mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-06-15 10:09:15 -04:00
tails images
This commit is contained in:
parent
4f1ae04890
commit
a53080bfc5
7 changed files with 17 additions and 5 deletions
BIN
content/posts/tails/http.png
Normal file
BIN
content/posts/tails/http.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 73 KiB |
|
@ -110,10 +110,10 @@ In the Welcome Screen, select your language and keyboard layout in the **Languag
|
|||
|
||||
When you have enabled Persistent Storage, the passphrase to unlock it will appear in this window. If you haven't enabled Persistent Storage, no data will persist on your Tails USB beyond this session. Click **Start Tails**. After 15 to 30 seconds, the Tails desktop appears."
|
||||
|
||||

|
||||
|
||||
#### Using the Tails desktop
|
||||
|
||||

|
||||
|
||||
Tails is a classic and simple operating system.
|
||||
|
||||
1. The "Activities" menu. Allows you to see an overview of windows and applications. It also allows you to search through applications, files, and folders. You can also access "Activities" by sending the mouse to the top left corner of your screen or by pressing the Command/Windows (❖) key on the keyboard.
|
||||
|
@ -202,7 +202,9 @@ Tor has multiple limitations. For example, an entity with the appropriate techni
|
|||
|
||||
Virtually all websites today use [HTTPS](/glossary/#https); the S stands for "secure" (for example, https://www.anarsec.guide). If you try to visit a website without `http://` on Tor Browser, there is a warning message before continuing. If you see `http://` instead of `https://` before the address of a website, it means that all intermediaries after relay #3 of the Tor network know what you are exchanging with the website (including your log-in information). HTTPS means that the digital records of what you do on the site you are visiting is protected with an encryption key that belongs to the site. Intermediaries after relay #3 will know that you are going to riseup.net, for example, but they will not have access to your emails and passwords nor will they know if you are consulting your emails or if you are reading a random page on the site. A little padlock appears to the left of the site address when you use HTTPS.
|
||||
|
||||
If there is a yellow warning on the padlock, it means that, in the page you're browsing, some elements are not encrypted (they use HTTP), which can reveal the exact page you're browsing or allow intermediaries to partially modify the page.
|
||||
If there is a yellow warning on the padlock, it means that, in the page you're browsing, some elements are not encrypted (they use HTTP), which can reveal the exact page you're browsing or allow intermediaries to partially modify the page. By default, Tor Browser uses HTTPS-Only Mode to prevent visiting HTTP websites.
|
||||
|
||||

|
||||
|
||||
HTTPS is essential both to limit your web fingerprint, but also to prevent an intermediary from modifying the data you exchange with websites. If the intermediary cannot decrypt the data, they cannot modify it.
|
||||
|
||||
|
@ -212,6 +214,8 @@ In short, don't visit websites that don't use HTTPS.
|
|||
|
||||
Perhaps you have seen a strange site address containing 56 random characters, ending in .onion? This is called an onion service, and the only way to visit a website that uses such an address is to use the Tor Browser. The "deepweb" and "darkweb" are terms popularized in news media in recent years to describe these onion services.
|
||||
|
||||

|
||||
|
||||
Anyone can create an .onion site. But why would they want to? Well, the server location is anonymized, so authorities cannot find out where the website is hosted in order to take it down. When you send data to an .onion site, after the standard Tor circuit you enter the site's three Tor relays. So we have 6 Tor relays between us and the site; we know the first 3 relays, the site knows the last 3, and each Tor node just knows the relay before and after. Unlike an HTTPS normal website, it's all Tor encryption from end to end.
|
||||
|
||||
This means that both the client (your laptop) and the server (where the site lives) remain anonymous, whereas for a normal website, only the client is anonymous. In addition to being more anonymous for the server, it is also more anonymous for the client: you never leave the Tor network, so there is no possibility of interception after relay #3.
|
||||
|
@ -224,6 +228,8 @@ Some sites offer both a classic URL as well as an .onion address. In this case,
|
|||
|
||||
The Tor network is blocked and otherwise rendered more inconvenient to use in many ways. You may be confronted with CAPTCHA images (a kind of game that verifies you “are not a robot”) or obliged to provide additional personal data (ID card, phone number…) before proceeding, or Tor may be completely blocked.
|
||||
|
||||

|
||||
|
||||
Perhaps only certain Tor relays are blocked. In this case, you can change the Tor exit nodes for this site: click on the **≣ → "New Tor circuit for this site"**. The Tor circuit (path) will only change for the one tab. You may have to do this several times in a row if you're unlucky enough to run into several relays that have been banned.
|
||||
|
||||
It is also possible that the entire Tor network is blocked, because all Tor relays are public. In this case you can try to use a proxy to get to the site, such as https://hide.me/en/proxy (but only if you don't have to enter any personal data or do anything sensitive like login information). You can also check whether the page you want to access has been saved to the Wayback Machine: web.archive.org.
|
||||
|
@ -240,6 +246,8 @@ The Onion Circuits application shows which Tor circuit a connection to a server
|
|||
|
||||
***Tor Browser security settings***
|
||||
|
||||

|
||||
|
||||
Like any software, Tor Browser has vulnerabilities that can be exploited. To limit this, it's important to keep Tails up to date, and it's also recommended to increase the security settings of the Tor browser: you click on the shield icon and then **Change**. By default it's set to Standard, which is a browsing quality that hardly changes from a normal browser. We recommend that you set the most restrictive setting before starting any browsing: **Safest**. The layout of some sites may be modified, and sometimes some content will not be downloaded anymore (images, videos, etc.). Some sites will not work at all; if you have reason to trust them, you can view them on a less restrictive setting on a site by site basis. Note that both of the less restrictive setting allow scripts to function, which can [break your anonymity](https://arstechnica.com/information-technology/2013/08/attackers-wield-firefox-exploit-to-uncloak-anonymous-tor-users/) in a worst-case scenario.
|
||||
|
||||
***Downloading/uploading and the Tor Browser folder***
|
||||
|
@ -250,6 +258,8 @@ The Tor Browser on Tails is kept in a ["sandbox"](/glossary/#sandboxing) to prev
|
|||
|
||||
When you download something using the Tor Browser it will be saved in the Tor Browser folder (`/home/amnesia/Tor Browser/`), which is inside the "sandbox". If you want to do anything with this file, you should then move it out of the Tor Browser folder. You can use the file manager (**Applications → Accessories → Files**) to do this.
|
||||
|
||||

|
||||
|
||||
*Uploads*
|
||||
|
||||
Similarly, if you want to upload something using the Tor Browser (for example attaching a file to a blog post or email you have open in the browser), you will first have to move or copy that file into the Tor Browser folder. Then it will be available to you when you go to select an upload in the Tor Browser.
|
||||
|
@ -260,6 +270,8 @@ Be aware that, because all of your Tails session is running in RAM (unless you h
|
|||
|
||||
***Share Files with Onionshare***
|
||||
|
||||

|
||||
|
||||
It is possible to send a document through an .onion link thanks to [OnionShare](https://tails.boum.org/doc/anonymous_internet/onionshare/index.en.html) (**Applications → Internet → OnionShare**). Normally, OnionShare stops the hidden service after the files have been downloaded once. If you want to offer the files for multiple downloads, you need to go to Settings and unselect "Stop sharing after first download". As soon as you close OnionShare, cut the Internet connection, or shut down Tails, the files can no longer be accessed. This is a great way of sharing files because it doesn't require plugging a USB into someone else's computer, which is [not recommended](/posts/tails-best/#reducing-risks-when-using-untrusted-computers). The long .onion address can be shared via another channel (like a [Riseup Pad](https://pad.riseup.net/) you create that is easier to type).
|
||||
|
||||
***Make Correlation Attacks More Difficult***
|
||||
|
@ -351,10 +363,10 @@ To install software from the Debian software repository:
|
|||
* Once done, Tails will ask you, if your Persistent Storage is open, if you want to install it once, or add it to your Persistent Storage. If you add it to the Persistent Storage, the corresponding software files are saved there. They are automatically updated for security reasons as soon as a network connection is established.
|
||||
* You will be able to access the additional software you have installed, with the option to remove them, in **Applications → System Tools → Additional Software**.
|
||||
|
||||
For more information, see the documentation on [Installing additional software](https://tails.boum.org/doc/persistent_storage/configure/index.en.html).
|
||||
For more information, see the documentation on [Installing additional software](https://tails.boum.org/doc/persistent_storage/additional_software/index.en.html).
|
||||
|
||||
#### Remember to make backups!
|
||||
A Tails USB is easily lost and USBs have a much shorter life span than a hard drive (especially the cheap ones). If you put important data on it, think about making regular backups. If you use a second LUKS-encrypted USB, this is as simple as using the File Manager to copy files to a third LUKS-encrypted USB.
|
||||
A Tails USB is easily lost and USBs have a much shorter life span than a hard drive (especially the cheap ones). If you put important data on it, think about making regular backups. If you use a second LUKS-encrypted USB, this is as simple as using the File Manager to copy files to a backup LUKS-encrypted USB.
|
||||
|
||||
If you use Persistent Storage, see the [documentation on backing it up](https://tails.boum.org/doc/persistent_storage/backup/index.en.html).
|
||||
|
||||
|
|
BIN
content/posts/tails/lead.webp
Normal file
BIN
content/posts/tails/lead.webp
Normal file
Binary file not shown.
After Width: | Height: | Size: 98 KiB |
BIN
content/posts/tails/nautilus.png
Normal file
BIN
content/posts/tails/nautilus.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 35 KiB |
BIN
content/posts/tails/new_identity.png
Normal file
BIN
content/posts/tails/new_identity.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 88 KiB |
BIN
content/posts/tails/onionshare.png
Normal file
BIN
content/posts/tails/onionshare.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 42 KiB |
BIN
content/posts/tails/safest.png
Normal file
BIN
content/posts/tails/safest.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 73 KiB |
Loading…
Add table
Add a link
Reference in a new issue