> If Tails support sleep(and/or)hibernate, this will come in handy. > If I start using Tails, I'll use 'sleep' before sleep. Sure, 'shutdown' > is always better, but it takes time right?
It works with "systemctl suspend". But I think it would make a cold boot attack easier: https://en.wikipedia.org/wiki/cold%20boot%20attack When you put your device to sleep and go to bed, the RAM is still powered on. As far as I know, a house search is mostly done by the police in the early morning, when you are still dizzy and unprepared. In that case a suspended device would be a possible target for a cold boot attack, while a powered off one isn't attackable. But you have to decide, if this scenario is realistic. > > I'm not sure if I understand the post translated with google correctly. > > Further material would be appreciated. > > Let me translate it clearly; > > 1. 0chiaki(criminal who hack 'Sakura' VPS server, re-install OS and change > webpage) > use "Tails" with "Public Wi-Fi(FON)" and "Semi-Anonymous SOCKS > proxy(VIP72socks)". > 2. His connection is: FON WiFi -> Tor {-> SOCKSProxy(for Firefox only)}. > 3. The Japan Police found him because he was posting about his 'cracking' > information on his Twitter. > 4. Police go into his room from window while he's using Tails. > 5. Police investigate his PC(Tails). They found a connection log in > "syslog". (this blog says: "Linux write everything to syslog; when you start > a com- > puter, how do you connect it, aka system info") > 6. They found these lines, something like "connect to ISP" "connect to Tor" > "connect to Socket". > 7. Arrest! Most Linux distributions use syslog but I couldn't find a syslog file in Tails. The log folder is very small compared to other distributions. Further more the design principles (https://tails.boum.org/contribute/design/) state, that Pidgin is configured to log nothing, so I think this principle is applied to other services as well. But maybe someone more experienced can answer that. Kind regards, Ulrich -- Diese Nachricht wurde mittels GNU Privacy Guard (GPG) signiert. Um die Signatur dieser Nachricht auf Korrektheit zu überprüfen, benötigen Sie meinen öffentlichen GPG Schlüssel. Mit diesem können Sie auch verschlüsselte Nachrichten an mich senden. Mein Schlüssel mit der ID BB50A3F1 kann von folgendem Schlüsselserver geladen werden: hkp://keys.gnupg.net Eine umfassende Anleitung zur Verwendung von GPG finden Sie hier: https://gnupg.org/howtos/de/index.html Warum Verschlüsselung und Signaturen für Mails sinnvoll sind? Bruce Schneier, international bekannter Autor zum Thema IT-Sicherheit, hat es in einem Essay gut zusammengefasst, welches hier in der Übersetzung zu finden ist: https://netzpolitik.org/2015/bruce-schneier-warum-wir-verschluesseln/ Weitere Tipps der Electronic Frontier Foundation: https://www.ifightsurveillance.org/ _______________________________________________ tails-support mailing list [email protected] https://mailman.boum.org/listinfo/tails-support To unsubscribe from this list, send an empty email to [email protected].
