1
00:00:00,920 --> 00:00:08,580
so before learning about a secure os like tails or cubes or anything else, it's important to understand how operating systems work in general.

2
00:00:08,720 --> 00:00:21,480
this won't be a comprehensive guide on the deep inner workings of operating systems, but we do want to explain at a high level what the purpose of a secure operating system is and comparing it to something like a normal operating system.

3
00:00:21,700 --> 00:00:26,120
but before we can do that, we need to understand how operating systems actually work.

4
00:00:26,340 --> 00:00:37,760
so an operating system at the most basic level, sits above the hardware and interacts with the hardware of your computer or device and allows you to run things on top of it like applications or software.

5
00:00:38,140 --> 00:00:45,640
the operating system is what communicates with that hardware, with your cpu, your memory, your graphics card, everything in between.

6
00:00:45,660 --> 00:00:52,840
the operating system helps control that flow of information and control how the software and applications actually function.

7
00:00:53,380 --> 00:01:15,800
you can have really large operating systems like a windows or a mac operating system, which are large files, large installs, or you can have really, really slim operating systems down to even more of container approach where you have things that are nearly distroless where it's only the raw things you need to operate something like a container or a microservice.

8
00:01:15,980 --> 00:01:26,330
but in the scope of what we're talking about, we're talking about those larger ecosystem operating systems, things like windows, things like macos, things like ios and android, and even linux.

9
00:01:26,330 --> 00:01:32,760
all of these are larger oses that come with a lot of things packaged with it to allow you to work effectively.

10
00:01:34,700 --> 00:01:42,760
each operating system might differ in terms of their interface and how you access them, but the core concepts remain the same.

11
00:01:42,820 --> 00:01:48,840
they allow you to do things on top of your hardware and access different services, systems, and applications.

12
00:01:49,740 --> 00:01:54,090
android, mac, windows, those are all types of operating systems that exist.

13
00:01:54,090 --> 00:01:58,270
so you can have operating systems that are for the phone or you can have them for a computer.

14
00:01:58,270 --> 00:02:06,600
you can also have operating systems for like a raspberry pi, or you can have server operating systems like windows server or the red hat server.

15
00:02:06,980 --> 00:02:13,190
and throughout the courses here on dark web academy, we'll talk about things like tails and cubes and other secure oss.

16
00:02:13,190 --> 00:02:17,450
and those are mainly going to be desktop based workstation oss.

17
00:02:17,450 --> 00:02:24,720
those are not server oss and those really aren't things that are slimmer meant for raspberry pi or thin clients or anything like that.

18
00:02:25,180 --> 00:02:34,440
so the real power of an operating system comes when you have multiple software and apps on top of the operating system because the operating system allows those to communicate together.

19
00:02:34,660 --> 00:02:37,000
certain software can feed into other software.

20
00:02:37,140 --> 00:02:44,210
certain apps can feed into other apps, and the operating system underneath it all allows that communication flow to happen smoothly.

21
00:02:44,210 --> 00:02:51,520
this is why you can have things like an email link and when you click the link in the email, it opens your browser and opens up the link in the browser.

22
00:02:51,940 --> 00:02:59,680
that would be an example of the operating system facilitating that flow of data to allow those links to happen across multiple different software tools.

23
00:03:01,020 --> 00:03:07,670
the concern about operating systems though, comes in when, what if a software or a tool wants to maliciously access something?

24
00:03:07,670 --> 00:03:18,640
say you have a browser and you have a chat app, and normally they're not supposed to communicate, but your browser, because it has lacks security permissions on the operating system, can get information from your chat app.

25
00:03:18,820 --> 00:03:32,480
in that scenario, and this is a fictitious scenario, but it could happen, if you visited a certain website and it ran a certain script on your computer, which looked for any installed chat applications and pulled the logs from that chat application.

26
00:03:32,940 --> 00:03:38,200
if you don't have proper security in place on your operating system, it won't stop that from happening.

27
00:03:38,540 --> 00:03:42,850
now, modern operating systems do have security in place to stop this sort of thing.

28
00:03:42,850 --> 00:03:52,480
they have protection, they have antivirus, they have security controls to make sure that different applications are not going overboard and accessing things they shouldn't.

29
00:03:52,580 --> 00:03:54,600
but these tools are not perfect.

30
00:03:54,740 --> 00:04:00,450
they have issues and the operating themselves sometimes come into question because they have access to everything.

31
00:04:00,450 --> 00:04:07,840
so it's always a question of what are they getting info on and what are they sending back as telemetry or data that they want?

32
00:04:08,780 --> 00:04:11,590
so that's a high level overview of operating systems.

33
00:04:11,590 --> 00:04:19,680
in the next video, we're going to talk about operating system security to understand kind of that default security that we mentioned that does exist with operating systems.