How many sources actually use PGP? And how many people use PGP/GPG or S/MIME for email correspondence with sources?
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
https://tails.boum.org
When we say "browse without leaving a trace", we truly mean it. Using the Linux-based, live-boot operating system Tails (The Amnesiac Incognito Live System), you can use any computer anywhere without anyone knowing you were ever on it. Tails is a portable operating system with all the security bells and whistles you'll ever need already installed on it. You can install Tails on one of your many dust-gathering USB drives or a DVD. We'll show you how to set up your own portable boot disc in the second section, but let's start by taking a look at what you get with Tails.
If you want to go beyond encrypting email, you can also encrypt voice and text messages too with some free apps. I've been playing with TextSecure and RedPhone. There are others. I'm not sure which are best.
https://whispersystems.org/
Moving forward I will be using tails every time and will be setting up an I2P email account which is a really wild concept. I2P for those of you who do not know what it is - is a kind of darknet which has it's own email. But you can send email across the darknet to the internet with no traces - everything gets stripped. Tails I have loaded on a thumb drive and just boot to it when I want to do my business. I encourage everyone to at least look at it for your safety.
Code:https://tails.boum.org
Tails runs tor not i2p.
You should really read the information that was given to you before you comment on thread. Yes it is TOR but it can also access I2P.
Which OS or nix distribution can't run i2p?
The fact that i2p can run on tails is not meaningful because i2p can run on every commonly used OS and distro I'm aware of. Tails has nothing more to do with i2p than any other distro or operating system. Tails is not "tor" but it routes all networking traffic over the tor network by default, the same way most other "anonymous" distros do.
Ipredia is a live distribution which automatically routes all traffic over i2p by default. So if someone's intent were to use a live distro which connects to i2p ipredia will serve that purpose.
IprediaOS | Ipredia
Have you ever used tails or i2p one time?
I am not sure what you are trying to say or if you are just trying to spew a bunch of info about TOR and I2P, but if you read my original post I said that is what I will being using.
The point of running TAILS is that it is a nice and easy package to boot from any machine. Once booted I connect to TOR (this is done by default) and then I can surf pretty securely. When I want to send an email I startup I2P (and yes I run both at the same time but only when using email). The only reason at this time of running I2P is because of email and how it works.
Not sure if you use or looked into I2P and using email through I2P but I would say it is pretty slick and very secure. And the great part is that you can actually send an email from I2P email account to a normal email addresses. Stripping of headers etc...
The fact that you can run both from TAILS is the point!
To use these services properly people need to operate from a position of distrust at all times. Meaning they need to encrypt everything prior sending it going over the wire. Very few people in the AAS community know how to use PGP or are too lazy to use it. I wrote a guide to using gpg and made it available. It was well received but I'm not sure how many people use it.
Great topic and looks like there are some pretty cool opportunities for all of us to be safer, with reasonable cost/effort.
My interest is more directed toward our popular sources. I am curious how many of them are using similar programs to secure member info and communications.
:cricket:
