Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.privacy    |    Discussing privacy, laws, tinfoil hats    |    112,125 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 111,420 of 112,125    |
|    D to All    |
|    Tails 6.17 (2025-06-26) (1/2)    |
|    21 Jul 25 01:35:39    |
      From: nobody@yamn.paranoici.org              *note: i've never used this program, but seems to be popular and recommended        by privacy advocates . . . it's a large download e.g. "tails-amd64-6.17.img"        1.6 gigabytes, open-source freeware but they advise caution before using it .       . .              (using Tor Browser 14.5.4)       https://tails.net/install/download/index.en.html       >Warnings: Tails is safe but not magic!       >Tails is safer than any regular operating system. But Tails, or any software       or       >operating system, cannot protect you from everything--even if they pretend to.       >The recommendations below will keep you even safer, especially if you are at       >high risk.       >Protecting your identity when using Tails       >Tails is designed to hide your identity.       >But some of your activities could reveal your identity:       > Sharing files with metadata, such as date, time, location, and device       > information       > Using Tails for more than one purpose at a time       > Protecting your identity       >Limitations of the Tor network       >Tails uses the Tor network because it is the strongest and most popular       network       >to protect from surveillance and censorship.       >But Tor has limitations if you are concerned about:       > Hiding that you are using Tor and Tails       > Protecting your online communications from determined, skilled attackers       > Limitations of Tor       >Reducing risks when using untrusted computers       >Tails can safely run on a computer that has a virus.       >But Tails cannot always protect you when:       > Installing from an infected computer       > Running Tails on a computer with a compromised BIOS, firmware, or hardware       > Using untrusted computers       [end quoted plain text]              (using Tor Browser 14.5.4)       https://tails.net/       >Tails       >is a portable operating system       >that protects against       >surveillance and censorship.       >Avoid surveillance, censorship, advertising, and viruses       >Tails uses the Tor network to protect your privacy online and help you avoid       >censorship. Enjoy the Internet like it should be.       >Your secure computer anywhere       >Shut down the computer and start on your Tails USB stick instead of starting       on       >Windows, macOS, or Linux. Tails leaves no trace on the computer when shut       down.       >Digital security toolbox       >Tails includes a selection of applications to work on sensitive documents and       >communicate securely. Everything in Tails is ready-to-use and has safe       defaults.       >Free Software       >You can download Tails for free and independent security researchers can       verify       >our work. Tails is based on Debian GNU/Linux.       >How Tails Works       >Install Tails       >Who uses Tails       >Activists use Tails to hide their identities, avoid censorship, and       communicate       >securely.       >Journalists       >and their sources use Tails to publish sensitive information and access the       >Internet from unsafe places.       >Domestic violence survivors use Tails to escape surveillance at home.       >You whenever you need extra privacy in this digital world.       >Recommended by       >Tor Project       >Tails is part of the Tor Project, a global nonprofit developing tools for       online       >privacy and anonymity. To better protect you, the same people are building the       >Tor network, the Tor Browser, and Tails.       >Tor Project and Tails joined forces in 2024.       >Edward Snowden       > If you look at the way post-2013 whistleblowers have been caught, it is       > clear the absolute most important thing you can do to maintain your       anonymity       > is reduce the number of places in your operational activity where you can       make       > mistakes. Tor and Tails still do precisely that.       > -- Edward Snowden,       > NSA whistleblower       >EFF       > One of the most robust ways of using the Tor network is through a dedicated       > operating system that enforces strong privacy- and security-protective       defaults.       > That operating system is Tails.       > -- EFF,       > Electronic Frontier Foundation       >accessnow       >riseup       >Sponsors       >Our work is funded by donations from people like you and organizations that       >support Internet freedom. Meet our sponsors.       [end quoted plain text]              (using Tor Browser 14.5.4)       https://tails.net/about/index.en.html       >How Tails works       >Leave no trace on the computer       >Your secure computer anywhere       >To use Tails, shut down the computer and start on your Tails USB stick instead       >of starting on Windows, macOS, or Linux.       >You can temporarily turn your own computer into a secure machine. You can also       >stay safe while using the computer of somebody else.       >Tails is a 1.5 GB download and takes ½ hour to install. Tails can be installed       >on any USB stick of 8 GB minimum. Tails works on most computers less than 10       >years old. You can start again on the other operating system after you shut       down       >Tails.       >You don't have to worry about the computer having viruses because Tails runs       >independently from the other operating system and never uses the hard disk.       But,       >Tails cannot always protect you if you install it from a computer with       viruses or       >if you use it on a computer with malicious hardware, like keyloggers.       >See also:       > Warnings: Tails is safe but not magic!       > Download and install Tails       > System requirements and recommended hardware       >Amnesia       >Tails always starts from the same clean state and everything you do disappears       >automatically when you shut down Tails.       >Without Tails, almost everything you do can leave traces on the computer:       > Websites that you visited, even in private mode       > Files that you opened, even if you deleted them       > Passwords, even if you use a password manager       > All the devices and Wi-Fi networks that you used       >On the contrary, Tails never writes anything to the hard disk and only runs       from       >the memory of the computer. The memory is entirely deleted when you shutdown       >Tails, erasing all possible traces.       >Like a tent, Tails is amnesic: it always starts empty and leaves no trace when       >you leave.       >Persistent Storage       >You can save some of your files and configuration in an encrypted Persistent       >Storage on the USB stick: your documents, your browser bookmarks, your emails,       >and even some additional software.       >The Persistent Storage is optional and you always decide what is persistent.       >Everything else is amnesic.       >See also:       > Persistent Storage       > Installing additional software       >Like a backpack, you can store your personal things in your Persistent Storage       >and use them in your tent.       >Digital security toolbox       >Tails includes a selection of applications to work on sensitive documents and       >communicate securely.       >All the applications are ready-to-use and are configured with safe defaults to       >prevent mistakes.       >Tails includes:       > Tor Browser with uBlock, a secure browser and an ad-blocker       > Thunderbird, for encrypted emails       > KeePassXC, to create and store strong passwords       > LibreOffice, an office suite       > OnionShare, to share files, websites, and chat rooms over Tor       > Metadata Cleaner, to remove metadata from files       > and many more!       >To prevent mistakes:       > Applications are blocked automatically if they try to connect to the       > Internet without Tor.       > Everything in the Persistent Storage is encrypted automatically.       > Tails does not write anything to the hard disk. All the memory is deleted       > when shutting down.       >See also:              [continued in next message]              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca