Subgraph OS - Secure Linux Operating System for Non-Technical Users

Anonymous Coward
in security on (#1XX2X)
story imageFriday, March 04, 2016 Swati Khandelwal

Article in Full w/ Screenshots:

"Subgraph OS[1] is a feather weighted Linux flavor that aims to combat hacking attacks easier, even on fairly low-powered computers and laptops.

Subgraph OS comes with all the privacy and security options auto-configured, eliminating the user's manual configuration."

"Subgraph OS offers more than just kernel security. The Linux-based operating system comes with a slew of security and privacy features that its developers believe will be more accessible to non-technical users.

The OS also includes several applications and components that reduce the user's attack surface. Let's have a close look on important features Subgraph OS provides."

1. Automated Enhanced Protection with Application Sandboxing using Containers
2. Mandatory Full Disk Encryption (FDE)
3. Online Anonymity - Everything through Tor
4. Advanced Proxy Setting
5. System and Kernel Security
6. Secure Mail Services
7. Package Integrity

"Subgraph OS also provides an alternative way to trust the downloaded packages. The packages are to be matched against the binaries present in the operating system's distributed package list, thus becoming a finalizer.

Recently Backdoored Linux Mint hacking incident is an example to this.

Thus, Subgraph OS eliminates the usage of any tampered or malicious downloaded packages."

"How to Download Subgraph Os?

Subgraph Os will be available for download via its offical website. Let's wait for the operating system to get unveiled in Logan CIJ Symposium conference in Berlin on March 11-12 to experience the Cyber Isolation!!!"


Secure vs. security (Score: 2, Informative)

by on 2016-10-13 23:45 (#1Y0XG)

The feature list listed here seems aimed at providing the user security, rather than offering a secure OS.

I don't doubt that they have added things to help with being secure — like the listed sandboxing — but none of the rest of the list really strikes me as being geared towards a secure, locked down, OS. When you throw in things like "advanced proxy settings" and "everything through TOR" and "mandatory full disk encryption" this all seems to be targeted at the paranoid rather than those who genuinely require security (web servers, mail servers, etc.).

As far as the paranoid go, sure, use it; it probably can't beat Tails though.
Post Comment
What is Lisa's name?