![]() Now that your data is secure, you can start exchanging information (a.k.a. Like a lizard detaching its tail in dangerous situations, now you can enter the password to the outside volume and demonstrate the funny pics instead of your confidential information. The best way is to store the TrueCryp binary code in the persistent volume. The header of a hidden volume created with TrueCrypt is undistinguishable from random data and, as far as I know, is impossible to detect. Therefore, I decided to use the old, discontinued, but familiar TrueCrypt 7.1a (the last version that can still create new volumes). As far as I know, it is possible to find the header of a hidden volume, i.e. However, LUKS volumes are not hidden completely. The Tails developers recommend using LUKS-based cryptsetup utility to set up hidden volumes. I will suggest my own solution to ensure plausible deniability it is different from recommendations provided by the Tails developers. However, there is a problem: it does not deny the very existence of encrypted data plausibly enough. The persistent volume is already encrypted. └── file_c → /live/persistence/TailsData_unlocked/dotfiles/folder/subfolder/file_c ![]() ├── file_b → /live/persistence/TailsData_unlocked/dotfiles/folder/file_b ├── file_a → /live/persistence/TailsData_unlocked/dotfiles/file_a live/persistence/TailsData_unlocked/dotfilesĪccordingly, the link structure in the home directory will look as follows: /home/amnesia The last menu item, Dotfiles, allows creating a folder with files in the persistent volume links to these files will be created in the Tails home directory during the boot-up.īelow is an example of a file structure in the persistent volume. This makes it possible to load the required software during the boot-up. The programs won’t be saved after the shutdown, but you can configure Tails to save APT packages in the persistent volume. Tails is based on Debian therefore, the majority of required packages can be installed using the apt-get function. The APT Packages and APT Lists relate to the storage of APT packages. Most of the menu items are self-explanatory only the last three items need explanations. When the OS is loaded, plug in the second (main) flash drive and select Applications → Tails → Tails Installer → Install by Cloning. After that, you can boot the computer from the flash drive. Then unpack the downloaded image to the interim flash drive using Universal USB Installer. I recommend checking the image with OpenPGP immediately a detailed instruction is available on its website. The ISO can be downloaded from the official website. Why do you need two of them? To understand what is recursion, you need to understand what is recursion first… You can install Tails only with Tails. Two flash drives are required to install Tails. If you are concerned about the security of your data and about your privacy, never disregard any of them. The above principles supplement each other. Sensitive information must be stored on a securely encrypted storage device that is kept in a physically secure way the risk of a leak must be reduced to the minimum. Every trace in the RAM, on the hard drive, or even in the GPU memory must be thoroughly cleaned up. The Off-the-Record Messaging (OTR) cryptographic protocol and HMAC message authentication code (instead of the digital signature) will help. Make sure that the container has something that looks convincing enough to satisfy your chasers.ĭeniable authentication and information transition, revocable digital signatures, etc. Make sure whatever you reveal is not your real secret! Every hidden volume is nested in a standard container. Layered encryption and onion routing will help. You may need to hide your recipients as well as the data. Want to play plausible deniability? Hide the very fact that you have something stored or transmitted! Hidden containers make it possible.Ĭonceal destination. Not a single piece of data should be stored or transmitted in plain view.Ĭonceal information. Use multilayer encryption for some types of data. Protect it with strong encryption and secure cryptographic keys. The OS is based on the following principles: However, I believe it is the best choice for someone who wants to preserve their confidentiality, keep communications private, protect personal data, and hide important information from prying eyes. Tails is not the only Linux distribution focused on privacy protection. Tails on a portable flash drive can fully protect you from tracking furthermore, your privacy won’t be compromised even if your residence is searched! Tails is a security-focused, Debian-based Linux distribution made to ensure your privacy and anonymity. However, Tor alone cannot cover you up and hide your traces. No doubt, the Tor browser is an essential privacy protection tool.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |