back to article Tails OS hits version 3.0, matches Debian's pace but bins 32-bit systems

The developers of privacy-protecting Linux distribution Tails have decided to get closer to Debian with the project's 3.0 release. Tails - aka The Amnesic Incognito Live System - is designed to boot and run from removable storage and not to leave any trace of what you did while running it. Users booting into version 3.0 will …

Anonymous Coward

Do you stll end up on an NSA list by visiting their website?

2
2
Silver badge

If you do it will give the retarded press, from the Independent to the Mail, another opportunity to print stupid "was known to the security services" headlines if you ever do something naughty.

3
1
Anonymous Coward

The same way you do by typing those 3 letters in a comment in a popular tech website known for it's in-depth whistleblowing of spook techniques?

4
0
Black Helicopters

I think the point is that..

..you end up on their list by visiting *any* website.

11
0
Silver badge
Joke

NSA

Isn't it a sexual disease?

1
0
Anonymous Coward

Re: I think the point is that..

Which is why I wish magazines such as PC Pro still had cover disks*.

*Yes I know the disk could be tampered with, that's what SHA-256** is for.

**Yes I know I should not trust a SHA-256 tool off the same disk.

2
0
Anonymous Coward

Re: I think the point is that..

> **Yes I know I should not trust a SHA-256 tool off the same disk.

*** And don't trust the SHA-256 printed in the magazine either, because the magazine could be tampered with

**** You can use PGP signatures, but how do you know you have the right PGP key to validate it with?

0
0
Black Helicopters

Re: I think the point is that..

"You can use PGP signatures, but how do you know you have the right PGP key to validate it with?"

If you have been using Debian or Ubuntu for any length of time, packaged software downloads are signed using developer keys, some of which have signed the Tails gpg keys. So you can install the debian-keyring package, which is signed by these distribution repositories and this gets the same verification as other Debian or Ubuntu packages installed using apt-get . This means that for the NSA to have compromised the Tails instance as downloaded through a MITM or whatever, and for you not to be able to detect this if you're very careful and check signatures, they would also have had to compromise signed parts of the Ubuntu or Debian infrastructure. It seems to me much more easy for the NSA to have compromised the Tails distribution itself. To find that kind of hole you would have to check the Tails source code and compile it yourself, assuming you're both paranoid enough to want to do that, while sufficiently technically capable to compile it yourself on a platform which you do actually trust. Instructions on checking this chain of trust here:

https://tails.boum.org/install/download/openpgp/index.en.html#wot

0
0
Silver badge

Re: I think the point is that..

Linux User and Developer Magazine from Imagine Publishing still comes with a cover DVD, usually with a Linux distro on it. Its a little pricey at 5.99 though

0
0
Silver badge
Black Helicopters

Re: *** is a sexual disease?

Suggesting the *** are a load of clap is a surefire way of getting on any watch list.

(Upvoted)

0
0
Silver badge
Black Helicopters

Re: I think the point is that..

"It seems to me much more easy for the NSA to have compromised the Tails distribution itself"

Systemd?

Gnome?

Say no more. There are other live distros out there. I'll stick with ***********************.

0
0

WHAT download?

Not that their retarded website will actually show me a download anywhere!

It is as bad as sdrplay.com.

Where IS the &€##&€ DOWNLOAD?!

0
0
Joke

Re: NSA

NSA

Isn't it a sexual disease?<

It's from the thriller psycho movie "I Must Fart, But I Have No Arse!"

quote:

"I'm sorry sir, but you have No Such Anus"

1
0
Silver badge
Black Helicopters

32-bit alternative

For those of you wanting a 32-bit and/or systemd-free alternative, the (unrelated) "heads" distro is also available:

https://heads.dyne.org/

6
1
Silver badge

dyne.org

Thanks for the heads up. Seems to be from the same shop as Dyne:bolic which is my favourite "just run and go" multimedia distro of all time.

1
0

Pretty sure even having TAILS on a flash drive on your person would be "reason to investigate" for the various powers that be.

Worse if they don't understand it.

"Unlock this drive citizen!"

"Erm, there is nothing on it"

"Yes, you must be hiding it!"

"Thats... thats not how this works"

"Give us the password to unlock the hidden/encrypted files or you go to prison!"

3
0

MS has trained me to never ever trust any .0 release.

If new 3.0 features are not needed immediately, think its worth it to wait for .01?

0
1

Just as long as you don't wait for 3.11.

1
0
Silver badge
Devil

@ Just as long as you don't wait for 3.11.

Hey, in my NSHO W3.11 fwg was the best thing slurp ever produced. It was downhill from then on.

1
0
Bronze badge

So, what's the intersection

between "old enough to not have a BIOS or hardware backdoor" and "new enough to run TAILS"?

2
0
Silver badge
Boffin

Re: So, what's the intersection

Core2Duo, I reckon.

1
0

For average Joe it's hard to find a pipe with fast enough upload bandwidth to run tails with TOR. When playing with an older version, it would only boot on an older 32 bit Win 7 laptop, not new machines with 64 bit Win 7 or 10. Provided 3.0 will boot on newer hardware, providing for use with popular proxies, and VPNs would make it much more useful. As I recall, Tails doesn't leave a browser or device footprint, which is great for home use, but won't boot to corporate WAN desktop for a novice lacking machine credentials on the WAN. If smart, Joe will use a VPN or Proxy, and Firefox, with addons. Encrypting files for average Joe not likely to go further than a few RAR files on his network drive. (Perhaps copies of tax returns, Will, Trust, and business documents) Even then, he needs to store the keys separately from the documents. A spreadsheet with keys using a program on another thumb drive, allowing selection of what to decrypt, again not something Joe's going to do, unless he finds a turnkey solution. Implementation of PGP is involved, requiring a separate vault of saved keys on Tails thumb drive with it's own password. Still the receiver has to somehow get the key to the person sent the file to decrypt it. Quickest way would be an attachment with block of random data with the encrypted Email, then calling Email receiver by phone, telling them how to find the key within the random block of data. Unless there's a real need, not likely to happen. Likely there is no stopping a brute force dictionary attacks on passwords to stop an attack on Tails. Nothing preventing a Tails drive being copied, and being placed in a VM until password is broken if it does self erase.

0
0

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Forums

Biting the hand that feeds IT © 1998–2018