2. It isn't require much technical know the way (not reverse engineering your BIOS to verify its integrity or making an attempt to debug rootkits). 3. The overhead involved is scalable to the quantity of safety required. That's, many shortcuts may be taken with out weakening the general system. 4. It's an unambiguous set of steps that don’t require judgment to be performed. 5. It's fault tolerant (many components can get pwned, and it nonetheless could be very secure).
6. It's efficient in opposition to quite a lot of menace models, up to and together with a nation-state which has full information of your setup, crypto-markets a team of hackers working to pwn you individually, and a black bag team that may enter your private home with out your knowledge. Let’s call our adversary Eve. I imagine until Eve can convey to bear the assets described in merchandise 6, your setup is completely safe. Any feedback on the protocol I describe would be appreciated.
1.
A targeted attack by which the Eve has good data of your setup and crypto market yearly chart limitless resources to craft an assault over the web. 2. Identical as 1, crypto-rest-clientèle but they may attack using malware which infects your hardware (BIOS, NIC, and so on.) earlier than you purchase it (the availability chain attack). 4. Black bag/ physical entry to your private home and computers. I assume the reader can acquired uninfected software. One method for doing this is documented on the TOR webpage.
The fundamental idea is to download from multiple sources, from multiple internet connects, examine the hashes, and verify downloads with PGP signatures. The first pc (which I’ll call CannonFodder) connects to the internet via TOR, ideally with PORTAL between the pc and the web. PORTAL is the grugq’s open supply venture which installs on Raspberry Pi and acts like a proxy forwarding all your traffic to TOR. Recently a hidden service was discovered on TOR which hacks the browser and phones dwelling by means of the user’s non-TOR web connection the actual IP deal with and MAC address of the user.
PORTAL prevents this assault by only permitting visitors to route by TOR, and blocking any other traffic.
The purpose of CannonFodder is to receive PGP encrypted messages and ship PGP encrypted messages. It’s what connects to the web so the remainder of the gear doesn’t have to. Whereas it will likely be assumed to be hacked into and rootkit’ed, it's not going to be a simple goal. On CannonFodder install no matter personal security merchandise you may get your fingers on. Anti-virus, anti-persistence software program, software that whitelists good processes and blacklists dangerous processes, EMIT… Ensure that the OS and all software on it is patched usually.
What OS runs on the host is as much as you. The host will run a VM and nothing else. What virtualization software you utilize is as much as you, but the OS you run within the VM must be different from the host.