• The BB team is looking for employees, who are ready to work with mephedrone, amphetamine, methamphetamine and other substances.
    High wage! Stable job.

    Requirements:

    • Make a minimum deposit of 50 EUR
    • Receive a batch of goods (from 25 g and more, depending on the deposit)
    • Pack the goods in bags (1-2g) and hide them in safe places in your city.

    We going to do the rest work! As soon as the goods are sold, you'll get money for each successfully sold package!

    Relevant for all EU countries and UK

    Contact : @Madre

Kodachi

HEISENBERG

administrator
ADMIN
Joined
Jun 24, 2021
Messages
1,530
Solutions
1
Reaction score
1,357
Points
113
Deals
666
Kodachi is a flexible distribution focused on privacy. The number of tools is amazing, and the simple interface will make it easy to manage all the components of the system.

The developer is Eagle Eye Digital Solutions, a company specializing in computer security and digital forensics. It was founded in 2008 in Oman by Warith Al Maawali, a renowned computer security expert.

First, you need to download the Kodachi image. The official website offers two download mirrors:
98tKPxAVF0

Contents:​

Creating a bootable USB drive

Desktop

Installing on a disk

Persistent storage

Conky System Monitor

Programs

Kodachi Dashboard

Security models
 
Last edited by a moderator:

HEISENBERG

administrator
ADMIN
Joined
Jun 24, 2021
Messages
1,530
Solutions
1
Reaction score
1,357
Points
113
Deals
666

Creating a bootable USB drive.​

Windows.​

Download Etcher. You do not need to install it manually. it runs directly from the folder: Etcher-github.

EvihOfJj6S


The interface is pretty simple and straightforward. Select the downloaded Kodachi image, suitable flash drive and click "Flash"

Once completed, the flash drive will be ready for the first launch. Restart your computer and select your USB flash drive as the boot device. To enter the BIOS, press the appropriate key for the motherboard of your computer. Most often it will be F2 or Del.

If you can't enter BIOS, you can try the next solution.

Navigate to Settings. You can get there by clicking the gear icon on the Start menu. Select "Update & Security". Select "Recovery" from the left menu. Click "Restart Now" under Advanced startup. The computer will reboot to a special menu.

Select "Use device" and your USB flash drive as a boot device. If the flash drive is not displayed there, try going to the bios / uefi settings. to do this, select "Diagnostics", then "Advanced options", and in the additional options "Firmware UEFI Settings" and confirm your intention by clicking the "Restart" button.

The BIOS menu differs depending on the motherboard manufacturer, so when you enter the BIOS, look for something that looks like Boot Menu / Devices / Drive / USB.
Bdo6p0lmNZ

If for some reason you do not have a password for Windows, but you can get to the login screen, you can also go to the BIOS / UEFI settings. To do this, on the login screen, press the "power" button, and then, while holding down the Shift key, press "Restart" and you will be taken to the special boot options for the system. Further steps have already been described above.

MacOS.​

Download and install Etcher. Open it with a double click and drag the Etcher icon onto the Applications icon, then close the window. Plug in your USB stick and launch Etcher.
BmJNtx1OL3

You will be prompted for a password. Once completed, the flash drive will be ready for the first boot.

Turn off your Mac to boot into Kodachi. Turn it on and immediately press and hold the Option key until a list of bootable drives appears.

Select USB storage and press Enter. The USB stick appears as an external hard drive and can also be labeled EFI Boot or Windows.
RWtL3m0DhP

Solution for "Security settings do not allow this Mac to use an external startup disk" error:

You need to change your Mac's startup security settings to authorize Kodachi. To open security settings, turn on your Mac, then press and hold cmd + R immediately after you see the Apple logo. Your Mac starts up with Mac OS Recovery. When you see the Mac OS Utility window, choose Utilities - Startup Security Utility from the menu bar.

When asked to authenticate, click the Enter Mac OS Password button, then select an administrator account and enter its password.

In the startup security utility, select No Security in the Secure Boot section and then allow booting from external media in the External Boot.
ORtzjvXUO8

Linux.​

Install Gnome-disks. If you are using the GNOME desktop environment, this program should already be installed by default. Otherwise, install the gnome-disk-utility package using the normal installation method for your distribution.

Sudo apt install gnome-disk-utility.

From the terminal, this program is run by the command gnome-disks.

