Discreete Linux

privacy-cd.org
Discreete Linux Icon

Aimed at journalists, activists and whistle-blowers, Discreete Linux is similar to Tails, in that it is booted live from external media, and leaves no/ minimal trace on the system. The aim of the project, was to provide all required cryptographic tools offline, to protect against Trojan-based surveillance.

Discreete Linux Website

Website

최고의 부산 유흥사이트 부달(부산달리기) 추천 순위 TOP 10

부달은 부산에서 유흥을 즐기고자 하는 분들을 위한 유흥 커뮤니티 플랫폼입니다. 다양한 부산 유흥사이트를 한 곳에서 만나보실 수 있습니다. 부달에서는 신뢰할 수 있는 서비스와 다양한 선택지를 제공하여 부산 유흥을 더욱 편리하게 즐길 수 있습니다. 부산달리기(부달)과 함께 즐거운 부산여행 되세요.

Redirects

Redirects to https://privacy-cd.org/

Security Checks

1 security checks failed (65 passed)

  • Suspicious Content Detected

Server Details

  • IP Address 194.1.147.8
  • Hostname wpx.net
  • Location Manchester, England, United Kingdom of Great Britain and Northern Ireland, EU
  • ISP K Media Tech Ltd.
  • ASN AS210250

Associated Countries

  • GB
  • AU

Saftey Score

Website marked as risky

60%

Blacklist Check

privacy-cd.org was found on 0 blacklists

  • ThreatLog
  • OpenPhish
  • PhishTank
  • Phishing.Database
  • PhishStats
  • URLhaus
  • RPiList Not Serious
  • AntiSocial Blacklist
  • PhishFeed
  • NABP Not Recommended Sites
  • Spam404
  • CRDF
  • Artists Against 419
  • CERT Polska
  • PetScams
  • Suspicious Hosting IP
  • Phishunt
  • CoinBlockerLists
  • MetaMask EthPhishing
  • EtherScamDB
  • EtherAddressLookup
  • ViriBack C2 Tracker
  • Bambenek Consulting
  • Badbitcoin
  • SecureReload Phishing List
  • Fake Website Buster
  • TweetFeed
  • CryptoScamDB
  • StopGunScams
  • ThreatFox
  • PhishFort

Website Preview

Discreete Linux Reviews

More Desktop Operating Systems

  • Qubes OS Icon

    Qubes OS

    qubes-os.org

    Open-source security-oriented operating system for single-user desktop computing. It uses virtualisation, to run each application in its own compartment to avoid data being leaked. It features Split GPG, U2F Proxy, and Whonix integration. Qubes makes is easy to create disposable VMs which are spawned quickly and destroyed when closed. Qubes is recommended by Edward Snowden.

  • Whonix is an anonymous operating system, which can run in a VM, inside your current OS. It is the best way to use Tor, and provides very strong protection for your IP address. It comes bundled with other features too: Keystroke Anonymization, Time Attack Defences, Stream Isolation, Kernel Self Protection Settings and an Advanced Firewall. Open source, well audited, and with a strong community - Whonix is based on Debian, KickSecure and Tor.

  • Tails is a live operating system (so you boot into it from a USB, instead of installing). It preserves your privacy and anonymity through having no persistent memory/ leaving no trace on the computer. Tails has Tor built-in system-wide, and uses state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. Open source, and built on top of Debian. Tails is simple to stop, configure and use.

  • Parrot Linux, is a full Debian-based operating system, that is geared towards security, privacy and development. It is fully-featured yet light-weight, very open. There are 3 editions: General Purpose, Security and Forensic. The Secure distribution includes its own sandbox system obtained with the combination of Firejail and AppArmor with custom security profiles. While the Forensics Edition is bundled with a comprehensive suite of security/ pen-testing tools, similar to Kali and Black Arch.

  • Alpine is a security-oriented, lightweight distro based on musl libc and busybox. It compiles all user-space binaries as position-independent executables with stack-smashing protection. Install and setup may be quite complex for some new users.

About the Data: Discreete Linux

API

You can access Discreete Linux's data programmatically via our API. Simply make a GET request to:

https://api.awesome-privacy.xyz/operating-systems/desktop-operating-systems/discreete-linux

The REST API is free, no-auth and CORS-enabled. To learn more, view the Swagger Docs or read the API Usage Guide.

About the Data

Beyond the user-submitted YAML you see above, we also augment each listing with additional data dynamically fetched from several sources. To learn more about where the rest of data included in this page comes from, and how it is computed, see the About the Data section of our About page.

Share Discreete Linux

Help your friends compare Desktop Operating Systems, and pick privacy-respecting software and services.
Share Discreete Linux and Awesome Privacy with your network!

View Desktop Operating Systems (6)