Stories
Slash Boxes
Comments

SoylentNews is people

posted by azrael on Sunday August 03 2014, @02:00PM   Printer-friendly
from the heads-tails-knees-toes dept.

"Whether it's the NSA exploiting weaknesses in encryption software, the holes in Tor making it less anonymous, or the major problems with Tails - vulnerabilities are constantly testing the security and anonymity of computer users.

But little known Montreal-based developers at Subgraph want to change all that, and have started working on a zero-day resistant Operating System (OS), protecting against infiltration.

Subgraph takes the approach that overall computer security is critical to anonymity, targeting protection against zero-day vulnerabilities, the types of weakness unknown to the developers while they're writing software."

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1) by dueckuwanga on Wednesday August 06 2014, @06:51PM

    by dueckuwanga (4615) on Wednesday August 06 2014, @06:51PM (#78157)

    the os is irrelevant.

    most systems are compromised at the hardware and network levels.

    the only safe firewall these days is a bomb shelter (no signal).

    not much choice in the public sector for secure hardware either.

    Are you trying to engender a sense of indifference to Internet security and privacy? Instead, I would advocate people either trust someone with [some of] their security measures, or get involved to some degree. Like getting involved in your car - some people can't be bothered to learn how to change their wiper blades, so is it pointless to get into that at all because, let's face it, they'll never be a master mechanic so why bother doing anything at all? Advocating a need for 100%-security (ultimate peace of mind that is a holy grail for paranoiacs) is also unbalanced.

    Users really implement their own security, opting to implement measures based on the effort involved and their motivation and aptitude. Each degree of data/process control, isolation, certainty that a user implements raises the threshold to, say, intercept, validate, database, and use that data against the user. "Against" here is nuanced too - from stolen identities to politically motivated harassment.

    Leave yourself more vulnerable at your increased risk; go down the Internet security rabbit hole to the depth your tether allows you (warning not to obsess).

    Gnome sane?