Resources

The Ghost Laptop: Frequently Asked Questions (FAQs)

Ghost Laptop Frequently Asked Questions (FAQs)

This is a consistently updated repository of all the most Basic Frequently Asked Questions (FAQs).

Over the past 2+ years we have fielded and answered 100’s of questions about these devices.

Please check the Q’s and A’s below, and our other resources, before reaching out with questions via support@mark37.com.

What is Zorin OS?

Zorin OS is a version of Linux, an alternative to Windows and macOS designed to make your computer faster, more powerful, secure, and privacy-respecting.

What is Linux?

Linux = Freedom from BigTech!

Linux is an open source operating system designed to run on laptops, desktops and servers which has been around since the mid 1990’s. Most all enterprise servers run on Linux and the marketplace for consumer devices running on Linux is currently exploding. Approximately 57.8% of all websites currently run on Linux.

Linux based operating systems are designed to give YOU back control of your device and prevent unwanted companies and applications from running in the background of your computer doing things you don’t want or need them doing. For more details, please read through: https://www.linux.com/what-is-linux/

Will I still be able to browse the web?

Yes – Zorin comes with the Brave browser pre-installed.

Will the files on my Macbook or Windows computer transfer over?

Yes. Transferring data from Windows or Mac normally involves using an external device. Data is copied from the current system to the external device, and then again from the external device to your Zorin system. The process may be as simple as plugging in the external drive and copying data, or it may involve modifying the external drive to a format which both systems understand.

Why do you offer Zorin versus other Linux distributions?

Zorin is quite easy to navigate from the end user perspective. When a user migrates from Microsoft Windows or macOS, the intuitive user interface which Zorin provides helps to make that transition as simple as possible.

We performed testing with some “non tech savvy” users, and in every instance Zorin was chosen as the easiest to navigate and use.

Will my current Microsoft or Apple applications work?

There is no easy answer to this, as it greatly depends on what specific applications you are using and how you use them.

Some accounting software, such as Quicken for example, do not have an available NON-Windows or MacOS option. Microsoft Office will not run on the device without a custom Windows “emulator” of sorts called WINE.

In both cases, however, there are open source or paid software alternatives that either DO work in a Linux environment or via a web based Software as a Service (SaaS) model which makes the operating system you’re using not essential.

If you have questions about specific software working or not, please reach out to us at support@mark37.com and we’ll let you know what options are available.

Can you configure a system to dual boot (Windows + Zorin or Zorin Pro)?

A dual-boot Windows / Linux environment is a setup where two operating systems, Windows and Linux, are installed on the same computer, but only one is active at a time.

Each OS has its own hard drive (preferable), or partition on the hard drive, and a boot loader determines which OS to start when the computer starts. This allows users to choose between Linux and Windows as their primary operating system, depending on their needs and preferences.

While dual booting is possible, we do not offer dual boot configurations. For those who choose to go this route, we recommend leveraging an entirely separate device if you “need” to run Windows specific applications because most non tech savvy customers who try to leverage these dual boot devices end up having more issues and headaches than it’s worth.

What security programs should I use?

One needs to re-learn what they think they know about digital security when using a Linux operating system vs Windows or MacOS.

This is primarily due to the transparent nature of open source operating systems which prevent the vast majority of unwanted applications from either working at all on a Linux device or attempting to run without you giving it permissions to do so.

We HIGHLY recommend giving this quick video a watch to learn the why and how related to Linux security: Should Linux Users Run Anti-Virus?

Will I be un-trackable using this device?

The short answer is that individuals (or agencies) with enough means and motive can find creative ways to “hack” into our devices despite all of our best efforts. This is the equivalent to an individual trying to stay safe and protected while still operating in the world, with the best security and body guards available, when an army or intelligence agency is throwing their full weight behind your capture or assassination.

This being said, using Linux alone pulls the vast majority of the blatant spyware from Google, Apple and Microsoft off of the device. Though not a silver bullet solution, it is a gigantic step in the right direction.

Leveraging the suite of VPN, browser and related tools and services that we cover in our Healthy Alternatives to BigTech post will take you even further!

For a more detailed and nuanced answer to this question, please consider reading our article Can we Really Go Ghost with our Devices?

Is Zorin a secure operating system?

