BitShares Forum

Main => General Discussion => Topic started by: smiley35 on December 29, 2013, 10:25:53 am

Title: Best system to run Keyhotee on?
Post by: smiley35 on December 29, 2013, 10:25:53 am
So I think I'm going to try to use Keyhotee, Bitshares, ect., on a computer I will set aside for only this purpose. I want to be anon, secure, and hopefully a tablet. I'm not the most techy type and any tips would be greatly appreciated.

In terms of both hardware and software what is the most secure system I can set up? I'm a slightly above average user. I mostly just use p2p software and surf the web. I don't code but I'm looking to learn. How can I minimize risks of backdoors in both my hardware and software? What is the best way to stay anon?

I was thinking of running ubuntu on a microsoft surface pro, then using vmware and for a bonus backtrack 5r3.

Can I get some feedback.



Title: Re: Best system to run Keyhotee on?
Post by: luckybit on December 29, 2013, 11:20:28 am
Use Apple OSX or iPad tablets. Avoid Microsoft because it's hidden source. Ubuntu is okay but it depends. Virtual machines are risky because random number generation is infeasible on virtual machines.

Generate your keys somewhere else. Software backdoors? Compile everything yourself. Hardware backdoors? Nothing you do can protect you from that.
Title: Re: Best system to run Keyhotee on?
Post by: vikram on December 29, 2013, 06:44:14 pm
Use Apple OSX or iPad tablets. Avoid Microsoft because it's hidden source.

???
Title: Re: Best system to run Keyhotee on?
Post by: luckybit on December 30, 2013, 08:49:43 am
Use Apple OSX or iPad tablets. Avoid Microsoft because it's hidden source.

???

It's just my preference. I would never suggest that anyone create a private key on closed source software. By default I assume if its not open source it's got a backdoor otherwise it would be open source. I admit this is a paranoid point of view and it's probably safe to generate a private key on Windows 8 if you never connect that computer to the Internet and only use it for the purpose of key generation.
Title: Re: Best system to run Keyhotee on?
Post by: Gekko on December 30, 2013, 10:44:40 am
It's just my preference. I would never suggest that anyone create a private key on closed source software. By default I assume if its not open source it's got a backdoor otherwise it would be open source. I admit this is a paranoid point of view and it's probably safe to generate a private key on Windows 8 if you never connect that computer to the Internet and only use it for the purpose of key generation.
(http://oi41.tinypic.com/dr9jdz.jpg)
OS X is closed source software.
Title: Re: Best system to run Keyhotee on?
Post by: Troglodactyl on December 31, 2013, 03:04:22 am
Just thought I'd throw this out there also...

http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep
Title: Re: Best system to run Keyhotee on?
Post by: luckybit on December 31, 2013, 04:34:46 am
It's just my preference. I would never suggest that anyone create a private key on closed source software. By default I assume if its not open source it's got a backdoor otherwise it would be open source. I admit this is a paranoid point of view and it's probably safe to generate a private key on Windows 8 if you never connect that computer to the Internet and only use it for the purpose of key generation.
(http://oi41.tinypic.com/dr9jdz.jpg)
OS X is closed source software.

It was open source and based on FreeBSD. I was not aware that it's now closed source. I take back everything I said about OSX and will not use it. Apparently they did a sneaky bait and switch tactic because when I used OSX in 2005 it was open source.

I recommend Linux or FreeBSD. FreeBSD if it is available for FreeBSD otherwise Linux. Do not trust anything closed source.

http://slashdot.org/story/06/05/17/1453206/mac-os-x-kernel-source-now-closed

Just thought I'd throw this out there also...

http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep

I'm not sure any operating system can protect you from the NSA if they want to break into it. The best advice I can give is to compile it yourself, run it on a raspberry pi, and never connect it online for any reason. Even that probably wont be enough if the NSA specifically has you on their list of targets.