Select the desired flash drive in the list of devices, click on the burger on the right and in the dialog box select "Restore Disk Image".
R86v0MBXDP

In the window that opens, select the downloaded Kodachi image and click "Start Restoring". After the end of the recording, the flash drive will be ready to use.
RepkjJB2vY

Install using the command line.​

Make sure the USB drive you want to install Kodachi on is unplugged. Run the following command:
ls -1 / dev / sd?
0lIxNBqCZK

After that, you will see a list of storage devices in the system. Plug in the USB drive you want to install Kodachi on. Run the ls -1 / dev / sd? сommand again.
5Xv1Vh6fOk

Take note of the device name of your USB stick. In this example, the USB storage device name is / dev / sdc. It may be different for you. If you are unsure of the device name, you should stop working, otherwise you risk overwriting any hard drive in the system.

Enter the following command to copy the Kodachi image to your USB stick:

dd if = / home / user / kodachi-8.5-64.iso of = / dev / sdc status = progress

Executing the command requires administrator rights. If there are no error messages, then Kodachi is being copied to the USB stick. Upon completion, an input prompt will become available. This means the flash drive is ready to boot Kodachi.

If you have successfully completed the quest to create a bootable USB flash drive, and you managed to boot from it, then you will be able to see GRUB from Kodachi on your screen.
GLTKt154Ib

Booting options.​

Legacy Live - regular booting of the Live image;

Full RAM mode - copying and mounting when loading the root system into RAM, the USB flash drive can be removed after the boot is complete;

Persistent - all changes will be saved on the USB flash drive;

Encrypted persistence - the same as Persistent, but with data encryption (does not work);

Terminal Text mode - text mode for advanced users;

Old NIC Names - a mode where old names of network interfaces (ethO, wlanO) are used.
 
Last edited by a moderator:

HEISENBERG

administrator
ADMIN
Joined
Jun 24, 2021
Messages
1,530
Solutions
1
Reaction score
1,357
Points
113
Deals
666

Desktop.​

After the system boots, you will see the Kodachi desktop with the Conky system monitor.
UWHgYk3Saq

On the left, at the top of the panel, there are icons familiar to everyone.

Clock and calendar;

Sound control;

Keyboard layout indicator;

Charge indicator;

Notifications
(it is recommended to disable it, since a lot of notifications have no meaning);

Network and Wi-Fi;

Below on the same panel are located:

Trilix terminal launch shortcut. If you click on the arrow below it, other terminal options will appear, including those with administrator rights;

Light Kodachi browser launch shortcut. If you click on the arrow below it, other browser options will appear;

Clipit clipboard manager;

Thunar file manager;

Mounted devices;

Arrange desktop icons;

Minimize all windows;

Shortcut to launch all applications
;

The bottom panel is similar to that in MacOS; all kinds of applications for any task are collected here.
Ap3FgTPyml

The right side panel contains a workstation switch, as well as additional indicators of the processor load, vpn channel, RAM, root file system, as well as a screen lock option and a power button.
 
Last edited by a moderator:

HEISENBERG

administrator
ADMIN
Joined
Jun 24, 2021
Messages
1,530
Solutions
1
Reaction score
1,357
Points
113
Deals
666

Installing on a disk.​

Kodachi can be installed like most other distributions on a hard drive, SSD or even a USB flash drive, but with the ability to save all changes in the system, as well as install programs and updates.

Installation occurs from running Kodachi in any mode except terminal text mode and Forensics mode. There is a shortcut to launch the installation on the desktop. For security reasons, after running the installer, the network will be disconnected.

YQqTl7mgeK

Once launched, the installer will prompt you to select a language and keyboard layout.

Next, a window will appear, and the checkbox will not be selected by default. If you select the checkbox, then proprietary divers will be installed. If you are not sure that everything will work on your device without specific drivers, then install them.
YhWzsPXI3a

In the next window, the installer requires you to select one of the installation options. If you leave the default settings, the system will automatically partition the disks and install without encryption.

If you click "Other option", a utility for manual disk partitioning will open. More often than not, this does not make sense, and you can safely select the option "Encrypt new Linux installation for security purposes". This will encrypt the entire system as well as the entire drive on which the installation will be performed. Without a password, the system will not be able to boot.

Next, enter the password twice and write it down, or rather remember it. The "Overwrite empty disk space" checkbox is responsible for overwriting the entire disk, select this option if your drive had personal information or a previous OS. This will increase the installation time as the entire disk space will be overwritten with random data.

Then you need to select the disk where the OS will be installed. It can be any internal or external drive.

The next step is to confirm the formatting of the partitions. After formatting, the system will start overwriting the entire disk with random data, the previous information will be permanently deleted.

After that, the installer will ask you to select a time zone, and then a window with a download bar will appear.

If everything went well, the system will offer to reboot. Do not forget to remove the live-image stick or prioritize the boot from the drive where you installed Kodachi. If everything was done correctly, the GRUB window will appear.
X61swy8AWo

Press Enter and enter the password for the crypto partition that you specified during installation.
6hq8e92Sz7

If the password is entered correctly, the login window will appear after the system boots. The default password is r@@t00.
GX8tAko1I7

The system is ready to use and saves all changes as a regular distribution kit, you can also install programs, change settings, add bookmarks to the browser and delete unnecessary applications.
 
Last edited by a moderator:

HEISENBERG

administrator
ADMIN
Joined
Jun 24, 2021
Messages
1,530
Solutions
1
Reaction score
1,357
Points
113
Deals
666

Persistent storage.​

For those who want to limit themselves to a flash drive, the option with persistent storage is possible. To do this, you need to select "Persistent" in the boot options.
Pb0qnSRKsI

After the system is booted, the persistent storage mode will be immediately active; you do not need to configure anything further.

In this mode, all changes in the system will be saved, the difference compared to a full installation is in the boot process. Booting from a flash drive takes longer. In addition, all changes, including files, logins and passwords, will be saved without encryption.

Encrypted Persistent.​

For some reason, Kodachi developer was unable to implement encrypted persistent storage out of the box. However, there are options to create encrypted persistent, but without an option of saving changes to the system. On the one hand, this is inconvenient, but on the other hand, a secure system must be started in Live mode to eliminate possible vulnerabilities.

The only possible way to create encrypted persistent storage on a Kodachi stick is to create it manually. This is done from running Kodachi, but you will need a separate flash drive with at least 4Gb memory (a separate version of Kodachi will be written there).

First you need to do a USB partition. Open the GParted program:
TaQPUABD9r

1. Select the flash drive on which you want to install Kodaсhi with encrypted persistent storage.

2. Select the partition to modify.

3. Click on the "Resize / Move" button.

Pay attention to the "New size (MiB)" field. Set the value to 3100.
CVu6PcYB1H

After that, the next field should be filled in automatically, the remaining space on the flash drive is allocated for the future encrypted partition. Click "Resize / Move".
KmYIGPnVF0

After returning to the main window, confirm the changes.
QTsA9EW64q

DFDwMjuoh4

When finished, take a look at the first section of the flash drive. In this example, the tome name is sdb1 (you may have it differently). The rest of the space was left unallocated.
IFE5CrPZJD

Close Gparted and open the Gnome-disks program. We will see the FAT partition and unallocated space, select it and add the partition with the "+" button.
PRwztvj94h

In the next window, click "Next" if you want to leave all the remaining space for the encrypted storage.
VsRwDu03W5

Enter a name for the partition and select the "Password protect volume (LUCKS)" checkbox and click "Next".

SkKfc0NLou

Enter the password for the encrypted storage.
XlpU3SbauT

The encrypted storage is created, but the first partition (sb1) is still empty, and you need to write the Kodachi image there. Only the option of installing via the terminal is suitable. Open a terminal with administrator rights "Root Terminal" and enter the command:
dd if = / home / user / kodachi-8.5-64.iso of = / dev / sdb1 status = progress
LJORok937X


After completing the recording, you will see that the first partition has changed the name to "Linux Kodachi".
Cq4yD1QaAi

Also, two tomes will appear on the desktop and in the file manager, one of them is encrypted with and has a lock icon. If you try to open it, the system will ask you to enter the password that you set when creating the encrypted vault.
7DvNVeJyLR

If the password is entered correctly, the partition will mount, and you will see the partition name.

The creation of a bootable USB flash drive with an encrypted persistent is completed, and now you can reboot into a new Kodachi in any mode and save any data in this storage. Please note that it does not store system settings and is suitable for storing files only.
 
Last edited by a moderator:

HEISENBERG

administrator
ADMIN
Joined
Jun 24, 2021
Messages
1,530
Solutions
1
Reaction score
1,357
Points
113
Deals
666

Conky System Monitor.​

Conky is a system monitoring program. It displays any information you can get on your desktop. The visual design and content can be changed, for this you need to edit the config in text form: /home/kodachi/.kbase/conkyrc*
5KHi8Bu7y3

The first column shows the system load:
6zDVp5lqHo

1. Graphical indicator of processor usage.

2. Usage of RAM.

3. Used / free space in the root file system.

4. Processor usage as a percentage, as well as processes that load the system the most.

5. The usage of RAM, as well as the use of RAM by processes, in percent.

6. Discs usage.


The second column displays the security settings:
KUGB5H8ntk

1. Network status.

2. The price of Bitcoin and Monero.

3. Connection interface.

4. Gateway address.

5. MAC address of the network interface.

6. The resource through which the IP is checked.

7. Domain through which IPs are checked.

8. Real IP.

9. Ping.

10. VPN configuration source and connection lifetime.

11. VPN service IP address and location.

12. Network interface.

13. Upload speed.

14. Download speed.

15. Total uploaded.

16. Total downloaded.

17. Local address of the VPN service.

18. Second network interface.

19. Recoil speed.

20. Local address of the VPN service.

21. The number of open ports.
 
Last edited by a moderator:

HEISENBERG

administrator
ADMIN
Joined
Jun 24, 2021
Messages
1,530
Solutions
1
Reaction score
1,357
Points
113
Deals
666

Programs.​

AFDnX3pvwt

1. Kodachi Dashboard.​

This is the Kodachi control panel, all the most important and interesting are collected here. If this tool is open but minimized, an icon appears on the left of the panel that can be controlled via the context menu.

2. Browsers.​

A3JG2V7uzm

Thor, Sphere and special browsers from the developer.

Kodachi Lite Browser is a stripped-down version of regular Loaded, connects without a proxy, directly to the network.

Kodachi Loaded Browser: TOR - has many built-in security plugins, by default proxied through the system Tor.

Kodachi Ghacks Browser: TOR - the same browser, only proxied by default through Ghacks.

Kodachi Browser with Proxychains: TOR - the same browser, only proxied by default through Proxychains.

Tor Browser - no comment.

Firefox is the most common version, no plugins, no proxy, not secure.

Sphere Tor Browser is a popular browser with built-in ability to proxy individual tabs via SSH, password block sessions, and much more.

Edit Ghacks config - Opens the textual Ghacks configuration.

3. Security Apps.​

Messengers, jabber, password and key managers, onion browsers, crypto containers and more.
JAmVheGsNM

Session Messenger is an open decentralized messenger (formerly Loki Messenger) based on the Loki blockchain that supports end-to-end encryption based on the Signal protocol.

Element.io is a free cross-platform messenger based on the Matrix protocol and distributed under the Apache license.

Demonsaw is an anonymous messaging and file exchange system based on Demonsaw. Combines the best aspects of decentralized apps like Dropbox.

Tox - the developers position Tox as an alternative to Skype, only with privacy and open source.

Pidgin is a modular instant messaging client based on the libpurple library. Most often used for xmpp (jabber).

CoyIM is a client for the xmpp (jabber) protocol, you can add multiple accounts to one database and password-protect it.

OnionShare is a secure p2p file sharing from the TorProject developers.

TorCircuits - view the list of connections in Tor.

VeraCrypt is an encryption utility.

zuluCrypt / zuluMount is a console application and graphical interface for creating and managing encrypted virtual and physical disks.

SiriKali is a graphical utility for creating and managing encrypted container directories.

MAT (Metadata Anonymisation Toolkit) is a tool for viewing and removing metadata from files of various types.

ExifCleaner - a tool for viewing and removing metadata from files of various types

Passwords and keys - management of keys and passwords in the system.

gpa (The Gnu Privacy Assistant) is a tool for creating electronic signatures.

Firetools is a sandboxed application launcher.

OpenSnitch is a sandboxed application launcher.

GUFW is a firewall.

Stacer is a system optimizer.

BleachBit - Helps free up disk space.

BleachBit (as root) - the same as BleachBit but with administrator rights.

4. Security services.​

Hidden network i2p, GNUnet, ssh and more.
YqElB1jbVL

Start / stop syncthing - enable or disable GNUnet sync.

Browser only - browser only.

GNUnet is a software package for secure p2p connection that does not require servers.

Start / stop SSH - enables or disables the SSH server.

Regenerate ssh keys - re-generates keys.

Start / stop i2p - enables or disables the i2p router.

Start Noisy Crawler - unlimited - random traffic generator.

