Would installing an OS on an external ssd and booting into that to run pirated software while blocking access to other drives in your system or physically unplugging them be one way?

Or are there better ways to isolate the software you run and use as much as possible?

  • hogart@feddit.nu
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    I don’t know where you guys get your stuff but if you have reasons to be this causious I would suggest having your important stuff somewhere else instead of the other way arround.

    • Corroded@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 months ago

      It doesn’t hurt to be cautious. Trusted sources have occasionally included malicious materials and blindsided users

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    11 months ago

    Depends on your threat model.

    A air gap system is the gold standard.

    A virtual machine is a reasonable middle ground, and of course you cut the network access.

    Qubes lets you do both but it sacrifices some performance.

    A word of caution about dual booting systems: if something is running on the computer, it in theory has full access to everything attached to that computer, including unmounted drives, encrypted drives, even BIOS. There are Trojans that install themselves in the boot partition, and it’s possible an infected operating system could infect the non-infected operating system next time you boot.