Why Use Virtual Machines for Privacy and Security? Not Obvious! Top 6 List!
Summary
TLDREl video destaca los beneficios de la seguridad cibernética y privacidad que ofrece el uso de máquinas virtuales, particularmente en el contexto de amenazas de plataformas como Facebook y Meta. Presenta seis ventajas específicas de las máquinas virtuales, incluyendo la creación de copias seguras del SO, el aislamiento de correo electrónico y datos, la prevención de la recolección de direcciones MAC, la protección de la identidad del dispositivo y la separación de identificadores de Microsoft y Apple. Además, se ofrece una guía básica de instalación de una máquina virtual con Oracle VM VirtualBox y Linux Mint.
Takeaways
- 🔒 Las máquinas virtuales ofrecen beneficios de seguridad cibernética, como se utiliza en versiones de seguridad de Linux como Cubes y Honix.
- 🛡️ Existen amenazas de privacidad específicas de plataformas como Facebook y Meta que solo se pueden contrarrestar completamente con una máquina virtual.
- 📚 A pesar de ser un tema moderadamente avanzado, se mostrará cómo instalar una máquina virtual simple para educar a los principiantes.
- 💻 La principal ventaja de la virtualización es la capacidad de ejecutar un sistema operativo secundario (hijo) bajo el sistema operativo principal (anfitrión).
- 🌐 El software de virtualización como Oracle VM VirtualBox utiliza las capacidades de virtualización del CPU para hacer que el sistema operativo piense que realmente se está ejecutando dentro de una máquina real.
- 🔄 Las máquinas virtuales permiten clonar el sistema operativo configurado deseado y restaurarlo en caso de infección por malware.
- 📬 Las máquinas virtuales sirven para sandboxear el cliente de correo electrónico, evitando que malwares infecten el sistema anfitrión.
- 🔐 Albergar datos dentro de una máquina virtual aísla la información de la vigilancia maliciosa, lo cual es crucial para periodistas, activistas y fuente de inteligencia.
- 🌐 Las máquinas virtuales aíslan la red, evitando que aplicaciones como las de Meta identifiquen dispositivos en la red a través del ARP.
- 🔄 No hay identificador único permanente en Linux, lo que proporciona una ventaja significativa en privacidad sobre los sistemas operativos propietarios como Microsoft y Apple.
- 🔒 Las máquinas virtuales también permiten el uso de VPN, ya que obtienen acceso a Internet a través del sistema anfitrión, mejorando la privacidad y seguridad en línea.
Q & A
¿Qué beneficios ofrece el uso de una máquina virtual en términos de seguridad cibernética?
-El uso de una máquina virtual brinda múltiples beneficios en términos de seguridad cibernética, como la capacidad de clonar el sistema operativo para restaurarlo en caso de infección por malware, el aislamiento de aplicaciones potencialmente peligrosas mediante el uso de un entorno de pruebas (sandboxing), y la protección de la privacidad al evitar que el sistema operativo principal sea vulnerable a ataques o vigilancia.
¿Por qué se recomienda el uso de una máquina virtual para navegar en plataformas como Facebook y meta?
-Se recomienda el uso de una máquina virtual para navegar en plataformas como Facebook y meta debido a que estas plataformas son conocidas por recopilar información personal y llevar a cabo análisis de comportamiento. Al utilizar una máquina virtual, se crea un entorno aislado que protege la privacidad del usuario y evita que la actividad en línea sea monitoreada o analizada por estas plataformas.
¿Qué es la virtualización y cómo funciona en el contexto de las máquinas virtuales?
-La virtualización es una tecnología que permite la ejecución de múltiples sistemas operativos en una sola máquina física, a través de máquinas virtuales. Funciona a través de un software de virtualización que emula los recursos del hardware, permitiendo que cada máquina virtual tenga la ilusión de ser una computadora independiente. Esto se logra gracias a que las capacidades de virtualización están integradas en los procesadores modernos, lo que reduce la interferencia del sistema operativo anfitrión en la comunicación entre la máquina virtual y el hardware real.
¿Qué es un sistema operativo anfitrión y cuál es su función en una máquina virtual?
