Cyrethium erases your digital fingerprint across networks, communications, and identity layers. Route through Tor. Leave no metadata behind.
Built for those who refuse to be tracked.
Force all system traffic through Tor network. Non-Tor traffic is rejected automatically. Additional out of box I2P,DNSCrypt-Proxy support.
Kernel to userspace hardening. Every layer fortified against exploitation .Based on Debian, stable and secure.
Cyrethium is completely open source and open to all kinds of audits. Every Cyrethium Project, including the website, is completely free software
Powerful modules that fuel Cyrethium's privacy engine.
Force all system traffic through Tor network with automatic leak prevention.
Fortified browser with advanced privacy extensions and security configurations.
Zero-trace browsing that erases all history, cookies, and cache on exit.
Traffic obfuscation tool that mixes real traffic with decoy patterns.
Pre-configured I2P network for anonymous peer-to-peer communication.
Encrypted DNS queries to prevent surveillance and manipulation.
Different threat models. Different solutions.
Full-featured edition with all security tools, privacy features, and custom applications.
Simplified GUI-focused version with essential privacy tools for everyday use.
GNOME Wayland edition with minimal tools for maximum security and reduced attack surface.
Minimal respin with pure Cyrethium core and no pre-installed tools.
All downloads are hosted on SourceForge. Always verify checksums before installation.
2.7 GB
Download4f67420a6ac8a8e8d9b4f6b301ea4854db321bd0459601ed015aad2ce7240dc3
2.6 GB
Downloadeffd455b1abfed8f800e4c5c3e1502e6619e2070a83559334eb59ba06ea1316b
2.1 GB
Download0e938340a8055f7e357ad007ca130a7da360237585392af846199ed109887c11
2.2 GB
Downloadb065340611b34d36d37fe95c8d4771d18e2850c31b68699dd66673bb08110bb6
Important: Verify SHA256 checksums after download. See installation guide for details.