{"id":36060,"date":"2020-07-13T21:34:00","date_gmt":"2020-07-13T21:34:00","guid":{"rendered":"http:\/\/b8095ab4-3b1d-4e5f-ad11-9cb3b3ca8e79"},"modified":"2020-07-13T21:34:00","modified_gmt":"2020-07-13T21:34:00","slug":"the-next-generation-of-the-purism-linux-laptop-is-on-its-way","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/","title":{"rendered":"The next generation of the Purism Linux laptop is on its way"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2020\/07\/13\/4ead014e-3aa5-4745-a382-6d88b4b7073f\/thumbnail\/770x578\/26d9c3a5d3f6c69947d04df6f0fb0f67\/librem-linux-laptop-2020.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">Open Source<\/span> <\/h3>\n<\/p><\/div>\n<p>For most Linux desktop users who want a ready-to-run Linux laptop, I recommend the <a href=\"https:\/\/www.zdnet.com\/article\/dell-xps-13-linux-developer-edition-2020-hands-on-a-great-laptop-for-hard-working-developers\/\">latest high-end Dell XPS 13<\/a>. I can also suggest <a href=\"https:\/\/system76.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">System76<\/a> or <a href=\"https:\/\/zareason.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">ZaReason<\/a> PCs or laptops for those who want top-of-the-line Linux hardware. But if privacy, security, and free software are at the top of your &#8220;Want&#8221; list, then you should check out <a href=\"https:\/\/puri.sm\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Purism<\/a>, maker of free software and Linux-powered laptops, and its next-generation <a href=\"https:\/\/puri.sm\/products\/librem-14\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Librem 14 laptop<\/a>.<\/p>\n<p>This newest model, which is scheduled to ship in early Q4 2020, comes with the following hardware:<\/p>\n<ul>\n<li><strong>Screen: <\/strong>14-inch matte 1920\u00d71080<\/li>\n<li><strong>CPU:<\/strong> Intel Core i7 10710U, 6 cores and 12 threads<\/li>\n<li><strong>RAM: <\/strong>up to 64GB<\/li>\n<li><strong>GPU: <\/strong>Intel UHD Graphics<\/li>\n<li><strong>Network:<\/strong> Wi-Fi and Gigabit ethernet card with built-in RJ45 connector&nbsp;<\/li>\n<li><strong>Storage: <\/strong>2 x NVMe-capable M.2 slots<\/li>\n<li>External Monitor Support for two displays via HDMI and USB-C<\/li>\n<li><strong>Power:&nbsp;<\/strong> USB-C power delivery besides a standard barrel connector<\/li>\n<\/ul>\n<p>It&#8217;s default low-end configuration with 8GB of RAM and a 250GB drive is available for pre-order now with an &#8220;early bird&#8221; base price of $1199. Later, the same model will, it appears, sell for $1,499.<\/p>\n<p>But you&#8217;re not buying a Purism laptop for its price or hardware specs as you might any other computer. You&#8217;re buying it because it puts security and free software first. It starts with <a href=\"https:\/\/docs.puri.sm\/PureBoot.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">PureBoot<\/a>.<\/p>\n<p>This <a href=\"https:\/\/puri.sm\/posts\/deep-dive-into-intel-me-disablement\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">disables part of the Intel Management Engine<\/a>, so only the essential code for your PC to boot is left. For the BIOS firmware, it uses <a href=\"https:\/\/puri.sm\/coreboot\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Coreboot, a<\/a> free software BIOS replacement.&nbsp;<\/p>\n<p>The laptop, and other Purism hardware, also comes with a <a href=\"https:\/\/whatis.techtarget.com\/definition\/trusted-platform-module-TPM\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Trusted Platform Module (TPM)<\/a> chip. This is used by <a href=\"https:\/\/docs.puri.sm\/PureBoot\/Heads.html#heads\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Heads<\/a>, Purism&#8217;s tamper-evident boot software that loads from within Coreboot and uses the TPM and the user&#8217;s own GPG keys to detect tampering within the BIOS, kernel, and GRUB config. You can use this with the company&#8217;s two-factor authentication <a href=\"https:\/\/docs.puri.sm\/Librem_Key.html#librem-key\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Librem Key<\/a>, a USB security token. This works with Heads <a href=\"https:\/\/puri.sm\/posts\/the-librem-key-makes-tamper-detection-easy\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">to alert the user to tampering<\/a> with an easy &#8220;green light good, red light bad&#8221; alert.<\/p>\n<p><a href=\"http:\/\/osresearch.net\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Heads<\/a> is an open-source computer firmware and configuration tool that aims to provide better physical security and data protection. It&#8217;s built on Trammel Hudson&#8217;s <a href=\"https:\/\/trmm.net\/Heads\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Heads security firmware<\/a>. This firmware combines physical hardening of hardware platforms and flash security features with custom Coreboot firmware and a Linux boot loader in ROM.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>While still not a complete replacement for proprietary AMD or Intel firmware blobs, Heads &#8212; by controlling a system from the first instruction the CPU executes to full boot up &#8212; enables you to track steps of the boot firmware and configuration.<\/p>\n<p>Once the system is in a known good state, the TPM acts as a hardware key to decrypt your <a href=\"https:\/\/www.cyberciti.biz\/hardware\/howto-linux-hard-disk-encryption-with-luks-cryptsetup-command\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">LUKS encrypted drive<\/a>. Additionally, the Xen hypervisor, Linux kernel, and initial ramdisk (initrd) images are signed by user-controlled keys.&nbsp;<\/p>\n<p>Purism&#8217;s <a href=\"https:\/\/www.debian.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Debian Linux<\/a>-based <a href=\"https:\/\/pureos.net\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">PureOS<\/a> uses a signed, immutable root filesystem. With this, software exploits that attempt to gain persistence should be detected. While these improvements can&#8217;t secure your laptop against every possible attack vector, they harden it against several known classes of boot process attacks.