| Based on | Debian |
| System Type | Server&Gateway |
| Desktop | No desktop |
| Type | Protection & anonimization system & distributed services. |
| Supported hardware | Odroid XU3 and C1 |
| Architecture | ARMHF |
| Gateway and torify any operating system | Yes |
| Opensource | Yes |
| Live DVD/USB | No |
| Non-Anonymous Developers | Yes |
| Persistence (applications&data survive reboot) | Full |
| Threat | CageOS Protection |
|---|---|
| Several Exploit | GrSecurity |
| Memory-based protection schemes | PaX |
| Mandatory access control scheme | SELinux |
| Cold Boot Attack | TRESOR |
| Potentially hostile/injected code from non-code containing memory pages | KERNEXEC |
| Threat | CageOS Protection |
|---|---|
| Toolchain compilation (fortify) | libc patches |
| MAC Spoof | MAC Address randomizer |
| Hardware Serial number identification | HDD/RAM serial number changer |
| Vulnerable on bootloader | Bootloader password protection |
| Vulnerable on boot partition modifications | /boot partition Read only. Needed to change only on kernel upgrades |
| SSH root login directly | Disable SSH root login |
| Physical reboot | Disable control+alt+del on inittab & /etc/acpi/powerbtn-acpi-support.sh |
| Brute force attack on services | Fail2Ban |
| ICMP Flood Protection | IPTables not answer ICMP requests |
| Network accept all port connection | IPTables DROP policy by default |
| Virus infection on other network OS | Clamav |
| Intrusion Detection System | Suricata |
| Hidden software exploits | RKHunter |
| Software security holes | Debian Security repositories |
| Untrusted Cronjobs | Block cronjobs for everybody in cron.deny |
| Binaries with root permission | Disable unwanted SUID/SGID binaries |
| Insecure network programs | Block rlogink,telnet,tftp,ftp,rsh,rexec |
| IP spoof | sysctl hardening configuration |
| IP spoof | Darknet preconfigure |
| TOR extra security | SocksPort 9050 IsolateClientAddr IsolateSOCKSAuth IsolateClientProtocol IsolateDestPort IsolateDestAddr |
| DNS leak protection | Usage of OpenNIC |
| Hidden code on apps | Verifiable builds |
| Take advantage of already logged in sessions | Bash usage of VLOCK and/or TMOUT to protect your bash login |
| Direct access to HDD data | Full disk LUKS encryption |
| Exploits of shared resources & hardware | Docker |
| SSH Old protocol weak | SSH only protocol V2 allowed |
| Computer stealing | Secured&encrypted backup on decentralized storage grid |
| Rootkit | Use OpenSource & RKHunter |
| Software backdoor | Use OpenSource |
| Hardware backdoor | Use OpenHardware |
| Packet Sniffing | Using HTTPS Everywhere |
| Responsible for building Tor circuits | Tor client running on CommunityCube |
| Exploit Quantum protection | Yes, suricata |
| Intrusion Prevention System | Yes |
| Browser exploit protection | Yes |
| Protection against IP/location discovery | Yes & agent |
| Workstation does not have to trust Gateway | No |
| IP/DNS protocol leak protection | Only if you configure manually |
| Operating System Updates | Persist once updated |
| Update Notifications | Yes on LED and TFT display |
| Important news notifications | Yes on LED and TFT display |
| Decentralized System Updates | Using APT P2P |
| Network/web Fingerprint | Maximum possible protection with Agent (pc (windows/linux/mac) & mobile (android/ios) |
| Clearnet traffic | Routing model it's described in Network page |
| Surf the deepweb with regular browser | Yes but not recommended |
| Randomized update notifications | Yes |
| Privacy Enhanced Browser | Yes, Tor Browser with patches |
| Hides your time zone (set to UTC) | Yes |
| Secure gpg.conf | Yes |
| Enable secure SSH access | Yes, through physical TFT with external network disconnect |
| Auto Disable logins | Only logins are possible on configuration mode, activated through physical TFT with external network disconnect |
| Internet of the Things protection | Yes, it's described in Network page |
| HTTP Header Anonymous | Yes |
| Big clock skew attack against NTP | Tot blocked |
| VPN Support | Configurable through TFT |
| Ad-bloking track protection | Yes |
| Root password configuration | Yes, mandatory on first boot and later on TFT configuration panel |
| Wifi password configuratio | Yes, manadatory on first boot and later on TFT configuration panel |
| Internal WIFI device without password or WEP encryption | No |