1 00:00:00,250 --> 00:00:06,240 And it's like I'm going to run through some of the hard core security focused areas where security is 2 00:00:06,240 --> 00:00:13,280 top priority over everything else which makes them some watts or unusable for general use. 3 00:00:13,280 --> 00:00:15,280 It really depends on what it is you do. 4 00:00:15,360 --> 00:00:22,410 But these are the hard core security folks operating system so first is cubes where security is implemented 5 00:00:22,410 --> 00:00:30,120 through isolation and compartmentalization using virtualization and it is my recommended choice for 6 00:00:30,120 --> 00:00:32,500 hard core security Wes's. 7 00:00:32,610 --> 00:00:38,210 This is the top choice essentially good for security privacy and anonymity. 8 00:00:38,390 --> 00:00:43,530 And there are negatives though on the negative side it is hard to get some hardware working with which 9 00:00:43,590 --> 00:00:46,940 is a shame but that is simply the nature of it. 10 00:00:46,980 --> 00:00:52,770 If you are going with free and open source software I use the Liberty laptop which you can see a link 11 00:00:52,770 --> 00:00:56,900 to here which works fine but other laptops can struggle. 12 00:00:56,910 --> 00:01:01,600 There is a hardware compatibility list but I won't go into more detail as we actually cover cubes. 13 00:01:01,600 --> 00:01:04,010 OS in its own entire section. 14 00:01:04,170 --> 00:01:05,690 So check that out. 15 00:01:05,700 --> 00:01:12,210 There is also a sober graph OS and other Debian based Linux distribution because Debian is a solid base. 16 00:01:12,210 --> 00:01:18,210 It features security hardening which makes it more resistant to security vulnerabilities. 17 00:01:18,210 --> 00:01:25,260 Subgraph runs many desktop applications in a security sandbox to limit their risk in case of compromise 18 00:01:25,560 --> 00:01:26,390 by default. 19 00:01:26,400 --> 00:01:29,880 Anonymize is Internet traffic by sending it through the toll network. 20 00:01:30,060 --> 00:01:33,370 So it's good for security privacy and anonymity. 21 00:01:33,510 --> 00:01:36,110 Another one you can look at is Trip school. 22 00:01:36,180 --> 00:01:42,580 The project aims for a fully free software system without proprietary software or firmware and uses 23 00:01:42,580 --> 00:01:48,520 the Linux Libera version of the Linux kernel with the non-free code binary blobs removed. 24 00:01:48,540 --> 00:01:52,350 It has also hardened Gentoo Linux hadan Gentoo. 25 00:01:52,380 --> 00:02:00,020 Purpose is to make Gentoo a viable OS for highly secure highly stable production server environments. 26 00:02:00,330 --> 00:02:04,440 You can also check out pure OSS that's developed by the purism guys. 27 00:02:04,440 --> 00:02:11,250 The hardware guys who create the Librium laptops and Libera hardware that has security and privacy focus 28 00:02:11,640 --> 00:02:13,890 using the free liberal software. 29 00:02:13,890 --> 00:02:21,630 That's pure pure OSS worth a mention is Astra Linux which the Russians use it's a Russian Linux based 30 00:02:21,630 --> 00:02:27,450 computer operating system developed to meet the needs of the Russian armed forces and intelligence agencies. 31 00:02:27,450 --> 00:02:31,730 Another thing worth mentioning is as the Linux or security enhanced the next. 32 00:02:31,830 --> 00:02:37,150 This is actually just a Linux kernel security module not a distribution. 33 00:02:37,230 --> 00:02:43,710 It provides a mechanism for supporting access control security policies including mandatory access control. 34 00:02:43,710 --> 00:02:46,530 We will talk more about that in later sections. 35 00:02:46,530 --> 00:02:52,290 There are a number of pure security addresses but these are the main ones worth mentioning cubes OS 36 00:02:52,650 --> 00:02:54,650 being my recommended choice.