This is a list ofoperating systems specifically focused onsecurity. Similar concepts includesecurity-evaluated operating systems that have achieved certification from anauditing organization, andtrusted operating systems that provide sufficient support formultilevel security and evidence ofcorrectness to meet a particular set of requirements.
hardened_malloc) and offers privacy/security features, such as Duress PIN/Password or disabling the USB-C port at a driver/hardware level to avoid exploitation.