SlideShare une entreprise Scribd logo
1  sur  23
Tails OS
OPERATING SYSTEM
12-06-2015
sadeedameen@gmail.com
1
INTRODUCTION
 Tails is an operating system like Windows or Mac OS, but one specially designed
to preserve your anonymity and privacy
 Tails or The Amnesic Incognito Live System is a security-focused Debian-
based Linux distribution aimed at preservingprivacy and anonymity
 All its outgoing connections are forced to go through Tor,[4] and direct (non-
anonymous) connections are blocked
 The system is designed to be booted as a live DVD or live USB, and will leave no
trace (digital footprint) on the machine unless explicitly told to do so. The Tor
Project has provided most of the financial support for its development.
12-06-2015sadeedameen@gmail.com
2
IMPORTANCE
 TAILS: THE AMNESIC INCOGNITO LIVE
SYSTEM
 USE IT EVERYWHERE, LEAVE NO TRACES
 ONLINE ANONYMITY WITH TOR
 BEST ENCRYPTION TOOLS
12-06-2015sadeedameen@gmail.com
3
THE AMNESIC INCOGNITO LIVE SYSTEM
 It allows you to use the Internet anonymously almost
everywhere online and on any computer, but leaves no trace
of what you have done, unless you want to
 Tails is a “live” system, that is to say, it is meant to be run from a
DVD or USB stick independently of the system installed on the
computer’s hard disk.
 t is free software based on Debian GNU/Linux. Tails comes with
applications that have been configured with security in mind:
web browser, instant messaging client, email client, office
suite, image and sound editor and so on
12-06-2015sadeedameen@gmail.com
4
12-06-2015sadeedameen@gmail.com
5
USE IT EVERYWHERE, LEAVE NO TRACES
 You can use it at home, at a friend’s or at the local library
 Once you have removed the Tails DVD or USB stick from the
computer, it can restart with its usual operating system
 Tails is configured so as not to use the computer hard disk or
even its swap space
 The only space use by Tails is the RAM memory, which is
automatically erased when the computer is turned off,So
your use of Tails will leave no trace. That is why it is called
“amnesic
12-06-2015sadeedameen@gmail.com
6
USE IT EVERYWHERE, LEAVE NO TRACES
CONT
 This allows you to work on a sensitive file on any computer and prevent the
data being recovered after the computer is turned off.
 This allows you to work on a sensitive file on any computer and prevent the
data being recovered after the computer is turned off.
12-06-2015sadeedameen@gmail.com
7
ONLINE ANONYMITY WITH TOR
 Tails relies on the Tor networks to protect your online privacy
 All software is configured to connect through Tor and direct connections
(that do not guarantee your anonymity) are blocked.
 Tor is free software that allows you to protect your privacy and guarantee
your confidentiality online.
 It protects you by sending your communications around a distributed
network of relays run by volunteers all over the world
 It prevents anyone who may be monitoring your Internet connection from
discovering which sites you visit, and it prevents the sites you visit from
discovering where you are.
12-06-2015sadeedameen@gmail.com
8
BEST ENCRYPTION TOOLS
Tails also includes a range of tools for protecting your data by means of strong encryption
 Encrypt your USB stick or external hard disks with LUKS, the Linux standard for volume
encryption.
 Automatically encrypt your communications with websites using HTTPS Everywhere, a
Firefox extension developed by the Electronic Frontier Foundation.
 Use OpenPGP, the standard in its field, to encrypt and sign your emails and documents
from the Tails email client, text editor or file browser.
 Protect your instant messaging conversations using OTR, a cryptographic tool that
provides encryption, authentication and deniability.
 Delete your files safely and clean your disk space using Nautilus Wipe.
12-06-2015sadeedameen@gmail.com
9
TAILS OS
General characterestics Tails
Supported hardware x86 compatible and/or Virtual
Machines
Based on Tor, Debian
Gateway and torify any operating
system [
Not a torifying Gateway.
Responsible for building Tor
circuits(Network)
Tor client running on workstation
Workstation does not have to trust
Gateway
Not a gateway
Local Disk Encryption Yes, for persistent USB.
Cold Boot Attack Protection Yes 12-06-2015sadeedameen@gmail.com
10
GNOME Desktop
The main drawback of GNOME is that it requires quite a lot of
resources to work properly, but it has many advantages. The
GNOME Desktop is:
 Well integrated, especially for new Linux users.
 Very well translated and documented.
 Doing relatively good regarding accessibility features.
 Actively developed.
 Well maintained in Debian, where it is the default desktop
environment. 12-06-2015sadeedameen@gmail.com
11
12-06-2015sadeedameen@gmail.com
12
Hardware compatibility
 Tails automatically detects the type of
processor of the computer and loads a 32-
bit or a 64-bit kernel accordingly.
 Tails is only available on the x86 and x86_64
architectures
 Tails does not work on the ARM
architecture
12-06-2015sadeedameen@gmail.com
13
INSTALLATION
 This is not possible using the recommended installation methods. Tails is
designed to be a live system running from a removable media: DVD, USB
stick or SD card.
 This is a conscious decision as this mode of operation is better for what we
want to provide to Tails users: amnesia, the fact that Tails leaves no traces
on the computer after a session is closed.
 Tails provides upgrades every 6 weeks, that are thoroughly tested to
make sure that no security feature or configuration gets broken
 If you upgrade the system yourself using apt-get or Synaptic, you might
break things. Upgrading when you get a notification from Tails Upgrader
is enough
12-06-2015sadeedameen@gmail.com
14
WEB BROWSER
 Tor Browser(Javascript enabled)
 Many websites today require JavaScript to work correctly. As a
consequence JavaScript is enabled by default in Tails to avoid
confusing many users. But the Torbutton extension, included in Tails,
takes care of blocking dangerous JavaScript functionalities
 Tor Browser also includes a security slider and the NoScript extension to
optionally disable more JavaScript. This might improve security in some
cases. However, if you disable JavaScript, then the fingerprint of your
browser will differ from most Tor users. This might break your anonymity
12-06-2015sadeedameen@gmail.com
15
NETWORKING
USING A VPN INSTEAD OF TOR
 It is a very fundamental assumption of Tails to force all outgoing traffic to
anonymity networks such as Tor or I2P. VPN are not anonymity networks, because
the administrators of the VPN can know both where you are connecting from and
where you are connecting to. Tor provides anonymity by making it impossible for a
single point in the network to know both the origin and the destination of a
connection
12-06-2015sadeedameen@gmail.com
16
NETWORKING
CONT
USING A VPN TO CONNECT TO TOR (VPN BEFORE TOR)
 In some situations, you might be forced to use a VPN to connect to the Internet,
for example by your ISP. This is currently not possible using Tails.
 Tor bridges can also be useful to bypass the limitations imposed by your ISP.
CONNECTING TO A VPN USING TOR (VPN AFTER TOR)
In some situtations, it can be useful to connect to a VPN through Tor:
 To access services that block connections coming from Tor.
 To access ressources only available inside a VPN, for example at your company
or University.
 This is currently not possible easily using Tails.
12-06-2015sadeedameen@gmail.com
17
Software not included in Tails
This software is already available in Debian, as this is a requirement
to be included in Tails. Adding to Tails software which is not in
Debian imply an additional workload that could compromise the
sustainability of the project. On top of that, being in Debian brings
many advantages:
 It is included in the Debian process for security updates and
new versions.
 It is authenticated using OpenPGP signatures.
 It is under the scrutiny of the Debian community and its many
users and derivatives, including Ubuntu.
12-06-2015sadeedameen@gmail.com
18
Software not included in Tails
cont
Developers also try to limit the amount of software included in Tails, and we only
add new software with a very good reason to do so:
 We try to limit the growth of the ISO image and automatic upgrades.
 More software implies more security issues.
 We avoid proposing several options to accomplish the same task.
 If a package needs to be removed after its inclusion, for example because of
security problems, then this might be problematic as users might rely on it.
12-06-2015sadeedameen@gmail.com
19
OTHER SECURITY ISSUES
Tails on a compromised system
 Tails runs independently from the operating system installed on
the computer. So, if the computer has only been compromised
by software, running from inside your regular operating system
(virus, trojan, etc.), then it is safe to use Tails. This is true as long
as Tails itself has been installed using a trusted system.
 If the computer has been compromised by someone having
physical access to it and who installed untrusted pieces of
hardware, then it might not be safe to use Tails.
12-06-2015sadeedameen@gmail.com
20
Other security issues
cont
Integrity of a Tails device
 To verify the integrity of a DVD from a separate trusted system,
you can verify the signature of the ISO image as documented
in verify the ISO image using the command line against the DVD
itself.
 There is no documented method of verifying the integrity of a
USB stick or SD card installed using Tails Installer. However, if you
have another trusted Tails device, you canclone it onto the
untrusted device to reset it to a trusted state.
12-06-2015sadeedameen@gmail.com
21
 Tails is a live system that aims to preserve your privacy and anonymity. It
helps you to use the Internet anonymously and circumvent censorship
almost anywhere you go and on any computer but leaving no trace
unless you ask it to explicitly.
 It is a complete operating system designed to be used from a DVD, USB
stick, or SD card independently of the computer's original operating
system. It is Free Software and based on Debian GNU/Linux.
12-06-2015sadeedameen@gmail.com
22
12-06-2015sadeedameen@gmail.com
23

