Friday 21 February 2014

TAILS - ANONYMITY FOR EVERYONE


By on 10:06

Tails is a live operating system, that you can start on almost any computer from a DVD or a USB stick. It aims at preserving your privacy and anonymity, and helps you to:
  • Use the Internet anonymously and circumvent censorship;
  • All connections to the Internet are forced to go through the Tor network;
  • Leave no trace on the computer you are using unless you ask it explicitly;
  • Use state-of-the-art cryptography tools to encrypt your files, emails and instant messaging.
System requirements
  • Either a DVD reader or possibility to boot from a USB stick or an external USB DVD reader.
  • Tails requires an x86 compatible processor: IBM PC compatible and others but not PowerPC nor ARM.
  • 1 GB of RAM to work smoothly. Tails is known to work with less memory but you might experience strange behaviours or crashes.
Included software

GNOME, an intuitive and attractive desktop environment

Networking
Tor with:
*stream isolation
*regular and obfsproxy bridges support
*the Vidalia graphical frontend
*Network Manager for easy network configuration

Firefox preconfigured with:
*TorBrowser patches
*Torbutton for anonymity and protection against evil JavaScript
*all cookies are treated as session cookies by default; the CS Lite extension provides more fine-grained cookie control for those who need it
*HTTPS Everywhere transparently enables SSL-encr breaks torypted connections to a great number of major websites

Pidgin preconfigured with OTR for Off-the-Record Messaging
Claws Mail e-mail client, with user-friendly GnuPG support
Liferea feed aggregator
Gobby for collaborative text writing
Aircrack-ng for wireless networks auditing
I2P an anonymizing network

Desktop Edition
OpenOffice.org
Gimp and Inkscape to edit images
Scribus for page layout
Audacity for recording and editing sounds
PiTIVi for non-linear audio/video editing
Poedit to edit .po files
Simple Scan and SANE for scanner support
Brasero to burn CD/DVD
Sound Juicer to rip audio CDs

Encryption & Privacy
LUKS and Palimpsest to install and use encrypted storage devices, e.g. for USB sticks
GnuPG, the GNU implementation of OpenPGP for email and data encyption and signing
TrueCrypt a disk encryption software
PWGen, a strong password generator
Shamir's Secret Sharing using gfshare and ssss
Florence virtual keyboard as a countermeasure against hardware keyloggers
MAT to anonymize metadata in files
KeePassX password manager

How safe is TOR?
"We will never be able to de-anonymize all Tor users all the time," according to one NSA document quoted by the Guardian. "With manual analysis we can de-anonymize a very small fraction of Tor users." The NSA has had "no success de-anonymizing a user in response" to a specific request, the document said.

Quote:Tor is "the king of high-secure, low-latency internet anonymity," the report quotes another NSA document as saying.

http://www.infoworld.com/d/security/repo...9?page=0,0

Quote:According to Greenwald's report, NSA documents show that Tor presents a big problem for the surveillance agency: "We will never be able to de-anonymize all Tor users all the time," says one top-secret presentation. "With manual analysis we can de-anonymize a very small fraction of Tor users." Targeting individuals in response to a specific request apparently has resulted in no success.

http://www.latinospost.com/articles/2913...acking.htm

Quote:"The fact that the NSA and GCHQ are using browser vulnerabilities to expose users, in spite of having control of many ISPs and many Tor exit nodes, indicates that attempts to exploit Tor at a network level have failed," he said.

Download link:

Links Are Shrinked To First LinkBucks And Then Adf.ly If You Can't Just wait For 10Seconds To Download These Then Sorry these Are Not For you.
Comment Below If Links went Dead.

About Chirag Arya

Chirag is a young guy who is blessed with the art of Blogging,He love to Blog day in and day out,He is a Website Designer, Certified Hacker and a Certified Graphics Designer.

0 comments:

Post a Comment