<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:og="http://ogp.me/ns#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/">
  <channel>
    <title>Tails</title>
    <link>https://www.linuxjournal.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Weekend Reading: Tor and Tails</title>
  <link>https://www.linuxjournal.com/content/weekend-reading-tor-and-tails</link>
  <description>  &lt;div data-history-node-id="1340218" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/carlie-fairchild" lang="" about="https://www.linuxjournal.com/users/carlie-fairchild" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Carlie Fairchild&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;Tails is a live media Linux distro designed to boot into a highly secure desktop environment. Tor is a browser that prevents somebody watching your internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.&lt;/p&gt;

&lt;p&gt;Learn why anonymity matters and how you can protect yourself with this &lt;em&gt;Linux Journal&lt;/em&gt; Weekend Reading.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="//www.linuxjournal.com/content/tails-above-rest-installation
"&gt;T&lt;/a&gt;&lt;a href="https://www.linuxjournal.com/content/tor-hidden-services"&gt;or Hidden Services&lt;/a&gt; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Why should clients get all the privacy? Give your servers some privacy too!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="//www.linuxjournal.com/content/tails-above-rest-installation
"&gt;Tails above the Rest: the Installation&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;How to get and validate the Tails distribution and install it. We will follow up with what Tails can and can't do to protect your privacy, and how to use Tails in a way that minimizes your risk. Then we will finish with some more advanced features of Tails, including the use of a persistent volume (with this feature, depending on your needs, you could conceivably use Tails as your main Linux distribution).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="//www.linuxjournal.com/content/tails-above-rest-part-ii "&gt;Tails above the Rest, Part II&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now that you have Tails installed, let's start using it. Read on to find out how to get started.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="//www.linuxjournal.com/content/tails-above-rest-part-iii "&gt;Tails above the Rest, Part III&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the first two parts on this series, we gave an overview of Tails, including how to get the distribution securely, and once you have it, how to use some of the basic tools. Here, we cover some of the more advanced features of Tails, such as some of its log-in options, its suite of encryption tools and the persistent disk.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="//www.linuxjournal.com/content/tor-security-android-and-desktop-linux
"&gt;Tor Security for Android and Desktop Linux&lt;/a&gt;&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;The Tor Project presents an effective countermeasure against hostile and disingenuous carriers and ISPs that, on a properly rooted and capable Android device or Linux system, can force all network traffic through Tor encrypted entry points (guard nodes) with custom rules for iptables. This action renders all device network activity opaque to the upstream carrier—barring exceptional intervention, all efforts to track a user are afterwards futile.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="//www.linuxjournal.com/content/bundle-tor "&gt;A Bundle of Tor&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The best way to set up Tor on your personal machine.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="//www.linuxjournal.com/content/dolphins-nsa-dragnet "&gt;Dolphins in the NSA Dragnet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/weekend-reading-tor-and-tails" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Sat, 16 Mar 2019 14:04:18 +0000</pubDate>
    <dc:creator>Carlie Fairchild</dc:creator>
    <guid isPermaLink="false">1340218 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>The Linux Journal NSA Reading List: Tails and Tor</title>
  <link>https://www.linuxjournal.com/content/linux-journal-nsa-weekend-reading-list-tails-and-tor</link>
  <description>  &lt;div data-history-node-id="1339762" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/carlie-fairchild" lang="" about="https://www.linuxjournal.com/users/carlie-fairchild" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Carlie Fairchild&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;Tails is a live media Linux distro designed to boot into a highly secure desktop environment. Tor is a browser that prevents somebody watching your internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Learn why anonymity matters and how you can protect yourself by reading the following archived &lt;cite&gt;Linux Journal&lt;/cite&gt; articles:&lt;/p&gt;

&lt;p&gt;&lt;a href="//www.linuxjournal.com/content/tails-above-rest-installation
"&gt;Tails above the Rest: the Installation&lt;/a&gt; by Kyle Rankin: how to get and validate the Tails distribution and install it. I will follow up with what Tails can and can't do to protect your privacy, and how to use Tails in a way that minimizes your risk. Then I will finish with some more advanced features of Tails, including the use of a persistent volume (with this feature, depending on your needs, you could conceivably use Tails as your main Linux distribution).&lt;/p&gt;

&lt;p&gt;&lt;a href="//www.linuxjournal.com/content/tails-above-rest-part-ii "&gt;Tails above the Rest, Part II&lt;/a&gt; by Kyle Rankin: now that you have Tails installed, let's start using it. Read on to find out how to get started.&lt;/p&gt;

&lt;p&gt;&lt;a href="//www.linuxjournal.com/content/tails-above-rest-part-iii "&gt;Tails above the Rest, Part III&lt;/a&gt; by Kyle Rankin: in the first two parts on this series, I gave an overview of Tails, including how to get the distribution securely, and once you have it, how to use some of the basic tools. Here, I cover some of the more advanced features of Tails, such as some of its log-in options, its suite of encryption tools and the persistent disk.&lt;/p&gt;

&lt;p&gt;&lt;a href="//www.linuxjournal.com/content/tor-security-android-and-desktop-linux
"&gt;Tor Security for Android and Desktop Linux&lt;/a&gt; by Charles Fischer: the Tor Project presents an effective countermeasure against hostile and disingenuous carriers and ISPs that, on a properly rooted and capable Android device or Linux system, can force all network traffic through Tor encrypted entry points (guard nodes) with custom rules for iptables. This action renders all device network activity opaque to the upstream carrier—barring exceptional intervention, all efforts to track a user are afterwards futile.&lt;/p&gt;

&lt;p&gt;&lt;a href="//www.linuxjournal.com/content/bundle-tor "&gt;A Bundle of Tor&lt;/a&gt; by Kyle Rankin: the best way to set up Tor on your personal machine.&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/linux-journal-nsa-weekend-reading-list-tails-and-tor" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Sun, 25 Mar 2018 19:33:50 +0000</pubDate>
    <dc:creator>Carlie Fairchild</dc:creator>
    <guid isPermaLink="false">1339762 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Tor Security for Android and Desktop Linux</title>
  <link>https://www.linuxjournal.com/content/tor-security-android-and-desktop-linux</link>
  <description>  &lt;div data-history-node-id="1339360" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/charles-fisher" lang="" about="https://www.linuxjournal.com/users/charles-fisher" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Charles Fisher&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;span class="h3-replacement"&gt;
Introduction&lt;/span&gt;

&lt;p&gt;
Internet service providers in the United States have just been &lt;a href="https://www.nytimes.com/2017/03/29/opinion/how-the-republicans-sold-your-privacy-to-internet-providers.html?_r=1"&gt;given the
green light&lt;/a&gt; to sell usage history of their subscribers by &lt;a href="https://www.congress.gov/bill/115th-congress/senate-joint-resolution/34/all-info"&gt;S
J Res 34&lt;/a&gt;,
opening the gates for private subscriber data to become public. The law
appears to direct ISPs to provide an "opt-out" mechanism for subscribers to
retain private control of their usage history, which every subscriber
should complete.
&lt;/p&gt;

&lt;p&gt;
This comes at an interesting time for the new Trump presidency, as he
appears to be preparing the Justice Department to &lt;a href="https://www.nytimes.com/2017/04/05/us/politics/trump-interview-susan-rice.html"&gt;prosecute
Susan Rice&lt;/a&gt; for
accessing telephone records of his associates while she was the National
Security Advisor for the Obama administration. It is ironic and
unconscionable that President Trump has chosen to erode internet usage
privacy for his constituents while fiercely defending the telephone records
of those closest to him.
&lt;/p&gt;

&lt;p&gt;
&lt;a href="https://www.torproject.org"&gt;The Tor Project&lt;/a&gt; presents an effective countermeasure against hostile and
disingenuous carriers and ISPs that, on a properly rooted and capable
Android device or Linux system, can force all network traffic through Tor
encrypted entry points (guard nodes) with custom rules for iptables. This
action renders all device network activity opaque to the upstream
carrier—barring exceptional intervention, all efforts to track a user are
afterwards futile.
&lt;/p&gt;

&lt;span class="h3-replacement"&gt;
Orbot for Android&lt;/span&gt;

&lt;p&gt;
A rooted Android device is required for the highest levels of service for
Tor and is now a "must-have" for users who place great value on privacy.
Android stock devices (where root is controlled by the Original Equipment
Manufacturer [OEM] and/or the carrier) are able to use the network with
applications that are aware of the local Tor client, but full root control
of User ID zero is a precondition for total obfuscation of device network
traffic. Carriers and OEMs work very hard to lock devices and prevent users
from rooting, but they are also quite lazy in applying security updates,
and a thriving industry has emerged for Android owners seizing privileged
access by exploiting security flaws. A few relevant resources for rooting
are &lt;a href="http://theroot.ninja"&gt;&lt;/a&gt;Sunshine, &lt;a href="https://kingroot.net"&gt;KingRoot&lt;/a&gt; and &lt;a href="https://www.kingoapp.com"&gt;KingoRoot&lt;/a&gt;. Depending upon the hardware model,
these programs can be effective in breaking Android systems free. Research
on these tools and methods is best conducted in the discussion forums for
&lt;a href="https://www.xda-developers.com"&gt;XDA Developers&lt;/a&gt;.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/tor-security-android-and-desktop-linux" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 12 Apr 2017 15:32:53 +0000</pubDate>
    <dc:creator>Charles Fisher</dc:creator>
    <guid isPermaLink="false">1339360 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Tails above the Rest, Part II</title>
  <link>https://www.linuxjournal.com/content/tails-above-rest-part-ii</link>
  <description>  &lt;div data-history-node-id="1336409" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/kyle-rankin" lang="" about="https://www.linuxjournal.com/users/kyle-rankin" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Kyle Rankin&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
Now that you have Tails installed, let's start using it.
&lt;/p&gt;
&lt;p&gt;
I'm halfway through what will likely be a three-part series on the Tails
live disk. In the first column, &lt;a href="http://www.linuxjournal.com/content/tails-above-rest-installation"&gt;I introduced Tails&lt;/a&gt; as a special distribution of
Linux, based on Debian, that puts all sorts of privacy- and security-enhancing
tools in a live disk you can boot anywhere. Then I talked about how to
download and install the distribution securely on a CD or USB disk. In this
article, I'm going to follow up with a general overview of the Tails desktop and
highlight some of the software you are most likely to use within it. In
my next column, I'll cover some of the more advanced features of Tails,
including the persistent disk and encryption.
&lt;/p&gt;