-El sistema operativo anfitrión (host OS) es el sistema operativo que se ejecuta directamente en el hardware de la computadora y soporta la ejecución de las máquinas virtuales. Su función es proveer a las máquinas virtuales acceso a los recursos del hardware, como la pantalla, teclado, ratón, memoria y periféricos, actuando como intermediario entre las máquinas virtuales y el hardware físico.
¿Qué es un sistema operativo invitado y cómo se diferencia del sistema operativo anfitrión?
-El sistema operativo invitado (guest OS) es el sistema operativo que se ejecuta dentro de una máquina virtual. Se diferencia del sistema operativo anfitrión en que no corre directamente en el hardware, sino que está aislado dentro del entorno virtualizado creado por el software de virtualización. El sistema operativo invitado piensa que está ejecutándose en una máquina real, pero en realidad está siendo gestionado por el sistema operativo anfitrión.
¿Qué es la cloné de una máquina virtual y cómo es útil para la seguridad?
-La clonación de una máquina virtual implica crear una copia exacta del sistema operativo y la configuración de la máquina virtual. Esto es útil para la seguridad porque permite a los usuarios restaurar su sistema a un estado seguro y limpio en caso de que se infecte con malware o se comprometa la seguridad. Al clonar y restaurar la máquina virtual, se eliminan cualquier malware o daño previamente existente.
¿Cómo se puede instalar una máquina virtual usando Oracle VM VirtualBox?
-Para instalar una máquina virtual usando Oracle VM VirtualBox, primero se descarga e instala el software de VirtualBox. Luego, se descarga una imagen ISO del sistema operativo deseado, como Linux Mint. A continuación, se crea una nueva máquina virtual en VirtualBox, se especifica el nombre, la ubicación de la imagen ISO y se configuran los recursos como la memoria y el procesador. Finalmente, se inicia la máquina virtual e instala el sistema operativo a partir de la imagen ISO.
¿Qué es la sandboxing y cómo protege la privacidad del usuario?
-La sandboxing es una técnica de seguridad que aísla un proceso o aplicación en un entorno controlado y separado del sistema operativo principal. Esto protege la privacidad del usuario al evitar que aplicaciones o contenidos maliciosos dañen el sistema operativo o accedan a información sensible. Al ejecutar un email client o un navegador en un entorno de sandboxing dentro de una máquina virtual, se reduce el riesgo de infección o exposición de datos personales.
¿Cómo la máquina virtual evita la recolección de direcciones MAC por aplicaciones como Facebook?
-Cuando se ejecuta una aplicación dentro de una máquina virtual, la red de la máquina virtual se izola del sistema operativo anfitrión y actúa como una subred independiente. Esto significa que, incluso si una aplicación ejecuta un protocolo de resolución de direcciones (ARP) dentro de la máquina virtual, solamente se mostrarán los dispositivos conectados a esa red virtual y no los del host. De esta manera, se evita que Facebook u otras aplicaciones identifiquen y recopile direcciones MAC de dispositivos en la red del sistema operativo anfitrión.
¿Cómo la máquina virtual ayuda a proteger la identidad del dispositivo en sistemas operativos como Windows y macOS?
-La máquina virtual ayuda a proteger la identidad del dispositivo al evitar que aplicaciones externas capturen identificadores únicos como el ID de producto de Windows o el ID equivalente en macOS. Al ejecutar Linux en una máquina virtual, no se tienen estos identificadores únicos, lo que dificulta el rastreo o la identificación del dispositivo por parte de las aplicaciones. Esto proporciona una mayor privacidad y seguridad en comparación con el uso directo del sistema operativo propietario.
¿Cómo afecta el uso de una máquina virtual la posibilidad de usar un VPN en la conexión a Internet?
-El uso de una máquina virtual no impide el uso de un VPN. Si se activa un VPN en el sistema operativo anfitrión, la máquina virtual heredará esa conexión VPN ya que obtiene su acceso a Internet a través del sistema anfitrión. Esto significa que todo el tráfico de la máquina virtual será encriptado y transmitido a través del túnel VPN, proporcionando una capa adicional de seguridad y privacidad.
