So, this is a fascinating product in front of me, pure ISM. Willie do order this up then. Yesterday, Edward Snowden is on Roger's podcast talking about spying and tack, basically everything that they could monitor what they were monitoring. It reignites the conversation about how our technology is infiltrating our lives or has the potential to do so inside this box is a laptop targeted with special features to alleviate some concern over potentially being spied on. Willie do showed it to me. So here we go.
This is the perfect laptop for Edward Snowden inside this package. I believe is the 13-inch. They also make a 15 inch 1080p display core i7 7500. U so it's an Ultrabook, obviously up to 32 gigs of ram integrated graphics. You can configure it on the website up to 2 terabyte NVMe SSD.
You pick the firmware, and you pick the operating system, so they have something here called pure boot for the firmware pure OS for the software. Is it hack proof what nothing really is, but it aims to make the process of infiltration much more difficult. This has a separate wireless card. It has a separate controller for audio camera, USB and so forth. Another interest I don't know if I've ever seen a laptop sealed in a plastic bag when it arrives wow, that's very interesting.
Ok, it's still slim, and I like how has no branding matte black finish, aluminum a power brick and is a keep it super simple. For the stealth users, you got a bezel on this baby, that's a bezel on the baby. If this is what you're looking for you're going to put up with that yeah, it looks pretty sleep you're full out living hacker zone. You can live with the bezel. If what is if it's a black laptop? That's all I know what kind of laptop was he using I.
Don't know it was black. It's very laptop II. It's exact! You have Hardware switches over here for camera. Microphone can go off in one click, just like that dead kill switch electrical cuts and then this secondary kill switch for Wi-Fi and Bluetooth. So this turns off your transmitting radios.
Nothing goes in. Nothing comes out. You have a headphone jack, USB, port and DC in for charging it. Oh, it's actually a lot of ports on this thing over on the other side, another USB port, full size, HDMI, USB, type-c, connector and a full size, SD card slot, and it's three Pelts. It's only three pounds.
Yes, lightweight keyboard, chicle style. This key is important. Maybe we'll, you can refresh me it's a powerful key to search your computer and applications, one button to rule them all brown fox, duh, quick yeah. They have a little hacker to him. Little hat Snowden would go for it.
He would have proof this would be legal to do, but we can't tell you why trackpad pretty smooth so far. Look at that. So how you know you're in pure OS, baby crypt set up wireless networking is disabled. Okay, we turn it on. Well, what about my switch? My switch is off now it's on there we go I had to turn it on to initiate the connection.
The software toggle did nothing until I initiated the hardware toggle. It is running Linux. Okay, it's based on Linux privacy warning location services allows applications to determine your geographical location. An indication is shown when these services are in use. I'm going to leave that off for now, okay, we named the device set a disk encryption password.
You see what I was saying. Well, it encourages you to be secure. Your secure individual guy. Like you, it's nice, onboarding Meredith. You need it to decrypt the disk of this computer.
Okay, this big moment right now, don't lose it well, don't lose it we're ready to go. You like that name! Well, pure OS, it's appropriate yeah, pure activities, whew! Look at that yeah little Doc over here. Let's see what the stock browser looks like what doesn't load a homepage, it just it's blank until you do something. It has rules for forced encryption connections for double-click, google, google, API services YouTube. You know how secure I am right.
Now anybody you want, you can see anything they've ever typed into that Google search box right Joe. What is the worst thing you've ever typed into that search box. Obviously it's a pretty typical laptop speaker. If you're this super private, individual, you're, probably wearing these earbuds like Snowden, is they've got stuff baked into the browser. When you boot it up, this thing called you block origin and HTTPS Everywhere and when they're enabled they're blocking all kinds of activities that are happening via the browser from the sites that you're visiting, but they slowed things down quite a bit.
It's like I was saying to will. If you got 10 locks on your house, it's going to be a secure house, but it's also going to take 10 times as long to come and go you get a lot of people. They put some sort of sticker over the webcam. If they're nervous, the switch is obviously the best implementation when I click the switch off. Let's see if the camera goes off in a software three two one dead error playing video from the webcam- that's pretty cool! You have to admit that so you purism key.
Let's give that a shot. What happens? Oh, Oh? Oh, that's cool, so this trigger is the same effect as clicking the activities button. So you can hit the peer ISM key and just start searching. You could look for jack, and it'll bring up some clocks, some software, but this can look throughout the entire system. So what if I did sound yeah able bring up the sound sense? That's pretty fast to the kill switch for the Wi-Fi use e to Wi-Fi up here.
So let's make sure that goes dead as well. If I click that off boom see the airplane pops up straight away, it's so convenient that I thought people would actually use it. Hmm, do you? Yes, all right! So there you have it a very simple, clean type of laptop. It's not going to win any awards for being the most cutting-edge appearance-wise, but the core focus here is to give you kind of the most secure experience you can have on a streamlined premium. Looking laptop without the need to do a ton of configuration yourself, you boot this thing up, you do the setup.
You have the hardware toggles you have the pure OS. You have their boot system. It encourages encryption of the drive. It gives you a more secure place to do your through your things. Will whatever that happens, to be whether you're Willy do or Edward Snowden.
Source : Unbox Therapy