Welcome to Cyrethium Wiki
Welcome to the Cyrethium documentation page! This page contains everything you need to know about the Cyrethium operating system.
Cyrethium is a privacy and security-focused Linux distribution. It comes with privacy tools like Tor, I2P, DNSCrypt and is designed to maximize your digital security.
What You'll Find in This Documentation:
- Legal Disclaimers: Terms of use and legal information
- Web Site: Cyrethium website
- About Cyrethium: System architecture and features
- Installation: System boot and installation guide
- Usage: Usage manuals
- Browsers: Information about Cyrethium browsers
- Settings: System settings
- Custom Tools: Privacy,Security,Network,Encryption,Crypto tools
- Security Architecture: Security layers and protection mechanisms
- Privacy Architecture: Anonymity and privacy mechanisms
- Info: Linux security info
- Guides: System guides
- Developers: Developer sources and technical details about Cyrethium
- Community: Artstation and community contributions
- Dev Notes: Developer's notes and suggestions
- Research: Security researchs about security and privacy
- Tricks: Linux and privacy tricks
Click on any topic from the left menu to access detailed information. Happy reading!
Site Map
Cyrethium website is completely open source and hosted by GitHub. Here's a quick overview of all sections:
Main Pages
- Homepage: Main page with general information about Cyrethium
- Download: Download page with ISO links and verification instructions
- Donate: Support Cyrethium project through donations
- Docs: Detailed documentation for system usage and information
- Gallery: System screenshots and visual content
- News: Development process and community news
- Releases: Release announcements and version history
- Developer: Developer information and blog
Documentation Sections
- Legal Disclaimers: Terms of use, security statement, and legal information
- About Cyrethium: What is Cyrethium, features, and version comparison
- Installation: ISO download, USB preparation, boot instructions, and installation guide
- Usage: Basic usage, Tor routing, system settings, and troubleshooting
- Security Architecture: System hardening, sysctl, AppArmor, and security measures
- Privacy Architecture: Tor, I2P, DNSCrypt, and privacy tools
- Custom Tools: Cyrethium-specific tools and utilities
- Developers: Tool submission, building ISO, programming guides
- Research: Security research on exit node attacks, correlation attacks, and P2P networks
- Community: Artstation and community contributions
- Dev Notes: Developer's notes and suggestions
- Tricks: Linux and privacy tricks
Open Source
Cyrethium's website is completely open source and hosted on GitHub. The source code is available for review and contributions.
News Generation
Cyrethium's News section is generated with AI assistance. If you find any errors, please contact us.
Technical Note
If you experience issues with the News and Gallery sections, try temporarily disabling NoScript or similar browser extensions.
Legal Disclaimers
Important Warning: The Cyrethium operating system has been developed for educational and research purposes. Users should use the system only for legal purposes.
Cyrethium Operating System ("Cyrethium") is a Linux distribution developed solely for educational, research, and personal privacy enhancement purposes.
- Cyrethium does NOT ENCOURAGE or SUPPORT illegal activities, hacking, unauthorized access, malware distribution, or other criminal activities.
- The developer root0emir takes NO RESPONSIBILITY for misuse of the software or illegal actions.
- Users are FULLY RESPONSIBLE for complying with all laws and regulations in their countries when using Cyrethium.
- Cyrethium provides NO ABSOLUTE GUARANTEE regarding anonymity, privacy, or security. Proper configuration, maintenance, and operational security practices are the user's responsibility.
- By downloading, installing, or using Cyrethium, users agree to hold root0emir harmless from any legal claims, damages, and liabilities.
For more information, please review your local laws and regulations.
Security Statement
Security and privacy are the highest priority in Cyrethium. I am committed to providing a reliable operating system that protects your data, ensures your anonymity, and provides protection against unauthorized access and surveillance.
1. No Data Collection
Cyrethium does NOT COLLECT, STORE, or SEND personal data, telemetry, or usage analytics. Your data remains only on your device and is not shared with third parties or governments.
2. No Backdoors or Hidden Access
There are NO BACKDOORS, HIDDEN CHANNELS, or HIDDEN FUNCTIONS in Cyrethium. The source code is completely open, reviewable, and contains no malicious access points.
3. Only Official Debian Repositories Used
All software packages and updates are obtained only from official Debian repositories. No third-party, custom, or untrusted sources are used, thus maintaining software integrity.
4. Open Source Components
All components, including custom security tools and developments, are completely open source. There are no hidden or proprietary binary files in the system.
5. Traffic Routing is User Controlled
By default, network traffic is not forced to route through the Tor network. Users can enable Tor routing completely at their own discretion. Cyrethium provides secure configuration and tools, but the decision is entirely up to the user.
6. Hardened System Architecture
Cyrethium includes multiple security hardening layers, including:
- Custom firewall and network filtering rules that block unauthorized traffic
- Permission and access controls that minimize attack surface
- Various system hardenings to reduce exploit risks
- Regular updates in accordance with Debian security bulletins
7. Transparent Development and Code Auditing
Cyrethium's source code, development discussions, and security audits are open to community review. This transparency allows experts from around the world to verify the system.
8. User Responsibility
Cyrethium provides strong security foundations, but ultimate privacy and security depends on user practices.
9. No Warranty
Cyrethium is provided "as is" and no warranty is given. The user accepts all responsibility arising from using the software.
10. Complete Independence and Neutrality
The Cyrethium operating system is not affiliated with any institution, company, or political organization and is developed independently.
Terms of Use
Welcome to Cyrethium Operating System ("Cyrethium"). By downloading, installing, or using Cyrethium, you agree to comply with the following terms:
1. License and Usage
Cyrethium is provided under applicable open source licenses.
You may use Cyrethium only for personal, educational, and research purposes.
Commercial use, redistribution, or modification without explicit permission is prohibited.
2. Prohibited Activities
You agree not to use Cyrethium for the following illegal activities:
- Hacking, unauthorized access, or malware distribution
- Engaging in activities that violate local, national, or international laws
- Attempting to disrupt or damage networks, services, or other users
3. No Warranty
Cyrethium is provided "as is"; the developer root0emir does not guarantee that the software is error-free or completely secure.
4. Limitation of Liability
Developers cannot be held responsible for any damage arising from the use or inability to use Cyrethium.
5. Compliance
It is the user's responsibility to ensure compliance with all applicable laws and regulations when using Cyrethium.
6. Changes to Terms
We reserve the right to make changes to these terms at any time. Your continued use of Cyrethium after changes to the terms means your acceptance.
What is Cyrethium
Cyrethium is a Debian-based Linux distribution focused on privacy and security. It can route all incoming and outgoing internet traffic through the Tor network. DNSCrypt-Proxy and I2P Router are pre-configured. It provides strong protection against browser attacks with custom hardened Firefox variants. The distribution hosts a wide range of tools designed from scratch for Cyrethium and includes multi-layered hardening against cyber attacks. There are 4 different versions available: 2 core and 2 respins.
What Does It Do?
Cyrethium routes all incoming and outgoing network traffic at the system level through the anonymous Tor network operated by volunteers to hide your online activities. The difference from browser-based solutions is clear: here, anonymity applies to the entire system — every application and every connection is forced through Tor; non-Tor exits are rejected.
This way:
- You leave almost no digital footprint while browsing the internet — as if you were wearing a mask.
- It provides more comprehensive privacy than standard browser isolation; all your network traffic is protected by anonymous networks.
Security and Hardening
Cyrethium is not just about traffic routing; it provides extra resistance against exploits and malware with multi-layered system hardening. Thanks to a hardened kernel, strict system policies, and settings that reduce the attack surface, it is more resilient compared to ordinary distributions.
Why?
In an era where privacy is important and the internet is far from secure, Cyrethium provides users with both privacy and security.
Who Is It For
For those who need privacy anytime, anywhere, always
Cyrethium is Recommended for:
- Advanced users who value security and privacy
- People with Linux experience who are not strangers to Linux
- Professionals working in cybersecurity
- Those interested in crypto and blockchain technology
- Users working under high threat
Cyrethium Lite is Recommended for:
- Those who want a secure system in daily use
- Users with basic Linux knowledge
- Those looking for a simple but secure solution
Zenrethium is Recommended for:
- Those looking for a secure but basic Linux distribution
- Those who want to make their Linux experience more secure and stable
Root0Edition is Recommended for:
- Complete beginners to Linux but seeking strong privacy
- Those who want full privacy without dealing with complex tools
Choose Your Edition
Cyrethium focuses on privacy and security as well as threat analysis and system defense. It can monitor and detect network-based attacks and detect system attacks, suspicious processes, and operations. Cyrethium contains many tools. It offers a system focused on privacy and security. It requires intermediate to advanced Linux, network, and system knowledge. When used correctly, the privacy and security provided by Cyrethium is strong, but it may be too much for an ordinary user. Cyrethium is a system designed for security researchers, advanced Linux users, cybersecurity experts, and users working under high threat. Cyrethium has many tools, so be prepared for possible bug fix updates.
Cyrethium Lite is a system designed for those who want a secure system in daily use. It is simple to use and contains only basic privacy tools. There are more GUI tools. It can be used with basic Linux knowledge and is ideal for an ordinary user. It is recommended for former Securonis users.
Zenrethium is for those who want a pure Debian experience without any additional tools. It does not contain any additional privacy and security tools. It is a respin that uses Cyrethium's hardening settings and desktop. It is ideal for those who don't want the tools and are looking for a minimal stable system.
Root0Edition is a system built on GNOME Wayland that contains only Tor routing and critical privacy tools. It is designed for complete beginners to Linux who need privacy. With Wayland and minimal tools, the attack surface is low and provides strong security.
Which Version Should I Choose?
I need full privacy and full security, I have Linux and network knowledge. I love tinkering and exploring. I prefer manual usage from the terminal and I'm not afraid of coding. I want to discover new tools: Cyrethium
I need privacy and security but I have basic level knowledge in Linux. I want easy privacy without complexity. A few basic privacy and security tools are enough for me: Cyrethium Lite
Just Tor routing is enough for me, I don't need additional tools. I want basic and strong privacy: Root0Edition
I don't need any tools and privacy. Just a Hardened Debian base is enough for me. I want a secure system for daily use: Zenrethium
Warnings
- Do not download the Cyrethium ISO from anywhere other than SourceForge. ISOs are not shared in Telegram groups, Darkweb, or other places. The only official download source is SourceForge.
- Stay away from modified versions. Only download the official Cyrethium Versions.
- The developer will not message you from anywhere and will not ask you for anything. Beware of imitators.
About Donations
Cyrethium is a project developed entirely independently and on a voluntary basis. The project is not funded by any commercial institution and stands only with the support of the community.
Thanks to donations:
- Infrastructure costs (domain names, development costs, etc.) are covered.
- The development process is accelerated and new features are added.
- The long-term sustainability of the project is ensured.
Privacy Policy
- All donations are anonymous by default.
- No donor's personal information is shared with third parties.
- Donors who wish can only appear in the thank you list in the "News" section with their own consent.
Visibility Options
After donating, you can contact the developer and choose one of the following options:
- Anonymous Donation → Name or nickname is not visible.
- Sharing with Nickname → Only the nickname you specify appears in the news section.
- Sharing with Real Name → Donors who wish can share their name, but this option is not recommended due to privacy sensitivity.
Proof and Communication
If you want your donation to be listed:
- Provide a screenshot or receipt of the donation transaction.
- After conveying the relevant proof to the developer, your selected visibility setting is applied.
Transparency
- The donor list is published only on request.
- The amount of donations is never shared, only the donor's identity (nickname/name) is visible.
- This way, transparency is maintained while donors' privacy is also secured.
Nature of Donations
- All donations are voluntary.
- No special privileges, features, or access are provided to donors.
- Cyrethium will always remain free, open, and accessible to everyone.
FAQ
Yes. The system is completely free.
Yes. All source codes are open and can be found on GitHub.
Yes, it is designed for daily use.
It can be used live, but provides more security when installed to disk because AppArmor is not active in live mode, and many kernel hardening and CPU mitigation settings become active when installed to disk. You should know that Live USB will provide less protection.
Theoretically, games can be played, but performance will be significantly lower compared to other distributions. Due to CPU mitigation and kernel hardening parameters, the system increases security by compromising performance.
Cyrethium uses Debian repositories. Such a situation can only occur if it happens in Debian repositories, but this would affect not only Cyrethium but all Debian-based distributions. Since Cyrethium does not have its own repository, such an attack cannot occur on the Cyrethium side.
There is no system that cannot be hacked. However, exploiting Cyrethium would be much more difficult.
This is a long topic of discussion. Whonix focuses on preventing leaks and hardening. Tails focuses on leaving no traces. Cyrethium focuses on system and network defense. Each specializes in different areas.
No. It has not been audited so far.
No, Tor routing is completely optional and is disabled by default.
It is much more secure than an ordinary browser and contains many hardening and privacy settings.
Hardened Firefox is for daily use, your sessions and history are saved and it is more user-friendly but still quite secure.
Amnesic Firefox has very strict privacy and hardening settings. All your traces are deleted every time it closes. It is more secure and privacy-focused. However, it is less user-friendly in daily use.
They are embedded in the ISO and do not receive updates. Each one is a stable version. If they need to be updated in the next ISO version, they are updated or new features are added if needed.
Theoretically, of course, but Cyrethium has no customization for other desktops. Also, you need to edit the tool .desktop files from scratch. Although possible, it is a somewhat difficult process.
It cleans your swap and RAM, deletes kernel caches, deletes your logs and journals, deletes terminal history, deletes temporary files, removes some traces from you, and serves as a defense against coldboot attacks.
It started when my Arch-based USB distribution was not accepted in a project competition. Motivated by this, I started developing Cyrethium with determination. My main goal was to get the distribution listed on DistroWatch.
Cyrethium is the continuation of Securonis. The project name, desktop, and category were changed. Securonis changed its name due to possible copyright risks and SEO problems.
Send an email to the developer: root0emir@protomail.com
Since Cyrethium is completely Debian-based, look for answers in Debian forums.
If you can't find a solution to your problem, try getting help from AI like ChatGPT, DeepSeek.
If you still can't find a solution, you can get help on our Discord server or contact the developer.
Announcements and news are mostly shared on the website. Additionally, it is also active on Discord and LinkedIn.
Currently, the project is developed by one person. Cyrethium is completely under the management of Emir (root0emir).
It depends on the version you choose. Cyrethium Lite and Root0Edition are easy to use, while the standard Cyrethium version may be more complex.
No. AI is only used to analyze the security performance of the website and tools. The tools are still entirely developed by humans.
Yes, it is updated on GitHub every 30-40 days.
About Donations
Information about donations will be added here.
Supporting Cyrethium
If you are using Cyrethium and want to support the project, you can contribute in the following ways:
1. Financial Support
You can contribute to the development process by donating to the project.
Donations help ensure the continuity of the system and help add new features.
2. Design and Art
Graphic designers and visual artists can enrich Cyrethium with wallpapers, icons, or theme designs.
Design contributions can be shared by the community and used in official Cyrethium resources.
3. Software and Tool Development
Developers and programmers can improve existing tools or add new tools.
Code contributions can be submitted via GitHub and reviewed by the community.
Contributions must comply with open source principles.
4. Documentation and Education
Users can write documentation or prepare guides.
Blog posts, guides, and tutorial content help the Cyrethium community learn more easily.
5. Feedback and Bug Reporting
You can report bugs or improvement suggestions you encounter during use.
This way, the system becomes more secure and stable.
6. Content and Promotion
You can promote the project by writing blog posts or sharing Cyrethium reviews and analyses on platforms like Distrowatch.
You can share your experiences, guides, and tutorial content on social media or forums.
These contributions make it easier for new users to learn the system and grow the community.
Developer
Name / Nickname: Emir (root0emir)
Role:Releng
Brief Information:
Cyrethium is an operating system developed independently by Emir.
He previously developed the distribution known as Securonis Linux, now continues his work in the field of privacy, security, and system hardening with Cyrethium.
His goal is to provide a platform where users can work safely and anonymously on the internet.
Areas of Interest:
- Linux and BSD Server and network management
- Cyber Security (Generally Blue team network and system security)
- Artificial intelligence and AI technologies
- Frontend Web Development and Graphic Design
Programming Languages, Frameworks, and Tool Knowledge:
Advanced Level: Python, Shell, Ansible
Intermediate Level: HTML, CSS, Javascript
Basic Level: C, C#, Go, Java
Pentest and Security Tools: Nessus, Nmap, Burpsuite, Dirbuster, Metasploit, Hydra, John, Snort, Pfsense, Maltego, Beef
Technologies / Frameworks: AppArmor, SELinux, Docker, Kubernetes
Contact:
Email: root0emir@protomail.com
LinkedIn: www.linkedin.com/in/emir837
GitHub: root0emir
Vision and Mission:
- Develop Cyrethium as an independent, neutral, and secure platform
- Ensure users keep control in their hands
- Support security, privacy, and open source community
Don't Make This Mistakes!
If you use it incorrectly, Cyrethium cannot protect you!
Don't use Tor Browser when traffic is routed to Tor
Port conflicts occur, connection stability is disrupted, and it causes Tor over Tor. If you're going to use Tor Browser, disable Cyrethonion. But remember this: while Cyrethonion forces traffic in the system to route through Tor, Tor Browser only routes traffic within the browser.
Hardened/Amnesic Firefox is already secure enough and includes hardening against many attacks.
For the closest experience to Tor Browser, Amnesic Firefox is recommended.
Don't change DNS when traffic is routed to Tor
You should not change DNS while traffic is routed to the Tor network, as this will lead to DNS leaks.
When Cyrethonion starts routing, it backs up your DNS and uses Tor DNS instead. When you stop routing, it restores your DNS.
Don't use another router
Don't use another Tor router together with Cyrethonion. This will cause Tor over Tor and also cause your internet to go down. Use only one router at a time.
Additionally, other routers may not be secure and may be vulnerable to leaks. Use another router if you're sure what you're doing.
Don't add repositories from other distributions
Adding repositories from other distributions will increase the risk of attack and may disrupt system stability.
Cyrethium only uses the Debian repository. Additionally, it uses I2P repositories.
If a supply chain occurs in repositories you add from other distributions, your system may be affected.
Cyrethium is not a Plug&Play Distro. Live mode is vulnerable to attacks
Cyrethium is designed to be installed on disk. It can be used amnesically from USB, but the security it provides is much less and it is defenseless against cyber attacks in live mode.
Why?
- AppArmor is not active in Live mode, this is a Debian policy.
- There is no sudo password, privilege escalation vulnerabilities can be triggered more easily.
- Many hardening settings are activated when the system is installed. Because Cyrethium's heavy hardening and CPU mitigation settings cause serious performance degradation in live mode.
If you're looking for a USB Live privacy-focused distribution, Cyrethium may not be for you.
Download & ISO Verification
You can download the latest Cyrethium ISO from the official website's Download section. Make sure to always get the ISO from the official source to avoid tampered files.
Note: The ISO file is hosted on SourceForge, a trusted source for our releases.
To ensure the integrity of your downloaded ISO, you should verify its SHA256 checksum. Compare the checksum of your downloaded ISO with the official SHA256 provided on the website.
Linux / macOS:
- Open a terminal.
- Navigate to the folder containing the downloaded ISO, e.g.,
cd ~/Downloads - Run the SHA256 checksum command:
sha256sum cyrethium-version.iso
Compare the output with the SHA256 checksum listed on the official website. It should match exactly.
Windows:
- Open PowerShell.
- Navigate to the folder with the ISO:
cd C:\Users\YourUsername\Downloads - Run the following command:
Get-FileHash cyrethium-version.iso -Algorithm SHA256
Compare the resulting hash with the SHA256 value provided on the Cyrethium download page.
If the hashes match, the ISO is authentic and safe to use.
If the hashes do not match, do not use the ISO and try downloading again from the official site.
USB Preparation
To create a bootable USB for Cyrethium, we highly recommend using Ventoy, as it has been thoroughly tested with Cyrethium releases and works smoothly on both BIOS and UEFI systems.
Requirements:
- A USB drive of at least 4GB.
- Note: All data on the USB will be erased during the process. Make sure to back up any important files.
1. Download Ventoy
Get the latest version of Ventoy from the official site: https://www.ventoy.net
2. Install Ventoy on the USB
- Insert your USB drive.
- Open Ventoy and select your USB device.
- Click Install.
- Warning: This will completely erase all data on the USB.
3. Copy the ISO File
After Ventoy installation is complete, simply copy the Cyrethium ISO file onto the USB drive like a normal file.
You don't need to burn or extract it; Ventoy can boot directly from the ISO.
4. Boot from USB
- Reboot your computer and select the USB as the boot device.
- Ventoy will display the ISO(s) you copied. Choose the Cyrethium ISO to boot and install/run.
Tip: Ventoy allows you to keep multiple ISOs on the same USB, making it flexible for testing other systems alongside Cyrethium.
Remember: Always check the SHA256 of the ISO before copying to the USB to ensure authenticity.
Booting Cyrethium from USB
After preparing your USB with Cyrethium (using Ventoy or other tools like Balena Etcher/Rufus), follow these steps to boot your system:
1. Enter BIOS/UEFI
Restart your computer and enter the BIOS/UEFI setup.
Usually accessed by pressing keys like DEL, F2, F10, or ESC during boot (check your motherboard manual).
2. Disable Secure Boot
Locate the Secure Boot option and disable it.
Why? Secure Boot can prevent booting custom OSes like Cyrethium. Disabling it allows the USB to boot correctly.
3. Set USB as First Boot Device
Navigate to the Boot Order / Boot Priority section.
Move your USB drive containing Cyrethium to the top of the boot order.
Save changes and exit the BIOS/UEFI.
4. Boot from USB
On systems using Ventoy:
- The Ventoy menu will appear, listing all ISO files on your USB.
- Select the Cyrethium ISO to boot.
On systems using Balena Etcher / Rufus:
- The system should automatically boot into Cyrethium without additional steps.
5. Enter Cyrethium Boot Screen
When the Cyrethium boot screen appears, press Enter to start.
Wait patiently while Cyrethium loads; this process may take some time depending on your hardware.
Tip: Once booted, you can run Cyrethium live or start the installation process.
Remember: Always ensure your ISO's SHA256 has been verified before booting, to guarantee authenticity and integrity.
Boot Issues & Troubleshooting
If you encounter problems while booting Cyrethium, here are common issues and solutions:
1. Black Screen / Nothing Happens
If you boot Cyrethium and the screen stays black or nothing appears:
Verify ISO Integrity
Make sure the downloaded ISO's SHA256 matches the official value. A corrupted ISO can prevent booting.
Disable Secure Boot
Secure Boot must be disabled in BIOS/UEFI. Unsigned OSes like Cyrethium will not boot if Secure Boot is active.
Be Patient
Cyrethium is a hardened Linux distribution. Depending on your hardware, booting may take longer than usual. Don't panic if it seems stuck; it's normal.
2. NVIDIA / Graphics Issues
Some systems with NVIDIA graphics or other cards may fail to boot:
Use nomodeset
At the boot menu, append the following to the kernel parameters:
nomodeset
This disables kernel mode-setting and often resolves black screen or graphical issues.
Additional Kernel Parameters (Optional)
acpi=offoracpi=noirq→ fixes some ACPI/IRQ issues.noapicornolapic→ resolves interrupt conflicts.
Check GPU Support
Ensure your GPU is supported by the kernel's open-source driver (Nouveau for NVIDIA)
3. General Notes
- Cyrethium may not work on very old and new hardware.
- If boot fails repeatedly, it's likely hardware compatibility rather than a problem with Cyrethium itself.
- Cyrethium offers a wide range of firmware and driver support, but Linux hardware compatibility is not perfect. Some devices may not boot or function properly.
Remember: Cyrethium is a hardened, security-focused distribution. Some boot delays or odd behaviors are intentional to maintain integrity and security.
Installation
Installing Cyrethium is simple and user-friendly. Follow these steps:
1. Launch Installer
Once you've booted into the Cyrethium live environment, double-click the "Install Cyrethium" shortcut on the desktop.
