back to article Tails OS hits version 3.0, matches Debian's pace but bins 32-bit systems

The developers of privacy-protecting Linux distribution Tails have decided to get closer to Debian with the project's 3.0 release. Tails - aka The Amnesic Incognito Live System - is designed to boot and run from removable storage and not to leave any trace of what you did while running it. Users booting into version 3.0 will …

  1. Anonymous Coward
    Anonymous Coward

    Do you stll end up on an NSA list by visiting their website?

  2. Adam 52 Silver badge

    If you do it will give the retarded press, from the Independent to the Mail, another opportunity to print stupid "was known to the security services" headlines if you ever do something naughty.

  3. Anonymous Coward
    Anonymous Coward

    The same way you do by typing those 3 letters in a comment in a popular tech website known for it's in-depth whistleblowing of spook techniques?

  4. Redstone
    Black Helicopters

    I think the point is that..

    ..you end up on their list by visiting *any* website.

  5. Robert Carnegie Silver badge
    Joke

    NSA

    Isn't it a sexual disease?

  6. Anonymous Coward
    Anonymous Coward

    Re: I think the point is that..

    Which is why I wish magazines such as PC Pro still had cover disks*.

    *Yes I know the disk could be tampered with, that's what SHA-256** is for.

    **Yes I know I should not trust a SHA-256 tool off the same disk.

  7. Anonymous Coward
    Anonymous Coward

    Re: I think the point is that..

    > **Yes I know I should not trust a SHA-256 tool off the same disk.

    *** And don't trust the SHA-256 printed in the magazine either, because the magazine could be tampered with

    **** You can use PGP signatures, but how do you know you have the right PGP key to validate it with?

  8. PyLETS
    Black Helicopters

    Re: I think the point is that..

    "You can use PGP signatures, but how do you know you have the right PGP key to validate it with?"

    If you have been using Debian or Ubuntu for any length of time, packaged software downloads are signed using developer keys, some of which have signed the Tails gpg keys. So you can install the debian-keyring package, which is signed by these distribution repositories and this gets the same verification as other Debian or Ubuntu packages installed using apt-get . This means that for the NSA to have compromised the Tails instance as downloaded through a MITM or whatever, and for you not to be able to detect this if you're very careful and check signatures, they would also have had to compromise signed parts of the Ubuntu or Debian infrastructure. It seems to me much more easy for the NSA to have compromised the Tails distribution itself. To find that kind of hole you would have to check the Tails source code and compile it yourself, assuming you're both paranoid enough to want to do that, while sufficiently technically capable to compile it yourself on a platform which you do actually trust. Instructions on checking this chain of trust here:

    https://tails.boum.org/install/download/openpgp/index.en.html#wot

  9. mark l 2 Silver badge

    Re: I think the point is that..

    Linux User and Developer Magazine from Imagine Publishing still comes with a cover DVD, usually with a Linux distro on it. Its a little pricey at 5.99 though

  10. PNGuinn Silver badge
    Black Helicopters

    Re: *** is a sexual disease?

    Suggesting the *** are a load of clap is a surefire way of getting on any watch list.

    (Upvoted)

  11. PNGuinn Silver badge
    Black Helicopters

    Re: I think the point is that..

    "It seems to me much more easy for the NSA to have compromised the Tails distribution itself"

    Systemd?

    Gnome?

    Say no more. There are other live distros out there. I'll stick with ***********************.

  12. uncommon_sense

    WHAT download?

    Not that their retarded website will actually show me a download anywhere!

    It is as bad as sdrplay.com.

    Where IS the &€##&€ DOWNLOAD?!

  13. uncommon_sense
    Joke

    Re: NSA

    NSA

    Isn't it a sexual disease?<

    It's from the thriller psycho movie "I Must Fart, But I Have No Arse!"

    quote:

    "I'm sorry sir, but you have No Such Anus"

  14. Uncle Slacky Silver badge
    Black Helicopters

    32-bit alternative

    For those of you wanting a 32-bit and/or systemd-free alternative, the (unrelated) "heads" distro is also available:

    https://heads.dyne.org/

  15. PhilipN Silver badge

    dyne.org

    Thanks for the heads up. Seems to be from the same shop as Dyne:bolic which is my favourite "just run and go" multimedia distro of all time.

  16. B*stardTintedGlasses

    Pretty sure even having TAILS on a flash drive on your person would be "reason to investigate" for the various powers that be.

    Worse if they don't understand it.

    "Unlock this drive citizen!"

    "Erm, there is nothing on it"

    "Yes, you must be hiding it!"

    "Thats... thats not how this works"

    "Give us the password to unlock the hidden/encrypted files or you go to prison!"

  17. ab-gam

    MS has trained me to never ever trust any .0 release.

    If new 3.0 features are not needed immediately, think its worth it to wait for .01?

  18. choleric

    Just as long as you don't wait for 3.11.

  19. PNGuinn Silver badge
    Devil

    @ Just as long as you don't wait for 3.11.

    Hey, in my NSHO W3.11 fwg was the best thing slurp ever produced. It was downhill from then on.

  20. Mike 16 Bronze badge

    So, what's the intersection

    between "old enough to not have a BIOS or hardware backdoor" and "new enough to run TAILS"?

  21. Uncle Slacky Silver badge
    Boffin

    Re: So, what's the intersection

    Core2Duo, I reckon.

  22. hanfeizi

    For average Joe it's hard to find a pipe with fast enough upload bandwidth to run tails with TOR. When playing with an older version, it would only boot on an older 32 bit Win 7 laptop, not new machines with 64 bit Win 7 or 10. Provided 3.0 will boot on newer hardware, providing for use with popular proxies, and VPNs would make it much more useful. As I recall, Tails doesn't leave a browser or device footprint, which is great for home use, but won't boot to corporate WAN desktop for a novice lacking machine credentials on the WAN. If smart, Joe will use a VPN or Proxy, and Firefox, with addons. Encrypting files for average Joe not likely to go further than a few RAR files on his network drive. (Perhaps copies of tax returns, Will, Trust, and business documents) Even then, he needs to store the keys separately from the documents. A spreadsheet with keys using a program on another thumb drive, allowing selection of what to decrypt, again not something Joe's going to do, unless he finds a turnkey solution. Implementation of PGP is involved, requiring a separate vault of saved keys on Tails thumb drive with it's own password. Still the receiver has to somehow get the key to the person sent the file to decrypt it. Quickest way would be an attachment with block of random data with the encrypted Email, then calling Email receiver by phone, telling them how to find the key within the random block of data. Unless there's a real need, not likely to happen. Likely there is no stopping a brute force dictionary attacks on passwords to stop an attack on Tails. Nothing preventing a Tails drive being copied, and being placed in a VM until password is broken if it does self erase.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2018