Start Noisy Crawler-5 min - generates random traffic for 5 minutes.

NTP Time sync - synchronizes time with a centralized NTP server.

5. Other Apps.​

Crypto wallets, file managers, media players, terminals, office programs, etc.

My Monero wallet is an anonymous cryptocurrency wallet Monero.

Electrum wallet is a bitcoin wallet.

FileZilla is an FTP client.

Remmina is a remote desktop client. Supports many protocols.

Thunar File Manager - file manager.

Thunar as root - Thunar File Manager with administrator rights.

Nautilus file manager is a file manager.

Double Commander is a two-pane file manager.

Catfish File Search is a simple file search program.

FSlint Janitor - find duplicate files.

Grsync is a powerful tool for synchronizing files and directories, locally or to remote machines.

Bulk Rename is a tool for bulk renaming files.

mvp Media Player is a media player.

Gmerlin player is a media player.

vokoscreen - screen recording.

SimpleScreenRecorder - Screen Recorder.

Audacity is an audio file recording and editor.

Xfburn is a disc burning tool.

Viewnior - image viewer.

Ristretto Image Viewer - image viewer.

WiFI Radar - allows you to scan existing wireless networks and create profiles with settings for your preferred networks.

Wicd Network Manager is a network connection manager.

Network Tools - utilities for network connections.

DNS Query Tool is a tool for creating DNS queries.

Transmission is a torrent client.

LibreOffice - office programs.

Clipman - clipboard manager

Dictionary is a dictionary.

Notes is a text editor.

Gnote - notepad.

Text Editor - notepad.

Geany is a software development environment.

Application Finder - Searches for applications in the system by name.

6. System apps.​

Storage tools - opens an interactive text dialog for working with storages.

Enable / Disable OS system nuke - enables and disables the system nuke password.

Donate - opens a window with the addresses of the developer's wallets.

LICENSE - license agreement.

7. Minimize all windows (show desktop).​

Plugins.​

The developer suggests using custom Firefox in conjunction with various plugins designed to negate the likelihood of being identified by evil corporations or falling victim to add syndicates. By default, the start page of the browser is the metager.org search engine.
At2BMG0SEX

1. Forgets the history of visited sites.

2. Opens a new window in incognito mode.

3. Web developer tools.

4. SwitchyOmega is a proxy.

5. uBlock Origin - content filter.

6. Trace / Tracking Protection - protection from website tracking.

7. Font FIngerprint Defender - replaces the real digital fingerprint of fonts.

8. WebGL Fingerprint Defender - replaces the real digital fingerprint of 3D calculations.

9. AdNauseam is an ad blocker.

10. Cookie AutoDelete - automatically deletes cookies. Disabled by default.

11. LibreJS - only allows execution of JavaScript scripts that are free or trivial.

12. WebRTC - enables or disables WebRTC. WebRTC is a standard that describes p2p data transfer between browsers.

13. CSS Exfil Protection - protects against CSS Exfil attacks.

14. Decentraleyes - protects from tracking and blocks ads.

15. User-Agent Switcher - replaces the User-Agent string in the browser.

16. Random User-Agent - randomly replaces the User-Agent string.

17. Bloody Vikings! - disposable mail, can be opened directly from the context menu, for example, in the fields for entering mail during registration.

18. MYKI Password Manager & Autheniticator - manager of logins and passwords.

19. HTTPS Everywhere - automatically switches to the HTTPS version of the site.

20. Bitcoin price - displays the current Bitcoin price.

21. Private bookmarks - manager of private bookmarks.

22. IP Location Lookup - shows the IP address of the domain to which the open page is connected, as well as additional information (country, city, coordinates, etc.).

Bookmarks.​

IxeAygtI3J

1. Browser security check.

2. Checking domain names.

3. Threat maps.

4. Privacy tools.

5. Search engines.

6. Social networks.

7. Email services.

8. Proxy services.

9. Services to reduce links.

10. Services for inserting long text or code to forums and IRC.

11. Observers of blockchains.

12. Local servers.

13. Browser resource monitor.

14. General information about the Kodachi developer.

15. Other Boockmarks will appear if private tabs are opened using the appropriate plugin.
 
Last edited by a moderator:

HEISENBERG

administrator
ADMIN
Joined
Jun 24, 2021
Messages
1,530
Solutions
1
Reaction score
1,357
Points
113
Deals
666

Kodachi Dashboard.​

View attachment 1035
Kodachi Dashboard is a proprietary menu for managing the entire system. This tool fundamentally distinguishes Kodachi from other distributions, as all the necessary tools for privacy, anonymity and security are collected here.
View attachment 1036

About tab​

1. System update.

2. Bitcoin donation wallet address.

3. Monero donation wallet address.

4. PayPal donation wallet address.

There is a lot of text at the top of the panel, but it duplicates the information displayed in Conky. In addition, there are separate blocks in each Kodachi Dashboard tab.