Outlines
🔒 Ventajas de la privacidad y la seguridad de las máquinas virtuales
Este párrafo aborda las ventajas específicas que aportan las máquinas virtuales (VM) en términos de privacidad y seguridad. Se menciona que algunas distribuciones de Linux como Cubes y Honix utilizan VM para proteger la seguridad. Además, se discute cómo las VMs pueden contrarrestar las amenazas provenientes de plataformas como Facebook y Meta. El video pretende explicar seis ventaja específicas de las VMs y cómo estas pueden ser una solución de privacidad y seguridad indispensable. También se ofrece una breve guía para instalar una VM simple, resaltando que aunque es un tema moderadamente avanzado, se aborda de una manera educativa para los principiantes.
💻 Instalación rápida de una máquina virtual
En este párrafo, se presenta un tutorial de instalación de una máquina virtual Oracle VM VirtualBox en un sistema operativo Windows 11. Se menciona la descarga de la versión 7.0.14 de VirtualBox y una imagen ISO de Linux Mint. Se sugiere organizar los archivos de instalación en una carpeta específica para evitar errores de permisos. El proceso de instalación se detalla, desde la aceptación de los términos y condiciones hasta la configuración inicial de la VM. Además, se habla sobre la personalización de la VM, como ajustar la pantalla y la instalación de un navegador Chromium para una mejor experiencia de usuario.
🛡️ Beneficios cibernéticos de utilizar una máquina virtual
Este párrafo enumera y explica seis beneficios claves de utilizar una máquina virtual para mejorar la seguridad y la privacidad. Incluye la creación de una copia segura del sistema operativo, el aislamiento de correo electrónico y datos, la prevención de la recolección de direcciones MAC, la ocultación de la identidad del dispositivo y la protección contra la identificación por parte de Microsoft o Apple. También se menciona la posibilidad de utilizar una VPN en la VM para aumentar la privacidad en redes domésticas.
🌐 Soluciones adicionales para la privacidad y la seguridad
El último párrafo aborda estrategias adicionales para proteger la privacidad y la seguridad en línea. Se sugiere el aislamiento del navegador y la utilización de múltiples navegadores para evitar el seguimiento de actividades en Google. Además, se menciona la importancia de aislar el uso de Facebook en una VM para protegerse de amenazas como la recolección de direcciones MAC. Finalmente, se promociona un sitio de redes sociales enfocado en la privacidad y se mencionan productos diseñados para proteger la privacidad, como el bra virtual phone, Brax mail y otros.
Mindmap
Keywords
💡virtual machine
💡cybersecurity
💡privacy
💡Linux
💡sandbox
💡MAC address
💡AI scanning
💡digital product ID
💡VPN
💡browser isolation
Highlights
Virtual machines offer cybersecurity benefits, which is why some security-focused Linux distributions like Cubic and Honix use them.
Virtual machines can provide specific advantages for privacy, especially against threats from platforms like Facebook and Meta.
The video discusses six specific advantages of using a virtual machine for privacy and security.
Virtualization allows running a child operating system under the host operating system, with the host OS acting as an intermediary to hardware resources.
Modern CPUs have built-in virtualization capabilities, which means the host OS has minimal interference with the speed of communication between the actual machine and the virtual machine.
The video provides a demonstration of running Windows on the host machine and Linux Mint on the virtual machine, showing how multiple operating systems can be used simultaneously.
Linux is recommended for virtual machines as it is more privacy-safe compared to Windows, which has been known to include more spyware.
Running inside a virtual machine can prevent AI-based content and usage scanning by the host OS, enhancing privacy.
The video includes a quick installation guide for a virtual machine using Oracle VM VirtualBox on a Windows 11 laptop.
Virtual machines can be used to clone a safe OS copy, which is useful for restoring the system if it gets infected with malware.
Email clients can be installed inside the virtual machine, isolating them from the host machine and reducing the risk of malware infection through email attachments.
Data can be isolated inside the VM, preventing AI scanning and protecting content from malicious spying.
MAC address collection by apps like Facebook can be prevented by isolating the network in a virtual machine, as it acts as its own network subnet.
Virtual machines can protect device identity, as apps cannot capture unique identifiers like the Windows product ID when running Linux.
Using a virtual machine can prevent the acquisition of Microsoft ID or Apple ID by sandboxing potentially harmful apps.
The video suggests using virtual machines for more sophisticated protection, recommending isolation of email, Facebook, and Google in separate virtual machines.
Transcripts
some of you may already know that there
are cyber security benefits to using a
virtual machine in fact that's why some
security versions of Linux like cubes
and honix uses virtual machines but what
most people don't know are the specific
advantages of using a virtual machine
for privacy there are some particular
threats from the likes of the most evil
platform Facebook and meta in general
that you can't completely beat unless
you use a virtual machine in this video
I will discuss six specific advantages
to a virtual machine that make this a
privacy and security solution you cannot
ignore this is a moderately Advanced
topic since many of you may not have the
word withal to install a virtual machine
but to educate the beginners I will show
you how to install a simple virtual
machine this particular solution is
often overlooked as a privacy tool and
admittedly I don't talk about it as much
as I have introduced some less complex
Alternatives however the Alternatives do
not solve all the problems while a
virtual machine solution does if you
want to kick up your privacy skills up a
notch by knowing this Tech and how it
can benefit you stay right there to
learn the six extra advantages of a
virtual
machine
in this video I'm going to install a
virtual machine on a laptop running
Windows 11 the virtual machine software
I will use is the free Oracle VM virtual
box this same virtual machine can be
installed on Mac OS and
Linux on Linux you also have the option
of using the free software KVM to create
virtual machines I have a video on KVM
and I do have an older video on
installing VM virtual box which is more
detailed than what I will show here and
of course there are other options on
Linux like toot the main concept of
virtualization is that you can run a
child operating system under the host
operating system the main operating
system called The Host is Windows 11 in
this example today it will make the
child operating system which today will
be Linux Mint
think it is running inside an actual
Intel machine but really it will not be
directly running under the Intel machine
rather it will be running in a virtual
computer and the host OS will be an
intermediary by providing access to
Hardware like the display keyboard mouse
memory and peripherals in modern
computers the virtualization capability
is built into the CPU now so the host OS
barely interferes in the speed of
Communications between the actual
machine and the virtual machine so a
software tool like Oracle VM virtual box
using the virtualization features of the
CPU will make the OS think it is really
running inside a real machine so here's
a quick demonstration of that here I'm
running Windows on my host machine it is
the actual operating system then here
using virtual box I have launched my
pre-installed instance of Linux Mint so
it's like having multiple operating
systems at my disposal in this example
this virtual machine window is running a
YouTube video as you can see it's pretty
watchable however it's probably not that
great for used with 4K video so it has
limits by the way for better privacy it
is best to install Linux on your virtual
machines as I did in this example Linux
will be the most privacy safe
as I'm showing here the host system is
Windows Windows has a lot of spyware
most can be turned off but there are
more being added by Microsoft constantly
just recently Microsoft enabled co-pilot
on this computer which is basically an
AI that I can talk to and who knows what
other surveillance it is doing on this
machine now I haven't had a chance to
study this yet on Mac OS aside from the
continuous monitoring by Apple of data
like location and usage statistics Mac
OS just like iOS are currently the main
devices that support client side
scanning meaning the AI in the device
can search your local content and
reported to HQ if a match is found
pretty invasive but when you're running
inside a virtual machine what you're
doing is not directly visible to the
host OS so this should blunt any AI B
content or usage scanning this is one
benefit that I will tell you right now
but there are very specific things that
will not be obvious that I'll tell you
about later so this is a bonus benefit
now before I get too deep let's begin by
doing a quick install of a virtual
machine I won't get into too much detail
here and I will speed up the video just
to give you a quick picture I downloaded
a couple of things in advance first I
downloaded the latest version of Oracle
VM virtual box which as of the time of
this video is
7.0.1 4 then I also downloaded an ISO
image of Linux Mint which I got from the
Linux Mint website I chose Linux Mint in
this example because it is a popular
drro with
beginners now in my experience it is
problematic to have the files in some