Contenu connexe

Tendances

Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
Sina Manavi
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
aradhanalaw
 

Tendances (20)

Computer security
Computer securityComputer security
Computer security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 
Cia security model
Cia security modelCia security model
Cia security model
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacks
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICESCOMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
 
Ransomware
RansomwareRansomware
Ransomware
 
Deep web
Deep webDeep web
Deep web
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Password Attack
Password Attack Password Attack
Password Attack
 

En vedette

Дмитрий Угрюмов. Анонимность в Интернете: средства, методы, уязвимости и все-...
Дмитрий Угрюмов. Анонимность в Интернете: средства, методы, уязвимости и все-...Дмитрий Угрюмов. Анонимность в Интернете: средства, методы, уязвимости и все-...
Дмитрий Угрюмов. Анонимность в Интернете: средства, методы, уязвимости и все-...
Positive Hack Days
 
An Underground education
An Underground educationAn Underground education
An Underground education
grugq
 
OPSEC for hackers (bahasa indonesia)
OPSEC for hackers (bahasa indonesia)OPSEC for hackers (bahasa indonesia)
OPSEC for hackers (bahasa indonesia)
grugq
 

En vedette (20)

Дмитрий Угрюмов. Анонимность в Интернете: средства, методы, уязвимости и все-...
Дмитрий Угрюмов. Анонимность в Интернете: средства, методы, уязвимости и все-...Дмитрий Угрюмов. Анонимность в Интернете: средства, методы, уязвимости и все-...
Дмитрий Угрюмов. Анонимность в Интернете: средства, методы, уязвимости и все-...
 
律師司法官心智圖關鍵解題
律師司法官心智圖關鍵解題律師司法官心智圖關鍵解題
律師司法官心智圖關鍵解題
 
Что нужно знать специалисту по ИБ
Что нужно знать специалисту по ИБЧто нужно знать специалисту по ИБ
Что нужно знать специалисту по ИБ
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
The Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the InternetThe Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the Internet
 
Анонимность в Биткоин. Часть 1. Лекция 9
Анонимность в Биткоин. Часть 1. Лекция 9Анонимность в Биткоин. Часть 1. Лекция 9
Анонимность в Биткоин. Часть 1. Лекция 9
 
OPSEC for hackers (bahasa indonesia)
OPSEC for hackers (bahasa indonesia)OPSEC for hackers (bahasa indonesia)
OPSEC for hackers (bahasa indonesia)
 
Infra
InfraInfra
Infra
 
How do bitcoin transactions work?
How do bitcoin transactions work?How do bitcoin transactions work?
How do bitcoin transactions work?
 
How does Bitcoin work?
How does Bitcoin work?How does Bitcoin work?
How does Bitcoin work?
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
 
Online Security
Online SecurityOnline Security
Online Security
 
What is Bitcoin?
What is Bitcoin?What is Bitcoin?
What is Bitcoin?
 
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
Tails Linux Operating System: The Amnesiac Incognito System in Times of High ...
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 
TOR: The Onion Router
TOR: The Onion RouterTOR: The Onion Router
TOR: The Onion Router
 
Вступление в Биткоин. Лекция 1.
Вступление в Биткоин. Лекция 1.Вступление в Биткоин. Лекция 1.
Вступление в Биткоин. Лекция 1.
 
anonymity_KYC_short
anonymity_KYC_shortanonymity_KYC_short
anonymity_KYC_short
 
Tor
TorTor
Tor
 
On Cyber
On Cyber  On Cyber
On Cyber
 

Similaire à Tails os

Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
mordannon
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
mordannon
 
Installing R H E L 5
Installing  R H E L 5Installing  R H E L 5
Installing R H E L 5
monywa
 
Database Security Explained
Database Security ExplainedDatabase Security Explained
Database Security Explained
wensheng wei
 

Similaire à Tails os (20)

NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2
 
NWSLTR_Volume8_Issue1
NWSLTR_Volume8_Issue1NWSLTR_Volume8_Issue1
NWSLTR_Volume8_Issue1
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Returnil 2010
Returnil 2010Returnil 2010
Returnil 2010
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
unit5final
unit5finalunit5final
unit5final
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
Windows server hardening 1
Windows server hardening 1Windows server hardening 1
Windows server hardening 1
 
Kautilya: Teensy beyond shell
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shell
 
SecureSet WarGames - Logging and Packet Capture Training
SecureSet WarGames - Logging and Packet Capture TrainingSecureSet WarGames - Logging and Packet Capture Training
SecureSet WarGames - Logging and Packet Capture Training
 
Romote PC Access
Romote PC Access Romote PC Access
Romote PC Access
 
Fast Answers about Pertino
Fast Answers about PertinoFast Answers about Pertino
Fast Answers about Pertino
 
Installing R H E L 5
Installing  R H E L 5Installing  R H E L 5
Installing R H E L 5
 
Database Security Explained
Database Security ExplainedDatabase Security Explained
Database Security Explained
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 

Plus de SADEED AMEEN

THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
SADEED AMEEN
 

Plus de SADEED AMEEN (9)

Resume
ResumeResume
Resume
 
Requirement Analysis
Requirement AnalysisRequirement Analysis
Requirement Analysis
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Software process Models
Software process ModelsSoftware process Models
Software process Models
 
Intelligent traffic information and control system
Intelligent traffic information and control systemIntelligent traffic information and control system
Intelligent traffic information and control system
 
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
THE WAY IN WHICH PEOPLE AQUIRE INFORMATION ABOUT THEIR LOCALITY , WEATHER CON...
 
Network testing and debugging
Network testing and debuggingNetwork testing and debugging
Network testing and debugging
 
Organic user interface presentaion
Organic user interface presentaionOrganic user interface presentaion
Organic user interface presentaion
 
Organic User Interface
Organic User InterfaceOrganic User Interface
Organic User Interface
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Dernier (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Tails os

