Hi, Maxim Kammerer wrote (04 Apr 2012 22:39:09 GMT) : > The user is expected to keep private information on the system > (remember that Liberté had persistence from the beginning, but this > is often true even without persistence). If the system is exploited, > finding out the computer's MAC / IP addresses will most likely be > the least of the user's problems.
Back to the threat model, then :) One of the main Tails use-case we've heard of is to work on stuff that is public, or will become public soon: in this case, what they want to hide is not really the actual content, but instead its linkage to particular physical locations or hardware. In this case, finding out the computer's MAC / IP addresses is not the least of their problems. I hope this clarifies things a bit. Cheers, -- intrigeri | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
