Summary Liberté Linux is a secure, reliable, lightweight and easy to use Gentoo-based LiveUSB/SD/CD Linux distribution with the primary purpose of enabling anyone to communicate safely and covertly in hostile environments. Whether you are a privacy advocate, a dissident, or a sleeper agent, you are equally likely to find Liberté Linux useful as a mission-critical communication aid. Download Liberté Linux 2012.3, released on 2012‑09‑01 (pick binary image for full functionality): Why should you choose Liberté over alternative open-source, commercial, or military systems? Unobtrusiveness Liberté promptly installs as a regular directory on a USB/SD key, taking ≈210 MiB of disk space, and not interfering with other files present on the media. Security Liberté Linux is shipped with the Hardened Gentoo kernel, which includes all grsecurity/PaX security enhancements — radically improving system's resistance to software exploits. Persistence Communication Anonymity Invariance Privacy Desktop Integrity
Privatix Live-SystemFree portable encrypted system on an usb flash drive or an external hard drive for safe editing and carrying along of sensitive data, for encrypted communication and anonymous web surfing Not everyone who finds privacy important while using the internet and communicating or is editing sensitive data always has their own computer with a safely set up operating system and the required tools at their disposal or want to carry it with them. That's why we created the Privatix Live-System (based on Debian GNU/Linux).TailsTails is a live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Learn more about Tails. Tails sends its traffic through Tor.
Download Privatix Live-SystemBittorrent (Open this files with a Bittorrent client. The client will download the iso-image)Raspberry Pi GSM gatewayIf you travel a lot, you’ll be used to absurd roaming charges when you use your mobile phone. But sometimes your phone’s an absolute necessity – those of us at the Foundation can’t really go overseas for work or for holiday without paying those charges, because we need to be in touch with the office and with a lot of other people around the world who need to talk about things Pi. (And we like to be able to phone our mothers.) Holger Leusch, Benjamin Reichel and Karina Hochstein have found themselves with a similar problem. Worse still, Holger travels to Cambodia a lot, and his German phone provider doesn’t even have a roaming agreement with any of the Cambodian telcos, so he’s not able to use his phone there at all. He found VoIP unusable in Cambodia, with patchy calls, lousy bandwidth, delays and dropouts.
The paranoid #! Security Guide Tips, Tricks & Scripts #PrivacyThe paranoid #! Security Guide Table of Contents: Introduction Basic Considerations BIOS-PasswordsLive RFID Hacking System - OpenPCDFrom OpenPCD Breaking Mifare Classic using bootable Live DVD tutorial video - breaking derived keys with mfoc for two cards and comparing card using kdiff3 Shows the captured waveform with the demodulated LF RFID tag data using our LF RFID frontend for USB soundcards The bootable Live RFID Hacking System contains a ready-to-use set of hacking tools for breaking and analyzing MIFARE Classic RFID cards and other well known card formats. It is built around PCSC-lite, the CCID free software driver and libnfc that gives you access to some of the most common RFID readers. See our tutorial video for a quick introduction on how to break MIFARE Classic RFID card keys using our Live RFID Hacking System.
Nexus Root Toolkit v1.6.3VERSION 2.1.4 – This program will automatically bring together all the files you need to unlock and root your device in a few clicks, or flash it back to stock and re-lock it. You can also use this program to backup/restore all your important data, flash zips, set file permissions, push and pull files, install apps, generate logcats/bugreports, and much more! With the included file association options, you can perform tasks like flashing zips, installing apps, restoring android backup files, and flashing/booting img files with just a double click! The program includes a full featured interface for automating tasks in TWRP, enhanced restore features, an in-built auto-updater/notification system, ‘any build’ mode, advanced restore features,’NRT- Live Log’ for viewing the adb/fastboot cmds that are run in the background, quick tools utilities, and tools for taking screenshots/screen-recordings.
Here's the only safe way to use public PCs.PCs in business centers probably aren't a first computing option for most business travelers. You might use them if you want to print or if your laptop computer is not available for some reason. Unfortunately, these computers are often cesspools of criminal spyware, as the Secret Service just warned. The warning and an article about it by Brian Krebs provide some good explanation of the problem, but I believe they don't go far enough in telling you when to avoid such computers and how they might be used safely.
Top Ten Linux Penetration Testing DistributionsBy Henry Dalziel | Cyber Security Blogger | Concise Courses Post written on November 7, 2012 Update! (January 2015) This post is very old now…. Something much more interesting – and up to date – is our list of 16 Hacker Distro’s.InstallationGuide – QubesHardware Requirements ¶ Please see the Hardware Compatibility List page for more information on required and recommended hardware. Note: We don't recommend installing Qubes in a virtual machine! It will likely not work. Don't send emails asking about it.
Researchers Demonstrate Zero-Day Vulnerabilities in Tails Operating SystemThe critical zero-day security flaws, discovered in the privacy and security dedicated Linux-based Tails operating system by the researcher at Exodus Intelligence that could help attackers or law enforcements to de-anonymize anyone’s identity, actually lie in the I2P software that’s bundled with the Operating System. Exodus Intelligence has released some details and a video evidence that demonstrate an exploit against the found vulnerability unmasking an anonymous user of the Tails operating system. The researchers at Exodus claims they can use the vulnerability to upload malicious code to a system running Tails, execute the payload remotely, and de-anonymize the targeted users’ public IP address as well.