How relevant are OS security measures for everyday single-user personal computers? [closed]

For example, Meltdown and Spectre are serious security issues since they allow application to read unauthorized memory. However, from my understanding, most everyday computer setup allow any untrusted code to read personal files.
So are th… Continue reading How relevant are OS security measures for everyday single-user personal computers? [closed]

Urgent Investigation Needed: Potential Widespread Tampering Linux Distributions Across Diverse Variants [closed]

I am writing to express my deep concern about potential widespread vulnerabilities affecting multiple Linux distributions. While my findings are based on personal experiences and require further verification, I urge the security community … Continue reading Urgent Investigation Needed: Potential Widespread Tampering Linux Distributions Across Diverse Variants [closed]

Is hardware linked between different operating systems installed in same computer?

I know the safest bet If I want to remain anonymous is having 2 separate computers, but I was curious if having 2 OS in different hard drives (both encrypted) but on same computer the same? Is the hardware linked?
Like if I were to use one… Continue reading Is hardware linked between different operating systems installed in same computer?

Critical Vulnerability in libwebp Library

Both Apple and Google have recently reported critical vulnerabilities in their systems—iOS and Chrome, respectively—that are ultimately the result of the same vulnerability in the libwebp library:

On Thursday, researchers from security firm Rezillion published evidence that they said made it “highly likely” both indeed stemmed from the same bug, specifically in libwebp, the code library that apps, operating systems, and other code libraries incorporate to process WebP images.

Rather than Apple, Google, and Citizen Lab coordinating and accurately reporting the common origin of the vulnerability, they chose to use a separate CVE designation, the researchers said. The researchers concluded that “millions of different applications” would remain vulnerable until they, too, incorporated the libwebp fix. That, in turn, they said, was preventing automated systems that developers use to track known vulnerabilities in their offerings from detecting a critical vulnerability that’s under active exploitation…

Continue reading Critical Vulnerability in libwebp Library

Convenience vs OS Security on Authentication Approaches of Modern Operating Systems?

Are there innovative approaches that can be used to enhance authentication on modern operating systems while maintaining a user-friendly experience?
Are there any examples to provide stronger security without compromising usability?

Continue reading Convenience vs OS Security on Authentication Approaches of Modern Operating Systems?

Can mobile hardware have backdoor access to camera, microphone that bypasses operating system?

I found out about AOSP variants such as Calyx, Graphene, etc. They promise increased security. I want to know if hardware backdoors can allow access to the camera, microphone, etc. and subsequently allow shipping of that data over the netw… Continue reading Can mobile hardware have backdoor access to camera, microphone that bypasses operating system?