Regular Kali Linux hardened with:
Choice between full encryption or home dir encryption.
Extra Security Privacy Browsers:
Script disable/enable webcam & microphone (manual)
DNS-over-HTTPS & DNS-over-TLS surfing
Option: preconfiguration VPN (example: https://hide.me/en/)
Grub Bootloader password protection script
Bios password protection: user and/or administrator
Disable usb boot and/or usb sticks
Kali AnonSurf Module:
Anonsurf module to set anonymous browsing and hacking systemwide. So every browser on your os will use AnonSurf.
Would you like to visit websites, email, chat, hack or post messages anonymously? It's possible.
This Anonsurf module was made to provide users with system-wide anonymization. In simpler words, anything you do while you have Anonsurf started on your system would be nearly untraceable. Anonsurf not only routes all your traffic through Tor, but it also lets you start i2p services and clear any traces left on the user disk. Anonsurf also kills away all dangerous applications by virtue of the Pandora bomb, so you do not need to worry about having a Tor browser and other scripts running to hide your system. The best part is that all this is contained in a simple start/stop function.
What is I2P?
The Invisible Internet Project (I2P) is a fully encrypted private network layer. It protects your activity and location. Every day people use the network to connect with people without worry of being tracked or their data being collected. In some cases people rely on the network when they need to be discrete or are doing sensitive work.
I2P Cares About Privacy
I2P hides the server from the user and the user from the server. All I2P traffic is internal to the I2P network. Traffic inside I2P does not interact with the Internet directly. It is a layer on top of the Internet. It uses encrypted unidirectional tunnels between you and your peers. No one can see where traffic is coming from, where it is going, or what the contents are. Additionally I2P offers resistance to pattern recognition and blocking by censors. Because the network relies on peers to route traffic, location blocking is also reduced.
What is Tor?
Tor, short for "The Onion Router," is free and open-source software for enabling anonymous communication. It directs Internet traffic via a free, worldwide, volunteer overlay network that consists of more than seven thousand relays.
Using Tor makes it more difficult to trace a user's Internet activity. Tor protects personal privacy by concealing a user's location and usage from anyone performing network surveillance or traffic analysis. It protects the user's freedom and ability to communicate confidentially through IP address anonymity using Tor exit nodes.
Your ISP sees that you are connecting to a TOR node (your input node), but they will not know what actual data is going in and out and they will not know your final destination. They only know the one node with which you are connected. (no vpn needed anymore)
Tails Boot option:
Tails is a live operating system that protects against surveillance and censorship.Tails OS Update System automatic at every boot.
Tails: Your ISP sees that you are connecting to a TOR node (your input node), but they will not know what actual data is going in and out and they will not know your final destination. They only know the one node with which you are connected. Tails only run in ram. Nothing is stored on disk and everything disappears from the memory as soon as you shut down or restart the computer.
Kodachi Boot option:
Linux Kodachi will provide you with a secure, anti-forensic, and anonymous operating system considering all features that a person, who is concerned about privacy and safety, would need to have in order to be secure. Kodachi linux will hide your current location and let you choose where your digital location is.
As soon as Kodachi boots it:
Changes your MAC Address
Establishes a TOR connection through a VPN
Routes all internet traffic through TOR plus VPN with DNS encryption
Regularly changes your MAC Address to avoid detection and tracking
All of the above happens automatically, so you don’t have to do anything. You simply boot up and, once the connection is established, open a browser and start doing whatever it is you want or need to do.
Kali Linux live: detect vulnerabilities in networks and authentication protocols in your company or organization yourself
Partedmagic: Partitioning, Cloning, Rescue, and Erasing.Powerful Tools for Home or Office!
Parted Magic is a complete hard disk management solution.
SuperGrubDisk: Boot your Os, even with a broken Uefi.
Redo Rescue is an live system featuring backup, restore and disaster recovery software.
Plugin your external usb harddrive and backup your computer's harddrive or restore.
Website blocker systemwide:
Extra kali scripts:
Block camera + micro systemwide and permanent.
Use the same program to enable cam and/or micro