Linux – A Tale of Tails and TOR

We have had a number of good threads going discussing various OSs.
Thought I’d add one more to the pot.

So, you find yourself involved with some Org/Biz/Gov that wants to bring about TEOTWAWKI.
What to do? How to blow the whistle anomalously?
Or perhaps there is that Website that looks so intriguing – but you know better than to follow that link. Need to leak to Wikileaks? Report on activities that could have dire repercussions to the reporter?

There is a Linux for that – Tails.
https://tails.net/
It is a live distro that has privacy as its primary goal.
In addition to typical apps it features TOR – The Onion Router.

Which uses a series of servers world wide to prevent tracking your activities.
TOR browser can be used with most OSs.

The deal with Tails/TOR is that it is super easy to use with max privacy.
Boot from a USB stick. It leaves no trace of what you did after shutdown.
Tails can create a persistent storage area on the stick that is password protected.
There any data needed can be retained.

Recommended by Snowden Et al. As the OS to use for easy anonymity.
Sure other Linux setups can be configured – but this one is ready to go w/o end user fussing.

It is worth a look – just to see the intent and possibilities.
All the Best,
Jeff

2 Thanks

Jeff, will we still need to use RUFUS or similar to make the usb stick bootable?

Yes, need something to make the .img file into bootable media.
The Tails site recommends balenaEtcher
I used the portable version so nothing installs in Windows.
Instructions for Windows download and install and a link to Etcher
https://tails.net/install/windows/index.en.html
etcher portable download
https://tails.net/etcher/balenaEtcher-portable.exe
All the Best,
Jeff

I always carry a Tails USB drive for use on untrusted computers, it’s a tremendous tool!

That is another good use for Tails or other live distros.
:+1:
I don’t trust any system unless I know it.
All the Best,
Jeff

What I like about Tails as compared to other live distros is the fact it’s designed to not leave breadcrumbs anywhere after use. It doesn’t automount media such as internal hard drives unless specifically requested and it overwrites RAM on shutdown and only exposes a very small surface to networks. Unless I suspect a hardware keylogger or a scary low level hypervisor on the system I’m comfortable entering stuff like my bank card information or checking my emails even on a super sketchy internet café computer.

1 Thank

Glad you mentioned that. Most everything else mounts whatever it can see.

I actually found a keylogger on a system. An ex-husband, we assume, installed it on her machine.
If she hadn’t brought me the whole computer - I don’t think I would have found it.
Since most KB connections are on the back, under a desk.
She took it to her lawyer. Never did find out what happened.

All the Best,
Jeff

2 Thanks

That’s revolting. Glad you were able to help!

1 Thank

What about whonix plus cubes?

Yeah. For some reason I seemed to be the go to place for questionable software/hardware. Think it was because I would buy / salvage used systems.
Think I turned away at least 3 stolen systems over the years.
Funny, the police never seemed too interested in investigating.

Besides all sorts of dead critters, I once found a bullet inside a system!
DOS 5ish era. Desktop box back when they were made of real metal.
.36 hole in the back. 9mm FMJ bullet inside.

Plaster dust so I think it went through a wall first.
Computer still worked! Big gouge in the side of the power supply.
Lots of strange tales from the days of DOS.
All the Best,
Jeff

1 Thank

I have no firsthand knowledge.
It looks like it is designed to run as a VM and has TOR built in.
Needs a host and hypervisor. Qubes bare-metal hypervisor.
Much more rigorous hardware requirements vs Tails.
Tails is dead simple to run. Works on most hardware.
Hope that helps.
All the Best,
Jeff

1 Thank

If you are looking for some more privacy/security/anonymity recommendations check out
https://www.privacyguides.org/en/tools/

1 Thank

Whatever happened with U3? That was supposed to be The Next Big Thing, and then just kinda fizzled out.

(deleted my earlier post to not spread misinfo)

Appreciated, I guess I’m just the sort of person who knows their way around privacy stuff without a guide, and I’ve definitely linked people there before without being 100% aware, although not particularly recently, when I don’t have a single specific recommendation, will definitely update that setting in my brain then.

Really cool to see a contributor, you do great work :slight_smile:, I guess I didn’t realise the link there between the two sites at first.

1 Thank

Interesting, never heard of it before (also, never looked into it, so I guess not surprised…), I’ve got some spare flash keys in a drawer, this might be a good use for one or two of them!

1 Thank

Troubleshooting fail :rofl:

1 Thank

Nah. The guy just wanted shell access…

1 Thank

“Not what I meant by shellcode injection”

I consider Powershell anything over .40 Caliber…
All the Best,
Jeff