Tuesday, August 09, 2011

Privacy for anyone anywhere - Tails Linux Tor Based LiveCD-Usb Distro

Linux Distro: Tails - You Can Never Be Too Paranoid

" Tails is a live media Linux distro designed boot into a highly secure desktop environment. You may remember that we looked at a US government distro with similar aims a few months ago, but Tails is different because it is aimed at the privacy conscious “normal user” rather than government workers.

Tails takes the form of a bootable live image that can be used from a CD ROM, a USB stick or via a network boot. Once booted, it executes from RAM, taking care not to make use of a swap partition. The desktop is Gnome 2.0 and the applications are a fairly standard selection. The web browser is an old, but usable, version of Iceweasel 3.5 (Debian Firefox). There are other applications to handle graphics work, audio editing, media playback, text editing, instant messaging and a email client - basically, everything you need when you’re on the run from enemy agents. Extra software can be added via the Synaptic package manager which pulls directly from the Debian repositories. So far, so similar to most other live desktop distros. Security and limited footprint on the the host machine are the areas in which the distro differs from the run of the mill.

All interactions with the Internet are passed through Tor an anonymization system. Using Tor, Tails pipes all Internet traffic emanating from your computer through a constantly shifting set of relays that are operated by a network of volunteers. " Continued: http://goo.gl/rAZaa


Tails project page

Tails is a live CD or live USB that aims at preserving your privacy and anonymity.
It helps you to: http://goo.gl/LFdmX



Tor Browser - portable ( highly recommended )

Tor Wiki - liveCD/Usb, info, how to, etc.

OperaTor - Opera + Tor. Surf anonymously

Privatix Live-System

Portable Tor Apps

Portable Apps

Portable Freeware

Electronic Frontier Foundation ( EFF )

Distro Watch


Related blog post:

TOR and SSH Tunnels - privacy on the Internet

Tor..Anonymous Web Surfing - for Journalist and general privacy

Anti-malware - Security - General Free Solutions


Intrusion Detection FAQ: What is a Honeypot?

"..A Honey Pot system is setup to be easier prey for intruders than true production systems but with minor system modifications so that their activity can be logged of traced. The general thought is that once an intruder breaks into a system, they will come back for subsequent visits. During these subsequent visits, additional information can be gathered and additional attempts at file, security and system access on the Honey can be monitored and saved...." Continued: http://goo.gl/kG6MG