Discreete Linux provides an isolated, local working environment that is not accessible to spyware (Trojan software). Therefore, sensitive data can be processed, encrypted, and stored securely and is protected against such surveillance and espionage attacks.
Discreete Linux accomplishes this protection by the following the three general successive safety lines:
- Wall up the entrances
- Prevent spreading
- Wall up the exits
Discreet is based on two basic principles:
- Transparent development and free software
- User-friendly handling
Despite the inevitably uncomfortable limitations that such a highly protected environment entails, even inexperienced users should be able to work and communicate effectively and easily.
These safety lines and principles are explained in more detail below.
For more profound Information please click the "Details" tab above.
Discreete Linux provides an isolated, local work environment that is not accessible to spyware (Trojan software). Therefore, sensitive data can be processed, encrypted, and stored securely and is protected against such surveillance and espionage attacks. Discreete Linux is only designed for this purpose and for people who need such a high level of data security.
Discreet Linux is only used to protect these sensitive data and keys, for all other tasks, the user can continue to use his previously used operating system as usual. Discreete Linux is a pure live system, i. it is not installed on the computer. Instead, any computer can be started from a Discreete USB drive, regardless of the installed software. Discreete leaves no traces on the computer and leaves the installed systems untouched. All user data are stored exclusively on removable media, which are encrypted using tried and tested methods (optionally LUKS or Veracrypt).
There are many ways to get infected by malicious software: either the attacker directs the user directly to execute malicious code, or he manages to exploit security vulnerabilities such as buffer overflow problems in software installed on the target system, with the aim of executing arbitrary code and escalating privileges to system rights. The malicious software can reach the target system in a variety of ways: manipulated downloads, e-mails, web pages, software updates, manipulated storage devices, harmless looking documents that exploit vulnerabilities in software used by the user.
Highly developed trojan systems can overcome common security measures such as virus scanners, firewalls, intrusion detection systems or even an air gap (separation of the system from the Internet).
The security architecture of Discreete Linux is based on the analysis of how Trojan software actually penetrates into systems, how it implants and hides itself there, and how it makes the stolen data accessible to the attackers.
This results in the three general successive safety lines of Discreete Linux against espionage trojans:
- Wall up the entrances
- Prevent spreading
- Wall up the exits
Discreet is based on two basic principles:
- Transparent development and free software
- User-friendly handling
Despite the inevitably uncomfortable limitations that such a highly protected environment entails, even inexperienced users should be able to work and communicate effectively and easily.
These safety lines and principles are explained in more detail below.