There are many anonymous operating systems developed with the aim of protecting the hacker’s identity. But which of them is really good and worth using? In my opinion, not so much. In this article, I will recommend some Linux distros that can help you with your privacy issues. Let’s get started.
Join the channel Telegram of the AnonyViet ๐ Link ๐ |
Tails OS โ Popular Anonymous Operating System
Tails is a Debian-based Linux distribution designed to provide privacy and anonymity to its users. All connections are routed through the Tor network, and all non-anonymous connections are blocked. The system is also designed to boot from a Live CD or Live USB, so it won’t leave any traces on the machine being used. Tor project is the main sponsor of Tails. This operating system is Press Freedom Foundation used and also used by Edward Snowden to expose PRISM.
To appreciate all the pros and cons of Tails, we need to have a clear understanding of what this anonymous operating system was created for and how it should be used.
This operating system can boot very quickly. After creating the flash drive, it will take about 1-2 minutes to access the Internet (in case you have good enough hardware). However, you shouldn’t expect much cool functionality from Tails. It allows you to quickly connect to the Tor network, use messengers and connect via secure channels, create and save passwords, delete metadata files.
The main purpose of Tails is to ensure the anonymity and safety of users online, while also promoting convenience and ease of use. And it does that pretty well. In Live mode, the entire operating system is loaded into RAM. Tails does not write data to SSD or HDD. After a session ends, it is not possible to determine what the user did on the machine, even if you have full access to that device.
Tails is not recommended to be used as a permanent operating system. After shutting down or restarting the system, all downloaded files, browser history, etc. are deleted.
You can create a Persistent encrypted partition, the data in this partition will be saved forever and will not be deleted by Tails. You can store passwords and different types of files on it, but don’t save too sensitive data.
To run Tails, you need a device with at least 1GB of RAM and a processor that doesn’t need to be too powerful. The most optimal configuration for Tails is 8GB of RAM and a cpu with 2 cores.
Installing third-party programs is not Tails’ strong point. Installing apps on Tails is a bit annoying. Because it often has unforeseen errors, even if you have followed the exact steps required by the software. After several reboots, the installed software may be gone. If you need to work with third-party software, then you should choose the right distro for your needs, Ubuntu is an example for people new to Linux.
The purpose of Tails Anonymous Operating System is to leave no trace, if you don’t need to use the Tor network or store files, then don’t use this operating system. It is best to use Tails for quick access to the network, connect to remote web resources, work with documents, communicate over encrypted channels, send and receive cryptocurrency.
Advantages of Tails
- Quick access and network (Tor, hidden messaging, online crypto wallet)
- There is a built-in tool for metadata cleaning
- There is a built-in tool for hidden messaging
- Generate and store passwords
- Works with almost any hardware
Disadvantages of Tails
- Installation is a bit difficult
- Frequent problems when installing third-party software
- Not suitable as main operating system
- Not suitable for storing sensitive and private files
Tails is a good system. It has its downsides, but again, it’s designed simply for specific tasks. Tails is more concerned with anonymity, but not security. Of course, this is a pretty good system of anonymity, but there are other distributions that are much more advanced. Tails became famous thanks to Snowden and advertised by many communities due to its simplicity.
Whonix โ Anonymous operating system combined with Tor
Whonix is โโa Linux distribution based on Debian, formerly known as TorBOX. This anonymous OS is designed to ensure anonymity using VirtualBox and Tor. Malware as well as compromised superuser accounts can lead to IP and DNS leaks. So all software that comes with whonix is โโconfigured for maximum security.
The Whonix operating system consists of two virtual machines: the Whonix Gateway and the Whonix Workstation, which are connected through an isolated network. Gateway acts as a gateway to the network and exclusively through Tor, Workstation operates in a completely isolated network.
All network connections can only run through Tor. The only network access for the workstation is the gateway. All traffic, applications, and processes will go through Tor.
Applications that cannot access the internet will bypass Tor. The rest of the applications can only know the local IP address. The time zone cannot be tracked, the clock is set to UTC, and the HTTP headers are all sent to randomly selected web servers.
The ability to deploy different Tor + VPN combos is Whonix’s biggest advantage. You can configure the system so that all traffic goes through the VPN, then through Tor, and through the VPN again (kneel).