2. Follow Calamares Steps
Cyrethium uses the Calamares installer, which provides a guided installation process:
- Select Language – choose your preferred language.
- Select Timezone – pick your region and city.
- Keyboard Layout – select the keyboard layout matching your system.
- Partitioning – You can choose automatic partitioning (recommended for new users) or manual partitioning for custom layouts.
- Encrypt Disk (LUKS): Selecting this option will encrypt your entire disk, protecting your data with a strong password. Make sure to remember this password, as it will be required on every boot.
- User Account – create your username, password, and optionally enable automatic login.
- Summary – review your settings before installation.
3. Internet / Network Considerations
If you experience network issues during the installation, consider the following:
- Temporarily disable Tor routing – If you are using Tor, it can sometimes cause slow or blocked downloads during installation.
- Change DNS – Change your DNS servers to help resolve network issues or improve download reliability.
4. Start Installation
Click Install to begin.
Wait for the process to complete; this may take several minutes depending on your hardware.
5. Finish Installation
Once finished, reboot your system.
Remove the USB drive when prompted to boot into your new Cyrethium system.
Package Manager Error: Package manager could not make changes on installed system
Usually caused by Secure Boot being enabled.
Solution: Go to BIOS/UEFI and disable Secure Boot, then retry installation.
Package Manager Error 100
Ensure you did not remove any packages in the live system.
Solution: Reboot into live system and start the installation again.
SquashFS Error
May occur if you modified hardening settings or added extra files in the live environment.
Solution: Reboot into the live system and retry installation.
Remove USB Media
Once installation is complete, safely remove your USB drive.
Reboot Your System
Restart your computer to boot into your new Cyrethium installation.
Welcome to Cyrethium
You are now ready to explore your hardened, privacy-focused operating system.
Log in with the username and password you created during installation.
Tip: Always double-check your partitioning, encryption, and network settings before installation to avoid data loss or failed downloads.
Tip: If installation downloads fail repeatedly, try disabling Tor temporarily and/or changing your DNS.
Tip: First boot may take a little longer than usual due to initial setup and security configurations.
Basic Usage
Once you have booted into Cyrethium, here's a quick guide to get started:
1. Applications Menu
Look at the bottom-left corner of the desktop. Click the Applications icon to open the menu.
Inside, navigate to the Cyrethium category to find special privacy and security tools. You can explore and try these tools safely.
2. Tor Routing with Cyrethonion
On the bottom-right corner, click the Tor (onion) icon to open the Cyrethonion tray menu.
Click Start Tor Routing to route your internet traffic through the Tor network, making it anonymous.
Icon Status Indicators:
- Red with a warning sign – Tor is not active; your traffic is not anonymous.
- Green – Tor is active; your traffic is anonymous.
- Grey with a question mark – No internet connection is detected.
For troubleshooting or more detailed information, open the Cyrethonion menu and select Help / Troubleshooting.
3. Updating the System
To update your system:
Go to Applications → System → System Update and click it.
Alternatively, open a terminal and run:
sudo update
This will update your Cyrethium installation to the latest available packages and security updates.
Tip: Regularly updating your system ensures you have the latest security patches and improvements.
Explore the Cyrethium category to familiarize yourself with the built-in privacy and security tools.
Tor Routing
Cyrethonion is a shell-based tool within Cyrethium that forces all internet traffic through the Tor network. It does this by using iptables to redirect all incoming and outgoing traffic to Tor and blocking non-Tor exits, thereby increasing the privacy of your online activities.
Usage — Desktop Panel
Click on the Tor icon on the right side of the desktop panel.
Select the Start Tor Routing option.
Wait a few seconds; all your internet traffic will be routed through the Tor network.
Menu Options:
- Stop Tor Routing: To stop Tor routing
- Restart Tor Routing: To restart routing
- Change IP Address: Restart Tor service to get a new IP (newnym may not always succeed; service restart gives cleaner results)
- Show IP Address: Check your current IP address
- Status: Display Tor service and routing status information
If you experience problems, refer to the Cyrethonion documentation.
Developer Notes (Important)
Cyrethonion includes fail-closed configurations that prevent non-Tor traffic leaks — even if the connection suddenly drops, your IP won't leak; non-Tor exits are rejected.
When the internet connection comes and goes, Watchdog automatically restarts routing.
When Start Tor Routing is performed, Cyrethonion's systemd service is also activated; additionally, Cyrethonion will automatically start on boot.
Cyrethonion applies stream isolation: each site or application may see a different IP — this is normal and a result of isolation.
During Tor routing, the newnym signal may sometimes not change the IP; the most reliable method is to restart the Tor service.
Limitations and Warnings
No UDP Support: Tor does not provide UDP support; search, voice chat, and real-time UDP-based applications (e.g., VoIP, game audio) may not work — this is normal.
Ping (ICMP) Blocked: Cyrethonion strictly blocks ICMP traffic to reduce discoverability.
Unconscious Use Can Cause IP Leaks. Avoid the Following:
- Using tools incompatible with Tor routing (or that may leak IP) such as Paranoia, OpenMammoth Firewall
- Manually modifying iptables rules during routing
- Running too many network connections/applications in the background
Cyrethonion may feel slower or heavier compared to other simple routers — the reason is strict security rules (ICMP/UDP blocking, spoofing/scan protections, etc.).
Final Notes
Cyrethonion in its current state has a "Tor Guard" warning mechanism; for now, it only warns and does not automatically stop routing. This feature is still under development.
In the future, nftables support may be considered; for now, iptables is used for stability and simplicity.
Tor Bridges
Cyrethonion provides an interface that makes managing Tor bridges easy. Bridges enable connection in networks where Tor access is restricted or censored.
Adding Bridges — Steps
- Click the Add Bridges button from the menu
- Paste the bridges you copied from https://bridges.torproject.org/ exactly — don't add extra spaces or line breaks
- Do not check the "Do you need IPv6 addresses?" box — Cyrethonion currently only supports IPv4. (Also, IPv6 support in Tor is still not stable.)
- After adding bridges, restart the router
Supported Bridge Type
Currently, obfs4 proxy is supported (because it is both stable and popular). Other pluggable transports are not currently supported.
After Adding
Cyrethonion detects the bridges you added and automatically writes them to the /etc/tor/torrc file.
When you click the List Bridges button, you will view the bridges you added.
When you press the Clear Bridges button, the added bridges are deleted — don't forget to restart the router after this operation.
Troubleshooting
If your internet connection is cut off after adding a bridge, there may be a problem with the bridges — try getting different bridges and try again.
Make sure you copy the bridges exactly when pasting; don't leave extra spaces at the beginning/end.
If Tor access is completely blocked in your country, some bridges may also be blocked; bridges can quickly become corrupted and may not work.
Warnings & Tips
Bridges may lose their validity over time — periodically get updated bridges.
Use official Tor Project sources for secure and working bridges.
Since Cyrethonion's bridge management does automatic configuration, use Cyrethonion settings before making manual torrc changes; otherwise, there may be conflicts.
Browsing the Internet
Cyrethium has two browsers for browsing the internet: Hardened Firefox and Amnesic Firefox.
Hardened Firefox: More user-friendly and compatible. Remembers your sessions and is recommended as a daily browser.
Amnesic Firefox: Has strict security settings. Less user-friendly but more secure.
Initial Setup and Addon Usage
On first launch, update addons if they are not current.
Installing additional addons can make you more detectable. Therefore, Ublock and NoScript are sufficient for security.
For more technical details, review the Browsers documentation.
Developer Notes
You cannot use Vanilla Firefox in Cyrethium. Browsers are profile-based and customized; tampering too much with Firefox can cause Cyrethium browsers to break.
Hardened and Amnesic Firefox browsers are fully equipped in terms of security.
Amnesic Firefox contains even stricter settings than Tor Browser in some aspects.
It is normal to experience problems on some sites; you may need to compromise on usability for security.
JavaScript attacks are very dangerous — don't loosen NoScript.
Why Firefox?
Tor Browser runs its own Tor instance and routes packets to the Tor network with its own configuration.
However, in Cyrethium, all traffic is already forced through Tor via iptables. If Tor Browser tries to start its own Tor service, there will be a conflict and it cannot start.
If traffic is already routed to Tor, Tor Browser is not needed and works incompatibly with the system.
Therefore, in privacy-focused systems like Cyrethium, using Tor Browser may be unnecessary and incompatible.
Security Comparison
Amnesic and Hardened Firefox take many security settings from Tor Browser.
In terms of security, there is no big difference between them.
Bluetooth Settings & Hardening
Bluetooth usage in Cyrethium is configured to be both user-friendly and secure. This section explains how users can use Bluetooth and how to adjust the system's Bluetooth hardening settings.
1. Using Bluetooth
To use Bluetooth in Cyrethium:
Install Required Packages
Ensure you have the main Bluetooth stack and utilities installed:
sudo apt install bluez blueman
bluez→ the main Bluetooth protocol stack for Linux.blueman→ a graphical manager for pairing and managing devices.
Access Bluetooth Settings
Open Applications → Settings → Bluetooth or launch Blueman Manager from the Applications menu.
From here, you can:
- Turn Bluetooth on/off
- Pair with devices
- Remove paired devices
- Set device discoverability
2. Bluetooth Hardening
Cyrethium includes security-focused defaults for Bluetooth. The main configuration file is:
/etc/bluetooth/30_security_misc.conf
A sample default configuration:
[General]
PairableTimeout = 30 # Bluetooth stays pairable for 30 seconds
DiscoverableTimeout = 30 # Bluetooth stays discoverable for 30 seconds
MaxControllers=1 # Only one controller exposed
TemporaryTimeout = 0 # Temporary devices are kept indefinitely
[Policy]
AutoEnable=false # Adapters do NOT automatically enable themselves
Privacy=network/on # Enforce use of private addresses (RPA) for security
What these settings do:
- PairableTimeout: Limits the time the device can accept pairing requests. Lowering this reduces exposure.
- DiscoverableTimeout: Limits visibility of the device. 30 seconds is a secure default.
- MaxControllers: Limits how many Bluetooth adapters are active/exposed. One is sufficient for most users.
- TemporaryTimeout: Determines how long temporary devices remain in the system. 0 = never delete automatically.
- AutoEnable: Prevents adapters from automatically enabling themselves, reducing unwanted exposure.
- Privacy: Forces the use of randomized private addresses, protecting against tracking and passive attacks.
3. Adjusting Bluetooth Hardening Settings
To adjust these settings:
Open the configuration file as root:
sudo nano /etc/bluetooth/30_security_misc.conf
Modify the values according to your security needs:
- More secure → Reduce PairableTimeout/DiscoverableTimeout, set MaxControllers=1, keep AutoEnable=false.
- More convenient → Increase timeouts, enable AutoEnable=true if you frequently use multiple devices.
Save the file and restart Bluetooth service:
sudo systemctl restart bluetooth
Tip: For maximum security, keep discoverability and pairability timers short and leave AutoEnable disabled.
Cyrethium's default Bluetooth configuration balances usability and hardening, making casual attacks and tracking significantly harder.
System Security Architecture - Introduction
Cyrethium implements a comprehensive hardening process to minimize the system's attack surface and enhance its security. Through this process, the system becomes more resilient against various attacks and exploit attempts.
Hardening is applied system-wide through sysctl settings, modprobe.d module management, GRUB boot parameters, limits configurations, and other additional security measures. All these settings are applied on top of the Vanilla Debian kernel, and AppArmor security profiles are actively used in the system.
Some settings are forked from the Kicksecure distribution and customized according to Cyrethium's specific needs. This way, both stability is maintained and the security level is elevated. Cyrethium hardening settings aim to provide maximum security without negatively affecting user experience; they have minimal impact on performance and functionality in daily use.
In this documentation, the details, benefits, and effects on the system of Cyrethium's applied hardening settings are discussed in detail. The aim is to help users understand why the system is so secure and what threat each measure provides protection against.
Sysctl Hardening
Cyrethium uses sysctl to apply system hardening settings, reducing the attack surface. It also aims to improve system performance with optimization settings. Cyrethium's applied settings can be found in /etc/sysctl.d/sysctl.conf. The technical explanations and benefits of the settings are as follows:
Disable module loading after boot (kernel.modules_disabled): Prevents kernel modules from being loaded after boot. This prevents malicious modules from being added to the system. If activated, some hardware drivers or module-based tools like iptables may not work. Disabled by default.
Restrict kernel pointer access (kernel.kptr_restrict, kernel.dmesg_restrict): Hides kernel pointers and logs from non-root users. This prevents critical kernel information from leaking to those trying to develop exploits.
Enhanced ptrace restrictions (kernel.yama.ptrace_scope): Limits processes from being monitored by other processes. Prevents non-root users from debugging processes or performing injection.
Disable unprivileged BPF (kernel.unprivileged_bpf_disabled, net.core.bpf_jit_harden): Prevents non-root users from running BPF programs and hardens the JIT compiler with security focus. This provides protection against modern kernel exploits and microarchitectural attacks.
Kernel panic on oops (kernel.panic_on_oops, kernel.panic): Automatically puts the system into panic mode when a kernel error (oops) occurs and restarts within the specified time. This prevents uncertain situations and system corruption from attacks.
Disable kexec (kernel.kexec_load_disabled): Prevents kernel replacement and fast reboot (kexec) attacks. This reduces the risk of post-boot rootkit loading.
Address Space Layout Randomization (ASLR) (kernel.randomize_va_space): Randomizes memory addresses. This makes it difficult for exploits to use predictable memory structures and increases system security.
Core dump restrictions (fs.suid_dumpable, kernel.core_pattern): Prevents setuid programs from taking core dumps and redirects core dump files to dev/null or similar. This prevents critical information (passwords, memory content) from leaking.
Memory overcommit (vm.overcommit_memory, vm.overcommit_ratio): Controls memory overcommit behavior. A value of 0 limits the kernel's overcommit based on physical and swap memory, reducing crash risk. An 80% overcommit ratio maintains system compatibility.
Protected links and fifos (fs.protected_hardlinks, fs.protected_symlinks, fs.protected_fifos, fs.protected_regular): Prevents users from damaging others' files and links. Provides access control especially to setuid or important files.
Inotify limits (fs.inotify.max_user_watches, fs.inotify.max_user_instances, fs.inotify.max_queued_events): Increases file monitoring limits. This prevents DoS attacks and excessive resource consumption.
Enable SYN cookies (net.ipv4.tcp_syncookies): Reduces TCP SYN flood attacks. Prevents connection tables from filling when the server receives intense SYN packets.
ICMP security (net.ipv4.icmp_echo_ignore_broadcasts, net.ipv4.icmp_ignore_bogus_error_responses, net.ipv4.icmp_echo_ignore_all): Ignores broadcast pings and erroneous ICMP responses, reducing network visibility. Allows normal pings without blocking access tests.
Log suspicious packets (net.ipv4.conf.*.log_martians): Logs packets from invalid or suspicious IP addresses. This is useful for monitoring possible attacks on the network.
TCP SYN flood protection (net.ipv4.tcp_*):
- tcp_max_syn_backlog: Backup table size for storing pending SYN connections. High value tolerates SYN flood attacks.
- tcp_syn_retries / tcp_synack_retries: Number of retries during connection establishment. Low value responds quickly to attacks.
- tcp_abort_on_overflow: Rejects new connections when SYN backlog is full, provides protection against attacks.
TCP connection tuning:
- tcp_fin_timeout: Connection closing time after FIN packets. Low value reduces resource consumption.
- tcp_keepalive_*: Keepalive packet management for cleaning long-idle connections and protecting system resources.
TCP security features:
- tcp_rfc1337: Prevents TCP TIME-WAIT attacks.
- tcp_timestamps: Disables TCP timestamps, prevents some information leaks.
- tcp_sack / tcp_fack: Provides safer and faster retransmission in packet losses.
TCP window scaling & buffers:
- tcp_window_scaling: Provides efficient data flow in high-bandwidth connections.
- rmem / wmem and tcp_rmem / tcp_wmem: Read/write buffer sizes for TCP and UDP, optimizes performance and data transmission capacity.
TCP congestion control:
- default_qdisc = fq / tcp_congestion_control = bbr: BBR algorithm provides low latency and high bandwidth, improves network performance.
Connection tracking optimization (nf_conntrack_*):
Maximum connection count and timeouts ensure the system remains stable under high traffic.
UDP performance:
- udp_rmem_min / udp_wmem_min: Minimum buffer sizes for UDP packets.
- netdev_max_backlog: Network interface queue length, reduces packet loss and provides stability under heavy traffic.
Router Advertisements (accept_ra*): Disables accepting IPv6 router advertisements. This way, the system is not automatically routed by the network or protected against fake router attacks (RA spoofing).
Autoconfiguration (autoconf): Turns off IPv6 automatic configuration. The system works with manual or static configuration without receiving automatic IP assignments, increasing security.
Duplicate Address Detection (dad_transmits): Disables the mechanism that checks IPv6 address conflicts. This provides additional risk management against potential attacks and in some cases reduces detection traffic on the network.
ICMP Rate Limiting (icmp_ratelimit / icmp_ratemask): Limits the transmission rate of ICMP messages. This provides protection against ping flood and similar DoS (Denial of Service) attacks.
ARP Security (arp_ignore, arp_announce, arp_filter): Adds security layer for ARP requests and responses.
- arp_ignore = 1: System only responds to ARP for the correct interface.
- arp_announce = 2: System announces its own IP only through the appropriate interface.
- arp_filter = 1: Ensures ARP queries are routed to the correct network interface.
These settings make ARP spoofing attacks more difficult.
Neighbor Table Limits (gc_thresh*): Determines IPv4 and IPv6 neighbor table limits.
- gc_thresh1: minimum threshold
- gc_thresh2: medium level
- gc_thresh3: maximum table size
This controls the network device's memory usage and reduces crash risk during DoS attacks.
Virtual Memory Tuning:
- vm.dirty_ratio = 15: Starts disk writing when unwritten data accumulated in memory exceeds 15% of total memory.
- vm.dirty_background_ratio = 5: Background writing threshold is set to 5%.
- vm.dirty_expire_centisecs = 3000: Unwritten data in memory is marked for disk writing after 30 seconds.
- vm.dirty_writeback_centisecs = 500: Disk writing operation is performed every 5 seconds.
- vm.swappiness = 10: Minimizes swap usage; swap is not used until RAM is full.
- vm.vfs_cache_pressure = 50: Provides standard balance for file system cache; no more aggressive cleaning than default.
Kernel Scheduler Optimization:
- kernel.sched_migration_cost_ns = 5000000: Inter-processor task migration cost is set to 5ms; this reduces unnecessary processor migrations.
- kernel.sched_autogroup_enabled = 0: Automatic group scheduling is disabled; process group priority is managed manually.
I/O Scheduler Optimization:
- vm.page-cluster = 3: Sets block grouping number in disk read/write operations; smaller group provides lower latency and better response time.
Note: These settings are disabled by default. Can be enabled optionally.
- kernel.printk = 4 4 1 7: Sets kernel log levels. This way critical and warning messages are written to system logs in detail.
- kernel.printk_ratelimit = 5: Limits maximum number of log messages per second; prevents excessive message flooding.
- kernel.printk_ratelimit_burst = 10: Provides short-term tolerance in sudden log increases; allows maximum 10 messages in sudden bursts.
Disable magic SysRq key:
- kernel.sysrq = 0: SysRq key combinations are disabled. This prevents kernel manipulation with emergency keys.
Restrict access to kernel logs:
- kernel.dmesg_restrict = 1: Only root user can see kernel logs. Normal users cannot read kernel information, thus preventing information leakage.
Harden shared memory:
- kernel.shm_rmid_forced = 1: Users can delete unclosed shared memory segments. This prevents unnecessary occupation of resources and possible attacks.
Process limits:
- kernel.pid_max = 4194304: Maximum process ID limit that can be created by the system is increased.
- kernel.threads-max = 4194304: Maximum number of threads that can be opened system-wide is determined. This optimizes resource management under heavy load and provides protection against DoS attacks.
GRUB Hardening
Cyrethium applies various CPU mitigation and hardening settings to reduce attack surface. These settings are forked from the Kicksecure distribution and can be found under /etc/default/grub.d/.
1. mitigations=auto: Kernel enables appropriate automatic security patches for the current CPU and microarchitecture. Provides basic protection against attacks; performance loss is minimal.
2. nosmt=force: Simultaneous Multithreading (SMT/HyperThreading) is completely disabled. Performance decreases in multi-threaded tasks, but prevents some CPU side-channel attacks.
3. spectre_v2=on: Provides protection against Branch Target Injection (Spectre Variant 2) attacks.
4. spectre_bhi=on: Provides protection against Intel Branch History Injection attacks. Applied on both AMD and Intel CPUs.
5. spec_store_bypass_disable=on: Blocks Speculative Store Bypass (Spectre Variant 4) attacks.
6. ssbd=force-on: Speculative Store Bypass Disable (SSBD) is forcibly enabled. Effective in kernel and user space.
7. l1tf=full,force: Provides full protection for L1 Terminal Fault vulnerability. Works with L1D cache flush and SMT disable operations.
8. kvm-intel.vmentry_l1d_flush=always: Ensures L1D cache is cleaned at entries in KVM virtual machines.
9. mds=full,nosmt: Prevents Microarchitectural Data Sampling attacks. Includes CPU cache cleaning and SMT disable.
10. tsx=off: TSX is disabled to prevent TSX Asynchronous Abort (TAA) vulnerability.
11. tsx_async_abort=full,nosmt: TSX-related memory leaks are completely blocked, SMT is turned off.
12. kvm.nx_huge_pages=force: Prevents large pages from being used as executable against iTLB Multihit vulnerability.
13. l1d_flush=on: Cache flush is performed via prctl() to prevent L1D cache leaks.
14. mmio_stale_data=full,nosmt: Prevents Processor MMIO Stale Data vulnerability; CPU buffer is cleaned and SMT is disabled.
15. retbleed=auto,nosmt: CPU-dependent mitigations are enabled against Retbleed attack and SMT is turned off.
16. kvm.mitigate_smt_rsb=1: Prevents Cross-Thread Return Stack Buffer attacks (AMD Zen 1-2).
17. spec_rstack_overflow=safe-ret (optional, commented): Provides controlled RET instructions for Speculative Return Stack Overflow vulnerability. Provides stronger security but may affect performance.
18. gather_data_sampling=force: Blocks Gather Data Sampling vulnerability. If there is no microcode, AVX instruction set is completely disabled.
19. reg_file_data_sampling=on: Prevents Register File Data Sampling vulnerability. Applied especially on Intel Atom and some hybrid CPUs.
1. Kernel Space (Memory and Kernel Protection):
- slab_nomerge: Prevents merging of similar-sized slabs, reduces heap overflow risk.
- slab_debug=FZ (commented): Slab debug mode, catches memory leaks but significantly reduces performance.
- init_on_alloc=1: Zeros newly allocated memory pages, prevents use-after-free attacks.
- init_on_free=1: Zeros freed memory pages, prevents use-after-free attacks.
- page_alloc.shuffle=1: Shuffles kernel page allocator, makes ROP and information leak attacks difficult.
- pti=on: Kernel Page Table Isolation (Meltdown mitigation).
- randomize_kstack_offset=on: Randomizes syscall stack offset, makes memory leaks difficult.
- vsyscall=none: Disables fixed-address vsyscalls, reduces ROP attack surface.
- kfence.sample_interval=100: Scans heap out-of-bounds and use-after-free errors with KFENCE at 100ms intervals.
- vdso32=0: 32-bit vDSO mapping is disabled, old glibc compatibility.
- efi_pstore.pstore_disable=1: EFI persistent storage disabled, kernel crash logs are not written to disk.
2. Direct Memory Access (DMA / IOMMU):
- amd_iommu=on: IOMMU active on AMD systems, prevents DMA attacks.
- intel_iommu=on: IOMMU active on Intel systems, prevents DMA attacks.
- iommu=force: IOMMU usage is mandatory, DMA accesses under strict control.
- iommu.passthrough=0: DMA passthrough disabled, devices cannot access memory directly.
- iommu.strict=1: DMA accesses are bound to strict rules, compatibility with older devices is ensured.
- efi=disable_early_pci_dma: Cleans old PCI DMAs during boot, reduces DMA attack risk.
3. Entropy / RNG:
- random.trust_bootloader=off: Don't trust bootloader's RNG seed, use additional entropy.
- random.trust_cpu=off: Don't trust CPU's RDRAND/RNG seed, use additional entropy.
- extra_latent_entropy: Collects extra entropy from memory during boot, strengthens RNG.
- GRUB_DISABLE_RECOVERY="true": Disables GRUB's recovery menu. User cannot accidentally enter recovery mode.
- rd.emergency=halt: Prevents Dracut emergency shell from opening, system halts in critical error situations.
- rd.shell=0: Completely disables Dracut initramfs shell.
System Limits
Cyrethium applies limits settings for stability and security. Settings can be found under /etc/security/limits.d/hardened.conf. The explanations are as follows:
* hard core 0: Disables core dumps. When a program crashes, data in memory (passwords, API keys, etc.) is not exposed. This reduces data leak risk to attackers.
* hard nproc 2048 / * soft nproc 1024: Limits the number of processes a user can open. A user or malicious software cannot open unlimited processes. This prevents DoS attacks like fork bombs and prevents system crashes.
* hard nofile 65535 / * soft nofile 16384: Limits the number of files that can be opened. A user or service cannot consume all system file descriptors. This provides protection against DoS attacks and stability.
* hard stack 8192: Limits each user's stack size. Stack overflow attacks or faulty software do not affect the entire system, reducing crash possibility.
* hard memlock 65536: Limits the amount of locked memory. Users or services cannot completely reserve system memory, reducing Out-of-Memory (OOM) situations.
Module Blacklisting (Modprobe.d)
Cyrethium aims to reduce the attack surface by blocking some risky modules. Settings are found under /etc/modprobe.d/. Explanations and benefits are below:
FireWire Modules: All related modules are disabled to prevent DMA-based memory attacks that can be performed over FireWire.
GPS Modules: Hardware-based GPS receivers and GNSS modules are disabled to prevent location information leakage.
Thunderbolt Modules: Thunderbolt and related network modules are closed to prevent high-speed DMA attacks through physical access.
Old File Systems: File system drivers not used by the system or rarely used are disabled to reduce kernel attack surface.
Network File Systems: NFS, CIFS, SMB and similar network file systems are closed to reduce unauthorized remote file access risks.
Legacy Network Protocols: Network protocols that are not in modern use, have weak security, or are unnecessary are disabled.
Framebuffer Drivers: Unused graphics card and framebuffer drivers are disabled to prevent possible hardware-based attacks and unnecessary kernel loads.
USBGuard
Cyrethium offers a tool called USBGuard Manager to facilitate USBGuard management.
What is USBGuard and what does it do?
USBGuard is a security tool that controls the connection of USB devices to the system. The user can define which USB devices are authorized and prevent unauthorized devices from connecting. This prevents malicious USB hardware from loading malware into the system or accessing sensitive data. This approach provides extra protection against physical attacks and significantly increases data security.
RkHunter
Cyrethium comes pre-configured with rkhunter and includes a special tool to facilitate its use.
Rkhunter and Chkrootkit scans can be performed from the SystemKnight tool.
What is RK Hunter and what does it do?
RKHunter (Rootkit Hunter) is a security tool designed to detect rootkits, backdoors, trojans, and other malicious software on Linux and Unix-based systems. It checks the integrity of critical files in the system, scans for known rootkit signatures, and audits suspicious file permissions. It also reports hidden files and directories, unusual authorizations, and potential malicious changes. RKHunter regularly scans the system's security status and sends alerts to administrators, enabling early detection of possible attacks. Its main purpose is to verify the cleanliness and integrity of the system and prevent malicious software from having permanent effects on the system.
ClamAV
Cyrethium comes pre-configured with ClamAV and includes a special tool to facilitate its use.
ClamAV scans can be performed with the SystemKnight tool.
What is ClamAV and what does it do?
ClamAV is an open-source antivirus software used on Linux and Unix-based systems. It is designed to detect and clean malicious software, viruses, trojans, worms, and other harmful files on the system. ClamAV offers features such as file scanning, email scanning, and real-time protection; it also stays constantly updated against new threats through updated signature databases. Users can use ClamAV to detect malicious software on network and file servers at an early stage, prevent infections, and increase system security. Its main purpose is to protect system integrity and prevent malicious software from damaging the system.
Firejail
Cyrethium offers a tool called Cyrethium Jails to facilitate Firejail management.
Firejail is a powerful security tool used to run applications in isolation on Linux systems and plays a critical role especially in protecting user data and system resources. Firejail runs applications in isolated environments called "sandboxes"; this environment prevents the application from directly accessing the system's core area, critical files and directories, or other applications. Thus, malicious code execution, buffer overflow, remote code execution (RCE), zero-day exploits, and privilege escalation attacks that can occur through a browser or media player cannot directly damage system resources.
Firejail's security mechanism is multiple. First, it isolates process, network, user, and mount areas using Linux namespaces. This way, the application runs in its own virtual environment and cannot touch the rest of the system. Through Seccomp filters, the application is allowed to use only safe syscalls; potentially harmful or exploitation-intended calls are blocked. Additionally, the application's capabilities are restricted with capabilities and resource limits; for example, an application is prevented from starting processes with root privileges or consuming system resources excessively.
Cyrethium provides full support for Firejail and facilitates its use with the Cyrethium Jails tool.
Other Security Settings
Cyrethium increases system security with other small but effective settings. Other settings made and their effects are as follows:
Cyrethium's deletion of the kernel map (kernel symbol map or kallsyms) at startup is a measure taken to increase system security. Normally, the Linux kernel presents the addresses of all kernel symbols (function names, variables, etc.) to user space through /proc/kallsyms or similar paths. This information can serve as a critical guide for attackers; for example, an attacker can use these addresses to target specific functions in the kernel or develop kernel exploits.
By deleting this map in Cyrethium, access to kernel symbols from user space is prevented. This makes it difficult for the attacker to learn which kernel functions are located at which addresses, especially during local attacks or exploitation attempts. As a result, the chance of success of kernel-level exploits decreases and the system's resistance to attacks increases.
dracut.conf.d: reproducible=yes
Initramfs is produced identically at the byte level at each boot. This is important for verifying image integrity and detecting malicious changes. Unexpected changes in the system are more easily noticed, indirectly increasing security.
Bash scripts added to the /etc/profile.d/ directory in Cyrethium are executed when the user session starts and configure the environment system-wide. The umask 027 setting used here determines the default permissions of newly created files and directories; for files, permission becomes 640, meaning only the file owner can read and write, group members can only read, other users cannot access. For directories, permission becomes 750, meaning the owner has full authority, group members can read and execute, other users cannot access.
This increases the security of files and directories in the system, prevents unauthorized users from accessing critical files, and provides a default security level at startup, especially in multi-user systems.
The "Permission Hardening" service in Cyrethium increases security by strictly controlling the permissions and ownership of critical files and directories in the system at each boot. For this purpose, specific permissions are assigned to basic system files such as /etc/passwd, /etc/shadow, /etc/group, /etc/gshadow, and /etc/sudoers; for example, the /etc/shadow file can only be read and written by root (600), so user passwords cannot be accessed by unauthorized persons.
Similarly, critical directories are also protected; the /root directory gives full access only to root, while directories like /var/log and /boot are set with broader but controlled access (750 or 755), so system logs and boot files are not changed or deleted by unauthorized users. This structure protects system integrity, minimizes unauthorized access and possible attack surface, and provides a balanced environment between security and accessibility in daily use.
"Bluetooth Hardening" settings in Cyrethium ensure that Bluetooth devices are protected against unauthorized access and data leaks. The system limits pairing and discoverability times; for example, PairableTimeout and DiscoverableTimeout values are set to 30 seconds, so the device does not remain open to pairing or discovery for long periods.
MaxControllers=1 assigns only one Bluetooth control device to the system and strictly restricts device management. The retention time of temporary devices is not kept unlimited with TemporaryTimeout=0, so unused or temporary devices are automatically cleaned. AutoEnable=false does not automatically enable Bluetooth adapters; they are opened only with user control. Additionally, thanks to the Privacy=network/on policy, the device accepts advertisement packets only from other devices using private addresses, which prevents the device's location and identity information from being tracked by unauthorized persons.
These settings strengthen the system against attacks that may come through Bluetooth and increase user privacy.
Git security hardening settings in Cyrethium are configured to reduce possible risks in source code management and ensure data integrity. In the [core] section, the symlinks = false setting disables symbolic links in Git repositories; this protects the system against malicious file or link attacks. In the [transfer], [fetch] and [receive] sections, fsckobjects = true makes integrity checks mandatory in all data transfers and received objects; thus corrupted or modified objects are detected and rejected.
Some advanced security measures, such as gpgsign = true or verifySignatures = true, are not enabled by default because they require users to have local signing keys and knowingly manage commit processes; otherwise Git operations may fail in normal use. Similarly, SSH-based URL redirections are also left closed by default because they may disrupt user experience. These settings increase Git's security, guarantee data integrity, and provide additional protection against malicious interference.
APT security hardening settings in Cyrethium are configured to increase system security during package management and prevent possible malicious package attacks. With the APT::Update::Error-Mode any; setting, the process does not stop in case of any error during package updates, so the package manager works more resilient and tolerant to errors. With APT::Sandbox::Seccomp "true"; APT operations are run in a sandbox environment and system calls (syscall) are filtered; this prevents malicious code from damaging the kernel level during package installation and update.
The sudoers file in Cyrethium is configured to prevent unauthorized users from having root privileges and increase system security.
When using Tor, TCP packets traverse multiple nodes, and each node may have a slightly different Maximum Transmission Unit (MTU). If the MTU is not properly aligned, packets can become fragmented, leading to increased latency, slower connections, or even dropped packets. Setting net.ipv4.tcp_mtu_probing = 1 enables the Linux kernel to automatically probe and detect the appropriate MTU whenever packet loss occurs. This helps ensure that TCP packets sent through the Tor network are transmitted efficiently and without fragmentation, improving connection stability and overall performance(etc/sysctl.d/pmtud.conf).
Some hardening settings in Cyrethium are taken from Kicksecure and customized for a more seamless experience in daily use.
AppArmor
Cyrethium uses Debian's AppArmor by default. AppArmor is not active in live systems. This is not related to Cyrethium. AppArmor becomes active when the system is installed. Also, some of Cyrethium's custom tools have their own AppArmor profiles.
What is AppArmor and what does it do?
AppArmor is a security tool that works as a Mandatory Access Control (MAC) system on Linux and restricts applications. It creates profiles that determine which files, network resources, and system components each application can access and prevents applications from going beyond these limits. Thus, even if an application has a vulnerability, it is prevented from damaging the entire system and the attack surface is reduced.
AppArmor increases security by isolating applications from each other and enables detection of misbehaving programs through logs. It offers a structure that is not as complex as SELinux; administrators can easily create profiles and control which applications can access which resources. In general, AppArmor serves as a security armor that protects the Linux system and puts applications in "small cages."
Cyrethium has pre-configured AppArmor profiles:
- Cyrethonion
- Cyrethonion-Mate
- Paranoia
- Change Mac
- Change Hostname
# Check AppArmor status
sudo aa-status
Anti-Forensic Settings Manager
Anti-Forensic Settings Manager is a tool that manages automatic cleanup services during system shutdown. It securely cleans logs, swap, and temporary files for privacy and anti-forensic purposes.
Features
Cleanup Services
- cyrethium-cleanup-logs: Securely deletes system logs
- cyrethium-cleanup-swap: Overwrites swap memory with random data
- cyrethium-cleanup-temp: Cleans temporary files and caches
Management Features
- Enable/disable all services
- Individual service management
- Service status display
- Detailed service information
Usage
anti-forensic
Note: Run as normal user, sudo will be used when needed.
Main Menu
1. Enable All Services
Enables all cleanup services.
Enabled Services: cyrethium-cleanup-logs, cyrethium-cleanup-swap, cyrethium-cleanup-temp
2. Disable All Services
Disables all cleanup services.
3. Manage Individual Services
Manage services individually. View status, disable active service, or enable disabled service.
4. Show Service Information
Shows detailed information about each service.
Service Details
cyrethium-cleanup-logs
Description: Securely deletes system logs
Cleaned Files: /var/log/*, /var/log/auth.log, /var/log/syslog, ~/.bash_history, ~/.local/share/recently-used.xbel
Features: Secure deletion (shred), cleans user bash histories, deletes recently used file lists
cyrethium-cleanup-swap
Description: Overwrites swap memory with random data
Process: Detects swap areas → Disables swap → Overwrites with random data → Re-enables swap
Features: Prevents recovery of sensitive data from swap, minimal shutdown time impact, secure data destruction
cyrethium-cleanup-temp
Description: Cleans temporary files and caches
Cleaned Areas: /tmp/*, /var/tmp/*, ~/.cache/*, ~/.thumbnails/*, Browser data (Firefox, Chrome, Brave)
Features: Removes user activity traces, cleans browser caches, deletes thumbnail caches
Usage Examples
# Example 1: Enable All Services
1. Start anti-forensic
2. Select "1" (Enable all services)
3. All services enabled
# Example 2: Log Cleanup Only
1. Start anti-forensic
2. Select "3" (Manage individual services)
3. Select "1" (cyrethium-cleanup-logs)
4. Confirm with "y"
# Example 3: Check Service Status
Service statuses shown in main menu:
- Active & Enabled (Green)
- Enabled (Inactive) (Yellow)
- Disabled (Red)
Performance Impact
Shutdown Time: Normal ~5s, With Services ~10-20s
Time Distribution: Log cleanup 2-5s, Swap cleanup 3-10s, Temp cleanup 2-5s
Disk Usage: Logs 100MB-1GB, Temp 500MB-5GB, Swap data recovery prevented
Troubleshooting
Service Cannot Be Enabled: Run sudo systemctl daemon-reload and try again, or start services manually
Shutdown Takes Too Long: Disable swap cleanup, it's the longest running process
FAQ
Q: When do services run? A: Automatically during system shutdown.
Q: What if I cancel shutdown? A: Services won't run, data won't be cleaned.
Q: Should I enable all? A: Yes if privacy is priority, be selective if performance matters.
Q: Can data be recovered? A: No, shred and random data writing make recovery impossible.
Q: Works on SSD? A: Yes, but not 100% guaranteed due to wear leveling.
Q: Fast shutdown mode? A: No, all processes must complete for security.
Recommendations: Privacy critical = All services, Performance important = Only logs and temp, No swap usage = Disable swap cleanup
Security Notes
Important Warnings:
- Data Loss: Cleaned data cannot be recovered
- Log Analysis: System logs deleted, troubleshooting may be harder
- Forensic Analysis: Anti-forensic purpose, legal responsibility is yours
Change-MAC
Change-MAC is a tool designed to change and restore MAC addresses of network interfaces. It provides secure and easy MAC address management using macchanger.
Usage
sudo change-mac
Note: Root privileges required.
Main Menu
1. Change MAC Address
Changes MAC address.
Steps: Select network interface → Select change type (Random MAC, Random Keep Vendor, Custom MAC) → Change is applied
2. Revert MAC Address
Restores MAC address to original. Requires backup file and interface must have been changed before.
3. Show Current Status
Shows status of all network interfaces: Interface name, Current MAC, Original MAC, Status (UP/DOWN)
4. Exit
Exits the program.
MAC Changing Types
1. Random MAC Address: Creates a completely random MAC address
2. Random MAC (Keep Vendor): Creates random MAC while keeping vendor part
3. Custom MAC Address: User-defined MAC address
MAC Address Format
OUI (First 3 Bytes): Identifies manufacturer, assigned by IEEE. Example: 00:11:22 = Cisco
Device ID (Last 3 Bytes): Device specific, assigned by manufacturer
Backup File: /var/lib/change-mac/original_macs.conf
Usage Examples
# Example 1: WiFi Card MAC Change
1. sudo change-mac
2. Select "1" (Change MAC Address)
3. Select wlan0
4. Select "1" (Random MAC)
5. MAC changed!
# Example 2: Ethernet MAC Restore
1. sudo change-mac
2. Select "2" (Revert MAC Address)
3. Select eth0
4. Original MAC restored!
# Example 3: Custom MAC Address
1. sudo change-mac
2. Select "1"
3. Select interface
4. Select "3" (Custom MAC)
5. Enter MAC: 00:AA:BB:CC:DD:EE
6. Custom MAC applied!
# Example 4: Status Check
sudo change-mac > 3 (Show Current Status)
Interface: eth0
Current MAC: A8:7B:3C:9D:E2:F1
Original MAC: 00:11:22:33:44:55
Status: UP
Security and Privacy
Why Change MAC?
1. Privacy: MAC address can identify you, prevents network tracking, provides location privacy
2. Security: MAC filtering bypass, protection from network attacks, testing and penetration testing
3. Anonymous Connection: Public WiFi usage, connecting to different networks, identity concealment
Best Practices
# 1. Regular Changes - On every network change
sudo change-mac > Random MAC
# 2. Vendor Protection - For compatibility
sudo change-mac > Random (Keep Vendor)
# 3. Backup - Note original MAC
ip link show eth0
# or
macchanger -s eth0
Troubleshooting
Macchanger Not Installed
sudo apt install macchanger
Interface Cannot Be Brought Down
sudo systemctl stop NetworkManager
sudo change-mac
sudo systemctl start NetworkManager
MAC Not Changing
sudo ip link set eth0 down
sudo change-mac
sudo ip link set eth0 up
No Backup File
sudo mkdir -p /var/lib/change-mac
echo "eth0:$(ip link show eth0 | grep -o -E '([[:xdigit:]]{1,2}:){5}[[:xdigit:]]{1,2}' | head -1)" | sudo tee -a /var/lib/change-mac/original_macs.conf
Network Connection Lost
sudo systemctl restart NetworkManager
sudo dhclient -r
sudo dhclient
FAQ
Q: Is MAC change permanent? A: No, original MAC returns after system reboot.
Q: Works on all network cards? A: Works on most, but some hardware doesn't support MAC changes.
Q: Why is vendor part important? A: Some networks only allow devices from specific manufacturers.
Q: Random MAC different each time? A: Yes, new random MAC generated each run.
Q: How to learn original MAC? A: From backup file or hardware label.
Q: Can change multiple interfaces? A: Yes, each interface separately.
Security Notes
Important Warnings:
- Network Rules: Some networks can detect MAC changes
- Legal Responsibility: Misuse is illegal
- Connection Loss: Connection drops during change
Tips: Note original MAC, change when no network traffic
ChangeHostname
ChangeHostname is an interactive tool designed to change and manage system hostname. It offers manual and automatic hostname generation options.
Usage
sudo changehostname
Note: Root privileges required.
Main Menu
1. Change Hostname Manually
Enter hostname manually.
Rules: Must start and end with alphanumeric character, can have hyphens (-) in middle, maximum 63 characters, no spaces or special characters
2. Generate Random Hostname
Generates random hostname.
Options:
- Animal-based (ex: dark-wolf-042)
- Tech-themed (ex: cyber-node-15)
- Game-themed (ex: aatrox-diablo-37)
- Anime-themed (ex: zaraki-kenpachi-042)
- Pure Random (ex: host-a7b9c3d2)
- Codename Style (ex: ghost-black-07)
- Generate Multiple Options
3. Show Current Hostname Info
Shows current hostname information: Hostname, FQDN (Fully Qualified Domain Name), Domain, IP Address
4. Create Hostname Backup
Backs up current hostname. Backup Location: /etc/hostname.backup
5. Restore Hostname from Backup
Restores hostname from backup.
6. Hostname History
Shows hostname change history. Log File: /var/log/hostname.log
Troubleshooting
Hostname Not Changing
# Reload systemd
sudo systemctl daemon-reload
# Check hostname manually
hostname
cat /etc/hostname
/etc/hosts Error
# Manually edit /etc/hosts
sudo nano /etc/hosts
# Find old hostname and change
127.0.1.1 old-hostname
# Change to:
127.0.1.1 new-hostname
Invalid Hostname
Valid formats: my-server, web01, database-prod
Invalid formats: -server (starts with hyphen), my_server (underscore), server- (ends with hyphen), my server (space)
No Backup File
# Create manual backup
sudo cp /etc/hostname /etc/hostname.backup
FAQ
Q: Is hostname change permanent? A: Yes, persists after system reboot.
Q: Reboot required? A: No, but some applications should be restarted. A general reboot is healthier.
Q: What is FQDN? A: Fully Qualified Domain Name (e.g., server.example.com)
Q: Maximum hostname length? A: 63 characters.
Q: How to view hostname history? A: Use menu option "6" or check /var/log/hostname.log
Q: Can use multiple hostnames? A: No, only one hostname can be active at a time.
Security and Privacy
Why Change Hostname?
1. Privacy: Default hostnames can cause information leakage, random hostnames make tracking harder
2. Security: Predictable hostnames can be targets, random names mislead attackers
Security Notes
Important: Hostname visible on network, should not contain sensitive information, regular changes increase privacy
Chaosec - Traffic Obfuscation Tool
Chaosec is a security tool designed to protect against MITM (Man-in-the-Middle) attacks and traffic analysis. It creates fake traffic to hide your real traffic and makes traffic analysis difficult.
IMPORTANT ETHICAL WARNING
This Tool is a SECURITY TOOL
Chaosec is designed to protect against MITM attacks and traffic analysis.
LONG-TERM USAGE WARNING
- Long-term use may be detected as DoS/DDoS attack activity
- Your IP address may be blocked or blacklisted
- Your ISP may suspend your account
- Legal investigation may be initiated
- You may encounter CAPTCHA or rate limiting from websites
AUTHORIZED USES
- Legitimate privacy protection
- Authorized security research
- Network testing on your own infrastructure
- Learning in controlled training environments
PROHIBITED USES
- DoS/DDoS attacks
- Overwhelming third-party services
- Bypassing legal restrictions
- Malicious or illegal activities
AUTOMATIC STOP
This tool runs for a maximum of 5 minutes and stops automatically. This duration is limited for security reasons.
By using this tool, you accept all responsibility. Authors are not responsible for misuse or resulting damages.
Features
Traffic Obfuscation Techniques
- DNS Noise: Creates random DNS queries
- HTTP Traffic: Legitimate-looking HTTP requests
- TCP Connections: Random TCP connections
- UDP Packets: Random UDP packets
Traffic Patterns
- Browsing: Normal web browsing pattern
- Streaming: Video/audio streaming pattern
- Gaming: Online gaming traffic pattern
- Chaotic: Maximum chaos mode - all traffic types
- Stealth: Low-profile stealth mode
- Research: Academic/research browsing pattern
- Social: Social media usage pattern
Configuration
- Customizable intensity (0.1-10.0x)
- Tor network optimization
- Custom domain addition
- Statistics tracking
- Automatic security limits
How It Works
Traffic Obfuscation Mechanism: Chaosec creates fake traffic to hide your real traffic:
- Real Traffic + Fake Traffic = Analysis Difficulty
- Attackers cannot distinguish which traffic is real
- Traffic analysis becomes difficult
- MITM attacks become ineffective
Example Scenario
Attacker monitoring your traffic:
real: youtube.com (Your real activity)
Fake: wikipedia.org (Chaosec)
Fake: github.com (Chaosec)
Fake: mozilla.org (Chaosec)
real: email.com (Your real activity)
Fake: python.org (Chaosec)
Fake: debian.org (Chaosec)
Attacker cannot tell which traffic is real!
Usage
Basic Usage
# DNS and HTTP noise
chaosec --dns-noise --http-flood
# All traffic types
chaosec --all-noise
# With specific pattern
chaosec --all-noise --pattern browsing
# High intensity
chaosec --all-noise --intensity 2.0
Traffic Patterns
# Normal web browsing
chaosec --all-noise --pattern browsing
# Video streaming
chaosec --all-noise --pattern streaming
# Online gaming
chaosec --all-noise --pattern gaming
# Maximum chaos
chaosec --all-noise --pattern chaotic
# Stealth mode
chaosec --all-noise --pattern stealth
# Research
chaosec --all-noise --pattern research
# Social media
chaosec --all-noise --pattern social
Tor Mode
# Optimized for Tor network
chaosec --all-noise --tor-mode --pattern browsing
In Tor mode: Minimum wait time 1 second, Tor-appropriate traffic patterns, less aggressive requests
Intensity Setting
# Low intensity (0.5x)
chaosec --all-noise --intensity 0.5
# Normal intensity (1.0x - default)
chaosec --all-noise --intensity 1.0
# High intensity (2.0x)
chaosec --all-noise --intensity 2.0
# Maximum intensity (10.0x)
chaosec --all-noise --intensity 10.0
Command Line Options
Traffic Generators
- --dns-noise: Create random DNS queries
- --http-flood: Create random HTTP requests
- --tcp-noise: Create random TCP connections
- --udp-noise: Create random UDP packets
- --all-noise: Enable all traffic generators
Configuration
- --intensity FLOAT: Traffic intensity multiplier (0.1-10.0)
- --tor-mode: Optimize for Tor network
- --duration INT: Run duration (minutes, max 5)
- --verbose, -v: Verbose output and statistics
Traffic Pattern Details
1. Browsing (Web Browsing)
Description: Simulates normal web browsing behavior
Features: HTTP 60%, DNS 30%, TCP 10%, UDP 5%, Interval 1-8 seconds
Use Case: Hide daily web browsing activities
2. Streaming
Description: Simulates video/audio streaming traffic
Features: HTTP 80%, DNS 10%, TCP 5%, UDP 20%, Interval 0.5-2 seconds
Use Case: Hide video watching or music listening activities
3. Gaming
Description: Simulates online gaming traffic
Features: HTTP 20%, DNS 10%, TCP 30%, UDP 50%, Interval 0.1-1 second
Use Case: Hide online gaming activities
4. Chaotic
Description: Maximum chaos mode - all traffic types
Features: HTTP 100%, DNS 100%, TCP 100%, UDP 100%, Interval 0.1-0.5 seconds
Use Case: Maximum privacy, traffic analysis completely difficult
WARNING: Most aggressive mode, use carefully!
5. Stealth
Description: Low-profile stealth mode
Features: HTTP 40%, DNS 20%, TCP 5%, UDP 2%, Interval 5-30 seconds
Use Case: Provide privacy without being noticed
Troubleshooting
Program Stops Immediately
Problem: Program stops right after starting
Solution: Select at least one traffic generator: chaosec --dns-noise --http-flood or chaosec --all-noise
Connection Errors
Problem: "Connection refused" or "Timeout" errors
Solution: This is normal. Some servers may refuse connections. Program continues automatically. Don't worry.
High CPU Usage
Problem: CPU usage too high
Solution: Reduce intensity: chaosec --all-noise --intensity 0.5 or use fewer traffic types
IP Blocked
Problem: Some sites blocked your IP
Solution: This is normal when tool used aggressively. Reduce intensity, use stealth mode, use with Tor
Limitations
- Maximum Runtime: 5 minutes maximum, automatic stop, limited for security
- Intensity Limits: Minimum 0.1x, Maximum 10.0x, Recommended 0.5-2.0x
- Network Bandwidth: Uses bandwidth at high intensity, may consume internet quota, use carefully
- ISP Policies: Some ISPs may block aggressive traffic, may apply rate limiting, may suspend your account
FAQ
Q: Is Chaosec legal? A: Legal to use for your own privacy. But DoS/DDoS attacks are illegal.
Q: Will my ISP notice? A: May notice at high intensity. Use stealth mode and low intensity.
Q: Should I use with Tor? A: Yes, recommended to use with Tor. Use --tor-mode.
Q: How long should I run it? A: Maximum 5 minutes. Shorter durations are safer.
Q: Does it really work? A: Yes, makes traffic analysis difficult. But doesn't provide 100% protection.
Q: Can I use with VPN? A: Yes, VPN + Chaosec is a good combination.
Q: Why 5 minute limit? A: For security. Prevents detection as DoS/DDoS.
Disclaimer
IMPORTANT WARNINGS:
- This tool is for legitimate privacy protection only
- DO NOT USE for DoS/DDoS attacks
- Do not run for long periods (max 5 minutes)
- Comply with ISP policies
- Legal responsibility is yours
Authors' Responsibility: Authors not responsible for misuse, user responsible for legal issues, tool provided "AS IS", no warranty given
USE ONLY WHEN NECESSARY! STAY SAFE!
Cryptocurrency Tools
Cyrethium offers various security and utility tools for cryptocurrency transactions.
Address Validator
Validates cryptocurrency addresses and performs format checks.
Supported Coins: Bitcoin (Base58 and Bech32/Bech32m), Ethereum (EIP-55 checksum), Litecoin
address-validator
Features: Bitcoin SegWit (bc1) support, Ethereum EIP-55 checksum validation, Testnet address support, Detailed error messages
Balance Checker
Checks cryptocurrency address balances.
Supported Coins: Bitcoin (BlockCypher API), Ethereum (Etherscan/Public RPC), Litecoin (BlockCypher API)
balance-checker
Ethereum API Sources: Etherscan (ETHERSCAN_API_KEY required), PublicNode RPC, Ankr RPC, Cloudflare RPC
Coin Watch
Tracks cryptocurrency prices and market data.
Features: Live price tracking, Watchlist management, Portfolio tracking, Price alerts, Tor proxy support, Traffic patterns
coin-watch
Configuration: ~/.config/cyrethium-coinwatch/config.json
Privacy Analyzer
Analyzes privacy features of cryptocurrency addresses.
crypto-privacy-analyzer
Analysis Criteria: Address format, Privacy score (0-100), Recommendations, Risk analysis
Key Backup
Securely backs up private keys.
Features: AES-256 encryption, PBKDF2 (100,000 iterations), Backup and restore
key-backup
Paper Wallet
Creates offline cryptocurrency wallets.
Supported Coins: Bitcoin, Ethereum, Litecoin
Features: QR code generation, WIF format, Multiple wallet creation
paper-wallet
Private Key Converter
Converts private key formats.
Supported Formats: HEX, WIF
Features: HEX ↔ WIF conversion, Address generation, Multi-coin support
private-key-converter
Security Notes
Important Warnings:
- Never Share Private Keys
- Keep Backups Secure
- Test on Test Networks
- Start with Small Amounts
Crypted Notes - Encrypted Note Application
Crypted Notes (Securonis Notes) is a modern note-taking application that allows you to store your notes encrypted. Developed with PyQt5, it offers a user-friendly interface and powerful encryption features.
Usage
crypted-notes
Interface Components
Note Editor
Title: Note title input (required)
Content: Rich text editor with formatted text support, color and font selection
Tags: Comma-separated tags (e.g., work, urgent, meeting)
Priority: Low (default), Medium, High
Category: General (default), Work, Personal, Ideas, Tasks, Custom categories can be added
Deadline: Date and time selection with calendar widget (Format: YYYY-MM-DD HH:MM)
Options
- Encrypt: Encrypt the note
- Favorite: Mark as favorite
- Archive: Archive
- Set Reminder: Set reminder
- Attachments: File attachments
Buttons
Save: Saves the note (checks: title not empty, password if encryption selected, date format validation)
Clear Form: Clears the form (title, content, tags, all options)
Text Color: Changes text color (color picker opens, selected color applied to text)
Text Font: Changes font (font family, size, style: bold, italic)
File Attachments
Supported Formats: Documents (.txt, .pdf, .doc, .docx), Images (.jpg, .jpeg, .png, .gif)
Limitations: Max file size 10MB, Max 10 attachments per note
Adding Files: Check "Attachments" option → File picker opens → Select file → File encoded with Base64 and saved
Encryption
Algorithm: Fernet (AES-256-CBC)
Process: User enters password → Password hashed with PBKDF2 → Note content encrypted with Fernet → Encrypted data saved
Creating Encrypted Note: Check "Encrypt" option → Save note → Enter password (twice) → Note encrypted and saved
Opening Encrypted Note: Select encrypted note → Enter password → Note decrypted and displayed
WARNING: If you forget the password, the note cannot be recovered!
Reminders
Setting Reminder: Check "Set Reminder" option → Select date and time → Save note
Reminder Notification: Notification shown at specified date/time using system notifications with note title and content preview
Search and Filtering
Search Criteria: Title, Content, Tags, Category
Filter Options: All notes, Favorites, Archived, Encrypted notes, By category, By priority
Export
Formats: JSON, CSV, TXT
Keyboard Shortcuts
General: Ctrl+S (Save), Ctrl+N (New note), Ctrl+F (Search), Ctrl+Q (Exit)
Editing: Ctrl+B (Bold), Ctrl+I (Italic), Ctrl+U (Underline), Ctrl+Z (Undo), Ctrl+Y (Redo)
Troubleshooting
Note Cannot Be Saved: Fill in title field, check disk space, check write permissions
Encrypted Note Cannot Be Opened: Make sure password is correct, Caps Lock should be off, if password forgotten note cannot be recovered
File Cannot Be Attached: File size must be less than 10MB, must be supported format, max 10 attachments limit
FAQ
Q: Where are notes stored? A: In ~/.config/crypted-notes/notes.json file.
Q: How secure is encryption? A: Uses AES-256, industry standard.
Q: What if I forget password? A: Note cannot be recovered, lost if no backup.
Q: Are notes synchronized? A: No, stored locally.
Q: Is there a max note count? A: No, depends on disk space.
Anti-Exploit Suite - Advanced Exploit Detection System
Anti-Exploit Suite is a comprehensive security tool that protects your system against 10 different exploit and attack types. Each module detects and reports specific attack vectors.
Security Modules
1. Cron Hunter
Purpose: Detects malicious commands in scheduled tasks
How it Works:
- Scans crontab files and systemd timers
- Analyzes threat indicators like reverse shells, network connections, obfuscation
- Calculates threat score (0-100)
2. Ghost Service Killer
Purpose: Finds daemon processes not registered with systemd
How it Works:
- Scans long-running processes (default: 10+ minutes)
- Compares with systemd services
- Analyzes network connections and suspicious behavior
3. Hidden Binary Hunter
Purpose: Detects processes running from deleted binary files
How it Works:
- Searches for "(deleted)" marker in /proc/[pid]/exe
- Checks RWX (read-write-execute) memory regions
- Analyzes long runtime and suspicious parent processes
4. Reverse Shell Detector
Purpose: Detects reverse shell and C2 (Command & Control) connections
How it Works:
- Scans network connections (ESTABLISHED state)
- Searches for reverse shell patterns (bash -i >&, /dev/tcp, nc -e, etc.)
- Flags connections to suspicious ports (4444, 5555, 1337, etc.)
5. Rootshell Injection Mitigator
Purpose: Detects tampering of system binaries and rootkit injection
How it Works:
- Calculates SHA256 hashes of critical shell and system binaries
- Compares with baseline
- Scans binaries for suspicious strings (socket, exec, setuid, etc.)
6. TTY Hijack Detector
Purpose: Monitors TTY sessions and detects hijacking attempts
How it Works:
- Scans active TTY sessions
- Checks for suspicious parent processes
- Detects LD_PRELOAD injections and environment variable manipulation
7. Zombie Hunter
Purpose: Detects and cleans zombie (defunct) processes
How it Works:
- Searches for Z (zombie) state in /proc/[pid]/stat
- Sends SIGCHLD to parent process
- Terminates parent process if unsuccessful
8. Service Registration Mismatch Finder
Purpose: Finds long-running processes not registered with systemd
How it Works:
- Scans processes running 10+ minutes
- Checks systemd cgroups
- Special check for daemon users (www-data, mysql, etc.)
9. Shebang & Script Obfuscation Scanner
Purpose: Detects obfuscated shell scripts
How it Works:
- Scans /usr/local/bin, /opt, cron directories
- Validates shebang
- Searches for obfuscation patterns:
- Base64 decode & execute (base64 -d | sh)
- Remote execution (curl | bash)
- Eval patterns
- Hex/octal encoding
- Analysis: Entropy calculation, character density, long lines
10. SUID/SGID Anomaly Scanner
Purpose: Detects suspicious SUID/SGID binaries
How it Works:
- Finds SUID/SGID files system-wide
- Checks ownership by querying package manager (dpkg/rpm/pacman)
- Calculates SHA256 hashes
- Analyzes file permissions and ownership
Usage
sudo anti-exploitsuite
Note: Root privileges recommended for full system scan.
Usage Examples
# Full System Scan
sudo anti-exploitsuite
# Run each module in sequence
# Specific Module
sudo anti-exploitsuite
> 4 # Reverse Shell Detector
Troubleshooting
Module Not Found:
# Check module directories
ls -la /opt/anti-exploit/
# Fix permissions
sudo chmod +x /opt/anti-exploit/*
Root Privileges Required:
sudo anti-exploitsuite
Security Notes
Important: False positives may occur - some legitimate applications may be detected. Always verify findings before taking action.
USB Toolkit - USB Drive Operations
USB Toolkit is a secure erase, format and management tool for USB drives.
Features
- USB device listing
- Secure erase (shred)
- Random data fill
- Format (FAT32, NTFS, EXT4)
- System disk protection
Usage
sudo usbtoolkit
Note: Requires root privileges.
Main Menu (Interactive Mode)
1. List USB devices: Lists USB devices
2. Show device information: Shows device details (size, model, vendor, partitions, filesystem)
3. Secure erase (shred): Secure erase (3 passes) - shred -v -n 3 -z /dev/sdb - WARNING: All data will be deleted!
4. Fill with random data: Random data fill - dd if=/dev/urandom of=/dev/sdb bs=4M
5. Format: Format options - FAT32 (vfat): Windows/Linux compatible, NTFS: Windows, EXT4: Linux
Command Line Usage
# List
sudo usbtoolkit --list
# Info
sudo usbtoolkit --info /dev/sdb
# Secure Erase
sudo usbtoolkit --erase /dev/sdb
# Random Fill
sudo usbtoolkit --random /dev/sdb
# Format
sudo usbtoolkit --format /dev/sdb vfat
sudo usbtoolkit --format /dev/sdb ntfs
sudo usbtoolkit --format /dev/sdb ext4
Security Measures
System Disk Protection: Checks root partition (/), /dev/sda, mount status
Unmount: All partitions unmounted before operation (umount /dev/sdb1, umount /dev/sdb2)
Warnings
Select correct device! Wrong device selection causes data loss.
Don't erase system disk! /dev/sda is usually the system disk.
Backup! Operation is irreversible.
SystemKnight - Malware and Rootkit Scanner
SystemKnight is a malware and rootkit scanning tool that manages ClamAV and rkhunter tools.
Usage
sudo systemknight
Note: Requires root privileges.
Main Menu
1. ClamAV Scan (Malware Detection)
Quick scan (home directory): Scans user directory, fast scan
Full system scan: Scans entire system, excludes /proc, /sys, /dev
Custom directory scan: Scans specified directory
Scan and remove infected files: Scans and removes infected files - WARNING: Irreversible!
2. rkhunter Scan (Rootkit Detection)
Standard system check: Normal rootkit scan
Check with only warnings displayed: Show only warnings
Thorough system check: Detailed scan
3. Update All Definitions
Updates virus and rootkit definitions.
4. System Information
Shows system information: Hostname, Kernel version, Operating system, ClamAV version, rkhunter version
5. Install Dependencies
Installs ClamAV and rkhunter.
SHA256 Checksum - File Integrity Verification
SHA256 Checksum is a SHA256 hash calculation and verification tool for verifying file integrity.
Features
- SHA256 checksum calculation
- Checksum verification
- Batch processing
- Verification from checksum file
Usage
sha256checksum
Main Menu
1. Calculate SHA256 checksum
Calculates checksum for single file.
File path: /home/user/file.iso
Output:
File: /home/user/file.iso
SHA256: a1b2c3d4e5f6...
Save checksum to file? [y/N]: y
Checksum saved to: /home/user/file.iso.sha256
2. Verify SHA256 checksum
Verifies file checksum.
File path: /home/user/file.iso
Enter expected SHA256 checksum: a1b2c3d4e5f6...
Output:
File: /home/user/file.iso
Expected: a1b2c3d4e5f6...
Actual: a1b2c3d4e5f6...
✓ Checksum verified! File integrity confirmed.
3. Batch calculate checksums
Calculates checksums for all files in folder.
Enter directory path: /home/user/downloads
File extension filter: *.iso
Output:
✓ Checksums calculated for 5 files
Results saved to: checksums_20250126_171200.sha256
4. Verify from checksum file
Verifies all checksums from .sha256 file.
Enter checksum file path: checksums.sha256
Output:
file1.iso: OK
file2.iso: OK
file3.iso: FAILED
✗ Issues detected with some files
Cyrethium Jails Manager - Interactive Firejail Sandbox Tool
Cyrethium Jails Manager is an interactive tool designed to run applications in secure sandbox environments using Firejail. You can easily configure security settings with a user-friendly menu system.
Usage
cyrethium-jails
Note: Do not run as root! Works with normal user.
Main Menu
1. Launch Application in Sandbox
Runs an application in sandbox with custom security settings.
Configuration Options: Network access, Home directory isolation, Temporary filesystem, Sound access, 3D acceleration, Webcam access, Read-only filesystem, Seccomp filtering, AppArmor, Custom profile
2. Quick Launch with Presets
Preset 1 - Maximum Security: Strictest security settings for untrusted applications
Preset 2 - Internet Browser: For web browsers (Firefox, Chrome, Brave)
Preset 3 - Office Application: For office apps (LibreOffice, PDF readers)
Preset 4 - Media Player: For media players (VLC, MPV)
Preset 5 - Development Tool: For IDEs and code editors
3. List Active Sandboxes
Lists all running Firejail sandboxes.
4. Kill Sandbox Process
Terminates a specific sandbox process.
5. Show Firejail Profiles
Lists available Firejail profiles. Profile location: /etc/firejail/
6. System Information
Shows system and security features.
Firejail Options Details
--net=none: Blocks all network access
--private: Creates empty temporary home directory
--private-tmp: Creates private /tmp directory
--nosound: Blocks access to sound devices
--no3d: Disables 3D acceleration
--novideo: Blocks webcam access
--seccomp: Filters dangerous system calls
--apparmor: Applies AppArmor confinement
Limitations
1. Root-requiring apps: Firejail cannot run apps requiring root
2. Kernel modules: Access to kernel modules blocked (affects VirtualBox, VMware)
3. Hardware access: Direct hardware access limited (USB devices, special hardware)
4. X11 apps: Some GUI apps may need extra configuration (use --x11 option)
FAQ
Q: Does Cyrethium Jails require root? A: No, works with normal user. Don't run as root!
Q: Difference between Firejail and Plaztek? A: Firejail is more user-friendly and optimized for GUI apps. Plaztek is lighter for scripts.
Q: Do all apps work with Firejail? A: Most work, but some special apps may need extra configuration.
Q: Performance impact? A: Minimal, most users won't notice.
Q: Can escape from sandbox? A: Theoretically not possible, but kernel bugs may pose risk.
Q: Multiple sandboxes simultaneously? A: Yes, run as many as you want.
FastCrypt - Fast File Encryption
FastCrypt is a simple and fast file encryption tool based on PyQt5. Securely encrypts your files using Fernet (AES-256) encryption.
Usage
fastcrypt
Main Functions
1. Select File: Select file to encrypt or decrypt
2. Enter Password: Enter password (same password for encryption and decryption)
3. Encrypt: Encrypts file and adds .fcrypt extension (e.g., document.pdf → document.pdf.fcrypt)
4. Decrypt: Decrypts .fcrypt file to original (e.g., document.pdf.fcrypt → document.pdf)
Security Notes
Important: Don't forget password (no recovery), use strong password, securely delete original file
MetadataCleaner - Image Metadata Cleaner
MetadataCleaner is a PyQt5-based tool that removes EXIF and metadata information from image files. Removes metadata for privacy.
Usage
metadatacleaner
Main Functions
1. Select Path: Select file or folder (File: single file, Folder: folder scan)
2. Scan Subfolders: Scan subfolders too
3. Clean Metadata: Clean metadata (Process: File backed up → Metadata removed → File verified → Restore from backup if failed)
Supported Formats
.png, .jpg, .jpeg, .tiff, .bmp, .gif, .webp, .tif, .ico, .svg, .heic, .heif, .raw, .cr2, .nef, .arw, .dng, .psd, .ai, .eps
Important
Original files backed up, restore on failed operation, max file size: 100MB
Network Stats - Network Statistics and Fix
Network Stats is a simple bash tool that displays network configuration and fixes issues.
Usage
sudo network-stats
Main Menu
1. Show Network Interfaces: Shows active network interfaces
2. Show Routing Information: Shows routing table
3. Show DNS Configuration: Shows DNS servers
4. Show Active Connections: Shows listening services
5. Run Connectivity Test: Tests internet connection
6. Show All Network Info: Shows all information
7. Fix Network & Reset IPTables: Resets network and firewall - WARNING: All iptables rules will be deleted!
Important
Network fixer requires root, don't use when Tor is active, all firewall rules will be deleted
NodeChecker - Tor Circuit Viewer
NodeChecker is a PyQt5-based tool that visually monitors circuits and streams in the Tor network. Forked from Tails' "Onion Circuits" tool.
Usage
sudo nodechecker
Note: Tor must be running.
Interface
Left Panel: Shows Circuit/Stream list
Right Panel: Shows Node details
I2P Router Menu - Anonymous Internet Network
I2P Router Menu is a PyQt5-based interface for managing the I2P (Invisible Internet Project) network. I2P is an anonymous communication network alternative to Tor.
What is I2P?
Basic Concept: I2P is a peer-to-peer based anonymous network. Unlike Tor, not just exit traffic, but all communication stays within the I2P network.
Tor vs I2P
Purpose: Tor - Anonymous access to clearnet | I2P - P2P anonymous network
Structure: Tor - Circuit-based | I2P - Packet-switched
Speed: Tor - Medium | I2P - Faster (for P2P)
Usage: Tor - Web browsing | I2P - File sharing, messaging
How I2P Works
1. Garlic Routing: Uses "garlic routing" instead of Tor's "onion routing" - Multiple messages in one packet, more efficient, traffic analysis harder
2. Tunnels: Each user creates 2 types of tunnels - Inbound (Internet → Peer 1 → Peer 2 → Peer 3 → YOU) and Outbound (YOU → Peer A → Peer B → Peer C → Target). Each tunnel changes every 10 minutes, minimum 3 hops, 2 separate tunnels for bidirectional communication
3. NetDB (Network Database): No central server in I2P. Uses Distributed Hash Table (DHT) - Peer addresses, tunnel info, encryption keys
4. Eepsite (.i2p): I2P's own websites - example.i2p accessible within I2P, not accessible from clearnet
Usage
i2p-routermenu
Main Menu
1. Start I2P Router: Starts I2P router and opens console in browser (http://127.0.0.1:7657/)
2. Stop I2P Router: Stops I2P
3. Graceful Stop: Gracefully stops I2P (may take up to 11 minutes) - Active tunnels closed, connections cleanly terminated, data loss prevented
4. Restart I2P Router: Restarts I2P
5. Check I2P Status: Checks if I2P is running
6. Install I2P (Auto-Start): Auto-starts I2P at system boot
7. Remove I2P (Disable Auto-Start): Disables auto-start
8. View Thread Dump: Shows Java thread dump (for debugging)
Important
1. First Start: Wait 10-15 minutes (network integration)
2. Clearnet: I2P not optimized for clearnet exit like Tor
Tips
1. Bandwidth: More bandwidth = Better performance
2. Uptime: Keep open longer (contributes to network)
Monerothium - Monero Wallet Manager
Monerothium is an interactive tool designed to manage Monero (XMR) wallet operations. Enables secure Monero transactions over Tor network.
Usage
monerothium
First Run: Tor connection checked when program starts - WARNING: Risky to continue without Tor connection!
Wallet Management
1. Create New Wallet: Creates new Monero wallet (Enter wallet name → Select network → Set strong password → Save seed phrase 25 words) - IMPORTANT: Keep seed phrase safe!
2. Open Existing Wallet: Opens previously created wallet
3. Restore Wallet from Seed: Restores wallet with 25-word seed phrase
Wallet Operations
4. Show Wallet Info: Shows detailed wallet info (Primary address, Seed phrase, View key, Spend key)
5. Show Balance: Shows wallet balance
6. Show All Addresses: Lists primary address and all subaddresses
7. Create New Subaddress: Creates new subaddress
8. Send XMR: Sends Monero - CAUTION: Double-check address!
9. Show Transactions: Shows transaction history (All, Incoming, Outgoing, Pending, Failed, Pool)
10. Sweep All Funds: Sends entire balance to address - CAUTION: All balance sent!
11. Show Seed Words: Shows 25-word seed phrase - SECURITY: No one should see screen!
12. Refresh Wallet: Scans blockchain and updates balance
13. Check Wallet Status: Shows wallet and daemon status
Advanced Features
14. Integrated Address Operations: Generate random or specific payment ID integrated addresses
15. Payment Verification: Check payment by payment ID, verify transaction proof
16. Transaction Key Management: Store and retrieve transaction keys
17. Address Book: Show all entries, add new, delete
18. Wallet Description: Set and show wallet description
19. Make Donation For Monero: Donate to Monero project
20. Show Version: Shows Monero wallet version
Network Selection
Mainnet: Main Monero network
Stagenet: Test network (mainnet-like)
Testnet: Developer test network
Monero Privacy Features
Ring Signatures: Each transaction mixed with other transactions (typical 11 decoys)
Stealth Addresses: New address created for each transaction
RingCT: Transaction amounts hidden
Dandelion++: Transaction propagation hidden
FAQ
Q: Why is Monero private? A: Uses ring signatures, stealth addresses and RingCT technologies.
Q: Transaction fee? A: Dynamic, usually very low (0.0001-0.001 XMR).
Q: What is subaddress? A: Additional addresses derived from primary address. Used for privacy.
Q: What is integrated address? A: Addresses containing payment ID. Used for payment tracking.
Q: How different from Bitcoin? A: Monero fully private by default, Bitcoin is not.
Security Warnings
1. Seed Phrase Critical: Lose it, lose your wallet
2. Tor Mandatory: IP leak breaks privacy
3. Phishing: Beware of fake wallet sites
4. Malware: Download from trusted sources
Paranoia - Complete Network Isolation
Paranoia is an emergency tool that completely isolates the system from all external connections. Blocks all network traffic and maximizes system security.
Usage
sudo paranoia
Main Menu
1. Enable Paranoia Mode: Backs up firewall rules → Blocks all traffic (INPUT/OUTPUT/FORWARD → DROP) → Removes WiFi/Bluetooth modules → Stops network services
2. Disable Paranoia Mode: Clears firewall rules → Sets policies to ACCEPT → Removes module blacklists → Restarts network services
Security Notes
WARNINGS:
1. Tor Usage: Stop Tor before enabling Paranoia mode!
2. Data Loss: Open network connections will be cut
3. Remote Access: SSH/RDP connections will drop
Tor Conflict
WHY STOP TOR? Paranoia mode blocks all network traffic. Result: Tor connection cut, anonymous IP may leak, system becomes unstable
Tips
Emergency Only: Use only in real threat situations
SecDNS Changer - Secure DNS Changer
SecDNSChanger is a PyQt5-based tool that easily changes system DNS settings. Choose from 8 different secure DNS providers.
Usage
secdnschanger
DNS Providers
1. Cloudflare (1.1.1.1): Primary 1.1.1.1, Secondary 1.0.0.1 - Fastest DNS, privacy-focused, DNSSEC support
2. OpenDNS (208.67.222.222): Primary 208.67.222.222, Secondary 208.67.220.220
3. Quad9 (9.9.9.9): Primary 9.9.9.9, Secondary 149.112.112.112
4. AdGuard (94.140.14.14): Primary 94.140.14.14, Secondary 94.140.15.15
5. Yandex (77.88.8.8): Primary 77.88.8.8, Secondary 77.88.8.1
6. CleanBrowsing (185.228.168.9): Primary 185.228.168.9, Secondary 185.228.169.9
7. Comodo Secure (8.26.56.26): Primary 8.26.56.26, Secondary 8.20.247.20
8. Google (8.8.8.8): Primary 8.8.8.8, Secondary 8.8.4.4
Important
DNS change requires root, if using Tor DNS already anonymous
Tips
Privacy: Prefer Cloudflare or Quad9
Ad Blocking: Use AdGuard
Curl-Wget Agent Spoofer - HTTP Request Anonymizer
Curl-Wget Agent Spoofer is a tool that changes user agent strings to anonymize your HTTP requests. Hides your browser and system information with 100+ different user agents.
Usage
curl-wget-agentspoofer
Main Menu
1. Execute CURL with Spoofed User Agent: Makes requests with curl using spoofed user agent
Options: Random user agent, Select from list, Custom user agent
Curl Modes: Basic request, Follow redirects (-L), Include headers (-I), Silent mode (-s), Verbose mode (-v), Custom options
2. Execute WGET with Spoofed User Agent: Downloads with wget using spoofed user agent
Options: Random user agent, Select from list, Custom user agent
Wget Modes: Basic download, Continue partial (-c), Background (-b), Quiet mode (-q), Verbose mode (-v), Custom options
3. Show Available User Agents: Lists all available user agents
4. Show Help: Shows help and documentation
Security Notes
Important: User agent spoofing is basic anonymization, use with Tor, some sites use other fingerprinting methods
TorPortal CLI - Tor Network Monitoring Tool
TorPortal CLI is an advanced Python-based CLI tool for monitoring Tor network traffic, viewing circuit information, and analyzing security status.
Usage
sudo torportal-cli
Root recommended (for some features)
Main Menu
1. Status Overview: Tor status and general information (Tor status RUNNING/NOT RUNNING, Traffic status Via Tor/Direct, Public IP, Active port count, Circuit node count, Tor process count, Network traffic sent/received)
2. Connection Details: Active Tor connections and port details. For each connection: Port number, Protocol (TCP/UDP), Status (LISTENING, ESTABLISHED, etc.), Local address, Remote address, Detection method (netstat, psutil, port_scan)
Port Descriptions: 9050 SOCKS5 Proxy, 9051 Control Port, 9040 Transparent Proxy, 8118 Privoxy HTTP Proxy, 8080 Alternative HTTP Proxy, 9001 ORPort (Relay), 9030 DirPort (Directory)
3. Tor Circuit Info: Tor circuit and node details (requires stem). Circuit ID, Node type (Guard/Middle/Exit), Nickname, IP address, Country, Fingerprint, Bandwidth, Flags
4. Network Statistics: Detailed network statistics. General traffic (Sent/received bytes, Sent/received packets, Error count in/out, Drop count in/out), Tor connections (Total Tor connection count, Connection states ESTABLISHED/TIME_WAIT), Active interfaces (Interface name, Byte/packet statistics)
5. Security Status: Security status and anonymity check
SECURE (Green): Tor running, Traffic via Tor, IP anonymized
PARTIALLY SECURE (Yellow): Tor running, Traffic NOT via Tor, Configuration error
INSECURE (Red): Tor not running, Direct traffic, IP exposed
Recommendations: If Tor not running - Start Tor, If traffic not routed - Set SOCKS5 proxy (127.0.0.1:9050), If secure - All checks passed
6. Performance Monitor: System and Tor performance data. System (CPU usage %, CPU core count, CPU frequency MHz, RAM usage %, Total/used/available RAM, Disk usage %, Total/free disk, System uptime), Tor (Tor CPU usage %, Tor RAM usage %), Network (Total sent/received). Performance rating: Excellent (CPU < 30%, RAM < 50%), Normal (CPU < 60%, RAM < 70%), High (CPU/RAM high)
7. Tor Configuration: Tor configuration information. Basic config (Control Port, SOCKS Port, Data Directory, Exit Policy, Config File path), Detected ports (Port number, Type SOCKS/Control, Status Active/Inactive). Recommendations: If control port not detected add ControlPort 9051, If SOCKS port not detected check Tor service
8. Continuous Monitor: Real-time continuous monitoring mode
9. Full Report: Summary report of all sections
d. Debug Mode: Toggle debug mode (Detailed error messages, Connection attempts, Detection methods, Debug info)
r. Refresh: Recollect all data
q. Quit: Exit program
USBGuard Manager - USB Device Security Manager
USBGuard Manager is a security tool that controls USB devices and blocks unauthorized USB access. Provides whitelist/blacklist based USB management.
Usage
cyrethium-usbguard
Main Menu
1-2. Installation: 1. Install USBGuard package, 2. Install usbutils (lsusb)
3-8. Service Management:
3. Enable USBGuard service (enable auto-start, doesn't start)
4. Disable USBGuard service (disable auto-start)
5. Start USBGuard service
6. Stop USBGuard service
7. Restart USBGuard service
8. Service status
9-11. Device Listing:
9. List USB devices (lsusb) - All USB devices
10. List USB devices (usb-devices) - Detailed USB info
11. List blocked USB devices
12-13. Device Permissions:
12. Temporarily allow USB device (lost on reboot)
13. Permanently allow USB device (added to policy)
14-17. Policy Management:
14. Generate USBGuard policy (create from current devices, default deny)
15. Show current USBGuard policy
16. Backup current USBGuard policy
17. Restore USBGuard policy from backup
18-19. Configuration:
18. Toggle default policy (Allow all ↔ Deny all)
19. Edit USBGuard rules.conf
20. USBGuard Rules Guide: Detailed configuration guide
Policy Options
ImplicitPolicyTarget: allow (allow unknown devices), block (block unknown devices), reject (remove device from system)
PresentDevicePolicy: allow (allow present devices), block (block present devices), keep (keep current state), apply-policy (apply policy)
InsertedDevicePolicy: block (block new devices), reject (reject new devices), apply-policy (apply policy)
Security Notes
Important: 1. Keyboard/Mouse - Add to whitelist on first setup, 2. Backup - Backup before policy changes, 3. Test - Test critical devices
Tips
1. Vendor ID - Allow all devices from same manufacturer: allow id 1234:*
2. Serial Number - Specific device: allow id 1234:5678 serial "ABC123"
3. Port - Specific USB port: allow via-port "1-2"
Cyrethonion - System-Wide Tor Routing Tool
Cyrethonion is a powerful tool that routes all system traffic through the Tor network. Uses transparent proxy to automatically pass all your internet connections through Tor and provides maximum privacy.
Developer: root0emir | Version: 2.0 Hardened | License: GNU GPL v3.0
Security Features
System-Wide Tor Routing: All TCP traffic automatically routed through Tor
DNS Leak Protection: All DNS queries forced through Tor DNS (port 9053)
IPv6 Disabled: Completely blocks IPv6 data leaks
UDP Traffic Blocking: UDP traffic automatically dropped (Tor doesn't support)
ICMP Privacy Mode: No response to ping requests (stealth mode)
Application Isolation: Each application and website completely isolated
Cyrethonion Tor Guard: Automatically detects suspicious environment variables
Advanced Protection Mechanisms
BAD_FLAGS Attack Protection: NULL Scan, XMAS Scan, SYN+FIN attack, SYN+RST attack, RST Flood protection (max 2 packets/sec), Active on both INPUT and OUTPUT chains
Anti-Spoofing Protection: Loopback spoofing (127.0.0.0/8), Invalid source (0.0.0.0/8), Multicast spoofing (224.0.0.0/4), Reserved space (240.0.0.0/4)
Bridge Support
Obfs4 Bridge Support: To bypass Tor blocking, Bridge add/list/clear, Automatic bridge configuration, Multiple bridge support
System Tray Application (cyrethonion-mate)
Start Tor Routing: Starts system-wide Tor routing. All internet traffic routed through Tor network
Stop Tor Routing: Stops Tor routing and returns to normal internet connection
Change IP Address: Gets new IP by changing Tor exit node. Only works when Tor routing active
Show IP Address: Checks current IP and verifies traffic routed through Tor
Status: Shows Tor service status and routing info
Restart Router: Restarts Tor router service. Useful for connection issues
Add Bridges: Adds bridges to bypass Tor blocking. Only Obfs4 bridges supported
List Bridges: Shows configured bridges
Clear Bridges: Removes all configured bridges and returns to normal Tor entry nodes
Status Icons
Green Icon (ACTIVE): Tor routing active | Red Icon (DISABLED): Tor routing disabled | Yellow Icon (TIMEOUT): Connection timeout | Orange Icon (IP CHANGING): IP address changing | Gray Icon (OFFLINE): No internet connection
Command Line Usage
# Start Tor routing
sudo cyrethonion start
# Stop Tor routing
sudo cyrethonion stop
# Status check
sudo cyrethonion status
# Restart Tor router
sudo cyrethonion restart
# Change IP address
sudo cyrethonion changeid
# Check IP address
cyrethonion ip
# Bridge management
sudo cyrethonion bridges
cyrethonion list-bridges
sudo cyrethonion clear-bridges
# Version info
cyrethonion version
Technical Details - Network Configuration
Tor Ports: TransPort 9040 (Transparent Proxy), SocksPort 9050 (SOCKS Proxy), DNSPort 9053 (DNS), ControlPort 9051 (Control)
Excluded Networks: 127.0.0.0/8, 10.0.0.0/8, 100.64.0.0/10, 169.254.0.0/16, 172.16.0.0/12, 192.0.0.0/24, 192.0.2.0/24, 192.168.0.0/16, 198.18.0.0/15, 198.51.100.0/24, 203.0.113.0/24, 224.0.0.0/4, 240.0.0.0/4
IPTables Rules
NAT Table: Skip Tor user traffic, Redirect ALL DNS traffic to Tor DNS, Block UDP traffic (Tor doesn't support), Redirect TCP traffic to Tor
Filter Table: Create BAD_FLAGS chains, Route INPUT/OUTPUT packets to BAD_FLAGS chain, Anti-spoofing rules, ICMP blocking (stealth mode), REJECT all non-Tor traffic
Sysctl Configuration
Completely disables IPv6: net.ipv6.conf.all.disable_ipv6 = 1, net.ipv6.conf.default.disable_ipv6 = 1, net.ipv6.conf.lo.disable_ipv6 = 1
Tor Configuration (torrc)
Isolation settings: TransPort/SocksPort with IsolateClientAddr, IsolateSOCKSAuth, IsolateClientProtocol, IsolateDestPort, IsolateDestAddr
Performance and security: HardwareAccel 1, ClientUseIPv6 0, CookieAuthentication 1
Circuit management: NewCircuitPeriod 40, MaxCircuitDirtiness 600, MaxClientCircuitsPending 48, UseEntryGuards 1
Backup System
Cyrethonion automatically backs up: /etc/tor/torrc, /etc/resolv.conf, IPTables rules, Sysctl settings. All settings automatically restored when service stopped.
Troubleshooting
Internet Connection Lost: Click "Restart Router" or "Stop Tor Routing" then "Start Tor Routing", Try system reboot
Bridge Connection Failed: Clear current bridges and add new ones, Paste bridges as-is without spaces or changes, Restart Cyrethonion after adding bridges, Get new bridges from https://bridges.torproject.org/
Slow Connection: Click "Change IP Address" for faster exit node, Restart router for new circuit, This is normal behavior for Tor network
Can't Change IP: Ensure Tor routing started first, Wait few seconds and try again, Restart Tor router if problem persists
tor@default.service Error: Not a critical error, Tor@default.service will auto-restart, Failure at boot doesn't affect actual operation, Routing and Tor process continue working normally
Start Button Not Working: Reboot system, Ensure no other VPN running
IP Check Shows Real IP: Stop and restart Tor routing, Check if some apps bypassing Tor, Restart browser
DNS Change Warning: NO! Don't change DNS while using Cyrethonion, Changing DNS can cause DNS leaks, Cyrethonion uses Tor DNS during routing, Your current DNS backed up before routing starts, Automatically restored when routing stopped
Important Warnings - CRITICAL LIMITATIONS
UDP Traffic Not Anonymized: Cyrethonion automatically drops UDP traffic, Tor only supports TCP connections, UDP packets not routed through Tor
VoIP Applications Risk: Voice calls (Skype, Discord, WhatsApp calls), Video calls (Zoom, Teams, Google Meet), These apps use UDP and may not work. Recommendation: Disable or don't use during Tor sessions
Online Games Risk: Most online games use UDP for performance, Multiplayer games may not work. Recommendation: Only play offline games
WebRTC Leak Risk: Web browsers can leak real IP through WebRTC, Video chat websites may bypass Tor. Solution: Use Hardened/Amnesic Firefox instead of normal browsers, Disable WebRTC in browser settings
DNS Leak Prevention: Some apps may use custom DNS servers, May bypass Tor's DNS routing. Recommendation: Regularly check for DNS leaks
Performance Impact
Tor routing adds significant latency, Download speeds will be much slower, This is normal and necessary for anonymity, Patience required for browsing
Don't Use with Tor Browser
Tor Browser not compatible with Cyrethonion, Tor Browser uses its own Tor instance, Use Hardened/Amnesic Firefox instead
Best Practices
1. Browser: Use Hardened/Amnesic Firefox for web browsing
2. Accounts: Avoid logging into personal accounts
3. Files: Don't download/upload large files
4. Info: Never provide personal information
5. Extensions: Disable extensions and JavaScript when possible
6. Check: Regularly check your IP address
Application-Specific Notes
Browsers: Use Hardened/Amnesic Firefox for maximum security | Email: Use web-based email through Hardened/Amnesic Firefox | Streaming: May not work or be very slow
Security Measures Summary
Cyrethonion Tor Guard: Automatically detects and warns about suspicious environment variables (Library hijacking attacks, Code injection attempts, Privilege escalation attacks, Malware persistence)
Application & Website Isolation: Each application and website completely isolated. IsolateClientAddr (different circuits for different client addresses), IsolateSOCKSAuth (separate circuits for different authentication), IsolateClientProtocol (protocol-based isolation), IsolateDestPort (destination port isolation), IsolateDestAddr (destination address isolation)
Circuit Management: NewCircuitPeriod 40 seconds for new circuits, MaxCircuitDirtiness 600 seconds max circuit usage, UseEntryGuards consistent entry points, EnforceDistinctSubnets different subnets for diversity, MaxClientCircuitsPending 48 circuits for performance
Safe Restart Mechanism: Complete process termination, Port release verification (9040, 9050, 9051, 9053), Clean state restoration, Prevents resource conflicts
FAQ
Q: Can Cyrethonion be used with VPN? A: No, not recommended with VPN. Can cause conflicts.
Q: Do all apps work through Tor? A: Apps using TCP work. Apps using UDP (games, VoIP) don't work.
Q: When to use bridges? A: In countries or networks where Tor is blocked.
Q: How long does IP change take? A: Usually 5-10 seconds.
Q: Does Cyrethonion use much system resources? A: No, uses minimal system resources. Tor service is lightweight.
License and Disclaimer
Cyrethonion licensed under GNU General Public License v3.0. Disclaimer: This tool should only be used for legal and ethical purposes. Developers not responsible for misuse of the tool.
Developer: root0emir | Website: https://cyrethium.org | GitHub: https://github.com/Cyrethium/
About Hardened Firefox
Hardened Firefox is Cyrethium's daily-use browser configuration, optimized for security and privacy while maintaining usability. Security Score: 9.2/10
Design Philosophy
Motto: "Secure but usable"
Balanced for daily web browsing, social media, email, and development work on personal computers.
Core Security Features
Telemetry Protection (10/10)
All Mozilla telemetry completely disabled. No data sent to Mozilla or third parties.
Fingerprinting Protection (9/10)
Resist Fingerprinting (RFP) enabled with standardized browser characteristics:
- Timezone spoofing (UTC)
- User agent normalization
- Canvas fingerprinting protection
- WebGL enabled but protected by RFP
- Letterboxing disabled for full-screen usability
Tracking Protection (10/10)
- Strict tracking protection mode
- Total Cookie Protection (TCP)
- Third-party cookie blocking
- Social media trackers blocked
HTTPS/TLS Security (10/10)
- HTTPS-Only Mode enabled
- TLS 1.2+ required (minimum)
- TLS 1.3 preferred
- OCSP must-staple enabled
- Insecure ciphers disabled
WebRTC Protection (8/10)
- WebRTC enabled for functionality
- Local IP hidden (no_host)
- Default address only mode
- Proxy-only when behind proxy
- relay_only disabled (better connection quality)
Cookie Management (8/10)
- Total Cookie Protection enabled
- Cookies are persistent (for usability)
- Third-party cookies blocked
- SameSite=Lax default
Cache Management (7/10)
- Disk cache enabled (1GB) for performance
- Memory cache enabled
- Cache cleared on shutdown
Network Security
- DNS prefetch disabled
- Link prefetch disabled
- Speculative connections disabled
- DoH (DNS over HTTPS) disabled (use system DNS)
- Network partitioning enabled
JavaScript Security (7/10)
- JIT enabled (for performance)
- WebAssembly enabled
- Baseline JIT enabled
- Ion JIT enabled
Disabled Features
- Pocket integration
- Firefox Sync
- Password manager
- Safe Browsing (privacy concern)
- Normandy experiments
- Studies and recommendations
Ideal Use Cases
- Daily web browsing on personal computer
- Social media and email
- Online shopping
- Web development (DevTools available)
Amnesic Firefox
Amnesic Firefox is Cyrethium's ultra-secure browser configuration designed for maximum privacy with session-based usage. Security Score: 9.8/10
Design Philosophy
Motto: "Leave no trace"
Core Principle: Every session ends with complete data wipe. The browser starts fresh each time, leaving zero forensic traces.
What "Amnesic" Means
- All data deleted on close
- No session information stored
- Disk cache disabled (RAM only)
- No history, bookmarks, or downloads saved
- Browser resets to "zero state" on every launch
Key Differences from Hardened Firefox
Critical Security Enhancements
| Feature | Hardened | Amnesic | Impact |
|---|---|---|---|
| Letterboxing | Disabled | Enabled | Screen resolution fingerprinting blocked |
| WebGL | Enabled | Disabled | GPU fingerprinting completely blocked |
| WebRTC relay_only | Disabled | Enabled | IP leak risk eliminated |
| Disk Cache | Enabled (1GB) | Disabled | No data written to disk |
| Cookies | Persistent | Session-only | Deleted on close |
| History | Saved | Disabled | No browsing history recorded |
| WebAssembly | Enabled | Disabled | WASM attacks prevented |
| Document Fonts | Enabled | Disabled | Font fingerprinting blocked |
| DevTools | Enabled | Disabled | Reduced attack surface |
Shutdown Cleanup
On browser close, everything is wiped:
- Cache (disk and memory)
- Cookies and site data
- Browsing history
- Download history
- Form data
- Active sessions
- Site settings and permissions
- Offline app data
Security Score Breakdown
- Telemetry Protection: 10/10
- Fingerprinting Protection: 10/10 (Letterboxing + WebGL disabled)
- Tracking Protection: 10/10
- TLS/HTTPS Security: 10/10
- Cookie Management: 10/10 (Session-only)
- Cache Management: 10/10 (Disk cache disabled)
- WebRTC Security: 10/10 (relay_only enabled)
- JavaScript Security: 8/10 (JIT enabled for performance, WASM disabled)
- Network Isolation: 10/10
Performance Trade-offs
- Speed: Slower than Hardened (no disk cache, downloads everything each time)
- RAM Usage: Higher (512MB memory cache vs disk cache)
- Bandwidth: Higher consumption (no caching between sessions)
- Site Compatibility: ~70% (WebGL, WASM, web fonts disabled)
Ideal Use Cases
- Public computers (internet cafes, libraries, hotels)
- Shared devices
- Sensitive one-time operations
- Whistleblowing and activism
- Maximum privacy scenarios
Not Recommended For
- Daily browsing (requires login every time)
- Web development (DevTools disabled)
- Media consumption (slow without cache)
- Long-term projects (no history or session restore)
Comparison with Tor Browser
Similarities: Letterboxing, WebGL disabled, WASM disabled, session-only cookies, no history
Key Difference: Tor Browser has JIT disabled (more secure but slower). Amnesic has JIT enabled (faster but slightly less secure). Tor Browser includes built-in Tor routing; Amnesic requires manual Tor/VPN configuration.
