Tag: anonymous operating system

  • Anonymous operating system Whonix

    Anonymous operating system Whonix

    Whonix is an anonymous operating system based on Virtual Box, Debian Linux and tor proxy, Whonix consists of two virtual machines, one dedicated to run a tor proxy acting as a gateway and the second one called Whonix-Workstation located in a completely isolated network.

    The system has been designed to make IP and DNS leaks impossible, not even malware with root access will be able to find out your computer IP, all Internet connections are forced through tor, including applications that do not support proxy settings, this is done using the firewall settings. It is possible to use Whonix with a VPN or SSH tunnel if needed, hardware serial numbers are also hidden. Any operating system able to run VirtualBox can run Whonix, this includes Windows, Mac, Linux, BSD and Solaris.

    Disadvantages of running Whonix are that it will be very slow to update your operating system though tor, it is more difficult to set up than the tor browser bundle and your computer should have a good amount of RAM and modern CPU to run VirtualBox. Whonix advantages are that unlike an anonymous live CD like Tails or Liberté Linux data will be available after reboot due to persistent storage, you can install your favourite software packages using Debian’s packaging tool apt-get, the applications will be torified straight away, you can also save virtual machine snapshots saving a clean one for data recovery if needed.

    VirtualBox setting up Whonix operating system
    VirtualBox setting up Whonix operating system

    Many Whonix default applications come configured to avoid fingerprinting, GPG software for example will not reveal your operating system version and XChat comes with the default torified set up as described in the tor project Wiki.

    In countries where you can be forced to disclosure your full encryption password Whonix can help with plausible deniability if you hide the .ova virtual machine file inside a hidden encrypted container with Truecrypt or store the virtual machine inside a fully encrypted USB thumbdrive that will look like random data to forensics software.

    Visit Whonix homepage

  • Anonymous web surfing with The Amnesic Incognito Live System

    Anonymous web surfing with The Amnesic Incognito Live System

    Tails, short for The Amnesic Incognito Live System, has Ad-block preinstalled on its Iceweasel (Firefox based) browser, it comes with many other privacy enhancing tools to stop companies and repressive Governments tracking down Internet users.

    This Debian based Linux live CD enables you to hide your IP address while surfing the Internet, it comes preconfigured to use the anonymous tor network for all outgoing connections, this will hide your IP at all times, you do not need to know anything about Linux to use it, just download the ISO file burn it to a CD, reboot your computer, MAC or PC, and it will work straight out of the box.

    Anonymous live CD features

    • Supports mobile broadband devices like 3G USB dongles
    • Can be booted up from a USB thumbdrive instead of a live CD
    • Multilingual support including Arabic, Chinese and Spanish in between other languages
    • Firewall drops incoming packets by default
    • Instant Messenger Pidgin comes with the OTF messaging plugin to proxy communications through tor
    • Internet browser comes with the HTTPS Everywhere, FireGPG and Ad-block extensions
    • Stops cold boot attacks by wiping RAM memory on shutdown
    • Virtual keyboard available to stop keyloggers
    • Support for i2p eepsites, hidden websites hosted anonymously
    • Email client ClawsMail comes with GnuPG support to encrypt email messages
    The Amnesic Incognito Live System
    The Amnesic Incognito Live System

    Live CD with encryption & file deletion

    The Amnesic Incognito Live System includes secure-delete integrated on its file manager, a program to wipe free disk space and sensitive files, a front end encryption key manager called SeaHorse will take care of digital signatures and GPG encryption keys.

    If you are comfortable with Linux command line you can take advantage of cryptsetup to encrypt files and macchanger to change your computer MAC address. Those are only the security features, open source everyday software for production purposes includes OpenOffice.org to edit documents, The Gimp to edit photos, Audacity to edit sound files and many others.

    This operating system to hide your IP address has two preconfigured users: amnesia and root, the password is the same for both of them, amnesia.

    Visit The Amnesic Incognito Live System