Snowden Used the Linux Distro Designed For Internet Anonymity 171
Hugh Pickens DOT Com writes: "When Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. Now Klint Finley reports that Snowden also used The Amnesic Incognito Live System (Tails) to keep his communications out of the NSA's prying eyes. Tails is a kind of computer-in-a-box using a version of the Linux operating system optimized for anonymity that you install on a DVD or USB drive, boot your computer from and you're pretty close to anonymous on the internet. 'Snowden, Greenwald and their collaborator, documentary film maker Laura Poitras, used it because, by design, Tails doesn't store any data locally,' writes Finley. 'This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources.'
The developers of Tails are, appropriately, anonymous. They're protecting their identities, in part, to help protect the code from government interference. 'The NSA has been pressuring free software projects and developers in various ways,' the group says. But since we don't know who wrote Tails, how do we know it isn't some government plot designed to snare activists or criminals? A couple of ways, actually. One of the Snowden leaks show the NSA complaining about Tails in a Power Point Slide; if it's bad for the NSA, it's safe to say it's good for privacy. And all of the Tails code is open source, so it can be inspected by anyone worried about foul play. 'With Tails,' say the distro developers, 'we provide a tongue and a pen protected by state-of-the-art cryptography to guarantee basic human rights and allow journalists worldwide to work and communicate freely and without fear of reprisal.'"
The developers of Tails are, appropriately, anonymous. They're protecting their identities, in part, to help protect the code from government interference. 'The NSA has been pressuring free software projects and developers in various ways,' the group says. But since we don't know who wrote Tails, how do we know it isn't some government plot designed to snare activists or criminals? A couple of ways, actually. One of the Snowden leaks show the NSA complaining about Tails in a Power Point Slide; if it's bad for the NSA, it's safe to say it's good for privacy. And all of the Tails code is open source, so it can be inspected by anyone worried about foul play. 'With Tails,' say the distro developers, 'we provide a tongue and a pen protected by state-of-the-art cryptography to guarantee basic human rights and allow journalists worldwide to work and communicate freely and without fear of reprisal.'"
The NSA is becoming a new God for "True Believers" (Score:5, Funny)
What's that? Have any unknown in your life? Just insert the NSA?
Don't have the source code? The NSA must be behind it.
Don't know who spread a worm? Must be the NSA.
Don't know who authored BitCoin? NSA.
Don't know who packaged up TAILS? NSA.
The NSA sent his heavenly son to die for our sins.
Re: (Score:2, Insightful)
Well for a start we know that the NSA exists. I can go on but what I've just said pretty much destroys the analogy.
Re: (Score:2)
Re:The NSA is becoming a new God for "True Believe (Score:5, Interesting)
Well, personally my first thought after reading the summary was "but how do you trust the BIOS?" A few years ago I'd have immediately said that's conspiracy theory and dismissed it (along with the other items you listed). But after a year of exposure to the Snowden and RSA revelations and everything else, it pains me to say these NSA questions aren't so far fetched any more.
Sure they may not be probable but they could be possible. No matter how rational you think you are, it really messes with one's mind. Subtle paranoia, if you will.
Re: (Score:2)
Re: (Score:3)
Harry Tuttle (Score:2)
We need a Harry Tuttle to show up at night in our apts to offer us an alternative BIOS chip.
Re:The NSA is becoming a new God for "True Believe (Score:5, Funny)
Re: (Score:2)
Turn on your Heartbleed,
Let it shine, wherever you go
Let it make a happy glow
For the NSA to see...
Re: (Score:2)
Re: (Score:2)
How much do they pay you for these NSA flagellation? I'd like a second income, and it appears you don't have to put any effort into it at all.
Re: (Score:2)
Don't know who did 9-11? No carrier
Re: (Score:3)
It was not his choice to get stuck there, the US govt pretty much made sure. You know, even getting the Swiss to force down the plane of a president and search it, because he might be on board... really, your comment is unintentionally ironic: the invasion already happened -- that is, your external enemies ain't shit compared to the internal ones you bred yourself -- and it's YOU who is bending over and cheering.
