cross-posted from: https://lemmy.ml/post/12400033 (Thank you https://lemmy.ml/u/Kory !)

I first used Linux about 5 years ago (Ubuntu). Since then, I have tried quite a few distros:

Kali Linux (Use as a secondary)

Linux Mint (Used for a while)

Arch Linux (Could not install)

Tails (Use this often)

Qubes OS (Tried it twice, not ready yet)

Fedora (Current main)

For me, it has been incredibly difficult to find a properly privacy oriented Linux distro that also has ease of use. I really enjoy the GNOME desktop environment, and I am most familiar with Debian. My issue with Fedora is the lack of proper sandboxing, and it seems as though Qubes is the only one that really takes care in sandboxing apps.

Apologies if this is the wrong community for this question, I would be happy to move this post somewhere else. I’ve been anonymously viewing this community after the Rexodus, but this is my first time actually creating a post. Thank you!

UPDATE:

Thank you all so much for your feedback! The top recommended distro by far was SecureBlue, an atomic distro, so I will be trying that one. If that doesn’t work, I may try other atomic distros such as Fedora Atomic or Fedora Silverblue (I may have made an error in my understanding of those two, please correct my if I did!). EndeavourOS was also highly recommended, so if I’m not a fan of atomic distros I will be using that. To @[email protected], your suggestion for Linux Mint Debian Edition with GNOME sounds like a dream, so I may use it as a secondary for my laptop. Thank you all again for your help and support, and I hope this helps someone else too!

  • Pantherina@feddit.de
    link
    fedilink
    arrow-up
    2
    ·
    9 months ago

    I guess our best bet would be like running Tor Browser or Mullvad Browser

    Those are just Firefox. Using some other routing doesnt improve security.

    Vanadium might be degoogled and not send critical platform data, but it is not fingerprint resistant afaik.

    On mobile, browsers cant really be that though. On Desktop there only is ungoogled Chromium which is a beginning. But especially secureblue doesnt use it for some reason.

    • Throwaway1234@sh.itjust.works
      link
      fedilink
      arrow-up
      1
      ·
      9 months ago

      Those are just Firefox. Using some other routing doesnt improve security.

      Never said or implied they were. Security is achieved through

      Tor Browser or Mullvad Browser in a disposable qube on Qubes OS

      Tor and Mullvad are only for preferred for the sake of anonymity as every user runs the exact same config on the same type of network.

      Vanadium might be degoogled and not send critical platform data, but it is not fingerprint resistant afaik.

      Hmm, you might be right. TIL. Thank you! Somehow, I was having high expectations for it… *sigh*

      On mobile, browsers cant really be that though.

      Do you happen to know why that’s the case?

      On Desktop there only is ungoogled Chromium which is a beginning. But especially secureblue doesnt use it for some reason.

      If I recall correctly, ungoogled-chromium has (at least in the past) been slacking on security. Don’t know if that’s still a thing though.

      • Pantherina@feddit.de
        link
        fedilink
        arrow-up
        2
        ·
        9 months ago

        QubesOS is interesting, I think overcomplex but needed until better systems are in place. Bubblejail would be an alternative that runs on normal hardware.

        I dont know how resistant Vanadium is, it for sure doesnt send critical data, but screen size, hardware specs etc cant be not send without having no GPU acceleration and a letterboxed screen.

        mobile browsers have limited screens size and every SOC has a different GPU basically. So if you avoid hardware rendering, you would still need to pretend to be the smallest phone comparable, and pixel density etc. may still be different.

        Ungoogled Chromium is a set of patches. These should totally be applied to Secureblue chromium, but currently it is saving effords by just using Fedora chromium and a few policies.

        • Throwaway1234@sh.itjust.works
          link
          fedilink
          arrow-up
          1
          ·
          9 months ago

          First of all, apologies for the late response. I had written a response, but something happened before I sent it and the cache of my phone wasn’t able to recollect my writing. I got so discouraged by this that I didn’t bother with it right away.

          QubesOS is interesting, I think overcomplex but needed until better systems are in place.

          Well said!

          Bubblejail would be an alternative that runs on normal hardware.

          I hope Bubblejail will indeed reach the level of sandboxing solutions we find on e.g. mobile devices. Though, a lot of work has to be put into portals (and others) before a feat as such is achieved.

          I dont know how resistant Vanadium is, it for sure doesnt send critical data, but screen size, hardware specs etc cant be not send without having no GPU acceleration and a letterboxed screen.

          Would you be so kind to elaborate upon the bolded part? I’m simply unaware of the link between GPU acceleration and protection against fingerprinting.

