At first I wanted to write blog post about how to stay anonymous by using privacy enhanced OS, but changed my mind during research process as I couldn’t pass by other highly useful solutions.
I ended up by choosing The Amnesic Incognito Live System and IPrediaOS as a two different privacy enhanced distributions. Lightweight Portable Security as a simple and secure end-node. Ubuntu Privacy Remix for an isolated system to deal with sensitive data.
Each of them has it’s use and fill different needs.
The Amnesic Incognito Live System#

Name | <td>
Tails or The Amnesic Incognito Live System
</td>
Short description | <td>
<p>
Tails is the best known live operating system that aims at preserving your privacy and anonymity.
</p>
</td>
Current version | <td>
1.1
</td>
Website | <td>
<a rel="external noopener noreferrer" target="_blank" href="https://tails.boum.org">tails.boum.org</a>
</td>
Anonymity network | <td>
Tor, I2P
</td>
Base distribution | <td>
<a rel="external noopener noreferrer" target="_blank" href="https://www.debian.org/">Debian GNU/Linux</a>
</td>
Supported kernel architectures | <td>
32 and 64 bit support
</td>
Desktop environment | <td>
GNOME, no additional flavors
</td>
License | <td>
GNU General Public License version 3 or above
</td>
Interesting features | <td>
<ul>
<li>
Microsoft Windows 8 camouflage mode
</li>
<li>
MAC address spoofing
</li>
<li>
Easy way to clone operating system to another USB device
</li>
<li>
Persistent storage
</li>
</ul>
</td>
IprediaOS#

Name | <td>
IprediaOS
</td>
Short description | <td>
<p>
IprediaOS is a secure operating system that provides an anonymous environment using I2P anonymity network.
</p>
</td>
Current version | <td>
0.9.6
</td>
Website | <td>
<a rel="external noopener noreferrer" target="_blank" href="http://www.ipredia.org/">www.ipredia.org</a>
</td>
Anonymity network | <td>
I2P
</td>
Base distribution | <td>
<a rel="external noopener noreferrer" target="_blank" href="http://fedoraproject.org/">Fedora</a>
</td>
Supported kernel architectures | <td>
32 bit support
</td>
Desktop environment | <td>
LXDE, GNOME Shell
</td>
License | <td>
GNU General Public License version 2
</td>
Interesting features | <td>
<ul>
<li>
Built around I2P support
</li>
<li>
LXDE flavor is a way faster then its GNOME counterpart
</li>
</ul>
</td>
Lightweight Portable Security#

Name | <td>
LPS or Lightweight Portable Security
</td>
Short description | <td>
<p>
LPS is a small and secure operating system created by the Air Force Research Laboratory created.
</p>
</td>
Current version | <td>
1.5.3
</td>
Website | <td>
<a rel="external noopener noreferrer" target="_blank" href="http://www.spi.dod.mil/lipose.htm">www.spi.dod.mil/lipose.htm</a>
</td>
Anonymity network | <td>
none
</td>
Base distribution | <td>
custom
</td>
Supported kernel architectures | <td>
32 bit support
</td>
Desktop environment | <td>
XFCE
</td>
License | <td>
GNU General Public License version 2
</td>
Interesting features | <td>
<ul>
<li>
Designed to act as trusted end-node
</li>
<li>
Outstanding smart card support
</li>
<li>
Two flavors: tiny <em>LPS-Public</em> and <em>LPS-Public-Deluxe</em> with LibreOffice and Adobe Reader software
</li>
</ul>
</td>
Ubuntu Privacy Remix#

Name | <td>
UPR or Ubuntu Privacy Remix
</td>
Short description | <td>
<p>
UPR is a Ubuntu-based distribution designed to provide secure isolated working environment with removed support for LAN, WLAN, Bluetooth and IR hardware.
</p>
</td>
Current version | <td>
12.04r1
</td>
Website | <td>
<a rel="external noopener noreferrer" target="_blank" href="https://www.privacy-cd.org/">www.privacy-cd.org</a>
</td>
Anonymity network | <td>
none
</td>
Base distribution | <td>
<a rel="external noopener noreferrer" target="_blank" href="http://www.ubuntu.com/">Ubuntu</a>
</td>
Supported kernel architectures | <td>
32 bit support
</td>
Desktop environment | <td>
GNOME
</td>
License | <td>
GNU General Public License version 2
</td>
Interesting features | <td>
<ul>
<li>
Use <code>godmode</code> kernel parameter to enable <code>sudo</code> utility
</li>
<li>
Designed to safely work with sensitive data
</li>
<li>
TrueCrypt support
</li>
</ul>
</td>
Last words#
I did not described Whonix in spite of the fact that it is nice solution using KDE desktop environment,
as it uses completely different approach taking advantage of the virtual machines.
I have tried to run Freepto but failed miserably during installation phase [maybe just faulty USB stick]. It is an interesting project, so I will surely try it again in the near future.
I have skipped JonDo as it is an alternative anonymizing network that provides premium chargeable services, but you are free to try it and decide for yourself.