Chapter 13 – Operating systems
October 2, 2025•517 words
Chapter 13 – Operating systems
Last but not least operating systems. Windows is the default, used by everyone os and for that reason many many bad actors have focused their efforts on getting into and getting around Windows defenses. By default this makes Linux distributions safer. They are by no means fully secure but the simple fact they are just not the focus is a bonus. Getting into the different distros of linux is where things get interesting. For anyone wanting to test out and “learn” linux I recommend Linux Mint, the cinnamon edition. It is very user friendly it does everything you expect it to and works very similar to a windows pc. It also upon install and only then has an option for full disc encryption (most linux distros do) which acts like veracrypt but for your entire hardrive. There is also an option to use a VM(virtual machine) and for this Whonix is the best choice, a step up in complexity as you have 2 vms running at once, one is a gatway that routes the traffic through the tor network the other is the workstation(desktop) it is a bit slower for everything as it again is going through that Tor network but a very reliable tool if you are constantly using onion services, and multi tasking while doing it as all traffic on that vm is going the same place through the Tor network.
These next two operating systems are very different than anything else.
First Tails, a full operating system meant to be installed and ran from a usb it comes with pre installed apps such as the tor browser and pidgin xmpp messenger, along with many others for any situation. This system is meant to be booted into on any computer by power cycling the computer and selecting the boot deivce as your usb. (each computer brand and system does it differently usually f12 or f10 or f8 or f2 when pressed during the boot process will take you to a boot menu you can search you device to find out) once booted into it runs off the ram of your computer, that memory that is constantly being used for anything and everything, meaning it will not leave any trace that it was use on the computer. As well as the system has an amnesia setting where everything added on any downloads documents accounts will not be saved and it will be a fresh start every time. You can add a persistent storage during the install phase but keep in mind this is not encrypted. This is useful for anyone needing the upmost security and anonymity while using a computer at all. It can also be used on public computers as a safety precaution.
Secondly is Qubes. What many conciser the pinical in security also enabling the upmost anonymity. It is a complex machine using vms and taking them to the next level. Here is more on this https://www.qubes-os.org/intro/
Conclusion
"They who can give up essential Liberty to obtain a little temporary safety deserve neither liberty not safety." - Benjamin Franklin