Secure Operating System(OS)- Use Internet Anonymously - NetwaxLab

Breaking

Facebook Popup

BANNER 728X90

Friday, November 14, 2014

Secure Operating System(OS)- Use Internet Anonymously

TAILS


Platform - x64

Current Version - 1.2

Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy. It allows you to use the Internet anonymously almost everywhere online and on any computer, but leaves no trace of what you have done, unless you want to.

Tails or The Amnesic Incognito Live System is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity.

All its outgoing connections are forced to go through Tor, and direct (non-anonymous) connections are blocked. The system is designed to be booted as a live DVD or live USB, and will leave no trace (digital footprint) on the machine unless explicitly told to do so. The Tor Project has provided most of the financial support for its development.

Tails comes with applications that have been configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor and so on.

Best Encryption Tools


Tails also includes a range of tools for protecting your data by means of strong encryption:
  • Encrypt your USB stick or external hard disks with LUKS, the Linux standard for   volume encryption.
  • Automatically encrypt your communications with websites using HTTPS Everywhere, a Firefox extension developed by the Electronic Frontier Foundation.
  • Use OpenPGP, the standard in its field, to encrypt and sign your emails and documents from the Tails email client, text editor or file browser.
  • Protect your instant messaging conversations using OTR, a cryptographic tool that provides encryption, authentication and deniability.
  • Delete your files safely and clean your disk space using Nautilus Wipe.

To continue Discovering Tails, you can now read:


Whonix


Platform - x86, Virtual Box

Current Version - 9.3

Whonix is a Debian GNU/Linux based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", running Debian GNU/Linux. All communications are forced through the Tor network to accomplish this.

It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.

Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible.

A web browser, IRC client, word processor, and more come pre-configured with security in mind.

Whonix helps to


  • Hide your IP address,
  • Prevent your ISP from spying on you,
  • Prevent websites from identifying you,
  • Prevent malware from identifying you, Circumvent censorship.

Working


The supported virtualization engine is VirtualBox. Linux KVM may be used, but this configuration is not yet considered stable or supported by Whonix's developer.

On startup, each VM runs a check to ensure that the software is up to date, and that the date and time are set correctly.

The Gateway VM is responsible for running Tor, and has two virtual network interfaces. One of these is connected to the outside Internet via NAT on the VM host, and is used to communicate with Tor relays. The other is connected to a virtual LAN that runs entirely inside the host.

The Workstation VM runs user applications. It is connected only to the internal virtual LAN, and can directly communicate only with the Gateway, which forces all traffic coming from the Workstation to pass through the Tor network. The Workstation VM can "see" only IP addresses on the Internal LAN, which are the same in every Whonix installation.

User applications therefore have no knowledge of the user's "real" IP address, nor do they have access to any information about the physical hardware. In order to obtain such information, an application would have to find a way "break out" of VirtualBox, or to subvert the Gateway (probably through a bug in Tor or the Gateway's Linux kernel).

The Web browser preinstalled in the Workstation VM is the modified version of Mozilla Firefox provided by the Tor Project as part of its Tor Browser package. This browser has been changed to reduce the amount of system-specific information leaked to Web servers.
Unlike Tails (operating system), Whonix is not "amnesic"; both the Gateway and the Workstation retain their past state across reboots.




No comments:

Post a Comment