Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA

Discussion in 'privacy technology' started by lotuseclat79, Apr 15, 2014.

Thread Status:
Not open for further replies.
  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  2. elapsed

    elapsed Registered Member

    Joined:
    Apr 5, 2004
    Posts:
    7,076
    I'm not surprised.
     
  3. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    Who would of ever thought a Linux/TOR combo would be selected over Windows? ---- LOL!!
     
  4. Tipsy

    Tipsy Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    207
    Bad to read this. Now too many attentions on TAIL!
     
  5. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    Security through obscurity is a bad tactic. Lots of eyes on AES, TrueCrypt, PGP, etc...
     
  6. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    PD,

    If you need to communicate securely/privately what other options do you have? VPNs, TOR, Linux/Tails/Whonix are all ways to help accomplish the task of privacy and security. I am virtually certain that I and many others here are being watched just because we value our privacy (alot). I would rather be watched than just be an open book plodding along aimlessly in normal internet settings.
     
  7. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    I think I may not have been clear. The poster before me, was worried that the article would make more government people "look" at TAILS, at least that's how I read it. My post was basically saying "let them", strong code is safe. Hoping that weak, but unpopular or secret software is better protection, isn't wise (Security through obscurity).

    https://en.wikipedia.org/wiki/Security_through_obscurity
     
  8. elapsed

    elapsed Registered Member

    Joined:
    Apr 5, 2004
    Posts:
    7,076
    Thinking that they haven't been looking at it for years already was a flawed assumption in the first place.
     
  9. Veeshush

    Veeshush Registered Member

    Joined:
    Mar 16, 2014
    Posts:
    643
    When this whole thing happened last year, Tails wasn't affected:
    https://blog.torproject.org/blog/hidden-services-current-events-and-freedom-hosting
    https://krebsonsecurity.com/2013/08/firefox-zero-day-used-in-child-porn-hunt/

    It was a Firefox bug exploited, one that was already patched for months even with the then current release of the Tor Browser Bundle on Windows. But looking at that, if someone was going to try to comprise someone else running a Tor browser- they're going to try an exploit against the browser itself, Firefox. Best defense would be Noscript and then leaving it enabled for every site you visit (even ones you "trust" in case they're one day compromised).

    And then of course all the benefits of a live cd.

    edit

    Having Wired do a story about Tails doesn't change anything. Everyone knows Snowden was/is a Tor user (he has Tor stickers on his laptop even), and Tor has been known and "watched" before Snowden. Might even work out the other way that you'll have people who might not of heard of Tails otherwise take interest and get some use out of it. Or maybe get some donations out of it (at least Wired had listed their donation page)
     
    Last edited: Apr 16, 2014
  10. Tipsy

    Tipsy Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    207
    Strong code for product that is low priority for attack is best protection.
    Mac vs Windows 10 yrs ago.

    Any product that is constant target for expert attackers is a vulnerable.
     
  11. Tipsy

    Tipsy Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    207
    Maybe before was just back burner in neighbour's kitchen. Low priority.
    Now is front and center burner on live tv cooking show. Top priority.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.