sneakyimp writes "We've seen increasingly creative ways for bad guys to compromise your system like infected pen drives, computers preloaded with malware, mobile phone apps with malware, and a $300 app that can sniff out your encryption keys. On top of these obvious risks, there are lingering questions about the integrity of common operating systems and cloud computing services. Do Windows, OSX, and Linux have security holes? Does Windows supply a backdoor for the U.S. or other governments? Should you really trust your Linux multiverse repository? Do Google and Apple data mine your private mobile phone data for private information? Does Ubuntu's sharing of my data with Amazon compromise my privacy? Can the U.S. Government seize your cloud data without a warrant? Can McAfee or Kaspersky really be trusted? Naturally, the question arises of how to establish and maintain an ironclad workstation or laptop for the purpose of handling sensitive information or doing security research. DARPA has approached the problem by awarding a $21.4M contract to Invincea to create a secure version of Android. What should we do if we don't have $21.4M USD? Is it safe to buy a PC from any manufacturer? Is it even safe to buy individual computer components and assemble one's own machine? Or might the motherboard firmware be compromised? What steps can one take to ensure a truly secure computing environment? Is this even possible? Can anyone recommend a through checklist or suggest best practices?"
[![](http://a.fsdn.com/sd/twitter_icon_large.png)](http://twitter.com/home?status=How+Do+YOU+Establish+a+Secure+Computing+Environment%3F%3A+http%3A%2F%2Fbit.ly%2FTjwxPe) [![](http://a.fsdn.com/sd/facebook_icon_large.png)](http://www.facebook.com/sharer.php?u=http%3A%2F%2Fit.slashdot.org%2Fstory%2F12%2F12%2F26%2F1619216%2Fhow-do-you-establish-a-secure-computing-environment%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook) [![Share on Google+](http://www.gstatic.com/images/icons/gplus-16.png)](http://plus.google.com/share?url=http://it.slashdot.org/story/12/12/26/1619216/how-do-you-establish-a-secure-computing-environment?utm_source=slashdot&utm_medium=googleplus)
[Read more of this story](http://it.slashdot.org/story/12/12/26/1619216/how-do-you-establish-a-secure-computing-environment?utm_source=rss1.0moreanon&utm_medium=feed) at Slashdot.
![](http://slashdot.feedsportal.com/c/35028/f/647410/s/26f37d44/mf.gif)
[![](http://da.feedsportal.com/r/151883983693/u/49/f/647410/c/35028/s/26f37d44/a2.img)](http://da.feedsportal.com/r/151883983693/u/49/f/647410/c/35028/s/26f37d44/a2.htm)![](http://pi.feedsportal.com/r/151883983693/u/49/f/647410/c/35028/s/26f37d44/a2t.img)![](http://feeds.feedburner.com/~r/Slashdot/slashdot/~4/9N2XVFpYtys)
URL: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/9N2XVFpYtys/story01.htm
No comments:
Post a Comment