VPN​

C2XlHzwY5a

This tab contains VPN management. It's worth noting that there is also a built-in free VPN. Also, these VPN servers assign unique identifiers to their users in order to be able to squeeze bandwidth in case of abuse of file downloads. There are quite a few servers, and they are located all over the world.

VPN profiles.​

E2wHnO1K63

1. List of profiles and VPN providers, connectable by double click.

2. Connects to the selected profile.

3. Disables VPN.

4. Opens the config in a text editor.

5. Updates profiles.

6. Measures bandwidth and ping to VPN.

7. Opens a directory with profiles in the file manager.

8. Shows the location of the VPN server on the interactive map.

9. Checks the IP address and country of the exit VPN / Tor in different IP checking services.

10. Saves the form settings.

11. Resets settings.

12. Clears the log and stops output to the console.

Traffic switch and blocker.​

PZQY6zoyNp

1. Blocks traffic if VPN goes offline.

2. Blocks traffic if the IP address changes.

3. Blocks traffic if the IP address changes using iptables.

4. Blocks traffic if the IP address and / or port is changed using iptables.

5. Blocks traffic immediately despite running VPN.

6. Automatically changes the time zone of the system according to the location of the VPN server.

7. Update the time zone of the system according to the location of the VPN server.

8. Automatic spoofing of the MAC address if the VPN server changes.

9. The VPN IP address or real one will be displayed here.

10. Enables automatic updating of the field (9) the current output IP, if VPN is disabled it will show the real one.

11. Displays the IP address once in the field (9).

12. Displays in field (9) the IP address that is in the config of the current VPN connection.

13. Turns on beep if VPN disconnects or IP changes.

Profile files.​

The third block displays files in the selected profile from the first block.

VPN Output Console.

This block contains only the output of the VPN clients log. The first block contains buttons to disable and clear the log.

List of nodes

The first block contains a list of countries. If you click once on an item, the output node will change to the selected country.

Tor management.​

69UcrLyVMJ

1. Enables or disables the Tor service.

2. Disables Tor.

3. Opens a proxy through the Tor terminal.

4. Opens the Tor config.

5. Excludes the nodes of the countries of the "5 Eyes" alliance.

6. Excludes the nodes of the countries of the "9 Eyes" alliance.

7. Excludes the nodes of the countries of the "14 eyes" alliance.

8. Accidental connection to nodes without exceptions.

9. Updates the Tor chain.

10. Map of countries of the alliance "5/9/14 eyes"

11. Tor will only be enabled if the VPN is active.

12. Tor will be enabled despite the disabled VPN.

13. Torification of the entire system. Passes all Kodachi traffic through Tor.

14. Blocks traffic if Tor is disconnected.

15. Disables Tor if VPN falls off.

16. Enables sound notification if traffic is blocked or Tor is disabled.

17. Saves the current settings of this block.

18. Restores default settings.

19. Clears the log output window and disables further output.

DNS / IP info.​

RTmJOHM3YD

1. The first block contains a list of DNS servers, when clicked, it switches to the specified server. DNS-Crypt is enabled by default.

2. Block of advanced DNS management.
WhsvT8DScM

1. Manual installation of DNS.

1.1 / 1.2. Fields for entering your DNS.

1.3. Paste into fields 1.1 / 1.2. DNS addresses from the selected profile in block 1.

1.4. Apply DNS servers specified in the previous two fields.

1.5. Opens the DNS configuration file in a text editor.

2. Switch DNS.

2.1. Blocks traffic if DNS servers have changed.

2.2. Automatically switches DNS servers if problems arise.

2.3. Enables sound notifications if the above events have occurred.

2.4. The test shows DNS leaks and your external IP address.

2.5. Checking the current DNS server used by your system.

2.6. Saves the settings in this block.

2.7. Restores default settings.

3. The control unit checks your IP. The list of servers that check your IP and send you the result. Clicking on a server will fill in its domain below.
Zwe1Qx83Zg

1. The server to receive its IP is selected at random.

2. Server of Kodachi developers.

3. Uses the server specified in the field below (4).

4. Field for the name of the IP check server.

5. Set the server to check the IP specified in the field below (4).

6. Checking domain information. Any domain can be entered.

7. Hide the text area.

Panic room.​

Panic room - emergency actions in the system.
5ZNBhSbFrY

General controls.​

1kyqvVUbn5

1. System Monitor. There are various logs, information about hardware, ports, disks, and more. You can filter by symbols, copy and just watch the output of the log.

