Trusted End Node Security formerly Lightweight Portable Security LPS is a live operating system designed to run from removable media and leave no trace on the host computer. Every application included in this environment has been chosen for its security, portability and reliability. Below we explore the most outstanding tools that transform TENS into a versatile fortress.
Secure Web Browsing
Tor Browser
- Purpose iAnonymous web browsing via the Tor network
- Features multi‐layer encryption routing cookies and trackers blocked by default
- Usage launch from the Applications menu connect to Tor network automatically establish a secure circuit
Iceweasel Browser
- Purpose lightweight fork of a popular browser optimized for privacy
- Features No telemetry strict content blocking customizable privacy settings
- Usage browse HTTPS sites use private browsing mode to avoid history on RAM disk
Encrypted Communication
GnuPG
- Purpose encryption and signing of emails files and messages
- Features OpenPGP compliant key management support for smartcards
- Usage generate key pairs encrypt sensitive documents sign outgoing correspondence
Thunderbird with Enigmail
- Purpose secure email client integration with PGP encryption
- Features automatic key discovery inline cryptographic signatures compatibility with major providers
- Usage import GnuPG keys compose encrypted messages verify signatures on reception
OpenSSH
- Purpose secure remote shell access file transfers via SCP and SFTP
- Features public key authentication port forwarding agent forwarding
- Usage establish encrypted tunnels maintain secure administrative sessions
Disk Encryption and Secure Storage
Cryptsetup with LUKS
- Purpose full disk encryption container creation
- Features strong AES encryption passphrase protection anti‐tamper header
- Usage initialize encrypted partition mount with passphrase unmount to secure
VeraCrypt
- Purpose encrypted volumes and hidden containers
- Features cross‐platform support pre‐boot authentication plausible deniability
- Usage create portable encrypted container store sensitive projects unplug to erase key from RAM
Network Analysis and Diagnostics
Wireshark
- Purpose graphical packet capture and analysis
- Features protocol dissectors real‐time capture filters deep packet inspection
- Usage monitor suspicious traffic analyze network performance troubleshoot connectivity
tcpdump
- Purpose command line packet capture
- Features lightweight scripted captures BPF filter support output to pcap files
- Usage pipe into analysis tools store offline for detailed review
nmap
- Purpose network exploration and security auditing
- Features port scanning OS fingerprinting service detection
- Usage locate open services assess network attack surface generate comprehensive reports
Privacy-Enhancing Utilities
BleachBit
- Purpose disk cleanup and privacy wiping
- Features secure deletion of caches cookies logs free disk space
- Usage select targets for shredding run wipe to remove metadata traces
OnionShare
- Purpose anonymous file sharing over Tor
- Features automatically generated onion URL end‐to‐end encryption one‐click hosting
- Usage choose file or directory start server share link temporarily until shutdown
Comparison of Signature Applications
Application | Primary Function | Key Strength | Ease of Use |
---|---|---|---|
Tor Browser | Anonymous Web Browsing | High | Moderate |
VeraCrypt | Encrypted Volumes | Very High | Moderate |
Wireshark | Packet Analysis | N/A | Advanced |
Every application in TENS has been rigorously tested for resilience against tampering and designed to operate entirely in volatile memory. Users can combine these tools seamlessly to establish a workflow that meets the highest standards of privacy and security without altering the host system.
Official website of Trusted End Node Security (formerly Lightweight Portable Security (LPS))
Be the first to leave a comment