Difference between revisions of "Tails (operating system)"

From Conservapedia
Jump to: navigation, search
(External links: out of place)
 
(39 intermediate revisions by 8 users not shown)
Line 1: Line 1:
'''TAILS''' [[operating system]] ('''TAILS OS''') is short for '''The Amnestic Incognito Live System.''' It is actually a host of [[computer]] OS tools-utilities to help you remain [[anonymous]].  It runs on [[Linux]], but uses a nice [[GUI]] so you will have to click around in it to figure out how to do things.  It has a [[free software]] version of [[Microsoft Office]] called [[Open Office]].  For those of you already familiar with [[TOR]], TAILS also mates TOR with a read only [[DVD]] what we call a “live CD” or [[USB]] that boots and runs your system under a special secure and anonymous version of [[Debian]] Linux operating system called Amnestic.
+
'''Tails''' [[operating system]] ('''TAILS OS''') is short for '''The Amnestic Incognito Live System.''' It is actually a host of [[computer]] OS tools-utilities to help the user remain anonymous.  It runs on [[Linux]], it is a [[Fork (software)|fork]] of [[Debian]] and uses the [[GNOME]] [[GUI]] which is familiar to many.  It has a [[free software]] version of [[Microsoft Office]] called [[Open Office]].  It is based on [[Tor]], but Tails also mates Tor with a read only [[DVD]] called a “live CD” or [[USB]] that boots and runs the system under a special secure and anonymous version of [[Debian]] [[Linux]] operating system called Amnestic.
  
TAILS is basically a “throw away” operating system. One of the things that has been exposed, time and time again is that “…adversaries with global reach…” [[surveillance|track computer use]] in a myriad of ways.  Often they will put tracking [[cookies]] or markers on your computer, loaded from [[website]]s you visit.  There has been a documented case of this happening to [[James Wesley Rawles]]<ref>[[James Wesley Rawles]], [[American Redoubt]]: [[The Survival Blogs]] http://survivalblog.com/2012/03/important-message-from-jwr-the-fbis-cookie-caper-and-the-vpn-imperative.html Accessed December 6, 2014</ref> [[The Survival Blog]] users. These then “report back” everywhere you go on the [[Internet]].  This is one way TOR can be circumvented.  If your computer is already compromised (we call it “owned”) then nothing else you do can keep you secure.  Once they have a tracking cookie or [[trojan horse|hackware]] on your computer they can then build a very expansive history of your Internet activities.  TAILS goes a long way to preventing that.  [James Wesley Rawles suggestion on disabling cookies is “old school” and will not work against any decent [[hacker]], since half the time we don’t use cookies.  I have already showed that [[VPN]]s are only useful in protecting your [[anonymity]] if the VPN operator is willing to go to jail to for you.  They are not<ref>https://security.stackexchange.com/questions/39788/how-can-you-be-caught-using-private-vpn-when-theres-no-logs-about-who-you-are Accessed December 6, 2014</ref>. Here is the story of hacker named Cody Krestsinger known online as Recursion now in jailed and tracked down through the [[United Kingdom]] based HideMyAss VPN service because he defaced an [[FBI]] website.  Do not trust VPN services.  Part of the answer to this ungodly, [[unconstitutional]], [[unethical]] behavior is TAILS and [[TOR]].
+
Tails is basically a “throw away” operating system. One of the things that has been exposed, time and time again is that “…adversaries with global reach…” [[surveillance|track computer use]] in a myriad of ways.  With most operating systems, entities can put tracking [[cookies]] or markers on a computer, loaded from [[website]]s as the user visits them. These then “report back” everywhere the user go on the [[Internet]].  This is one way Tor can be circumvented.  If your computer is already compromised (we call it “owned”) then nothing else you do can keep you secure.  Once the entity has a tracking cookie, [[spyware]], or [[trojan horse|"hackware"]] on a computer, the entity can then build a very expansive history of the user's Internet activities.  Tails goes a long way to preventing that.  The traditional counter-measure is disabling cookies, but that will not work against any decent [[hacker]], since half the time hackers don’t use cookies.  While [[Virtual Private Network|VPN]] (Virtual Private Network) connections prevent interception of data during the transfer on the Internet, VPNs are only useful in protecting [[anonymity]] if the VPN operator is not hacked and is willing to resist government subpeonas.  They often are not.<ref>https://security.stackexchange.com/questions/39788/how-can-you-be-caught-using-private-vpn-when-theres-no-logs-about-who-you-are Accessed December 6, 2014</ref> For example, one hacker named Cody Krestsinger known online as Recursion was tracked down and jailed through the [[United Kingdom]] based HideMyAss VPN service because Krestsinger reportedly defaced an [[FBI]] website.   
  
TAILS is a “[[read only]]” operating system (OS) that works from a DVD.  This is criticalTAILS is booted from a read only DVD (your throw away media) and only operates in RAM, it does not interact with your [[hard drive]] at all, actually it is specifically prevented from doing so.  Thus when you power your machine down, every thing you do goes awayAnd this is important.  You must power down, and hopefully keep your computer out of anyone’s hands for at least 2 minutes (120 seconds).  We have become aware of a tactic where “adversaries” attempt to capture your computer quickly and then deep freeze the memory to try to later at the lab pull data (history, passwords other connections) from the RAM memory of the computer.  They call it a “Cold Boot Attack.”<ref>https://tails.boum.org/doc/advanced_topics/cold_boot_attacks/index.en.html Accessed December 6, 2014</ref> This is why they “rush in” to seize computer equipment some timesThis is why TAILS tries to protect you, but you must shut it down, and hopefully keep it out of their hands for 120 seconds while your RAM coolsTAILS Operating System does nearly every thing that is possible to remove any history of your activities.  It actively wipes RAM, it stores nothing.
+
Tails is a “[[read only]]” operating system (OS) that works from a DVD (or another external medium, such as a USB Drive), which is very importantTails is booted from a read-only DVD (throw away media) and only operates in RAM. It does not interact with the computer's [[hard drive]]—it is intentionally prevented from doing so.  Thus, when the machine is turned off, all of the user's activities disappearsThe user must power down, and hopefully keep the computer out of anyone’s hands for at least 2 minutes (120 seconds).  There is a tactic available in which “adversaries” attempt to capture a computer quickly and then deep freeze the memory to try to later at the lab pull data (history, passwords other connections) from the [[Random-access memory|RAM]] memory of the computer.  They call it a “Cold Boot Attack.”<ref>https://tails.boum.org/doc/advanced_topics/cold_boot_attacks/index.en.html Accessed December 6, 2014</ref> This is why they will sometimes “rush in” to seize computer equipment.  For this reason, Tails tries to protect the user, but they must shut it down, and hopefully keep it out of their hands for 120 seconds while the RAM resetsThe Tails Operating System does nearly every thing that is possible to remove any history of ones activities.  It actively wipes RAM, and permanently stores nothing.
  
One reason TAILS uses a bootable DVD, is that you can slip it into your work computer (or another computer), get on the Internet. You then can get on the Internet using [[Firefox]] with [[SSL Everywhere]], through TOR anonymous service and every other [[open source]] anonymity solution they can think of. Do what you need to do like post information that you want to share with [[American patriots]].  Then you “shutdown” your computer, TAILS will do every thing it can to wipe memory and it even automatically ejects the DVD to remind you to take it.  After you have done what you need to do, you can then boot back to your normal computer.  If you want to kick it up a level, shred the DVD with TAILS on it. That is why I call TAILS plastic gloves for Internet use.
+
One reason Tails uses a bootable DVD, is that a user can slip it into his work computer (or another computer), get on the Internet. The user can then access the Internet using [[Firefox]] with [[SSL Everywhere]], through Tor anonymous service and every other [[open source]] anonymity solution they can think of. When the user “shuts down” the computer, Tails will do every thing it can to wipe memory and it even automatically ejects the DVD.  After the anonymous session, the computer can be rebooted to operate normally with its hard drive.  
  
"TAILS was specifically designed after several major news outlets sources were burned because the government hacked into the reporters computers to find out who was sharing information with them.  “With Tails”, say the distro developers, “we provide a tongue and a pen protected by state-of-the-art [[cryptography]] to guarantee…basic [[human rights]] and allow [[journalist]]s worldwide to work and [[freedom of speech|communicate freely]] and without fear of reprisal.”  TAILS implements most open source technology that I know of to help you be as anonymous as possible. It has [[SSL Everywhere]], it uses a version of [[Firefox]] called [[Ice Weasel]].  It defaults to the use of TOR and allows the use of [[I2P]].  It is very careful not to use your computers hard drive for any thing and does everything in memory.  If you want to work with files, you must use a USB [[thumb drive]] to save them too. No system is perfect, just because you have plastic gloves doesn’t mean you don’t think about the 10 [[OPSEC]] Commandments, or all the other stuff we have shown you and add in all the stuff you already know (your own grey matter).  However again, we the [[American Redoubt]] IT guys (AmRD) are introducing the [[God]]-fearing [[Liberty]] forces to tools that you can use to fight your own Liberty Operation or communicate more anonymously."<ref>https://charlescarrollsociety.com/2014/02/12/amrd-t-a-i-l-s-plastic-gloves-for-your-computer-american-redoubt</ref>
+
==External links==
 
+
* [https://tails.boum.org Tails - Privacy for anyone anywhere]
 
+
==Quotes on the Needs for Tails OS due to Unconstitutional Police State Surveillance ==
+
* "The progress of [[science]] in furnishing the [[big government|government]] with means of [[espionage]] is not likely to stop with wire tapping. Ways may some day be developed by which the [[Police state|government]], without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a [[jury]] the most intimate occurrences of the home. Advances in the psychic and related sciences may bring means of exploring unexpressed beliefs, thoughts and emotions. 'That places the [[liberty]] of every man in the hands of every [[tyrant|petty officer]]' was said by James Otis of much lesser intrusions than these. 1 To Lord Camden a far slighter intrusion seemed '[[subversive]] of all the comforts of society.' Can it be that the [[Constitution]] affords no protection against such invasions of [[Fourth Amendment|individual security]]?"
+
** [[Louis Brandeis]]'''  (1856-1941), [[United States Supreme Court]] [[Associate Justice]] Dissenting, ''[[Olmstead v. United States]]'', 277 U.S. 438 (1928).
+
 
+
 
+
==See Also==
+
* '''[[Censorship]]:'''  [[Tools of censorship]], [[Censorability]], [[Fairness Doctrine]], [[Liberal censorship]], [[Media censorship]]
+
----
+
* '''The Perpetual War:''' [[War on Drugs]], [[War on Terror]] and the [[Police state]]
+
* '''[[Mass surveillance]]''' by [[NSA]] and other [[Intelligence agency]], [[Computer surveillance]], [[Eavesdropping]], [[Wiretap]] - [[Roving wiretap]]: [[PRISM]], [[Foreign Intelligence Surveillance Act]] of the [[Foreign Intelligence Surveillance Court]] and the [[NSA warrantless surveillance controversy]], [[National security letter]], [[Patriot Act]], [[NDAA]], [[Spyware]]
+
* '''[[Asset forfeiture]]''' - [[Confiscation]] for [[Police]] [[budget deficit]] via [[RICO]]
+
* '''[[Mililtarization of police]]:''' [[SWAT]] and [[Pre-dawn raid|Pre-dawn]] [[No-knock raid]]s, [[Sneak and peek warrant]]
+
* [[Drug trafficking]] of the [[Drug cartel]]s, [[Gangs]], [[Drug dealer]]s, [[Hollywood values]] - [[Fashion industry values]] - [[Public school values]] - [[Professor values]]
+
* [[Wikileaks]] and [[Julian Assange]] - [[Australia]]n [[leftist]] [[hacker]]
+
* [[Bradley Manning]] - [[Homosexual]] [[Hacker]] [[Traitor]] of [[State secret]]s
+
* '''[[Social media]]:''' Facebook, Twitter, [[Google Plus]], Youtube, [[Yahoo]]
+
* '''[[Big government]]''' [[ObamaCare]]-[[Common Core]]-[[Social Security]] [[Welfare state]] leads to [[Nanny state]], leads to '''[[Police state]]''': [[Globalist]]-[[Statist]]-[[Socialist]]-[[National Socialist]]-[[Communist]]
+
* [[Liberal totalitarianism]]
+
 