Zorin, like any modern Linux distribution, puts a strong emphasis on security. While no operating system can claim to be completely immune to vulnerabilities or attacks, Zorin incorporates several security features to help protect your system and data. Here are some aspects that contribute to the security of Zorin:

• Linux Security Model: Zorin is built on top of the Linux kernel, which benefits from the robust security mechanisms inherent in Linux. This includes access controls, process isolation, and user privilege management.

• Regular Updates: Zorin provides regular software updates to address security vulnerabilities, bug fixes, and performance improvements. It’s crucial to keep your system up to date to benefit from the latest security patches.

• Secure Software Sources: Zorin utilizes official software repositories that are carefully curated and monitored by the Zorin team. This helps ensure that the software you install comes from trusted sources, reducing the risk of malware or compromised packages.

• AppArmor and Firejail: Zorin incorporates security frameworks like AppArmor and Firejail. AppArmor allows for the confinement of applications, restricting their access to system resources and protecting against potentially malicious actions. Firejail provides additional sandboxing capabilities to isolate applications and limit their access to sensitive areas of the system.

• User Account Control: Zorin implements user account control, which prompts for administrative privileges when performing system-level changes. This helps prevent unauthorized modifications to critical system files or settings.

• Firewall and Network Security: Zorin includes a built-in firewall (iptables) that can be configured to control incoming and outgoing network traffic. Additionally, Zorin benefits from the security features provided by the Linux kernel, such as secure networking protocols and strong encryption.

• Privacy Settings: Zorin offers privacy settings that allow you to control the data collection and telemetry aspects of the operating system. You can customize privacy settings during the initial setup or modify them later through the system settings.

It’s important to note that while Zorin incorporates these security features, maintaining a secure system also relies on responsible user behavior. Practicing good security habits, such as using strong passwords, regularly updating software, avoiding untrusted software sources, and being cautious while browsing the internet, further enhances the security of your Zorin installation.

What settings can I configure in Zorin to make it more secure than the default security?

Zorin provides several settings that you can configure to enhance the security of your system beyond the default settings. Here are some key areas where you can make adjustments:

• Firewall Configuration: Zorin includes a built-in firewall called iptables. To configure the firewall, you can use a graphical front-end tool like gufw. Open the Software Center, search for “gufw,” and install it. Once installed, launch gufw and enable the firewall if it’s not already active. You can then customize incoming and outgoing rules to control network traffic.

• User Account Management: Zorin uses user accounts to manage access to the system. By default, Zorin prompts for administrative privileges when performing system-level changes. You can further enhance security by creating a separate, non-administrative user account for regular daily use. This helps minimize the impact of any potential security breaches.

 

 

 

 

 

 

 

 

 

 

• Password and Authentication Policies: You can strengthen password security by enforcing stronger password policies. Open the “Settings” app, go to “Details” > “Users,” and click on the gear icon next to your user account. From there, you can set a password policy that requires stronger passwords or enforces password expiration. Additionally, consider enabling two-factor authentication (2FA) for your user account and any online services you use.

• Privacy Settings: Zorin provides privacy settings that allow you to control data collection and telemetry. Open the “Settings” app, go to “Privacy,” and review the various options available. You can disable or customize data collection settings for usage statistics, error reporting, and location services according to your preferences.• Software Updates: Keeping your system up to date is crucial for security. By default, Zorin prompts you to install updates. However, you can configure automatic updates for increased convenience and security. Open the “Software & Updates” app, go to the “Updates” tab, and select your preferred update settings.

• Encrypted Home Folder: Zorin offers the option to encrypt your home folder, which provides an additional layer of security for your personal files and data. During the installation process or afterward, you can enable home folder encryption. This ensures that your files are encrypted and protected from unauthorized access in case your system is compromised.

• AppArmor Profiles: Zorin uses AppArmor to confine applications and limit their access to system resources. You can further enhance security by enabling additional AppArmor profiles for applications that do not have them enabled by default. You can install the apparmor-profiles package from the Software Center, which provides a collection of additional AppArmor profiles.

• These are just a few examples of the settings you can configure to enhance the security of your Zorin system. It’s important to strike a balance between security and usability and tailor the settings to your specific needs and requirements. Regularly reviewing and updating your security settings is recommended to stay protected.

How can I learn more about using Zorin to enhance personal privacy when connected to the internet?

To learn more about enhancing personal privacy in Zorin while connected to the internet, you can explore various resources and follow best practices. Here are some steps you can take:

• Online Documentation: Zorin provides official documentation that covers a wide range of topics, including privacy and security. Visit the Zorin website and look for documentation or user guides that specifically address privacy-related features and settings. This documentation will provide detailed instructions and explanations. Zorin Help topics can be found at https://help.zorin.com/, and the Zorin Forum can be found at https://forum.zorin.com/.

• Privacy-centric Websites and Blogs: Many websites and blogs focus on privacy and provide valuable information and guides related to Zorin and other Linux distributions. Explore websites such as PrivacyTools (privacytools.io) or blogs like It’s FOSS (itsfoss.com) for articles and tutorials specifically tailored to privacy in Linux. These resources often cover topics such as secure browsing, encrypted communication, and privacy-focused applications.

• Privacy-Focused Software: Zorin offers a variety of applications that can enhance privacy when connected to the internet. For example, consider using privacy-focused web browsers like Firefox or Brave, which offer enhanced privacy features and support add-ons for additional privacy measures. Explore and install privacy-oriented applications available in the Zorin Software Center.

• Encryption and VPNs: Zorin includes built-in support for disk encryption, which allows you to encrypt your entire system or specific partitions. This protects your data in case your device is lost or stolen. Additionally, consider using a virtual private network (VPN) when connecting to the internet, which adds an extra layer of privacy by encrypting your internet traffic. There are several VPN providers available that offer Linux-compatible clients.

• Privacy Extensions and Add-ons: Web browser extensions can enhance your privacy while browsing the internet. Popular extensions like uBlock Origin, HTTPS Everywhere, and Privacy Badger can help block ads, enforce secure connections, and protect against online tracking. Install these extensions from your browser’s extension store.

• Privacy-Oriented Search Engines: Consider using privacy-focused search engines like DuckDuckGo or Startpage instead of mainstream search engines. These search engines prioritize user privacy by not tracking or storing personal information.

• Privacy Settings: Zorin provides privacy settings that allow you to control data collection and telemetry. Review and adjust these settings to align with your privacy preferences. Open the “Settings” app, go to “Privacy,” and explore the available options.

Remember that privacy is a multifaceted topic, and it’s important to approach it holistically. Continuously educate yourself on emerging privacy concerns and regularly review and update your privacy measures as needed. By combining privacy-conscious software choices, secure browsing habits, and appropriate privacy settings, you can enhance your personal privacy while using Zorin and being connected to the internet.

Do your laptops run Coreboot?

They do not. Our opinion at this time, is that unless you’re a super-spook or high valued target for government or private interests, the gained value of using Coreboot vs the existing proprietary BIOS or UEFI system for the added expense just isn’t there… yet.

To learn more about what Coreboot actually is and if it is essential for a private and secure laptop running Linux, please read our post HERE.

In Summary

Is Zorin a secure operating system?

• Yes, Zorin is designed with security in mind.
• It incorporates security features like access controls and process isolation.
• Regular updates are provided to address security vulnerabilities.
• It includes security frameworks like AppArmor and Firejail for application confinement.
• Good security practices and responsible user behavior are still important.

What settings can I configure in Zorin to make it more secure than the default security?

• Enable and configure the built-in firewall using a graphical tool called gufw.
• Set stronger password policies and consider enabling two-factor authentication (2FA).
• Review and customize privacy settings to control data collection and telemetry.
• Keep your system up to date with regular software updates.
• Consider encrypting your home folder for added security.
• Explore additional AppArmor profiles for applications without them.

How can I learn more about using Zorin to enhance personal privacy when connected to the internet?

• Explore Zorin’s official documentation for privacy-related features and settings.
• Visit privacy-focused websites and blogs that offer guides and tutorials for Zorin.
• Use privacy-focused software like secure web browsers and VPNs.
• Install browser extensions for ad-blocking and privacy protection.
• Consider using privacy-oriented search engines.
• Review and adjust privacy settings in the Zorin “Privacy” section of the settings.

Remember, it’s important to strike a balance between security and usability, and continuously educate yourself on privacy best practices.

Connect on Social Media

Shopping cart0
There are no products in the cart!
Continue shopping