  • 2. INTRODUCTION  Tails is an operating system like Windows or Mac OS, but one specially designed to preserve your anonymity and privacy  Tails or The Amnesic Incognito Live System is a security-focused Debian- based Linux distribution aimed at preservingprivacy and anonymity  All its outgoing connections are forced to go through Tor,[4] and direct (non- anonymous) connections are blocked  The system is designed to be booted as a live DVD or live USB, and will leave no trace (digital footprint) on the machine unless explicitly told to do so. The Tor Project has provided most of the financial support for its development. 12-06-2015sadeedameen@gmail.com 2
  • 3. IMPORTANCE  TAILS: THE AMNESIC INCOGNITO LIVE SYSTEM  USE IT EVERYWHERE, LEAVE NO TRACES  ONLINE ANONYMITY WITH TOR  BEST ENCRYPTION TOOLS 12-06-2015sadeedameen@gmail.com 3
  • 4. THE AMNESIC INCOGNITO LIVE SYSTEM  It allows you to use the Internet anonymously almost everywhere online and on any computer, but leaves no trace of what you have done, unless you want to  Tails is a “live” system, that is to say, it is meant to be run from a DVD or USB stick independently of the system installed on the computer’s hard disk.  t is free software based on Debian GNU/Linux. Tails comes with applications that have been configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor and so on 12-06-2015sadeedameen@gmail.com 4
  • 6. USE IT EVERYWHERE, LEAVE NO TRACES  You can use it at home, at a friend’s or at the local library  Once you have removed the Tails DVD or USB stick from the computer, it can restart with its usual operating system  Tails is configured so as not to use the computer hard disk or even its swap space  The only space use by Tails is the RAM memory, which is automatically erased when the computer is turned off,So your use of Tails will leave no trace. That is why it is called “amnesic 12-06-2015sadeedameen@gmail.com 6
  • 7. USE IT EVERYWHERE, LEAVE NO TRACES CONT  This allows you to work on a sensitive file on any computer and prevent the data being recovered after the computer is turned off.  This allows you to work on a sensitive file on any computer and prevent the data being recovered after the computer is turned off. 12-06-2015sadeedameen@gmail.com 7
  • 8. ONLINE ANONYMITY WITH TOR  Tails relies on the Tor networks to protect your online privacy  All software is configured to connect through Tor and direct connections (that do not guarantee your anonymity) are blocked.  Tor is free software that allows you to protect your privacy and guarantee your confidentiality online.  It protects you by sending your communications around a distributed network of relays run by volunteers all over the world  It prevents anyone who may be monitoring your Internet connection from discovering which sites you visit, and it prevents the sites you visit from discovering where you are. 12-06-2015sadeedameen@gmail.com 8
  • 9. BEST ENCRYPTION TOOLS Tails also includes a range of tools for protecting your data by means of strong encryption  Encrypt your USB stick or external hard disks with LUKS, the Linux standard for volume encryption.  Automatically encrypt your communications with websites using HTTPS Everywhere, a Firefox extension developed by the Electronic Frontier Foundation.  Use OpenPGP, the standard in its field, to encrypt and sign your emails and documents from the Tails email client, text editor or file browser.  Protect your instant messaging conversations using OTR, a cryptographic tool that provides encryption, authentication and deniability.  Delete your files safely and clean your disk space using Nautilus Wipe. 12-06-2015sadeedameen@gmail.com 9
  • 10. TAILS OS General characterestics Tails Supported hardware x86 compatible and/or Virtual Machines Based on Tor, Debian Gateway and torify any operating system [ Not a torifying Gateway. Responsible for building Tor circuits(Network) Tor client running on workstation Workstation does not have to trust Gateway Not a gateway Local Disk Encryption Yes, for persistent USB. Cold Boot Attack Protection Yes 12-06-2015sadeedameen@gmail.com 10
  • 11. GNOME Desktop The main drawback of GNOME is that it requires quite a lot of resources to work properly, but it has many advantages. The GNOME Desktop is:  Well integrated, especially for new Linux users.  Very well translated and documented.  Doing relatively good regarding accessibility features.  Actively developed.  Well maintained in Debian, where it is the default desktop environment. 12-06-2015sadeedameen@gmail.com 11
  • 13. Hardware compatibility  Tails automatically detects the type of processor of the computer and loads a 32- bit or a 64-bit kernel accordingly.  Tails is only available on the x86 and x86_64 architectures  Tails does not work on the ARM architecture 12-06-2015sadeedameen@gmail.com 13
