1 00:00:00,190 --> 00:00:05,160 In this election I'm going to run through some of the hard core anonymity focused arrestors if anonymity 2 00:00:05,160 --> 00:00:07,350 is top priority over everything else for you. 3 00:00:07,350 --> 00:00:08,880 So first we have to mention. 4 00:00:08,880 --> 00:00:09,840 Tails. 5 00:00:09,840 --> 00:00:17,520 Tails is a live operating system that you can start on almost any computer from a USP stick or a DVD. 6 00:00:17,520 --> 00:00:21,930 His aim is to preserve your privacy and anonymity on the positive. 7 00:00:21,930 --> 00:00:27,800 It is a anonymity focused security privacy and anonymity focused operating system. 8 00:00:27,810 --> 00:00:33,060 You will also find that most Moua hackers do not target Linux and particularly not Tails. 9 00:00:33,130 --> 00:00:40,110 Tails is specifically resistant to local forensic examination so no one will know what you've actually 10 00:00:40,110 --> 00:00:41,390 been doing on it. 11 00:00:41,400 --> 00:00:46,740 Once you finish using it there is fast book fixes it's free and it's open source. 12 00:00:46,740 --> 00:00:52,160 It is alive operating system which could be a plus or a negative depending on your point of view. 13 00:00:52,170 --> 00:00:57,880 It's relatively easy to use quick to get up and running if you want privacy and anonymity and you want 14 00:00:57,880 --> 00:01:02,970 to in a fast way and you want protection against local forensic examination. 15 00:01:03,000 --> 00:01:07,260 They are moving towards reproduceable bills which is good on the negative. 16 00:01:07,260 --> 00:01:14,640 Governments will definitely be targeting tale's for attack as it is one of the main anonymity platforms. 17 00:01:14,700 --> 00:01:17,340 We cover tail's in more detail later on in the course. 18 00:01:17,460 --> 00:01:24,960 So check out the sections on tale's another one absolutely has to be mentioned is the Unix gateway and 19 00:01:24,960 --> 00:01:29,790 workstation actually one ass separated into two parts. 20 00:01:29,820 --> 00:01:36,260 Unix is a free open source operating system focused on anonymity privacy and security. 21 00:01:36,260 --> 00:01:41,030 It uses the Tor anonymity network which we cover in great detail in its own section. 22 00:01:41,050 --> 00:01:44,610 All that is and it uses Debian GNU Linux. 23 00:01:44,610 --> 00:01:51,570 One of the dresses I highly recommend as its basis as you know Unix implement security through isolation 24 00:01:51,750 --> 00:01:57,210 and Unix particularly has a focus on anonymity and preventing leaks out of the Tor network. 25 00:01:57,210 --> 00:02:00,570 So it's good for security privacy and anonymity. 26 00:02:00,600 --> 00:02:03,750 It does not mitigate against local forensic examination though. 27 00:02:03,750 --> 00:02:10,030 So what you've done stays on the platform on like tale's where it wipes out what you've been doing locally. 28 00:02:10,080 --> 00:02:15,390 We cover Unix in it's own section in more detail later on in the course. 29 00:02:15,420 --> 00:02:21,390 Another thing you can do is you can combine the Unix OS with the cubes OS which we've already mentioned. 30 00:02:21,480 --> 00:02:27,720 So you get security through isolation and compartmentalization you can use Unix in combination with 31 00:02:27,720 --> 00:02:31,990 cubes or else making a super secure anonymizing machine. 32 00:02:32,100 --> 00:02:38,970 Good for security privacy and NMT we cover Unix and cubes in more detail in their own section. 33 00:02:38,970 --> 00:02:45,570 This was just a quick summary because people just like to know early on what all the operating systems 34 00:02:45,570 --> 00:02:49,150 with a particular security privacy and anonymity focus. 35 00:02:49,170 --> 00:02:56,190 So those are the anonymity focused operating systems which we cover later on as we go through the course.