virtual machine. This lets you isolate programs and even components of Qubes from each other. Things running in one security domain can’t affect things running in other domains.
Say you use a normal computer for personal banking. But you also use it to visit dodgy websites sometimes. If something on one of those dodgy websites manages to compromise your computer system, everything on it, including your banking information, is at risk.
What if you were running Qubes? You would likely have one security domain for banking, and another for visiting those dodgy websites. Now, if something from one of those sites compromises your computer system, it can only touch things in the same security domain. Your banking information stays safe.
To make this all happen, Qubes replaces your old operating system with the Xen hypervisor. The Xen open source, type-1 hypervisor runs on bare metal. In other words, it runs directly on your computer’s hardware.
Because Xen doesn’t run on top of Windows or some other operating system, it is fast and efficient. It also eliminates the risk that the underlying operating system might be compromised (since there is no underlying operating system).
As far as each security domain virtual machine (called an AppVM in Qubes documentation) can tell, it is its own separate operating system. Most AppVMs run Linux, but there is support for Windows AppVMs too. Qubes provides tools for securely passing data from one domain to the other.
As you can see, Qubes is quite a step up in complexity from even Tails or Whonix. At the same time, Qubes itself doesn’t provide anonymity or privacy. To add these capabilities, people sometimes run Whonix inside of Qubes or Tails inside of Qubes.
If high-end privacy protection is what you need, and you are willing to make a radical shift in your computing environment, Qubes could be your answer.
How much privacy do you really need?
Choosing the best Linux Distro for your own privacy is a balancing act. Each of the Distros we’ve looked at here offers a different balance of privacy vs. convenience.
We suggest you start by picking the Linux Privacy Distro that looks like the best fit for you. Read the detailed review you’ll find on this site or dive right in and test it out for yourself.
Robinhood Testing New Cryptocurrency Wallet as Demand Rises
The millennial-focused trading portal is edging closer to launching a long-awaited app that will enable its growing user-base to send and receive cryptocurrencies.
A beta version of Robinhood’s iPhone app showed the company’s latest upgrades on the new digital asset features, according to Bloomberg.
There is a hidden image showing a waiting list for users eager to get their hands on the app and code referring to crypto transfers, it added.
Delving Deeper into Crypto
Robinhood users can already buy and sell cryptocurrencies on the platform but they need to convert them to and from USD. With a native app, users will be able to send crypto assets to each other directly and set up two-factor authentication for additional security.
Robinhood Chief Executive Officer Vlad Tenev stated that adding crypto wallets is a priority for the company’s developers and they are actively working on such.
“The ability to deposit and withdraw cryptocurrencies is tricky to do with scale, and we want to make sure it’s done correctly and properly.”
He did not specify a launch date, but the beta app leak suggests it is not too far away. Users of the new functions will need to activate crypto sending and receiving and the registration page will require an identity check, the report added.
On Sept. 11, CryptoPotato reported that Robinhood had launched incentives to promote longer-term cryptocurrency investing. The zero-fee recurring purchase feature enables users to schedule digital asset purchases for regular intervals with buys as low as a dollar.
This will encourage customers to build their cryptocurrency portfolios over time and “become a whole coiner,” stated Robinhood.
Robinhood Users Hungry For Crypto
Cryptocurrency trading has been one of the biggest drivers of revenue for Robinhood this year. Dogecoin has been the crown jewel, according to the company. It reported that 62% of its $233 million in second-quarter crypto income came from DOGE trading.
It added that more than half of all transaction-based revenue on the platform came from digital asset trading. The firm did warn that Q3 would not be as prosperous due to “seasonal headwinds and lower trading activity across the industry.”
Robinhood share prices have already fallen 43% since their all-time high of a little over $70 in early August. They are currently trading down 1.68% since Monday’s open at $40.70 according to Yahoo! Finance.
PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Snoop Dogg Reveals His Connection With Twitter Account on NFTs
Rate this post American rapper Snoop Dogg tweeted on Monday that he’s the owner of a Twitter account that talks about nonfungible tokens (NFTs). The account, named @CozomoMedici, shares “insights and tales from the wild world of NFTs” and has 27.7K followers at the moment. Snoop Dog Claims to Be Popular NFT Advocate on Twitter Snoop Dogg left the crypto community stunned this week after he revealed himself as the owner of a Twitter account dedicated to NFTs. The account Cozomo de’ Medici, named after an Italian banker, is only a month old. However, it has already garnered attention from industry watchers and even a mention from crypto-focused news outlet The Block. According to The Verge, the person behind the Medici account had been creating hype around their real identity for “at least a few days” and even conducted a poll for their followers to take a guess. The poll featured Democratic congresswoman Alexandria Ocasio-Cortez and Matt Bellamy, the lead singer of the rock band Muse. Snoop, however, was not mentioned in the poll. On September 20, @CozomoMedici tweeted that they were about to reveal their identity from their account. Shortly after, Snoop Dogg tweeted “I am @CozomoMedici.” Interestingly, after making this revelation, the Medici account bought two weed-themed collectibles from an artist named NyanDogg, The Verge reported. Additionally, Snoop’s alleged OpenSea account has been sent “a cloud of blunt and Snoop-themed NFTs” following the reveal. Is Medici Account an Elaborate Prank? The Medici account could likely turn out to be an elaborate prank, one that Snoop might have engineered himself or just participated in. Many reactions to Medici’s reveal have also expressed skepticism about Snoop’s involvement. “I have a hard time accepting that this account is Snoop Dogg. Like seriously Snoop Dogg muted his live stream for a week (?) by accident. And he is that deep into NFTs out here owning crypto punks… Owning Eth using OpenSea. Would love that to be true but I can’t believe it,” Twitter user @Brandolf485 wrote in the comments. Nonetheless, the crypto community will have to continue looking for concrete proof till Snoop’s involvement with the account is confirmed.
The post Snoop Dogg Reveals His Connection With Twitter Account on NFTs appeared first on Cryptoknowmics-Crypto News and Media Platform.
American rapper Snoop Dogg tweeted on Monday that he’s the owner of a Twitter account that talks about nonfungible tokens (NFTs). The account, named @CozomoMedici, shares “insights and tales from the wild world of NFTs” and has 27.7K followers at the moment.
Snoop Dog Claims to Be Popular NFT Advocate on Twitter
Snoop Dogg left the crypto community stunned this week after he revealed himself as the owner of a Twitter account dedicated to NFTs.
The account Cozomo de’ Medici, named after an Italian banker, is only a month old. However, it has already garnered attention from industry watchers and even a mention from crypto-focused news outlet The Block.
According to The Verge, the person behind the Medici account had been creating hype around their real identity for “at least a few days” and even conducted a poll for their followers to take a guess. The poll featured Democratic congresswoman Alexandria Ocasio-Cortez and Matt Bellamy, the lead singer of the rock band Muse. Snoop, however, was not mentioned in the poll.
On September 20, @CozomoMedici tweeted that they were about to reveal their identity from their account. Shortly after, Snoop Dogg tweeted “I am @CozomoMedici.”
Interestingly, after making this revelation, the Medici account bought two weed-themed collectibles from an artist named NyanDogg, The Verge reported. Additionally, Snoop’s alleged OpenSea account has been sent “a cloud of blunt and Snoop-themed NFTs” following the reveal.
Is Medici Account an Elaborate Prank?
The Medici account could likely turn out to be an elaborate prank, one that Snoop might have engineered himself or just participated in. Many reactions to Medici’s reveal have also expressed skepticism about Snoop’s involvement.
“I have a hard time accepting that this account is Snoop Dogg. Like seriously Snoop Dogg muted his live stream for a week (?) by accident. And he is that deep into NFTs out here owning crypto punks… Owning Eth using OpenSea. Would love that to be true but I can’t believe it,” Twitter user @Brandolf485 wrote in the comments.
Nonetheless, the crypto community will have to continue looking for concrete proof till Snoop’s involvement with the account is confirmed.
PlatoAi. Web3 Reimagined. Data Inteligence Amplifed.
Click here for Free Trial.
TA: Ethereum Breaking This Confluence Resistance Could Spark a Recovery
Ethereum started a major decline below the $3,200 support zone against the US Dollar. ETH price traded as low as $2,807 and it is now attempting a recovery wave.
