Search Mailing List Archives

Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] best practices - roundup

Steve Weis steveweis at
Tue Oct 9 14:54:29 PDT 2012

I hadn't seen Tails before and don't know how baked it is as a project. I
just tried it out and found an exploitable vulnerability in their
configuration that would allow someone to compromise the system. It's a
corner case and not likely to impact many systems, but is a well known
problem. I've reported the issue to the authors.

On Tue, Oct 9, 2012 at 12:03 PM, Lindsay Beck <lbeck at> wrote:

> Thanks for compiling these resources! Another great tool that is perfect
> for traveling is TAILS, which stands for The Amnesiac Incognito Live System
> ( TAILS is a bootable Linux USB
> that automatically routes your Internet connection through the Tor network
> and wipes its memory clean after each use. Through its design, it makes
> users automatically follow many best practices in digital safety, such as
> securely delete unused files, use a trusted circumvention tool, etc.
> Disclosure: TAILS relies on BIOS for operability, and thus can have
> challenges functioning on newer computers that utilize UEFI without legacy
> support for BIOS. But this is something that will be fixed in the coming
> months with NDI's support.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>

More information about the liberationtech mailing list