Exploring The DarkNET: Tails OS & Whonix - DREADfull!

แชร์
ฝัง
  • เผยแพร่เมื่อ 23 ธ.ค. 2024

ความคิดเห็น • 9

  • @cryptomac6665
    @cryptomac6665 ปีที่แล้ว +1

    Is it bad idea to boot tails of a external ssd? Does it mess with the amnesiac features?

    • @itbemeeeegs8776
      @itbemeeeegs8776 ปีที่แล้ว +1

      hitchhiker's guide says "I do not recommend using external SSDs due to the uncertainty about
      their support for Trim, ATA Secure Erase, and Sanitize options through
      USB controllers. Instead, we recommend using external HDD disks
      which can be cleaned/wiped safely and securely without hassle (albeit
      much slower than SSD drives)."

    • @techheart6090
      @techheart6090  ปีที่แล้ว

      Great answer - another, from the Tails OS documentation, is found in 'Hardware requirements':
      A USB stick of 8 GB minimum or a recordable DVD.
      The ability to start from a USB stick or DVD reader.
      The main reason is we want to preserve the amnesic features of Tails - using an SSD, or even HDD, would write data that might not be removed when you shutdown Tails - or worse, when you simply unplug that external drive.
      TechHeart suggests using a USB stick 8GB+, or a recordable DVD, to install Tails OS to. :P

  • @DoomCatcher
    @DoomCatcher ปีที่แล้ว

    Which do you recommend out of tails and whoinix and why?

    • @techheart6090
      @techheart6090  ปีที่แล้ว +1

      So I personally prefer Tails OS, because it leaves no traces... but Whonix can be trusted if you prefer accessing the DarkNet from within your OS/computer. Whonix would allow you to save information easier, and more robustly, than Tails OS - but Tails offers more protections if you need them; pull the USB to erase system/memory, fully amnesic each reboot, etc.
      My real suggestion is *either* are fine if your not using a DNM - if you're doing that, I'd lean on Tails OS.
      Don't forget the option I didn't cover - Qubes OS. It's much more technical, would need a computer to install on and can run Whonix inside of it too... maybe I'll cover Qubes in the future.

  • @mikemaldanado6015
    @mikemaldanado6015 ปีที่แล้ว

    Whonix with kvm on a hardened linux box. Tails OS reveals your real ip to your isp before entering the onion, whonix torifies your machine before going out to the internet. Tor browser as a last resort.

    • @techheart6090
      @techheart6090  ปีที่แล้ว

      Well, at that point you can also just run a gateway FOR your Tails OS instance. Great point, but my 'threat level' doesn't require hiding from my ISP... also, you can use a proxy and bridge to mitigate... you prefer Whonix, as a whole, over Tails then??? Thanks for the comments - what topics you want covered - I'm ready to make videos!!

    • @mikemaldanado6015
      @mikemaldanado6015 ปีที่แล้ว

      @@techheart6090 A lot of people think using a tor bridge hides their activity from their isp, it doesn't. Read the tor site. I was surprised as well. As for me i live in a corrupt south american country and the isp's have a list of people that use tor. Germany does the same thing. Our threat models differ. Another thing that makes whonix with kvm great is that it runs natively on your hardware and it's works as quick as your base OS.

    • @Rashidun
      @Rashidun 9 หลายเดือนก่อน

      @@techheart6090 Thank you very much for the video bro. Please I have a question, He said on his comment that whonix hides IP from ISP, but is hiding the IP of our computer relevant since the ISP can know the IP of our router (Is it this way : Workstation --> Gateway ---> Router/modem ----> ISP) if it works this way, then the ISP will still know the IP of the Router/modem isn't it right ?