[-] OnePhoenix@lemmy.world 1 points 4 months ago

After your post I did some digging and indeed it does appear as though Parrot OS can be installed through UTM. Thanks for the heads up!

[-] OnePhoenix@lemmy.world 5 points 4 months ago

Is SELinux enabled by default in Fedora? I've tried researching it but everyone seems to be wanting to do the opposite and disable SELinux (presumably because it restricts ease-of-use)?

[-] OnePhoenix@lemmy.world 4 points 4 months ago

I've looked at this and would love to but as is my (limited) understanding, Qubes is next to (if not entirely) impossible to implement on Mac M1

[-] OnePhoenix@lemmy.world 2 points 4 months ago

Thank you. Again, excuse my ignorance but, I don't see Parrot on the UTM list... Can Parrot be loaded on top of one of those OS's? Or are you suggesting Parrot in general, regardless of UTM's capabilities?

11
Which OS/Distro? (lemmy.world)
submitted 4 months ago* (last edited 4 months ago) by OnePhoenix@lemmy.world to c/cybersecurity@sh.itjust.works

I'm new to the cyber-security/privacy space. I am interested in teaching myself about it, as well as dabbling in OSINT and general linux-type-stuff too. ATM this is all a hobby so while it is not crucial to have everything air-tight, I would like to do my best to follow best practices.

That being said, I am currently using a Mac M1 so my VM capabilities are (AFAIK) limited to the OS's provided by the UTM virtual machine software. For those who are unaware, the OS's they provide can be found here:

https://mac.getutm.app/gallery/

From a security/privacy perspective, which of these OS's would you consider to be the most secure or, able to be the most secure with configuration? At first glance and with my limited knowledge, I want to say Kali, but I feel this may be cliché as it's what your stereotypical-hacker-type would use.

Any guidance would be appreciated.

N.B., ease of use/convenience is not a top priority for me, as I'm using this as a learning experience and I'm open to trying different things and making mistakes along the way.

Thanks!

***EDIT: Thank you to all who provided information. I learned a lot. I've decided to try a few different distros that work with UTM namely, Parrot OS (both home and security editions for different purposes), as well as Kali and Debian.

[-] OnePhoenix@lemmy.world 1 points 5 months ago

You say you use ProtonPass with a free Proton account? Do you know if they have a limit for creating these new emails? I've seen ProtonPass advertised but I just assumed it was a premium feature. When I say its tedious, its because when I create new ProtonMail accounts you first have to verify it with another non-Proton account which I find a bit annoying as I dont use services like Gmail etc , but more importantly, Proton has been blocking signups on newly created emails (if you just created the email and then use it to verify a service sign up it gets blocked).

[-] OnePhoenix@lemmy.world 10 points 5 months ago

Perhaps I haven't used it to its full capacity but, I have a free proton account and I still have access to simple login

68
submitted 5 months ago by OnePhoenix@lemmy.world to c/privacy@lemmy.ml

I used to use Protonmail, however the verification steps become tedious when creating unique emails for sign ups. I've switched to Tutanota despite it contravening their one account policy. What do you all use for one off emails (for sign ups etc )? Or do you prefer one of those 10 minute email sites?

[-] OnePhoenix@lemmy.world 1 points 5 months ago

Thanks for the info. You'll have to forgive my ignorance as I'm not super well-versed but, I was of the impression that alias software like anon and simple login were more for avoiding spam and unwanted emails from sign ups. Is it also effective as a security tool?

26
submitted 5 months ago by OnePhoenix@lemmy.world to c/privacy@lemmy.ml

Does it make sense to have separate emails for each individual financial account (banking, credit cards) or is that overkill? I'm just thinking that if a hacker got access to one email they'd have all account information?

[-] OnePhoenix@lemmy.world 2 points 5 months ago* (last edited 5 months ago)

I was referring more to ID required for the sim card set up but, you bring up a good point, there will always be video surveillance. I'm also looking at this more from a privacy perspective, and less from a secrecy or detection perspective so I have no real concerns that a government agency will be trying to track me down.

[-] OnePhoenix@lemmy.world 1 points 5 months ago

Where I am, its perfectly legal to purchase a one time sim card. You can walk into the corner store, purchase a prepaid visa (with cash), and buy a sim card (with cash) at the same store. You can then go online, enter the sim card number into the site, add your prepaid visa as payment and whatever details you want. I've done it before and there is no ID verification whatsoever - I literally put in John Smith and it worked... As long as they have payment up front, I guess they don't care. If I'm just using it for one time account verification, I'm not really worried about keeping the sim card long term.

[-] OnePhoenix@lemmy.world 3 points 5 months ago

I've tried a few of the SMS services online now. They either don't work or are paid. I don't mind paying for the service but I find it tedious and cumbersome.

Wondering if perhaps a prepaid sim card paid for using a prepaid credit card would do the trick? I've used prepaid sim cards in the past and was able to get one without providing any real information on myself.

[-] OnePhoenix@lemmy.world 3 points 5 months ago* (last edited 5 months ago)

Possibly, but other than that there aren't any real verification steps when entering info to create an account (you can just add bogus info).

If there is a phone number required, I have used burner numbers in the past which may work.

30
submitted 5 months ago by OnePhoenix@lemmy.world to c/privacy@lemmy.ml

I use GrapheneOS ony phone and a Mac with the security options as optimized as possible. For most of my emailing etc, I use Tuta and Proton. There are instances however, where having a Google account is beneficial (some apps for example won't download from Aurora store in anonymous mode).

Is it advisable/possible to create a dummy Google account with minimal ID/credentials? And if so, what are some best practices for doing so?

Or, do I resign myself to the fact that with more control over my data, I have to sacrifice more?

71
Find My Graphene? (lemmy.world)
submitted 6 months ago by OnePhoenix@lemmy.world to c/privacy@lemmy.ml

I feel like this may be a bit of a counterintuitive question considering Graphene's privacy features but, is there a way to remote erase or find my phone with GrapheneOS in the event the phone is lost?

view more: next ›

OnePhoenix

joined 6 months ago