A Quick Test Drive of Tails, a Privacy Focused Linux Distribution

Tails (The Amnesic Incognito Live System) is a Linux distribution that allows you to use the Internet anonymously and circumvent censorship via the Tor network. It leaves no trace, and is said to use “state-of-the-art” cryptographic tools to encrypt files, emails and instant messages. It’s distributed as a live image that boots from a DVD drive, a USB stick, or an SD card. Tails v1.0 has recently been released. so let’s give it a quick try. Tails is currently only available for x86 (32-bit), no ARM image yet. The source code is available via a git repo. Let’s download the ISO image (mirror), and signature. Alternatively you can download both via BitTorrent. To make sure the image is not compromised it’s recommend to verify the integrity of the ISO image with the signature we’ve just downloaded. You’ll also need a signing key The are several methods, but I’ve opened a terminal, […]

Linux.Darlloz Worm Targets Embedded Linux Devices

Symantec has recently discovered a new Linux worm, called Linux.Darlloz, that targets Internet-enabled devices running Linux in addition to traditional computers. That means devices such as home routers, set-top boxes and security cameras could be at risk of infection, although no attacks against non-PC devices have been confirmed yet. The worm exploits an “old” PHP vulnerability, which was patched in May 2012 (PHP 5.4.3, and PHP 5.3.13), and currently only affects Intel (x86) based systems. So you’d need an embedded system powered by an Intel processor, running Linux and PHP to be at risk. Having said that, Symantec also explains code for other architectures such as ARM, PPC, and MIPS, is also present in the worm, and these systems could potentially be at risk too with small modifications. Here’s how the worm operates: Upon execution, the worm generates IP addresses randomly, accesses a specific path on the machine with well-known […]

$49 Safeplug Tor Router Let You Browse the Net Anonymously

With the recent NSA leaks, more and more people have been be aware that there’s virtually no privacy online, especially with regards to their own or foreign governments. So people have looked into using secure emails, or find way to protect themselves against eavesdropping from criminals, advertisers, and politicians. For example, instructions have been posted to convert the Raspberry Pi into a Tor router, called Onion Pi, in order to hide your IP address, and browse the web anonymously from any of your devices. If you’re not the tinkerer type, and/or would just like to get something that works out of the box cheaply, people behind the Pogoplug, have introduced the Safeplug, a Tor enabled router, that sells for just $49, plus $9 shipping to the US. It does not seem to be available for the rest of the world. There’s absolutely no information about the hardware used, but it […]

Embedded Linux Conference Europe 2013 Schedule – Build Systems, Security, Device Tree, Debugging & Profiling Techniques, and More

Embedded Linux Conference Europe 2013 will conveniently start right after LinuxCon 2013, last 2 days (October 23-24), and take place at the same location: the Edinburgh International Conference Center, Edinburgh, United Kingdom. The Linux Foundation has published the schedule for the conference, so I’ll make my own virtual schedule with sessions that I find particularly interesting. Thursday – 24th of October 9:30 – 10:10 – Timeline For Embedded Linux by Chris Simmonds, Consultant, 2net Limited Today, Linux is woven into the fabric of our technology. Things such as printers, routers, TVs and phones all have their own “Inner Penguin”. Yet it was never originally intended to be used beyond desktop and server PCs. A lot of things had to happen before Linux could break out of the PC environment and make its way in the world as a jobbing jack-of-all-trades. Since the early beginnings of embedded Linux in the late 1990’s many people have contributed […]

Embedded World Conference 2012 Schedule

The Embedded World Conference 2012 will taken place on the February 28 – March 1 in Nuremberg, Germany. There will be over 1,000 exhibitors for the tenth conference (it started in 2003) showcasing their new products and solutions for the embedded markets. Beyond the exhibition, there will also be 13 classes and 22 sessions during those 3 days. February 28th 2012 Classes: 09:30 – 15:30 – Modeling Behavior with UML: Interactions and Statecharts by Dr. Bruce Douglass, IBM 16:00 – 17:00 – Agile Systems Engineering by Dr. Bruce Douglass, IBM 09:30 – 18:00 – Introduction to Real-Time Operating Systems by Dr. David Kalinsky, D. Kalinsky Associates 09:30 – 18:00 – Hands-on-Workshop Safety Critical Linux – Automated debugging and code screening with formal methods by Prof. Nicholas Mc Guire, OSADL Safety Critical Linux Working Group and Andreas Platschek, OpenTech. 09:30 – 16:30 – Cryptography and embedded Security – The Workshop chaired […]