Liberté Linux

Last Updated on: 11th June 2023, 10:46 am

Web site: dee.su/liberte
Origin: Russia
Category: Security
Desktop environment: LXDE
Architecture: x86
Based on: Gentoo
Wikipedia:
Media: Live CD
The last version | Released: 2012.3 | September 1, 2012

Liberté Linux – a secure, reliable, lightweight and easy to use Gentoo-based LiveUSB/SD/CD Linux distribution with the primary purpose of enabling anyone to communicate safely and covertly in hostile environments. Whether you are a privacy advocate, a dissident, or a sleeper agent, you are equally likely to find Liberté Linux useful as a mission-critical communication aid.

Liberté Linux is shipped with the Hardened Gentoo kernel, which includes all grsecurity/PaX security enhancements — radically improving system’s resistance to software exploits. Measures like service privileges separation provide additional protection.

All persistent changes are kept in a secure LUKS/OTFE volume, easily accessible from any operating system. This includes application settings that are archived upon shutdown, as well as any documents explicitly stored in the encrypted volume. The OTFE volume is just a file on the boot media that can be copied, backed up, or transparently resized from inside Liberté.

All networking activities like browsing and chatting are automatically Torified, with I2P locations transparently available as well. After the system receives a network address, the only external traffic it emits is encrypted communication on HTTP(S) ports (used by Tor). No other traffic is sent — not even DNS requests. I2P traffic is routed through Tor, too: you will be able to use I2P even behind the most restrictive firewalls. In addition, a special Unsafe Browser is available for the express purpose of registration in open Wi-Fi hotspots, if necessary. Liberté can be also booted in non-anonymous mode, with all other security features left intact.

Besides the encrypted volume on the boot media, Liberté leaves no traces in the system without explicit user consent (such as manually creating files on external automuonted media). Moreover, all volatile memory is thoroughly erased upon shutdown in order to prevent cold boot attacks — whether an orderly shutdown, or an immediate one due to abrupt removal of the boot media.

The project developer is Maxim Kammerer.


Click to rate this post!
[Total: 0 Average: 0]

Leave a Comment

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.