Recommended Strategy
Dual Browser Approach:
- Primary: Hardened Firefox for daily use
- Special Tasks: Amnesic Firefox for sensitive operations
Hardened vs Amnesic Firefox
Quick Comparison
| Aspect | Hardened | Amnesic |
|---|---|---|
| Security Score | 9.2/10 | 9.8/10 |
| Usability | 9/10 | 6/10 |
| Performance | 8/10 | 6/10 |
| Data Persistence | Yes (logins saved) | No (wiped on close) |
| Ideal For | Daily use, personal PC | Public PC, sensitive tasks |
When to Use Each
Use Hardened Firefox When:
- Using your personal computer
- Daily web browsing, social media, email
- You want logins and settings saved
- Performance and speed matter
- Web development (DevTools needed)
Use Amnesic Firefox When:
- Using public or shared computers
- Performing sensitive one-time operations
- Maximum privacy required
- No forensic traces should remain
- Whistleblowing or activism
Key Technical Differences
Amnesic adds these protections:
- Letterboxing (screen resolution fingerprinting blocked)
- WebGL disabled (GPU fingerprinting blocked)
- WebRTC relay_only (IP leak eliminated)
- Disk cache disabled (no data written to disk)
- Session-only cookies (deleted on close)
- History disabled (no browsing history)
- WebAssembly disabled (WASM attacks prevented)
- Document fonts disabled (font fingerprinting blocked)
- DevTools disabled (reduced attack surface)
- Complete shutdown cleanup (everything wiped)
Performance Impact
Amnesic is slower because:
- No disk cache (downloads everything each visit)
- Higher RAM usage (512MB memory cache)
- Higher bandwidth consumption
- Some sites won't work (WebGL, WASM disabled)
Recommended Strategy
Use both browsers for different purposes:
- Hardened: Your daily driver for regular browsing
- Amnesic: Special tool for sensitive operations
Hardened vs Vanilla Firefox
Security Score Comparison
- Vanilla Firefox: 6.5/10 (Standard Mozilla configuration)
- Hardened Firefox: 9.2/10 (+2.7 points improvement)
Major Security Improvements in Hardened
Telemetry (Vanilla: 3/10 → Hardened: 10/10)
Vanilla: Sends data to Mozilla (telemetry, health reports, studies)
Hardened: All telemetry completely disabled, zero data sent
Fingerprinting (Vanilla: 4/10 → Hardened: 9/10)
Vanilla: Real browser fingerprint exposed
Hardened: Resist Fingerprinting enabled, standardized characteristics
WebRTC (Vanilla: 3/10 → Hardened: 8/10)
Vanilla: Local and public IP can leak
Hardened: IP hidden with no_host and default_address_only
HTTPS (Vanilla: 7/10 → Hardened: 10/10)
Vanilla: HTTP sites allowed by default
Hardened: HTTPS-Only Mode enforced, TLS 1.2+ required
Tracking (Vanilla: 7/10 → Hardened: 10/10)
Vanilla: Standard tracking protection
Hardened: Strict mode with Total Cookie Protection
Disabled in Hardened (Privacy Concerns)
- Pocket integration
- Firefox Sync
- Password manager
- Safe Browsing (sends URLs to Google)
- DNS over HTTPS (use system DNS)
- All prefetching and speculative connections
When to Use Vanilla vs Hardened
Use Vanilla if: You want maximum compatibility and don't care about privacy/security
Use Hardened if: You want strong privacy and security while maintaining usability
Amnesic Firefox vs Tor Browser
Both browsers are designed for maximum privacy and security. Here's how they compare:
Quick Comparison
| Feature | Amnesic | Tor Browser |
|---|---|---|
| Security Score | 9.8/10 | 10/10 |
| Anonymity | 8/10 (requires Cyrethonion) | 10/10 (built-in Tor) |
| Privacy | 10/10 | 10/10 |
| Performance | 6/10 | 4/10 |
Similarities (90% overlap)
Both browsers share most privacy features:
- Resist Fingerprinting (RFP) enabled
- Letterboxing enabled
- WebGL disabled
- WebAssembly disabled
- Document fonts disabled
- HTTPS-Only Mode
- WebRTC relay_only enabled
- No telemetry
- Maximum tracking protection
Critical Differences
1. Network Routing (Most Important)
Tor Browser: Built-in Tor network (3-hop routing), automatic anonymity
Amnesic: Requires manual Tor/VPN configuration (use Cyrethium's Cyrethonion tool)
2. JavaScript JIT
Tor Browser: JIT disabled (maximum security, but 10-20x slower JavaScript)
Amnesic: JIT enabled (better performance, slightly less secure)
3. Disk Cache
Tor Browser: Disk cache enabled (cleared on shutdown)
Amnesic: Disk cache disabled (RAM-only, no forensic traces)
4. DevTools
Tor Browser: DevTools available
Amnesic: DevTools disabled (reduced attack surface)
5. Session Restore
Tor Browser: Crash recovery enabled
Amnesic: No session data stored
Performance Comparison
| Scenario | Amnesic | Tor Browser |
|---|---|---|
| First visit | 1.1s | 3.0s |
| JavaScript-heavy | 3.0s | 10.0s |
When to Use Each
Use Tor Browser When:
- Maximum anonymity required
- Activism or whistleblowing
- Under censorship (built-in bridges)
- Accessing .onion sites
- Not using Cyrethium
Use Amnesic Firefox When:
- Using public computers (no disk traces)
- Using Cyrethium (with Cyrethonion)
- Need better performance than Tor
- Maximum privacy but not necessarily anonymity
- Forensic analysis protection is priority
Recommendation
For Cyrethium users: Use Amnesic Firefox with Cyrethonion for Tor routing
For non-Cyrethium users: Use Tor Browser for built-in anonymity
For public computers: Amnesic Firefox (no disk cache)
Amnesic vs Vanilla Firefox
Security Score Comparison
- Vanilla Firefox: 6.5/10
- Amnesic Firefox: 9.8/10 (+3.3 points improvement)
Critical Differences
Data Persistence
Vanilla: Everything saved (history, cookies, cache, logins)
Amnesic: Everything deleted on close, zero traces left
Forensic Analysis
Vanilla: Forensic analysis possible (data on disk)
Amnesic: Forensic analysis impossible (no disk cache, RAM-only)
Fingerprinting
Vanilla: Real fingerprint exposed (WebGL, fonts, screen resolution)
Amnesic: Maximum protection (WebGL disabled, letterboxing, no fonts)
Telemetry
Vanilla: Sends data to Mozilla
Amnesic: Zero telemetry
Performance Comparison
| Metric | Vanilla | Amnesic |
|---|---|---|
| First visit | 1.0s | 1.1s |
| Second visit | 0.3s (cached) | 1.1s (no cache) |
| Site compatibility | 100% | ~70% |
Use Case Decision
Use Vanilla for: Daily browsing with maximum compatibility (if you don't care about privacy)
Use Amnesic for: Public computers, sensitive operations, maximum privacy scenarios
Recommendation: Never use Vanilla. Use Hardened for daily browsing and Amnesic for sensitive tasks.
How to Remove a Tool
Cyrethium's tools come pre-integrated into the system. They are not distributed as .deb packages — instead, they are executed directly from source code.
This design ensures transparency and eliminates any suspicion of tampering. Because of this, tools cannot be removed using apt remove.
It is not recommended to remove built-in tools, as many of them are interconnected or dependent on each other. If you delete one, you won't be able to restore it, since Cyrethium does not use any official repositories.
Still, the choice is yours — just make sure you know exactly what you're doing.
Tool Locations
Tools are typically located in the following directories:
/usr/bin
/usr/local/bin
/opt/ # In the full Cyrethium edition, this directory only contains Anti-Exploit Suite modules.
To remove a specific tool, navigate to its location and delete it manually.
Additionally, remove its desktop shortcut (if present) from:
/usr/share/applications/toolname.desktop
Tool Submission
If you have developed a tool focused on privacy, security, or threat analysis, you can include your project in the review process. Every tool submitted to the community is evaluated for compliance with system policies and security standards.
Submission Rules:
- The tool must be completely open-source.
- The codebase must be secure, reviewable, and suitable for independent verification.
- The tool's operating principles must not share data with third-party services.
- Tools deemed appropriate after security review are added to the system.
Eligibility Areas:
The tool must focus on at least one of the following categories:
- Privacy
- Security
- Threat Analysis
- Cryptocurrency Security
- Attack Detection / Prevention
Preferred Programming Languages
The language used when developing a tool is critically important in terms of security, performance, and system compatibility. Some languages commonly used in Linux-based systems are preferred because they provide both easy integration and a high level of security.
Python:
It is one of the most preferred languages for cybersecurity tools. Thanks to its modular structure, rich library ecosystem, and easily readable syntax, it offers rapid development opportunities. It is very effective in areas such as network traffic analysis, log examination, and system interaction. It is the most used language in Cyrethium tools.
Shell (Bash):
It is a reliable and fast scripting language found natively on Linux systems. It is preferred for system management, automation, log cleaning, network configuration, and maintenance operations. Since it provides direct access to kernel commands, it offers high control in security tests and system operations.
Perl:
It is powerful in text processing and regular expressions (regex). It offers high performance in situations where network logs, analysis data, or system records need to be processed. Thanks to its powerful script infrastructure, it can work compatibly with old systems.
Lua:
It is a lightweight and embeddable scripting language. It uses few resources in the system, making it ideal for plugin-based or modular security tools. Thanks to its simple syntax, it supports rapid script development.
Go (Partial):
Go is suitable for developing high-performance and concurrent applications. It is especially preferred in tools with high network connectivity and processing intensity. Although its statically compiled structure provides a security advantage, it should be used carefully in terms of file size and dependencies.
Security and Ethical Principles
Every tool submitted is independently reviewed and evaluated according to the following principles:
- Every tool must protect user privacy.
- It cannot contain background connections, telemetry, or data collection operations.
- Malicious, exploitable, or code that can be used for unethical purposes is strictly rejected.
- The goal is to create an ecosystem that protects users' privacy, security, and digital freedom.
Building Cyrethium ISO
Cyrethium ISOs are created using Live-Build, Debian's official image creation tool. Live-Build is a powerful and flexible tool designed to produce customized live operating system images on Debian-based systems.
What is Live-Build?
Live-Build allows developers to compile their own Debian-based distributions in a modular way. That is, when creating an ISO, all details such as which packages will be installed, which services will be active, and which configuration files will be included can be defined. This way, the created ISO becomes completely controllable and reproducible.
Why is Live-Build Used?
Official Debian standard:
It is a tool developed and supported by Debian, which provides a great advantage in terms of stability and security.
Transparent structure:
How the image is produced is completely defined by scripts. This facilitates version management, debugging, and external contributions.
Reproducibility:
When the same configuration files are used, every developer can produce the same ISO. This is important for security because the result becomes deterministic.
Flexibility:
Components such as kernel, desktop environment, package sources, or system settings can be easily changed. This way, custom configured versions, test images, or lightweight versions can be prepared.
General Build Logic
The Live-Build process consists of several basic stages:
Configuration:
The system's architecture, desktop environment, packages to be included, and other parameters are determined with the lb config command.
Build (Compilation):
The live system image is created according to the configuration by running the lb build command. At this stage, the tool downloads the necessary Debian packages, creates the file system, and produces the ISO file.
Customization:
Developers can add additional files, scripts, or configurations using directories like config/includes.chroot/. This method allows the distribution's unique identity to be included in the ISO.
More Information
For comprehensive technical documentation and examples about Live-Build, you can review Debian's official Live-Build guide:
https://live-team.pages.debian.net/live-manual/html/live-manual/index.en.html
Python
Python is the most used programming language in the Cyrethium ecosystem. The reason for this is not just its popularity, but the balance it offers in terms of security, readability, and system integration. It has a wide range of uses in the cybersecurity field, both on the analysis and automation sides.
Why Python?
Readability and ease of maintenance
Python's syntax is simple and the logic of the code can be easily followed. This is a critical feature in security tools because complex and hidden behaviors can be easily noticed. The code being open allows it to be quickly audited by third-party developers.
Wide library ecosystem
Python contains many powerful modules such as socket, asyncio, requests, scapy, psutil, cryptography. This way, functions such as network traffic analysis, process monitoring, encryption, exploit detection, or log examination can be done without needing additional code.
Rapid prototyping
Security tools generally require rapid testing and validation cycles. Python's dynamic structure makes it possible to prototype and test a complex tool in a short time. This provides a great advantage in terms of time in security-focused development.
Cross-platform compatibility
Python code can often run on Linux, Windows, and macOS without any changes. This situation allows developers to test their tools without being limited to just one environment.
Python's Advantages in Linux Environment
Built-in support:
Most Linux distributions come with Python. It does not require extra installation or dependencies. This facilitates system integration and post-distribution operation.
Access to system APIs:
Python can interact directly at the system level on Linux with modules like os, subprocess, fcntl, signal. This way, many operations from network configurations to process management can be automated securely.
Community support:
Linux and Python communities have been intertwined for years. There are plenty of resources and active developer support on security, performance, and debugging.
Python's Security
Python is considered secure at the language level, but "how it is used" is determinative in terms of security. It is not harmful itself; however, there are some points to be careful about:
Pros:
- Since memory management is automatic, classic vulnerabilities like buffer overflow do not occur.
- Since code readability is high, it is difficult to add or hide backdoors.
- Thanks to the large security community, vulnerabilities are generally detected quickly.
Cons:
- It is slower than compiled languages, so it is not preferred in performance-critical applications.
- Third-party libraries should be chosen carefully; a malicious or unmaintained module can create a security risk.
Conclusion
Python is the primary language preferred by developers in Cyrethium because it strikes a balance between security and accessibility. It provides both powerful integration at the system level and allows for the development of fast, readable, and reliable tools. When used correctly, Python is a strong, easy-to-maintain, and reliable foundation in terms of security.
Shell (Bash) Scripting
Shell is the natural language of Linux systems. For many system administrators, security experts, and developers, Shell is the simplest way to speak directly with the system. In Linux-based projects like Cyrethium, Shell scripts are indispensable in terms of automation, system control, and privacy operations.
Why Shell?
Direct interaction with the system
Shell is the language closest to the kernel and basic Linux tools. It provides direct access to system resources, network configurations, and process management with commands like iptables, systemctl, grep, awk, sed, ps. This way, powerful operations can be performed without needing external libraries.
Lightweight and fast
It does not require compilation, dependencies, or large runtime environments. It is already present on every modern Linux system. This makes scripts both portable and minimal.
Ease of automation and system management
Tasks such as log cleaning, network configuration, service startup, or system maintenance can be done securely with a few lines of Bash script. Shell is suitable for the philosophy of "doing the job quickly, quietly, and effectively."
Ideal for privacy and security-focused operations
Shell is the most reliable method for sensitive tasks such as disk cleaning, log deletion, temporary file destruction, or system settings reset. Because the layer it operates on is directly at the operating system's control level.
Its Power in Linux Environment
Comes built-in:
All Debian-based systems include Shell interpreters like Bash or Dash by default. This way, scripts work the same in every environment.
Integration with tool chain:
Everything is a file in Linux; this gives Shell great flexibility. When scripts are used together with tools like grep, cut, tr, awk, sed, they can quickly accomplish even complex data processing tasks.
Ease of maintenance and debugging:
Shell scripts are plain text, so they are easy to read, edit, and test. Debugging can be done with commands like set -x or trap.
Shell's Security
Shell is a quite reliable language when run in a secure environment, but there are some points to be careful about:
Pros:
- Since the source code is open, hidden behaviors are easy to notice.
- Since it has few external dependencies, the attack surface is low.
- It provides high access control; it can be easily restricted through file permissions and user levels.
Cons:
- If user inputs are processed directly, command injection risk may arise.
- Error management can become difficult in large or complex projects.
- Incorrect use of variables can lead to unexpected results on the system (especially with commands like rm, eval, sudo).
Conclusion
Shell is the backbone of Linux. As the cornerstone of security, system control, and automation, it stands out with both its simplicity and power. Its ability to communicate directly with the system makes it one of the most reliable tools in privacy-focused systems. When written correctly, Shell scripts are fast, portable, auditable, and secure.
AI in Cyrethium
In the Cyrethium project, artificial intelligence (AI) is used as an auxiliary analysis tool in specific areas. The goal is not to replace the developer; it is to speed up development processes, increase code quality, and detect possible errors earlier. Artificial intelligence is never an independent decision-maker in Cyrethium — it always works as a supervised, limited-authority auxiliary module.
Areas Where Artificial Intelligence is Used
Code Analysis
Artificial intelligence detects erroneous structure, unnecessary complexity, or possible risky operations by scanning the source codes of developed tools. It examines the readability and structural consistency of the code. In this process, static analysis methods are combined with AI-based patterns.
Code Evaluation
AI evaluates the general design of the code; it offers suggestions in terms of functional consistency, logic errors, unnecessary repetitions, and modular structure. This evaluation is done automatically, but every suggestion is reviewed by the developer.
Performance Analysis
The code is analyzed through metrics such as efficiency, processing time, and resource usage. Artificial intelligence can detect sections that may create bottlenecks especially in Python and Shell scripts and suggest alternative solutions. This saves development time and facilitates optimization.
Security Analysis (Security Review)
AI can flag dangerous function calls, weak encryption methods, incorrect permission management, or lines that carry injection risk in the code. This system combines the classic "static code analyzer" logic with a suggestion system to help the developer.
Website and Simple Shell Scripts
Artificial intelligence is also used in organizing website content, correcting language errors, and writing simple Shell scripts. Since these types of operations are low-risk and predictable in structure, they can be carried out quite quickly and safely with AI assistance.
Areas Where Artificial Intelligence is Not Used
Artificial intelligence is only activated in certain, safe areas in Cyrethium. It is consciously not used in the following areas because these processes require high precision and deterministic behavior:
- Complex tool development processes
- Tor routing infrastructure and anonymity mechanisms
- System hardening operations
- ISO or system build process (build pipeline)
Using artificial intelligence in these areas is risky; even a small error can damage system integrity or compromise security. Therefore, all critical building blocks are created entirely manually, with human oversight.
A Realistic Assessment
Artificial intelligence is still inadequate in complex software architectures or low-level network operations. It has no decision-making mechanism of its own; it can make incorrect inferences in incorrect or incomplete contexts. Therefore, entrusting complex security tools, anonymity infrastructure, or system kernel configurations to AI would be technically irresponsible.
On the other hand, it saves serious time in simple scripts, debugging, and code optimization. Especially in areas such as reviewing repetitive tasks or small code pieces, artificial intelligence reduces the developer's workload. This way, human energy can be directed to more creative, strategic, and security-critical tasks.
Conclusion
Artificial intelligence is not an "automatic decision-maker" in Cyrethium, it is an "assistant." It does not replace humans; it helps humans direct their attention to more important issues. It can fail in complex systems, but when used in the right place, it increases productivity and raises the quality of development. The basic principle of security applies here too: control is always with humans.
Exit Node Attacks
When you use Tor or similar anonymity networks, your internet traffic passes through multiple relay nodes before reaching its destination. The last node in this chain is called the "exit node" — it's the point where your traffic leaves the Tor network and enters the regular internet.
What is an Exit Node Attack?
An exit node attack occurs when a malicious actor operates an exit node to intercept, monitor, or modify your traffic. Since the exit node can see the final destination and content of unencrypted traffic, it poses a significant privacy risk.
How Exit Node Attacks Work
When your data reaches the exit node, it's decrypted from Tor's encryption layers. If you're visiting an HTTP (not HTTPS) website, the exit node operator can:
- Read your traffic: See what websites you visit, what you search for, and what data you send.
- Steal credentials: Capture usernames, passwords, and session cookies if they're sent over unencrypted connections.
- Modify content: Inject malicious code, change website content, or redirect you to phishing sites.
- Track patterns: Analyze your browsing habits and timing patterns.
Real-World Risks
Studies have shown that a small percentage of Tor exit nodes are operated by malicious actors who actively sniff traffic. Some exit nodes have been caught:
- Harvesting login credentials from HTTP sites
- Injecting cryptocurrency mining scripts into web pages
- Redirecting users to fake banking sites
- Collecting email addresses and personal information
How to Protect Yourself
1. Always Use HTTPS
HTTPS encrypts your connection end-to-end, meaning even if the exit node is malicious, it cannot read or modify your traffic. Always check for the padlock icon in your browser.
2. Use HTTPS Everywhere
Browser extensions like HTTPS Everywhere automatically upgrade HTTP connections to HTTPS when possible, reducing exposure to exit node attacks.
3. Avoid Sensitive Activities on Tor
Don't log into important accounts (banking, email, social media) over Tor unless absolutely necessary. If you must, ensure the site uses HTTPS.
4. Use End-to-End Encryption
For messaging and file transfers, use tools with end-to-end encryption like Signal, PGP, or encrypted file sharing services.
5. Verify Certificates
Be alert for certificate warnings. A malicious exit node might attempt a man-in-the-middle attack by presenting fake certificates.
Cyrethium's Protection
Cyrethium includes hardened Firefox variants that:
- Enforce HTTPS connections whenever possible
- Warn about insecure connections
- Block mixed content (HTTP content on HTTPS pages)
- Provide strong certificate validation
Advanced Protection Techniques
Use Onion Services When Possible
Onion services (websites ending in .onion) provide end-to-end encryption within the Tor network. When you access an onion service, your traffic never leaves the Tor network, eliminating exit node risks entirely.
Implement Multi-Layer Encryption
For sensitive communications, use multiple layers of encryption:
- PGP/GPG for email encryption
- OTR or Signal Protocol for instant messaging
- VeraCrypt for file encryption before transfer
Monitor Your Connections
Use tools to verify your connections are secure:
- Check SSL/TLS certificate details
- Use browser extensions that show connection security
- Monitor for unexpected certificate changes
Real-World Exit Node Attack Examples
2007: Egerstad's Experiment
Security researcher Dan Egerstad operated several Tor exit nodes and captured thousands of email credentials from embassies and government organizations. This demonstrated that exit nodes could be used for mass surveillance of unencrypted traffic.
2020: Cryptocurrency Theft
Malicious exit nodes were caught modifying Bitcoin and cryptocurrency addresses in HTTP traffic, redirecting payments to attackers' wallets. This resulted in significant financial losses for users who didn't verify addresses.
SSL Stripping Attacks
Some exit nodes have attempted to downgrade HTTPS connections to HTTP, making traffic readable. Modern browsers now have protections against this, but it remains a concern.
How to Verify Exit Node Safety
Check Exit Node Reputation
Some organizations maintain lists of known malicious exit nodes. While Tor automatically avoids flagged nodes, staying informed helps you understand the threat landscape.
Use Tor Browser's Security Slider
Tor Browser includes a security slider that can be set to "Safest" mode, which:
- Disables JavaScript on all sites
- Blocks some fonts and symbols
- Disables video and audio playback
- Makes sites display only static content
Regularly Change Circuits
Don't use the same exit node for extended periods. Tor Browser allows you to request a new circuit (New Identity), which changes your exit node and makes long-term monitoring harder.
The Bottom Line
Exit node attacks are a real threat, but they're largely preventable. The key is to always use encrypted connections (HTTPS) and avoid sending sensitive information over unencrypted channels. Tor provides anonymity by hiding your identity and location, but it doesn't automatically encrypt your traffic to the final destination — that's your responsibility.
Remember: Tor is designed to protect your anonymity (who you are), not the content of your communications. Content protection is achieved through encryption (HTTPS, PGP, etc.). Use both together for complete protection.
Correlation Attacks
Correlation attacks are one of the most sophisticated threats to anonymity networks like Tor. Unlike exit node attacks that focus on the content of your traffic, correlation attacks aim to identify who you are by analyzing patterns in network traffic.
What is a Correlation Attack?
A correlation attack works by observing traffic entering and leaving the Tor network, then using statistical analysis to match patterns. If an attacker can monitor both where traffic enters the network (entry node) and where it exits (exit node), they can potentially link the two and identify the user.
How Correlation Attacks Work
The basic principle is simple but powerful:
1. Traffic Observation
An attacker monitors network traffic at multiple points — ideally at both the entry and exit of the Tor network. This could be done by:
- Operating multiple Tor nodes (entry, middle, and exit)
- Compromising internet service providers (ISPs)
- Monitoring internet exchange points
- Controlling network infrastructure in certain regions
2. Pattern Analysis
The attacker analyzes characteristics of the traffic, such as:
- Timing: When packets are sent and received
- Volume: How much data is transferred
- Packet sizes: The size of individual data packets
- Traffic bursts: Patterns of activity and idle periods
3. Correlation
By comparing these patterns, the attacker tries to match traffic entering the network with traffic exiting it. If the patterns are similar enough, they can conclude that both streams belong to the same user.
Types of Correlation Attacks
Timing Correlation
This is the most common type. When you send a message through Tor, it takes a certain amount of time to travel through the network. By measuring when traffic enters and exits, an attacker can identify connections with matching timing patterns.
Volume Correlation
If you download a large file or stream video, the amount of data transferred creates a unique pattern. An attacker monitoring both ends can match these volume patterns to identify you.
Website Fingerprinting
Even with encryption, different websites have unique traffic patterns (page sizes, number of resources, loading sequences). An attacker can create "fingerprints" of websites and match them to your traffic.
Who Can Perform Correlation Attacks?
Correlation attacks require significant resources and are typically performed by:
- Nation-state actors: Governments with access to internet infrastructure
- Large ISPs: Companies that can monitor traffic at scale
- Well-funded organizations: Groups that can operate many Tor nodes
These attacks are not practical for average attackers due to the need for widespread network monitoring.
Limitations of Correlation Attacks
While powerful, correlation attacks have limitations:
- They require monitoring both entry and exit points
- They work better with longer observation periods
- They produce probabilistic results, not certainty
- They're less effective when many users are active simultaneously
- They can be disrupted by traffic padding and timing obfuscation
How to Defend Against Correlation Attacks
1. Use Bridges
Tor bridges are entry nodes that aren't publicly listed. Using bridges makes it harder for attackers to know you're using Tor and monitor your entry point.
2. Avoid Patterns
Don't use Tor at predictable times or for predictable durations. Vary your usage patterns to make correlation more difficult.
3. Use Additional Layers
Consider using VPN + Tor or Tor + VPN combinations to add extra layers that make correlation harder (though this has trade-offs).
4. Limit Session Length
Shorter sessions provide less data for correlation. Don't stay connected for hours at a time if you can avoid it.
5. Avoid High-Bandwidth Activities
Streaming video or downloading large files creates distinctive patterns. Use Tor primarily for browsing and messaging.
Cyrethium's Approach
Cyrethium helps mitigate correlation attacks by:
- Supporting Tor bridge configuration
- Providing tools to manage Tor circuits
- Implementing traffic isolation between applications
- Offering guidance on safe usage patterns
Advanced Mitigation Techniques
Traffic Padding and Obfuscation
Some advanced techniques can make correlation harder:
- Constant-rate traffic: Send dummy packets to maintain consistent traffic flow
- Random delays: Add random delays between packets to disrupt timing patterns
- Traffic morphing: Make your traffic look like normal web browsing
Note: These techniques are mostly implemented at the network level and may impact performance.
Use Pluggable Transports
Pluggable transports disguise Tor traffic as other types of traffic:
- obfs4: Makes Tor traffic look random and unidentifiable
- meek: Tunnels Tor through HTTPS connections to popular websites
- Snowflake: Uses temporary proxies provided by volunteers
Compartmentalize Your Activities
Don't mix different activities in the same Tor session:
- Use separate Tor sessions for different identities
- Don't browse personal sites and anonymous sites in the same session
- Restart Tor Browser between different activities
Real-World Correlation Attack Cases
Operation Onymous (2014)
Law enforcement agencies used traffic correlation to identify and shut down multiple dark web marketplaces. While the exact methods remain classified, it's believed they monitored both entry and exit traffic over extended periods.
Academic Research Demonstrations
Researchers have successfully demonstrated correlation attacks in controlled environments:
- Identifying users with 90%+ accuracy when controlling 10% of network nodes
- De-anonymizing users through website fingerprinting with machine learning
- Tracking users across sessions using timing analysis
The Silk Road Case
While Ross Ulbricht's capture involved multiple factors, traffic analysis played a role in the investigation. This case highlighted that even sophisticated Tor users can be identified through persistent monitoring and correlation.
Understanding Your Threat Model
Low-Resource Attackers
Individual hackers or small groups typically cannot perform correlation attacks. They lack the infrastructure to monitor multiple network points simultaneously.
Medium-Resource Attackers
Large corporations or well-funded criminal organizations might attempt correlation attacks but face significant technical and legal barriers.
High-Resource Attackers
Nation-states and intelligence agencies have the capability to perform sophisticated correlation attacks:
- Access to internet backbone infrastructure
- Ability to operate multiple Tor nodes
- Advanced traffic analysis tools and expertise
- Legal authority to compel ISPs to provide data
Practical Defense Strategy
Layer Your Defenses
- Use Tor correctly: Follow best practices and avoid common mistakes
- Add bridges: Hide the fact that you're using Tor
- Limit session duration: Don't stay connected for hours
- Vary your patterns: Don't use Tor at the same time every day
- Use additional tools: Consider VPN + Tor for extra protection
Operational Security (OPSEC)
Technical defenses alone aren't enough. Good OPSEC is crucial:
- Never reveal personal information
- Don't reuse usernames or passwords
- Be consistent with your anonymous identity
- Avoid time zone leaks in communications
- Don't mix anonymous and personal activities
The Reality Check
Correlation attacks are a serious threat, but they require substantial resources and expertise. For most users, the risk comes from more mundane mistakes like:
- Logging into personal accounts over Tor
- Using the same username across clearnet and Tor
- Revealing identifying information in communications
- Not using HTTPS
- Poor operational security practices
Focus on basic operational security first, then worry about advanced attacks.
Key Takeaway: Correlation attacks are theoretically possible but practically difficult. If you're facing a nation-state adversary, Tor alone may not be sufficient. However, for most users protecting against surveillance, tracking, and censorship, Tor combined with good OPSEC provides strong protection.
P2P Networks
Peer-to-Peer (P2P) networks are decentralized systems where participants (peers) communicate directly with each other without relying on central servers. Unlike traditional client-server models, P2P networks distribute both data and processing across all participants.
How P2P Networks Work
In a P2P network, every participant acts as both a client and a server. When you want to access a resource:
- Your computer connects to the P2P network
- You search for the resource you need
- The network helps you find peers who have that resource
- You download directly from those peers
- While downloading, you also share what you have with others
Types of P2P Networks
Unstructured P2P
Peers connect randomly without any organized structure. Examples include early file-sharing networks like Gnutella. These are simple but inefficient for finding specific content.
Structured P2P (DHT)
Uses Distributed Hash Tables (DHT) to organize data efficiently. Each peer is responsible for a specific range of data. BitTorrent and IPFS use this approach. It's more efficient but more complex to implement.
Hybrid P2P
Combines P2P with some central coordination. For example, BitTorrent uses trackers (central servers) to help peers find each other, but the actual file transfer is P2P.
Advantages of P2P Networks
1. Decentralization
No single point of failure. If some peers go offline, the network continues functioning. This makes P2P networks resilient to censorship and attacks.
2. Scalability
As more peers join, the network becomes stronger and faster. Each new peer adds resources rather than consuming them from a central server.
3. Cost Efficiency
No need for expensive server infrastructure. The network's capacity grows organically with its user base.
4. Censorship Resistance
Difficult to shut down since there's no central authority. Content is distributed across many peers in different locations.
Challenges of P2P Networks
1. Bootstrap Problem
How does a new peer find the network? P2P networks need some initial connection points (bootstrap nodes) to get started. If these are blocked or unavailable, joining becomes difficult.
2. NAT Traversal
Most home internet connections use NAT (Network Address Translation), which makes direct peer-to-peer connections difficult. P2P networks need techniques like hole punching or relay nodes to work around this.
3. Security Concerns
- Sybil Attacks: An attacker creates many fake identities to gain control of the network
- Eclipse Attacks: Isolating a peer by surrounding it with malicious nodes
- Data Poisoning: Distributing corrupted or malicious data
- Privacy Leaks: Your IP address is visible to peers you connect with
4. Performance Issues
Finding content can be slow, especially in unstructured networks. Not all peers have good bandwidth or stay online consistently.
P2P and Privacy
P2P networks have complex privacy implications:
Privacy Advantages:
- No central server logging your activities
- Difficult to monitor the entire network
- Content is distributed, not centrally stored
Privacy Risks:
- Your IP address is visible to peers
- Monitoring nodes can track who requests what
- Traffic analysis can reveal patterns
- Some P2P protocols leak metadata
P2P in Anonymity Networks
Some anonymity networks use P2P principles:
I2P (Invisible Internet Project)
A fully P2P anonymity network where all participants route traffic for each other. Unlike Tor's directory-based approach, I2P uses a distributed network database.
Freenet
A P2P platform designed for censorship-resistant publishing. Content is distributed across the network and can't be removed by any single party.
Advantages for Anonymity:
- No central directories to compromise
- Harder to map the entire network
- More resilient to attacks
Challenges for Anonymity:
- More complex to secure properly
- Slower performance
- Harder to analyze security properties
Using P2P Safely
1. Use a VPN or Proxy
Hide your real IP address from other peers. This is especially important for file-sharing P2P networks.
2. Verify Content
Always check hashes and signatures of downloaded content to ensure it hasn't been tampered with.
3. Limit Exposure
Don't share sensitive personal files on P2P networks. Assume anything you share will become public.
4. Use Encryption
Choose P2P applications that encrypt traffic between peers to prevent eavesdropping.
5. Be Aware of Legal Issues
Some P2P activities may be illegal in your jurisdiction. Understand the laws before participating.
P2P in Cyrethium
Cyrethium includes support for privacy-focused P2P networks:
- I2P: Pre-configured for anonymous P2P communication
- Tor: Can be used with some P2P applications (though not recommended for high-bandwidth activities)
The Future of P2P
P2P technology continues to evolve:
- Blockchain: Cryptocurrencies use P2P networks for decentralized consensus
- IPFS: A P2P file system aiming to replace HTTP
- Decentralized social media: Platforms like Mastodon use federated P2P principles
- Mesh networks: P2P networks that can work without internet infrastructure
Modern P2P Applications
Cryptocurrency and Blockchain
Bitcoin and other cryptocurrencies use P2P networks for:
- Transaction broadcasting: Sharing new transactions across the network
- Block propagation: Distributing new blocks to all nodes
- Consensus: Agreeing on the state of the blockchain without central authority
This creates a trustless system where no single entity controls the currency.
Decentralized File Storage
IPFS (InterPlanetary File System):
- Content-addressed storage where files are identified by their hash
- Automatic deduplication across the network
- Permanent web - content can't be deleted if someone hosts it
- Faster downloads by fetching from multiple peers
Filecoin: Adds economic incentives to IPFS, paying users to store others' data.
Decentralized Communication
Matrix Protocol:
- Federated chat system with no central server
- End-to-end encryption by default
- Bridges to other platforms (Discord, Telegram, Slack)
Briar:
- P2P messaging that works without internet
- Uses Bluetooth, WiFi, and Tor for connections
- Perfect for censored environments
P2P Security Best Practices
For File Sharing
- Always verify hashes: Check file integrity before opening
- Use a VPN: Hide your IP from other peers
- Scan downloads: Run antivirus on all downloaded files
- Limit upload bandwidth: Prevent your connection from being overwhelmed
- Use reputable clients: Stick to well-known, open-source P2P software
For Cryptocurrency
- Run your own node: Don't trust third-party nodes with your transactions
- Use Tor: Hide your IP when broadcasting transactions
- Verify connections: Ensure you're connected to legitimate peers
- Keep software updated: Protect against known vulnerabilities
For Anonymous Communication
- Verify identities: Use key fingerprints to confirm contacts
- Enable encryption: Always use end-to-end encryption
- Minimize metadata: Use protocols that hide who talks to whom
- Regular key rotation: Change encryption keys periodically
P2P vs Traditional Networks
When P2P is Better:
- Need for censorship resistance
- Distributing large files to many users
- Building systems that must survive attacks
- Creating trustless environments
- Reducing infrastructure costs
When Traditional is Better:
- Need for guaranteed performance
- Require strong consistency guarantees
- Need centralized control and moderation
- Building simple applications quickly
- Serving latency-sensitive content
The Future of P2P
Web3 and Decentralized Web
The next generation of the internet is being built on P2P principles:
- Decentralized identity: Control your own identity without relying on companies
- Decentralized storage: Store data across the network, not on company servers
- Decentralized computing: Run applications on distributed networks
- Decentralized finance (DeFi): Financial services without banks
Mesh Networks
P2P networks that work without internet infrastructure:
- Devices connect directly to nearby devices
- Create local networks in areas without internet
- Provide communication during disasters or censorship
- Examples: NYC Mesh, Freifunk, Guifi.net
Edge Computing
Combining P2P with edge computing for:
- Faster content delivery by caching at the edge
- Reduced latency for real-time applications
- More efficient use of network resources
Common P2P Misconceptions
Myth: P2P is only for piracy
Reality: P2P is a neutral technology used for many legitimate purposes including software distribution (Linux ISOs), scientific data sharing, and decentralized applications.
Myth: P2P is always anonymous
Reality: Most P2P networks expose your IP address. You need additional tools (VPN, Tor) for anonymity.
Myth: P2P is slow
Reality: P2P can be faster than traditional downloads because you download from multiple sources simultaneously.
Myth: P2P networks can't be controlled
Reality: While harder to shut down, P2P networks can still be attacked through Sybil attacks, legal pressure, or infrastructure blocking.
Conclusion
P2P networks offer powerful decentralization and resilience, but they come with complexity and security challenges. When designed well, they can provide censorship resistance and scalability. However, they require careful implementation to protect user privacy and security. Understanding how P2P networks work helps you use them safely and effectively.
Key Takeaway: P2P is not just a technology for file sharing - it's a fundamental architecture for building decentralized, resilient systems. As the internet evolves, P2P principles are becoming increasingly important for privacy, freedom, and innovation.
Anti-Forensic Utilities
Cyrethium includes a suite of anti-forensic utilities designed to reduce user privacy and data persistence. These tools target temporary data, swap contents, RAM traces, logs, and temporary files that may remain during system shutdown/logout processes. These features are optional and controlled centrally through a management tool.
Note: Anti-forensic measures can make data recovery difficult or impossible. Developers accept no responsibility for the use of this tool.
What Do Anti-Forensic Settings Do?
RAM Cleaning/Encryption (on-shutdown RAM scrub)
High-level cleaning processes are applied to reduce the impact of temporary data (memory representations) held in kernel/user space during shutdown.
Swap/Hibernation Cleanup
Active swap areas and hibernation (suspend-to-disk) files (if any) are securely handled at shutdown or reboot.
Temporary Directories and tmp Cleanup
/tmp, user temp directories, application temporary folders, and caches are targeted.
Log Rotation and Cleanup
Unnecessary details and old entries in system, application, and user logs are processed according to secure policies.
Journalctl & systemd Log Management
Compatible with journal configuration, reducing to the minimum required information level in traditional logs and defining client-side buffer cleanup operations.
Warnings
Data Loss Risk
Aggressive cleaning can cause permanent data loss. Always backup important data.
Performance Impact
Deep cleaning processes can extend shutdown time and may briefly affect system stability in some cases.
Compatibility
Hibernation/swap policies may cause unexpected behavior on some systems — test device/driver compatibility.
DNSCrypt-Proxy
DNSCrypt-Proxy is a local DNS resolver that encrypts DNS queries and optionally redirects them to modern protocols like caching, filtering, or DNS-over-HTTPS/DoT. Purpose: Prevent DNS queries from being observed, modified, or manipulated.
Core Components
Local Proxy (dnscrypt-proxy) Service
Listens on 127.0.0.1:53 or another port and receives DNS requests from applications.
Resolver Providers
Remote resolvers supporting DNSCrypt, DoH (DNS-over-HTTPS), DoT (DNS-over-TLS).
Cache and Filtering Layer
Caches responses; can also apply hosts-based blocking or RPZ-style filtering.
How It Works — Step by Step
- Application makes a DNS query (e.g., example.com).
- Query goes to local dnscrypt-proxy (routed via system DNS settings / resolv.conf or systemd-resolved compatible).
- dnscrypt-proxy sends the query to the selected remote resolver over a secure channel (DoH/DoT/DNSCrypt).
- Remote resolver's response comes back; proxy caches the response and returns it to the client.
Security/Critical Points
Query Privacy
DNS queries are encrypted, making it harder for ISPs and intermediaries to monitor queries. However, the target IP address and traffic are still visible — DNS privacy alone does not provide complete anonymity.
Metadata Leakage
Remote resolver selection is important; a single resolver can see all your queries. Preferred method: use trusted, multiple, or rotational resolvers.
Application Notes for Cyrethium
Filtering
Use ad/telemetry/tracker block lists — but remember these lists can produce false positives.
Cyrethium DNSCrypt Manager
Overview
DNSCrypt Manager is a tool that protects your privacy by encrypting your DNS queries. It provides secure and anonymous DNS resolution using DNSCrypt-proxy.
Usage
cryethium-dnscrypt
Main Menu
1. Start DNSCrypt (Onetime)
Starts DNSCrypt once for testing or temporary use.
Use Cases: Testing purposes, temporary use, configuration check
Note: Stops when system is restarted.
2. Set DNSCrypt Service (Autostart)
Installs DNSCrypt service and enables automatic startup.
Features: Starts automatically at system boot, persistent configuration, systemd integration
3. Restart DNSCrypt Service
Restarts the DNSCrypt service.
When to Use: After configuration changes, during connection issues, after server changes
4. Remove DNSCrypt Service
Stops and removes the DNSCrypt service.
Actions: Stops the service, disables automatic startup, preserves configuration (does not delete)
5. Check DNSCrypt
Checks DNSCrypt configuration.
Checks: Configuration file validity, current DNS servers, test query (example.com)
6. Check DNSCrypt Service Status
Shows DNSCrypt service status.
Information Displayed: Service status (active/inactive), uptime, recent logs, error messages
7. Exit
Exits the program.
Configuration
Configuration File Location: /etc/dnscrypt-proxy/dnscrypt-proxy.toml
Popular Servers:
- cloudflare: Cloudflare DNS (1.1.1.1)
- google: Google DNS (8.8.8.8)
- quad9: Quad9 DNS (9.9.9.9)
- adguard: AdGuard DNS (ad blocking)
DNS Leak Testing
Test Methods
1. Online Test
# In browser:
https://dnsleaktest.com/
https://www.dnsleaktest.org/
2. Command Line
# Check current DNS server
nslookup google.com
# Should see DNSCrypt server (127.0.0.1)
3. Test with DNSCrypt
sudo dnscrypt-proxy -resolve example.com
Troubleshooting
DNSCrypt Won't Start
Problem: Service won't start
# Stop conflicting service
sudo systemctl stop systemd-resolved
# Start DNSCrypt
sudo systemctl start dnscrypt-proxy
DNS Not Resolving
Problem: Cannot access websites
# Check DNSCrypt status
sudo systemctl status dnscrypt-proxy
# Check configuration
sudo dnscrypt-proxy -check
# Restart service
sudo systemctl restart dnscrypt-proxy
Slow DNS Resolution
Problem: DNS queries are slow
# Select faster server
sudo nano /etc/dnscrypt-proxy/dnscrypt-proxy.toml
# Change server_names:
server_names = ['cloudflare']
# Restart service
sudo systemctl restart dnscrypt-proxy
Configuration Error
Problem: "Configuration check failed"
# Check configuration
sudo dnscrypt-proxy -check
# Fix syntax error
sudo nano /etc/dnscrypt-proxy/dnscrypt-proxy.toml
# Restore default configuration
sudo cp /etc/dnscrypt-proxy/dnscrypt-proxy.toml.example /etc/dnscrypt-proxy/dnscrypt-proxy.toml
Advanced Configuration
Ad Blocking
[blocked_names]
blocked_names_file = '/etc/dnscrypt-proxy/blocked-names.txt'
blocked-names.txt:
# Ad servers
ads.google.com
doubleclick.net
adserver.com
Custom Server Addition
[static.'my-server']
stamp = 'sdns://...'
Fallback DNS
fallback_resolver = '9.9.9.9:53'
Query Logging
[query_log]
file = '/var/log/dnscrypt-proxy/query.log'
format = 'tsv'
Performance Optimization
Cache Settings
cache = true
cache_size = 1024
cache_min_ttl = 3600
cache_max_ttl = 86400
cache_neg_min_ttl = 60
cache_neg_max_ttl = 600
Server Selection
# Auto-select fastest servers
server_names = []
# Maximum latency (ms)
timeout = 2500
# Number of servers
max_clients = 250
Frequently Asked Questions
Q: Can DNSCrypt be used with VPN?
A: Yes, but if VPN already provides DNS encryption, it may be redundant.
Q: Are all DNS queries encrypted?
A: Yes, all system-wide DNS queries are encrypted.
Q: Is there a performance impact?
A: Minimal impact, but speed increases with caching.
Q: Which server should I choose?
A: Cloudflare or Google are fast and reliable.
Q: What is DNSSEC?
A: Security protocol that verifies DNS response authenticity.
Q: What are no-log servers?
A: Servers that don't keep logs of your DNS queries.
Q: Can it be used with Tor?
A: Yes, but Tor already provides DNS encryption.
Security Notes
Important
- Trusted Servers: Only use trusted DNS servers
- DNSSEC: Always enable DNSSEC validation
- No-Log: Prefer servers that don't keep logs
- Updates: Keep DNSCrypt-proxy updated
Fangbullcrypt - Modern Encryption Tool
Overview
Fangbullcrypt is a modern file and message encryption application using the age encryption tool. It supports public key and passphrase-based encryption.
Usage
fangbullcrypt
Main Menu
1-2. Key Management
1. Generate New Key Pair
Creates a new age key pair.
Steps:
- Enter key pair name
- Private and public keys are generated
- Secure permissions are set (600)
Output:
Private key: ~/.fangbull/keys/mykey_private.key
Public key: ~/.fangbull/keys/mykey_public.key
Public key content: age1xxxxxxxxxxxxxx
2. List Existing Keys
Lists existing key pairs.
Shows: Key pair name, private key path, public key path, public key content
3-4. File Operations
3. Encrypt File
Encrypts a file.
With Public Key:
- Enter file path
- Output path (optional)
- Select "1" (Use existing public key)
- Select key pair
- File is encrypted (.age extension)
With Passphrase:
- Enter file path
- Output path (optional)
- Select "2" (Use passphrase)
- Enter passphrase (twice)
- File is encrypted
4. Decrypt File
Decrypts a file.
With Private Key:
- Encrypted file path
- Output path (optional)
- Select "1" (Use private key)
- Select key pair
- File is decrypted
With Passphrase:
- Encrypted file path
- Output path (optional)
- Select "2" (Use passphrase)
- Enter passphrase
- File is decrypted
5-6. Message Operations
5. Encrypt Message
Encrypts a text message.
Usage:
- Select "1" or "2" (Public key / Passphrase)
- Enter message (Ctrl+D to finish)
- Encrypted message is displayed
Example Output:
-----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBxRjVqVGhWL2RxZGZHdGFV
...
-----END AGE ENCRYPTED FILE-----
6. Decrypt Message
Decrypts an encrypted message.
Usage:
- Select "1" or "2" (Private key / Passphrase)
- Paste encrypted message (Ctrl+D to finish)
- Decrypted message is displayed
7. Secure Delete File
Securely deletes a file.
Process:
- Enter file path
- Confirm (yes)
- File is overwritten 3 times with random data
- File is deleted
Warning: This operation is irreversible!
Age Encryption
What is it?
Age is a modern and simple file encryption tool. It works similar to SSH keys.
Advantages
- Simple: Easy to use
- Secure: Modern cryptography (X25519, ChaCha20-Poly1305)
- Fast: High performance
- Portable: Single binary
Public Key Format
age1xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Decryption Failed
Problem: Decryption failed
Solution:
- Ensure correct key/passphrase is used
- File must not be corrupted
- Age version must be compatible
Frequently Asked Questions
Q: How secure is Age?
A: Uses modern cryptography (X25519, ChaCha20-Poly1305), industry standard.
Q: Is it safe to share public keys?
A: Yes, public keys can be shared. Private keys should never be shared.
Q: What if I forget my passphrase?
A: File cannot be recovered, lost if no backup exists.
Q: Can large files be encrypted?
A: Yes, age uses streaming encryption, no file size limit.
Q: Can encrypted files be opened on other systems?
A: Yes, can be opened on any system with age installed.
Q: Is multiple recipient supported?
A: Yes, you can encrypt with multiple public keys.
Security Notes
Important
- Private Key: Never share or lose it
- Passphrase: Use strong and memorable password
- Backup: Backup keys and important files
- Secure Delete: Securely delete original files
Firefox Root0Edition
Cyrethium Root0 Edition's default Firefox variant is based on Amnesic Firefox. For more information, please review the Amnesic Firefox documentation.
I2P Guide
I2P (Invisible Internet Project) is an anonymous, peer-to-peer network layer. Its primary purpose is to provide anonymous access to services hosted within I2P (eepsites, mail, bittorrent, etc.) and to other I2P users. Unlike Tor, I2P is more suitable for fully in-network services; clearnet exit (outproxy) is limited.
Core Components
Router (I2P node): Each user runs their own I2P router which acts as both client and relay.
Tunnels: Traffic uses bidirectional tunnels for routing - inbound and outbound tunnels. Each tunnel contains a series of hops.
RouterInfo & LeaseSets: User reachability information is shared to enable addressing services.
How It Works
- Each I2P node establishes its own inbound and outbound tunnels by selecting various hops.
- Communication between two hosts occurs through the intersection of sender's outbound tunnel and receiver's inbound tunnel.
- I2P addresses are long, base32-like strings resolved via LeaseSet/RouterInfo.
- I2P continuously renews tunnels and updates routing tables, making tracking difficult.
I2P vs Tor
In-Network Service Focused: I2P excels at accessing anonymous internal services (eepsites). Tor facilitates access to clearnet targets via exit nodes.
Connection Model: I2P establishes asymmetric indirect connections with tunnels; Tor is client-centric with routes established by the client.
Performance: I2P is designed for low-latency applications and service hosting, but varies by use case.
Security Points
Addressing Complexity: I2P addresses are unreadable to humans; incorrect address sharing can easily redirect traffic.
Outproxy Limitations: Exit from I2P to clearnet is limited and generally reduces security/anonymity level.
Overlay Network: I2P is completely an overlay network; node uptime and bandwidth directly affect network performance.
Application Notes for Cyrethium
Be careful when running I2P and Tor simultaneously: different tunneling logic and DNS-like resolution mechanisms can cause confusion.
NetSecDragon - Wireless Security Toolkit
Overview
NetSecDragon is a comprehensive security toolkit that combines 4 different network security modules in a single interface. It detects DDoS, port scan, MITM, and WiFi deauth attacks.
Modules
- ANTI-FLOOD: DDoS & Flood Detection
- ANTI-SCAN: Port Scan Detection
- ANTI-MITM: ARP & MITM Detection
- ANTI-DEAUTH: WiFi Deauth Detection
Usage
sudo netsecdragon
Note: Root privileges required.
Security Notes
Important:
- Root Required: All modules require root privileges
- Tor Awareness: Automatically ignores Tor traffic
- False Positive: Legitimate high traffic may be detected as an attack
Tips: Adjust thresholds according to your network to reduce false positives.
OpenMammoth Firewall - Advanced iptables Firewall
Overview
OpenMammoth Firewall is an iptables-based firewall providing comprehensive protection against DDoS, port scans, packet manipulation, and various network attacks.
Features
- SYN Flood Protection: Hash-based rate limiting
- Port Scan Protection: Automatic detection and blocking
- Packet Manipulation Protection: Mangle table rules
- Connection Rate Limiting: Connection count limiting
- Anti-Spoofing: Fake IP blocking
- Tor Compatibility: Detects Tor traffic and prevents conflicts
- IPv6 Firewall Support: Full IPv6 security rules
Usage
sudo openmammoth-firewall
Main Menu
1. Enable O.M. Firewall: Enables the firewall and applies all security rules.
2. Disable O.M. Firewall: Disables the firewall and clears all rules.
3. Status O.M. Firewall: Shows firewall status and active rules.
4. Exit: Exits the program.
Tor Detection Mechanism
OpenMammoth Firewall detects Tor usage and prevents conflicts. When Tor is active, enabling the firewall may delete Tor NAT rules, cause traffic not to go through Tor, potentially leak real IP, and make the system unstable.
Important: You must disable OpenMammoth Firewall before routing all traffic to Tor.
Why Does It Conflict with Tor?
- Tor NAT rules are deleted
- Traffic does not go to Tor
- Real IP may leak
- System becomes unstable
Using Tor routing after OpenMammoth Firewall
- Will disable Open Mammoth
- May disrupt Tor traffic and cause internet outages
- You must disable OpenMammoth Firewall before routing all traffic to Tor
Security Notes
CRITICAL WARNINGS:
- Tor Usage: Stop Tor before enabling firewall
- SSH Access: Check SSH rules if remotely connected
- Service Interruption: Some services may be affected
- IPv6 Protection: IPv6 rules are automatically added
- Dual-Stack: Both IPv4 and IPv6 are protected
Plaztek - Lightweight Sandbox System
Overview
Plaztek is a user-based lightweight sandbox system designed to safely run untrusted scripts and projects. It creates secure isolated environments using Bubblewrap (bwrap).
Basic Usage
# Simple script execution
plaztek --profile strict suspicious_script.sh
# Directory sandboxing
plaztek --profile medium --dir ~/downloads/ProjectX
# Run with writable mode
plaztek --profile strict --writable --dir ~/myproject -- /bin/bash
# Run without network
plaztek --profile paronid --disable-network script.py
Security Profiles
Basic Profile: Only critical system files are blocked. Minimal restrictions, fast execution, suitable for development.
Medium Profile: Medium security level, suitable for development. Balanced security/performance, most system files protected.
Strict Profile: Tight security for untrusted code. High security level, most system resources blocked, minimal system access.
Paronid Profile: Maximum security with heaviest restrictions. Maximum isolation, all critical resources blocked, minimal system interaction.
Configuration
Profiles: /etc/plaztek.d/profiles/
Custom Configurations: /etc/plaztek.d/
User Configuration: ~/.config/plaztek/config.json
Ephemeral (Temporary) Copying
In writable mode, a temporary copy of the source directory is created. Changes are made only to the temporary copy, and the original directory remains unchanged. The temporary copy is automatically deleted when the sandbox closes.
Network Isolation
Use --disable-network to block all external connections while preserving localhost access. DNS queries are also blocked.
Custom Configuration
Create Custom Configuration:
# Create custom configuration file
sudo nano /etc/plaztek.d/myconfig.conf
Example Configuration:
# One blocking path per line
/home/user/.ssh
/home/user/.gnupg
/home/user/.aws
/home/user/.docker
/etc/shadow
/etc/passwd
/root
Wildcard Usage:
/home/user/.ssh/*
/etc/systemd/*
/var/log/*
List Configurations:
# List all available configurations
plaztek --list-configs
Command Line Options
Basic Options:
- --profile PROFILE: Use security profile (basic|medium|strict|paronid)
- --config NAME: Load configuration file (can be used multiple times)
- --enable-network / --disable-network: Enable or disable network access
- --dir: Sandbox target as directory
- --writable: Create ephemeral copy for write access
Advanced Options:
- --dry-run: Show what would be done without executing
- --list-configs: List all available configuration files
- --bwrap-arg ARG: Pass additional argument to Bubblewrap
Usage Examples
Example 1: Run Untrusted Script
# Run with maximum security
plaztek --profile paronid suspicious_script.sh
Example 2: Inspect Project Directory
# Without network, strict mode
plaztek --profile strict --disable-network --dir ~/downloads/ProjectX
Example 3: Writable Test Environment
# Make changes in temporary copy
plaztek --profile medium --writable --dir ~/myproject -- /bin/bash
Example 4: Custom Configuration
# Multiple configuration files
plaztek --config critical --config services --config security script.py
Example 5: Python Script Analysis
# Strict mode, no network
plaztek --profile strict --disable-network analyze_this.py
Example 6: Development Environment
# Medium profile, writable mode
plaztek --profile medium --writable --dir ~/dev/new-project -- /bin/bash
Troubleshooting
Bubblewrap Not Found
Problem: bubblewrap command not found
# Debian/Ubuntu
sudo apt install bubblewrap
User Namespace Error
Problem: "Unprivileged user namespaces are disabled"
# Temporary enable
sudo sysctl kernel.unprivileged_userns_clone=1
Configuration File Not Found
Problem: "Configuration file not found"
# Check available configurations
plaztek --list-configs
# Use correct configuration name
plaztek --config ssh script.sh
Insufficient Disk Space
Problem: "Not enough space in /tmp for ephemeral copy"
# Clean /tmp space
sudo rm -rf /tmp/plaztek-*
# Or use smaller directory
# Or run without --writable
File Not Found
Problem: "File not found" error
# Use absolute path
plaztek --profile strict /home/user/script.sh
Limitations
1. Root-Required Operations
Plaztek cannot run operations requiring root:
- System services
- Kernel modules
- Privileged ports (< 1024)
2. Hardware Access
Direct hardware access is limited:
- USB devices
- Graphics cards (3D)
- Sound cards (with --nosound)
3. X11 Applications
GUI applications may require additional configuration:
plaztek --bwrap-arg "--ro-bind /tmp/.X11-unix /tmp/.X11-unix" gui-app
Performance Tips
1. Profile Selection
Less restriction = Faster: basic < medium < strict < paronid
2. Ephemeral Copying
Can be slow for large directories. Only use --writable when needed.
3. Configuration Optimization
Remove unnecessary blocking rules.
Frequently Asked Questions
Q: Does Plaztek require root?
A: No, it works with normal user. However, root may be needed to create configuration files.
Q: Can multiple profiles be used simultaneously?
A: No, only one profile or multiple config files can be used.
Q: Can you escape from sandbox?
A: Theoretically not possible, but risk exists if kernel or bubblewrap bugs are present.
Q: What is the performance impact?
A: Minimal. Only a small delay at startup.
Q: What is the difference from Docker?
A: Plaztek is lighter and faster. Docker requires container images, Plaztek does not.
Riki - Steganography Tool
Overview
Riki is an advanced command-line tool that hides and extracts data in image (PNG, BMP, TIFF, PPM, TGA) and audio (WAV) files using LSB (Least Significant Bit) steganography technique.
Commands
1. capacity - Calculate Carrier Capacity
Calculates how much data a carrier file can store.
Usage:
riki capacity -c <carrier_file> [options]
Parameters:
- -c, --carrier (required): Carrier file (PNG/BMP/TIFF/PPM/TGA or WAV)
- -b, --bits: LSB bit count (1-4, default: 1)
- -v, --verbose: Detailed output
Example:
riki capacity -c image.png -b 2 -v
2. embed - Hide Data
Hides a file inside a carrier file.
Usage:
riki embed -c <carrier> -i <input_file> -o <output> [options]
Parameters:
- -c, --carrier (required): Input carrier file
- -i, --input (required): File to hide
- -o, --output (required): Output stego file
- -b, --bits: LSB bit count (1-4, default: 1)
- --compress: Enable zlib compression
- -p, --password: Password for AES-GCM encryption
- --scatter: Randomly distribute data (except header)
- --seed: Seed value for distribution (default: 0)
- --digest: Add SHA-256 verification digest
- -v, --verbose: Detailed output
Example:
riki embed -c photo.png -i secret.txt -o stego.png -b 2 --compress -p mypassword --digest -v
3. extract - Extract Data
Extracts hidden data from stego file.
Usage:
riki extract -s <stego_file> [options]
Parameters:
- -s, --stego (required): Stego file
- -o, --output: Output file path (auto if not specified)
- --overwrite: Overwrite if exists
- -p, --password: Decryption password if encrypted
- -v, --verbose: Detailed output
Example:
riki extract -s stego.png -o extracted.txt -p mypassword -v
4. analyze - Stego Analysis
Shows stego file metadata and header information.
Usage:
riki analyze -s <stego_file> [options]
Parameters:
- -s, --stego (required): Stego file to analyze
- --pretty: Show formatted JSON output
- -v, --verbose: Detailed output
Example:
riki analyze -s stego.png --pretty
Features
Security
- AES-GCM Encryption: 256-bit AES-GCM strong encryption
- Scrypt KDF: Scrypt algorithm for password derivation (N=2^14, r=8, p=1)
- SHA-256 Verification: Data integrity check
Performance
- Zlib Compression: Automatic size optimization
- Multi-LSB Support: 1-4 bit LSB usage
- Scatter Mode: Randomly distribute data to make analysis harder
Supported Formats
- Images: PNG, BMP, TIFF, TIF, TGA, PPM, PNM, PGM, PBM
- Audio: WAV
Technical Notes
- LSB Bit Count: Higher bit count provides more capacity but increases detectability
- Scatter Mode: Header is always sequential, only payload is distributed
- Auto Detection: Extract and analyze commands automatically detect LSB bit count
- Capacity Formula: (carrier_byte_count * lsb_bits) / 8
Error Messages
- Insufficient capacity: Carrier file insufficient, use larger file or higher LSB
- No hidden data found: No hidden data in file or wrong format
- Encrypted payload: Encrypted data requires -p parameter
- SHA-256 digest mismatch: Data integrity compromised
Security Recommendations
- Strong Password: At least 16 characters, mixed characters
- Use Scatter: Enable scatter mode to make analysis harder
- Low LSB: Use 1-2 bits to reduce detectability
- Digest Verification: Use --digest for data integrity
- Secure Delete: Securely delete original files
Performance Tips
- Use --compress for large files
- Prefer 3-4 bit LSB for high capacity
- WAV files generally offer higher capacity
- PNG is preferred as it's a lossless format
Tor Guide
Tor (The Onion Router) routes network traffic through a series of volunteer-operated nodes using multi-layered encryption (onion-like). Purpose: Weaken the relationship between source (user) and destination (server); making it difficult for third parties to establish identity/location relationships.
Core Components
Entry/Guard Node: The first node the user connects to. Sees the user's real IP address but has no information about the request's destination.
Middle/Relay Node: Carries traffic; bridges between source and destination but doesn't directly see the identity of either side.
Exit Node: Exit point between Tor network and final destination (e.g., web server). Normal (clearnet) connection is made here — the destination sees requests coming from the Tor network.
Directory Servers: Servers that publish the Tor network's node list; clients learn available nodes from here.
How It Works — Step by Step
- Tor pulls the current node list from directory servers.
- Client selects a random but policy-compliant route: Guard → Middle → Exit (usually 3 hops). Guard nodes are generally chosen as stable and trusted.
- Client creates multi-layered (onion) encryption with separate keys for each hop — data consists of nested layers.
- When sending the packet, each node opens (decrypts) its own layer and forwards to the next node. The last node (exit) opens the final layer and sends the request to the destination (unencrypted or with TLS).
Security/Critical Points
Guard Node Tracking: If an attacker learns the user's guard node, they can make long-term associations. Therefore, clients are cautious in guard selection (rarely change).
Exit Node Surveillance: Exit node can see exit traffic — especially non-HTTPS traffic. Therefore, sensitive data should never be sent without TLS.
Directory Server Manipulation: Fake nodes or directory manipulation can corrupt results; Tor network takes various measures against this but risk is never completely eliminated.
Performance & Privacy Trade-off
More hops = more privacy (theoretically), but latency/bandwidth decreases. Tor is generally suitable for interactive low-bandwidth applications (web browsing); not ideal for heavy traffic/streaming.
Application Notes for Cyrethium
System-wide Tor (forcing all traffic through Tor) is possible with the Cyrethonion tool. Always use HTTPS even over Tor — exit nodes can see traffic.
OPSEC Guide
Introduction — Why OPSEC?
OPSEC is the "art of being cautious" against external threats that target you. Using security tools alone is not enough; wrong habits, misconfigurations, or carelessness can nullify all efforts. Cyrethium provides tools and settings — OPSEC teaches you how to behave.
Basic Principles (Summary)
- Minimum Information Principle: Don't share everything; if possible, share nothing.
- Separation/Segmentation: Separate identity/work/project accounts, devices, and networks.
- Reduce Persistence: Minimize traces; avoid unnecessary data storage.
- Stay Updated: Keep software updated; close known vulnerabilities.
- Act According to Threat Model: There's no one-size-fits-all OPSEC — develop policies based on your target.
Threat Model — Clarify This First
Each threat requires different measures. OPSEC is very different between a simple user and a targeted user.
OPSEC Checklist
- Use unique, long passwords + MFA for accounts.
- Keep personal/work data on separate accounts and devices.
- Anonymize internet access as needed; use anonymity tools consciously.
- Use browser profiles task-based (daily / sensitive / test). Choose the appropriate profile for Cyrethium's Hardened / Amnesic distinction.
- Backup but encrypt backups and restrict access.
- Review features like automatic backup, cloud sync on phone/device.
- Don't open unknown emails, attachments, and links; be suspicious of phishing.
- Physical device security: screen lock, encryption, BIOS/UEFI password, access control.
- Close unnecessary services; develop a habit of monitoring open ports.
Deeper — Behavioral OPSEC
Separate Identities (Compartmentalization)
Don't bridge between personal social accounts, project/work accounts, test/anonymous accounts. Use different email, different browser profile, different session for each identity.
Trace Management
Pay attention to metadata and EXIF when sharing photos/media. Be careful with shareable files — path names, usernames, secret keys, etc.
Communication Security
Choose secure messaging tools; look for end-to-end encryption, device verification, and secure deletion features. If sensitive topics are required, verify the communication channel and identity with the other party in advance.
Device Protocol
When setting up a new device, install only necessary applications; change default passwords/services. Plan for device loss (remote lock, wipe, encryption key storage).
Social OPSEC
Avoid giving sensitive information online/in real life.
Cyrethium-Specific Recommendations
Hardened Firefox
Daily use, extension/performance balance. Use for daily tasks if it comes with sufficient privacy settings.
Amnesic Firefox
For sensitive tasks — for those who want more aggressive cleaning when session closes. However, ease of use may decrease; choose the right browser for the right job.
Tor Routing
Routing all traffic to Tor has benefits and limitations. Tor is a good privacy tool but exit node should be considered; handle sensitive, identity-linking operations carefully on a Tor exit.
Final Word — Mindset
OPSEC is not a toolset, it's a matter of habit. Instead of doing the same routine every morning; think "what traces will I leave today, who sees what, what am I sharing". Cyrethium gives you tools — but the most powerful tool is still your attention.
Basic Linux Guide
This document is prepared for users new to Linux systems; it explains basic terminal commands, file paths, permission logic, and system structure in simple language.
Linux File System Logic
In Linux, everything is a file — devices, directories, even RAM.
| Path | Description |
|---|---|
| / | Root directory (where everything starts) |
| /home | User directories (like /home/emir) |
| /etc | System configuration files |
| /bin & /sbin | Basic system commands (e.g., ls, cp, reboot) |
| /usr | Application files (usually software here) |
| /var | Variable data (logs, cache, etc.) |
| /tmp | Temporary files |
| /dev | Hardware (example: /dev/sda = disk) |
| /proc | System processes and kernel information |
| /boot | Kernel, initramfs, and GRUB files |
| /root | Root user's home directory |
Terminal Basics
| Command | Description | Example |
|---|---|---|
| pwd | Shows current directory | pwd → /home/emir |
| ls | Lists directory contents | ls -la → including hidden files |
| cd | Changes directory | cd /etc |
| cp | Copies file | cp file.txt /tmp/ |
| mv | Moves or renames file | mv test.txt new.txt |
| rm | Deletes file | rm -rf /tmp/* |
| mkdir | Creates new folder | mkdir logs |
| cat | Shows file content | cat /etc/hostname |
| sudo | Runs privileged command | sudo apt update |
| chmod | Changes file permissions | chmod +x script.sh |
System Information
- uname -a: Kernel version, system information
- lsblk: Lists disks and partitions
- df -h: Shows disk usage
- free -h: Shows RAM usage
- top / htop: Monitors active processes
- whoami: Shows current user
- hostnamectl: Machine name, kernel, architecture info
Permissions and Root
root = system god.
Normal user: lives in /home/user
Root: in /root directory
Switch to root: sudo -i
File permissions example: -rw-r--r-- = owner: write/read, group: read, others: read
Change permissions: chmod 755 script.sh
Network Commands
- ip a: Shows network interfaces
- ping 1.1.1.1: Connection test
- curl ifconfig.me: Shows external IP address
- netstat -tulnp: Shows open ports
- ss -tuln: Modern alternative
- systemctl restart NetworkManager: Restarts network service
Package Management (Debian / Cyrethium)
- apt update: Updates repository list
- apt upgrade: Performs updates
- apt install package: Installs package
- apt remove package: Removes package
- apt autoremove: Cleans unnecessary dependencies
- dpkg -l: Lists installed packages
Process & Service Management
- ps aux: Lists active processes
- kill PID: Terminates process
- systemctl status service: Service status
- systemctl enable service: Enables automatic startup
- systemctl disable service: Disables
- systemctl stop service: Stops service
Logs & Monitoring
- /var/log/syslog: System logs
- /var/log/auth.log: Authentication logs
- /var/log/dmesg: Kernel logs
- journalctl -xe: Detailed system log
- tail -f /var/log/syslog: Real-time log monitoring
Artstation - Community Art
Are you an artist? Share your designs, add your own touch to Cyrethium's cyberpunk spirit. Interface themes, wallpapers, posters, or concept drawings... All can be part of the community.
Whether you draw a viper design or create an anonymity scene emerging from the shadows — Cyrethium loves art, especially the original.
Designs are shared on Github and added to the System.
Developer Notes
Project Purpose
Each distribution has its own purpose. Cyrethium's goal is to provide persistent privacy and security in daily use — not temporary solutions, but a practical privacy layer for everyday life.
Development Status & Expectations
I develop this project alone; there may be bugs and shortcomings. Sometimes I can't perform adequate testing — that's why bug reports are crucial. I can't progress without feedback; please report any bugs, compatibility issues, or ideas you encounter.
Usage Philosophy
Cyrethium is not a passive "automatically protects everything" system — it requires some manual control. You should use it knowingly; the system cannot magically protect you. You need to use the right tools at the right time.
Versions and Security
Root0 Edition: The strongest version in terms of security. Minimum tools, minimum attack surface. Desktop security is enhanced with Wayland.
Root0 Edition is a good choice for beginners or those with little Linux knowledge.
Usability vs Security
It must be acknowledged that Cyrethium can be sluggish due to its hardening settings. You may need to compromise on ease of use for security. However, based on my experience, Cyrethium is more usable compared to many other hardened distributions; you won't feel most of the hardening in desktop use.
Packaging and Security Decisions
I don't package Cyrethium tools as .deb and there is no official repository. The reason is to reduce supply-chain risks.
This situation can be a bit troublesome for both users and me — installing/removing tools is cumbersome, but it's a conscious choice for security.
Cyrethium is completely Debian-based.
About the Website
I write the documentation section of the website in my own language first, then translate it to English. If you see translation or language errors, please let me know; I'll fix them. I do this to save time and write more detailed documentation.
Closing — A Few Personal Notes
If I have any mistakes, please point them out — there's a lot to learn.
For me, Cyrethium is not just an .iso file. Behind it are thousands of hours of effort, sleepless nights, weeks of struggling with bugs. Until reaching this point, my path was repeatedly blocked — there were people who didn't believe in my project, belittled me, or deliberately made things difficult.
Today Cyrethium is here, because I didn't give up.