  • 14. INSTALLATION  This is not possible using the recommended installation methods. Tails is designed to be a live system running from a removable media: DVD, USB stick or SD card.  This is a conscious decision as this mode of operation is better for what we want to provide to Tails users: amnesia, the fact that Tails leaves no traces on the computer after a session is closed.  Tails provides upgrades every 6 weeks, that are thoroughly tested to make sure that no security feature or configuration gets broken  If you upgrade the system yourself using apt-get or Synaptic, you might break things. Upgrading when you get a notification from Tails Upgrader is enough 12-06-2015sadeedameen@gmail.com 14
  • 15. WEB BROWSER  Tor Browser(Javascript enabled)  Many websites today require JavaScript to work correctly. As a consequence JavaScript is enabled by default in Tails to avoid confusing many users. But the Torbutton extension, included in Tails, takes care of blocking dangerous JavaScript functionalities  Tor Browser also includes a security slider and the NoScript extension to optionally disable more JavaScript. This might improve security in some cases. However, if you disable JavaScript, then the fingerprint of your browser will differ from most Tor users. This might break your anonymity 12-06-2015sadeedameen@gmail.com 15
  • 16. NETWORKING USING A VPN INSTEAD OF TOR  It is a very fundamental assumption of Tails to force all outgoing traffic to anonymity networks such as Tor or I2P. VPN are not anonymity networks, because the administrators of the VPN can know both where you are connecting from and where you are connecting to. Tor provides anonymity by making it impossible for a single point in the network to know both the origin and the destination of a connection 12-06-2015sadeedameen@gmail.com 16
  • 17. NETWORKING CONT USING A VPN TO CONNECT TO TOR (VPN BEFORE TOR)  In some situations, you might be forced to use a VPN to connect to the Internet, for example by your ISP. This is currently not possible using Tails.  Tor bridges can also be useful to bypass the limitations imposed by your ISP. CONNECTING TO A VPN USING TOR (VPN AFTER TOR) In some situtations, it can be useful to connect to a VPN through Tor:  To access services that block connections coming from Tor.  To access ressources only available inside a VPN, for example at your company or University.  This is currently not possible easily using Tails. 12-06-2015sadeedameen@gmail.com 17
  • 18. Software not included in Tails This software is already available in Debian, as this is a requirement to be included in Tails. Adding to Tails software which is not in Debian imply an additional workload that could compromise the sustainability of the project. On top of that, being in Debian brings many advantages:  It is included in the Debian process for security updates and new versions.  It is authenticated using OpenPGP signatures.  It is under the scrutiny of the Debian community and its many users and derivatives, including Ubuntu. 12-06-2015sadeedameen@gmail.com 18
  • 19. Software not included in Tails cont Developers also try to limit the amount of software included in Tails, and we only add new software with a very good reason to do so:  We try to limit the growth of the ISO image and automatic upgrades.  More software implies more security issues.  We avoid proposing several options to accomplish the same task.  If a package needs to be removed after its inclusion, for example because of security problems, then this might be problematic as users might rely on it. 12-06-2015sadeedameen@gmail.com 19
  • 20. OTHER SECURITY ISSUES Tails on a compromised system  Tails runs independently from the operating system installed on the computer. So, if the computer has only been compromised by software, running from inside your regular operating system (virus, trojan, etc.), then it is safe to use Tails. This is true as long as Tails itself has been installed using a trusted system.  If the computer has been compromised by someone having physical access to it and who installed untrusted pieces of hardware, then it might not be safe to use Tails. 12-06-2015sadeedameen@gmail.com 20
  • 21. Other security issues cont Integrity of a Tails device  To verify the integrity of a DVD from a separate trusted system, you can verify the signature of the ISO image as documented in verify the ISO image using the command line against the DVD itself.  There is no documented method of verifying the integrity of a USB stick or SD card installed using Tails Installer. However, if you have another trusted Tails device, you canclone it onto the untrusted device to reset it to a trusted state. 12-06-2015sadeedameen@gmail.com 21
  • 22.  Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly.  It is a complete operating system designed to be used from a DVD, USB stick, or SD card independently of the computer's original operating system. It is Free Software and based on Debian GNU/Linux. 12-06-2015sadeedameen@gmail.com 22