Stories
Slash Boxes
Comments

SoylentNews is people

posted by cmn32480 on Thursday December 17 2015, @12:07PM   Printer-friendly
from the tails-I-win-heads-you-lose dept.

TAILS Linux 1.8 is out (Dec 15, 2015)

For those that are not familiar, Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. Tt is a complete operating system designed to be used from a DVD, USB stick, or SD card independently of the computer's original operating system. It is Free Software and based on Debian GNU/Linux.

Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc.

Some helpful links on the Tails site:

Tials Homepage
Tails version 1.8 abbreviated changelog
Tails Security Holes in version 1.7
Tails Downloads
Tails on Twitter
Tails version 1.8 complete changelog


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by AndyTheAbsurd on Thursday December 17 2015, @12:32PM

    by AndyTheAbsurd (3958) on Thursday December 17 2015, @12:32PM (#277646) Journal

    MD5 sum: 5b81e3ad169e7239b1b2553f2ba2914f tails-i386-1.8.iso

    SHA256sum: beff226d2c52ba61d25053034c8d33ae0c537bf4ea47e20f63cdae006978c497 tails-i386-1.8.iso

    --
    Please note my username before responding. You may have been trolled.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Thursday December 17 2015, @12:54PM

    by Anonymous Coward on Thursday December 17 2015, @12:54PM (#277652)

    Of course anyone trusting the checksums posted as comment on a discussion site by a pseudonymous user isn't truly paranoid.

    • (Score: 2) by WizardFusion on Thursday December 17 2015, @01:19PM

      by WizardFusion (498) on Thursday December 17 2015, @01:19PM (#277655) Journal

      Just because you are paranoid, does not mean they are not following you.

      • (Score: 0) by Anonymous Coward on Thursday December 17 2015, @03:02PM

        by Anonymous Coward on Thursday December 17 2015, @03:02PM (#277698)

        If they were coming after you, you'd be paranoid, too.

  • (Score: 0) by Anonymous Coward on Thursday December 17 2015, @01:21PM

    by Anonymous Coward on Thursday December 17 2015, @01:21PM (#277656)

    as opposed to the gpg signature provided on the website? dumbass

    • (Score: 0) by Anonymous Coward on Thursday December 17 2015, @01:30PM

      by Anonymous Coward on Thursday December 17 2015, @01:30PM (#277659)

      You can't trust the gpg because it's been cracked by the US department of homeland homeland.

  • (Score: 0) by Anonymous Coward on Thursday December 17 2015, @03:56PM

    by Anonymous Coward on Thursday December 17 2015, @03:56PM (#277726)
    Well, to those of you who are moaning about this, if you see these hashes posted in a bunch of other places too, and they match what you compute yourself, then that's still stronger assurance of authenticity I'd think. Every little bit of data you can use to further authenticate it helps.
    • (Score: 0) by Anonymous Coward on Thursday December 17 2015, @07:03PM

      by Anonymous Coward on Thursday December 17 2015, @07:03PM (#277829)

      except is the original data was replaced with a backdoor'ed one. then everyone is helping to propagate that 'this one is a good one' even though it isn't
      I only trust the GPG sig.

    • (Score: 0) by Anonymous Coward on Thursday December 17 2015, @09:12PM

      by Anonymous Coward on Thursday December 17 2015, @09:12PM (#277902)

      if you just download the torrent and the hashing and checksummage will be handled by the torrent client.

  • (Score: 0) by Anonymous Coward on Thursday December 17 2015, @09:37PM

    by Anonymous Coward on Thursday December 17 2015, @09:37PM (#277917)

    A suitably able adversary could deliver a previously prepared copy of the site the the checksum changed, but there's no way they've feasibly prepared a false copy of this page in advance.

    Sure they could do DPI and sed the real checksum out for their one, but that's a lot harder to actually do than delivering a few false pages.

    Think this is just paranoid or infeasible? They did it to Belgacom and OPEC, I'd say that Tails is a high-enough value target to be worth the trouble.