+
 
+
'''Contrast with:'''
+
 
+
* '''[[Security]] [[Software]] and [[Security-focused operating systems]]''' to protect [[unalienable rights|unalienable]] [[Fifth Amendment]] - [[Fourth Amendment]] [[Right to Privacy]] ([[Internet privacy]], [[Information privacy]], [[Expectation of privacy]]) and [[Second Amendment]] - [[First Amendment]] ([[Freedom of information]] and [[Political freedom]]) rights against [[unconstitutional]] [[Gun control]] - [[Internet censorship]] [[Big government]] [[Police state]], [[hackers]], and "[[5 U.S.C. § 3331|all enemies, foreign and domestic]]" of [[American values|American]] [[liberty]].
+
** '''[[Tails (operating system)]]''' ([[Linux]]-based) and [[Tor (anonymity network)]] [[Firefox]] [[browser]] [[HTTPS Everywhere]] [[encryption]] for [[Internet]] [[anonymity]]
+
** '''[[Prism-break.org]]''': Opt out of global data [[surveillance]] programs like [[PRISM]], [[ECHELON]], [[XKeyscore]] and [[Tempora]].<ref>"Help make [[mass surveillance]] of entire populations uneconomical! We all have an [[unalienable right]] to [[privacy]], which you can exercise today by [[encrypting]] your communications and ending your reliance on proprietary products and services."</ref>
+
** '''[[Open source]] [[Free software]]''' not over-priced tracking by [[Microsoft]]-[[Apple]]-[[Google]]-[[Android]]
+
* '''[[Privacy search engines]]: [[Duck Duck Go]]''' and [[Ixquick]]: [[Privacy]]-oriented [[Search engine]]s instead of tracking by [[Google]], [[Yahoo]] and [[Bing]]
+
* '''[[Internet anonymity]] - [[Right to be forgotten]] [[Pseudonymity]]''' ([[Pseudonym]]) using [[Anonymous web browsing]] with [[Tails]] and [[VPN]] ([[Virtual Private Network]]), [[HMA]], [[OpenVPN]] and [[IPsec]] , [[Proxy server]]s, [[Anonymizer]] ([[Anonymous proxies]])
+
** '''[[Mozilla Firefox]]''' with [[Browser extension]]s instead of [[Microsoft]] [[Internet Explorer]], [[Google Chrome]], [[Safari (web browser)]] and [[Opera (web browser)]]
+
** '''[[Browser security]]''' via [[HTTPS Everywhere]] ([[HTTPS]] ([[HTTP Secure]]) instead of [[Plaintext]] ([[Cleartext]]) [[HTTP]]; and [[NoScript]] to stop [[JavaScript]]
+
** '''[[Ad filtering]]''' ([[Privacy mode]] and [[Adblock Plus]] or [[Ghostery]]) to stop [[Ad Tracking]] - [[Website visitor tracking]] via [[Geolocation]], [[Geotargeting]], [[Personally identifiable information]] and [[Device fingerprint]]s
+
* '''[[Internet safety]], [[Computer security]] via [[Password strength]] and [[Password manager]]s''' via [[KeePass]] or [[LastPass]] and [[Antivirus]]-[[Firewall]]
+
* '''[[Secure communication]]:'''
+
** '''[[E-mail privacy]] and [[Email encryption]]:''' [[Claws Mail]] or [[Enigmail]] or [[Kontact]] using [[Hushmail]] or [[MyKolab]], [[Anonymous remailer]], instead of tracking by [[Microsoft Outlook]], [[Mozilla Thunderbird]] using [[Yahoo! Mail]], [[Gmail]] [[iCloud]]
+
** ''''[[Secure messaging]] and [[Off-the-Record Messaging]] via [[I2P]]'''' [[Instant messaging]], [[Cryptocat]], [[Bitmessage]] instead of [[Skype]], [[Yahoo! Messenger]], [[Internet Relay Chat]], [[Google Plus]], Facebook
+
** ''''[[Silent Phone]] with ][[Silent Circle]]'''' instead of [[Android]] or [[iPhone]] [[Smartphone]]
+
* [[Encryption]]: [[Encryption software]], [[Disk encryption software]], [[LUKS]] or [[TrueCrypt]] instead of [[Microsoft]] [[BitLocker]],  [[PGP]] and [[GNU Privacy Guard]], [[Data encryption]], [[Public-key encryption]], [[Cryptography]]-[[Cryptanalysis]]-[[Cryptology]]-[[Steganography]]
+
* [[Peer-to-peer]]: [[Sneakernet]], [[Friend-to-friend]], [[Darknet (file sharing)]], [[Anonymous P2P]] instead of [[BitTorrent]]
+
* [[Deep Web]] - [[Dark Internet]]: [[Tor]], [[AmRD]], [[Tor2web]], [[The Hidden Wiki]], [[Anonymous blog]]
+
* [[Alternative currency]]-[[Cryptocurrency]]-[[Virtual currency]]-[[Digital currency]]: [[Bitcoin]] and [[Hard money]]-[[Precious metals]]-[[Tangibles]] versus [[Credit cards]] and [[inflation]]-prone [[Dollar (U.S.)|U.S. Dolars]]: [[Federal Reserve System]]'s [[Keynesian economics]] [[Ponzi scheme]] of [[Quantitative easing]]-[[Debt monetization]] [[devaluation]] of [[Fiat currency]] through [[Money supply]]-[[Treasury bill]]s bought mostly by [[China]] and [[Japan]]
+
----
+
* [[Electronic Frontier Foundation]]
+
* [[Hologram of Liberty]] - The Constitution's Shocking Alliance With Big Government by [[Boston T. Party]] - [[Kenneth W. Royce]]
+
* [[One Nation, Under Surveillance - Privacy From the Watchful Eye]] by [[Boston T. Party]]
+
* [[How to Be Invisible]] - Protect Your Home, Your Children, Your Assets, and Your Life, by [[J. J. Luna]]
+
* [[Electronic Communications Privacy Act]] of 1986
+
* [[Privacy Act of 1974]]
+
* [[Edward J. Snowden]] revelations of [[unconstitutional]] domestic spying on law-abiding [[American]] [[citizen]]s; [[GlobaLeaks]]
+
----
+
* [[Crypto-libertarianism]]: [[Conservative values]], [[American values]] - [[Small town values]] of [[Limited government]], [[American Patriots]] and [[Bill of Rights]] [[liberty]]
+
* [[Capitalism]] and [[Free enterprise]]
+
* [[Family values]] and [[Parental rights]]: [[Sanctity of life]], [[Family]]-[[Marriage]], [[Homeschooling]] teaching [[Virtue]], [[Duty]], and [[Self-reliance]]
+
  
