Michael Carbone: > [email protected]: >> >> First of all, it is not currently possible to easily verify the >> authenticity of Tails once installed on a USB stick. >> > This is something that's come up in conversations in the past with other > Tails users/trainers. Each installed Tails USB has a different > hash/fingerprint, which seems to be a byproduct of the isohybrid > installation method. > > What are the obstacles towards all Tails USBs installed from a verified > image (say v1.2) having the same fingerprint? Is this connected to the > inability to directly create a Tails USB with persistence from an image? > > Michael > I meant to say checksum, not fingerprint, apologies for initial lack of clarity.
-- Michael Carbone Manager of Tech Policy & Programs Access | https://www.accessnow.org *new GPG fingerprint*: 2DBE 2014 E7B0 0730 303D 7AAB 99AB 0624 6EEB F5A8 old GPG fingerprint: 25EC 1D0F 2D44 C4F4 5BEF EF83 C471 AD94 81B7 A13E
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Tails-dev mailing list [email protected] https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to [email protected].
