Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Monday April 07 2014, @09:44PM   Printer-friendly
from the but-do-we-trust-it? dept.

The US Department Of Defense (DOD) has released version 1.5 of their LPS (Lightweight Portable Security) OS. LPS is a highly secure CD/USB bootable OS based on a thin Linux client.

The LPS family was created to address particular use cases: LPS is a safer, general-purpose solution for using web-based applications.

LPS allows general web browsing and connecting to remote networks. It includes a smart card-enabled Firefox browser supporting CAC and PIV cards, a PDF and text viewer, Java, and Encryption Wizard. LPS turns an untrusted system (such as a home computer) into a trusted network client. No trace of work activity (or malware) can be written to the local computer. Any malware that might infect a computer can only run within that session. A user can improve security by rebooting between sessions, or when about to undertake a sensitive transaction. For example, boot LPS immediately before performing any online banking transactions. LPS should also be rebooted immediately after visiting any risky web sites, or when the user has reason to suspect malware might have been loaded.

The DOD provides two different versions available for download in the form of an ISO image: LPS-Public (281 MB), and LPS-Public Deluxe (440 MB). The Deluxe edition is the same as the Public, but also includes Libre Office and Adobe Reader.

A few of the recent updates to version 1.5 include:

  • Firefox v24 (With HTTPS Everywhere v3.4.5 and NoScript v2.5.8.14)
  • Adobe Reader v9.5.5
  • Libre Office v4.1.5
  • Pidgin v2.10.9
  • IPv6 support
  • Linux Kernel v3.10.22

LPS has been my favorite go-to tool when I am using a possibly compromised system, or even one that is just plain slow; pop in my keychain USB drive and reboot the computer, now I can do whatever I need without any worries of stolen passwords. I also occasionally use it to test the functionality of the hardware on systems that have a botched OS.

Are there any other great tools like this that you would suggest? What do you use?

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by tangomargarine on Tuesday April 08 2014, @02:24PM

    by tangomargarine (667) on Tuesday April 08 2014, @02:24PM (#28169)

    How would a home user even do that? I thought there were ways to get around all the BIOS-level protections e.g. drain/swap the CMOS battery.

    Unless you've always got an eye on your hardware, the hardware isn't safe, so we might as well give up on security.

    --
    "Is that really true?" "I just spent the last hour telling you to think for yourself! Didn't you hear anything I said?"
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 3, Insightful) by egcagrac0 on Tuesday April 08 2014, @04:28PM

    by egcagrac0 (2705) on Tuesday April 08 2014, @04:28PM (#28262)

    Just because someone can throw a brick through the window, that doesn't mean we shouldn't make a point of locking all the doors.

    Turning a doorknob is easy. Breaking a window and climbing in is slightly harder, but that difficulty may be enough to deter an attacker only looking for low-hanging fruit.

    Most of the time, you don't have to outrun the bear.

  • (Score: 0) by Anonymous Coward on Tuesday April 08 2014, @07:53PM

    by Anonymous Coward on Tuesday April 08 2014, @07:53PM (#28410)

    BIOS (firmware) and CMOS (SRAM) are completely different chips.

    -- gewg_