- Ethereum started a fresh decline below the $3,300 and $3,200 support levels.
- The price is now trading below $3,200 and the 100 hourly simple moving average.
- There is a key bearish trend line forming with resistance near $3,020 on the hourly chart of ETH/USD (data feed via Kraken).
- The pair could a steady recovery wave if there is a close above $3,050 in the near term.
Ethereum Price Corrects Losses
The bears gained strength below the $3,200 support zone. Finally, ether spiked below $3,000 and extended its decline. A low is formed near $2,807 and the price is now correcting losses. There was a break above the $2,920 and $2,950 resistance levels.
The price recovered above the 23.6% Fib retracement level of the recent decline from the $3,455 swing high to $2,807 low. An immediate resistance on the upside is near the $3,020 level. There is also a key bearish trend line forming with resistance near $3,020 on the hourly chart of ETH/USD.
Source: ETHUSD on TradingView.com
A close above the $3,020 and $3,050 levels could start a decent recovery. The next major resistance might be near the $3,130 level. It is near the 50% Fib retracement level of the recent decline from the $3,455 swing high to $2,807 low. A clear break and close above the $3,130 level could start a steady increase. The next major resistance sits near $3,300.
More Losses in ETH?
If ethereum fails to correct higher above the $3,020 and $3,050 resistance levels, it could start another decline. An initial support on the downside is near the $2,960 level.
The next major support seems to be forming near the $2,900 level. A downside break below the $2,900 support zone could lead the price towards the $2,800 zone. The next major support is near the $2,750 level, below which ether price might decline towards the $2,640 support zone.
Hourly MACD – The MACD for ETH/USD is slowly losing pace in the bearish zone.
Hourly RSI – The RSI for ETH/USD is still well below the 50 level.
Major Support Level – $2,960
Major Resistance Level – $3,050
PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Swissquote Confirms European Expansion Plan, Focusing on Crypto
Bingbon Launches its Carbon Free and Afforestation Project
Massive NFT and Token Giveaway from Polker as Staking is Announced!
Nickelodeon All-Star Brawl will include DLC fighters post-launch
Gods Unchained and Guild of Guardians Layer 2 Solution Immutable Raises $60 Million
Over 40 days after Ethereum’s EIP-1559, here’s where it stands
Opensea NFT marketplace Accuses Senior Employee of Insider Trading
Grab a spot in Tomi’s presale by bagging an NFT – 260+ ETH raised!
Kanga Exchange Partners with Tenset for an Exclusive Public Sale of KNG Token
Cardano Sees an Influx in Smart Contracts ! But There’s a Twist
If Shiba Inu is a ‘shitcoin,’ why are exchanges still listing it
Over $1B Worth of ETH Burned in the Aftermath of Ethereum’s London Upgrade
Ethereum, NEO, Dogecoin Price Analysis: 16 September
NBA 2K22 Limitless Spot-Up and Chef Badges Explained
MicroStrategy Issues a Response to FASB’s 2021 ‘Invitation to Comment’
Laos Green-Lights Cryptocurrency Trials
Bitcoin Cash: A 40% hike may be incoming from this setup
DeFi comes to Cardano (ADA) as EMURGO announces ‘Astarter’
Tether Claims to Hold no Commercial Paper From Struggling Evergrande
Bitdefender Releases Tool To Decrypt Files Affected by REvil/Sodinokibi Ransomware
Uncategorized1 week ago
Fortnite says goodbye to season 7 with an alien ship, explosions, and a cliffhanger
Blockchain1 week ago
SBI-acquired TaoTao exchange in Japan relists XRP
News1 week ago
PUBG Mobile becomes the most earning game in August 2021
Uncategorized1 week ago
The best rookies in NBA 2K22
Blockchain1 week ago
Cardano Finally Ousting Ethereum? — Expect The Unexpected As Alonzo Hard Fork Kicks Off
Uncategorized1 week ago
All Maps in Battlefield 2042
Blockchain1 week ago
Polygon invests in Decentral Games to take Play-to-Earn gaming mainstream
Uncategorized1 week ago
Bjergsen reportedly returning to pro play for 2022