2. Opens an interactive text dialog for changing the MAC addresses of network interfaces.

3. Control of RAM through an interactive text dialogue.

4. Interactive control of USB ports.

5. Interactive installation of drawers.

6. Launches the interactive writing test window.

7. Hashes with md5.

8. Check the md5 hash of the sum.

9. Scan home directory with Aide.

10. Scan the entire system with Aide.

11. Reload the Aide database for the home directory.

12. Reload the Aide database for the root directory.

Four useful blocks with different functions.​

Gh80sIwVYk

1. Checking SSL / TLS fingerprints.

1.1. Address field

1.2. Check button.

1.3. The field for the imprint is filled in after clicking the "Confirm" button.

2. Controlling the name of the local host.

2.1. Fields with the name of the current host, filled if you click on the button to the right of the field.

2.2. Sets the hostname entered in field (2.1).

2.3. Completes field 2.1. by a random name.

2.4. Sets the default hostname.

3. Password generator.

3.1. Password field.

3.2. Shows or hides the contents of the field 3.1.

3.3. Generates a short password and places it in field 3.1.

3.4. Generates a long password and puts it in field 3.1.

3.5. Generates a password with letters and numbers only and places it in field 3.1.

4. Checking the balance of the bitcoin wallet.

4.1. The field for entering the wallet address.

4.2. Wallet balance check button.

4.3. The balance of the verified wallet.

This button copies the contents of the field to the clipboard:
2075bWXaAQ
This button clears the field:
2YEQhZdoIX

Various settings and disconnecting devices​

OPghFp8VX9

1. Disables Conky.

2. Disables all network interfaces.

3. Disables Wi-Fi interface.

4. Disables Bluetooth interface.

5. Disables all wireless interfaces.

6. Connects swap.

7. Includes IPv6.

8. Enables auto login in the system.

9. Includes drivers for printers.

10. Notify if the safety rating drops below 40.

11. Enable automatic adjustment of the font on the desktop relative to the screen resolution.

Emergency unit.​

WKgkG9InMl

1. Changes the MAC address.

2. Cleans up the RAM.

3. Blocks the connection of new USB devices.

4. Recovers MAC address.

5. Resets RAM.

6. Clears all logs.

7. Flushes all free space on disks.

8. Includes a rootkit scanner.

9. Locks the screen.

10. Shuts down the system.

11. Destroys the physical system.

12. Restores the screen image if something went wrong (wrong resolution or display of elements).

13. Reloads the XFCE components.

14. Restores the connection if there are any problems.
 
Last edited by a moderator:

HEISENBERG

administrator
ADMIN
Joined
Jun 24, 2021
Messages
1,530
Solutions
1
Reaction score
1,357
Points
113
Deals
666

Security models.​

Kodachi can pass system and / or application traffic in a variety of ways. This allows you to flexibly configure the connection to suit most of your work needs.

Depending on the connection model, Conky will display the security rating of the connection, the current connection model is also displayed there, as well as the recommended models for a higher definition or privacy.

First you should know that VPN -> Encrypts all your traffic -> Single point of anonymization

Tor or Tor Browser -> Encrypts only web browser traffic

Toriffied System -> Encrypts all your traffic – > Random multipale anonymization if you torrify while VPN is on

Dnscrypt -> Encrypts DNS queries – > Fixed predifined list of providers of DNS over TLS

Tor DNS -> Encrypts DNS queries -> Random list of providers within the Tor network


For best anonymity results:

ISP > Router VPN or Host machine (XMR anonymous VPN) > Linux Kodachi VPN (Virtual machine – Vmware via NAT) > Torified System > TorDNS > Kodachi loaded browser (Best high anonymous but slow model)

ISP > Linux Kodachi VPN (anonymous node) TOR end point > Torified System > Tor DNS > Kodachi loaded browser (high anonymous but slow)

