that would be a question better suited for tails-dev. they will be able to tell you if its been addressed in the latest release. however, from the skimming ive done... it appears that physical access would be needed. if security is a concern, preventing unauthorized physical access should already be priority #1 as it is. it also appears that the researchers targeted installations of debian/ubuntu on hard disks, which will have some sort of persistence. tails runs as a live cd that will wipe every hardware resource it has touched upon shutdown. i dont see this being a problem for tails because a persistent volume or other luks partition with tails will be for storage only and not for a whole partition including the operating system as the report describes targeting.
Sent via the Samsung Galaxy S7 edge, an AT&T 4G LTE smartphone -------- Original message --------From: francisco dominguez <[email protected]> Date: 1/6/17 5:04 PM (GMT-06:00) To: [email protected] Subject: [Tails-support] About LUKS and encyption on tails Hello, im new in tails and i want know that if LUKS vulnerability is fixed, i want to say this: https://security-tracker.debian.org/tracker/CVE-2016-4484 Thanks.
_______________________________________________ tails-support mailing list [email protected] https://mailman.boum.org/listinfo/tails-support To unsubscribe from this list, send an empty email to [email protected].
