This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.
Linux
Main article: Linux
Android-based
Main article: Android (operating system)
- GrapheneOS is a privacy and security-focused mobile operating system for selected Google Pixel smartphones and tablets.
Debian-based
Main article: Debian
- Tails is aimed at preserving privacy and anonymity.1
- Whonix consists of two virtual machines. All communications are forced through Tor.234
- Linux Kodachi is a security-focused operating system.5
Other Linux distributions
- Alpine Linux is designed to be small, simple, and secure.6 It uses musl, BusyBox, and OpenRC instead of the more commonly used glibc, GNU Core Utilities, and systemd.7
- Owl - Openwall GNU/Linux, a security-enhanced Linux distribution for servers.
BSD
Main article: Berkeley Software Distribution
- OpenBSD is a Unix-like operating system that emphasizes portability, standardization, correctness, proactive security, and integrated cryptography.8
Xen
Main article: Xen
- Qubes OS aims to provide security through isolation.9 Isolation is provided through the use of virtualization technology. This allows the segmentation of applications into secure virtual machines.
See also
References
Vervloesem, Koen (27 April 2011). "The Amnesic Incognito Live System: A live CD for anonymity [LWN.net]". lwn.net. Archived from the original on 21 August 2017. Retrieved 14 June 2017. https://lwn.net/Articles/440279/ ↩
"Devs cook up 'leakproof' all-Tor untrackable platform". The Register. 13 November 2012. Retrieved 10 July 2014. https://www.theregister.co.uk/2012/11/13/whonix/ ↩
Greenburg, Andy (17 June 2014). "How to Anonymize Everything You Do Online". Wired. Retrieved 10 July 2014. https://www.wired.com/2014/06/be-anonymous-online/ ↩
"Whonix adds a layer of anonymity to your business tasks". TechRepublic. 4 January 2013. Retrieved 10 July 2014. https://www.techrepublic.com/blog/smb-technologist/whonix-adds-a-layer-of-anonymity-to-your-business-tasks/ ↩
Choudhury, Ambika (4 June 2019). "10 Most Secured Linux Distros For Advanced Privacy & Security". AIM. Retrieved 1 November 2024. https://analyticsindiamag.com/ai-mysteries/10-most-secured-linux-distros-for-advanced-privacy-security/ ↩
"about | Alpine Linux". alpinelinux.org. https://alpinelinux.org/about/ ↩
says, GigaTux (24 August 2010). "Alpine Linux 2 review | LinuxBSDos.com". https://linuxbsdos.com/2010/08/23/alpine-linux-2-review/ ↩
OpenBSD Project (19 May 2020). "OpenBSD". OpenBSD.org. Retrieved 12 October 2020. https://www.openbsd.org/ ↩
"Qubes OS bakes in virty system-level security". The Register. 5 September 2012. https://www.theregister.co.uk/2012/09/05/qubes_secure_os_released/ ↩