Bear in mind that security doesn't comes canned (metaphorically). You can use scripts to automate part of the process of securing a system, but you shouldn't rely on them to “harden” or whatever it claims to do if you don't understand what they do or why you would need such a thing. The Tor projects warns against the mistake of thinking of security as something that comes canned; see their warning at the download page.

Taking a look at the “What this does” section, the script you mention seems quite worthless. It doesn't seem to do anything that wouldn't be better done manually by the user according to his situation. It seems to be is lacking a license, therefore it is proprietary software. Also, it installs TrueCrypt which has been discontinued and it has never been free software (See Various Licenses and Comments about Them § TrueCrypt). It also installs Chrome which is not free software, see section 9.2 from their terms of service. Chromium apparently has licensing problems as well, but I haven't investigated further because I'm not interested in having any association with Google.

If you are interested in having a secure system, make sure to research everything you install. It's not practical to audit your system (tens of millions of lines of code), but you can check basic information before installing, such as licensing. In this case, doing so would have revealed the problems that I mentioned above. Also, you can read books about security. Don't take advice or install software without knowing what it entails for and knowing why it would benefit your security.

Reply via email to