{{Header}} {{#seo: |description=System Configuration and Access |image=Systemconfiguration.png }} {{physical-mininav}} [[File:Systemconfiguration.png|thumb]] {{intro| Best Security Practices for System Configuration and Access. }} = Avoid Shared Hosts = {{mbox | type = notice | image = [[File:Ambox_notice.png|40px|alt=Info]] | text = '''Tip:''' {{project_name_long}} should preferably be used only on computers without shared access. }} It is unwise to allow others to use your computer, even if they are trustworthy individuals. If they are not equally knowledgeable in computer security, then one mistake could potentially lead to compromise of the entire system. If necessary, this risk is partially mitigated by creating untrusted domains in [[Qubes|{{q_project_name_long}}]] for other users. Needless to say, {{project_name_short}} should not be hosted in the [https://en.wikipedia.org/wiki/Cloud_computing cloud], on a foreign server that is not controlled by the user, on a [https://en.wikipedia.org/wiki/Virtual_private_server virtual private server (VPS)], or other remote hosting options. The risks include: https://en.wikipedia.org/wiki/Cloud_computing#Security_and_privacy https://en.wikipedia.org/wiki/Cloud_security * Data on these systems is readily accessible to their owners. * Data can be accidentally or deliberately altered / deleted. * Legal ownership of data is disputed. * Shared technological vulnerabilities include insecure interfaces and application program interfaces (APIs), data loss / leakage and hardware failure. * Proven vulnerability to large scale attacks like [https://en.wikipedia.org/wiki/Hyperjacking "hyperjacking"], along with exposure to traditional threats like network eavesdropping, invasion, denial of service attacks, side-channel attacks and so on. = Use a Dedicated Host Operating System and Computer = {{mbox | image = [[File:Ambox_warning_pn.svg.png|40px]] | text = Both {{non_q_project_name_short}} and [[Qubes|{{q_project_name_short}}]] users should avoid [https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/multiboot.md#multibooting-qubes dual / multi-boot configurations]. The other {{os}} such as for example Microsoft Windows could modify the unprotected ''/boot'' partition or firmware to maliciously compromise Qubes or the host OS, and also potentially spy on user activities. }} [[{{non_q_project_name_short}}|{{non_q_project_name_short}}]] users are recommended to use one dedicated host operating system (OS) just for hosting {{project_name_short}} VM (in case {{project_name_short}} is hosted on a VM). Otherwise, if the host OS which is used daily is compromised, {{project_name_short}} cannot provide any additional protection. This is because the host is part of the system's [https://web.archive.org/web/20210724143029/https://blog.finjan.com/trusted-computing-base/ trusted computing base (TCB)]:
For a computer system, the trusted computing base or TCB comprises the set of all hardware, software, and firmware components that are critical to establishing and maintaining its security. Typically, the TCB consists of an OS with all its in-built security controls, individual system hardware, network hardware and software, defined security procedures and protocols, and the actual physical location of the system itself. ... Maintaining the confidentiality and integrity of data on a system is a prime responsibility of the TCB. The trusted computing base is also charged with enforcing the system’s security policy, and is the only component of a system that operates at such a high level of trust. This means that if any part of the TCB is subverted or contains flaws, the overall security policy of a system may be compromised.
See [[Malware_and_Firmware_Trojans|Malware and Firmware Trojans]] to learn more about the impacts of a compromised TCB. For even greater security, the dedicated host OS can be used on a computer solely bought for {{project_name_short}} activities. Ideally this computer will have never been used for anything else before, negating the risk of a prior hardware compromise. = {{project_name_short}} on External Media = See: [[USB Installation|{{project_name_short}} on USB or other External Media]]. = See Also = {{physical-mininav}} = Footnotes = {{reflist|close=1}} {{Footer}} [[Category:Documentation]]