home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.privacy      Discussing privacy, laws, tinfoil hats      112,125 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 111,420 of 112,125   
   D to All   
   Tails 6.17 (2025-06-26) (1/2)   
   21 Jul 25 01:35:39   
   
   From: nobody@yamn.paranoici.org   
      
   *note: i've never used this program, but seems to be popular and recommended   
    by privacy advocates . . . it's a large download e.g. "tails-amd64-6.17.img"   
    1.6 gigabytes, open-source freeware but they advise caution before using it .   
   . .   
      
   (using Tor Browser 14.5.4)   
   https://tails.net/install/download/index.en.html   
   >Warnings: Tails is safe but not magic!   
   >Tails is safer than any regular operating system. But Tails, or any software   
   or   
   >operating system, cannot protect you from everything--even if they pretend to.   
   >The recommendations below will keep you even safer, especially if you are at   
   >high risk.   
   >Protecting your identity when using Tails   
   >Tails is designed to hide your identity.   
   >But some of your activities could reveal your identity:   
   >  Sharing files with metadata, such as date, time, location, and device   
   >  information   
   >  Using Tails for more than one purpose at a time   
   >  Protecting your identity   
   >Limitations of the Tor network   
   >Tails uses the Tor network because it is the strongest and most popular   
   network   
   >to protect from surveillance and censorship.   
   >But Tor has limitations if you are concerned about:   
   >  Hiding that you are using Tor and Tails   
   >  Protecting your online communications from determined, skilled attackers   
   >  Limitations of Tor   
   >Reducing risks when using untrusted computers   
   >Tails can safely run on a computer that has a virus.   
   >But Tails cannot always protect you when:   
   >  Installing from an infected computer   
   >  Running Tails on a computer with a compromised BIOS, firmware, or hardware   
   >  Using untrusted computers   
   [end quoted plain text]   
      
   (using Tor Browser 14.5.4)   
   https://tails.net/   
   >Tails   
   >is a portable operating system   
   >that protects against   
   >surveillance and censorship.   
   >Avoid surveillance, censorship, advertising, and viruses   
   >Tails uses the Tor network to protect your privacy online and help you avoid   
   >censorship. Enjoy the Internet like it should be.   
   >Your secure computer anywhere   
   >Shut down the computer and start on your Tails USB stick instead of starting   
   on   
   >Windows, macOS, or Linux. Tails leaves no trace on the computer when shut   
   down.   
   >Digital security toolbox   
   >Tails includes a selection of applications to work on sensitive documents and   
   >communicate securely. Everything in Tails is ready-to-use and has safe   
   defaults.   
   >Free Software   
   >You can download Tails for free and independent security researchers can   
   verify   
   >our work. Tails is based on Debian GNU/Linux.   
   >How Tails Works   
   >Install Tails   
   >Who uses Tails   
   >Activists use Tails to hide their identities, avoid censorship, and   
   communicate   
   >securely.   
   >Journalists   
   >and their sources use Tails to publish sensitive information and access the   
   >Internet from unsafe places.   
   >Domestic violence survivors use Tails to escape surveillance at home.   
   >You whenever you need extra privacy in this digital world.   
   >Recommended by   
   >Tor Project   
   >Tails is part of the Tor Project, a global nonprofit developing tools for   
   online   
   >privacy and anonymity. To better protect you, the same people are building the   
   >Tor network, the Tor Browser, and Tails.   
   >Tor Project and Tails joined forces in 2024.   
   >Edward Snowden   
   >  If you look at the way post-2013 whistleblowers have been caught, it is   
   >  clear the absolute most important thing you can do to maintain your   
   anonymity   
   >  is reduce the number of places in your operational activity where you can   
   make   
   >  mistakes. Tor and Tails still do precisely that.   
   >  -- Edward Snowden,   
   >  NSA whistleblower   
   >EFF   
   >  One of the most robust ways of using the Tor network is through a dedicated   
   >  operating system that enforces strong privacy- and security-protective   
   defaults.   
   >  That operating system is Tails.   
   >  -- EFF,   
   >  Electronic Frontier Foundation   
   >accessnow   
   >riseup   
   >Sponsors   
   >Our work is funded by donations from people like you and organizations that   
   >support Internet freedom. Meet our sponsors.   
   [end quoted plain text]   
      
   (using Tor Browser 14.5.4)   
   https://tails.net/about/index.en.html   
   >How Tails works   
   >Leave no trace on the computer   
   >Your secure computer anywhere   
   >To use Tails, shut down the computer and start on your Tails USB stick instead   
   >of starting on Windows, macOS, or Linux.   
   >You can temporarily turn your own computer into a secure machine. You can also   
   >stay safe while using the computer of somebody else.   
   >Tails is a 1.5 GB download and takes ½ hour to install. Tails can be installed   
   >on any USB stick of 8 GB minimum. Tails works on most computers less than 10   
   >years old. You can start again on the other operating system after you shut   
   down   
   >Tails.   
   >You don't have to worry about the computer having viruses because Tails runs   
   >independently from the other operating system and never uses the hard disk.   
   But,   
   >Tails cannot always protect you if you install it from a computer with   
   viruses or   
   >if you use it on a computer with malicious hardware, like keyloggers.   
   >See also:   
   >  Warnings: Tails is safe but not magic!   
   >  Download and install Tails   
   >  System requirements and recommended hardware   
   >Amnesia   
   >Tails always starts from the same clean state and everything you do disappears   
   >automatically when you shut down Tails.   
   >Without Tails, almost everything you do can leave traces on the computer:   
   >  Websites that you visited, even in private mode   
   >  Files that you opened, even if you deleted them   
   >  Passwords, even if you use a password manager   
   >  All the devices and Wi-Fi networks that you used   
   >On the contrary, Tails never writes anything to the hard disk and only runs   
   from   
   >the memory of the computer. The memory is entirely deleted when you shutdown   
   >Tails, erasing all possible traces.   
   >Like a tent, Tails is amnesic: it always starts empty and leaves no trace when   
   >you leave.   
   >Persistent Storage   
   >You can save some of your files and configuration in an encrypted Persistent   
   >Storage on the USB stick: your documents, your browser bookmarks, your emails,   
   >and even some additional software.   
   >The Persistent Storage is optional and you always decide what is persistent.   
   >Everything else is amnesic.   
   >See also:   
   >  Persistent Storage   
   >  Installing additional software   
   >Like a backpack, you can store your personal things in your Persistent Storage   
   >and use them in your tent.   
   >Digital security toolbox   
   >Tails includes a selection of applications to work on sensitive documents and   
   >communicate securely.   
   >All the applications are ready-to-use and are configured with safe defaults to   
   >prevent mistakes.   
   >Tails includes:   
   >  Tor Browser with uBlock, a secure browser and an ad-blocker   
   >  Thunderbird, for encrypted emails   
   >  KeePassXC, to create and store strong passwords   
   >  LibreOffice, an office suite   
   >  OnionShare, to share files, websites, and chat rooms over Tor   
   >  Metadata Cleaner, to remove metadata from files   
   >  and many more!   
   >To prevent mistakes:   
   >  Applications are blocked automatically if they try to connect to the   
   >  Internet without Tor.   
   >  Everything in the Persistent Storage is encrypted automatically.   
   >  Tails does not write anything to the hard disk. All the memory is deleted   
   >  when shutting down.   
   >See also:   
      
   [continued in next message]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca