Please forgive the long post. Was unavoidable.
Like all of you I'm looking for a solution to internet browsing on the desktop that is private and secure. Doing it all on the phone just doesn't fly.
I've concluded instead of trying to do all my computing on the same machine, its more practical to have a separate OS or older machine dedicated for the "privacy browsing" need situation. That way I can still use my windows machines for their use cases; and have a "trustable" platform ready for use for the privacy/security requiring uses.
You might say "Stop there!" ... "Tails / Qubes. Done."
Well, I need an "everyday browsing use" solution. That means no TOR.
All the ready-made solutions already out there (Tails, Whonix, KickSecure) either totally rely on TOR without an ability to turn it off (or beyond my technical knowhow), or in the case of Qubes, the hardware requirements often can't be met.
I have done a decent amount of searching and found some solutions that might work, but I need some more information and clarity on these options. I'm wondering if you guys can help.
Again I'm not looking for a desktop OS to do everything. I need it to only do ONE thing, but do it right. That is:
Private browsing that is usable, in a trustable environment, On the Desktop (laptop).
- By Private Browsing: I mean proper fingerprinting and IP protection (the two pillars of web tracking).
- By Trustable Environment: I mean the OS is private, it has reasonable Live security, and protects against persistent attacks (reboot = clean state).
- By Usable: I mean that its compatible with all websites, is not blocked by sites, and is not slow. Can be used for youtube and other HD video streaming (including fullscreen with hardware decoding), general site hopping / research, shopping/banking, and other online "logged-in" web use cases.
I'm particularly chasing after Immutability / persistence-protection because desktop OSes are not well secure and linux particularly so, and the best solution I see to mitigating that is a non-persistent / semi-persistent OS.
Requirments:
- Can trust OS to be private (keyboard, network stack, clipboard, etc.)
- Reasonably secure against live attacks
- Protected from persistent attacks
- Must be able to use own VPN
- Must be able to use Brave
- Browser be able to play streaming HD video without stutter/hiccup.
- no forced TOR
- Run on older laptop with 8GB RAM. Unupgradable
Bonus: Not Required
- Usability of virtual memory if possible
- Run from USB if possible [ need it for one particular machine ]
Notes:
Brave: because its compatible with websites, it's privacy is good, and has best available security. TOR Browser/Mullvad are not compatible with all websites even in lowest security level modes. Also since my end solution is likely linux, the combination of linux security and firefox security leaves my confidence a bit shaky.
No TOR network: because many websites just refuse TOR, its slow, and doesn't work for streaming video.
Physical security and forensics is not a concern. I simply want protection from remote attacks (internet/browser/network vector attacks) and to know that a new start everyday can be trusted to be free from persistent malware.
Options:
Standard linux install (Fedora):
Protection against live attacks ... meh/maybe.
Persistence ...Fail.
Windows:
"Can trust OS to be private (keyboard, network stack, clipboard, etc.)"
Fail on entry.
Tails:
A TOR free version with VPN would have been exactly what I needed. Sadly with TOR, its a no go.
Tablet with GOS:
Android is no desktop OS.
A tablet is no laptop.
I have 5 old laptops. I need to use what I have. (same as most others).
Good Options:
LiveCD OS (Fedora)
Well, this totally eliminates the persistence issue, but problem is live security. Every time I boot I have to do a lot of system updates to ensure the live system isn't full of security holes. I could avoid this and just run the outdated ISO image "AS IS" until next OS Image comes out in 6 months, but I wonder if this increases the "live attack" risk too much.
- Would you say it does?
And after the updates then I still need to install brave, install vpn, install config file for vpn, and configure brave. How much ram would be left for browsing at this point? There probably isn't any virtual memory available either. Downloading all of this every day, even once a day is probably too much and not realistic. Not a good solution. Perhaps if I could find a scripted way to automate this to be done from local files that I can update once a week then it might work. If I could also download the updates once a week as local files and do all the updates and installs locally using a script this could work. But the RAM issue still remains.
So for this case, I want to ask those with linux knowledge:
Is there a way to use a LiveOS ISO and use a simple 1-click prewritten script to update the running system with local update files and software install files?
Is there a way to assign virtual memory on a local disk to the LiveOS?
If I could address the above two problems I think this LiveOS solution would be usable, because it becomes like Tails, but without TOR and of course without the extra security hardening of Tails, but something has to give. I can't build my own Tails right now, or ever.
Qubes OS
Qubes meets almost all the above criteria and exceeds with bonuses. Although it only runs on CPUs with VT technology. So not compatible with my i3 machines.
But, a major concern:
Because its a VM (baremetal "like", but still), am I able to run HD streaming video smoothly and fullscreen?
Given that the machine has low RAM (8GB), running Qubes and browsers as VMs exacerbates the RAM issue even more. This would be fine for me if the system can use virtual memory to cirumvent the issue. But does it? does Qubes use virtual memory to help itself? I couldn't find documentation on this.
Does Qubes support screen rotation? I also would like to run this setup on a 2in1 laptop that turns vertical. In LiveCD & normal Installs rotation works. Would it in Qubes?
Immutable Fedora
This option sounds very interesting and it would be great if it would work but my linux knowledge is very basic and atomic linux, even lower.
Immutable fedora still has the same Kernel and other security vulnerabilities as all linux as far as I know. So this would be similar to running a "Regular Linux Install" scenario, except that I'm hoping this one would offer persistent malware protection.
The benefits of this system is that it solves the RAM problem as well as the CPU virtualization problem because its running directly on machine and utilizes virtual memory. Also there is a hardened version of it called SecureBlue which enhances security some more.
However there is a number of issues I need to get clarity on. Particularly around security and persistent attacks.
As you know SilverBlue uses OSTree and not DNF and all changes are applied to the booting image, not the running OS. However, from my reading, OSTree is not password protected and commands don't seem to be protected with any security safeguards (as far as amateur me can see) to prevent a malware that has managed to enter the system from running commands silently and adding packages to the Image using OSTree commands. Am I mistaken here or am I onto something?
Would there be any warning to the user that the Image has been updated/modified without user intention?
I've read that the /etc, /home, and /var folders are writable in Immutable Fedora. I have no understanding of the contents of these folders except that /home is probably my personal files. Question is, can a malware cause itself to become persistent by writing things to these folders?
In other words what I'm trying to ask is, is SilverBlue actually SECURE against persistent malware? or am I in an equal boat to the non-immutable version of linux?
Now I must also mention (for other readers) that as of this writing, based on my recent research into Fedora SilverBlue/Kinoite, installing Brave on Immutable Fedora is a bit of trouble. Installing it into the image has some complications, and installing using flatpacks also destroys brave's process isolation. Likewise installing VPN software into the image is mandatory as they can't run as flatpacks and at the very same time a lot of VPNs have compatibility issues being installed into the image, and just don't work. The workaround seems to be using the OpenVPN application installed into the image and just updating the personal VPN config files.
It would be wonderful if Immutable Fedora could offer the persistent attack protection I'm looking for because it is probably the most workable and compatible solution for average machines and average users.
P.S. All 3 of the above systems can run from USB.
I Dream...
Oh how I dream, that this write up would amount to something,
Thanks in advance.