{"id":2926,"date":"2018-11-08T17:38:22","date_gmt":"2018-11-08T17:38:22","guid":{"rendered":"https:\/\/www.appservgrid.com\/paw92\/?p=2926"},"modified":"2018-11-12T00:49:13","modified_gmt":"2018-11-12T00:49:13","slug":"open-secure-k-os-is-amongst-us-a-penguin-tries-out-it-osemotions","status":"publish","type":"post","link":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/11\/08\/open-secure-k-os-is-amongst-us-a-penguin-tries-out-it-osemotions\/","title":{"rendered":"Open Secure-K OS is amongst us (a Penguin tries out it) \u2013 osEmotions"},"content":{"rendered":"<p>As a debianized Penguin, some time ago I reviewed <a href=\"https:\/\/www.osemotions.com\/a-penguin-tries-out-secure-k-os\/\" target=\"_blank\" rel=\"noopener\">Secure-K OS<\/a>, a commercial Linux-based live operating system meant to be run from a USB key and \u201cdeveloped with security in mind\u201d, according to its developers.<\/p>\n<p>In the review I praised its innovative overall system architecture:<\/p>\n<blockquote><p>At the end of the day, Secure-K OS is a live operating system which saves my data encrypted on the key and it is capable of system and kernel update. I also appreciate how a kernel update improves the overall security of a live system (specially while connected to the Internet) in the long run.<\/p><\/blockquote>\n<p>In fact, none of the existing live operating systems provide a kernel update feature: the kernel and the initrd are the only components that a live operating system cannot update, because they lay outside of the data persistence partition (if any) and usually the system partition is ISO9660-formatted. This will soon lead to an outdated operating system, particularly unsafe if used as a desktop-replacement or for security-critical activities.<\/p>\n<p>Good news is that the upstream developers have in the meanwhile open-sourced the liveng (live next generation) whitepaper, the <a href=\"https:\/\/liveng.readthedocs.io\" target=\"_blank\" rel=\"noopener\">architectural technology upon which Secure-K OS insists<\/a> and a Community edition of the <a href=\"https:\/\/github.com\/LumIT-Labs\/open-securekos\" target=\"_blank\" rel=\"noopener\">operating system itself on GitHub<\/a>, named Open Secure-K OS.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/raw.githubusercontent.com\/LumIT-Labs\/open-securekos\/master\/screenshots\/open-securek-os.1.png\" alt=\"Open Secure-K OS\" \/><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/raw.githubusercontent.com\/LumIT-Labs\/open-securekos\/master\/screenshots\/open-securek-os.2.png\" alt=\"Open Secure-K OS\" \/><\/p>\n<p>As stated in the project\u2019s home page on GitHub:<\/p>\n<blockquote><p>Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. It is an advanced Debian Stretch Linux-based live USB operating system built for security and ease of use: user and system data are saved encrypted within the USB key (AES 512bit), so the system can be used as a clean and safe environment for your on-line security-critical activities. Moreover Secure-K does not rely on the PC hard drive and, being a Linux derivative, it\u2019s immune to most viruses and it\u2019s spyware \/ adware \/ backdoor free.<\/p><\/blockquote>\n<blockquote><p>Open Secure-K OS features a unique partitioning scheme, which allows complete system and kernel update. GRUB is the bootloader for both BIOS and UEFI; the Linux Foundation\u2019s preloader assures the Secure Boot compliance.<\/p>\n<p>Unique system features are:<\/p>\n<ul>\n<li>native encrypted persistence;<\/li>\n<li>kernel update (on a standard live ISO 9660 filesystem!);<\/li>\n<li>UEFI, with UEFI Secure Boot compatibility, with a real efi partition;<br \/>\nuser creation wizard upon the first boot. Live operating systems use to have the \u201clive\u201d user already created, while Open Secure-K OS pops up the Initial Setup interface in order to create one, together with language, keyboard and time zone.<\/li>\n<\/ul>\n<\/blockquote>\n<p>How to build the initial ISO image<\/p>\n<p>The Open Secure-K OS ISO image is built using the standard Debian live-build framework, project\u2019s home page contains all the instructions on how to build the system by your own. A 32 bit image will be built (the resulting .iso file).<\/p>\n<p>How to deploy the initial ISO image<\/p>\n<p>The <a href=\"https:\/\/github.com\/LumIT-Labs\/open-securekos-deployer\" target=\"_blank\" rel=\"noopener\">Open Secure-K OS Deployer tool<\/a> is used to write the Open Secure-K OS initial system image onto a USB key:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/raw.githubusercontent.com\/LumIT-Labs\/open-securekos-deployer\/master\/screenshots\/open-securekos-deployer.png\" alt=\"Open Secure-K OS Deployer\" \/><\/p>\n<p>Open Secure-K OS Deployer is the deployment system for writing the initial Open Secure-K OS ISO image onto a USB key \u2013 it will create the liveng partitioning scheme: run the Deployer, select the image you have built (or downloaded) and type in a passphrase of your choice for LUKS-encrypting the data persistence partition (remember: Open Secure-K OS features native encrypted persistence), then click on Write. Deployer will write the Open Secure-K OS ISO image onto all the plugged-in (and listed) USB devices, thus creating the complete Open Secure-K OS operating system.<\/p>\n<p>The Deployer tool has been open-sourced as well, so you can contribute to its <a href=\"https:\/\/github.com\/LumIT-Labs\/open-securekos-deployer\" target=\"_blank\" rel=\"noopener\">codebase on GitHub<\/a>.<\/p>\n<p><a href=\"http:\/\/lxer.com\/module\/newswire\/ext_link.php?rid=262514\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a debianized Penguin, some time ago I reviewed Secure-K OS, a commercial Linux-based live operating system meant to be run from a USB key and \u201cdeveloped with security in mind\u201d, according to its developers. In the review I praised its innovative overall system architecture: At the end of the day, Secure-K OS is a &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.appservgrid.com\/paw92\/index.php\/2018\/11\/08\/open-secure-k-os-is-amongst-us-a-penguin-tries-out-it-osemotions\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Open Secure-K OS is amongst us (a Penguin tries out it) \u2013 osEmotions&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2926","post","type-post","status-publish","format-standard","hentry","category-linux"],"_links":{"self":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/2926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/comments?post=2926"}],"version-history":[{"count":1,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/2926\/revisions"}],"predecessor-version":[{"id":3139,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/2926\/revisions\/3139"}],"wp:attachment":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/media?parent=2926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/categories?post=2926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/tags?post=2926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}