• Cross platform virtual machine for the free open source VirtualBox hypervisor that can be run on Linux, Mac OS X, and Windows operating systems.
• Full featured, easy-to-use Ubuntu Desktop 13.04 (Linux) operating system with full disk encryption, Mozilla Firefox browser, Thunderbird with Enigmail installed for pgp secured email communications. (The Darknet Extreme Virtual Machine is offered in a 32-bit or 64-bit system configuration. Please specify the desired configuration when placing your order).
• Enables anonymous activity with the installed I2P (Invisible Internet Project) and Tor Browser Bundle open source software packages.
• Powerful open source encryption technology (TrueCrypt and GNUPG).
• Plausible deniability– the Darknet virtual machine resides in a hidden, encrypted TrueCrypt container (with an exfat file system) which is itself enclosed in an encrypted outer TrueCrypt container. If you don't require plausible deniability you can move the virtual hard drive outside the TrueCrypt container and eliminate the dependency on the TrueCrypt software. You will still have full disk encryption but will loose the plausible deniability feature.
• You can change the default TrueCrypt passwords to manage your own security policies. You can also change the Ubuntu full disk encryption passphrase.
• Extremely fast! – The package is installed on a Corsair-Flash Voyager GT 16GB USB 3.0 flash drive that delivers unprecedented performance in a stylish form factor. Water-and shock-resistant design
USB 3.0 technology outperforms USB 2.0 flash drives by up to 10x
• Backwards compatible with USB 2.0 (The Darknet Extreme Virtual Machine device will run on computers with USB 2.0 ports, just slower. It is extremely fast on computers with USB 3.0 ports)
Added bonus! Security and anonymity books in pdf format (in the Computer Forensics ebooks folder on the Linux Desktop):
- Anonymous Security Starter Handbook
- Beware the Dangers of Metadata
- Computational Forensics
- Computer-Aided Forensic Facial Comparison
- Computer and Intrusion Forensics
- Computer Forensics - A Pocket Guide
- Computer Forensics Computer Crime Scene Investigation
- Computer Forensics For Dummies
- Cyber Forensics
- Digital Forensics for Network Internet and Cloud Computing
- EnCase Computer Forensics
- Forensic Computer Crime Investigation
- Forensic Computing - A Practicioners Guide
- Hacking Exposed Computer Forensics
- Handbook of Computer Crime Investigation-Forensic Tools and Technology
- Handbook of Research on Computational Forensics Digital Crime and Investigation
-Incident Response and Computer Forensics
-Incident Response and Computer Forensics Toolkit
-OpenVPN-2 Cookbook
- Privacy Protection and Computer Forensics
- Scene of the Cybercrime Computer Forensics Handbook
- The Best Damn Cybercrime and Digital Forensics Book Period
- Virtualization for Security