Refractux X 20 [Final]:
Replaced:
-dark themes
-dark icons
Added:
-new dark themes (grey, green, purple)
-new dark icons (grey, green, purple)
-ceni (a better network manager)
-keepassx (password manager)
-pypass (pseudorandom password generator)
Saved: https://archive.is/clKAw
For now i will try to keep the info updated on the "Internet Archive": https://archive.org/details/refractuxgnulinux
]]>Very intresting! FYI another encryption tool is Tomb https://github.com/dyne/Tomb best GUI for it is this https://github.com/dyne/Tomb/tree/master/extras/gtomb but there is also Zulucrypt that supports a bunch of other encryption file formats. Let me know how goes and if you have suggestions how to improve!
Thank you!
]]>"Refractux X 2020 Patch 02" is online.
Screenshot list updated
================================
]]>Just wanted to report here as well. I tried this version "Refractux", and like I have mentioned with Devuan and also Refracta OS, I couldn't get neither my Ethernet nor WiFI working on this OS with my newer AMD system. I did get a reply on the Devuan thread about the issue and that it's apparently a known issue. Just wanted to report here as well after I tried this one without success. Thank you!
https://dev1galaxy.org/viewtopic.php?pid=26463#p26463
That CPU and the wireless & internet cards are only supported by the kernel version in the beowulf-backports repository. The wireless card also needs the backported iwlwifi firmware package and the ethernet card probably needs the backported Realtek firmware package.
These are known issues and the package versions in the main beowulf repositories will never be bumped because that's not how Devuan works but thank you for your report :-)
Thank you BoneZ
Based on "Head_on_a_Stick" reply, i did a little patch that you can use to try solve your problem after install ["Refractux X 2020" iso + patch 01 + patch 02]
Refractux X 2020 Try 01 [Run as root]: https://mega.nz/file/9l4G1BBJ#5NRT92MbJ … iNz5nepv-s
password: 404
Screenshot list updated matching the "Refractux X 2020 Patch 01".
]]>dice wrote:Also most crypto software uses broken AES or asymmetric crypto soon broken by The Shor's Algorithm with Quantum Computers.
Today's global cyber espionage can only be stopped by One-Time Pad File Encryption. That's why FinalCrypt.What a load of crap...
That was an interesting read. So doubling the key size may effectively block quantum attacks.
]]>dice wrote:https://github.com/S2-/sshenc.sh/
& this is a good one time pad shell script: https://snippets.bentasker.co.uk/page-1 … -BASH.html
Thank you dice, i will see how this run in the distribution in order to replace "finalcrypt". [ ]
They were just some examples to think about.
There is also https://packages.debian.org/buster/otp
Generator for One Time Pads or Passwords
otp creates key and password lists for verification and security purposes in a variety of formats. Keys can be of any length, consist of digits or letters (capital or lower case), and alphabetic passwords can either be entirely random (most secure) or obey the digraph statistics of English text (easier to remember when transcribing, but less secure).For computer applications, for example one-time login passwords, otp can create a file containing the MD5 signature of each of the generated keys. This permits the computer to verify keys without the need to store the keys in plaintext.
Also most crypto software uses broken AES or asymmetric crypto soon broken by The Shor's Algorithm with Quantum Computers.
Today's global cyber espionage can only be stopped by One-Time Pad File Encryption. That's why FinalCrypt.
What a load of crap...
]]>https://github.com/S2-/sshenc.sh/
& this is a good one time pad shell script: https://snippets.bentasker.co.uk/page-1 … -BASH.html
Thank you dice, i will see how this run in the distribution in order to replace "finalcrypt". [ ]
]]>Another unique approach to file encryption in this link from stackoverflow using perl6.
https://stackoverflow.com/questions/540 … 4#54093334
and or shell level.
https://github.com/S2-/sshenc.sh/
& this is a good one time pad shell script: https://snippets.bentasker.co.uk/page-1 … -BASH.html
]]>FinalCrypt - The No¹ One-Time Pad Encryption
Why FinalCrypt ?
Today's cyber espionage comes from hidden spyware waiting for you to unlock your drive. Disk Encryption no longer protects!
Even when you're logged on, unopened files have to remain encrypted. Only File Encryption stops spyware reading your files.
Also most crypto software uses broken AES or asymmetric crypto soon broken by The Shor's Algorithm with Quantum Computers.
Today's global cyber espionage can only be stopped by One-Time Pad File Encryption. That's why FinalCrypt.
Is AES broken ?
]]>