RoboLinux: a (More?) Secure Linux Desktop Solution

RoboLinux is a rather new distribution of Linux. It is designed for use by home users as well as enterprise users looking for a well-protected migration path away from other operating systems.

RoboLinux has all the usual applications found in most Linux distributions and offers an easy path to add even more apps. What makes RoboLinux different from many other Linux implementations is the dedication to privacy.

Two new additions include:

1. Invisible Internet Project (I2P)

i2p is an implementation of an anonymous, de-centralized network. Over a single layer, applications transmit anonymous and secure messages to one other. All communications are encrypted end-to-end, and 4 layers of encryption surround the sending and receiving of messages. Every client application uses its own i2p router to establish a number of in-bound and out-bound tunnels to other applications, and these peers pass messages to/from the client. Each peer on the i2p network selects the length of his tunnels; The longer the tunnel, the greater the anonymity but the higher the latency and the lower the throughput. Hence, there is a trade-off between anonymity and high(er) latency AND low(er) throughput. Initially – when a client attempts to contact its peers, a distributed hash table (DHT) containing the details of connected peers, is queried, but no further queries are required to establish subsequent connections. So, the i2p queries – for bringing about connections – differ both from Tor’s hidden services and clearnet DNS.

i2p is rumored to have a higher network latency but to be more capable of preserving a user’s anonymity than Tor’s hidden services. However – regarding the latter point, there is fierce dispute. On i2p, peers communicate over many protocols, including http, IRC and BitTorrent. Finally, i2p domains are assigned the pseudo (non-routable) Top Level Domain (TLD) of .i2p, and to connect to them, a proxy is required.

2. RootKit Check

The chkrootkit security scanner searches the local system for signs
that it is infected with a ‘rootkit’. Rootkits are set of programs
and hacks designed to take control of a target machine by using known
security flaws.

RoboLinux is available free of charge at http://sourceforge.net/projects/robolinux.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s