How disposable Virtual Machines can keep you safer by quarantining suspicious files/attachments
QUBES DISPOSABLE WHONIX VM: HANDLING SUSPICIOUS FILES / EMAILS
Watch on these alternative platforms
Qubes is a Linux Operating System based around the concept of Virtual Machines (like multiple computers you can switch between) making full use of compartmentalisation.
Compartmentalisation allows you to take control of your digital life and is what the 10 Steps to Escape the Digital Prison is also based around.
Qubes is the Operating System used and recommended by Edward Snowden (NSA whistle blower)and seems to be the ultimate privacy Operating System
This is why I am interested and about to start build my own Qubes system.
Most people are not ready to switch to an Operating System like Qubes, but for those interested this video will give you a glimpse at what using and managing the Qubes privacy operating system is like.
Among The Most Common Successful Attack Methods Are Spear Fishing Emails, & Will Likely Come For You Too (at some point). Are You Sure Emails Are Safe? Watch To Find Out How To Open (Potentially) Malicious Files / Emails Without Destroying Your Computer
Qubes provides a highly isolated environment via a foundation of various “Qubes”, or virtual machines (VM). Disposable Virtual Machines allow you to risk single disposable VM, without the entire operating system being at risk. After you are finished with a given application inside a disposable virtual machine, that VM self destructs, and no malicious actions are saved.
On another level, malicious links may normally reveal your IP address, and cause you to connect out in a malicious way. To mitigate ip leaks, we can take advantage of Whonix disposable VM.
(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)
*Watch, And Share With Others!*
I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.
If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)
💎 **SUPPORT INDEPENDENT CONTENT** (Thank You)
CASHAPP – https://cash.app/$HumanRightsTech
MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)
SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻
**PUBLIC BLOG:** https://bmc.link/politictech/posts
First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)
📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com
📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)
We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance, qubes, whonix, Tails OS, how to get hardware working on Qubes, linux, configuration, tutorials, news, programming, ethical pentesting, human rights, privacy, cybersecurity research, radio, baofeng, and all other forms of nerdism…