Whonix is โโan anonymous Operating System that has a lot of customization and configuration capabilities that are sometimes not possible on Tails. There are many programs and settings that allow you to build your own anonymous and secure system, remove traces of file usage, use instant messengers, work with different file types, and more.
Whonix is โโcertainly a good system for anonymous internet access but using it in continuously running systems is a bit tricky. Since Whonix is โโbuilt around virtualization, this causes some problems. For example, you may have difficulty working with external hardware. If you connect a USB flash drive, it will first go through the main operating system eg Windows, then through VirtualBox and finally to the Whonix system and this is not the safest way.
Advantages of Whonix
- High level of anonymity
- There are a large number of working software
- Highly Customizable
Disadvantages of Whonix
- No mobility
- Requires powerful hardware
- Being tied to VirtualBox, this presents a pretty big risk in case of hacking the operating system on which VirtualBox is installed
- Not fast, requires more time to access the network than other operating systems (you need to start VirtualBox, Gateway, Workstation)
Whonix would be better to act as a secondary (additional) system as it is not portable (like USB Live). Portability is one of the most important criteria in the purpose of anonymity. Whonix is โโconnected to VirtualBox, and since it’s not a live system, it’s fairly easy to detect Whonix’s presence if you don’t use encryption methods.
Whonix should only be used in special cases. I included it in the list because it is very flexible in terms of customization.
Kodachi โ Operating System for Hackers
Kodachi is also based on Debian. The purpose of Kodachi is an anonymous Operating System that provides the most secure and anonymous access to the network and protects the system itself. All traffic will run through the VPN, and then through the DNS-encrypted Tor network. Free VPN preconfigured.
Kodachi is recognized as an anti-forensic operating system, making forensic analysis of the drive and RAM really difficult.
XFCE was chosen as the default desktop environment for Kodachi, designed to be very similar to MacOS. System and network parameters are displayed in real time on the desktop, allowing you to monitor your system and also monitor Tor and VPN activity.
Kodachi supports DNScrypt, a protocol and utility that encrypts requests to OpenDNS servers using ellipse ciphers. It eliminates some typical problems, such as DNS leaks, and leaves traces of network activity on the provider’s servers.
If you need to hide the IP address in a P2P network, you can use PeerGuardian. If you need to work with suspicious processes, they can be easily isolated using the built-in sandbox called Firejail. Some other interesting options are the ability to quickly change Tor exit nodes with a specific country option using Multi Tor.
Kodachi has a number of pre-installed software to solve any task, for example, to encrypt information (VeraCrypt, TrueCrypt), to send secret messages (GnuPG, Seahorse, Enigmail, Rights Protection Assistant privacy), to hide traces (MAT, Nautilus-wipe, Nepomuk Cleaner, BleachBit).
In addition, Kodachi has its own browser based on Tor Browser, whose developers have removed some problematic Tor modules.
Kodachi is a well-balanced system, it’s a powerful tool for building anonymity and security in every sense. This operating system is best used in conjunction with encrypted hardware, where highly sensitive information is stored.
In my opinion, Kodachi is the best system currently, because it allows you to solve many problems.
Advantages of Kodachi
- Quick start (fast network access like Tails)
- Many pre-installed programs
- Does not require much hardware
Actually Kodachi has no defects but they can appear in some quest or need.
There are some other pretty good operating systems built for anonymity like Subgraph and Qubes.
Qubes OS โ the most secure operating system
Qubes OS uses an interesting principle to launch applications. Each application will be run on a separate virtual machine that makes up the anonymous Operating System. Applications are divided into classes depending on their importance. The browser runs on one virtual machine, the messenger runs on another. To the user, both programs appear to be running on the same workspace. App quarantine means that if malware gets in, personal files won’t be compromised.
Qubes only works after installation on internal drive, it does not have Live mode.
Subgraph OS โ safe operating system for normal users
The main idea behind Subgraph is to run custom applications on sandbox isolated. To do this, Subgraph uses the OZ subsystem. OZ includes a daemon (system service) that receives sandboxing requests, an Xpra X server, and a special set of utilities.
Subgraph is a rudimentary anonymous operating system. Only alpha version available at the moment.
Subragh and Qubes aren’t bad, but they’re not good enough to be included in the list. Subgraph is too primitive and Qubes is too complicated in terms of installation.