RoboLinux has all the usual applications found in most Linux distributions and offers an easy path to add even more apps. What makes RoboLinux different from many other Linux implementations is the dedication to privacy.
Two new additions include:
1. Invisible Internet Project (I2P)
i2p is an implementation of an anonymous, de-centralized network. Over a single layer, applications transmit anonymous and secure messages to one other. All communications are encrypted end-to-end, and 4 layers of encryption surround the sending and receiving of messages. Every client application uses its own i2p router to establish a number of in-bound and out-bound tunnels to other applications, and these peers pass messages to/from the client. Each peer on the i2p network selects the length of his tunnels; The longer the tunnel, the greater the anonymity but the higher the latency and the lower the throughput. Hence, there is a trade-off between anonymity and high(er) latency AND low(er) throughput. Initially – when a client attempts to contact its peers, a distributed hash table (DHT) containing the details of connected peers, is queried, but no further queries are required to establish subsequent connections. So, the i2p queries – for bringing about connections – differ both from Tor’s hidden services and clearnet DNS.
i2p is rumored to have a higher network latency but to be more capable of preserving a user’s anonymity than Tor’s hidden services. However – regarding the latter point, there is fierce dispute. On i2p, peers communicate over many protocols, including http, IRC and BitTorrent. Finally, i2p domains are assigned the pseudo (non-routable) Top Level Domain (TLD) of .i2p, and to connect to them, a proxy is required.
2. RootKit Check
The chkrootkit security scanner searches the local system for signs
that it is infected with a ‘rootkit’. Rootkits are set of programs
and hacks designed to take control of a target machine by using known
RoboLinux is available free of charge at http://sourceforge.net/projects/robolinux.