Robolinux is pleased and excited to announce its brand new Robolinux "Cinnamon Raptor" V8.1 LTS 2020 OS which is based on the rock solid Debian 8 stable source code sporting the 3.16 Linux kernel. It has far better graphics and audio quality, boots up and runs much faster than Debian 7 and is also compatible with newer hardware, drivers and most notably the Intel Haswell chipset. The Robolinux "Cinnamon Raptor" user interface is extremely fast, beautiful and very easy to use. An enormous amount of time and effort went into optimizing and tweaking Robolinux "Cinnamon Raptor" v8.1 so that Linux Beginners and Advanced Users will be very pleased. For example we fixed the Debian 8.1 Update Notifier issue. As usual both the 32 & 64 bit versions come with dozens of one click Wifi, Video & Printer Driver installers. A completely new Stealth VM was written capable of running Windows 10 virus free inside Robolinux. All 12 Robolinux privacy & security apps like the newest i2P Invisible Internet Project, Tor browser, Tor Chat, UFW Firewall, Clam AV plus many popular User applications such as PopcornTime, Netflix, Firefox, Thunderbird, Kazam screencaster, Google Chrome, Google Earth, Skype, VLC, Plex Media Server, Kdenlive Video Editor and VirtualBox. We also added a brand new Cinnamon FAQ section to our website as well. Robolinux 7 series users can migrate with ease by using the built in Lucky Backup application in all Robolinux 7 versions.
Here are the 12 Privacy & Security apps in Robolinux Cinnamon Raptor v8.1
1. Private Internet Access VPN
(Added to all Robolinux versions in 2014)
No saved log files for the NSA to snoop!
Dozens of Gateways all over the World!
Up to 190 Gigabit speeds per Gateway!
Stops ISP Torrent Throttling!
No Bandwidth Limits!
One account protects your PC, laptop, Phone, Tablet and TV too.
2. Invisible Internet Project (I2P)
i2p is an implementation of an anonymous, de-centralized network. Over a single layer, applications transmit anonymous and secure messages to one other. All communications are encrypted end-to-end, and 4 layers of encryption surround the sending and receiving of messages. Every client application uses its own i2p router to establish a number of in-bound and out-bound tunnels to other applications, and these peers pass messages to/from the client. Each peer on the i2p network selects the length of his tunnels; The longer the tunnel, the greater the anonymity but the higher the latency and the lower the throughput. Hence, there is a trade-off between anonymity and high(er) latency AND low(er) throughput. Initially - when a client attempts to contact its peers, a distributed hash table (DHT) containing the details of connected peers, is queried, but no further queries are required to establish subsequent connections. So, the i2p queries - for bringing about connections - differ both from Tor's hidden services and clearnet DNS.
i2p is rumored to have a higher network latency but to be more capable of preserving a user's anonymity than Tor's hidden services. However - regarding the latter point, there is fierce dispute. On i2p, peers communicate over many protocols, including http, IRC and BitTorrent. Finally, i2p domains are assigned the pseudo (non-routable) Top Level Domain (TLD) of .i2p, and to connect to them, a proxy is required.
3. RootKit Check
The chkrootkit security scanner searches the local system for signs that it is infected with a 'rootkit'. Rootkits are set of programs and hacks designed to take control of a target machine by using known security flaws.
4. Tor Anonymous Browser
Tor protects privacy in communications via a distributed network of relays run by volunteers all around the world: it prevents anybody watching Internet connections from learning what sites you visit, and it prevents the visited sites from learning your physical location. Tor works with web browsers, instant messaging programs, remote login clients, and many other TCP-based applications.
5. Tor Anonymous Chat
TorChat is a peer to peer instant messenger with a completely decentralized design, built on top of Tor's location hidden services, providing strong anonymity while being very easy to use Top most relevant feature TorChat claims, above from text messaging and file sending, rest on the difficulty someone would experiment trying to find out where you are communicating from In the condition someone might be observing you and sniff your internet traffic connection, the person will have a high degree of difficulty in finding out: - Where your contacts are located - To whom you are sending or receiving from - What you send or receive, as everything is end-to-end encrypted
6. The Robolinux Stealth Text Vault
The Robolinux Stealth Text Vault app uses steghide a steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. It features hiding text file data in jpg files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data.
BleachBit deletes unnecessary files to free valuable disk space, maintain privacy, and remove junk. It removes cache, Internet history, temporary files, cookies, and broken shortcuts. It handles cleaning of Adobe Reader, Bash, Beagle, Epiphany, Firefox, Flash, GIMP, Google Earth, Java, KDE, OpenOffice.org, Opera, RealPlayer, rpmbuild, Second Life Viewer, VIM, XChat, and more. Beyond simply erasing junk files, BleachBit wipes free disk space (to hide previously deleted files for privacy and to improve compression of images), vacuums Firefox databases (to improve performance without deleting data), and securely shreds arbitrary files.
8. PGP eMail Encryption for Thunderbird
The OpenPGP extension for Thunderbird called Enigmail allows users to access the features provided by the popular GnuPG software from within Thunderbird. Enigmail is capable of signing, authenticating, encrypting and decrypting email. Additionally, it supports both the inline PGP format, as well as the PGP/MIME format as described in RFC 3156.
9. UFW Firewall
gufw is an easy and intuitive way to manage your Linux firewall. It supports common tasks such as allowing or blocking pre-configured, common p2p, or individual port(s), and many others!
The Uncomplicated FireWall is a front-end for iptables, to make managing a Netfilter firewall easier. It provides a command line interface with syntax similar to OpenBSD's Packet Filter. It is particularly well-suited as a host-based firewall.
10. Clam AV
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon in the clamav-daemon package, a command-line scanner in the clamav package, and a tool for automatic updating via the Internet in the clamav-freshclam package. The programs are based on libclamav6, which can be used by other software.
This package contains the command line interface. Features:
- built-in support for various archive formats, including Zip, Tar, Gzip, Bzip2, OLE2, Cabinet, CHM, BinHex, SIS and others; - built-in support for almost all mail file formats; - built-in support for ELF executables and Portable Executable files compressed with UPX, FSG, Petite, NsPack, wwpack32, MEW, Upack and obfuscated with SUE, Y0da Cryptor and others; - built-in support for popular document formats including Microsoft Office and Mac Office files, HTML, RTF and PDF.
For scanning to work, a virus database is needed.
There are two options for getting it:
- clamav-freshclam: updates the database from Internet. This is recommended with Internet access. - clamav-data: for users without Internet access. The package is not updated once installed. The clamav-getfiles package allows creating custom packages from an Internet-connected computer.
KeePass is a easy-to-use password manager for Windows, Linux, Mac OS X and mobile devices. You can store your passwords in highly-encrypted databases, which can only be unlocked with one master password and/or a key file. A database consists of only one file that can be transferred from one computer to another easily.
KeePass can import data from various file formats. The password list can be exported to various formats, including TXT, HTML, XML and CSV files.
JonDonym (the name is derived from John Doe and Anonymous) protects your privacy on the internet and makes truely anonymous websurfing possible. It consists of the following components:
* Mixes: Anonymizing intermediaries (proxies) which multiply encrypt, mix and forward data streams of several users.
* Mix Cascades: Chains of Mixes run by various independent operators. They typically consist of three Mixes: one first Mix (IN) which receives requests from the users, one middle Mix (MIDDLE) which only forwards traffic to other Mixes, and a last Mix (OUT) which sends the real outgoing requests to internet resources.
* InfoService: A separate service which provides information about the available mixes and mix cascades, thenumber of users currently using the mix cascades, and their current workload.
* JonDo: Client program installed on the user's computer. Its primary use is to establish encrypted connections to anonymising Mix Cascades.
In this form, the system protects from observation by
* the visited web server
* your internet access provider (internet cafe, WLAN, AOL, T-Online, ...)
* other eavesdroppers on the connections (ECHELON,...)
* any data retention (by international distribution)
* the JonDonym service itself.