字幕列表 影片播放
So this is a really interesting product in front of me purism.
Willie, do order this up.
Then yesterday, Edward Snowden is on Rogan's podcast talking about spying and tak basically everything that they could monitor.
But they were.
It reignites the conversation about how our technology is infiltrating our lives or has the potential to do so.
Inside of this box is a laptop targeted with special features to alleviate some of the concern over potentially being spied on.
Willie do showed it to me.
So here we go.
This is the perfect laptop for Edward Snowden.
Inside of this package, I believe, is the 13 inch.
They also make a 15 inch 10 80 p display core I 7 75 100 You.
So it's an ultra book, obviously up to 32 gigs of Ram integrated graphics.
You can configure it on the website up to two terabyte and V M E S S t.
You pick the firmware and you picked the operating system.
So they have something here called pure boot for the firm where pure os for the software.
Is it hack proof what Nothing really is.
But it aims to make the process of infiltration much more difficult.
This has a separate wireless card.
It has a separate controller for audio camera.
Us being so forth.
Another interest.
I don't know if I've ever seen a laptop sealed in a plastic bag when it arrives.
Wow, that's very interesting.
Okay, it's still slim.
And I like how has no branding?
Matte black finish aluminum, a power brick and s a key Bit super simple for the stealth users.
You got a vessel on his baby?
That's a vessel on the baby.
If this is what you're looking for, you're gonna put up with that.
Yeah, it looks pretty.
Sleep your full outliving hacker zone.
You can live with the best.
What is it?
It's a black laptop.
That's all I know.
What kind of laptop was he using?
I don't know.
It was black.
It's very laptop.
Its exact You have hardware switches over here for camera.
Microphone can go off in one click, just like that.
Dead kill switch, electrical cuts.
And then this secondary kill switch for WiFi and Bluetooth.
So this turns off.
You're transmitting radios.
Nothing goes in, nothing comes out.
You have a headphone jack USB port and desean for charging it.
Oh, is actually a lot of ports on this thing over on the other side, another USB port, full size HD, my USB type C connector and a full size SD card slot on his £3.
It's only £3.
Lightweight keyboard, chick lit style.
This key is important.
Maybe will you can refresh me.
It's a powerful key to search your computer and applications one button to rule them all.
Brown Fox Duh.
Quick.
Yeah, they they have a little hacker to him.
Little stoning would go for it.
He would approve.
This would be legal to do.
But we can't tell you why.
Trackpad pretty smooth so far.
Is that how you know you're in pure OS baby crypt set up.
Wireless networking is disabled.
Okay, we turn it on.
Well, what about my switch?
My switches off.
Now it's on there.
Yo.
Had to turn it on to initiate the connection.
The software toggle did nothing until I initiated the hardware.
Toggle.
It is running limit.
Okay.
It's based on Linux privacy.
Warning location service is allows applications of determined your geographical location in indication is shown when the service is Aaron use.
I'm gonna leave that off for now.
Okay?
We named the device.
Set a disc encryption password.
You see what I'm saying?
Well, it encourages you to be secure.
Your secure individual guy like you.
It's nice on boarding.
Cleared it.
You need it to decrypt the disc of this computer.
Okay.
It's big moment right now.
Don't lose it.
Well, lose it.
We're ready to go.
You like that name will.
Pure os.
It's appropriate.
Yep.
Here, activities.
Who?
Look at that.
You little Doc over here.
Let's see what the stock browser looks like.
What doesn't load a home page?
It's just It's blank until you do something.
He has rules for forced encryption connections for DoubleClick.
Google, Google 80 Eyes Service's YouTube.
You know how secure I am right now.
You know of everybody in the United States anybody want you could pull up their text messages anybody you want.
If you could see anything they've ever typed into that Google search box, right, Joe, what is the worst thing you've ever typed into that search box?
Obviously, it's a pretty typical laptop speaker.
If you're this super private individual, you're probably wearing these earbuds like Snowden is.
They've got stuff baked into the browser when you boot it up.
This thing called you block origin and https everywhere.
And when they're enabled, they're blocking all kinds of activities that are happening via the browser from the sites that you're visiting.
But they slow things down quite a bit.
It's like I was saying, Toe will, if you got 10 locks on your house, is gonna be a secure house.
But it's also gonna take 10 times as long to come and go.
You get a lot of people.
They put some sort of, ah, sticker over the Web can.
If they're nervous.
The switch is obviously the best implementation.
When I click the switch off, let's see if the camera goes off in a software 3 to 1 dead air playing video from the webcam.
That's pretty cool.
You have to admit that So you're purism key.
Let's give that a shot.
What happens?
Oh oh, that's cool.
So this trigger is the same effect as clicking the activities button so you can hit the purism Keen.
Just start searching.
You could look for Jack and it brings up some clocks, some software, but this can look throughout the entire system.
So what if I did sound?
Yeah, able bring up the sound said, That's pretty fast to the kill switch for the wife.
I need a WiFi up here, so let's make sure that goes dead as well.
If I click that off, boom airplane pops up straightaway.
It's so convenient that I think people would actually use it.
Do you?
Yes.
All right, so there you have it.
A very simple, clean type of laptop.
It's not gonna win any awards for being the most cutting edge appearance wise.
But the core focus here is to give you kind of the most secure experience you can have on a streamlined, premium looking laptop without the need to do a ton of configuration yourself.
You boot this thing up, you do the setup.
You have the hardware toggles.
You have the pure OS.
You have their boot system.
It encourages encryption of the drive.
It gives you a more secure place to do your do your things, wealth, whatever that happens to be.
Whether your Willy do.