 
==References==
 
==References==
 
{{reflist|2}}  
 
{{reflist|2}}  
 
 
==External Links==
 
* https://charlescarrollsociety.com/2013/06/10/prism-yes-they-can
 
* https://charlescarrollsociety.com/2013/05/06/memo-to-the-police-state-progressives-please-let-his-people-go
 
* https://charlescarrollsociety.com/2012/09/15/no-knock-raid-a-great-video
 
* https://charlescarrollsociety.com/2014/02/12/amrd-t-a-i-l-s-plastic-gloves-for-your-computer-american-redoubt - [[Tails operating system]]
 
* https://charlescarrollsociety.com/2014/01/29/amrd-introducing-the-tor-browser-bundle/ - [[Tor browser]]
 
* https://prism-break.org/en - "Opt out of global data surveillance programs like [[PRISM]], [[XKeyscore]] and [[Tempora]]."<ref>"Help make [[mass surveillance]] of entire populations uneconomical. We all have a [[right to privacy]], which you can exercise today by [[encrypt]]ing your communications and ending your reliance on proprietary services."</ref>
 
* https://www.eff.org - "Leading the fight against the [[NSA]]'s illegal [[mass surveillance]] program"<ref>"Organization formed in 1990 to maintain and enhance intellectual freedom, privacy, and other values of civil liberties and democracy in networked communications. Publishes newsletters, Internet Guidebooks and other documents, provides mailing lists and other online forums, and hosts a large electronic document archive. Contact: info@eff.org. 454 Shotwell Street, San Francisco, CA 94110-1914. Tel: (415) 436-9333. Fax: (415) 436-9993. Executive Director: Sheryl Steele."</ref>
 
* https://www.eff.org/secure-messaging-scorecard
 
* http://justdelete.me
 
* http://lifehacker.com/just-delete-me-is-a-massive-list-of-links-to-close-all-1245040101
 
* [http://epic.org/privacy/privacy_resources_faq.html Online Guide to Privacy Resources]<ref>"EPIC was established in 1994 to focus public attention on emerging privacy issues relating to the National Information Infrastructure, such as the Clipper Chip, the Digital Telephony proposal, medical records privacy and the sale of consumer data. EPIC conducts litigation, sponsors conferences, produces reports, publishes the EPIC Alert and leads campaigns on privacy issues. For more information email: epic-info@epic.org, or contact EPIC, 1718 Connecticut Avenue, NW, Suite 200, Washington, DC 20009. Tel: (202) 483-1140. Executive Director: Marc Rotenberg."</ref>
 
