mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-07-23 23:01:04 -04:00
tail best updates, pdf macro
This commit is contained in:
parent
11986c34cb
commit
0031e85f7a
15 changed files with 62 additions and 22 deletions
|
@ -10,6 +10,8 @@ tags = ["intro", "linux", "tails", "easy"]
|
|||
blogimage="/images/tails1.png"
|
||||
toc=true
|
||||
dateedit=2023-05-10
|
||||
a4="tails-a4.pdf"
|
||||
letter="tails-letter.pdf"
|
||||
+++
|
||||
|
||||
Tails is an [operating system](/glossary/#operating-system-os) that makes anonymous computer use accessible to anyone. Tails is [designed](https://tails.boum.org/about/index.en.html) to leave no trace of your activity on your computer, unless you explicitly ask it to. It achieves this by running from a DVD or USB independent of the computer’s installed operating system. Tails comes with [several built-in applications](https://tails.boum.org/doc/about/features/index.en.html) pre-configured with security in mind, and all anarchists should know how to use it for secure communication, research, editing, and the publication of sensitive documents.
|
||||
|
@ -54,7 +56,7 @@ Tails allows non-experts to benefit from digital security and anonymity without
|
|||
|
||||
This tutorial is in several sections. The first is about the basics for starting to use Tails. The second section contains tips on using software included in Tails, as well as what you need to know about how Tor works. The third section is about troubleshooting any issues that you might encounter with your Tails USB to avoid giving up at the first problem - most of the time the solution is simple!
|
||||
|
||||
## The concept of a threat model.
|
||||
## The concept of a threat model
|
||||
|
||||
Tails is not magic and has plenty of limitations. The Internet and computers are hostile territory and are based on stealing your data. Tails does not protect you from human error, compromised hardware, compromised firmware, being hacked, or certain other types of attacks. There is no absolutely perfect security on the Internet, hence the interest in being able to make a [threat model](/glossary/#threat-model).
|
||||
|
||||
|
@ -204,7 +206,7 @@ Every time you start Tails, the Tails Upgrader checks if you are using the lates
|
|||
|
||||
Internet traffic, including the IP address of the final destination, is encrypted in different layers like an onion. With each hop along the three relays, an encryption layer is removed. Each relay only knows the step before it, and after it (relay #3 knows that it comes from relay #2 and that it goes to such and such a website after, but does not know relay #1).
|
||||
|
||||

|
||||

|
||||
|
||||
This means that any intermediaries between you and relay #1 know you're using Tor but they don't know what site you're going to. Any intermediaries after relay #3 know that someone in the world is going to this site. The web server of the site sees you coming from the IP address of relay #3.
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue