In all seriousness, I do so because I might want to work on something but don't always want to drag the laptop with me. Edit: it's also the same Debian I run daily.
Having the stick on a keyring, is a unnecessary risk. You most likely have other items attached on the ring that can tie you to the stick. You also can’t easily throw it away in case of emergency.
A genuine, aboveboard use for Tails is to store an airgapped master GPG key. 99% of the use of your keypair is mundane stuff like encryption and SSH auth. The remaining 1%, stuff like generating revocation certificates, signing new keys, etc. is extremely dangerous in the wrong hands: if an adversary gets this power, not only can he decrypt your past messages and impersonate you, he can generate a new key, sign it, and issue a new revocation cert---carring on all your previous correspondence with the new key, without you even able to see what he's doing. So, people have thought: what if we separate the functionality, and only access the spooky stuff in a hyper-secure, airgapped (preferrably Faraday-caged), schizophrenic environment? This is exactly what people do, using the encrypted persistent filesystem of Tails to store a master key, from which mundane subkeys can be exported (offline, via a storage medium) to a less secure working environment. Tails goes to great lengths to ensure that data in memory doesn't persist after shutdown, which is exactly what you want here. I'm working with this setup, except with another LiveUSB distro since I trust the relatively-less-audited distro more than the Intel Management Engine.
I'll never forget watching the bodycam footage of one of two detectives unplugging the live USB on a system they were investigating, which was originally active. Part of me thinks that they knew exactly what they were doing lol.
Don't live environments copy to RAM while running? At least that's how they worked back in the live CD days. So unplugging wouldn't be an issue unless they also powered down?
Yoooo thanks for the tutorial! Surprised I got here this early lol. Since i know youll see this lemme just say appreciate the videos you put out! Using your platform to raise privacy awareness (and gawk at the transgressions against it) is truly a noble cause.
privacy advocate: "I'm going to look at and review Tails to see how well it blocks ScAmazon cookies" glowies: "OMG HE CLICKED THE HOMEPAGE! HE CLICKED THE HOMEPAGE!"
@@platinumsun4632 Simply using a searching engine to look up Tails on the web apparently triggers the NSA XKeyscore system. Source Wikipedia : In 2014 Das Erste reported that the NSA's XKeyscore surveillance system sets threat definitions for people who search for Tails using a search engine or visit the Tails website. A comment in XKeyscore's source code calls Tails "a comsec mechanism advocated by extremists on extremist forums".[22][23] In the same year, Der Spiegel published slides from an internal National Security Agency presentation dating to June 2012, in which the NSA deemed Tails on its own as a "major threat" to its mission and in conjunction with other privacy tools as "catastrophic".[24][25] In 2017, the FBI used malicious code developed by Facebook, identifying sexual extortionist and Tails user Buster Hernandez through a zero-day vulnerability in the default video player. The exploit was never explained to or discovered by the Tails developers, but it is believed that the vulnerability was patched in a later release of Tails. Hernandez had eluded authorities for a long time; the FBI and Facebook had searched for him with no success, and resorted to developing the custom hacking tool.
@@rusi6219 If you click on a guide for paranoid people, expect paranoid people to be present. Also, don't just reply negatively, completely unprovoked.
using tails for like past 10 years, mostly for getting over protection on machines that are blocked or I lack admin priviledges, I simply boot up a tails form usb and I'm in, literally I used it to go over password windows 11. amazing OS.
you can do that with every live OS though. MX Linux is best for such scenarios. Coming with a lot off tools to manage and recover your system. You can even install the tools you need and create another live image out of it.
Something I'd like to see in Tails is adding an option for the encrypted persistent storage is an easy ability to add a doomsday password alongside the encryption password so that if the wrong password is entered the LUKS headers will be destroyed also an option to destroy the data after a set amount of failed password attempts.
I've done a set of operations via "Tails" and I can recommend it. It's fast,simple and it'a a low threshold for normies who are concerned with their online privacy. P.S.: I'm proud of you. No sarcasm. You're doing something important to all of us.
@@iamerror1699 It's because of ignorant people like you our rights are being slowly chipped off. You allow them to press on by doing nothing. One day you'll wake up without any human nor civil rights and then you'll wonder how the fuck could that happen.
@@iamerror1699Just because you care about privacy doesn’t mean you’re a terrorist. That logic makes absolutely no sense. People have a right to privacy. Also, if that’s true, why are you here?
@@iamerror1699 First off, nice not answering my question. Second off, did you read my reply? People have a right to privacy. I do nothing illegal online or offline, but that doesn’t mean I don’t value my privacy. Does that make me a terrorist?? Is that what society has come to?
XFCE would be a lot more popular if just they made it better looking with default settings.. i guess people don't use it because they don't know how cool it looks once you tweak it a little bit
I recommend a micro sd card and mini reader. It is much smaller, easier to conceal/dispose/destroy. I recommend the cheap Chinese ones that are notorious for corrupting after a few months, you can get a 3 pack of 16gb for like $10. If you go this route, and use it as a daily driver, remove any storage media/hard drives from your laptop for extra peace of mind that once a card is out, the data is gone.
I love videos titles on this channel that talk about "the ULTRA Paranoid". What's that famous saying, "Just because you're paranoids doesn't mean they aren't out to get you". Enough said.
All I'm saying is how you got my facial expressions??? Literally just was caught on the toilet and that was my exact face and pointing lol. I'm subbed on several channels because you taught me everything literally so thank you.
The great thing about torrents is that the magnet link contains the Merkle tree root hash, so you don't even need to verify the signature on the downloaded image (assuming you trust that your torrent client isn't compromised itself, you still want to verify that in general regardless of what you're downloading)
@@xCwieCHRISxReal ultra paranoids know that a pen and paper is compromised. Everyone knows the glowies have had control over the visible world, projecting their holograms with these new 5G towers. Real security oriented individuals keep everything’s stored in their mind, where it’s safe from the glowies.
Also, ALWAYS use Bridged mode inside Tor Browser, this way your ISP won't know that you're connecting to the Onion services, since the Bridged mode is supposed to bypass any restrictions in countries where Tor is banned. Even if it's not banned inside your country, always use it.
Bridge relays are Tor relays that are not listed in the public Tor directory. That means that ISPs or governments trying to block access to the Tor network can't simply block all bridges. Bridges are useful for Tor users under oppressive regimes, and for people who want an extra layer of security because they're worried somebody will recognize that they are contacting a public Tor relay IP address.@@nettlex
There are lots of sensationalist rumors and very little substantive evidence about the use of IME or PSP for "spying". First of all, most of the vulnerabilities that have been found in these systems are not exploitable remotely. And the one known vulnerability that was only worked on machines that had remote management (AMT) enabled, which is typically not the case for retail computers. It also wouldn't work if the computer is unreachable from the Internet because it's behind a NAT router and/or firewall (which should always be the case if possible). Second, the NSA can't do magic and transmit data through thin air. If they were spying and exfiltrating information via IME/PSP, you would be able to see the packet flow on your network using packet capture tools. Yet nobody has ever found anything like that to my knowledge.@@Jostradamus2033
You might be surprised how far Linux has closed that gap in just the past couple of years...especially it's compatibility with NVidia drivers now. I honestly pulled my hair out the past decade but we're just about there now. PoP_OS on laptops w/ hybrid graphics...Arch or Mint/Ubuntu on your home desktop!! 😮
Yeah, linux users will try to convince you that Linux is as good as windows for gamers, it's not. Driver problems, compatibility problems, input lag problems, performance problems. I don't know if it's resignation, but at least now that I can't play on my pc because I'm trying Linux I have more time to do other things haha
Just a heads-up, if you're using tails and the tor browser for legitimate purposes only, make sure you don't change the window size or location of the tor browser, as that will help fingerprint you, as you will stick out if you stray from the defaults 🙂.
Mental Outlaw, you’re doing God’s work here; teaching the technologically illiterate (like me) how to maintain a proper security profile when using the internet. Also thanks for the cute/interesting farm and cooking vids, gives me something to watch during lunch break 😂
The MIT PGP key server doesn't have to be breached. The attacker can just upload it with another domain name, and make the one on the breached Tails site match that.
I use Tails to avoid downloading malware from darknet sites onto my actual OS when getting textbooks for school. If anyone has a better alternative drop a reply please. :3
There are surely safer sources for textbooks since I recall that sites get shared on social media often wherever college age people mingle, and all different kinds of ebooks come up on collections like r/ opendirectories. Dunno the specifics though since I dislike digital copies.
watched 10 min of this for pure entertainment purposes even though i will continue to be tracked on my arch machine that is signed into google. we can’t win them all
Tails is needed if you want to create pgp keys securely, verifying it with the tails developer's key is absolutely necessary to ensure integrity of the image. Tails has a lot of uses where secure airgapped systems are needed.
as far as opsec goes, isn’t watching this videos signed in to a google account enough to make you watched anyways? let alone posting this type of content. brave soul.
@@duckmeat4674 But that's suspicious, you have to keep a fake vanilla looking online identity for them to track while also having your untracked activity.
If this is enough, using Tor will be enough as well... If you therefore opt to connect over a bridge - the "fake" IP would just as well put you on a list... Let alone your ISP never seing a single website you access even though you consume bandwith daily would be sus af... If you want your activity to be hidden from glowies, you'll have to accept looking 'out of the ordinary' from the outside... ...which will - at least by your standard set in this comment - put you on a list already... 🤷♂🤷♂
@@Luckyluckyluc i’ve embraced that concept, i just find a lot of contradictions in the online security world. i’m going to school for chemistry, in order to participate in online discourse on reddit and such, you kinda have to accept you have the DEA’s attention.
I remember the day tails was included on a computer magazine in Germany mainly for looking like windows xp in stealth mode. That was legit cool feature. Also bonus idk who said it there are no lists the NSA just has enough resources to scan everything.
TAILS used to consider downloaded ISOs compromised, and they used to have you download it from TAILS and install it that way. So what you'd have to do, was download and burn the ISO onto a flash drive and then install it to another flash drive. I don't know what happened, and why they don't have you do that anymore.
Paranoid was a word created by such people to make morons like you let your guard down so you arent le paranoid (aware of your surroundings or of whats going on)
Your point about not going to tails on the clear net made me realize I’ve already ruined my OpSec by even watching your channel 😂 You should put a warning to use a vpn when watching your channel on the main page video.. could even drive up some hype around the channel
i love the Mr Robot scene, and I would just use SSD rather then hard drive since hard drive are so difficult to destroy compared to SSD. and I'll see if i can put Tails os on a Micro SD card seems like a fun idea to try. i am going to watch Mr robot.
The only feature that's missing is a nuke password for us that need persistence. If you use the nuke password instead of the real one and everything's erased.
Only you and Google know that you're watching this video if you're using https protocol, your ISP only sees the server you're connected to not the data being transferred
There are lots of sensationalist rumors and very little substantive evidence about the use of IME or PSP for "spying". First of all, most of the vulnerabilities that have been found in these systems are not exploitable remotely. And the one known vulnerability that was only worked on machines that had remote management (AMT) enabled, which is typically not the case for retail computers. It also wouldn't work if the computer is unreachable from the Internet because it's behind a NAT router and/or firewall (which should always be the case if possible). Second, the NSA can't do magic and transmit data through thin air. If they were spying and exfiltrating information via IME/PSP, you would be able to see the packet flow on your network using packet capture tools. Yet nobody has ever found anything like that to my knowledge.
Was reading TailsOS guides just a couple hours before you uploaded this. Can you hear my thoughts MentalOutlaw? Perhaps we can get a video on preventing psychic leakage/ tin foil hat etiquette for the ultra-ultra-paranoid?
Does TailsOS do data wipe on the target drive? If my totally legitimate and mundane USB stick is stolen by an adversary, they could possibly recover some identifying files that have been stored on the disk prior to installation of TailsOS. Should I use DBAN or something similar before installing?
@@Luckyluckyluc If they figure out what blur filter you used, they can simply use it on all possible combinations and use some image matching software or AI to figure an exact match. In other words which of all possible blurred codes looks exactly like his. That takes a lot of effort but it probably is possible
I live in brazil and they trying to intercept everything we do in the internet (just like any gov party around the world), if i use correctly tails or whonix may i still be safe from those things? or can they track me via the isp provider and they see tor relays on my ip?
You were expecting a monero wallet? Lol. Good video, thanks for the content. Here's some text to boost it. You could zoom in the command line window to make it easier to read when you use dd. I remember Luke had some keystroke pop-up in his videos, but I don't remember what app he used. (Guess it doesn't matter when it's a fresh install) Oh, you could also talk about why to or not to use tails on a VM instead in another video.
If you do not want to get noticed during Tails download, Torrent is literally THE WORST way xD Every other torrent participant knows your IP is downloading this torrent. Every ISP of those participant also knows. I mean, this is how "movie studios" know their film is being pirated, and by whom. They just listen on Torrent peers and then send "Copyright Violation" emails to ISP's with detailed date, time and IP. I know because i receive tons of those mails every day :D
@@assamtea1no, because someone finds a flaw and is reported. Imagine you open a blueprint of a bank vault to the public. Everytime someone in the public finds a fault, the developers can fix that issue asap.
@@assamtea1 Why do you think open source would make it easier lol? All good spyware is always obfuscated one way or another, having closed source code is perfect to avoid detection of dependency chain attack.
That's not how any of this works, a compiled binary is a compiled binary regardless of the availability of the source code. Being Open Source however means that anyone with enough knowledge can audit the code, while with a closed source software it is a pain to analyze and verify.
I enjoy using this OS for legitimate and mundane purposes 👍
Yo whats good barack hows mike
@@Danny-ll1iwhe is the love of my life
you're a gay icon, barack
Obama care stinks
Who doesn't enjoy staring at pictures of onion fields for enjoyment
as someone who carries a live USB on my keyring for totally legit and mundane reasons, thanks.
In all seriousness, I do so because I might want to work on something but don't always want to drag the laptop with me.
Edit: it's also the same Debian I run daily.
@@Sasha-zw9ssI mean that's a legitimate reason 🤷
in complete, unmistakeable sincerity, in all seriousness, I too, have a live USB for which I use to do legitimate and completely LEGAL things
I do too, but I just have the USB with Ubuntu for simple Linux stuff
Having the stick on a keyring, is a unnecessary risk.
You most likely have other items attached on the ring that can tie you to the stick. You also can’t easily throw it away in case of emergency.
Watching Mental Outlaw videos definitely increases your chance of being put on a list tbh 😅
Definitely avoid those yt documentaries about teddy cabininthewoodsky.......
The list of people who are based?
At this point I believe it's just "the" list.
True. Tails comes directly from the regime.
@@MrBelles104Moon, too would probably put you on a list
Thank god im schizotypical and not schizophrenic
i thought that said "schizotypal" and questioned how exactly you'd be in the clear from paranoia then, lmfao. schizotypical is hilarious
^I did too, it's a pretty clever joke.
A genuine, aboveboard use for Tails is to store an airgapped master GPG key.
99% of the use of your keypair is mundane stuff like encryption and SSH auth. The remaining 1%, stuff like generating revocation certificates, signing new keys, etc. is extremely dangerous in the wrong hands: if an adversary gets this power, not only can he decrypt your past messages and impersonate you, he can generate a new key, sign it, and issue a new revocation cert---carring on all your previous correspondence with the new key, without you even able to see what he's doing.
So, people have thought: what if we separate the functionality, and only access the spooky stuff in a hyper-secure, airgapped (preferrably Faraday-caged), schizophrenic environment? This is exactly what people do, using the encrypted persistent filesystem of Tails to store a master key, from which mundane subkeys can be exported (offline, via a storage medium) to a less secure working environment. Tails goes to great lengths to ensure that data in memory doesn't persist after shutdown, which is exactly what you want here. I'm working with this setup, except with another LiveUSB distro since I trust the relatively-less-audited distro more than the Intel Management Engine.
nice pfp
What?
Truth in Security and privacy. I will be dead one day, collect the metadata, not worth my time or efforts. However more power to you, I get it!
Could you explain the last sentence in a little bit more detail?
What do distros or operating systems have to do with Intel ME? ME is a firmware thing, how does using a different distro/OS will secure it?
Finally. Gimmie some of that SchizOS
I need a real ScizOS now
@@WarningStrangerDanger TempleOS
@@cheetochinpo😂😂😂😂
@@bckends_ damn
I'll never forget watching the bodycam footage of one of two detectives unplugging the live USB on a system they were investigating, which was originally active. Part of me thinks that they knew exactly what they were doing lol.
Do you happen to have the link?
I am also curious about the link.
Don't live environments copy to RAM while running? At least that's how they worked back in the live CD days. So unplugging wouldn't be an issue unless they also powered down?
do you have the link to this? you've got me interested lol
We're not getting the link, dudes.
Tails OS > Sonic OS
can you run sonic.exe on sonic os
@@belstar1128only if you have WINE installed.
Knuckles OS for the win 🗣️🗣️🔥🔥
Me and my edgy doe quirky doe boys always use shadowOS the superior distro
@@thebaldpizzaman6319oh no!
Yoooo thanks for the tutorial! Surprised I got here this early lol. Since i know youll see this lemme just say appreciate the videos you put out! Using your platform to raise privacy awareness (and gawk at the transgressions against it) is truly a noble cause.
Good comment man
Mental outlaw finally dropping another tutorial is what we’ve all been waiting for.
Mental Outlaw is a true Internet Hero. I reckon this will be one of your most popular long term videos. Thanks for all you do.
privacy advocate: "I'm going to look at and review Tails to see how well it blocks ScAmazon cookies"
glowies: "OMG HE CLICKED THE HOMEPAGE! HE CLICKED THE HOMEPAGE!"
?
@@platinumsun4632 Simply using a searching engine to look up Tails on the web apparently triggers the NSA XKeyscore system.
Source Wikipedia :
In 2014 Das Erste reported that the NSA's XKeyscore surveillance system sets threat definitions for people who search for Tails using a search engine or visit the Tails website. A comment in XKeyscore's source code calls Tails "a comsec mechanism advocated by extremists on extremist forums".[22][23]
In the same year, Der Spiegel published slides from an internal National Security Agency presentation dating to June 2012, in which the NSA deemed Tails on its own as a "major threat" to its mission and in conjunction with other privacy tools as "catastrophic".[24][25]
In 2017, the FBI used malicious code developed by Facebook, identifying sexual extortionist and Tails user Buster Hernandez through a zero-day vulnerability in the default video player. The exploit was never explained to or discovered by the Tails developers, but it is believed that the vulnerability was patched in a later release of Tails. Hernandez had eluded authorities for a long time; the FBI and Facebook had searched for him with no success, and resorted to developing the custom hacking tool.
@@platinumsun4632 ?
Looks like we got ourselves another extremist 🤓
@@rusi6219 If you click on a guide for paranoid people, expect paranoid people to be present. Also, don't just reply negatively, completely unprovoked.
The best way I've heard tailsOS described as a daily driver is it's like being a digitally homeless H-1B1
I USED TAILS WTF lmao Ahahahahah
Same
using tails for like past 10 years, mostly for getting over protection on machines that are blocked or I lack admin priviledges, I simply boot up a tails form usb and I'm in, literally I used it to go over password windows 11. amazing OS.
you can do that with every live OS though. MX Linux is best for such scenarios. Coming with a lot off tools to manage and recover your system. You can even install the tools you need and create another live image out of it.
@@xCwieCHRISxtails is fastest. No bs just boots in
@@charon7320 how do you do that?? Please teach me
Based on the videos you are making, you are definitely on the list bro!
The FBI will stage a fight behind your back in the public library you are using TailsOS and then grab your laptop before you can turn it off.
Yeah, good luck to them bypassing the explosives I set up in my forest shack.
At least Ross show us what not to do
He did talk about that on I think it was the 2022 TOR Bible tutorial
People need to invent a remote kill switch that activates when you press together your ass cheeks 😂😂
That's why you use a WiFi amplifier while being stationed at a property close to public internet... 🤓👌🏻
I am the exact opposite at this point. All the devices I own record all inputs from every sensor anyways for “UI experience” or something.