* http://www.nocards.org - [[Coalition Against Unsolicited Commercial Email]]<ref>"CAUCE is an all volunteer, entirely web-based organization, created by Netizens to advocate for a legislative solution to the problem of UCE (spam). CAUCE began as a discussion group called SPAM-LAW, formed of members who felt that legislation was necessary to stop spam from choking the life out of the Internet. In 1997 CAUCE proposed an amendment to the Federal statute which outlaws junk "faxes" (47 USC 227) to also prohibit junk e-mail, and since then has remained a pre-eminent voice in the anti-spam community. Email: comments@cauce.org. President: Edward Cherlin."</ref>
 
 
 
==References==
 
{{reflist|2}}
 
 
 
  
 
[[Category:Linux]]
 
[[Category:Linux]]
 
[[Category:Open Source]]
 
[[Category:Open Source]]
[[Category:Operating Systems]]
+
[[Category:Computer Security]]
[[Category:Police State]]
+
[[Category:Cryptography]]
+
[[Category:Survivalism]]
+
[[Category:First Amendment]]
+
[[Category:Fourth Amendment]]
+
[[Category:Espionage]]
+
[[Category:Technology]]
+
[[Category:Internet]]
+
[[Category:Information technology]]
+

Latest revision as of 08:20, December 27, 2018

Tails operating system (TAILS OS) is short for The Amnestic Incognito Live System. It is actually a host of computer OS tools-utilities to help the user remain anonymous. It runs on Linux, it is a fork of Debian and uses the GNOME GUI which is familiar to many. It has a free software version of Microsoft Office called Open Office. It is based on Tor, but Tails also mates Tor with a read only DVD called a “live CD” or USB that boots and runs the system under a special secure and anonymous version of Debian Linux operating system called Amnestic.

Tails is basically a “throw away” operating system. One of the things that has been exposed, time and time again is that “…adversaries with global reach…” track computer use in a myriad of ways. With most operating systems, entities can put tracking cookies or markers on a computer, loaded from websites as the user visits them. These then “report back” everywhere the user go on the Internet. This is one way Tor can be circumvented. If your computer is already compromised (we call it “owned”) then nothing else you do can keep you secure. Once the entity has a tracking cookie, spyware, or "hackware" on a computer, the entity can then build a very expansive history of the user's Internet activities. Tails goes a long way to preventing that. The traditional counter-measure is disabling cookies, but that will not work against any decent hacker, since half the time hackers don’t use cookies. While VPN (Virtual Private Network) connections prevent interception of data during the transfer on the Internet, VPNs are only useful in protecting anonymity if the VPN operator is not hacked and is willing to resist government subpeonas. They often are not.[1] For example, one hacker named Cody Krestsinger known online as Recursion was tracked down and jailed through the United Kingdom based HideMyAss VPN service because Krestsinger reportedly defaced an FBI website.

Tails is a “read only” operating system (OS) that works from a DVD (or another external medium, such as a USB Drive), which is very important. Tails is booted from a read-only DVD (throw away media) and only operates in RAM. It does not interact with the computer's hard drive—it is intentionally prevented from doing so. Thus, when the machine is turned off, all of the user's activities disappears. The user must power down, and hopefully keep the computer out of anyone’s hands for at least 2 minutes (120 seconds). There is a tactic available in which “adversaries” attempt to capture a computer quickly and then deep freeze the memory to try to later at the lab pull data (history, passwords other connections) from the RAM memory of the computer. They call it a “Cold Boot Attack.”[2] This is why they will sometimes “rush in” to seize computer equipment. For this reason, Tails tries to protect the user, but they must shut it down, and hopefully keep it out of their hands for 120 seconds while the RAM resets. The Tails Operating System does nearly every thing that is possible to remove any history of ones activities. It actively wipes RAM, and permanently stores nothing.

One reason Tails uses a bootable DVD, is that a user can slip it into his work computer (or another computer), get on the Internet. The user can then access the Internet using Firefox with SSL Everywhere, through Tor anonymous service and every other open source anonymity solution they can think of. When the user “shuts down” the computer, Tails will do every thing it can to wipe memory and it even automatically ejects the DVD. After the anonymous session, the computer can be rebooted to operate normally with its hard drive.

External links

References