Tails version 0.11 released as of April 25, 2012

Discussion in 'privacy technology' started by lotuseclat79, Apr 27, 2012.

Thread Status:
Not open for further replies.
  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    Tails 0.11 is out.

    Note: TAILS is now too big for burning onto a Live CD, so it is necessary to use either a Live DVD or Live USB. The new features include a Persistent Volume option for the Live USB - must be at least 2GB in size.

    -- Tom
     
  2. popcorn

    popcorn Registered Member

    Joined:
    Apr 3, 2012
    Posts:
    239
    Hi
    I know Tails is best run as a live CD/DVD, I have been booting it in a virtualbox and really like it, Tor thru VPN which has got to be good, however Im not certain on the implications of this, what is logged on the host machine and where ? how and can this be avoided ?
    Im doing my own research but would really appreciate any advice in this area
    Thanx in advance
     
  3. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    Hi JackReacher,

    Exactly how do you make (VPN over Tor) work. As I understand it, when you use the client browser connected to Tor you send an encrypted http request through the Tor tunnel until it reaches the Exit Node of Tor, and then proceeds to the destination request website.

    What I don't understand is how you direct the request from Tor to the VPN and then to the destination - how does that work?

    -- Tom
     
  4. Warlockz

    Warlockz Registered Member

    Joined:
    Oct 30, 2008
    Posts:
    642
    @.JackReacher +1 :thumb:

    http is not encrypted through tor, http traffic through tor can be seen clear as day, only ssl/https and .onion sites are encrypted. which is a reason some use tor through vpn or vpn through tor depending what they are using it for? you can also use ssl/https Online Proxies through tor, like startpage, or Hidemyass ECT, with startpage you can click to proxy the link, this will encrypt the site you want to view, Online SSL proxy's can only see a tor IP if your runnin it through tor and you will be encrypting http traffic with SSL encryption.

    Their are many Online SSL Proxies to choose from, just search for Online SSL proxy......

    2012-04-27_164625.png


    Here is an example of VPN through TOR , read through the thread in the link below, hope this helps...


    Using AirVPN over TOR
    https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&Itemid=142
     
    Last edited: Apr 27, 2012
  5. Warlockz

    Warlockz Registered Member

    Joined:
    Oct 30, 2008
    Posts:
    642
    one more thing.... or If you have a direct link to a site you want to visit which is http you can use something like Hidemyass ssl proxy instead of Startpage to encrypt the direct link.
     
  6. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    You need to specify SOCKS 9050 in the VPN Client or in the OpenVPN Config file.

    The specific line should be:

    socks-proxy 127.0.0.1 9050

    PD
     
  7. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    Correct me if I'm wrong, but from you to the Tor entry node, and all through the Tor network, even HTTP is encrypted (blinding your CISPA loving ISP). It is only when leaving the exit node that HTTP can be sniffed. If there is no identifying info in the HTTP session, one is *relatively* safe. SSL or the VPN Tunnel are obviously *more* safe.

    PD
     
  8. Warlockz

    Warlockz Registered Member

    Joined:
    Oct 30, 2008
    Posts:
    642
    If you want your http Tor traffic to be private, you need to encrypt it.
     
  9. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    I just tried this out for the first time, believe it or not :) It's really cool. I burned the .iso and then used it to create an install on a MicroSD Card with persistence. So what are some additional things you guys do to the base install? I did see that, while it doesn't give up a Host Name to the router, it *does* use the NIC's burned in MAC Address. I searched their forum (probably not well) but is there a way to randomize the MAC on start up, before any communication occurs? Doing ifcong wlan0 down, etc... does not give me comfort, knowing that the radio is transmitting prior to the change.

    PD
     
  10. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    What PaulyDefran said :) Also, you must use TCP (not UDP) for the VPN.

    Basically, Tor handles TCP traffic, and it's TCP traffic that "carries" the VPN tunnel.
     
  11. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    Hi PaulyDefran,

    I run the following command (as root) prior to turning on my router after booting up TAILS 0.11:

    macchanger -a eth0

    and then I issue:

    ifconfig eth1 down

    -- Tom
     
  12. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    Thanks mate.

    PD
     
  13. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,199
    Location:
    Texas
    http://www.h-online.com/security/ne...ends-in-better-in-internet-cafes-1619818.html
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.