Connect with us

Tech News

Paranoid about internet security? Here are the most secure OS options

(BUSINESS NEWS) After all of the hacks and security breaches this year, Linux is a great option for OS security.

Published

on

linux

Internet security

After the Year of Datasec Fail, in the wake of breach after leak after hack, it’s time to cop to the fact that private data security is Serious Business.

bar
Private sector titans like Google, Facebook and Yahoo, not to mention the actual flippin’ US government, have demonstrated that, if there’s anything in your life you’d rather Vladimir Putin and/or the entire Internet not know about, you’d better spit on your hands, boot up your robot of choice, and take responsibility for your own infosec.

Sounds awful, doesn’t it?

The mere notion of handling your own information security (“infosec” to professional nerds like your narrator) conjures images of command lines, spaghetti code and whatever else it is tech types actually, yknow, do. If only there was an easy fix! A simple, widely applicable one-shot that would make your precious 1s and 0s safe forever.

There pretty much is. It’s Linux.

Superficially, using the famous open-source operating system might seem like the opposite of security. After all, the point of open-source is that anybody can look at and futz with the code. How is that compatible with “make everything hidden?”

But that’s the not-so-secret shame of tech

As we’ve ceded more and more of our lives to internet-enabled services, nothing is hidden. Cloud-based services like Google Docs and online-only offerings like Facebook and whatever Yahoo’s doing these days are accessible to everyone, everywhere. That’s the point. That’s their offer. “Accessible to everyone” is incompatible with “accessible only to nice people.”

The Linux fix is twofold.

First, old-school hackers (cue pounding 90s electronica soundtrack) still trading on invading your personal system generally don’t bother with Linux exploits. Windows and the traditionally safer Apple are bigger, more valuable targets. Second, 5 popular distros – that’s “particular flavors of Linux some noble white-hat nerds put together for you” – incorporate fixes for increasingly common Internet breaches of the kind that felled Facebook and Google.

Tails

Tails is a live OS, which means you can put it on a USB stick or disc, run it on any computer, and when you pop it out again the computer goes back to the way it was. Local hacks work by reading your logs, huge quantities of nested information your operating system hangs onto for complicated reasons. Windows does it. Apple does it. Some Linux distros do it. Tails doesn’t. It also roots your internet traffic through the legendary Tor, benchmark of Internet anonymity. Tails’s commitment to zero-footprint computing also has the smaller but just as welcome convenience that, if you do prefer to use it sparingly and stick with your old, less-secure OS, it leaves no souvenirs on your system; your old setup will boot like nothing happened.

IprediaOS

If this were a 19th century novel, this entry would be called “IprediaOS. Or, the Trouble with Tor.” Tor prioritizes security above all else and limits Internet access accordingly. There’s a lot of stuff it won’t go near, because it’s just not secure enough. That limits the mainstream usability of Tor, not to mention services like Tails that rely on it. IprediaOS uses a similar but less strict service, I2P, that affords access to the everyday Web with minimal loss of security. IprediaOS also comes with anonymous chat, email and BitTorrent clients.

Whonix

Whonix is a unique beast. It’s a virtual machine, which is (incredible oversimplification incoming!) a program that thinks it’s a computer and convinces others to treat it likewise. Its big offer is that it can be run as a program on the Windows and Mac OSes, making it a perfect match for anybody who only has a job or three that demand anonymity – cloud-based business records, say, or anonymous blogging – and is otherwise good to go with a by-the-book setup. It’s also a great way to learn the basics of home infosec, since, being based on the venerable Debian distro of Linux, it plays well with Microsoft, Apple and other Linux systems.

Discreete Linux

Not a typo! This cleverly named beastie discreetly keeps your secrets by building a discrete structure, unconnected to anything else, for you to whisper them in. It’s limited in function compared to the other services listed, functioning primarily as data storage and anti-malware/spyware/Trojan solution, but it is very good at those things. It’s in beta at present, and as is a beta’s wont there’s a bug or two to shake out, but it has real promise as a data security tool.

Qubes OS

Qubes is the Whonix solution raised to the level of an operating system. It compartmentalizes your work as separate virtual machines, limiting any compromise in security to one set of services, with no chance of spreading to more vulnerable areas. Qubes even color-codes your machines for you, with colored frames indicating the potential security vulnerability of a given VM. So, if you set up one machine as straight data storage with no access to the outside world, that’s about as secure as data gets and Qubes will tell you so. The machine you do your web browsing in will be coded otherwise. Better still, Qubes provides a secure data-transfer solution that lets you move information safely between machines. Last September Edward Snowden, a man understandably interested in information safety, tweeted “If you’re serious about security, @QubesOS is the best OS available today. It’s what I use, and free. Nobody does VM isolation better.” Can’t say fairer than that.

Don’t be intimidated

Obviously, as is made clear by the monolith of text above, infosec is an enormous topic.

That said, don’t let it scare you.

Get educated on the subject and in a week of digital futzing you’ll be warm in the knowledge that you do security better than the smartest, richest, most powerful people in the world. Happy (white hat) hacking!

#Linux

Matt Salter is a writer and former fundraising and communications officer for nonprofit organizations, including Volunteers of America and PICO National Network. He’s excited to put his knowledge of fundraising, marketing, and all things digital to work for your reading enjoyment. When not writing about himself in the third person, Matt enjoys horror movies and tabletop gaming, and can usually be found somewhere in the DFW Metroplex with WiFi and a good all-day breakfast.

Tech News

Loss of internet access is used as punishment for those who abuse it

(TECH NEWS) Internet access is becoming more of a human right especially in light of recent events –so why is revoking it being used as a punishment?

Published

on

Internet access

When one hears the word “punishment”, several things likely come to mind—firing, fees, jail time, and even death for the dramatic among us—but most people probably don’t envision having their access to utilities restricted as a legal repercussion.

Unfortunately, that’s exactly what’s happening across the country—if you consider Internet access a utility.

In the past, you’ve probably heard stories about people awaiting trial or experiencing probation limitations being told that they are not to use the Internet or certain types of communication. While this may seem unjust, the circumstances usually provide some context for the extreme nature of such a punishment; for example, it seems reasonable to ask that a person accused of downloading child pornography keep off the internet.

More recently–and perhaps more controversially—a young man accused of using social media to incite violent behavior during country-wide protests was ordered to stay offline while awaiting trial. This order came after the individual purportedly encouraged people to “[tip] police cars”, vandalize property, and generally exhibit other “riot”-oriented behaviors.

Whether or not one reads this post as a specific call to create violence—something that is, in fact, illegal—the fact remains that the “punishment” for this crime in lieu of a current conviction involves cutting off the person involved from all internet access until a verdict is achieved.

The person involved in this story may be less than sympathetic depending on your stance, but they aren’t alone. The response of cutting off the Internet in this case complements other stories we’ve seen, such as one regarding Cox and a client in Florida. Allegedly, the client in question paid for unlimited data—a potential issue in and of itself—and then exceeded eight terabytes of monthly use on multiple occasions.

Did Cox correct their plan, allocate more data, throttle this user, or reach out to explain their concerns, you may ask?

No. Cox alerted the user in question that they would terminate his account if his use continued to be abnormally high, and in the meantime, they throttled the user’s ENTIRE neighborhood. This kind of behavior would be unacceptable when applied to any other utility (imagine having your air conditioning access “throttled” during the summer), so why is it okay for Cox?

The overarching issue in most cases stems from Internet provider availability; in many areas, clients have one realistic option for an Internet provider, thus allowing that provider to set prices, throttle data, and impose restrictions on users free of reproach.

Anyone who has used Comcast, Cox, or Cable One knows how finicky these services can be regardless of time of use, and running a simple Google speed test is usually enough to confirm that the speeds you pay for and the speeds you receive are rarely even close.

In the COVID era in which we find ourselves, it is imperative that Internet access be considered more than just a commodity: It is a right, one that cannot be revoked simply due to a case of overuse here, or a flaw in a data plan there.

Continue Reading

Tech News

How to personalize your site for every visitor without learning code

(TECH NEWS) This awesome tool from Proof lets you personalize your website for visitors without coding. Experiences utilizes your users to create the perfect view for them.

Published

on

experiences welcome page

What if you could personalize every step of the sales funnel? The team over at Proof believes this is the next best step for businesses looking to drive leads online. Their tool, Experiences, is a marketer-friendly software that lets you personalize your website for every visitor without coding.

Using Experiences your team can create a targeted experience for the different types of visitors coming to your website. The personalization is thought to drive leads more efficiently because it offers visitors exactly the information they want. Experiences can also be used to A/B test different strategies for your website. This could be a game changer for companies that target multiple specific audiences.

Experiences is a drag-and-drop style tool, which means nearly anyone on your team can learn to use it. The UX is meant to be intuitive and simple, so you don’t need a web developer to guide you through the process. In order to build out audiences for your website, Experiences pulls data from your CRM, such as SalesForce and Hubspot, or you can utilize a Clearbit integration which pull third-party information.

Before you go rushing to purchase a new tool for your team, there are a few things to keep in mind. According to Proof, personalization is best suited for companies with at least 15,000 plus visitors per month. This volume of visitors is necessary for Experiences to gather the data it needs to make predictions. The tool is also recommended for B2B businesses since company data is public.

The Proof team is a success story of the Y Combinator demo day. They pitched their idea for a personalized web experience and quickly found themselves funded. Now, they’ve built out their software and have seen success with their initial clients. Over the past 18 months, their early-access clients, which included brands like Profitwell and Shipbob, have seen an increase in leads, proposals, and downloads.

Perhaps the best part of Proof is that they don’t just sell you a product and walk away. Their website offers helpful resources for customers called Playbooks where you can learn how to best use the tool to achieve your company’s goals be it converting leads or engaging with your audience. If this sounds like exactly the tool your team needs, you can request a demo on their website.

Continue Reading

Tech News

3 cool ways bug-sized robots are changing the world

(TECH NEWS) Robots are at the forefront of tech advancements. But why should we care? Here are some noticeable ways robots are changing the world.

Published

on

Bits of robots and microchips changing the world.

When we envision the robots that will (and already are) transforming our world, we’re most likely thinking of something human- or dog-sized. So why are scientists hyper-focusing on developing bug-sized (or even smaller!) robots?

Medical advances

Tiny robots could assist in better drug delivery, as well as conduct minor internal surgeries that wouldn’t otherwise require incisions.

Rescue operations

We’ve all heard about the robot dogs that can rescue people who’ve been buried beneath rubble or sheets of snow. However, in some circumstances these machines are too bulky to do the job safely. Bug-sized robots are a less invasive savior in high-intensity environments, such as mine fields, that larger robots would not be able to navigate without causing disruption.

Exploration

Much like the insects after which these robots were designed, they can be programmed to work together (think: ants building a bridge using their own bodies). This could be key in exploring surfaces like Mars, which are not safe for humans to explore freely. Additionally, tiny robots that can be set to construct and then deconstruct themselves could help astronauts in landings and other endeavors in space.

Why insects?

Well, perhaps the most important reason is that insects have “nature’s optimized design”. They can jump vast distances (fleas), hold items ten times the weight of their own bodies (ants) and perform tasks with the highest efficiency (bees) – all qualities that, if utilized correctly, would be extremely beneficial to humans. Furthermore, a bug-sized bot is economical. If one short-circuits or gets lost, it won’t totally break the bank.

What’s next?

Something scientists have yet to replicate in robotics is the material elements that make insects so unique and powerful, such as tiny claws or sticky pads. What if a robot could produce excrement that could build something, the way bees do in their hives, or spiders do with their webs? While replicating these materials is often difficult and costly, it is undoubtedly the next frontier in bug-inspired robotics – and it will likely open doors for humans that we never imaged possible.

This is all to say that in the pursuit of creating strong, powerful robots, they need not always be big in stature – sometimes, the tiniest robots are just the best for the task.

Continue Reading

Our Great Partners

The
American Genius
news neatly in your inbox

Subscribe to our mailing list for news sent straight to your email inbox.

Emerging Stories

Get The American Genius
neatly in your inbox

Subscribe to get business and tech updates, breaking stories, and more!