Thursday, July 28, 2011

noted. 07/28/2011

    • Liberté Linux is a secure, reliable, lightweight, and easy to use Gentoo-based live USB Linux distribution intended as a communication aid in hostile environments. It installs as a regular directory on a USB/SD key, and after a single-click setup, boots on any desktop computer or laptop. The Internet connection is then used to set up a Tor circuit, which handles all network communication. During first boot, a unique email ID is generated from fingerprints of user's certificate and Tor hidden service key. This persistent ID allows one to stealthily communicate with other Liberté users. The distribution includes image and document processing applications, and can function as a secure Web browsing platform. For developers, Liberté can also serve as a robust framework for mastering Gentoo-based live USBs/CDs. The build process is fully automated with incremental build support, and is more mature and reliable than most of Gentoo's own outdated live CD tools.

    • Liberté Linux is not a generic live Linux distribution with anonymity features. For that purpose, you are better off installing the relevant software on an off-the-shelf operating system (regular or live), or using one of the live distributions that come pre-installed with anonymity software, such as The Amnesic Incognito Live System (Tails). 

       

      The primary focus of Liberté is to let you communicate, stealthily and securely, with other people in a hostile environment. Here, hostile environment is one where someone is out to get you because of something you do. Therefore, as security inevitably comes at a price of usability, and assuming that you are a typical Tor (or Freenet, I2P, ...) user, Liberté Linux is not for you. 

       
    • Usenet posts
      This is a good approach to clandestine communication. Since Usenet is a distributed system, traffic analysis is non-trivial, and messages can be steganographically hidden inside innocent-looking posts (e.g., SPAM) in some high-traffic unmoderated group. Many users will read the message, oblivious to its true contents—thus protecting the message recipient from scrutiny. 

Posted from Diigo. The rest of my favorite links are here.

No comments:

Post a Comment