โI had a dream. I was in a strange land. A vast wilderness. I went on and on, but met no one. I called, I shouted... but no one answered. I was alone.โ
-Akira Kurosawa, Ran
Look, I get this question a lot for obvious reasons, so I know you wonโt like the answer. Itโs dissatisfying. But, because you asked, the best cybersecurity commercially available is something called an air-gapped computer.
An air-gapped computer has no network card. You wonโt see a cerulean ethernet cord spouting from the stern of the case. Thereโs no hard, hollow plastic antenna to receive a wifi signal. It doesnโt have Bluetooth. My compsci professor at Tech explained it like this: thereโs a literal wall of airโa gapโbetween the computer and anything that could inject it with compromising code. This abstinence-only approach makes air-gapped computers cheap, simple, and impenetrably secure.
But much like celibacy, not a lot of people opt for the air-gapped method. Whatโs the point of a computer, they ask, without e-mail and Twitter and porn? And I understand that. There were days I got so dog-tired of the manual data dumps, of examining each file down to the binary before connecting the USB, of hand-transcribing scraps of code onto sheets of paper; of the day-to-day ennui of existence inside those invisible walls. But when I break into a system, all I see is each and every way very, very bad things can get in.
The air wall was better. It let me breathe.
My laptop had to be online so I could access those vulnerable systems, but my desktop was air-gappedโa little black lockbox of my pdfs, jpgs, pngs, mp3s, mp4s, xls, txts, zips, bins, bats, dats, all my associate backgrounds and every line of my code. Every byte of my identifying information was kept there; separate, and secret, and self-contained.ย