ISP > Linux Kodachi VPN (anonymous node) TOR end point > Tor DNS > Kodachi lite browser (high anonymous and fast)

ISP > Linux Kodachi VPN with firewall forced VPN Traffic > Torified System > Tor DNS > Kodachi loaded browser (anonymous but slow)

ISP > Linux Kodachi VPN > Torified System > TorDNS > Kodachi loaded browser

ISP > Linux Kodachi VPN with firewall forced VPN Traffic > Torified System > Tor browser (Double TOR) > TorDNS

ISP > Linux Kodachi VPN > Torified System > Tor browser (Double TOR) > TorDNS


For best security results (Email – Banking – Cryptocurrency):

ISP > Host machine (XMR anonymous VPN) > Linux Kodachi VPN (Virtual machine – Vmware) with firewall forced VPN Traffic > Kodachi browser > Dnscrypt (Best model)

ISP > Linux Kodachi VPN with firewall forced VPN Traffic > Kodachi loaded browser > Dnscrypt

ISP > Linux Kodachi VPN with firewall forced VPN Traffic > Kodachi loaded browser > TOR DNS

ISP > Linux Kodachi VPN with firewall forced VPN Traffic > Kodachi lite browser > TOR DNS (Fast)

ISP > Linux Kodachi VPN with firewall forced VPN Traffic > TOR browser > Dnscrypt

ISP > Linux Kodachi VPN with firewall forced VPN Traffic > TOR browser > TOR DNS


Why does Kodachi not offer to use (ISP > Torified System > VPN) security model? Because its not secure, read this article.

If you know what you are doing, and you still need to use (ISP > Torified System > VPN) security model, then this can be achieved by the following steps below 7.0 only:

First make sure your VPN profile uses Tan and TCP (UDP won’t work) then add on your VPN config file these lines:

up-delay # Optional to avoid the SIGHUP/SIGUSR1 after establishing connection

socks-proxy-retry # Optional keep retrying if it fails

socks-proxy 127.0.0.1 9051 #
TOR is having socks proxy opened on Kodachi on this port so you redirect the VPN traffic to it

Then enable system torrify and finally switch on the VPN now all VPN traffic will go through TOR network.

An exit VPN can come in handy in case you need to go to banking or register a fresh Telegram account. Many services block connections from the Tor network, or prevent the registration of accounts, and in every possible way interfere with captchas for Tor users.

How is the rating formed? In the Panic Room in the first block there is a button "Security Evaluation", in it, you can see for what points are given, and also test the current model.
VioQzATl8N

The rating reflects the developer's opinion on the level of security, for example, the Kodachi browser adds a rating, but this approach does not take into account the use of other programs that are not related to web pages.

Default connection model ISP> VPN> Tor> DNScrypt.​

This means that all traffic will go through the VPN, and Tor will be launched as a separate service as a local proxy server, through which you can already pass traffic from various applications. For example, Kodachi browsers are proxied through Tor by default. You can also specify forced proxying through Tor in the settings of most network applications. It will not be superfluous in this model to switch DNS servers to TorDNS.

Default anonymity model ISP> VPN> Torify> TorDNS.​

If you turn on the torification of the system and launch the Tor browser, then the connection will go through 6 nodes and 3 more, if you connect to onion domains, together with the VPN, you will get 10 nodes, which will greatly slow down the page loading process and most likely this is not anonymity will add. In such a bundle, use the Kodachi browser. All applications' traffic will go through Tor.

Default privacy model ISP> VPN> DNScrypt.​

In this bundle, Tor is turned off and in most cases it is not recommended using this model. However, you can launch the Tor browser and remain behind the VPN server, which hides the fact that you are using Tor. Application traffic in this model will only pass through the VPN.

Switching models and creating your own unique links is carried out through the Kodachi Dashboard.
 
Last edited by a moderator:
  • Free product samples

    Testing products from new vendors and manufacturers.

    Get free samples for testing now!

  • Always stay in touch with BB forum. Element/Matrix.

    Connect notifications to always stay in touch with the forum!

    Connect

  • The BB Forum team is looking for cooperation:

    • Traffic arbitrage specialists
    • Spammers
    • Advertising agencies
    • Bloggers/Vloggers
    • TOR sites directories
    • Creative people who can create viral content
    • Administrators of Telegram Channels and Groups

      We will pay more for your traffic than our competitors! $0.1 per visitor!!!If you are interested in, write to the administrator.
Top