Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] best practices - roundup

Steve Weis steveweis at gmail.com
Tue Oct 9 14:54:29 PDT 2012


I hadn't seen Tails before and don't know how baked it is as a project. I
just tried it out and found an exploitable vulnerability in their
configuration that would allow someone to compromise the system. It's a
corner case and not likely to impact many systems, but is a well known
problem. I've reported the issue to the authors.

On Tue, Oct 9, 2012 at 12:03 PM, Lindsay Beck <lbeck at ndi.org> wrote:

> Thanks for compiling these resources! Another great tool that is perfect
> for traveling is TAILS, which stands for The Amnesiac Incognito Live System
> (https://tails.boum.org/index.en.html). TAILS is a bootable Linux USB
> that automatically routes your Internet connection through the Tor network
> and wipes its memory clean after each use. Through its design, it makes
> users automatically follow many best practices in digital safety, such as
> securely delete unused files, use a trusted circumvention tool, etc.
>
> Disclosure: TAILS relies on BIOS for operability, and thus can have
> challenges functioning on newer computers that utilize UEFI without legacy
> support for BIOS. But this is something that will be fixed in the coming
> months with NDI's support.
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20121009/86b77eb8/attachment.html>


More information about the liberationtech mailing list