Re: This Thread
Basic precautions anybody can do:
- use some kind of open source firewall to prevent hanging yourself by having malware phone home or having ports open to abuse. There is all kinds of largely open ARM products you can buy with small form factor to run any Linux/BSD OS you want on them to act as a firewall like Wandboard, Cubieboard, PcDuino, CuBox-i4Pro, Soekris boxes ect. Or just run any old dumpster dived used system for a firewall it doesn't matter.
- if you're involved in business (stock trading, cryptocurrency exchanging, selling scripts, whatever)then try QubesOS. Daniel J Bernstein a world renown cryptographer and expert in cross-vm leaks and timing attacks, uses Qubes himself on a laptop if you read their mailing list. He wrote a small little python program to manage VMs on Qubes without needed the bloated "VM manager" GUI shit they have. https://groups.google.com/forum/#!topic/qubes-users/7-gm_q3nkQ8
Qubes is designed for business use, don't be running your secret darknet with it or anything. The idea is you spawn up a different VM for everything, so one for your online banking, one for semi-trusted sites and IRC, one for not trusted sites, one VM that holds all your PGP keys separate from the other VMs ect.
- avoid Nvidia cards. Use ATI/Radeon or even internal Intel video cards as their "open" drivers are much more robust than the ultra shitty shim that is the Nvidia garbage so-called free drivers. You will hate them so much you'll end up using proprietary drivers and thus not secure. It's possible to privseg X completely on OpenBSD with Radeon/Intel cards.
- use tarsnap for backups, like if you need to backup VM snapshots. It's intelligent backup that only sync's what you changed, and designed/operated by one of the best crypto engineers around Colin Perceival of FreeBSD.
- do not rely on full disc encryption. It's an all or nothing security. In addition to FDE, individually encrypt very important things with GnuPG so you have security in depth and nothing fails open.
Most important of all is never blindly follow online step by step guides without knowing exactly what the commands do. Where I work often people would use CurL plaintext over standard http to grab some rubygems or other software and pipe them right into the main work server, or install them directly without even thinking about what they were doing because they saw some guide online somewhere.