It all depends on what scenario you want to protect yourself from.
So, lets begin with: Offline or online? :-)
The larger and more popular the distro, the more binary stuff in it.
The smaller and obscure the distro, the more incentive for the devs to do something evil intentionally, and the less eyes looking for unintentional bugs.
(preparing for flamewar here)
Also, the less online, the less convenient.
And, to put all of this into perspective: It all won't help *anything* against a dedicated attacker: Hardware-keyloggers, softwarekeyloggers (installed while breaking into your home), tempest. Or, to render *all* technical solutions worthless: $5 wrench attack against you or your loved ones.
I enjoy playing through opsec scenarios. What's yours?
Ente
Well, this opsec scenario is to look at OS in isolation, with any possible ancillary config in mind!
But if you want specifics, I'm looking to keep this online for the medium term. Mostly as I've not got another PC to use for offline transaction signing. And choice of new hardware should be a whole thread to itself IMO, lots to consider as far as hardware goes (and reading what you're saying about hardware keyloggers, this includes keeping the machine in a locked safe or something to protect me from ninjas breaking in and bugging my IO devices!)
Sticking to where the OS meets hardware, am I right to think that exposure to closed source hardware drivers/HAL interfaces is an issue that depends 100% on what hardware you run with an OS with such closed source components? So, could a careful choice of hardware make Linux Libre unnecessary?
If it's just a question of missing extra hardware for a dedicated offline computer, how about a rasbpi and Armory? One of the things on my to-do-list..
Cheap, tiny, easy to hide.
With much about any reasonable linux platform, I don't think a software attack is the biggest thread.
If it's a dedicated Armory system (no games, no surfing, no unnecessary software at all), all regular malware is out already.
This leaves only linux core bugs, exploits and backdoors (and bitcoind exploits, of course). Those are rare and expensive, unlikely to be used on a large scale against many users.
Now only obscure channels are left. Hypothetical weak RNG in SSL, bugged ECC, backdoored AES, backdoors in closed source drivers, in hardware, in the CPU itself. This stuff is, if it exists (what we have to assume here), only known to the NSA and maybe, if at all, comparable organisations (yeah, right). They wouldn't even make use of those even for the complete control of all Bitcoins in existance. It would not pay off to risk those channels becoming public.
Sorry, I kept talking and talking, I am heading in the wrong direction here.
I agree, after using a dedicated linux box, the next attack scenario would be closed source blobs. Well, ignoring dirty tricks like bugging software on-the-fly while you download it to your machine..
About using a platform with "open source drivers available" hardware only: You can define which repositories to use on all distros, you should be able to use open-sourced-only and compile-yourself repositories only. There are several distros which, by default, use FOSS only. Most closed-source-drivers aren't even needed here, like the 3D part of a graficcard, audio and so on.
So yes, I believe you don't even have to use special hardware or a special distro to be fully open source.
I plan to use said Armory on a Rasbpi soon. Then I don't need to make sure the hardware, drivers, linux, additional software, encryption algorithms, bitcoind and Armory are without bugs and backdoors, as I have (more or less) removed any possible way for data to leak out at all.
If then someone does the $5 wrench attack on me, I'll happily surrender the one bitcoin I own.
Sorry again, I feel this is not an answer you are looking for. My suggestion: Define your scenario. What to protect from? What are the accepted uncertainities, what are the accepted limits?
Besides that: Use linux, don't do anything else on that machine. Bingo 99.99% (more) secure (than 99.99 of the other Bitcoin folks)
Ente