What a cool feature! That's totally necessary and convenient for protecting their customers! I wish i had that too...
where was this video WHEN I COMMITED ALL THOSE CRIMES?!?!?
What crimes my brother? I've already freed you.
Downloaded Metallica songs from torrent?
Do you want to tell more about your crimes that you have commited? I'm not associated with the Federal Bureau of Investigation
where were all these crimes when i used tails os??
Lol 😂
ah yes, just in time, a good mental outlaw video to watch while eating instant noodles after class
ONLY true OG’s know that cia glowing in the background. We miss you Terry…
Something I'd like to see in Tails is adding an option for the encrypted persistent storage is an easy ability to add a doomsday password alongside the encryption password so that if the wrong password is entered the LUKS headers will be destroyed also an option to destroy the data after a set amount of failed password attempts.
or even better, adding doomsday password, so when you enter it. Whole persistent storage is deleted.
Make your own version.
First thing glowies are gonna do after raiding you is clone your drives so your suggestion is pointless
@@richardlyman2961 if storage is deleted, what are they going to seize?
Glowies😂
Never used it, but love learning about these implementations that allow activists, journalists in other countries to communicate freely
is it paranoia or is it justified defensiveness lol
yes
both, one being result of another
@@user-ic3os6px3jwhy not?
@@user-ic3os6px3j You can, just don't be dumb.
Paranoia to the point that it wouldn't be surprising to see said paranoid with a bullet-proof vest every time it goes out.
I've done a set of operations via "Tails" and I can recommend it. It's fast,simple and it'a a low threshold for normies who are concerned with their online privacy.
P.S.: I'm proud of you. No sarcasm. You're doing something important to all of us.
Just the crazy folk, i don't care about privacy neither should you unless you're a terrorist.
@@iamerror1699 It's because of ignorant people like you our rights are being slowly chipped off. You allow them to press on by doing nothing. One day you'll wake up without any human nor civil rights and then you'll wonder how the fuck could that happen.
@@iamerror1699Just because you care about privacy doesn’t mean you’re a terrorist. That logic makes absolutely no sense. People have a right to privacy. Also, if that’s true, why are you here?
@@z52ontop Why would you care about privacy if you have nothing to hide?
If you do you're either a terrorist, scammer or a bad person.
@@iamerror1699 First off, nice not answering my question. Second off, did you read my reply? People have a right to privacy. I do nothing illegal online or offline, but that doesn’t mean I don’t value my privacy. Does that make me a terrorist?? Is that what society has come to?
Ah, an XFCE enjoyer!
Thanks for the content as usual.
XFCE would be a lot more popular if just they made it better looking with default settings.. i guess people don't use it because they don't know how cool it looks once you tweak it a little bit
Few people on TH-cam know and actually teach and make videos about this. This guy is a GOAT fr.
This guy makes the best video, for the last 4 years ❤ Love from Canadian Indian
Warning: don't forget about Intel ME. All computers are backdoored, so don't do anything turbo illegal on your own hardware
I see no other option but to create your own processor from scratch
@@geryz7549This truly seems like the only logical option.
@@geryz7549 terry davis type beat
1. ME isn't really a backdoor
2. Use an ARM PC :)
That’s too much voodoo
Aint nothing better then a PB and J sandwhich, some milk, and a fresh Outlaw video on avoiding the fed boys.
I recommend a micro sd card and mini reader. It is much smaller, easier to conceal/dispose/destroy. I recommend the cheap Chinese ones that are notorious for corrupting after a few months, you can get a 3 pack of 16gb for like $10. If you go this route, and use it as a daily driver, remove any storage media/hard drives from your laptop for extra peace of mind that once a card is out, the data is gone.
I love videos titles on this channel that talk about "the ULTRA Paranoid". What's that famous saying, "Just because you're paranoids doesn't mean they aren't out to get you". Enough said.
All I'm saying is how you got my facial expressions??? Literally just was caught on the toilet and that was my exact face and pointing lol. I'm subbed on several channels because you taught me everything literally so thank you.
The great thing about torrents is that the magnet link contains the Merkle tree root hash, so you don't even need to verify the signature on the downloaded image (assuming you trust that your torrent client isn't compromised itself, you still want to verify that in general regardless of what you're downloading)
Real ultra paranoids don't even trust their calculator and verify with a pen and paper all calculating in their head and burn the paper afterwards.
@@xCwieCHRISxReal ultra paranoids know that a pen and paper is compromised. Everyone knows the glowies have had control over the visible world, projecting their holograms with these new 5G towers. Real security oriented individuals keep everything’s stored in their mind, where it’s safe from the glowies.
@@xCwieCHRISx😢😢
Also, ALWAYS use Bridged mode inside Tor Browser, this way your ISP won't know that you're connecting to the Onion services, since the Bridged mode is supposed to bypass any restrictions in countries where Tor is banned. Even if it's not banned inside your country, always use it.
thanks G
what does bridge do?
Bridge relays are Tor relays that are not listed in the public Tor directory.
