TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Tails 2.0 is out

318 pointsby rouma7over 9 years ago

8 comments

AdmiralAsshatover 9 years ago
<i>Tor Browser 5.5 introduces protection against fingerprinting but due to an oversight it is not enabled in Tails 2.0. However, this is not so bad for Tails users since each Tails system has the same fonts installed, and hence will look identical, so this only means that it&#x27;s easy to distinguish whether a user of Tor Browser 5.5 uses Tails or not. That is already easy given that Tails has the AdBlock Plus extension enabled, unlike the normal Tor Browser.</i><p>I wonder why they opted to preload it with AdBlock Plus instead of uBlock Origin. I&#x27;m sure gorhill would certainly give his blessing, and by all measurements it is just as effective with way less overhead.<p>Heck, they could go one step further and preload it with a uBlock Origin profile on a paranoid mode that proactively disables all JavaScript (last I remember using Tor I had to manually disable Javascript in the Firefox config).
评论 #10990483 未加载
评论 #10989354 未加载
评论 #10989486 未加载
评论 #10989464 未加载
nikcubover 9 years ago
I appreciate a lot of the work that the Tails guys do - but for a privacy and security focused distribution there are far too many included apps for my liking[1], which increases the attack surface. LibreOffice, Gimp and Audacity are just some of the apps - and many have a horrible history of vulnerabilities[2].<p>When Tails has had vulnerabilities it is often with one of these included apps[6].<p>The browser isn&#x27;t sanboxed (it&#x27;s in progress[3]), and the machine is still directly connected to the internet, so you&#x27;re a single Firefox vulnerability and a drive-by download away from being deanonymized.<p>It is also a shame that both OS X and Windows make it difficult to write an OS to an USB stick and boot from it - the install requires an intermediary Linux OS either on DVD or USB, which a lot of users won&#x27;t get by.<p>For a different approach, see Whonix[4] - a virtual machine based approach with an isolating proxy (very popular setup amongst black hats) and Qubes OS[4] which is built on Xen and runs processes in separate VM&#x27;s<p>[1] <a href="https:&#x2F;&#x2F;tails.boum.org&#x2F;doc&#x2F;about&#x2F;features&#x2F;index.en.html" rel="nofollow">https:&#x2F;&#x2F;tails.boum.org&#x2F;doc&#x2F;about&#x2F;features&#x2F;index.en.html</a><p>[2] <a href="https:&#x2F;&#x2F;www.cvedetails.com&#x2F;vulnerability-list&#x2F;vendor_id-11439&#x2F;product_id-21008&#x2F;Libreoffice-Libreoffice.html" rel="nofollow">https:&#x2F;&#x2F;www.cvedetails.com&#x2F;vulnerability-list&#x2F;vendor_id-1143...</a><p>[3] <a href="https:&#x2F;&#x2F;wiki.mozilla.org&#x2F;Security&#x2F;Sandbox" rel="nofollow">https:&#x2F;&#x2F;wiki.mozilla.org&#x2F;Security&#x2F;Sandbox</a><p>[4] <a href="https:&#x2F;&#x2F;www.whonix.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.whonix.org&#x2F;</a><p>[5] <a href="https:&#x2F;&#x2F;www.qubes-os.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.qubes-os.org&#x2F;</a><p>[6] <a href="https:&#x2F;&#x2F;blog.exodusintel.com&#x2F;2014&#x2F;07&#x2F;23&#x2F;silverbullets_and_fairytails&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.exodusintel.com&#x2F;2014&#x2F;07&#x2F;23&#x2F;silverbullets_and_fa...</a>
评论 #10990571 未加载
评论 #10990498 未加载
评论 #10990335 未加载
评论 #10991639 未加载
nxzeroover 9 years ago
Always been puzzled as to why the ISO release is provided by HTTP and not HTTPS; possible it doesn&#x27;t make a difference, but if so, it&#x27;s not clear why.
评论 #10990710 未加载
评论 #10989705 未加载
评论 #10989704 未加载
评论 #10993061 未加载
评论 #10994695 未加载
746F7475over 9 years ago
I&#x27;m sure I&#x27;m not first to question this, but if you download Tails or Tor browser or whatever, wouldn&#x27;t that be sort of obvious? I mean it leaves traces. Then if you only use it to do something specific be it chat with friends, browse for porn, take part is activism or to buy illegal products for example wouldn&#x27;t it be easy to see that: your computer went offline, then something new (Tails) went up, took anonymous connection to somewhere and then X happened, then Tails went away and your main OS&#x2F;machine went back up.<p>My main &quot;inspiration&quot; here is the fake bomb threat by the college kid to get out of mid terms, just before the email about the bomb was sent his IP downloaded Tor bundle. The service he was using also had the schools IP or something so administration could see it was sent from inside the school, but I think that is still valid concern. This kind of meta data about your actions can leak just as much information as actually seeing what you are doing.<p>My question therefor would be: should more people use Tails as their &quot;daily driver&quot;? Would that make it more anonymous&#x2F;private for the people like whistle blowers? My only idea at the moment would be to pay for two separate trusted VPN provider (don&#x27;t know how you would vet that trustworthiness) with bitcoin, to keep your anonymity&#x2F;privacy with them as well. Then pipe all your traffic through one of the VPNs all the time. Then when you need to use Tor, you would simply pipe it through that same VPN when you would emerge with rest of the clients from same point and then pipe your Tor traffic through the secondary VPN. This way you would still get the benefits of encrypted tunnels all the way through with benefit of Tors anonymizing and it might not be so obvious you are browsing Tor to your ISP or whatever.<p>Maybe I&#x27;m thinking this is harder than it actually is
评论 #10993954 未加载
评论 #10993747 未加载
Sleakerover 9 years ago
Hmm inclusion&#x2F;switch to systemd on something that purports to be a &#x27;secure&#x27; OS for private browsing seems counter-intuitive.
评论 #10991781 未加载
bphoganover 9 years ago
Firefox refuses to let me look at this page because of a certificate problem.<p>Not to go off on a rant, but this is what the &quot;everyone must use https because we said so&quot; edict is going to cause - it&#x27;s not enough you use https, it has to be the right kind of https that involves a third party issuer of certs.<p>Can anyone fix that issue or link to a different page please?
评论 #10989607 未加载
评论 #10989263 未加载
评论 #10989431 未加载
评论 #10990441 未加载
评论 #10989256 未加载
评论 #10990721 未加载
评论 #10989346 未加载
sultansaladinover 9 years ago
How secure is this os?
awinter-pyover 9 years ago
Think twice before clicking this link. A bunch of non-crazy newspapers have reported that merely reading about privacy tools (tails &amp; tor) will make you a link in the NSA surveillance graph.
评论 #10991021 未加载
评论 #10992303 未加载
评论 #10991619 未加载