Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The TAILS security model seems a bit odd to me. These kind of zero-day attacks seems like the easiest way to deanonymize tor users, and tails doesn't protect against them at all. On the other hand, tails tries hard to keep the user's computer free from traces. But if the secret police has already identified you enough that they go and seize your computer, then you are already in trouble. Trying to protect yourself at that stage seems too late.


>On the other hand, tails tries hard to keep the user's computer free from traces. But if the secret police has already identified you enough that they go and seize your computer, then you are already in trouble.

It's that it denies them evidence. If they search all tor users, they might find proof that someone else accessed badsite.onion, but they couldn't prove that you did. Also in theory you can use tails on any computer without leaving a trace.

Imagine I want to use my work computer to browse tor, if I use their operating system then they might have spyware on it. If I use my own then I'm more secure. (They could have keyloggers or other hardware stuff, but that's more rare.)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: