Hi, I'm quite new to tails but I did some tests, to help answer your questions. I use tails 2.4.
1.) While the gnome shutdown menu has only the power down and reset functionality, you could invoke suspend from command line. But at my system it does nothing. According to https://wiki.debian.org/Suspend you can disable suspend and hibernate at system level with sudo systemctl mask sleep.target suspend.target hibernate.target hybrid-sleep.target. I'm not sure, why suspend doesn't work at my system. Strangely I couldn't find a binary with that name. Has someone other experiences? 2.) I couldn't find any traces of syslog in /var/log. The existing logs don't contain any informations on connections either and I see no reason to do so. Even my standard debian doesn't do that with tor. I'm not sure if I understand the post translated with google correctly. There a two possibilities to connect a VPN and tor. a) You connect to tor through a VPN. Then your ISP isn't able to detect, that you use tor. And you don't have to trust that VPN. b) You connect to a VPN through tor. Then you don't have to trust the tor exit node. But you have to trust the VPN service provider, if you have to create an account. So there is a possibility that Mr. 0chiaki leaked information about him through a VPN account. I couldn't really understand, what he did with twitter. But there is also the chance to connect your activities and person with postings. In the past people were uncovered because they mixed identities at some time. It seems he was caught with a PC running Tails. So they didn't need logs to see what he did right at the moment. But thats all speculation, because the translation from google is not that good and it is a story from someone who has heard something somewhere. Further material would be appreciated. 3.) It's an old issue of security products, that try to protect the user from unlawful surveillance. It's the same with encryption or tor. Sadly you can't prevent that the bad guys use these too. Nevertheless they are needed to protect the rights of many people around the world and it is important too help them. Kind regards, Ulrich Am Donnerstag, den 14.07.2016, 08:47 +0000 schrieb Unknown: > 1. Can I put Tails to sleep, like Windows(for fastboot)? > 2. Does Tails save connection log to syslog? > According to this blog[1], Tails user was arrested from syslog log. > 3. As a Tails developer, I would like to hear what do you think > about "criminals" like this[1] who use Tails against your wish. > > [1] https://archive.is/fW7co (need Google Translate) > _______________________________________________ > tails-support mailing list > [email protected] > https://mailman.boum.org/listinfo/tails-support > To unsubscribe from this list, send an empty email to > [email protected]. -- Diese Nachricht wurde mittels GNU Privacy Guard (GPG) signiert. Um die Signatur dieser Nachricht auf Korrektheit zu überprüfen, benötigen Sie meinen öffentlichen GPG Schlüssel. Mit diesem können Sie auch verschlüsselte Nachrichten an mich senden. Mein Schlüssel mit der ID BB50A3F1 kann von folgendem Schlüsselserver geladen werden: hkp://keys.gnupg.net Eine umfassende Anleitung zur Verwendung von GPG finden Sie hier: https://gnupg.org/howtos/de/index.html Warum Verschlüsselung und Signaturen für Mails sinnvoll sind? Bruce Schneier, international bekannter Autor zum Thema IT-Sicherheit, hat es in einem Essay gut zusammengefasst, welches hier in der Übersetzung zu finden ist: https://netzpolitik.org/2015/bruce-schneier-warum-wir-verschluesseln/ Weitere Tipps der Electronic Frontier Foundation: https://www.ifightsurveillance.org/ _______________________________________________ tails-support mailing list [email protected] https://mailman.boum.org/listinfo/tails-support To unsubscribe from this list, send an empty email to [email protected].
