Author Topic: Tails: The Amnesic Incognito Live System (Linux/TOR privacy)  (Read 8062 times)

Online FreeLancer

  • Global Moderator
  • Survival Demonstrator
  • ******
  • Posts: 4678
  • Karma: 514
Re: Tails: The Amnesic Incognito Live System (Linux/TOR privacy)
« Reply #30 on: August 08, 2017, 08:54:45 PM »
The latest Tails 3.0.1 update has been running great on my 2008 MacBook and 2009 MacBook Pro, and for the first time actually completes the entire shut down sequence properly, so I no longer have to manually power the machine off.  This is hands-down the best version so far.





Many flash drives do not play well, if at all, with Tails.  The ones pictured above have consistently worked well for me, the first 3 are by Kingston, the fourth from Transcend, and the last is a Gorilla Drive I found from EP Memory.  The Transcend has the smallest form factor and only sticks out about 7/16" from the side of the computer.

The various San Disk, Lexar, Samsung, and Silicon Power flash drives I have tried do not work with Tails, although San Disk's SD cards have worked well.
23:57:30

Offline surfivor

  • Survival Veteran
  • ********
  • Posts: 5467
  • Karma: 65
Re: Tails: The Amnesic Incognito Live System (Linux/TOR privacy)
« Reply #31 on: August 09, 2017, 02:53:08 AM »

 Chances are running Tor even on a VM is going to be much better than using a browser on windows as 95% of spyware and the like probably is not that sophisticated even though a lot of spying is going on.

Offline Sailor

  • Survivor
  • ***
  • Posts: 176
  • Karma: 13
Re: Tails: The Amnesic Incognito Live System (Linux/TOR privacy)
« Reply #32 on: August 10, 2017, 09:54:02 AM »
Yeah, the Transcend's have been working great for me. 

Remember, do not ever use this on any computer associated with you or any of your locations, (home, work etc)  Complete separation is required, you basically have to create a separate "you" that never crosses the real you. 

If you just want more privacy on computers you own, a VPN and Tor work great.  Never use public wifi without a VPN though. 

Offline Smurf Hunter

  • Survival Veteran
  • ********
  • Posts: 6072
  • Karma: 288
Re: Tails: The Amnesic Incognito Live System (Linux/TOR privacy)
« Reply #33 on: August 10, 2017, 10:09:12 AM »
Yeah, the Transcend's have been working great for me. 

Remember, do not ever use this on any computer associated with you or any of your locations, (home, work etc)  Complete separation is required, you basically have to create a separate "you" that never crosses the real you. 

If you just want more privacy on computers you own, a VPN and Tor work great.  Never use public wifi without a VPN though.

I understanding the technical reasons, but not the methodology.

Why can't you test our TOR on a personal machine you own?  I agree for true OPSEC, like transmitted leak classified documents and actual stuff you wanted to keep secret should be done with layers on anonymity. Go to an internet cafe, pay cash, etc.

The USB OS is stateless.  Anything you do while it's booted is volatile and disappears upon shut down.  So that USB should have no evidence that it was booted up from your laptop.

Offline Sailor

  • Survivor
  • ***
  • Posts: 176
  • Karma: 13
Re: Tails: The Amnesic Incognito Live System (Linux/TOR privacy)
« Reply #34 on: August 11, 2017, 07:41:46 AM »
TOR does not hide  your MAC address which can be traced to your network location and then used to identify your specific computer.  TAILs at least uses a fake MAC that can't be positively connected to you, but it still can give away your location.

Find a digital copy of Kevin Mitnick's book The Art of Invisibility, and give it a read.  He was a world famous hacker who got caught, and is now a penetration tester. 

You have to choose security or convenience you can not have both, for some people TOR, or TAILS on a personal computer is enough, as long as you understand the limits of your decision. 

BTW Nord VPN service is great.  I have been very happy with them.  Working great off my phone and home/work computers.  While in China for 2 weeks this summer, it was the only way I could connect to sites that the Chinese .gov blocks.   

Offline Smurf Hunter

  • Survival Veteran
  • ********
  • Posts: 6072
  • Karma: 288
Re: Tails: The Amnesic Incognito Live System (Linux/TOR privacy)
« Reply #35 on: August 12, 2017, 03:55:52 PM »
I remember playing with early Linux distribution 20 years ago, and changing my MAC to all zeros.  It really screwed with my ISP who hadn't even heard of Linux back then.

Offline jerseyboy

  • Survivalist Mentor
  • *****
  • Posts: 502
  • Karma: 28
  • Garden State Prepper
Re: Tails: The Amnesic Incognito Live System (Linux/TOR privacy)
« Reply #36 on: August 12, 2017, 04:27:40 PM »
TOR does not hide  your MAC address which can be traced to your network location and then used to identify your specific computer.  TAILs at least uses a fake MAC that can't be positively connected to you, but it still can give away your location.

Find a digital copy of Kevin Mitnick's book The Art of Invisibility, and give it a read.  He was a world famous hacker who got caught, and is now a penetration tester. 

You have to choose security or convenience you can not have both, for some people TOR, or TAILS on a personal computer is enough, as long as you understand the limits of your decision. 

BTW Nord VPN service is great.  I have been very happy with them.  Working great off my phone and home/work computers.  While in China for 2 weeks this summer, it was the only way I could connect to sites that the Chinese .gov blocks.   

https://superuser.com/questions/349256/theory-regarding-mac-and-ip-address-in-network-packet-and-frame-content

Help me out here.

If you are using NAT behind your router (99% of people are), how are you exposing your MAC address to anyone outside your router?

While I understand that every computer has a ' unique' MAC address, how does a MAC address give away your location?

Does the TOR protocol use that MAC address with the first hop to the entrance node when it creates its VPN since it thinks it is on its own separate network?

Jerseyboy