has anyone here heard of the Mempo project?? what do you think??
it looks interesting and they list whonix, tails, qubes, genoo, debian in a comparison matrix similar style to the one whonix publishes.
maybe they should be considered in the whonix comparison matrix?? https://www.whonix.org/wiki/Comparison_with_Others
Mempo Project - Hardened Privacy Mempo project aims to provide most secure and yet comfortable out-of-the-box computer for Desktop and Server, to professionals, business, journalists, and every-day users avoiding PRISM-like spying.
Mempo Project is the answer to increasing surveillance of people, and endangered freedom of speech - as well to other IT attacks, cracking by hackers, viruses.
Even professional tools are not secure if there exist way around them for an attacker.
Therefore - in Mempo, the best Privacy & Security tools are used together on all levels from kernel to Apps; preconfigured for VM+Tor+VPN, for virtualization and compartment - all available in one-click fashion as Full Installable OS, Live-CD, or separate programs (sources and .deb files + deb-repo).
Do I need Mempo?
Basically no one is really using the potential of existing security and privacy apps because of time and effort, and professional solutions are fixing given issue - but leaving other small holes.
Most people do not even know about hardware level attacks, root-kits, cold-boot, hacking NIC PCI cards, bugs in e.g. Xen, fire-wire attack, etc.
But is your computer immune (to the extent of currently available software) to known attacks?
Well. If you do use… theoretically unexploitable micro-kernel system like GNU Hurd on OpenRISC or at least GrSecurity max-settings kernel; on custom open-hardware mobo/BIOS/firmware, using PGP/post-QC where needed, with per-app files access-lists, everything is on separate VM on separate user with firewalled tunnels in between, all compiled from source after you meet all the developers on PGP signing-party - then yeah OK, in this case this Project can not offer you much
In any other case - continue below for details.