Well, If the NSA Can't Crack It, Ya Right (Score:2)
Re:Well, If the NSA Can't Crack It, Ya Right (Score:4, Insightful)
https://tails.boum.org/downloa... [boum.org]
Re: (Score:2)
Re: (Score:2)
I've never once seen a browser do that, and if I did I would stop using it immediately. That's a huge security issue.
Re: (Score:2)
IE, firefox, opera, chrome, all do it. Unless you have no script or something like it running. I suppose it can be turned off in the browser settings somewhere.
Not sure what the security issue would be. You still have to click the link. It would be no more insecure than having a link present.
Re:Well, If the NSA Can't Crack It, Ya Right (Score:4, Informative)
I've been seeding the 0.23 version since it came out. Here's the magnet link:
magnet:?xt=urn:btih:B7EE06A2568630EED830CFFBF45B6BFD5DE796D4&dn=tails-i386-0.23&tr=http%3a%2f%2ftorrent.gresille.org%2fannounce
Cue NSA infilatration in 3...2.... (Score:5, Interesting)
May want to keep an eye out in the development community of the OS for a sudden influx of programmers "just wanting to help out." Or existing members suddenly driving new sports cars and acting strange.
Re:Cue NSA infilatration in 3...2.... (Score:5, Funny)
We, the open source and freedom-loving community, may need an organized task force to keep track of these programmers, track their incomes, and store their communications -- just for future reference in case something comes up and a mole is suspected, not an actual search as the Constitution defines it, of course. Similar to the Apache Foundation and other Foundations for Open Source causes, but tasked with keeping our communications secure, and breaking the other side's communications where feasiable. We'll have to keep the existence of the Association secret as much as possible of course, and thus also hide it's budget in small items spread accross the other Foundations. They'll archive all the repos and mailing lists and IRC channels and any other communication medium, but advances in technology make the storage on that scale cheaper. We might have to rent a large building out somewhere that has cheap land and few pesky curious tresspassers, Utah or something. We'll just refer to it as No Such Association for now. A small and expedient measure given the threats of our times.
Re: (Score:2)
Isn't the phrase "programmers acting strange" redundant?
NSA boogeyman (Score:1)
Did they provide evidence for this claim?
Re:NSA boogeyman (Score:5, Informative)
Re: (Score:2)
A Tor developer? Being paranoid? Shocking!
No, I'm sorry, when I say "evidence" what I mean is, and try to follow along here, "evidence". Not anecdotes. Not scary bumping noises in the night. Evidence.
Re:NSA boogeyman (Score:4, Insightful)
Re:NSA boogeyman (Score:4, Funny)
No, he doesn't. He's referring to the real puppeteers: NSO.
Re: (Score:2)
The Netherlands Space Office [wikipedia.org]?
Re: (Score:3)
But I doubt they exist.
Re: (Score:3, Interesting)
Really? There haven't been enough scandals yet?
- pressure to backdoor linux - http://www.itworld.com/open-source/383628/linus-father-confirms-nsa-attempt-backdoor-linux
- NSA/GCHQ have power points about trying to attack TOR exit nodes including with DOS attacks
- they hack sys admins
- they are suspected of introducing bugs into code bases (anonymous commit to the linux kernel which had a = instead of == allowing remote code exploit)
- they are known to have inserted hardware backdoors into US chips - most pr
Re: (Score:2)
A Tor developer? Being paranoid? Shocking!
No, I'm sorry, when I say "evidence" what I mean is, and try to follow along here, "evidence". Not anecdotes. Not scary bumping noises in the night. Evidence.
Okay [www.dw.de], "When I flew away for an appointment, I installed four alarm systems in my apartment," Appelbaum told the paper after discussing other situations which he said made him feel uneasy. "When I returned, three of them had been turned off. The fourth, however, had registered that somebody was in my flat - although I'm the only one with a key. And some of my effects, whose positions I carefully note, were indeed askew. My computers had been turned on and off."
