Hello fellow forum mates, how about we talk about some concepts and good practices to have on your desktop, and have a healthy debate on its efficacy?
0x00 - Disclaimers
I'm not a certified expert, these are just some stuff that i gathered with my ~20 years of fooling around, and i'm writing this on good faith and i hope that it will be helpful to someone.
Of course that i expect a good chunk of people here
While those are two different concepts, they overlap, some takes to the extreme of and make themselves a "ghost", a little bit of privacy can really help your security, but privacy is really not the focus of this thread.
With that in mind we need to define our goal, i don't mind sharing mine and i think yours might be somewhat similar; my ultimate goal is to preserve my well being, which includes making a potential threat actor being unable to have a meaningful negative impact on my quality of life or health; that is a quite vague and they overlap with physical security.
This concept is the major pitfall that we often fall, but this is often exaggerated, storing your passwords in a safe manner does not constitute security through obscurity, but changing your SSH server listen port could be considered a security through obscurity method, since by itself it doesn't really make things more secure.
Who are you trying to protect against? that is the question that you need to think about, because that is imperative to know what measures would be sufficient, it is easier to deal with a script-kiddie watching youtube videos on how to use kali linux tools than dealing with intelligence agencies and israeli spyware development companies.
Ever heard of "your security is as good as the weakest link", if your foundation is Windows <replace with the current windows version>, then you are up to a bad start, the magic of FOSS is the capability of auditing, but i will tell you a secret so please don't tell anyone alright? i don't read every single line of code that gets compiled and executed on my system.
So it is really important for you to have an operating system that runs software from a source that you trust, personally, i trust the openSUSE team, also the Debian team, so openSUSE and Debian are often my pick for operating systems, but beware that is just an example, other 'mainstream' distros have a good record of security, but security incidents can happen, which was the case when Linux Mint got attacked , or that time that Debian servers got hacked, or even this incident with Red Hat.
0x00 - Disclaimers
I'm not a certified expert, these are just some stuff that i gathered with my ~20 years of fooling around, and i'm writing this on good faith and i hope that it will be helpful to someone.
Of course that i expect a good chunk of people here
0x01 - Security x Privacy
While those are two different concepts, they overlap, some takes to the extreme of and make themselves a "ghost", a little bit of privacy can really help your security, but privacy is really not the focus of this thread.
With that in mind we need to define our goal, i don't mind sharing mine and i think yours might be somewhat similar; my ultimate goal is to preserve my well being, which includes making a potential threat actor being unable to have a meaningful negative impact on my quality of life or health; that is a quite vague and they overlap with physical security.
0x02 - Security through obscurity
This concept is the major pitfall that we often fall, but this is often exaggerated, storing your passwords in a safe manner does not constitute security through obscurity, but changing your SSH server listen port could be considered a security through obscurity method, since by itself it doesn't really make things more secure.
0x03 - Know your adversary
Who are you trying to protect against? that is the question that you need to think about, because that is imperative to know what measures would be sufficient, it is easier to deal with a script-kiddie watching youtube videos on how to use kali linux tools than dealing with intelligence agencies and israeli spyware development companies.
0x04 - Preparing a good foundation for security
Ever heard of "your security is as good as the weakest link", if your foundation is Windows <replace with the current windows version>, then you are up to a bad start, the magic of FOSS is the capability of auditing, but i will tell you a secret so please don't tell anyone alright? i don't read every single line of code that gets compiled and executed on my system.
So it is really important for you to have an operating system that runs software from a source that you trust, personally, i trust the openSUSE team, also the Debian team, so openSUSE and Debian are often my pick for operating systems, but beware that is just an example, other 'mainstream' distros have a good record of security, but security incidents can happen, which was the case when Linux Mint got attacked , or that time that Debian servers got hacked, or even this incident with Red Hat.