TL;DR - About switching from Linux Mint to Qubes OS from among various other options that try to provide security out-of-the-box (also discussed: OpenBSD, SculptOS, Ghaf, GrapheneOS)

  • non_burglar@lemmy.world
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    5 hours ago

    I don’t understand… Your motivation for a secure operating system was from an incident where you were nearly social engineered? How will a “more secure” os help you with that?

  • marcie (she/her)@lemmy.ml
    link
    fedilink
    arrow-up
    7
    ·
    16 hours ago

    I think Secureblue + GrapheneOS are the most reasonable choices imo. Qubes is highly hardware intensive for what it does, it will frustrate most people.

    • yazomie@lemmings.worldOP
      link
      fedilink
      arrow-up
      1
      ·
      7 hours ago

      It works decently with just 8 GB RAM, and I’m going to upgrade the RAM.

      Secureblue is based on sandboxing rather than paravirtualization, and I’m not sure that’s secure enough for me.

    • peskypry@lemmy.ml
      link
      fedilink
      arrow-up
      1
      arrow-down
      2
      ·
      7 hours ago

      Not only is it resource‑intensive, but Qubes also lacks Secure Boot and Wayland support. Secure Boot is critical to ensure the OS has not been tampered with, and Wayland is required to isolate individual apps running within a single VM from capturing input intended for other apps. For an average user, I would recommend SecureBlue rather than Qubes.

  • N.E.P.T.R@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    2
    ·
    17 hours ago

    I am excited to see Chimera Linux mature because iy seems like a distro which prioritizes a simple but modern software stack.

    Features of Chimera that I like include:

    • Not run by fascists
    • Not SystemD (dinit)
    • Not GNU coreutils (BSD utils)
    • Not glibc (musl)
    • Not jemalloc (mimalloc)
    • Proper build system, not just Bash scripts in a trenchcoat

    What I would like:

    • MAC (SELinux)
    • Switch to Fish over Bash (because it is a much lighter codebase)
    • Switch from mimalloc to hardened_malloc (or mimalloc built with secure flag). Sadly hardened_malloc is only x64 or aarch64
    • Hardened sysctl kernel policy
    • yazomie@lemmings.worldOP
      link
      fedilink
      arrow-up
      2
      ·
      6 hours ago

      Chimera is a nice alternative to Alpine, have you thought of sending this feedback to Chimera’s dev?

    • Kajika@lemmy.ml
      link
      fedilink
      arrow-up
      4
      ·
      edit-2
      11 hours ago

      What are the pros/cons of GNU coreutils vs BSD utils?

      EDIT : from their website : Desktop environment -> GNOME. What a choice, not for me.

    • yazomie@lemmings.worldOP
      link
      fedilink
      arrow-up
      1
      ·
      6 hours ago

      I actually forgot to mention it, but I was going to say anyway that sandboxing I deem less ideal than paravirtualization

  • N.E.P.T.R@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    18 hours ago

    What I want out of a secure Linux (or BSD) system is full (top-to-bottom) sandboxing of all components to enforce least privilege. I am want to learn how to make my own distro (most likely for personal use) which uses strong SELinux policies, in conjunction with syd-3 sandboxing, which seems like the most robust and feature rich, unprivileged sandbox in both the Linux/BSD worlds (also it’s totally in safe Rust from what i can tell).

    Another thing that I would love to make is a drop-in replacement for Flatpak that is backwards compatible but uses syd-3 instead. It has much better exploit protections than Bubblewrap, and is actually an OOTB secure sandbox. I dont know much about the internals of Flatpak, or how to use xdg-desktop-portal, but I am going to start more simple with a Bubblejail alternative. One major advantage of syd is that you can modify an already running sandbox, so theoretical you could show a popup that says something like “App1 is requesting microphone access.”, where you could toggle on without needing to restart the app.

    Need to get better at coding tho lol

    • yazomie@lemmings.worldOP
      link
      fedilink
      arrow-up
      1
      ·
      6 hours ago

      I’m all for a better Flatpak, but I’m on the fence with full-on usage of Rust, I’d wait for there to be a second Rust compiler. Otherwise, sandboxing might be enough for some users, but not exactly for me.

    • iopq@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      16 hours ago

      You can try to just make a hardened NixOS config. The only requirement is systemd to use NixOS options. Other components you can freely interchange.

    • yazomie@lemmings.worldOP
      link
      fedilink
      arrow-up
      2
      ·
      6 hours ago

      Thanks, Ironclad and Gloire look interesting for a RISC-V system, gonna try out at some point alongside CheriBSD