Tails version 0.11 released as of April 25, 2012

Discussion in 'privacy technology' started by lotuseclat79, Apr 27, 2012.

Thread Status:
Not open for further replies.
  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,094
    Tails 0.11 is out.

    Note: TAILS is now too big for burning onto a Live CD, so it is necessary to use either a Live DVD or Live USB. The new features include a Persistent Volume option for the Live USB - must be at least 2GB in size.

    -- Tom
     
  2. popcorn

    popcorn Registered Member

    Joined:
    Apr 3, 2012
    Posts:
    239
    Hi
    I know Tails is best run as a live CD/DVD, I have been booting it in a virtualbox and really like it, Tor thru VPN which has got to be good, however Im not certain on the implications of this, what is logged on the host machine and where ? how and can this be avoided ?
    Im doing my own research but would really appreciate any advice in this area
    Thanx in advance
     
  3. JackReacher

    JackReacher Registered Member

    Joined:
    Mar 17, 2012
    Posts:
    67
    Location:
    South of the North Pole
    I am also interested in this question, It is my understanding the most logging will be in the Virtual OS and will be wiped upon shutdown. But if you are using Windows as the host OS I would imagine there is some amount of logging.

    Also are you using Tor thru a VPN as you stated or a VPN thru (over) Tor? The difference sounds minor but it is important.

    Tor over VPN = PC --> VPN --> Tor Network --> Internet
    In this scenario (the one you described) your VPN knows your real identity (IP address) and the Tor Exit Node is able to monitor your browsing activities. Some people see advantages to this configuration but it won't protect your information from the Tor Exit Node or your identity from your VPN

    VPN over Tor = PC --> Tor Network --> VPN --> Internet
    Creates a 'partition of trust' where you first connect to the TOR network so that your VPN cannot see your real IP address, meanwhile your VPN encrypts all the traffic until it passes through the Tor Network so that the exit node will not be able to spy on you. This situation is close to ideal if it is critically important for you to stay anonymous.
     
  4. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,094
    Hi JackReacher,

    Exactly how do you make (VPN over Tor) work. As I understand it, when you use the client browser connected to Tor you send an encrypted http request through the Tor tunnel until it reaches the Exit Node of Tor, and then proceeds to the destination request website.

    What I don't understand is how you direct the request from Tor to the VPN and then to the destination - how does that work?

    -- Tom
     
  5. Warlockz

    Warlockz Registered Member

    Joined:
    Oct 30, 2008
    Posts:
    642
    @.JackReacher +1 :thumb:

    http is not encrypted through tor, http traffic through tor can be seen clear as day, only ssl/https and .onion sites are encrypted. which is a reason some use tor through vpn or vpn through tor depending what they are using it for? you can also use ssl/https Online Proxies through tor, like startpage, or Hidemyass ECT, with startpage you can click to proxy the link, this will encrypt the site you want to view, Online SSL proxy's can only see a tor IP if your runnin it through tor and you will be encrypting http traffic with SSL encryption.

    Their are many Online SSL Proxies to choose from, just search for Online SSL proxy......

    2012-04-27_164625.png


    Here is an example of VPN through TOR , read through the thread in the link below, hope this helps...


    Using AirVPN over TOR
    https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&Itemid=142
     
    Last edited: Apr 27, 2012
  6. Warlockz

    Warlockz Registered Member

    Joined:
    Oct 30, 2008
    Posts:
    642
    one more thing.... or If you have a direct link to a site you want to visit which is http you can use something like Hidemyass ssl proxy instead of Startpage to encrypt the direct link.
     
  7. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    You need to specify SOCKS 9050 in the VPN Client or in the OpenVPN Config file.

    The specific line should be:

    socks-proxy 127.0.0.1 9050

    PD
     
  8. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    Correct me if I'm wrong, but from you to the Tor entry node, and all through the Tor network, even HTTP is encrypted (blinding your CISPA loving ISP). It is only when leaving the exit node that HTTP can be sniffed. If there is no identifying info in the HTTP session, one is *relatively* safe. SSL or the VPN Tunnel are obviously *more* safe.

    PD
     
  9. Warlockz

    Warlockz Registered Member

    Joined:
    Oct 30, 2008
    Posts:
    642
    If you want your http Tor traffic to be private, you need to encrypt it.
     
  10. JackReacher

    JackReacher Registered Member

    Joined:
    Mar 17, 2012
    Posts:
    67
    Location:
    South of the North Pole
    @PaulyDefran

    It is my understanding that you are correct Pauly. All traffic should be encrypted up to the exit node. So if there is no sensitive information you should be safe. For me, I prefer the peace of mind, knowing that my data cannot be snooped on by the exit node. I frequently log on to forums, web-mail, etc, and also transmit data that is personally identifiable. But if you do not use Tor for transmitting sensitive data, you would not necessarily need a VPN/Proxy, especially if used in conjunction with HTTPS Everywhere/HTTPS Finder.
     
  11. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    I just tried this out for the first time, believe it or not :) It's really cool. I burned the .iso and then used it to create an install on a MicroSD Card with persistence. So what are some additional things you guys do to the base install? I did see that, while it doesn't give up a Host Name to the router, it *does* use the NIC's burned in MAC Address. I searched their forum (probably not well) but is there a way to randomize the MAC on start up, before any communication occurs? Doing ifcong wlan0 down, etc... does not give me comfort, knowing that the radio is transmitting prior to the change.

    PD
     
  12. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    6,028
    What PaulyDefran said :) Also, you must use TCP (not UDP) for the VPN.

    Basically, Tor handles TCP traffic, and it's TCP traffic that "carries" the VPN tunnel.
     
  13. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,094
    Hi PaulyDefran,

    I run the following command (as root) prior to turning on my router after booting up TAILS 0.11:

    macchanger -a eth0

    and then I issue:

    ifconfig eth1 down

    -- Tom
     
  14. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    Thanks mate.

    PD
     
  15. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    57,727
    Location:
    Texas
    http://www.h-online.com/security/ne...ends-in-better-in-internet-cafes-1619818.html
     
Loading...
Thread Status:
Not open for further replies.