boosydoosy
Subscriber
Brothers in iron, check this out.
https://tails.boum.org/download/index.en.html
This is an entire operation system dedicated to accessing the internet through Tor and only through Tor. As a matter of fact, the IP Route Tables must be modified in order to bypass this feature. What that means is you can't connect to the regular internet while using Tails. You must be connected to a Tor relay.
What does that mean for you browsing? First, you can't mess up and have some weird program Hijack your internet and reveal your location. You also have complete control over the addons that can be run (and eventually exploited). You all read about the Java exploit from Freedom hosting? Maybe not, but the more recent Java exploit from Yahoo's page. Those were both zero day exploits. These can be used to launch harmful code on your computer to steal information from you.
Why is Tails safer? Tails is open sources meaning everybody is allowed to view the code and those with the knowledge can make suggestions and modifications of that code - good suggestions are incorporated and rolled into the distribution. This way nobody can hide back doors or malicious code in the software. To date, no public security company has been allowed to audit Microsoft's OSs (or Apple for that matter) source code and report it's findings. Mostly because of the cost of intelectual property (or so they say). Closed source code, however is the reason Microsoft has stayed so far behind as an OS and linux has take a big share of that. That's the difference in business models versus software innovation - a topic outside the scope of this thread.
What is a live distribution? Live distributions (there are many, not just Tails) can boot from a USB stick or preferebly a read only CD-rom drive. That's right, you burn it to a CD and boot directly off the CD. The operating system is loaded into memory and upon turning the computer off, the operating system is wiped entirely leaving no trace for anybody to find.
You can't do this with virtual machines safely because you will leave imprints of files on the hard disk of the host machine. Live Cd-Rom is the only way to ensure the safety of the OS (99.99999% sure....there is one more way it can be breached, but unless you are building nukes or something, you don't need to worry about it).
The cool thing about the latest Tails distro is a MAC address changes that is automatically in the OS and changes the Network card Mac every time. This makes it very, very difficult to find the owner of a network card. Let me dive in here for a second. MAC addresses are as unique as IP addresses and "belong" to a serial number that a manufacturer has to keep (has to mean supposed to) records of this stuff. Once a mac address is known, the proper authorities can request a trail of the source and final buyer of that MAC address. That is why Tails incorporates this now automatically.
So if it were me, I would do something like this. Get on craiglist and buy some peice of crap laptop for $150 bucks. Make sure it has at least 2GHZ processor, 4 gigs of Ram, wireless network card , and a cdrom. Then go to a coffee shop with free wifi and download Tails (you will need a cd burner but most laptops in the past 5 years have one). Burn Tails to a cd and when you boot the computer, be sure to select to "Boot from CD-ROM".
Tails will load up, you can connect to wireless and wait for the Tor Relays to load. BAMB, untraceable internet. I would not ever connect to any internet connection you own using this computer.
I would not tell anybody I had a second computer. I would not show or talk about Tails or the ability to do this. Remain as dumb sounding as you can.
Find what?
https://tails.boum.org/download/index.en.html
This is an entire operation system dedicated to accessing the internet through Tor and only through Tor. As a matter of fact, the IP Route Tables must be modified in order to bypass this feature. What that means is you can't connect to the regular internet while using Tails. You must be connected to a Tor relay.
What does that mean for you browsing? First, you can't mess up and have some weird program Hijack your internet and reveal your location. You also have complete control over the addons that can be run (and eventually exploited). You all read about the Java exploit from Freedom hosting? Maybe not, but the more recent Java exploit from Yahoo's page. Those were both zero day exploits. These can be used to launch harmful code on your computer to steal information from you.
Why is Tails safer? Tails is open sources meaning everybody is allowed to view the code and those with the knowledge can make suggestions and modifications of that code - good suggestions are incorporated and rolled into the distribution. This way nobody can hide back doors or malicious code in the software. To date, no public security company has been allowed to audit Microsoft's OSs (or Apple for that matter) source code and report it's findings. Mostly because of the cost of intelectual property (or so they say). Closed source code, however is the reason Microsoft has stayed so far behind as an OS and linux has take a big share of that. That's the difference in business models versus software innovation - a topic outside the scope of this thread.
What is a live distribution? Live distributions (there are many, not just Tails) can boot from a USB stick or preferebly a read only CD-rom drive. That's right, you burn it to a CD and boot directly off the CD. The operating system is loaded into memory and upon turning the computer off, the operating system is wiped entirely leaving no trace for anybody to find.
You can't do this with virtual machines safely because you will leave imprints of files on the hard disk of the host machine. Live Cd-Rom is the only way to ensure the safety of the OS (99.99999% sure....there is one more way it can be breached, but unless you are building nukes or something, you don't need to worry about it).
The cool thing about the latest Tails distro is a MAC address changes that is automatically in the OS and changes the Network card Mac every time. This makes it very, very difficult to find the owner of a network card. Let me dive in here for a second. MAC addresses are as unique as IP addresses and "belong" to a serial number that a manufacturer has to keep (has to mean supposed to) records of this stuff. Once a mac address is known, the proper authorities can request a trail of the source and final buyer of that MAC address. That is why Tails incorporates this now automatically.
So if it were me, I would do something like this. Get on craiglist and buy some peice of crap laptop for $150 bucks. Make sure it has at least 2GHZ processor, 4 gigs of Ram, wireless network card , and a cdrom. Then go to a coffee shop with free wifi and download Tails (you will need a cd burner but most laptops in the past 5 years have one). Burn Tails to a cd and when you boot the computer, be sure to select to "Boot from CD-ROM".
Tails will load up, you can connect to wireless and wait for the Tor Relays to load. BAMB, untraceable internet. I would not ever connect to any internet connection you own using this computer.
I would not tell anybody I had a second computer. I would not show or talk about Tails or the ability to do this. Remain as dumb sounding as you can.
Find what?
Last edited:
