Secure Linux Distro

I had to look into ‘secure’ Linux distros for a project, and the one I picked was Tails. You can find it at https://tails.net. The key feature of this distro is all the network traffic goes through the Tor network. There is a brief window were it attaches to a network and makes the Tor connection, but all traffic is blocked until that connection is made.

I run it off a USB on an old Intel based MacBook Air. Runs fine. It’s not a feature rich distro, which is fine given its purpose. You get a browser, basic office apps, a terminal, and your standard basic admin tools.

Another security feature is that no data is retained between sessions. The only exception is an encrypted data vault that requires a key phrase at startup. It also runs by default without a root password. This is a feature, since it requires a root password to run sudo type commands, including system updates and installing applications. If you want to run those types of commands, you need to set a root password at startup, which is only valid for that session.

If you need a secure network connection for a task, like White Hat cybersecurity projects, give Tails Linux a shot.

Pi-Hole DNS

Today’s tech advice: If you aren’t running Pi-hole, you should be.

Pi-hole is a locally run, open source, DNS sinkhole. It blocks ads and trackers. It also will provide some measure of improved network performance for delivering DNS results stored locally. It also prevents your ISP from collecting your DNS queries to sell for marketing purposes.

Seriously, you shouldn’t be using the DNS provided by your ISP. I suggesting using a non-tracking DNS, such as Cloudflare (1.1.1.1). You can configure Pi-hole to use Cloudflare or a number of other external DNS options. On an ‘average’ day, at least 30% of the DNS calls on my home network are serviced locally by Pi-hole and don’t leave the building.

You will also see a performance increase due to your browser not servicing the massive amounts of ads that Pi-hole will block.

Pi-hole also filters out ‘malicious’ domains, some of which will pop up from a hijacked ad on another site. This provides a level of security against malware and spyware. Although, many people intentionally log into spyware sites such as Facebook and Instagram. Plus various IoT devices like to phone home with usage data and anything else they can sniff. Roku and Sonos devices are constantly in the blocked list for my instance of Pi-hole.

It’s fairly easy to set up. I ran it on an old system running Linux for years. Recently moved to a Raspberry Pi 4. It will take some basic Linux skills to do that. Worth it if you want a dedicated local DNS with a static IP address. You can also pick up a Pi 4 or 5 for around $100, so it’s a fairly low cost option.

There are plenty of YouTube videos on how to set up and enhance Pi-Hole. I’ll list some interesting ones later.

Facebook should be no surprise to anyone…

Seriously, if you hadn’t figured out long ago that you were the product Facebook was selling, you were not paying very much attention.

Remember all those pictures you uploaded to Facebook.  If you read the terms of service, you will find that Facebook reserves the right to do anything they want with them, including using them advertising.

Or collect biometric data from them.

Travel Tip

I recently saw a list of travel trips for nerds.  One was that TVs in hotels have USB ports that are typically powered ports, so you can use them to charge your various devices.

Good tip. I would still advise using a USB condom, because like most devices in the IoT world, most Internet capable TVs  lack even basic Cyber Security features.

The perils of USB

USB has been great.  Connect anything to your system, it’s usually auto recognized, so it fits that useful category of “stuff that just works.”

Now Wired has pointed out that from a security standpoint, USB has some serious, fundamental flaws. In other words, you may be completely and utterly screwed.

It’s not just malware may be lurking on USB memory devices, perhaps even installed at the factory.  A couple of clever lads have figured out how to reprogram the flash that controls just about any USB device.   Which is pretty much like giving them the keys to the Kingdom.  Here are some of the scary highlights from the article.

“Because BadUSB resides not in the flash memory storage of USB devices, but in the firmware that controls their basic functions, the attack code can remain hidden long after the contents of the device’s memory would appear to the average user to be deleted.”

I’m waiting for the standalone device that reads and reflashes USB firmware to hit the IT market at an obscene profit margin.

Wait! It gets worse.

The problem isn’t limited to thumb drives. All manner of USB devices from keyboards and mice to smartphones have firmware that can be reprogrammed—in addition to USB memory sticks, Nohl and Lell say they’ve also tested their attack on an Android handset plugged into a PC. And once a BadUSB-infected device is connected to a computer, Nohl and Lell describe a grab bag of evil tricks it can play. It can, for example, replace software being installed with with a corrupted or backdoored version. It can even impersonate a USB keyboard to suddenly start typing commands. “It can do whatever you can do with a keyboard, which is basically everything a computer does,” says Nohl.

The malware can silently hijack internet traffic too, changing a computer’s DNS settings to siphon traffic to any servers it pleases. Or if the code is planted on a phone or another device with an internet connection, it can act as a man-in-the-middle, secretly spying on communications as it relays them from the victim’s machine. So the new mantra is don’t let your keys or any USB device out of your sight.