Kicksecure ™: A Security-hardened, Non-anonymous Linux Distribution

From Whonix

Download Kicksecure ™

Whonix ™ [archive] is based on Kicksecure ™. Kicksecure ™ is a derivative of Debian and was formally called Hardened Debian.

About Kicksecure.

Hardening by Default[edit]

Coming Soon[edit]

Usability by Default[edit]


The Problem with Security Guides and How We Can Fix It [archive]


  • sudo apt-get install kicksecure-cli will be possible on bare metal Debian hosts -- in other words, Debian installations can be easily converted into Kicksecure ™ by installing the kicksecure-cli or another Kicksecure ™ Debian package. This is also called distro-morphing [archive].
  • a possible future ISO for installation on hardware depending on community interest and support

iPhone and Android Level Security for Linux Desktop Distributions[edit]

This section details potential future security enhancements for Kicksecure ™.

  • On popular mobile operating systems (iPhone and Android) a compromised application cannot access data of any other applications. [3] [4]
  • A compromised application is unlikely to gain root. [5] On the Linux desktop the process of Preventing Malware from Sniffing the Root Password is rather cumbersome and unpopular. Therefore any compromised application on the Linux desktop could lead to root compromise which in turn might compromise the bootloader, kernel, or even hardware. It is difficult to detect and remove a rootkit [archive].
  • The iPhone/Android approach provides strong protection against malware, meaning those platforms are a lot less impacted than Windows or Linux desktops. [4]
  • Many vendors purposefully add a lot of spyware; one example is Carrier IQ [archive]. The GNU Project states: "Apple's Operating Systems Are Malware [archive]" and "Google's Software is Malware [archive]". In addition, many freemium [archive] applications spy on their users. Despite this downside, the security model of popular mobile operating systems affords better protection when attempting to prevent any malicious, unapproved party from establishing a foothold in their ecosystem.
Most iPhone / Android devices [6] "Libre Android" [7] Linux Desktop Distributions Kicksecure ™ Development Goals
Upgrades do not require vendor No Yes Yes Yes
User freedom to replace operating system No Yes Yes Yes
Administrator capabilities (root) not refused No Yes Yes Yes
No user freedom restrictions No Yes Yes Yes
No spyware included in operating system No Yes Yes Yes
No culture of freemium applications that spy on users in appstores No Yes Yes Yes
Culture of Freedom Software in appstores No Yes Yes Yes
Freedom Software No [8] Yes Yes Yes
Compromised application cannot access data of other applications Yes [4] Yes [4] No Yes
Malware on a compromised system cannot easily gain root Yes Yes No Yes
Reasonable resistance against system wide rootkit Yes [9] Yes [9] No Yes
Verified Boot Yes Yes No Yes
Hardened Kernel [archive] Yes Yes some Yes
Full System MAC Policy [archive] Yes Yes No Yes

Most popular iPhone / Android phones that are sold by mobile carriers or manufacturers have locked boot loaders. In many cases it is not possible to easily replace or upgrade the operating system by oneself; vendor upgrades are required. Kicksecure ™ will not implement these kinds of user freedom restrictions since it is not required nor desirable. The capability to replace or upgrade the operating system will remain fully supported. Popular mobile operating systems utilize security technologies which purposefully restrict user freedoms. In contrast, Kicksecure ™ aims to utilize the same security concepts for the goal of empowering the user and increasing protection from malware.

It is theoretically possible to provide the same iPhone / Android level security on the Linux Desktop too. Security technologies like hardened kernels or verified boot used by popular mobile operating systems could also be ported to Linux desktops. Some steps were already made in that direction such as security-misc [archive] and apparmor-profile-everything [archive]. Community contributions are gladly welcomed! Here is a list of potential security enhancements for Kicksecure ™:

User Population / Promotion[edit]

  • The security-minded community is larger than the anonymity-minded community. Through Kicksecure ™ we can work on our shared interest in computer security.
  • Apply as many security settings by default without breaking usability too much.
  • Kicksecure ™ is already the base for Whonix - Anonymous Operating System.
  • This project might migrate to its own domain name depending on community interest and available resources. [archive]

Help Wanted[edit]


    • Better encryption thanks to preinstalled random number generators.
      • Through loading of the jitterentropy-rng kernel module by default.
      • Through installation of the user space entropy gathering daemons haveged and jitterentropy-rng by default.
      • See also Dev/Entropy.
  1. use DNSCrypt by default [archive]
  2. That would require an exploit.
  3. 4.0 4.1 4.2 4.3 In comparison a compromised application on the Linux desktop running under user user has full access to all information that user has access to, including all files, keystrokes and so on. The exception is when mandatory access control (MAC) [archive] is in use and successfully confines that application.
  4. Occasionally there are exploits that allow applications to gain root, but as time passes more of these vulnerabilities are being fixed.
  5. Most iPhone / Android phones that are sold by mobile carriers or manufacturers have locked boot loaders, come with spyware installed by default which is non-removable etc. There may be rare exceptions to this rule. Hence "most" and not "all". These exceptions are not the point which shall be made in this comparison. See "Libre Android" column for what is theoretically possible.
  6. There is no "Libre Android" at time of writing. It's only a concept to illustrate a point. There is no "perfect" Android distribution. GrapheneOS has verified boot but root access is refused in default builds [archive]. Replicant allows root access, but no references were found that Replicant makes use of verified boot yet. It's not relevant to pick any specific Android distribution for the sake of making the point "iPhone and Android Level Security for Linux Desktop Distributions" no specific Android distribution was chosen for this compassion. A "perfect" Android distribution checking all "green yes" is possible in theory. It doesn't exist due to policy decisions. (GrapheneOS vs root in default builds vs device selection / features.) There are no technical reasons for non-existence. See also this Overview of Mobile Projects, that focus on either/and/or security, privacy, anonymity, source-available, Freedom Software..
  7. Comes with a lot proprietary software installed by default.
  8. 9.0 9.1 Through verified boot.

Follow: Twitter.png Facebook.png 1280px-Gab text logo.svg.png Rss.png Matrix logo.svg.png 1024px-Telegram 2019 Logo.svg.png Discourse logo.svg

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

Whonix donate bitcoin.png Monero donate whonix.png

Share: Twitter | Facebook

Want to make Whonix safer and more usable? We're looking for helping hands. Check out the Open Issues [archive] and development forum [archive].

https link onion link

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation.

Copyright (C) 2012 - 2019 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)

Whonix ™ is a derivative of and not affiliated with Debian [archive]. Debian is a registered trademark [archive] owned by Software in the Public Interest, Inc [archive].

Whonix ™ is produced independently from the Tor® [archive] anonymity software and carries no guarantee from The Tor Project [archive] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. Whonix ™ is provided by ENCRYPTED SUPPORT LP. See Imprint.