Quantcast
Viewing all articles
Browse latest Browse all 7

Privacy Oriented Linux Distrubutions & Software

Image may be NSFW.
Clik here to view.

And No I’m Not Joking, This Shit Is Real And Extremely Dangerous.

With big brother and the ever so dreaded thought police making it’s foothold in societies all over the world. It’s hard to imagine were privacy will go when or if the system decides to completely abolish it in the name of political correctness. But in the last five years, independent computer programmers, privacy advocates, civil libertarians and politically non-partisan individuals have made the push to redevelop operating systems that are designed to keep your thoughts, liberty and personal information away from the predators of the state.

Tor: Anonymity Network

Image may be NSFW.
Clik here to view.

 

Tor is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user’s location or usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity, including “visits to Web sites, online posts, instant messages and other communication forms”, back to the userand is intended to protect users’ personal freedom, privacy, and ability to conduct confidential business by keeping their internet activities from being monitored.

“Onion routing” refers to the layered nature of the encryption service: The original data are encrypted and re-encrypted multiple times, then sent through successive Tor relays, each one of which decrypts a “layer” of encryption before passing the data on to the next relay and, ultimately, its destination. This reduces the possibility of the original data being unscrambled or understood in transit.

Image may be NSFW.
Clik here to view.

Tor aims to conceal its users’ identities and their network activity from surveillance and traffic analysis by separating identification and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers throughout the globe. These onion routers employ encryption in a multi-layered manner (hence the onion metaphor) to ensure perfect forward secrecy between relays, thereby providing users with anonymity in network location. That anonymity extends to the hosting of censorship-resistant content via Tor’s anonymous hidden service feature.Furthermore, by keeping some of the entry relays (bridge relays) secret, users can evade Internet censorship which relies upon blocking public Tor relays.

Because the internet address of the sender and the recipient are not both in cleartext at any hop along the way at non-exit (or “middle”) relays neither piece of information is in cleartext, such that anyone eavesdropping at any point along the communication channel cannot directly identify both ends. Furthermore, to the recipient it appears that the last Tor node (the exit node) is the originator of the communication rather than the sender.

The Amnesic Incognito Live System

Image may be NSFW.
Clik here to view.

The Amnesic Incognito Live System or Tails is a Linux distribution aimed at preserving privacy and anonymity. It is the next iteration of development on the Incognito Linux distribution. It is based on Debian, with all outgoing connections forced to go through Tor. The system is designed to be booted as a live cd or usb and no trace is left on local storage unless explicitly told to.

Image may be NSFW.
Clik here to view.

Debian is a computer operating system composed of software packages released as free and open source software primarily under the GNU General Public License along with other free software licenses.Debian GNU/Linux, which includes the GNU OS tools and Linux kernel,is a popular and influential Linux distribution.It is distributed with access to repositories containing thousands of software packages ready for installation and use. Debian is known for relatively strict adherence to the philosophies of Unix and free softwareas well as using collaborative software development and testing processes.Debian can be used on a variety of hardware, from NAS devices to phones, laptops, desktops and servers. It focuses on stability and security and is used as a base for many other distributions.

Liberte Linux

Image may be NSFW.
Clik here to view.
Liberté Linux is not a generic live Linux distribution with anonymity features. Its primary focus is to let you communicate, stealthily and securely, with other people in a hostile environment. Here, hostile environment is one where someone resourceful seeks to find out your identity because of something you do. You might be a dissident in an oppressive Islamic regime, perhaps, or an anti-government cell coordinator in China. A highly-ranked mole in the US intelligence service, passing information to his handler in the Belarusian embassy. Or, a whistle-blower in an international petroleum corporation. All these possibilities have something in common: high technological capacity of the authority in place, and willingness to use this capacity to find out who you are in order to stop you. Of course, you might just consider using Liberté because you dislike the idea of a bureaucrat somewhere deciding whether something you do online is legitimate or not.

 

 


Image may be NSFW.
Clik here to view.
Image may be NSFW.
Clik here to view.

Viewing all articles
Browse latest Browse all 7

Trending Articles