Diferencia entre revisiones de «Tails/en»

De FdIwiki ELP
Saltar a: navegación, buscar
(Página creada con « ''Tails'' '''TAILS (The Amnesic Incognito Live System),''' Tails is an open source OS based on Debian and GNU / Linux, in particular...»)
 
(Presentaciones)
Línea 82: Línea 82:
 
[http://www.eldiario.es/turing/vigilancia_y_privacidad/Guia-practica-Tails-distribucion-Linux_0_253374668.html how to install and use Tails]
 
[http://www.eldiario.es/turing/vigilancia_y_privacidad/Guia-practica-Tails-distribucion-Linux_0_253374668.html how to install and use Tails]
  
== Presentaciones ==
+
== Presentations ==
 
[[Medio:TAILS.pdf]]
 
[[Medio:TAILS.pdf]]
  
 
[http://prezi.com/h8ldjco31ntx/?utm_campaign=share&utm_medium=copy&rc=ex0share  Tails]
 
[http://prezi.com/h8ldjco31ntx/?utm_campaign=share&utm_medium=copy&rc=ex0share  Tails]

Revisión de 18:59 25 ene 2015

Tails

TAILS (The Amnesic Incognito Live System), Tails is an open source OS based on Debian and GNU / Linux, in particular the version 6 is considered the best because have fewer vulnerabilities.

The particularity of this OS is that it is designed to force all outbound connections through the TOR network TOR (The Onion Router) in this way we are ensuring our privacy and anonymity on the net.

The aim of Tails is: Confidentiality and "anonymous" for anyone anywhere. We can start this OS at any PC from a DVD, USB memory or SD card. One feature key of Tails is that it is an OS Live, all you need is the RAM, volatile memory, because it is an amnesic OS, when you turn off the computer everything is erased, so there is no trace of what we have done with tails on the computer.

Features offered

  • All of our computer outgoing connections go through the Tor network. Therefore we are ensuring our privacy and anonymity because we are hiding our IP and all the outgoing information is encrypted. We will have available a button to change our connection in order to have a new IP and "change our identity."
  • Any outbound connection which is not anonymous will be blocked by Tails unless expressly you tell it to don't do it .
  • Tails leaves no trace of the sites you have visited or the actions we have taken when we connect through the Internet. This is guaranteed thanks to Tails does not use a hard drive. The entire programs are stored and run on our RAM, so when turn off computer, the memory is erased, deleting all traces of what we have done.
  • The USB or DVD where we execute Tails has no persistence. Therefore everything is saved in our /home and any program that we install will not be present the next time you boot Tails. To take a simple example, suppose we install Gimp, once it is installed we can use it without any problem but when turn off the computer Gimp will disappears, next the next boot of Tails you will have to reinstall Gimp.
  • The secure browser that includes Tails also offers a couple of interesting details focused on improving our security. On the one hand, we find a plugin installed HTTPS-Everywhere to encrypt almost all connections when we surf the internet, Pidgin, program for instant messaging, preconfigured with the module OTR ("Off-The-Record") to protect instant messaging, KeePassX, to manage your passwords safely, OpenPGP to encrypt our emails and documents.
  • To end the cycle of functions Tails offers, file management is one of its strengths. With this OS we can safely delete files from a USB memory to prevent them from being recovered and able to "clean" the free space of a storage unit to ensure that there are no recoverable data.
  • Tails offers a camouflage so that changes the appearance of the graphical environment Gnome user interface to make it look like Windows XP and thus spend more unnoticed in case someone was watching.

Software that comes with the OS Tails

Tails
  • TOR: with Vidalia (graphical user interface) where we can change from time to time our identity.
  • Pidgin: is a chat program which lets you start session on multiple chat networks simultaneously. Pidgin is configured with OTR (Off-the-Record) which allows private conversations by providing: Authenticity (we're sure who is the person you are talking whit, is who we think is), encryption (no one else can read your instant messages) , negation (once the conversation is over someone could change the conversation but during the conversation we are sure of their authenticity) and reliability (if the private key is lost no previous conversation is compromised).
  • LUKS (Linux Unified Key Setup): is a tool for installing and using encrypted storage devices.
  • GnuPG (GNU PrivacyGuard): is an application of estándarOpenPGP (standard email encryption using public key cryptography). What allows us to encrypt and sign our communications and documents.
  • Monkeysign: is a tool for signing OpenPGP keys.
  • Nautilus Wipe: allows shred files easily and safely.
  • PWGen: is a secure password generator, consisting in take words from a list and is generated randomly.
  • Shamir’sSecretSharing: a cryptographic algorithm (it's a secret sharing scheme that allows to distribute a secret among a group of participants, each of which is assigned a quota of secret).
  • Florencia: is a virtual keyboard to be used as a countermeasure against keyloggers. This interest us for example if we want to make online purchases.
  • MAT: A toolkit for anonymous metadata from files (it allows us to delete all the metadata from those files).
  • KeePassX: is a password manager where the database is encrypted with AES (Advanced Encryption Standard) which is a blocks based encryption.
  • GtkHash: allows to calculate checksums.

How is it used?

The latest version of Tails is able for download on the official website of the project, you can download the ISO format image via direct download or through torrent, in both cases, the project also offers a digital signature (encrypted using OpenPGP) to verify the integrity of the file you've downloaded (and check that which has not undergone any manipulation by a third party). After downloading the ISO obviously the next step is to burn it on a physical hardware. We have the option to burn the image to a DVD or burn the image to a USB memory (something we can do without much complication using tools like YUMI), in any case, it worth to know that we can run it from the DVD or from USB memory, without installing it on the hard disk of the computer, in fact, the goal of Tails is no the installation on a hard disk but install it on a USB stick or SD card. One of the most critical points of using Tails is booting from the USB drive.

Furthermore, in the field of information management and archives, this distribution includes the ability to encrypt your files and also includes utilities for deleting, safely, data from your hard drive or USB drives and avoid that the information can be recovered.

Who should use it?

Tails should become a key tool for journalists and bloggers who work in environments where communications are not secure or directly are blocked the access to certain services or social networks. With this GNU/Linux distribution, and how he relies on Tor, the user can protect his identity, ensure your privacy by encrypting messages and files.

Disadvantages

The security consultant Exodus Intelligence discovered a bug in Tails to find out the identity of users and even execute code remotely and was announced through a tweet. However, the company has decided not to make public the details of the vulnerability, in order to prevent any other person can exploit it. For Tails developers, behavior of consultant was baffling, because not contacted them before giving the news. Also they took the opportunity to mention that anyone who discover vulnerabilities in this software can help improve it via email.

"Some security problems are discovered each month in some programs. Some people have reported such vulnerabilities, which are then arranged. That's the power of free software and open source".

Recommendations / Conclusions

Does using Tails or TOR are we really sure of our privacy and anonymity on the net?

NO, security, privacy and anonymity on the net are not 100% guaranteed. We will not be sure but we have anonymity against other users. Knowing how TOR works ( for more info )we know there is a point in the network in which our communication is not encrypted so we can suffer an attack 'Man in the middle', besides this problem with navigation through the TOR network, the ISP (Internet Service Provider) can know that we are connected to a TOR server, a recommendation could solve it with I2P (Invisible Internet Protocol) which is no more than a network within a network, this was created to protect the communication of monitoring surveillance networks and motorization by third parties.

Sources

Tails website

TOR website

I2P website

ONI information (Analizes the global filter of the net))

Tor and Tails have a security bugs

how to install and use Tails

Presentations

Medio:TAILS.pdf

Tails