background preloader

_Distros

Facebook Twitter

> Download Linux - LQ ISO. Search Linux Distributions: Privacy or Security or Forensics. Search the DistroWatch database for distributions using a particular package.

Search Linux Distributions: Privacy or Security or Forensics.

If you are looking for a distribution with the latest kernel, select "linux" from the drop-down box below and type the version number into the text box next to it. Please note that the best way to obtain the GNOME version is by searching for "nautilus", while KDE Plasma is represented by the "plasma-desktop" package. Apache 2.x is listed as "httpd". As for versioning, if no version number is provided, this page will return any recent versions of the selected package. It is also possible to perform searches for distributions which do not contain a specific package.

The package version search offers the ability to search for packages which are close to a specific version, exactly equal to a specific version, greater than or less than a given version. NSA targets Linux Journal as 'extremist forum': Report. The Linux Journal, a Linux user community website, has been flagged as an "extremist forum" by the United States' National Security Agency (NSA), while its users have been flagged as "extremists" under the agency's XKeyscore program, according to leaked source code.

NSA targets Linux Journal as 'extremist forum': Report

The source code, which was published this week by German public broadcaster, ARD, also identified at least two German Tor Directory Authority servers — one in Berlin, the other in Nuremberg — as being under surveillance by the NSA. The Tor Project is an independent, open-source anonymous software and browsing network that directs traffic through its free, worldwide, volunteer network to conceal users' locations and usage from surveillance. According to an ARD report, the source code indicates that the German Tor servers are just two among a number of servers that have been targeted by the NSA for surveillance, under its XKeyscore program. The code cites a number of specific IP addresses of the Tor Directory Authority. Tails. FAQ - Tor - Revisemos lo básico acerca de Tor.

General questions: Compilation and Installation: Tor Browser (general): Tor Browser (3.x and later): Advanced Tor usage: Running a Tor relay:

FAQ - Tor - Revisemos lo básico acerca de Tor.

Researchers Demonstrate Zero-Day Vulnerabilities in Tails Operating System. The critical zero-day security flaws, discovered in the privacy and security dedicated Linux-based Tails operating system by the researcher at Exodus Intelligence that could help attackers or law enforcements to de-anonymize anyone’s identity, actually lie in the I2P software that’s bundled with the Operating System.

Researchers Demonstrate Zero-Day Vulnerabilities in Tails Operating System

Replace TrueCrypt. Due to various concerns, Trecrypt is about to be replaced in Tails, either by tcplay or cryptsetup.

Replace TrueCrypt

This is the blueprint for ticket #5373 and subtasks. Tc-play tc-play is a Free implementation of TrueCrypt based on dm-crypt, licensed under the 2-clause BSD license. It is in Debian sid (tcplay), and would serve as a full replacement of TrueCrypt... once a proper GUI available. tc-play allows to create TrueCrypt volumes. version 2 added an ability to save and restore TrueCrypt volume headers to external header files.This feature can be used to change a TrueCrypt volume password.

Cryptsetup Cryptsetup 1.6 supports reading the TrueCrypt on-disk format, so if/when udisks and friends are adapted (if needed), then we could as well avoid shipping any additional software at all. Liberté Linux. Summary Liberté Linux is a secure, reliable, lightweight and easy to use Gentoo-based LiveUSB/SD/CD Linux distribution with the primary purpose of enabling anyone to communicate safely and covertly in hostile environments.

Liberté Linux

Whether you are a privacy advocate, a dissident, or a sleeper agent, you are equally likely to find Liberté Linux useful as a mission-critical communication aid. Download Liberté Linux 2012.3, released on 2012‑09‑01 (pick binary image for full functionality): Why should you choose Liberté over alternative open-source, commercial, or military systems? Unobtrusiveness Liberté promptly installs as a regular directory on a USB/SD key, taking ≈210 MiB of disk space, and not interfering with other files present on the media. Security. JonDo Live-CD / DVD. Whonix Anonymous Operating System. The Universal Operating System. The paranoid #! Security Guide Tips, Tricks & Scripts #Privacy.

Here's the only safe way to use public PCs. PCs in business centers probably aren't a first computing option for most business travelers.

Here's the only safe way to use public PCs.

You might use them if you want to print or if your laptop computer is not available for some reason. Unfortunately, these computers are often cesspools of criminal spyware, as the Secret Service just warned. The warning and an article about it by Brian Krebs provide some good explanation of the problem, but I believe they don't go far enough in telling you when to avoid such computers and how they might be used safely. Accessing your personal or business resources on a public PC is the technological equivalent of sharing needles with strangers. Unless you really know what you're doing, they simply can't be trusted. The main problem, it needs to be said, is not the hardware but the software. The only safe way is to bypass the software installed on the PC by booting off a CD or USB key with an operating system image you control and trust. Ubuntu Privacy Remix. Lnternet_Securlty_Prlvacy.