doctorow at April 30th, 2014 11:00 — #1
stephen_schenck at April 30th, 2014 11:38 — #2
wearysky at April 30th, 2014 11:44 — #3
This is pretty neat. I don't have all that much use for it, really, but still, nifty.
samsam at April 30th, 2014 11:54 — #4
One of the main strengths of the system appears to be that it always uses TOR. I thought TOR was considered to be fairly unsafe, because of exit node eavesdropping. Am I mistaken?
I expect that TOR is excellent for the savvy technologist who understands how to use TOR as just one part of a secure stack, but for the non-expert, I'd be worried about that someone with an exit node can apparently
intercept usernames and passwords for a large number of e-mail accounts
...according to that link. Can anyone describe whether that's really an issue? Is a user safe if they just use https?
taymon at April 30th, 2014 12:26 — #5
Your email credentials can't be stolen in this way if you use HTTPS.
Anything you send or receive in the clear can be eavesdropped on by the operator of an exit node. However, they cannot trace it back to your IP address. This may or may not be a problem, depending on what kind of data it is.
crenquis at April 30th, 2014 12:39 — #6
I see that I am a bit behind the times... the image on my isostick is 0.12.1.
wearysky at April 30th, 2014 14:10 — #7
This is covered pretty extensively in the very first entry on the "Warnings" page linked from the Tails download page.
deadleaves at April 30th, 2014 15:53 — #8
Could a student use this to look at banned / blocked sites on their high school network?
maxsmolax at May 1st, 2014 07:53 — #9
Love the reference to free speech/free beer. I imagine RMS reads Boing Boing.
msbpodcastwtf at May 1st, 2014 09:33 — #10
I'll have to try again later. The server is chocked with requests. Figures.
doctorow at May 5th, 2014 11:00 — #11
This topic was automatically closed after 5 days. New replies are no longer allowed.