The following operating systems have been designed to help you being anonymous on the Internet, they come with Tor, encryption and lots of countermeasures that stop online tracking.
Anonymous Linux OS
SubGraph OS: Desktop communications operating system designed to withstand malware attacks, key applications run inside a sandbox to reduce impact of successful exploits. This operating system has a hardened Linux Kernel and built-in Tor integration with a default policy that filters communication programs through Tor. Email is secured with PGP and SubGraph OS Instant Messenger is CoyIM, a new XMPP compatible messenger sandboxed and connected with Tor by default.
Mofo Linux: Ubuntu based operating system optimized to defeat censorship and surveillance, the DVD includes SoftEther, Freenet, Tor, Veracrypt, Zulucrypt and many other encryption and proxy tools that should bypass schools, corporations and ISP filters. You can use this distribution to browse the Internet anonymously and encrypt communications and data you download. It can be run from a DVD, USB thumbdrive or installed in your computer.
The default user account is: mofo but you can switch to root if necessary, accounts come out of the box with no password.
The Amnesic Incogmico Live System (Tails): Likely the most popular operating system for Internet anonymity. Tails has been around for many years and is often updated, it comes with a firewall that blocks any Internet connection that do not go through Tor, this makes it impossible to expose your real computer IP even by accident.
Tails is my number one choice distribution for anonymity on the Internet.
Robolinux: User friendly Linux distribution loaded with no logs VPN (subscription needed). Other privacy tools like Tor, I2P, Bleachbit, Enigmail and the JonDo browser can added using the one click installer.
To highlight Robolinux Stealth VM, a virtual machine that runs Windows inside your Linux distribution, the benefit of this is that viruses and malware can not get out of the sandbox. Useful for those who really need Windows.
Linux Kodachi: Debian with a customized XFCE desktop, an alternative to Tails, Kodachi website contains a comparison table showing how Kodachi Linux is better than Tails by adding a Litecoin wallet, built in VPN, Veracrypt, DNSCrypt and Pacnic Room in between many other tools and the expected Tor browser, MAC address randomization and the Pidgin messenger.
Sabayon Linux: A Linux distribution that gives you the choice of starting Tor during boot time. What makes Sabayon great is that you don’t have to always be in privacy mode, the distribution can be booted in normal mode with all the tools you expect from any decent operating system, like a video player, text editor, network tools, etc.
When you need to visit a website hiding your IP with Tor, simply enable the Tor mode when you boot your computer the next time. With Sabayon it is feasible to only have a single operating system and enjoy the best of both worlds.
Penetration Testing Distributions
The following distributions have been designed to to test network security, aka hacking, or carry out a computer forensics analysis after an incident.
A few of the distributions come with Tor and encryption tools.
Parrot Security OS: Pen testing distribution based on Debian. In addition of being able to use Parrot OS for digital forensics, you have anonymity tools like Tor and I2P out of the box, Anonsurf, a RAM memory cleaner, BleachBit, NoScript and a Internet browser profile manager. Encryption tools to secure data you download are also included, you can use Veracrypt, LUKS, GnuPG and a encrypted system installation.
BlackArch Linux: An Arch Linux based live DVD for ethical hackers and security researchers that can be easily installed on a USB thumbdrive if needed. It contains multiple window managers, the download is over 4GB. This distribution is developed by a team of volunteers and contains over 1500 penetration testing tools.
BackBox Linux: Based on Ubuntu, this is a community project with a minimal desktop, XFCE, that contains multiple hacking tools. An anonymous mode lets you browser the Internet with Tor an access hidden .onion sites.
Thorn Linux: Based on Debian, Thorn Linux includes all of Kali penetration testing tools and an RSS reader preconfigured with over a hundred security news sources with the latest exploits and security news. The distribution names anonymization as one of their features, although I have not tested it, I suspect they mean it comes with Tor. It appears to be a Kali spin off.
Kali Linux: Perhaps the most popular penetration testing distribution, Kali is available in various desktop environments, KDE, LXDE, Enlightenment and Xfce. The installation wizard allows you install the distribution in a USB thumbdrive or boot the DVD in forensic mode, meaning that your computer hard drive will not be touched, preserving timestamps and original files. This distribution contains all hacking tools you can wish for.
Security Linux Distributions
The following operating systems have been designed to stop intrusion, resources are separated from each other so that if an attacker gets in he will not be able to escalate and take over the whole machine.
Whonix OS: Debian desktop operating system for advanced anonymity and privacy, Whonix runs inside a virtual machine, this stops malware from spreading into your computer.
This operating system routes everything with Tor to hide your computer IP. The default Whonix configuration is enough to keep you anonymous, even if you don’t know much about computers, nothing has to be changed to remain anonymous on the Internet.
Qubes OS: Highly compartmentalized operating system that runs each application on its own sandbox, it is extremely difficult for malware to spread due to this.
This operating system is highly recommended for those afraid of their computers being infected with malware but if what you are after is anonymization there are better alternatives.
Discreete: Ubuntu based privacy oriented Linux live only DVD or USB that comes with Veracrypt, there is no Internet connection, this operating system can be used to work with sensitive material without having to worry about trojan horses or a virus infecting your computer.
TrueOS: Operating system based on FreeBSD, it does not come with Tor, although it can be installed from the repository, what TrueOS comes with is Geli, a full disk encryption utility with a wizard to fully encrypt your OS during installation.
I added TrueOS for those after something that is not Linux, FreeBSD has a good reputation in security.
Forced password disclosure
In some countries the law forces citizens to give up their passwords under threat of jail (UK, Australia, Iran, etc), if you are at that level of risk, you will be better off running the OS as a live DVD and never installing anything. When something runs in RAM it is not possible to recover the data regardless of threats.
Notice: Operating systems that have not been updated for years have been eliminated from the list because most likely they contain unpatched vulnerabilities.
Unknown redditor
Dear hacker10, I would like to point on your Anonymous OS list that Linux Kodachi to be unfit in the list and I do hope to be removed. The maker haven’t provided the source code publicly available which goes against his claim on “open source – GPL” license.
You can check valid criticisms here:
https://www.reddit.com/r/tails/comments/57fl6w/can_i_have_your_opinion_feedback_on_tails/
https://www.reddit.com/r/privacy/comments/5kxdfn/most_secure_os_linux_kodachi_35_is_released/
Thanks in advance.
hacker10
Hello,
I would like to thank you for your input but I will not remove Kodachi from the list because it is not a list of distributions using GPL license, it is a list of anonymous live CDs, TruOS is also listed and it is not GPL licensed, it uses the BSD license.
It is up to the people to decide if they trust the claims made by an anonymous user at Reddit or not. I don’t have the time to investigate them at the moment.
Unknown redditor
Though my concern wasn’t entirely on the licensing but wanting to make attention to one of its critical points that should make others stay away from that project. Though after I make notice of its licensing, the person behind that project published his supposed source code publicly online. People should note that this project is only maintained by one person. The project is also greatly missing bug tracking to name a few and doesn’t even have contributors other than that one person. There are many things I could mention but you can read the things mentioned in those two links; you can also even look at the user’s (u/eeds-om) posts and read people’s comments on his posts. That said, what I really concern about is that this OS could undermine people’s privacy because of the person behind that project don’t have real security experts that could inspect his project and audit the security features it possesses. It’s unfortunate that he claims to be “a recognized security consultant” but lacks very much documentation of that project… You can also look at his website digi77.com to see for yourself and look at his few faulty security suggestions.
BoxO Chocolates
It seems you are correct. Not only does Kodachi not keep users anonymous, but they knowingly do not use all the services they claim to.
Free VPN is never Free:
https://bitsex.net/english/2021/kodachi-linux-is-probably-not-secure/
Will
I wonder if MOFO is being maintained? A good idea that falls a little short.
The firefox in 5.3 is leaky, like all recent firefox – one should config to stop webRTC peerconnections (at the least).
I’ve no idea if the underlying linux is patched or hardened.
audio fails.
keyboard region is not easy to select.
There is no clear way to get data across the tor boundary. It requires delving into apparmor.
I find the left-margin pop-out main menu is sometimes unresponsive
AG
Cyborg Hawk Linux, Kali Linux , Parrot Security OS & BlackArch Linux is best operating systems for hacking purposes. Awesome top 4 list for pen testing purpose with great Tools.
Peroxide user
I wonder, how a distro like Kodachi, being so obviously hoaxed in relation with security, that has every shady flags possible is still in your list.
Or a) You are someway related to them and implementing some botnet to the users of kodachi
b) They pay you for putting them on your list
c) You stop doing well through researches about security and you don’t care anymore about your reputation.
mmmm Wondering!
mariage
I budies , I would like to download Robo Linux 12 XFCE Iso file ,but through your link ( source forge ) , it’s very slow and stopping every time , a real drag ! Haven’t you got a .torrent link to propose to me ?
CaptainJack
I can’t believe Kodachi is being defended. Anyone who defends this exact replica of Ubuntu 18.04 has clearly not looked into the os. I only have to say that upon boot before the VPN is enabled the creator Warith Al Maawali has a hash of the system running Kodachi sent to a server he owns. Obviously that hash completely deanonymizes the user. IPV6 networking is completely broken easily leaks from VPN and many of the unnecessary software packages installed on this pos operate through IPV6. Reduce attack surface is a day one mantra in security.