That means that ISPs or governments trying to block access to the Tor network can't simply block all bridges. Bridges are useful for Tor users under oppressive regimes, and for people who want an extra layer of security because they're worried somebody will recognize that they are contacting a public Tor relay IP address.@@nettlex
without a bridge, your isp will know you connect to the tor network@@nettlex
unless those bridges are banned as well, in that case the only option is to join state aproved bridges which as we all know will totally be safe
Mor Tails and TOR videos. Keep them coming, Kenny.
if you're watching this video you're on a list
How do you know?
@@str8gigachad124They know
thats more proof your on the list@@viewviewview1236
@@str8gigachad124 read the wikipedia page for tails
😂
I'm convinced that world is going insane when "ultra paranoid" is the only mode/level with decent privacy online.
Well, the internet wasn't set up with privacy or redundancy in mind.
TOR is a fix for the former.
@@MrCmon113 exactly. what a gay wannabe poet
@@MrCmon113I2P…
now we wait for the ultimate paranoid privacy matryoshka doll guide of quebes os -> tails os -> hiddenvm -> whonix
Only to realize you have a computer with Intel ME
evidently you have no idea what you are talking about.@@Jostradamus2033
There are lots of sensationalist rumors and very little substantive evidence about the use of IME or PSP for "spying". First of all, most of the vulnerabilities that have been found in these systems are not exploitable remotely. And the one known vulnerability that was only worked on machines that had remote management (AMT) enabled, which is typically not the case for retail computers. It also wouldn't work if the computer is unreachable from the Internet because it's behind a NAT router and/or firewall (which should always be the case if possible).
Second, the NSA can't do magic and transmit data through thin air. If they were spying and exfiltrating information via IME/PSP, you would be able to see the packet flow on your network using packet capture tools. Yet nobody has ever found anything like that to my knowledge.@@Jostradamus2033
Damn
I’ve tried tails and it works great! Now I just need to switch to Linux fully but windows just works so much better for games.
You can always dual-boot and have one drive just for Windows and a separate drive for a different OS.
Steam on Linux allows for Proton compatibility and in my experience it works like a charm
You might be surprised how far Linux has closed that gap in just the past couple of years...especially it's compatibility with NVidia drivers now. I honestly pulled my hair out the past decade but we're just about there now. PoP_OS on laptops w/ hybrid graphics...Arch or Mint/Ubuntu on your home desktop!! 😮
Unpopular opinion: try playing less games. Improved my QoL quite a bit.
If you must, I recommend separate computers.
Yeah, linux users will try to convince you that Linux is as good as windows for gamers, it's not. Driver problems, compatibility problems, input lag problems, performance problems. I don't know if it's resignation, but at least now that I can't play on my pc because I'm trying Linux I have more time to do other things haha
Finally, a way to send an image of that funny green frog to a European!
Just a heads-up, if you're using tails and the tor browser for legitimate purposes only, make sure you don't change the window size or location of the tor browser, as that will help fingerprint you, as you will stick out if you stray from the defaults 🙂.
letterboxing is enabled by default which solves this problem
@@rqertip thank you, didn't know that. I don't follow the tor project any more, only did it for curiosity's sake in the past.
Adevar graiesti vere
@@rqertiphonestly this should’ve ratio’d
@@andreihabalaunot that you’re a bad dude but his information more current
Mental Outlaw, you’re doing God’s work here; teaching the technologically illiterate (like me) how to maintain a proper security profile when using the internet. Also thanks for the cute/interesting farm and cooking vids, gives me something to watch during lunch break 😂
They have chips inside of processor. You are just getting baited by honeypots. Zebra is the real solution
@@Lrripperwhat’s zebra
@@Lrripper Mind sharing a bit more information? I’m not sure what you mean by “Zebra”.
@@Lrripperzebra?
the wild. nature only. no tech 🌴
this is all I ever wanted from an OS
can't tell you how many times I have deleted something only to find remnants in a random folder a year later
It’s a good day when big dog uploads a 30 min banger🥶🥶🥶❤️❤️
Especially when it's a 30min in-depth video of a very niche operating system
According to Wikipedia, even SEARCHING for TAILS puts you on a 3LA list.
So I assume we all are on a list for watching this.
thanks for info, just searched for it on all my devices so they can kick rocks
What’s a 3LA list
@@railworksamerica 3-Letter Agency
what about tails the fox
The gpa process feels somewhat cumbersome compared to the gpg CLI, but given gpg's learning curve, I can see why gpa is useful for more people.
I consider Kleopatra the better gpg gui.
@@xCwieCHRISx I'll take a look
The MIT PGP key server doesn't have to be breached. The attacker can just upload it with another domain name, and make the one on the breached Tails site match that.
You just made all kinds of lists with creating this Video 🎉.
I use Tails to avoid downloading malware from darknet sites onto my actual OS when getting textbooks for school. If anyone has a better alternative drop a reply please. :3
There isn't.tails is the more than likely the most secure sandbox environment that can do what you need.
The next level would be getting a cheap HDD and then installing QubesOS on it to use whonix
Based
the likelihood of getting malware on linux is fairly low i would just use a virtual box vm on a linux machine for this tbh
There are surely safer sources for textbooks since I recall that sites get shared on social media often wherever college age people mingle, and all different kinds of ebooks come up on collections like r/ opendirectories. Dunno the specifics though since I dislike digital copies.
