Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
Debian Censorship Communications Networking Privacy

Privacy-Centric Linux Distro Tails Hits 2.0 Release 42

A_Mythago writes: The Amnesic Incognito Live System (Tails) has finalized version 2.0, which has several improvements and updates to continue to meet their mission of preserving privacy, anonymity and circumventing censorship without a trace, using a Debian 8.0 custom live distro. More details about Edward Snowden's use of Tails and the distro itself can be found at a previous Slashdot story from 2014.
This discussion has been archived. No new comments can be posted.

Privacy-Centric Linux Distro Tails Hits 2.0 Release

Comments Filter:
  • Additional info (Score:4, Informative)

    by LichtSpektren ( 4201985 ) on Friday January 29, 2016 @11:21AM (#51396071)
    On the firehose submission of this news, I recommended some additional information be included in TFS:
    "This summary could use some more information. I'm here to help! What version of Tor (0.2.7.8) and the Tor browser (5.5, based off Firefox ESR 38.6)? What's new in 2.0 besides the OS and Tor updates (switch from Claws Mail to GNU Icedove, switch from SysVinit to systemd)? Did you know that it uses GNOME classic-mode instead of fallback-mode now? Did you know that Tails will now notify you if you're using virtualization software with proprietary binaries?"
    • by Anonymous Coward

      Tails is not immune to the observation that the chance and number of critical security errors increase as approximately the square of the number of new features.

      Only recently was the TrueCrypt security review completely, a and a half after the project was abandoned. At least one successor fork, VeraCrypt is not adding features every week.

      I would like monthly security fixes and no more than yearly feature additions.

      • Tails is not immune to the observation that the chance and number of critical security errors increase as approximately the square of the number of new features.

        Only recently was the TrueCrypt security review completely, a and a half after the project was abandoned. At least one successor fork, VeraCrypt is not adding features every week.

        I would like monthly security fixes and no more than yearly feature additions.

        That's precisely what TAILS' release cycle is. It's based off of Debian stable, so whatever that wasn't in Jessie won't be added for several years. There are scheduled security updates (as well as emergency releases for when the security vulnerabilities are particularly serious).

  • I tried to install it through my junker ubuntu laptop but the repository location got a 404 error and then I lost motivation to find out why.
  • circumventing censorship without a trace

    Perhaps someone may enlighten me here, but if I recall correctly, Tor doesn't actually hide the fact that you're using it, only what you're using it for, yes? Does Tails have some kind of extra protection to obscure even that??

    • Re:Hmm? (Score:5, Informative)

      by LichtSpektren ( 4201985 ) on Friday January 29, 2016 @12:38PM (#51396555)

      circumventing censorship without a trace

      Perhaps someone may enlighten me here, but if I recall correctly, Tor doesn't actually hide the fact that you're using it, only what you're using it for, yes? Does Tails have some kind of extra protection to obscure even that??

      That's kind of backwards. Any webmaster can tell when there's Tor users accessing their server. The purpose of Tor is to prevent a location trace (since all that you'd see is what exit node they came out of, not which node they entered through). The Tor Browser and TAILS supplement this because they're pre-configured (N.B. they strongly recommend you don't alter any of the default settings), so that every TB and TAILS user looks identical (i.e. they leave no special fingerprints that could be used to identify them).

    • Correct, Tor does not usually hide the fact that you are using it. There are some obscuring gateways into Tor, but those only work if you know about them and your adversary doesn't. I wouldn't trust that, and assume if I am using Tor, anyone who wants to know that fact can get it.

      The bomb threat made at Harvard (via Tor) a while back was traced to the only person who was on Tor when it was sent. That was the primary thing that lead to his suspicion.

      • Correct, Tor does not usually hide the fact that you are using it. There are some obscuring gateways into Tor, but those only work if you know about them and your adversary doesn't. I wouldn't trust that, and assume if I am using Tor, anyone who wants to know that fact can get it.

        The bomb threat made at Harvard (via Tor) a while back was traced to the only person who was on Tor when it was sent. That was the primary thing that lead to his suspicion.

        Right. The reason the Tor Browser works is because everyone using it is indistinguishable. What this means is that the less people using it, the weaker its obfuscation of its users becomes.

  • by Anonymous Coward

    This is what happens when you try to force an acronym.

  • by Anonymous Coward

    Dont bother the ppa just download the torrent file for the iso.
    you can use ktorrent it is a little tricky but you will figure it out.

  • Weren't you able to run Tails 1.0 by just putting in a CD and booting from it? What am I missing? I thought Tails was a live OS and you didn't "install" it per say.

If you push the "extra ice" button on the soft drink vending machine, you won't get any ice. If you push the "no ice" button, you'll get ice, but no cup.

Working...