Who breaks into an apartment, turns off alarms,
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
NSA Agents
NSA agent is the name given to most employees of the NSA, same as other federal bodies like FBI, CIA, DEA, etc. You start as a "Special Agent" typically and then move up to Assistant-Special-Agent-in-Charge...Special-Agent-in-Charge etc..it's the default term. No one said anything about night vision and silenced weapons etc, AFAIK it was a plain ol stakeout. Sounds like you're the one playing too many video games.
some dolt
A rather accomplished and well-known individual who's been at the core of many privacy-re
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Tails is awesome (Score:3)
The CIA etc notes that its employees 'serve in silence,' surely this team has advanced the cause of freedom and liberty more than them, in silence.
Re: (Score:2)
... surely this team has advanced the cause of freedom and liberty more than them, in silence.
I'm pretty sure that the answer to that is no. "Tails" isn't more than a few years old. The CIA was fighting communist dictatorships for decades, and before that its predecessor the OSS fought the Nazis.
Re: (Score:2)
Re: (Score:2)
How many of the present CIA had anything to do with Vietnam? Iran Contra? See, I can play that game too.
Watergate was Nixon's own men, not the CIA.
Were the North Vietnamese in Cambodia and using it to attack South Vietnam? Yes. Are you claiming that Cambodia was outside its rights to ask for assistance against the North Vietnamese occupation of its territory?
Now maybe you can tell me, how much did the Tails project help dissidents against the Communist governments of Poland, USSR, Hungary, Czechoslovaki
Re: (Score:2)
Re: (Score:2)
Former CIA agents are not current CIA agents.
As the Cambodian situation became worse, the Cambodian government sought military assistance from the United States and South Vietnam.
-- Across the Border: Sanctuaries in Cambodia and Laos [army.mil]
The US was out of South Vietnam in 1975. That is nearly 40 years ago. I doubt there are many CIA agents that were working in Vietnam still working at the CIA. Iran Contra is also well into the past. And once again, a former Director of CIA is not a current Director or employee.
The internet certainly did exist in the 1980s. But you basically concede my point then. Tails had nothing to do with the actual
Re: (Score:2)
Former CIA agents are not current CIA agents.
As the Cambodian situation became worse, the Cambodian government sought military assistance from the United States and South Vietnam.
-- Across the Border: Sanctuaries in Cambodia and Laos [army.mil]
This is an official military source that misses the point that the "government" of Cambodia was not de facto sovereign at the time, nor legal..the request came from Lon Nol, a pro-US general who was just installed in a coup d'etat.
The US was out of South Vietnam in 1975. That is nearly 40 years ago. I doubt there are many CIA agents that were working in Vietnam still working at the CIA.
They'd be 60-70 years old but it's still quite possible. The CIA doesn't really publish lists of employees so this can be checked.
Iran Contra is also well into the past. And once again, a former Director of CIA is not a current Director or employee.
The internet certainly did exist in the 1980s.
Yes, but mostly as U.S-only network, it would be more accurate to say the "Internet did not exist in the way we know it today". CERN and Europe didn't largely uplink into the TCP/IP-based internet until 1989..post-Berlin Wall.
The real contributor to freedom was the CIA, not the small Tails project only a few years old.
If you think that the CIA contributed to "freedom" then you speak propaganda only. The CIA contributed to realpolitik, and only came to create "freedom" in places that mattered to the U.S.'s strategic interests. In the same way the KGB helped enforce a "prison of states" around Eastern Europe, the CIA helped foster a similar situation in South America. See Guatemalan Coup [wikipedia.org]. Let's not forget also about Chile and Grenada. Also, the CIA helped stifle dissent in America and reduce American political freedoms during thist ime. Reference: Operation CHAOS [wikipedia.org]
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Today, Cold Fjord and the NSA _are_ the Nazis.
Re: (Score:2)
You have to be joking. There is no bigger defender of the state, the status quo, and the Anit-American activities of the NSA than you. I don't think there is a more statist asshole on all of Slashdot than you are, so I suppose we should add "deluded" to your list of faults now too.
Re:Tails is awesome (Score:4, Interesting)
Jesus -- I haven't done acid since my college days a quarter century ago. You should lay off it.
Big Lie -- you're whole post is this. You try to take on the mantle of a freedom loving defender of American virtue, when the fucking straight fact is, you are the biggest NSA shill there is, and the NSA is one of the biggest threats to the US Constitution in the entire world. We also have other Executive branch things that are pretty fucking bad, but the NSA is anti-constitution, thus anti-American, and your support for the NSA makes YOU anti-American.
Re: (Score:2)
I will grant you I am often the one-eyed milkman [...]
Fixed that for ya.
Almost (Score:5, Interesting)
Tails doesn't store any data locally,' writes Finley. 'This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources.'
Traffic sniffing does not require files on the target and this is the biggest source of data for agencies like the NSA. It may protect you from key loggers being installed (unless they were inserted ahead of time).
I'm pretty sure that part of Snowden's leaked information showed that exploits are occurring at the hardware level as well as software. Entry points like LOM modules were explicitly called out in the leaked presentations.
I'd agree that forensics becomes extremely difficult, if not impossible (memory analysis can still occur). I don't agree that the systems are immune to malicious software at least in a general sense. Immunity would require a lot of control for the hardware running the OS, and monitoring to make sure things have not been tampered with. Relying on a repository build of an OS imaged is still a target for potential a MITM attack feeding a user a kitted image.
It's all good in my opinion, I'm just being picky about the terminology chosen. Immunity implies absolute safety, and very little in the world is absolute.
Re:Almost (Score:5, Interesting)
Tails doesn't store any data locally,' writes Finley. 'This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources.'
Traffic sniffing does not require files on the target and this is the biggest source of data for agencies like the NSA. It may protect you from key loggers being installed (unless they were inserted ahead of time).
All traffic sniffing will do is show they are talking to a TOR entree node. Everything is wrapped in multiple layeres of encryption between you and each of the nodes in between. Maybe they could tell from traffic analysis what type of traffic it is based on traffic profiling, streaming your pr0n over to will have a different profile than browseing a webpage wich will in tun be different than ssh, but they still won't know the end point and what the content is.
I'm pretty sure that part of Snowden's leaked information showed that exploits are occurring at the hardware level as well as software. Entry points like LOM modules were explicitly called out in the leaked presentations.
Yes but they would have to have had access to your computer to insert the hardware bugs. If you say pick up a cheap laptop at walmart paid for with cash they won't know who has it, and would not have inserted the bugs as they could not have known who would end up wih the computer.
I'd agree that forensics becomes extremely difficult, if not impossible (memory analysis can still occur).
if they are doing memory analysis thy have the computer in their posesion already and you probably have a much larger issues to worry over.
I don't agree that the systems are immune to malicious software at least in a general sense. Immunity would require a lot of control for the hardware running the OS, and monitoring to make sure things have not been tampered with.
Technically true. However you have to trust something, and as long as there has been know oppertunity to tamper with the computer you can assume your safe for most things.
Relying on a repository build of an OS imaged is still a target for potential a MITM attack feeding a user a kitted image.
That is why we have cryptographic signatures on repositories and iso images. If they can break a 4092 bit key in polynomial time we are f***ed anyway
Re: (Score:2)
All traffic sniffing will do is show they are talking to a TOR entree node. Everything is wrapped in multiple layeres of encryption between you and each of the nodes in between. Maybe they could tell from traffic analysis what type of traffic it is based on traffic profiling, streaming your pr0n over to will have a different profile than browseing a webpage wich will in tun be different than ssh, but they still won't know the end point and what the content is.
Um, no! I am not sure how much you know about network security, but I sniff packets all the time and decrypt traffic. If you have a private key this is simple to do. With a massive computer, I can store conversations and brute force a key lateer. This was made easier by the NSA introducing some weak algorithms into encryption protocols. Even without those weaknesses, it is possible to brute force. We are better today after knowing about introduced weaknesses, but still not immune.
Yes but they would have to have had access to your computer to insert the hardware bugs. If you say pick up a cheap laptop at walmart paid for with cash they won't know who has it, and would not have inserted the bugs as they could not have known who would end up wih the computer.
Unfortunately the exp
Re: (Score:2)
Tor mitigates traffic analysis attacks by padding data, generating extra random packets, combining packets it is forwarding or splitting them up again etc.
Re: (Score:2)
All traffic sniffing will do is show they are talking to a TOR entree node. Everything is wrapped in multiple layeres of encryption between you and each of the nodes in between. Maybe they could tell from traffic analysis what type of traffic it is based on traffic profiling, streaming your pr0n over to will have a different profile than browseing a webpage wich will in tun be different than ssh, but they still won't know the end point and what the content is.