&lt;span class="h3-replacement"&gt;
Tails Limitations&lt;/span&gt;

&lt;p&gt;
Before I talk too much about the security features of Tails, I think it's
important to highlight the limitations that Tails has. Although Tails is
incredibly useful and makes it much easier to use the Internet securely, it
still isn't a magical solution that will solve all of your privacy problems.
Before you use Tails, it's important to know where its limitations are and
beyond that, mistakes that you might make that could remove some of the
protections Tails does have.
&lt;/p&gt;

&lt;p&gt;
Tails uses Tor to anonymize your Internet use, but that within itself has
limitations. First, Tails doesn't attempt to hide the fact that you are using
Tor or Tails, so if others can sniff the traffic leaving your network, while
they may not be able to tell what Web sites you are browsing, they still
can tell you are using Tor itself. So, if you are in a situation where you may get
into trouble for using Tor, Tails out of the box won't protect you. Second,
although traffic between you and Tor and between Tor nodes is encrypted, traffic
that leaves Tor is not necessarily encrypted. Tails, like the Tor browser
bundle, adds extensions to its Web browser to attempt to use HTTPS-encrypted
sites whenever possible, but if you send an unencrypted e-mail or browse to an
unencrypted Web site, the traffic leaving Tor still would be unencrypted.
Along the same lines, you also still may be vulnerable to man-in-the-middle
attacks launched from a malicious Tor exit node itself or from an attacker
between the Tor exit node and the site you want to visit, so you still
need to pay attention to any certificate warnings you see in your browser.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/tails-above-rest-part-ii" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Thu, 03 Jul 2014 21:37:21 +0000</pubDate>
    <dc:creator>Kyle Rankin</dc:creator>
    <guid isPermaLink="false">1336409 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Tails above the Rest: the Installation</title>
  <link>https://www.linuxjournal.com/content/tails-above-rest-installation</link>
  <description>  &lt;div data-history-node-id="1336407" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/kyle-rankin" lang="" about="https://www.linuxjournal.com/users/kyle-rankin" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Kyle Rankin&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
A few columns ago, I started a series aimed at helping everyone improve
their privacy and security on the Internet. The first column in this
series was an updated version of a &lt;a href="http://www.linuxjournal.com/content/bundle-tor"&gt;Tor&lt;/a&gt; column I wrote a few years
ago. While the new column talked about how to get up and running with
Tor using the Tor Browser Bundle, in my original Tor column, I talked
about how to browse even more anonymously by using a Knoppix live CD
and live-installing Tor on top of it. That way, when you were done with
your session, you simply could reboot and remove the Knoppix disc, and the
host computer would be back to normal with no trace of your steps. Although
the Tor Browser Bundle is incredibly useful, it doesn't cover the case
where you would like to use Tor on a computer you don't own, much less
using Tor without leaving a trace.
&lt;/p&gt;
&lt;p&gt;
These days, there is a much better option than a Knoppix live CD—a
live DVD/USB distribution called Tails, which does so much more than
provide a live CD with Tor installed. Think of it like a live DVD
version of the Tor Browser Bundle, only for the entire OS. With Tails,
you boot in to a live environment either from a DVD or USB stick that
is set with incredibly secure defaults. Tails takes great lengths to
provide you with a secure, anonymous environment. Among other things,
Tor automatically launches and connects once you start the desktop, and
all communications are routed over it. By default, nothing you do in your
desktop session persists—everything is not only erased when you reboot,
Tails actually goes further and attempts to scrub the contents of RAM
before it does reboot. Tails includes a Web browser configured much like
in the Tor Browser Bundle with a number of privacy-enhancing plugins and
settings already in place. Beyond that, it includes a password manager
(Keepassx), GPG encryption software, an e-mail program (Claws), LUKS disk
encryption software, secure chat via Pidgin with the OTR (Off the Record)
plugin already installed, and it even includes an on-screen keyboard you
can use to type in passwords if you are concerned a keylogger might be
installed on your host machine.
&lt;/p&gt;

&lt;p&gt;
In the next few columns, I'm going to discuss how to get and validate
the Tails distribution and install it. I will follow up with what
Tails can and can't do to protect your privacy, and how to use
Tails in a way that minimizes your risk. Then I will finish with some
more advanced features of Tails, including the use of a persistent volume
(with this feature, depending on your needs, you could conceivably use
Tails as your main Linux distribution).
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/tails-above-rest-installation" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Thu, 03 Jul 2014 21:18:31 +0000</pubDate>
    <dc:creator>Kyle Rankin</dc:creator>
    <guid isPermaLink="false">1336407 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
