The AnuBitux documentation
  • Welcome to the AnuBitux documentation!
  • GETTING STARTED
    • Why AnuBitux?
    • How to verify AnuBitux
      • How to verify the provided tools
    • How to use AnuBitux
      • Ventoy
      • Balena Etcher
      • Rufus
      • Booting from USB
    • How to build AnuBitux
    • How to create an AnuBitux VM
    • How to update an AnuBitux VM
  • Features
    • Tools list
      • Accessories
      • Graphics
      • HW Wallets
      • Internet
      • Privacy
      • Recovery
      • Reporting
      • WalletGenerators
      • Wallets
      • WalletTools
    • Network
    • Browsers
    • Encryption
    • Printing
    • Password generation
  • Use cases
    • Creating wallets
      • From mouse movements
      • From microphone
      • From a dice (or a coin)
      • From desktop clients
      • Blind generation
    • Using hardware wallets
    • Recovering wallets
    • Cloning drives
Powered by GitBook
On this page
  1. Features

Network

PreviousWalletToolsNextBrowsers

Last updated 12 months ago

Network is one of the most important things to take care to when handling with privacy and security. AnuBitux offers many different tools to allow users to take care of their data when connecting to the Internet.

Online & Offline

First of all, on the Desktop and under the Privacy menu, there are two launchers named Offline and Online. The offline launcher disables all the network interfaces like Ethernet, WiFi and Bluetooth, also changing the Desktop background to provide an easy reminder that the working environment can be considered sandboxed. The Online launcher turns the interfaces on again.

TOR

It may also be useful to hide the public IP address given by the network provider. To do so, AnuBitux also integrates the Kalitorify tool, that proxies the whole operating system through the Tor Network. It can be launched with the proper Desktop shortcuts and/or through the Privacy menu.

Mac address

When connecting to public networks, it may also be useful to hide the Mac Address, to avoid to be linked to activities performed with the same machine through other operating systems. To do so, there is a proper launcher under the Privacy menu.

Monitoring

To be able to know if some kind of tool or service is exchanging data through the Internet, there is also a proper applet showing the network data usage of the available interfaces at any time.

It is also possible to monitor network traffic analitically, thanks to and TShark. It may be useful to audit connections and data trasmissions of the tools, like .

WireShark
here