Score:0

dual linux system security

gb flag

Sometimes I use a USB stick, with a Linux OS upon it, with my main Ubuntu OS being upon a Solid State Drive.

I'm not certain how secure this is, as I tend to recall that I was able to access the Ubuntu files upon the Solid State Drive, from the USB based OS. The Ubuntu OS has, as usual, a password requirement;the USB OS may or may not.

There are at least two instances where this is a concern. Firstly, if someone was attempting to physically obtain access to my computer files; they might just plug in the USB stick and boot up my computer. Secondly, if I want to use Any Desk from a dedicated USB based OS; a remote user might obtain access to the Solid State Drive OS as well.

How might these threats be mitigated.

cn flag
" Firstly, if someone was attempting to physically obtain access to my computer files" please explain how you would prevent that WITHOUT bricking any system where the admin forgot their password? "How might these threats be mitigated." There is no threat that Ubuntu can fix. Physical access means that person owns the system and all bets are off when that is the case. You will need hardware to prevent access; like a kensington lock.
Score:3
ng flag

If you are worried about someone gaining physical access to your device, you are 100% correct that someone with physical access can do whatever they want with the device, including accessing all your data and manipulating files without your knowledge.

If you do not want someone in this position to be able to access your data or manipulate your installation without your knowledge, the only thing you can do is use full disk encryption.

Full disk encryption is an option when you install Ubuntu for the first time. It will encrypt your entire root file system and will require authentication on boot. Your security in this case is only as secure as your authentication method, so your password should be strong, unique, and secret.

Even with full disk encryption, someone with access to your device can still perform tasks like wiping the hard drive or messing with the bootloader which needs to be unencrypted.

Even when using full disk encryption, if you had previously used the device without encryption, an attacker could also access information from the previous installation since files are usually not deleted when the space is marked as available. The protection against this would be to secure wipe the hard drive before installing Ubuntu with full disk encryption. Many SSDs can secure erase quickly and easily but mechanical hard drives must be completely overwritten, which can take a very long time.

user1366177 avatar
cn flag
I agree with Nmath. > Even with full disk encryption, someone with access to your device can still perform tasks like wiping the hard drive or messing with the bootloader which needs to be unencrypted. If you want to take security to a next level... then have a look at https://www.qubes-os.org/
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.