The first place to start if you need anonymity or security is choosing an operating system. This is important: do not use Windows or set FireWall, but it is still recommended to bypass Windows.
Separate operating systems by type:
1) Operating systems for anonymity
2) Operating systems for security and anonymity.
Warning – Before installing, you are recommended to do the following:
a. See the installation itself on YouTube
b. Install and test the operating system on the virtual machine.
If you liked it and everything suits you – install.
1. Mofo Linux
link – https://mofolinux.com/
basis – Ubuntu
Properties – Encryption of Communications and Files that you also downloaded, secure internet and anonymous. Design. If you like Ubuntu and design, I recommend you to browse this distribution.
link – https://www.robolinux.org/
basis – Ubuntu, Debian
Properties – Robo UNTRACKER + Windows. Everyone who wanted to work safely on the web, loving Windows = it’s a system for you. Robo UNTRACKER – will do anything for you
3. Linux Kodachi
link – https://www.digi77.com/linux-kodachi/
Properties: Cooler Tails. Dream, Tor + VPN + Encryption, all in one package. Our Choice.
The basis – Debian
Properties: The emphasis on anonymity rather than hacking, simplicity, convenience (flash drive – live), can be a desktop distribution, the most famous.
Operating Systems for Security and Anonymity.
Which are difficult to crack for hacking, penetration and protection against malware. On the one hand this is true, on the other Linux is well protected, so the mobility factor plays a role.
website – https://www.whonix.org/
The base is its own development, it consists of two operating systems. One of them is the Gateway and its function is to route traffic through the Tor network, and the other is a Workstation, it is completely isolated and can only access the network through the gateway + Encryption through Tor. The inability to light up your real IP
– You can perfectly protect your PC with the System .
VPN + Whonix + Kali Linux + VPN = Dream for dextop and hacking.
2. Qubes OS
website – https://www.qubes-os.org/
Basis – Fedora
Settings: Anonymity Tor + VPN. The engine uses an interesting principle of running an application: Each application runs in a separate virtual machine, divided into classes according to the level of importance for the OS. The browser runs in one virtual machine, the “jabber” runs in the other, and for the user, both programs seem to be running in the same workspace. You can only tell the difference between “whirlpools” by the color of the window.
link – https://www.truenas.com/TrueOS-Discontinuation/
basis – BSD, Unix
Prerequisites: this is a BSD. Very hard to hack, minus for enthusiasts, anonymity will have to be set up by yourself, but if you set up everything – traffic through the torus, etc., it is a very reliable system, because BSD.