(OP u/Regular_Ride2342)

Currently trying to determine best way to secure VOID on a machine for accessing the internet as well as having windows functionality offline for media creation.

  • @kevcrumbMA
    link
    fedilink
    13 years ago

    The decoy OS is for when somebody asks you to boot your machine for them. You can satisfy their request and - unless they search the hard disk for encrypted partitions - they will encounter whatever you wanted them to see.

    For when you are online, Split makes is very difficult for others to correlate the traffic of one “identity” (= logged in user) to another. The separation prevents common user errors like accidentally not having your VPN on or mailing out information that the identity shouldn’t actually possess - a process that would link your identities together in a surveillance scenario.

    For accessing the Internet, Split defaults to using Tor. If you happen to visit many sites that give you a hard time when doing so (i.e. presenting you with loads of CAPTCHAs or asking for SMS verification) you can use a VPN that accepts connections from Tor.

    Windows can be run via libvirt (virt-manager/qemu). In a future release I intend to add support that shows your windows desktop right after logging in. This is already working on my prototype, but not yet in the ISO. One can then have Linux on one virtual terminal and Windows on another, switching between them via Ctrl-Alt-F_ key combinations.

    https://splitlinux.org/posts/the-split-way.html lists further ideas.