Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Security-focused operating system
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Operating systems focused on security}} {{Use dmy dates|date=July 2018}} This is a list of [[operating system]]s specifically focused on [[computer security|security]]. Similar concepts include [[security-evaluated operating system]]s that have achieved certification from an [[code audit|auditing]] organization, and [[trusted operating system]]s that provide sufficient support for [[multilevel security]] and evidence of [[correctness (computer science)|correctness]] to meet a particular set of requirements. == Linux == {{Main|Linux}} === Android-based === {{Main|Android (operating system)}} * [[GrapheneOS]] is a privacy and security-focused [[mobile operating system]] for selected [[Google Pixel]] [[smartphone]]s and tablets. === Debian-based === {{Main|Debian}} * [[Tails (operating system)|Tails]] is aimed at preserving [[privacy]] and [[anonymity]].<ref>{{cite web | url = https://lwn.net/Articles/440279/ | title = The Amnesic Incognito Live System: A live CD for anonymity [LWN.net] | last = Vervloesem | first = Koen | date = 27 April 2011 | website = lwn.net | access-date = 14 June 2017 | archive-url = https://web.archive.org/web/20170821050853/https://lwn.net/Articles/440279/ | archive-date = 21 August 2017 | url-status = live}}</ref> * [[Whonix]] consists of two [[Virtual Machine|virtual machines]]. All communications are forced through [[Tor (network)|Tor]].<ref>{{cite web |url=https://www.theregister.co.uk/2012/11/13/whonix/ | title=Devs cook up 'leakproof' all-Tor untrackable platform | publisher=The Register | date=13 Nov 2012 | access-date=10 July 2014}}</ref><ref>{{cite web |url=https://www.wired.com/2014/06/be-anonymous-online/ | title=How to Anonymize Everything You Do Online | publisher=Wired | date=17 June 2014 | access-date=10 July 2014 | author=Greenburg, Andy}}</ref><ref>{{cite web |url=http://www.techrepublic.com/blog/smb-technologist/whonix-adds-a-layer-of-anonymity-to-your-business-tasks/ | title=Whonix adds a layer of anonymity to your business tasks | publisher=TechRepublic | date=4 January 2013 | access-date=10 July 2014}}</ref> * [[Linux Kodachi]] is a security-focused operating system.<ref>{{Cite web |last=Choudhury |first=Ambika |date=2019-06-04 |title=10 Most Secured Linux Distros For Advanced Privacy & Security |url=https://analyticsindiamag.com/ai-mysteries/10-most-secured-linux-distros-for-advanced-privacy-security/ |access-date=2024-11-01 |website=AIM |language=en-US}}</ref> === Other Linux distributions === * [[Alpine Linux]] is designed to be small, simple, and secure.<ref>{{Cite web |title=about | Alpine Linux |url=https://alpinelinux.org/about/ |website=alpinelinux.org}}</ref> It uses [[musl]], [[BusyBox]], and [[OpenRC]] instead of the more commonly used [[glibc]], [[GNU Core Utilities]], and [[systemd]].<ref>{{Cite web|url=https://linuxbsdos.com/2010/08/23/alpine-linux-2-review/|title=Alpine Linux 2 review | LinuxBSDos.com|first=GigaTux|last=says|date=24 August 2010}}</ref> * [[Openwall Project|Owl]] - Openwall GNU/Linux, a security-enhanced Linux distribution for servers. == BSD == {{Main|Berkeley Software Distribution}} * [[OpenBSD]] is a [[Unix-like]] [[operating system]] that emphasizes [[software portability|portability]], [[software standard|standardization]], [[software bug|correctness]], proactive [[computer security|security]], and integrated [[cryptography]].<ref>{{cite web|url=https://www.openbsd.org/|title=OpenBSD|author=OpenBSD Project|date=19 May 2020|website=OpenBSD.org|access-date=12 October 2020}}</ref> == Xen == {{Main|Xen}} * [[Qubes OS]] aims to provide [[computer security|security]] through isolation.<ref>{{cite web |url=https://www.theregister.co.uk/2012/09/05/qubes_secure_os_released/ |title=Qubes OS bakes in virty system-level security |publisher=[[The Register]] |date=September 5, 2012}}</ref> Isolation is provided through the use of [[virtualization]] technology. This allows the segmentation of applications into secure [[virtual machine]]s. == See also == {{columns-list|colwidth=22em| * [[Computer security]] * [[Comparison of operating systems]] * [[Security engineering]] }} == References == {{reflist|1=30em}} {{Information security}} [[Category:Computer security]] [[Category:Operating system security]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Cite web
(
edit
)
Template:Columns-list
(
edit
)
Template:Information security
(
edit
)
Template:Main
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)
Template:Use dmy dates
(
edit
)