Trusted Systems

Using only trusted systems is the prime principle. If a system is not trusted--all the other principles won't help you. An untrusted system may be used against you to make your most important priorities fail, take over any and all of your connected service accounts and violate your privacy in shocking ways (using any attached cameras and microphones to record you and/or logging all your key strokes).

A trusted system is one that has been built, configured, and fully patched by a trusted entity and that has never run untrusted code. For example, if you trust Dell and you purchase a new Dell computer--it is a trusted system when you first begin using it (your first action should be to run Windows Update to maintain the trusted status). Turning a trusted system into an untrusted one is as easy as running a single set of untrusted code on it. Why? The bottom line is--if untrusted instructions run on your system, you don't know what it does. All the worst things are possible.

Personally, I do a clean install of the Operating System when I buy a new system. I like this because then I get to make all the decisions on every bit of software that gets installed on the system. While this helps my mindset regarding trust of the system--it's biggest benefit is probably in reduction of bloatware.

Strategies for keeping a trusted system trusted:

There is only one way to revert an untrusted system back to a trusted state--reformat the storage media on it and reinstall the operating system.

Resistance to deceptive practices designed to trick you into running dodgy code on your system requires a baseline understanding of the legitimate practices that need your approval to run software for good reasons. The rest is easy. Anything that does not fit your understanding of legitimate is suspect. This content has a tilt towards Microsoft Windows systems, but the guidance on trust would apply to Macs, iPhones, Androids as well.

Legitimate Software

Examples of trusted sources:

You get the idea. Large software companies you've heard of will invest in securing their products and benefit from the significant scrutiny they get from big businesses that also use them. Be aware that since the software companies you've heard of have a large distribution base they are popular targets of trickery. When downloading trusted software, details matter. Make sure https sources are the real deal. Misspellings and obfuscation will be used to attempt to trick you into trusting an imposter.

Examples of Un-Trusted Sources

But ... what if I want to trust a more obscure software brand because it has interesting features that I want to try? See my notes on evaluating less well-known software here.




Lotus Quest