<\/p>\n<p>PureOS is one of the few <a href=\"https:\/\/www.fsf.org\/news\/fsf-adds-pureos-to-list-of-endorsed-gnu-linux-distributions-1\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">GNU\/Linux distributions to be endorsed by the Free Software Foundation (FSF)<\/a>. PureOS earned this, according to Donald Robertson, FSF Licensing and Compliance Manager. &#8220;An operating system like PureOS is a giant collection of software, much of which in the course of use encourages installation of even more software like plugins and extensions. Issues are inevitable, but the team behind PureOS worked incredibly hard to fix everything we identified.&#8221;<\/p>\n<p>This Linux distro uses the <a href=\"https:\/\/www.gnome.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">GNOME desktop<\/a>. Currently, PureOS uses the <a href=\"https:\/\/support.mozilla.org\/en-US\/kb\/switch-to-firefox-extended-support-release-esr\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Firefox Extended Support Release (ESR)<\/a> as its default web browser on PureOS 9 Amber. But the company is moving to the <a href=\"https:\/\/wiki.gnome.org\/Apps\/Web\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">GNOME Epiphany web browser<\/a> in its next release, PureOS 10 Byzantium. With both, Purism edits the programs to make them more free-software friendly and more secure.&nbsp;<\/p>\n<p>To help lock down its applications, PureOS comes with some programs secured with <a href=\"https:\/\/wiki.ubuntu.com\/AppArmor\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">AppArmor<\/a>. This, like <a href=\"https:\/\/www.hpe.com\/us\/en\/insights\/articles\/how-to-set-up-selinux-right-the-first-time-1901.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">SELinux<\/a>, is a Linux security system. It binds access to programs rather than to users via Linux kernel loaded profiles. Purism also uses the <a href=\"https:\/\/flatpak.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Flatpak<\/a> packing system for extra security. Flatpak installed programs, like <a href=\"https:\/\/snapcraft.io\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Snap<\/a>, run in containers, so they can&#8217;t interfere with each other.&nbsp;<\/p>\n<p>Last, but not least, Purism comes with hardware kill switches to physically disconnect the camera and mic and\/or Wi-Fi and Bluetooth to keep snoopers away.<\/p>\n<p>For those who are truly paranoid, you can use Purism&#8217;s anti-interdiction services for added security in transit to verify your new laptop has not been tampered with during shipment.<\/p>\n<p>Todd Weaver, Purism&#8217;s CEO and founder, said: &#8220;I am beyond excited to see the Librem laptop journey arrive at the build quality and specifications in the Librem 14. This fifth version of our line is the culmination of our dream device rolled into a powerful professional laptop. We have invested heavily so every customer will be proud to carry our laptops, and the Librem 14 will be the best one yet.&#8221; &nbsp;<\/p>\n<p>I&#8217;ve been using <a href=\"https:\/\/puri.sm\/products\/librem-15\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Purism&#8217;s Librem 15<\/a> myself over the last few months. This system, which comes with a 3.50GHz Core i7 Kaby Lake Processor, 8GB of RAM, and a 256GB SSD, has worked well for me. I&#8217;m sure that, for any user whose top requirements are security and free software, the new Librem 14 will make you happy, too.<\/p>\n<h3><strong>Related Stories:<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you want a free software and security first Linux desktop, keep an eye out for Purism&#8217;s forthcoming Librem 14 laptop.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36061,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-36060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The next generation of the Purism Linux laptop is on its way 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The next generation of the Purism Linux laptop is on its way 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-13T21:34:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The next generation of the Purism Linux laptop is on its way\",\"datePublished\":\"2020-07-13T21:34:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\\\/\"},\"wordCount\":910,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\\\/\",\"name\":\"The next generation of the Purism Linux laptop is on its way 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way.jpg\",\"datePublished\":\"2020-07-13T21:34:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The next generation of the Purism Linux laptop is on its way\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The next generation of the Purism Linux laptop is on its way 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/","og_locale":"en_US","og_type":"article","og_title":"The next generation of the Purism Linux laptop is on its way 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-07-13T21:34:00+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The next generation of the Purism Linux laptop is on its way","datePublished":"2020-07-13T21:34:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/"},"wordCount":910,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/","url":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/","name":"The next generation of the Purism Linux laptop is on its way 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way.jpg","datePublished":"2020-07-13T21:34:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-next-generation-of-the-purism-linux-laptop-is-on-its-way\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The next generation of the Purism Linux laptop is on its way"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36060"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36060\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36061"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}