Tinfoil Hat Linux
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
Developer | Shmoo Group[1] |
---|---|
OS family | Linux (Unix-like) |
Working state | Discontinued |
Source model | Open source |
Latest release | 2.0pre1 / February 2002 |
Platforms | i386 |
Kernel type | Monolithic kernel |
Default user interface | CLI / Bourne shell |
License | Documentation: Modified BSD license[2] Software: Original licences |
Official website | tinfoilhat.shmoo.com |
Tinfoil Hat Linux (THL) is a compact security-focused Linux distribution designed for high security developed by The Shmoo Group. The first version (1.000) was released in February 2002. By 2013, it had become a low-priority project. Its image files and source are available in gzip format. THL can be used on modern PCs using an Intel 80386 or better, with at least 8 MB of RAM. The distribution fits on a single HD floppy disk. The small footprint provides additional benefits beyond making the system easy to understand and verify. A hard drive is not required to use THL, making it easier to "sanitize" the computer after use.
The logo of Tinfoil Hat is Tux, the Linux mascot, wearing a tinfoil hat.
The Shmoo Group website says "It started as a secure, single floppy, bootable Linux distribution for storing PGP keys and then encrypting, signing, and wiping files. At some point, it became an exercise in over-engineering."[1]
Security features
[edit]Tinfoil Hat uses a number of measures to defeat hardware and software surveillance methods like keystroke logging, video camera, and TEMPEST:
- Encryption — GNU Privacy Guard (GPG) public key cryptography software is included in THL.
- Data retrieval — All temporary files are created on an encrypted RAM disk that is destroyed on shutdown. Even the GPG key file information can be stored encrypted on the floppy.
- Keystroke monitoring — THL has GPG Grid, a wrapper for GPG that lets you use a video game-style character entry system instead of typing in your passphrase. Keystroke loggers get a set of grid points, instead of a passphrase.
- Power usage and other side-channel attacks — Under the Paranoid options, a copy of GPG runs in the background generating keys and encrypting random documents. This makes it harder to determine when real encryption is taking place.
- Reading the screen over the user's shoulder is made difficult when Tinfoil Hat is switched to paranoid mode, which sets the screen to a very low contrast.
Applications
[edit]THL can be used on most modern PCs using the x86 processor architecture. For example, one might install it on a computer that is kept in a locked room, not connected to any network, and used only for cryptographically signing keys. It is fairly easy to create the Tinfoil Hat booting floppy with Microsoft Windows. Verifying the checksum can pose a greater challenge. The text of the documentation is salted with a few jokes, the humor working in stark contrast to the serious and paranoiac tone of the surrounding text. The very name of the distribution pokes fun at itself, as Tinfoil Hats are commonly ascribed to paranoiacs as a method of protecting oneself from mind-control waves.
Tinfoil Hat Linux requires one to work in a text-only environment in Linux, electing to start users with a Bourne shell, the text editor vi, and with no graphical user interface. It uses BusyBox instead of the normal Util-Linux, the GNU Core Utilities (formerly known as FileUtils, ShellUtils, and TextUtils), and other common Unix tools. Tinfoil Hat also offers the GNU nano text editor.
See also
[edit]References
[edit]- ^ a b "Shmoo website - projects page". Retrieved April 21, 2024.
- ^ FAQ (archived)
- Piper, Scott; Davis, Mark; Shenoi, Sujeet (2006). "Countering Hostile Forensic Techniques". IFIP Advances in Information and Communication. 222 (Advances in Digital Forensics II. DigitalForensics 2006): 79–90. doi:10.1007/0-387-36891-4_7.
- Pomeroy, Blake; Chen, Weifeng (2015). "Mobile OS security: Current situation and future directions". 2015 IEEE International Conference on Electro/Information Technology (EIT). Vol. 2015. Dekalb, IL: IEEE. pp. 230–235. doi:10.1109/EIT.2015.7293344. ISBN 978-1-4799-8802-0. S2CID 33166863.
- Kucan, Berislav (Mar 2002). "Paranoid II - Revenge of the TinFoil Hat". AUUGN. AUUG, Inc. pp. 19–22. Retrieved 2023-07-02.
- "Tinfoil Hat Linux: A Distribution for the Paranoid". Slashdot. SlashdotMedia. February 19, 2002. Archived from the original on 2023-07-02. Retrieved 2023-07-02.