tail best updates, pdf macro

This commit is contained in:
anarsec 2023-07-09 14:59:19 +00:00
parent 11986c34cb
commit 0031e85f7a
No known key found for this signature in database
15 changed files with 62 additions and 22 deletions

View file

@ -10,6 +10,8 @@ tags = ["intro", "linux", "tails", "easy"]
blogimage="/images/tails1.png"
toc=true
dateedit=2023-05-10
a4="tails-a4.pdf"
letter="tails-letter.pdf"
+++
Tails is an [operating system](/glossary/#operating-system-os) that makes anonymous computer use accessible to anyone. Tails is [designed](https://tails.boum.org/about/index.en.html) to leave no trace of your activity on your computer, unless you explicitly ask it to. It achieves this by running from a DVD or USB independent of the computers installed operating system. Tails comes with [several built-in applications](https://tails.boum.org/doc/about/features/index.en.html) pre-configured with security in mind, and all anarchists should know how to use it for secure communication, research, editing, and the publication of sensitive documents.
@ -54,7 +56,7 @@ Tails allows non-experts to benefit from digital security and anonymity without
This tutorial is in several sections. The first is about the basics for starting to use Tails. The second section contains tips on using software included in Tails, as well as what you need to know about how Tor works. The third section is about troubleshooting any issues that you might encounter with your Tails USB to avoid giving up at the first problem - most of the time the solution is simple!
## The concept of a threat model.
## The concept of a threat model
Tails is not magic and has plenty of limitations. The Internet and computers are hostile territory and are based on stealing your data. Tails does not protect you from human error, compromised hardware, compromised firmware, being hacked, or certain other types of attacks. There is no absolutely perfect security on the Internet, hence the interest in being able to make a [threat model](/glossary/#threat-model).
@ -204,7 +206,7 @@ Every time you start Tails, the Tails Upgrader checks if you are using the lates
Internet traffic, including the IP address of the final destination, is encrypted in different layers like an onion. With each hop along the three relays, an encryption layer is removed. Each relay only knows the step before it, and after it (relay #3 knows that it comes from relay #2 and that it goes to such and such a website after, but does not know relay #1).
![](anonymous-browsing.gif)
![See anarsec.guide for the animation.](anonymous-browsing.gif)
This means that any intermediaries between you and relay #1 know you're using Tor but they don't know what site you're going to. Any intermediaries after relay #3 know that someone in the world is going to this site. The web server of the site sees you coming from the IP address of relay #3.