          Furthermore, just to be clear. I would like to retract my earlier statements that I’ve made regarding Vanadium and that were negative in nature. While there’s definitely truth in the fact that it does not provide fingerprinting protection (or spoofing) like what we find on Firefox (or Brave), but they have spoken out their ambitions and intentions to improve that. It’s simply that they haven’t put a lot of resources yet to the cause. And this is not for saving efforts or whatsoever, but rather because they intend to offer a more robust solution (eventually). We should also not disregard that, as is, GrapheneOS does offer some level of anonymity (in combination with best practices; i.e. VPN etc) merely by the virtue of only a select number of devices being supported by GrapheneOS and thus if two users are in relatively close proximity to one another and have their VPNs enabled and use the same device with GrapheneOS, then it might be hard for others to distinguish them from one another. Finally, at least regarding this topic, I don’t see them implementing letterboxing as we find on Firefox (as screen sizes are small anyways and only select number of screen sizes exist anyways, because only few devices are supported). Thus, as screen dimensions are not obfuscated, there’s less need to obfuscate the GPU in the first place.

          mobile browsers have limited screens size and every SOC has a different GPU basically. So if you avoid hardware rendering, you would still need to pretend to be the smallest phone comparable, and pixel density etc. may still be different.

          You may find some of my thoughts in the previous paragraph.

          Ungoogled Chromium is a set of patches. These should totally be applied to Secureblue chromium, but currently it is saving effords by just using Fedora chromium and a few policies

          Is it strictly beneficial for security? IIRC, privacy is (unfortunately) not regarded as a design goal for secureblue.

          Btw, apologies if my sentences were more convoluted and confusing than they are otherwise. Thank you for your attention and consideration!

          • Pantherina@feddit.de
            link
            fedilink
            arrow-up
            2
            ·
            9 months ago

            Yeah know that deleting post fun. Jerboah is very good at recovering them.

            Bubblejail just got an update that should fix DNS on Fedora! Just has to arrive in Secureblue (rusty-snakes fedora-extras, qoijjjs fork, COPR)

            If you use your GPU that model is fingerprintable through WebGL stuff. There is a firefox addon that spoofs random values though. Same for screen size.

            Yes, secure projects are nice, if they do something then right.

            Yes a Pixel is less trackable than some random phone. But still, trackable. Letterboxing and software rendering could be needed by people.

            Secureblue does not implement privacy over security, but if patches make a browser stay just as securely I think that would be fine.

            The thing is, for example we had some arguments about manifest v2 extensions (which can download stuff they then use, i.e. no control by Google and thus “less secure”). If Chromium does things like Connect to Google for security stuff like Safe Browsing, this will totally not be removed.

            Also you can install any browser you like, just not Firefox (as that is override-removed). I have a PR open to make Librewolf work with hardened-malloc, hope they react soon…

            Secureblue is not GrapheneOS too. It is just a (huge) compilation of patches and patched images. Basically every Desktop with Wayland support, currently 86 (!!!) images.

            Doing something like hardened degoogled Chromium with sync capabilities would happen outside of the project.

            • Throwaway1234@sh.itjust.works
              link
              fedilink
              arrow-up
              1
              ·
              9 months ago

              Yeah know that deleting post fun. Jerboah is very good at recovering them.

              TIL about Jerboa. Thank you!

              If you use your GPU that model is fingerprintable through WebGL stuff. There is a firefox addon that spoofs random values though. Same for screen size.

              IIRC, so-called ‘naive scripts’ will indeed be spoofed. However, it has been shown at great length that JavaScript is not even required to to acquire screen size in the first place. Furthermore, methods that rely on badness enumeration are deemed inferior.

              Secureblue does not implement privacy over security, but if patches make a browser stay just as securely I think that would be fine.

              That would require someone to put effort into showing that ungoogled-chromium is at least as secure as Chromium. Is that even established in the first place?

              The thing is, for example we had some arguments about manifest v2 extensions (which can download stuff they then use, i.e. no control by Google and thus “less secure”). If Chromium does things like Connect to Google for security stuff like Safe Browsing, this will totally not be removed.

              Perhaps the desire to minimize attack surface is what’s been decisive.

              Secureblue is not GrapheneOS too. It is just a (huge) compilation of patches and patched images. Basically every Desktop with Wayland support, currently 86 (!!!) images.

              Surely, it would take a lot more effort to get it to GrapheneOS levels. However, I don’t find any fault with the desire to be inspired from GrapheneOS’ methods and implementations.

              • Pantherina@feddit.de
                link
                fedilink
                arrow-up
                2
                ·
                9 months ago

                Yeah for sure the not-badness-enumeration approach would be to not use the GPU and set a defined screen size and pixel density.

                ungoogled chromium is likely less secure, no 1 is to have regular updates. With CI/CD those patches should be applied automatically. Would be a cool project but not for me, I prefer Firefox.

                • Throwaway1234@sh.itjust.works
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  9 months ago

                  Thanks for the conversation! 😊

                  Yeah for sure the not-badness-enumeration approach would be to not use the GPU and set a defined screen size and pixel density.

                  Hopefully one day.

                  ungoogled chromium is likely less secure, no 1 is to have regular updates.

                  Agreed.

                  With CI/CD those patches should be applied automatically. Would be a cool project but not for me, I prefer Firefox.

                  Hehe, fair.