

Subgraph also runs exposed and vulnerable applications within unique environments, known as Oz. For more information about the Subgraph kernel, check out the Subgraph kernel configs on GitHub. Subgraph ships with a kernel built with grsecurity/PaX (a system-wide patch for exploit and privilege escalation mitigation), and RAP (designed to prevent code-reuse attacks on the kernel to mitigate against contemporary exploitation techniques). Thanks to the GNOME desktop, Subgraph is incredibly easy to use. But unlike other platforms that might attempt to achieve such lofty goals, Subgraph makes this all possible, while retaining a high-level of user-friendliness. Subgraph is a desktop computing and communication platform designed to be highly resistant to network-borne exploits and malware/ransomware attacks. If you’re a Linux desktop user, you might think about adopting a distribution like Subgraph. That means Linux users, who have for years ignored such threats, should begin considering that their platform of choice could get hit. With the Linux desktop popularity on the rise, you can be sure desktop malware and ransomware attacks will also be on the increase. See: Linux Malware on the Rise: A Look at Recent Threats One only need consider Heartbleed and Wannacry, to remember that Linux is not invincible. That doesn’t mean exploits and attacks on the Linux platform don’t exist. On the desktop side, I’ve yet to experience an attack of any kind. That instance was a server hit with a rootkit.

In fact, after 20 years of usage, I have personally experienced only one instance where a Linux machine was compromised. By design, Linux is a very secure operating system.
