5 votes

Want to Protect Your Web Privacy? Try “Tails.”

President Obama is set to make a speech to the nation on Friday, in which his “reforms” for the NSA will be detailed. A recent Hill article cited Obama’s goal for the NSA isn’t so much to stop the unconstitutional spying and privacy violations (though it is said he’ll pay surface lip-service to that), but instead on stopping future Ed Snowden style leaks. Thus, our privacy isn’t a real concern, is more than likely still in violation, and will be until a massive upheaval of the political State takes place.

With that in mind… I recently was made aware of a USB-based operating system named “Tails,” which protects your web privacy via a protective wall that blocks applications you may be unaware of from accessing the internet without your knowledge. From the Tails site:

Tails relies on the Tor anonymity network to protect your privacy online:

- All software is configured to connect to the Internet through Tor

- If an application tries to connect to the Internet directly, the connection is automatically blocked for security.

Continue Reading




Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

i've been using i2p and tor a lot lately

https://geti2p.net/en/

https://www.torproject.org/

Official Daily Paul BTC address: 16oZXSGAcDrSbZeBnSu84w5UWwbLtZsBms
My ฿itcoin: 17khsA7MvBJAGAPkhrFJdQZPYKgxAeXkBY
http://www.dailypaul.com/303151/bitcoin-has-gone-on-an-insan...

TOR

or, if you don't want to change OS's, use TOR.

I use Blue Wave, but don't expect one of THEIR silly taglines.

I wouldn't use tor for communicating sensative information

as it was developed by the US Navy and is compromised.

compromised how?

tor is what snowden uses. it seemed to work very well for him and he knows a thing or two about security.

Official Daily Paul BTC address: 16oZXSGAcDrSbZeBnSu84w5UWwbLtZsBms
My ฿itcoin: 17khsA7MvBJAGAPkhrFJdQZPYKgxAeXkBY
http://www.dailypaul.com/303151/bitcoin-has-gone-on-an-insan...

I should have said that it is compromised for those who

can't properly spoof their IP address to conceal their location and etc (ie: those who cannot be meticulous about the transfer of their data).

That Bomb-Hoaxing Harvard Student Was Using Tor, But They Caught Him Anyway.

http://www.onthemedia.org/story/harvard-bomb-threat/

he was not caught because of tor

he was caught because he did not keep his mouth shut and exercise his right to remain silent.

Official Daily Paul BTC address: 16oZXSGAcDrSbZeBnSu84w5UWwbLtZsBms
My ฿itcoin: 17khsA7MvBJAGAPkhrFJdQZPYKgxAeXkBY
http://www.dailypaul.com/303151/bitcoin-has-gone-on-an-insan...

No, he was not caught because of tor.

He was caught even though he was using tor, however; so it shows that being careless or unknowing when using this tool can lead to arrest. In this case it turns out he accessed tor from the Harvard network and authorities were able to determine that:

'According to the affidavit, authorities were able to determine that Kim had accessed TOR on the Harvard network before sending the email.'

http://www.thecrimson.com/article/2013/12/17/student-charged...

if he would have remained silent

and not made an admission of guilt he would not have been caught or at least the burden would have been on the state to prove beyond a reasonable doubt it was him.
without his admission they could not have proved it beyond a reasonable doubt. all they could have proved was that he used tor but not what he used it for. using tor is not illegal.

Official Daily Paul BTC address: 16oZXSGAcDrSbZeBnSu84w5UWwbLtZsBms
My ฿itcoin: 17khsA7MvBJAGAPkhrFJdQZPYKgxAeXkBY
http://www.dailypaul.com/303151/bitcoin-has-gone-on-an-insan...

Computer forensics

would have made sure it was him in a thorough investigation anyhow, had he not admitted it; so staying silent, not cooperating and pleading innocent when the time in court comes would only result in a longer jail sentence.

He was the only suspect, having acceded tor, which while not illegal is a red flag to authorities when searching for the perpetrator of a bomb threat.

'But university officials determined by the end of the day that Kim had used a Harvard wireless network to create the secretive IP, prompting an FBI agent and a campus police officer to interview him in his dorm Monday night.'

http://www.boston.com/news/local/massachusetts/2013/12/17/ha...

yeah maybe

but all they could tell was that he used tor which is not illegal. maybe if they had enough pc they could have gotten a warrant to do a forensic analysis which may or may not have turned up anything. like you said it depends on how he used it. tor can't protect you from user error.

Official Daily Paul BTC address: 16oZXSGAcDrSbZeBnSu84w5UWwbLtZsBms
My ฿itcoin: 17khsA7MvBJAGAPkhrFJdQZPYKgxAeXkBY
http://www.dailypaul.com/303151/bitcoin-has-gone-on-an-insan...