Assuming you can view every page and do what you need to do without ever turning on Javascript. Which is quite the tall order. For example, there is no e-mail service on this planet that allows signup and use without JS turned on for at least one step or payment (this sounds ridiculous, but go and try it. There used to be. They've all been changed or shut down.). And it's been clearly established all it takes is one malicious script to unmask your IP while on tor.
Yes but they would have to have had access to your computer to insert the hardware bugs. If you say pick up a cheap laptop at walmart paid for with cash they won't know who has it, and would not have inserted the bugs as they could not have known who would end up wih the computer.
Actually they would have a picture of your f
The Distant Future, Considered (Score:4, Interesting)
how do we know it isn't some government plot designed to snare activists or criminals? A couple of ways, actually. One of the Snowden leaks show the NSA complaining about Tails in a Power Point Slide
And that, ladies and gentleman, is how you play the Really Long Game.
Comment subjects suck (Score:2)
And it's Slashdotted.
NSA 'compaining' about tails (Score:4, Insightful)
NSA 'compaining' about tails? Oh, no, please don't throw me in that briar patch!
http://americanfolklore.net/fo... [americanfolklore.net]
Re: (Score:2)
Amnesic? (Score:2)
Re: (Score:3)
The Amnesic Operating System.
Shouldn't it be amnesiac?
Nope - an amnesiac is a noun that refers to a person suffering from amnesia; "amnesic" is an adjective that means "exhibits properties of amnesia," which can apply to more than just the human psyche.
Re: (Score:2)
Re: (Score:2)
The government should pass a law! (Score:5, Funny)
Snowden would have had a much harder time had he been using legal Microsoft products.
What a shame (Score:2)
What do you bet that "Tails" used OpenSSL as part of its security?
Re: (Score:2)
Re: (Score:2)
https://www.schneier.com/blog/archives/2014/04/reverse_heartbl.html [schneier.com]
Re: (Score:2)
Re: (Score:2)
Just like a malicious client can suck data out of a vulnerable server, the same can work in reverse, though clients tend not to keep an SSL connection open any longer than they need to (unless, it's IMAPS or FTPS or chat or some other application with persistent connections).
If you suck the private key out of a bank webserver's RAM, then perform a MITM attack on the bank users using the bank's own certificate, not only can you get their bank credentials (by them filling in the form and sending it to you), d
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
True but I doubt that it matters that much since another client talking to the same vulnerable server could compromise the server keys and potentially allow intercepts of other client communications.
Re: (Score:2)
Re: (Score:2)
Heartbleed is a server exploit
Actually it can cut both ways [reverseheartbleed.com].
Having the souce Code does not make it safe (Score:4, Informative)
Unless you compile from vetted source code on an un-compromised system using an un-compromised compiler, etc., you can't be certain the binary they provide is the same as what compiling the source code would provide.
Re:Having the souce Code does not make it safe (Score:4, Funny)
I would assemble the system myself from discrete transistors, except that I can't be sure the NSA didn't drug me, drag me off and hypnotize me.
Re: (Score:2)
Most of us are gonna have to trust someone at some point. We can't build our own CPUs out of sand, we have to hope that Intel didn't install an NSA sponsored backdoor. Fortunately all the evidence so far suggests that the NSA avoids creating pre-exploited hardware and firmware, instead relying on more subtle techniques like weakening encryption or making use of genuine bugs. Maybe they insert a few bugs too, but again the evidence suggests that using systems like Tails is pretty effective.
At any rate, it se
Trust No One (Score:3)
Are you able to verify all of the distribution yourself? Are you able to vet the contributors? Are they able to vet each other? Is Tor really safe?
It all comes down to a matter of degree but in the end... Trust No One
Re: (Score:2)
In other words, don't use any technology unless you developed it yourself, smelted the raw materials yourself, &c.
How much do you trust the evidence of your senses?
Re: (Score:2)
You'll notice that al Qaeda has gone back to using couriers.
I would say if you use technology which can compromise your location, communications or other private info and you do not want to share that then yes, you are making a mistake to assume safety unless you have personally vetted it. As noted earlier, it comes down to a matter of degree/risk assessment (ignoring that you may be terrible or unqualifed at assessing that) but that there is a non zero probability you have been compromised. And Trust No
Whonix is another alternative (Score:2)
https://www.whonix.org/ [whonix.org]
Magnet links:
magnet:?xt=urn:btih:A031805E690BB0E03114A8FEB52485517218D3CE&dn=Whonix-Gateway-8.1.ova&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&ws=http%3a%2f%2fwebseed.whonix.org%3a8008%2f8.1%2fWhonix-Gateway-8.1.ova
magnet:?xt=urn:btih:AB89247534553946C500EDF3A78E9C30F9C956ED&dn=Whonix-Workstation-8.1.ova&tr=http%3a%2f%2fannounce.torrentsmd.com%3a6969%2fannounce&ws=http%3a%2f%2fwebseed.whonix.org%3a8008%2f8.1%2fWhonix-Workstation-8.1.ova
And here's
Re: (Score:2)
Note that the above Whonices are vulnerable to Heartbleed, so you'll need to do an apt-get update/apt-get dist-upgrade once you've imported the VMs into VirtualBox.
News: NSA hired person good at security (Score:2)
"Fire him! He's too clever for us!"
Old fashion... (Score:2)
How about just sending the stuff by snail mail? I'd bet my cup of coffee that they completely lost the expertise and interest on this form of communication.
If the NSA doesn't like Tails they will target it. (Score:2)
They will put developers to work on the open source code who will "accidentally" insert bugs that open holes in the security -like the hole that was recently discovered in https. Tails may have been a problem for them in the past, but with the NSA's nearly infinite budget it seems unlikely that Tails would remain a problem for long.
Re:Anonymous on the internet? (Score:5, Informative)
Re: (Score:2)
makes all traffic go over Tor.
Doesn't this slow things down considerably? Can you do normal activities like ssh or youtube in this type of setup?
Re: (Score:2)
Re: (Score:2)
Tor is ineffective when you can tap the whole internet and do statistical analysis.
Next.
Re: (Score:2)
No, actually, and the hubris of your "Next" comment is telling about how you summarily dismissed this without doing any actual research. Have you ever actually tried to do a traffic correlation attack? Do you even know how Tor works?
Tor, in order to defeat traffic correlation attacks (or at least make them much more difficult), re-negotiates its connection to use a different circuit every ten minutes. The NSA themselves in the leaked "Tor Stinks" document even pointed to this as being extremely diffi
Re: (Score:2)
Heres the slides (warning TS//) http://apps.washingtonpost.com... [washingtonpost.com] They are from 2007, before iPhone came out. Much has changed since then.
NSA capabilities now include tapping phones of an entire country this is even U// by now https://firstlook.org/theinter... [firstlook.org]
Since Tor was identified as interesting in 2007 and since it hasn't died, it is safe to assume efforts are continuing to be applied against it.
And no, I don't have access to Internet scale data streams here, just using the standard Tor disclaimer at ht [torproject.org]
Re: (Score:3)
Re:Anonymous (Score:5, Informative)
Incognito Linux did not impress me. You can be more anonymous using Backtrack.
ah no.
Backtrack is for cracking not staying anonamous.
Tails routes all of your traffic through TOR and keeps you anonymous as long as you don't share anything reveling.
Re: (Score:2)
as long as you don't share anything reveling.
So its pretty much useless then? I realize the point of what its doing, but its fairly trivial with software running at or near exit nodes to figure out who's doing what and who they are. I have no doubt the NSA is capable of doing it. Put me in an IRC channel with 20 people I know and have chatted with for some time, randomize their nicks, give me an hour and I can tell you who most of them are based on their conversation patterns alone, and I'm just observant, not software combing EVERYTHING you do.
Doe
Re:Anonymous (Score:5, Insightful)
Re: (Score:3)
Re: (Score:2)
But I revel in sharing! :P
Re: (Score:2)
Re: (Score:3)
Maybe Trucrypt isn't available for linux distros but i am sure there are plenty of alternatives that do a similar full system os encryption.
I can think of one alternative on Linux, it's called Truecrypt with an "e".