{"id":202195,"date":"2017-06-29T10:50:58","date_gmt":"2017-06-29T14:50:58","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/purism-aims-to-push-privacy-centric-laptops-tablets-and-phones-to-market-computerworld\/"},"modified":"2017-06-29T10:50:58","modified_gmt":"2017-06-29T14:50:58","slug":"purism-aims-to-push-privacy-centric-laptops-tablets-and-phones-to-market-computerworld","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/purism-aims-to-push-privacy-centric-laptops-tablets-and-phones-to-market-computerworld\/","title":{"rendered":"Purism aims to push privacy-centric laptops, tablets and phones to market &#8211; Computerworld"},"content":{"rendered":"<p><p>    A San Francisco-based start-up is creating a line of    Linux-based laptops and mobile devices designed with hardware    and software to safeguard user privacy.  <\/p>\n<p>    Purism this week announced general availability of its 13-in. and 15-in. Librem    laptops, whichit says can protect users against the    types of cyberattacks that led to the recent Intel AMT exploits    and WannaCry ransomware attacks.  <\/p>\n<p>    The laptop and other hardware in development has been    \"meticulously designed chip by chip to work with free and open    source software.\"  <\/p>\n<p>    \"It's really a completely overlooked area,\" said Purism CEO    Todd Weaver. \"We also wanted to start with laptops because that    was something we knew we'd be able to do easily and then later    get into phones, routers, servers, and desktops as we expand.\"  <\/p>\n<p>    The company has already designed a 11.6-in. Linux-based 2-in-1 that can currently be    pre-ordered. Weaver expects the 2-in-1 to be available in about    six months. The 2-in-1 with a basic 256GB SSD and 8GB of memory    retails for $1,398.  <\/p>\n<p>    Purism's 2-in-1 is based on the same Linux OS as its laptops    and has physical toggle switches that can turn off its cameras,    microphone and wireless connectivity.  <\/p>\n<p>    Around the same time, the company wants to ramp up development    of an open-source smartphone that will also sport native    security features such as an encrypted messaging platform. The    company still needs $5 million in capital to develop the    privacy-based smartphone, Weaver said.  <\/p>\n<p>    Now that the Purism has built up an inventory of laptops,    however, it will begin targeting businesses as customers for    its laptops; wait times for one should only be a few weeks.  <\/p>\n<p>    \"The nice thing about the B2B sales is our core audience -- the    software developers, hardware geeks and hardcore security    individuals,\" Weaver said. \"CTOs and CIOs are, of course, in    that core audience and they recommend technology to buy. So,    we'll start picking up small businesses...and be able to expand    that to much larger enterprises because we have a depth of    credibility they're interested in.\"  <\/p>\n<p>    By \"depth of credibility,\" Weaver means his company's    philosophy that it will always release its system source code,    enabling it to be audited and known vulnerabilities    eliminated in order to avoid even theoretical    cyberthreats.  <\/p>\n<p>    For example, in May, Intel announced that PCs sold after 2010    with its server chipsets could be remotely hacked due to a    critical vulnerability in its Active Management Technology    (AMT) firmware, a component of Intel's 7th Generation Intel    Core vPro processors. Intel released a patch for the vulnerability.  <\/p>\n<p>    The vulnerability was first discovered in March by a researcher    at Embedi, a security product provider. Along with allowing a    potential hacker to gain control of a PC's mouse and keyboard,    the vulnerability also enabled a hacker to bypass a computer's    password authentication processes.  <\/p>\n<p>    \"Prior to the Intel publishing the AMT (Active Management    Technology) exploit, it was all just a theoretical threat,\"    Weaver said. \"We took it upon ourselves to say that is a    theoretical threat, so we're going to remove it. The way we    remove it is, of course, we don't use an Intel networking card,    we don't use a management engine that has that networking stack    in it, and we don't use a CPU that has vPro, which means AMT isn't able to be used.\"  <\/p>\n<p>    Because Purism's laptops don't natively run Windows or macOS or    applications, they're not suseptible to common ransomware    attacks, such as the WannaCry attack in May, Weaver said.  <\/p>\n<p>    Purism's 15-in and 13-in Librem laptops.  <\/p>\n<p>    The laptops are built on sixth-generation Intel i5 mobile    processors and so-called PureOS, a platform based on Debian GNU\/Linux that    runs the open-source Coreboot BIOS firmware.  <\/p>\n<p>    The computers come preinstalled their version of the LibreOffice    suite of business applications, software created by    The Document Foundation, a non-profit organization    based in Germany. The suite includes email, spreadsheets,    graphics, drawing, presentation, media player and Purity's own    browser called PureBrowser.  <\/p>\n<p>    PureBrowser is based on the Firefox web browser but includes    security add-ons such as the Privacy    Badger, a plug-in created by the non-profit Electronic    Frontier Foundation (EFF) that blocks spyware and browser    trackers.  <\/p>\n<p>    The laptops also come with a preinstalled Tor Browser, an    anonymizing browser that uses encryption and anonymous routing    to protect users' rights, and the EFF's HTTPS    Everywhere, a browser extension that encrypts    communications with many major websites.  <\/p>\n<p>    Despite the company's plans, analysts say it could have a tough    climb.  <\/p>\n<p>    Mikako Kitagawa, a principal research analyst at Gartner, said    a vendor as small as Purism will have a difficult time breaking    into even the midsized corporate market, as that laptop market    is already dominated by Lenovo, Dell and HP.  <\/p>\n<p>    \"The reality is that large companies do not really get their    hardware from unknown vendors,\" she said.  <\/p>\n<p>    Additionally, when Purism announced the Librem laptop line in    2015, it caused something of a stir in the open-source    software community from developers who argued the company    wasn't fully delivering on its promise of a completely    open-source computer because it used an Intel processor and a    proprietary BIOS.  <\/p>\n<p>    \"The criticism comes down to the strictness of Free Software    Foundation enthusiasts, which is completely understandable,\"    Weaver said. \"The concern from that audience...is that they    wanted us to be further along than we are.\"  <\/p>\n<p>    Now that Purism is using Coreboot, there is only    200KB worth of proprietary binary code remaining on the    computer, Weaver said.  <\/p>\n<p>    He compared the laptops and their software to a layer cake in    which the first seven layers are open source, and only the last    layer remains to be freed through reverse engineering.  <\/p>\n<p>    \"Yes, we know we have this binary, but it's at the lowest    level. We're investing [revenue] back into the supply chain and    reverse engineering the management engine, which is the last    remaining binary we have,\" Weaver said.  <\/p>\n<p>    A base model of the Librem 13 laptop, with 8GB of RAM and a    250GB SATA 3-attached SSD retails for $1,898; the Librem    15, also with 8GB of memory and a 250GB SATA SSD, retails    for $1,999.  <\/p>\n<p>    Purism launched a crowdfunding campaign in 2014 to raise money    to develop the two laptops and a 2-in-1 tablet. The    crowdfunding campaign for the 13-in laptop raised about $462,000 of a $250,000 goal; the 15-in    laptop raised nearly $600,000 of its $250,000 goal.  <\/p>\n<p>    All together, Purism said it's raised more than $2.5 million    (including seed funding) and has seen 35% to 38% average    monthly growth in orders over the last year for its Librem    13-in and 15-in laptops, respectively. Previously, the laptops    were only made-to-order, meaning it took up to three months to    get one.  <\/p>\n<p>    Along with free, open-source software, the laptops come with    two physical toggle switches, one to turn off the microphone    and camera and another to shut off wireless\/Bluetooth    connectivity. The laptops also sport something called a \"Purism    Key,\" a one-touch method to search the computer for documents    and applications.  <\/p>\n<p>    The laptops have a distinctively MacBook-like look to them.    They include a multi-touch track pad that can scroll, click,    zoom, and scale the view in the same way a MacBook's trackpad    works.  <\/p>\n<p>    Weaver said that's no coincidence, as purchasing any sturdy,    all-aluminum laptop case from third-party vendors who mimic    Apple designs leaves little room for customization. And, in    fact, a lot of Purism's core customers are Apple enthusiasts    and will be familiar with the build quality.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to read the rest:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.computerworld.com\/article\/3204133\/mobile-wireless\/purism-aims-to-push-privacy-centric-laptops-tablets-and-phones-to-market.html\" title=\"Purism aims to push privacy-centric laptops, tablets and phones to market - Computerworld\">Purism aims to push privacy-centric laptops, tablets and phones to market - Computerworld<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A San Francisco-based start-up is creating a line of Linux-based laptops and mobile devices designed with hardware and software to safeguard user privacy. Purism this week announced general availability of its 13-in <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/purism-aims-to-push-privacy-centric-laptops-tablets-and-phones-to-market-computerworld\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-202195","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/202195"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=202195"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/202195\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=202195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=202195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=202195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}