Pretty off topic right now, to the OP, I would say I don’t trust any hardware, but that’s the point of the OS. Of the available hardware to date the most worthy of in terms of a sense of more trustworthy than others is the Purism Librem line.
As for the most recent conversations derailing this thread, understanding how you can be attacked is important. Anything you do that interacts with something that interacts with the internet needs to be a disposable VM. The reason I say this is because AppVMs give the opportunity for persistence and time to find a way to pivot to other VMs. There is a lack of visibility in processes running in each VM however it’s the same case for every other OS anyways. What people are asking for is non-standard and usually requires system-specific customization.
One of the major downsides to Qubes is that even if you isolate every process that interacts with the internet, let’s say your browser, and I get you to visit a page that exploits a vulnerability in your browser that allows me to execute code on your machine. That means I can easily establish persistence unless you are monitoring the filesystem of each VM. I say it is a downside, however literally every operating system is this way, we only care now because we’re looking to harden our systems. Right?
With that said, I believe Sven or Unman use Tripwire to monitor for file changes like that, that may be a good option. I haven’t had any experience with Tripwire, but as a FIM it should be a good option for those who aren’t isolating every process that interacts with the internet to its own VM.
Because of that, I’m trying to think of the best way to manage ram and application isolation using disposable VMs. Some things have to be a balance of usability and disposability, like how am I supposed to add bookmarks in a browser without updating a template with the bookmarks? Well, one way is to just export your bookmarks and move them over to your template. Not the most ideal, but if we were going for convenience we would be running a non-Qubes OS. Protip in the response below, also protip, use a disposable VM for your browser and any apps like signal, session, discord, matrix and just log in when you need to use them, that way you don’t provide a persistent home directory for an adversary to live in.
As for the talks about nation-state adversaries, 99.999999% of people the government couldn’t care less about, APTs don’t care about them either, so unless you’re some high value target or of interest to a certain leader with a pension for dismembering dissidents and you happen to be one of those dissidents just as an example case, then a realistic threat model does not include Nation-State adversaries or APT groups. You aren’t hiding from someone when they don’t care to look for you in the first place. The people who do need that kind of security aren’t posting on this forum, they’re working with people who can help them set up and manage their system. Feel free to RP all you want, you aren’t helping any dissidents by your computer running Qubes. Qubes does not provide privacy, it provides security. There is a difference between privacy, security, and anonymity and Qubes as an operating system only provides security. Anonymity is not as simple as running whonix, privacy isn’t as simple as using Torbrowser. If your priority is privacy, your threat model is primarily the advertising industry, not the NSA.
If you’re in the US and the NSA is interested in you, they would just have the FBI raid your house like Harold Martin. Pro-tip: they have no reason to because mass surveillance doesn’t mean you are more than a speck of dirt to the NSA.
Now you say you want to help others, then use Torbrowser for everything, except for torrenting, because the more traffic that is processed on the network the more others can blend in. The more fingerprints that are identical to the Torbrowser, the more you and others can hide but that’s only one aspect of privacy and anonymity and there are a plethora of other ways you’re identifiable.
Pattern recognition for example is used to identify people based on how they write and type. You’ve got patterns in online activity, connections going at certain times or higher bandwidth usage at times which helps identify you. But beyond all of that, if this Rowhammer fingerprinting technique is employed then you need to be using something that defends against it and I don’t know if a Qubes VM would matter because it’s all about your memory modules.
If you’re concerned about privacy it goes beyond what you do on your computer, your electronic transactions, even cash transactions could be traced at least to an ATM and from there camera footage of when serialized bills were withdrawn, cash back at a store? Even better they have more cameras and witnesses as well. How about the police surveillance in your area? How many cameras are watching your vehicle as you traverse the area? Do you wear IR reflective glasses to obscure your face from IR cameras used at night? Do you use clothes and masks to throw off facial recognition systems? Do you know if you’re connected to a Stingray with your cellphone?
If you want anonymity strong enough to hide from the NSA, you need to be using a yagi antenna and using wifi from a network you cracked a mile away and a system where there is no record of you or anyone you know buying it using public wifi in a place far outside of where you normally operate, using a spoofed mac address so logs can’t be obtained from the coffee shop you used the wifi provided no cameras caught you driving with their automated license plate readers so you’re going to have to steal a car and hope it has enough gas to get there and back before the owner notices, then assuming you’ve made it back never access anything ever related to your actual identity on that machine ever again. Have a separate system to pay your bills and watch netflix on or something while you do other stuff using the mile-away wifi you are connected to with that yagi antenna. All traffic must be routed through Tor on that machine. You still can’t use cash, so you use local monero and conduct in-person transactions to your cold wallet, and then you still need to get groceries so you pay a homeless person to go shop for you and give him some food and some extra cash. You realize your cellphone was not in a faraday bag and was giving away your position when you stole that car and drove to the next town over to set up Qubes so your opsec is ruined and now you have to start over. Now you have to break your lease and move to another state because the police were tipped off about a car being stolen because the person you stole the car from had a ring doorbell and if you happened to cross state lines in that car the FBI is involved. This entire time your cellphone has been paid under your name rather than being paid for in timecards that homeless dude could’ve gotten you and all of your activity on the phone and contacts you spoke with anyways ruined your opsec. No more friends, you can’t call or text, only telegram, session, and Tox. You’ve got a job that knows where you live unless you live out of your car then you just gave em whatever address you could maybe a family member’s permanent address so you still file taxes so the IRS doesn’t target you. At this point you give up, cash out your 401k and buy some land and start a homestead with a side business of selling organic produce and beekeeping, giving up the internet and all technology beyond what you use to listen to music/watch netflix and talk with family and automate with. You realize nothing is different from when you started and this has all been a complete waste of time and you should’ve just chilled tf out or maybe you should have just spoofed the mac address and never stole that car in the first place. This entire time the NSA couldn’t have cared less because they’re too busy looking at members of Byzantine Candor and trying to pull off Stuxnet 2.0.
I hope by now, if you’re even reading this far, you realize while a fun thought experiment, it is by no means practical and for that reason you need to consider what you don’t care the world knows and what you do care the world knows. Sometimes, the best thing for anonymity is to blend in with the rest of the crowd rather than stand out. If you don’t stand out, they have no reason to question your behavior and appearance. One of the things that determines how long information is classified is how long does the information need to be protected, until it becomes irrelevant whether or not your adversaries know. So for each bit of information you seek to hide, look at it that way. Change your threat model to the advertising industry, the NSA doesn’t give a fsck about you.
FBI and local authorities however may…