Thank you for this video, I did not know there are actually many servers with GPG keys! Clever!
watched 10 min of this for pure entertainment purposes even though i will continue to be tracked on my arch machine that is signed into google. we can’t win them all
Why didn't you watch this on Odyssey! Oh wait.. I'm also here on youtube too... maybe you're right, we can't win them all
Watching this (for entertainment) on my windows PC logged into TH-cam and without my vpn enabled
@@JacobKinsley
It doesn't matter as long as there is no correlation to your illegal activity.
@@MrCmon113 The problem is that right now it's not a crime but later, they will make it a crime.
Thank you for this upstanding video my upstanding citizen, we will pay a visit to you shortly. :)
welcome to the top of the list, boys
Tails is needed if you want to create pgp keys securely, verifying it with the tails developer's key is absolutely necessary to ensure integrity of the image.
Tails has a lot of uses where secure airgapped systems are needed.
This is for educational purposes.
as far as opsec goes, isn’t watching this videos signed in to a google account enough to make you watched anyways? let alone posting this type of content. brave soul.
Watched how? Just stop using those things and after a while your pattern is lost
@@duckmeat4674 But that's suspicious, you have to keep a fake vanilla looking online identity for them to track while also having your untracked activity.
If this is enough, using Tor will be enough as well... If you therefore opt to connect over a bridge - the "fake" IP would just as well put you on a list... Let alone your ISP never seing a single website you access even though you consume bandwith daily would be sus af... If you want your activity to be hidden from glowies, you'll have to accept looking 'out of the ordinary' from the outside... ...which will - at least by your standard set in this comment - put you on a list already... 🤷♂🤷♂
@@Luckyluckyluc i’ve embraced that concept, i just find a lot of contradictions in the online security world. i’m going to school for chemistry, in order to participate in online discourse on reddit and such, you kinda have to accept you have the DEA’s attention.
@@allen.simmons9150 exactly... Otherwise, live in the siberian woods or something
A perfect os for looking at carrot cake recipes 😃
That's the same thing i was thinking about!
Nahhh, u r looking at cp.
@@ShivamKumar-xy6smcarrot pictures?
I remember the day tails was included on a computer magazine in Germany mainly for looking like windows xp in stealth mode. That was legit cool feature.
Also bonus idk who said it there are no lists the NSA just has enough resources to scan everything.
Yes a tails video!!! Awesome
Youre doing Gods work sir. Thank you
When the bulk of corpo internet creeps on you by default, using a paranoid OS ought to become our default.
TAILS used to consider downloaded ISOs compromised, and they used to have you download it from TAILS and install it that way. So what you'd have to do, was download and burn the ISO onto a flash drive and then install it to another flash drive. I don't know what happened, and why they don't have you do that anymore.
My father had one of those older versions
@@JJSquirtle lol, you calling me old Sonny?
@@Angular777did you manage to pick up those cigarettes finally
What? One flash drive to another? What is so secure?
@@Angular777 no, his was even older, you needed to use a CD
Paranoid people: what if tailsOS was created by CIA to monitor paranoid people
😂
Paranoid was a word created by such people to make morons like you let your guard down so you arent le paranoid (aware of your surroundings or of whats going on)
OpenPGP is the IETF standard based on Phil Zimmermann's PGP. GnuPG is an open source implementation of PGP.
Your point about not going to tails on the clear net made me realize I’ve already ruined my OpSec by even watching your channel 😂
You should put a warning to use a vpn when watching your channel on the main page video.. could even drive up some hype around the channel
Your good, just keep tails activity separate from everything else.
i love the Mr Robot scene, and I would just use SSD rather then hard drive since hard drive are so difficult to destroy compared to SSD. and I'll see if i can put Tails os on a Micro SD card seems like a fun idea to try. i am going to watch Mr robot.
Mr Robot is just amazing
Hard to destroy HDD? Just throw it on the curb a few times
Cant lie, these mentaltorials always make me stop what Im doing to have a gander 😅
The only feature that's missing is a nuke password for us that need persistence. If you use the nuke password instead of the real one and everything's erased.
Its crazy how much privacy we dont have and dont know it.. love educating myself (purely education)
ironically though, my isp knowing im watching this TailsOS video is already probably putting me on their list.
Only you and Google know that you're watching this video if you're using https protocol, your ISP only sees the server you're connected to not the data being transferred
If your watching the informative content that comes from this channel then your on a list
Watching this video on TH-cam that your logged into... your ON a List !
That's great isn't it? Now the glowies will protect us even more!
This was my first experience with linux, still use it to this day
Can you do a video covering how to get did of intel ME? It feels almost redundant to use tails if theres built-in spyware
intel ME will never ever ever lead to an arrest. you are just misinformed
There are lots of sensationalist rumors and very little substantive evidence about the use of IME or PSP for "spying". First of all, most of the vulnerabilities that have been found in these systems are not exploitable remotely. And the one known vulnerability that was only worked on machines that had remote management (AMT) enabled, which is typically not the case for retail computers. It also wouldn't work if the computer is unreachable from the Internet because it's behind a NAT router and/or firewall (which should always be the case if possible).
