I hadn't seen Tails before and don't know how baked it is as a project. I just tried it out and found an exploitable vulnerability in their configuration that would allow someone to compromise the system. It's a corner case and not likely to impact many systems, but is a well known problem. I've reported the issue to the authors.
On Tue, Oct 9, 2012 at 12:03 PM, Lindsay Beck <[email protected]> wrote: > Thanks for compiling these resources! Another great tool that is perfect > for traveling is TAILS, which stands for The Amnesiac Incognito Live System > (https://tails.boum.org/index.en.html). TAILS is a bootable Linux USB > that automatically routes your Internet connection through the Tor network > and wipes its memory clean after each use. Through its design, it makes > users automatically follow many best practices in digital safety, such as > securely delete unused files, use a trusted circumvention tool, etc. > > Disclosure: TAILS relies on BIOS for operability, and thus can have > challenges functioning on newer computers that utilize UEFI without legacy > support for BIOS. But this is something that will be fixed in the coming > months with NDI's support. > >
-- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech
