Sat. Dec 7th, 2019

Host your Website

Read and learn

FatCow Web Hosting $1.00/mo* Trust your web hosting to the #1 web host provider, GoDaddy!

Most Secure, Private and Usable Linux Distro

1 min read

Discussing the different Linux distros that are focused on security and privacy but can be used as a daily driver. Which ones are the best and the most usable? What are the problems affecting their usability and how to fix that?

I’m the Internet Privacy Guy from Los Angeles. I’m here to educate. You are losing your Internet privacy and Internet security every day if you don’t fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.

I like alternative communication technology like Amateur Radio and data communications using Analog. I’m a licensed HAM operator.

Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations. Premium VPN with Cloud-Based TOR Routing

https://whatthezuck Cybersecurity Reference Privacy Focused Social Media – Encrypted Communications Store for BytzVPN, BraxWifi Router, and merchandise

24 thoughts on “Most Secure, Private and Usable Linux Distro

  1. In the past, I have used Backtrack and Kali as my OS to access the net. I found it fast and easy to use. Surprisingly, I encountered fewer problems where web browsing is concerned, when using Backtrack, in comparison to Linux Mint. And Backtrack/Kali appears to be far less discriminating about the hardware it runs on, compared to Ubuntu. You do not have to be interested in penetration testing, in order to get good use of Backtrack/Kali.

  2. I've found that the more you try to hide, the easier you actually are to find. The best tactics are making it look like you're just like everyone else on the internet. You lose all privacy as soon as you sign into an online account. If you encrypt all traffic and run everything over Tor all the time, the services you use will associate your account with that traffic. Using Tor also narrows you down to one of a handful of users compared to most of the total internet users.

    Hiding in plain sight is usually best. In terms of user agent identity and browser fingerprinting, using Tor on Linux is like standing in a crowd with a giant red refrigerator box over your body. No one can immediately tell exactly who you are, but they definitely know you're there and look suspicious. Mimicking another user or simply masking SOME of your traffic seems to be a better option because then you're more like someone in a crowd wearing sunglasses and a hood. You look a little suspicious, but there are others who look like you and you don't raise as much suspicion thus reducing the attention you receive. Then, if you occasionally need the extra privacy, use Tor and don't sign into any accounts and you are much harder to find.

  3. I always start with Arch, I3 and harden it. Then use VPN over Tor with VPN service from Switzerland that takes bitcoin. The Arch computer is on a vlan and my router is pfsence–WITH NO WIFI. A friend works for JAMf and I use their Pro software to manage my iphone security and apps. Its on a cell only network. So my online privacy is pretty good. Big Deal there's Bank Accounts, Morgages, Credit cards, Health Insurance, Employment, Ting, Taxes, Voting Records, Drivers Licences, Social Security Numbers, College Records, Birth Certficates, and even Cameras on the Street now. Privacy is thus a farce, everyone is Zucked. Years ago I played Bill's with cash, try that now.

  4. Hey Rob, thanks for the great content. I wanna know: How well does Flutter score on privacy? It is very convenient for cross platform development, but is it a good choice for privacy?

  5. The on screen text titles are helpful since it’s sometimes hard to understand which distro name you mention from just the audio. Also it’s good to have your “store address” on screen for the same reason.

  6. Rob…. Qubes should always be run from a uber fast USB ..on your RAM ….16gb minimum
    I use Tails exclusively. Tails became known because of Snowden, as was Qubes

    If anonymous distro's are being used to visit "dirty" sites (stolen credit cards, narcotics, porn, snuff movies), then use different distro;s for different habits or purposes
    Always use live distro's on RAM ….not installed, if being anonymous is the purpose
    Partitioned hard drives with Windows by default are part of Windows and therefor part of the NSA
    Always use a lan connection as wifi will send out a "here I am….hack me". Never believe in VPN's. NordVPN was hacked by the NSA
    Always understand …NSA, CIA, PLA, FSB have the time and money to hack linux systems
    Take the time to learn Linux distro's (especially TOR and Kali)
    Else …awesome vlog

  7. Rob, I've been thinking about possibly buying one of your Brax WiFi routers for a hardware VPN solution. I've never had a hardware VPN though. Does it require a subscription fee through a service of some kind? Maybe you can elaborate more on how to get one up and running for an average person like me in a future video perhaps…

  8. Who gave this four dislikes!! I always click like before even watching knowing that Rob always brings value with each video and also puts in a lot of work to help us all out.

  9. Good on ya for mentioning offensive hacking/pentesting distros like Kali and Black Arch, since they are often confused with privacy-based distros. The distinction is extremely important!

  10. I agree with your arguments Rob and find them very interesting. I'm also of a mind that (and I"M going to ignore Linux for my point although its also relevant), any Unix OS can be solidified to the point of privacy while also using the internet. Of course to be honest for this to work perfectly you would only use a public internet source and never put that box on your home system. Even if you ghost a firewall in front of your network your traffic is still intercepted. So, maybe there is finally a use for that expensive, crappy coffee shop we have all over the place? Haxxor while the upwardly mobile stand around talking stocks, and drink crappy coffee. 🙂

  11. tor/tails etc are too extreme and unnecessary for common users, a good vpn should do, when you log into your bank, they know who you are (hopefully!)
    There is also Linux malware which avg user will not be able to detect
    Nothing is secure!

  12. Snowden originally used Tails, and Tails does offer USB persistence. But as is true with all things Tails related, the user should thoroughly read and understand the documentation.

Comments are closed.

Copyright © All rights reserved. | Newsphere by AF themes.