Hands-On Deep Web Analysis. by Sion Retzkin
Author:Sion Retzkin [Sion Retzkin]
Language: eng
Format: epub
Tags: COM043000 - COMPUTERS / Networking / General, COM053000 - COMPUTERS / Security / General, COM060040 - COMPUTERS / Security / Online Safety and Privacy
Publisher: Packt
Published: 2018-12-26T09:04:31+00:00
But, even with all its security, privacy, and anonymity options, Tails has weaknesses.
For example (according to the Tails website documentation), note the following:
Tails does not protect against compromised hardware—meaning that if an attacker gains physical access to the computer you are running Tails from, it can be unsafe.
Tails can be compromised if installed on or plugged into untrusted systems—remember that you install or run Tails from a computer with its own OS. If that computer is compromised, this can lead to disruption of Tails' protective capabilities.
Tails does not protect against BIOS or firmware attacks—attacks that target the computer's BIOS or firmware aren't protected by Tails.
Tor exit nodes can eavesdrop on communications—the exit node, the last node in the Tor relay network, which connects to the destination server, is not encrypted, and this allows attackers to eavesdrop and capture the communication at that point. To protect yourself, it's recommended to use end-to-end encryption.
Tails makes it clear that you are using Tor and probably Tails—even though you're using Tails and Tor for connecting, which will make it harder to identify you, your ISP, local network admin, or destination server, can identify that you are using Tor.
Man-in-the-middle attacks—as I mentioned previously, the traffic between the exit node and the destination server is unencrypted, which allows attackers to perform a man-in-the-middle attack, where the attacker eavesdrops on the communication.
Confirmation attacks (also known as end-to-end correlation)—traffic entering or exiting the Tor network can be measured and analyzed, which can lead to identifying you.
Tails doesn't encrypt your documents by default—but, Tails ships with encryption tools, just for this purpose.
Tails doesn't clear the metadata of your documents for you and doesn't encrypt the subject and other headers of your encrypted email messages—but, Tails provides tools to anonymize your documents.
Tor doesn't protect you from a global adversary—a global adversary has the capability to monitor all traffic in a network simultaneously. Thus, they could potentially be able to perform statistical analysis on the traffic, to identify Tor circuits and then match the communication to destination servers.
Tails doesn't magically separate your different contextual identities—performing multiple actions in the same session is inadvisable, as Tor has a tendency to reuse the same circuits in a given session. Restarting Tails will make sure that you prevent this.
Tails doesn't make your passwords stronger—don't use weak passwords; need I say more?
Tails is a work in progress—as with all software in development, bugs or security flaws can occur.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6856)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6853)
Running Windows Containers on AWS by Marcio Morales(6379)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5077)
Combating Crime on the Dark Web by Nearchos Nearchou(4652)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4632)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4341)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3562)
Learn Wireshark by Lisa Bock(3544)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