Second, the NSA can't do magic and transmit data through thin air. If they were spying and exfiltrating information via IME/PSP, you would be able to see the packet flow on your network using packet capture tools. Yet nobody has ever found anything like that to my knowledge.
Dope video! Downloading it now
Was reading TailsOS guides just a couple hours before you uploaded this. Can you hear my thoughts MentalOutlaw? Perhaps we can get a video on preventing psychic leakage/ tin foil hat etiquette for the ultra-ultra-paranoid?
Maybe you can start by watching these police interrogation videos on TH-cam with psychological analysis - sometimes behavioural patterns can be enough
Double layer the tinfoil hat and make sure to ground your bed via copperwire wranglerstar has some great advice.
if you were ultra-ultra-paranoid you wouldnt be on youtube
Tutorial of new things is the best content ❤
Does TailsOS do data wipe on the target drive? If my totally legitimate and mundane USB stick is stolen by an adversary, they could possibly recover some identifying files that have been stored on the disk prior to installation of TailsOS. Should I use DBAN or something similar before installing?
Wow, this is exactly the same USB stick as shown on 0:15 timecode. Tailsos is meant for me, as it maybe a fate.
FYI Outlaw, I'd use black boxes for censoring instead of pixelation. Change your wifi password
Christopher Paul Neil agrees
I mean, the resolution of those pixelations was pretty low already..: One black pixel was around the size of one text line...
@@Luckyluckyluc If they figure out what blur filter you used, they can simply use it on all possible combinations and use some image matching software or AI to figure an exact match. In other words which of all possible blurred codes looks exactly like his. That takes a lot of effort but it probably is possible
@@ent2220 But what if each text line is already covered in a string of black pixels? Every password would look the same reverse engineered...
Why is this guy so wholesome
Cool another honeypot video
The fact that i watched this video will probably put me on a list
I live in brazil and they trying to intercept everything we do in the internet (just like any gov party around the world), if i use correctly tails or whonix may i still be safe from those things? or can they track me via the isp provider and they see tor relays on my ip?
I'm commenting here to get notifications in case someone answers. I want to know this as well.
Já perdeu. Vou colocar você na lista aqui só por conta desse comentário.
@@pedrogorilla483 kkkkkkkkkkkkkkkkkkkkkkkkkkkkk pfv não chame o cabeça de p1r0c@
Once you're in tor browser or tails OS the isp can only see it was accessed not your activity
it depends on what you're doing online tbh. If they want, they will track you and they will find you. Sooner or later
Man I love this video!
Shout out to Miles Prower for developing this OS
Tails and kali linux have always been OSs that provide a commendable uses case that I have yet to use... Well I did use tails once
Not having Monero in Tails is a huge blunder by the devs, also still having Bitcoin wallets
I'd love love love more of this.
notification ✅✅✅✅
Getting an education must certainly rough for some folks. Glad to see folks motivated to learn meme history.
please do make more videos on tails
Watching this video.... we're all on the list. Soon as we downloaded Tor ......we're on the list. Hey!
Can Tails work with Sonic so it goes fast too?
You were expecting a monero wallet? Lol.
Good video, thanks for the content. Here's some text to boost it.
You could zoom in the command line window to make it easier to read when you use dd. I remember Luke had some keystroke pop-up in his videos, but I don't remember what app he used. (Guess it doesn't matter when it's a fresh install)
Oh, you could also talk about why to or not to use tails on a VM instead in another video.
If you do not want to get noticed during Tails download, Torrent is literally THE WORST way xD
Every other torrent participant knows your IP is downloading this torrent.
Every ISP of those participant also knows.
I mean, this is how "movie studios" know their film is being pirated, and by whom. They just listen on Torrent peers and then send "Copyright Violation" emails to ISP's with detailed date, time and IP. I know because i receive tons of those mails every day :D
If I'm not mistaken that's only a thing in countries with super strict piracy laws like Germany.
happened to me wouldnt recommend xD@@raiogelato6921
does anyone know the best way to download tails without being noticed? especially for a country like germany lol
@@xenonbreakout Leave Germany, they will discover you no matter what.
Just use vpn like you would pirate anything else.
I'm sorry, I'm just a random person stumbled on this video, but could all the spying things to be wired in the OS itself? Like, in code or something?
@LastOne155 But if it's open source, could it be easier to write malware for it?
It is true that it could be tampered with before you receive it. The ultimate solution to that would be to make the device yourself.@@assamtea1
@@assamtea1no, because someone finds a flaw and is reported. Imagine you open a blueprint of a bank vault to the public. Everytime someone in the public finds a fault, the developers can fix that issue asap.
@@assamtea1 Why do you think open source would make it easier lol? All good spyware is always obfuscated one way or another, having closed source code is perfect to avoid detection of dependency chain attack.
That's not how any of this works, a compiled binary is a compiled binary regardless of the availability of the source code.
Being Open Source however means that anyone with enough knowledge can audit the code, while with a closed source software it is a pain to analyze and verify.
Love this video!
Pozzed corporate art. 100% glowie
I watched this video and now I'm on a list! Great!!😂