download folder because it causes
permission errors in Windows so I found
that the easiest way to avoid problems
is to make a folder and put all the
files we are going to install in there
and you need to be logged in as the
admin user so here it is in my case I
have the virtual box files and the Linux
Min files ready to go now let's do a
quick install of virtual box this new
version gives a warning message about
python core which we are not going to
care about since we are not running
python so just ignore that just accept
the defaults and continue the
installation now when you are done and
you run the virtual box application you
will see this UI of virtual box what we
are going to do is click on new then we
will fill in the name and the folder
where we will install the virtual
machines and then we specify the Linux
Mint ISO file we need I'm just going to
specify this as Linux
64bit I did an unattended installation
here it's took a while so I'm speeding
up this portion of the install here
quite a
bit
[Music]
next I will turn on the virtual machine
by double clicking the one I want and
this will boot the virtual machine into
a child OS this will basically start up
Linux Mint again make sure to remember
the user and password you've given to
your Linux user I won't show this in the
video but I installed a Chromium browser
on the VM I find that this is less buggy
than the default Firefox browser and
seems faster as well for watching
videos I also adjusted the screen
display size so it is larger my host
computer has Invidia so this VM may not
be completely using the GPU features
right
now
[Music]
after the install I will shut down the
VM and adjust a few settings as you see
here I just want to check the amount of
memory it allocated you can play with
this later I have a lot of memory so I
can give it a bunch I took a quick
glance at the other resources given and
they appear to be
fine so here's the final result I have
the host machine on the main screen and
you can see the window in the middle
which is running
YouTube this window is Linux Mint in
actual use it can be seamless you can
run your normal stuff on Windows and
then you also have the option to run a
virtual machine for when you want
privacy or Security benefits now that we
have the tools we need let me tell you
why you would use a virtual machine and
what the benefits are I'm going to list
cyber security and privacy
benefits number one have a safe OS copy
this will be important for later you can
clone your virtual machine that you have
set up the way youd like and when you
clone it you can easily restore it if
and when your OS gets infected Ed with
some malware so if you're in doubt as to
the safety of a prior action you can
stop immediately and restore the latest
clone copy of your OS this will wipe out
any malware
immediately number two sandbox your
email you can install your email client
inside the virtual machine and not
install it on your host machine this is
a fact that the average person doesn't
know probably 90% of all malware comes
from attachments and email the biggest
source of attacks is when through social
engineering some attacker makes you
click an attachment and in this process
infect your device would malware
fortunately if your emails inside the
virtual machine it cannot infect your
host machine all you have to do is
restore your clone copy of the virtual
machine and you are assured that your OS
is clean one again number three isolate
your data in the
VM if we have to worry about the AI in
Windows or Mac OS looking at our content
then the best way to prevent this AI
scanning is to put your content inside
the virtual machine this would be
important if you're a whistleblower a
journalist or maybe an activist of some
sort this type of isolation keeps your
content away from malicious spying
usually the OS will give you the option
to encrypt your VM hard disk so if this
is a concern in your particular instance
then this is how you handle that by the
way I don't usually worry about any AI
scanning if my host system is Linux
Linux is open- source and very safe but
the proprietary OS is from Microsoft and
Apple do unknown things however
sometimes we have no choice but to
install Windows in our devices or we
have a Macbook in which case it will be
running Macos the good news is that we
can always install a virtual machine
even in these
cases number four Mac address
collection let me tell you about a
surveillance scheme used by meta it's
specified in the data policy of Facebook
so this is something I've always known
about a Facebook app if you use an app
will run ARP address resolution protocol
which is a command I will demonstrate
here on the command line if I go to a
command line on Windows and run ARP it
will actually show all the devices on
your network and all the Mac addresses
well these Mac addresses are unique
identifiers and they are assigned to
your specific devices if ARP detects
your mobile devices Facebook Instagram
and WhatsApp will actually identify your
presence near a group of either other
men users simply by the MAC address
announcements in any other network you
happen to be in this is a huge privacy
Invasion Danger from the most dangerous
app ever now let me show you what
happens when you run ARP in a virtual
machine look at this because the virtual
machine network is isolated it acts as
its own network subnet and thus other
devices will not be visible on the host
Network this is also very important
because if some app runs AR on your
network finding the same combinations of
Mac addresses is like a fingerprint and
it will match each and every one of you
in the network as part of a set this
will allow identification even if you're
using a VPN at the moment the only party
that states they are using this Tech is
meta but obviously anyone can do this
without telling you number five computer
identity this is a problem on Windows
and Mac ma OS any app can find some
unique identifier on your device this is
equivalent to iOS or Android reading the
IMI on your phone I will specifically
demonstrate this on Windows let me show
you the most obvious identifier on
Windows and this is the unique thing on
your device which is the Windows product
ID any app can read this data in the
Windows registry to demonstrate this I
will go to the command line and run reg
edit then going through the indices hkey
local machine software Microsoft Windows
NT current
[Laughter]
version you can see these digital
product ID digital product
id64 product
ID but these ones I'm showing you are
pretty obvious and I will be frank with
you I have personally programmed apps
that read these identifiers to check
software licenses to apps I've made this
match to the product ID is unique now
since any app can capture this product
ID easily as you can see here then it's
very easy to capture the device identity
at all times however if you're running
Linux as we are demonstrating in our
virtual machine example then you do not
have a unique identifier in Linux
certainly nothing as permanent as a
Microsoft product ID this is a huge
Advantage with privacy using a virtual
machine you can protect the device
identity I'm actually concerned if
Chrome or other browsers read these
identifier so understand that they can
whether they do or not I don't know but
better be safe than
sorry number six Microsoft ID or Apple
ID there are are other identifiers in
the registry that I've demonstrated in
other videos for example you can see the
product name and registered owner here
now I've cleansed my system as I
explained in a video last year so I
removed all references to registered
owner which is the Microsoft ID in this
case but again realize that this data
can be captured again we show the
advantage of a virtual machine here even
if your host machine is running Windows
but whatever you deem could be a buing
app like a Chrome browser for example
will be sandboxed in Linux and will not
be able to acquire the Microsoft ID your
name and other little goodies in the
Windows registry and of course the
equivalent Apple ID will not exist in a
virtual machine running
Linux just to make this little
discussion complete if you're on a home
network you need to run a VPN on the
host Os or use a VPN router like bra
router in your networ networ then the
virtual machine will also use the VPN
since it gets its internet access from
the host machine there are more
sophisticated techniques for connecting
the virtual machine to another Network
in the cloud I haven't tried that yet
but I can see that as an available
feature on Virtual
box the reason I've not been promoting
the use of a virtual machine too much
even though I've made several videos on
it is that I've been talking about about
the simpler solution which I call
browser isolation use multiple browsers
and partition your activities into
Google and non- gooogle using these
browsers this will isolate the Google ID
and prevent your activities outside of
Google from being tracked however this
is not foolproof since some of the
identifiers I mentioned here can be
captured by Rogue apps specifically like
Facebook so if you Pur in using Facebook
the only solution I can offer you is to
isolate that use in a virtual machine it
is not necessary to use a virtual
machine for every activity but isolating
email Facebook and Google in separate
virtual machines is a very sophisticated
protection method and will protect you
both from cyber security and privacy
threats I hope this information has been
helpful folks I have a company that
creates products made to protect your
privacy this is available through my
privacy focused social media site bra me
we have now exceeded 100,000 active
users so join us there our store There
features products like the Google phones
the bra virtual phone bvpn Brax mail bra
rers and more I've created most of these
products myself and you can discuss them
with the community over at brme those
are the actual users of these products
so they will be honest with you thank
you for watching and see you next
[Music]
time
関連動画をさらに表示
VMware TUTORIAL completo (Crear máquinas virtuales) // Español 2023
Instalación de Windows Server 2022 en VMware Workstation y VirtualBox | Paso a Paso
Use an Email Alias!
Como exportar e importar una máquina virtual - VirtualBox - Español
Conectar 2 VM entre ellas VMWARE - RESUBIDO
Cómo crear una máquina virtual para instalar y probar un sistema operativo en ella 2022
5.0 / 5 (0 votes)