From 2d6f88baa9cf8d58fad919d7bc76a675755c929c Mon Sep 17 00:00:00 2001 From: anarsec Date: Mon, 25 Nov 2024 17:21:44 -0500 Subject: [PATCH] Dangerzone installation in Tails --- content/posts/tails-best/index.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/content/posts/tails-best/index.md b/content/posts/tails-best/index.md index 5c87157..f6a346d 100644 --- a/content/posts/tails-best/index.md +++ b/content/posts/tails-best/index.md @@ -235,9 +235,9 @@ The most recent [Tails audit](https://tails.net/news/audit_by_ROS/index.en.html) In 2017, the FBI and Facebook worked together to develop a malicious video file [that deanonymized a Tails user](https://www.vice.com/en/article/v7gd9b/facebook-helped-fbi-hack-child-predator-buster-hernandez) after he opened it while using his home Wi-Fi. -For untrusted attachments, you would ideally **sanitize all files sent to you before opening them** with a program like [Dangerzone](https://dangerzone.rocks/), which takes potentially dangerous PDFs, office documents, or images and converts them into safe PDFs. Unfortunately, Dangerzone is [not yet readily available in Tails](https://gitlab.tails.boum.org/tails/tails/-/issues/18135). Until Dangerzone is made available in Tails, there is no program to sanitize untrusted files into trusted files. +For untrusted attachments, you would ideally use [Dangerzone](https://dangerzone.rocks/) to **sanitize all files sent to you before opening them**. Dangerzone takes untrusted PDFs, office documents, or images and turns them into trusted PDFs. See the [documentation](https://tails.net/doc/persistent_storage/additional_software/dangerzone/index.en.html) for how to install Dangerzone on Tails — unfortunately, it currently requires using the [command line](/glossary/#command-line-interface-cli). -**It is best to open untrusted files in a dedicated ['offline mode'](https://tails.net/doc/first_steps/welcome_screen/index.en.html#index3h2) Tails session**. This will prevent code execution from establishing a remote connection to the adversary, which is usually needed to further the attack. Shutting the session down immediately afterward will minimize the chance of malware persisting. However, the files will remain untrusted. +If you are not using Dangerzone, **it is best to open untrusted files in a dedicated ['offline mode'](https://tails.net/doc/first_steps/welcome_screen/index.en.html#index3h2) Tails session**. This will prevent code execution from establishing a remote connection to the adversary, which is usually needed to further the attack. Shutting the session down immediately afterward will minimize the chance of malware persisting. However, unless you use Dangerzone to sanitize the files, they will remain untrusted. ## Links