Join Our Community!Join Our WhiteHat Group On facebook & Stay Updated.

Liberté – Best Linux Anonymous OS for Internet Browsing

Best Linux Anonymous Liberte Live CD/SD/USB

Liberté – Best Linux Anonymous OS for Internet Browsing
Liberté – Best Linux Anonymous OS for Internet Browsing

What is Liberte?

Liberté Linux is highly secured, solid, lightweight and simple to utilize Gentoo-based LiveUSB/SD/CD Linux distro with the main role of empowering anybody to impart securely and secretively in threatening situations. Liberté install on a USB drive, and boots on any PC or portable computers.

BIOS boot menu - Liberte Anonymous
BIOS boot menu – Liberte Anonymous

Regardless of whether you are a security advocate, a dissenter, or a sleeper agent, you are similarly liable to discover Liberté Linux valuable as a mission-basic correspondence help.

Liberté – Best Linux Anonymous OS for Internet Browsing
Liberté – Best Linux Anonymous OS for Internet Browsing

All check failure are non-lethal, however should be unequivocally evaded by the client, who must either disable Secure Boot, affirm confirmation failure in GRUB, or leave the troubleshoot shell in initramfs — relying upon the chain organize at which the disappointment happens.

 

With customary BIOS-based Syslinux boot, just the last stage (root filesystem confirmation) is performed. Nonetheless, a negligible bootstrap .iso image (without a compacted root filesystem) is given, which can be scorched to peruse just media and used to boot a standard install of Liberté on writable media.

 

Features of Liberte Anonymous live CD/USB/SD

  • User-friendly and pre-configured (LXDE & GTK+)
  • CPU: Pentium Ⅲ+ with PAE, Memory: ≈192 MiB, Image: ≈210 MiB
  • Free space on USB or SD is accessible from any OS
  • All connections are either firewalled or Torified
  • All persistent data is encrypted in OTFE volume
  • Full internationalization and multilingualization
  • Secure and reliable email-like communication between users

 

Security of Liberte Anonymous live CD/USB/SD

Liberté Linux keeps up constant stockpiling on an OTFE volume open by means of ~/persist — a virtual parcel document that is situated on the boot media where Liberté is installed. This volume utilizes AES-256 encryption in XTS square mode, with SHA-512 header hashing. It is best to store all reports on this OTFE volume. What’s more, Liberté gives programmed on-request mounting of changeless and removable media at/media. You are encouraged to utilize extraordinary care when keeping in touch with such non-encrypted media. In particular, it is prescribed to abstain from writing to the non-encypted parts of the boot media, particularly since the OTFE segment is completely resizable with sudo otfe-resize.

 

GnuPG / GPA are installed for explicit file encryption tasks. You are advised to keep the following rough key sizes correspondence in mind when working with keys:

Symmetric encryptionAsymmetric encryption/signingAsymmetric signing digest
AES-128RSA/DSA/ELG-3072SHA-256
AES-192RSA/DSA/ELG-7680SHA-384
AES-256RSA/DSA/ELG-15360SHA-512

NIST SP 800-57 Part 1, §5.6.1

 

Network security of Liberte Anonymous CD/USB/SD

Liberté explicitly configures selected applications and services to use Tor via its local proxy (where access to the proxy is additionally vetted), thus forcing applications to create connections to the proxy on the loopback interface (localhost). Netfilter IP firewall then realizes a default-deny policy on both incoming and outgoing external connections. An inadvertently leaked IP address or a direct connection attempt do not pose a problem with this approach. The only exception to this in Liberté is I2P, whose peer connections are transparently routed via Tor, because I2P does not support using proxies for this purpose, and because other methods (like dynamic library socksification) fail.

 

Since I2P communication is visible to Tor exit nodes, this might pose a problem — however, I2P has been verified to not leak the system’s IP address when used in hidden mode.

The following external traffic is explicitly allowed on the firewall: –

  • DHCP, and Tor external communication to HTTP(S) ports (no DNS is used)
  • Rate-limited ping reply, the only possible response to uninitiated inbound traffic
  • User-created VPN connections to relevant ports (servers must be specified as IPs, use tor-resolve)
  • Unsafe Browser’s external communication (including DNS) for wireless hotspots registration

Note that I2P communicates with peers via Tor, providing additional anonymity, and enabling I2P to be used in most firewalled environments.

 

Click here to download Liberte

 

Click here to join our Hacker Community and learn hacking free of cost 

READ MORE ON HACKER NEWS & ETHICAL HACKING –

CHINESE GOVERNMENT REQUIRING MUSLIMS TO INSTALL SPYWARE ON THEIR ELECTRONIC DEVICES

FANCY BEAR – LEAKED NSA EXPLOITS TO TARGET EUROPEAN HOTELS

TOP 10 OPERATING SYSTEM FOR HACKERS

WIFI HACKING – WIRELESS VULNERABILITIES & WEAKNESS

BEST HACKING TOOLS OR SOFTWARE WITH EXPLANATION

Comments

comments