Subgraph OS was designed from the ground-up to reduce the risks in endpoint systems so that individuals and organizations around the world can communicate, share, and collaborate without fear of surveillance or interference by sophisticated adversaries through network borne attacks.
Subgraph OS is designed to be difficult to attack. This is accomplished through system hardening and a proactive, ongoing focus on security and attack resistance. Subgraph OS also places emphasis on the integrity of installable software packages.
Strange how only a few years ago, I’d call this stuff paranoid.
I looked and couldn’t find anything that suggested a new novel approach?
It’s just a Linux based OS with configuration / patches applied. It doesn’t do anything you could’t do using a popular Linux distro with some but not too much work.
Here’s the key question – does it address any problem that a well configured popular Linux based OS can’t?
Am I missing something?