Be Anonymous Online With The Tails Operating System

แชร์
ฝัง
  • เผยแพร่เมื่อ 1 ต.ค. 2024
  • Tails is a portable Linux operating system that protects against surveillance and censorship. It is designed to be run as a live USB stick that you can take with you and use on any computer, when you need anonymity. Tails is important for whistleblowers, journalists, activists, domestic abuse survivors, and those persecuted by oppressive government regimes.
    REFERENCED:
    ► tails.boum.org...
    WANT TO SUPPORT THE CHANNEL?
    💰 Patreon: / distrotube
    💳 Paypal: www.paypal.com...
    🛍️ Amazon: amzn.to/2RotFFi
    👕 Teespring: teespring.com/...
    DONATE CRYPTO:
    💰 Bitcoin: 1Mp6ebz5bNcjNFW7XWHVht36SkiLoxPKoX
    🐶 Dogecoin: D5fpRD1JRoBFPDXSBocRTp8W9uKzfwLFAu
    📕 LBC: bMfA2c3zmcLxPCpyPcrykLvMhZ7A5mQuhJ
    SOCIAL PLATFORMS:
    🗨️ Mastodon: distrotoot.com...
    👫 Reddit: / distrotube
    📽️ LBRY/Odysee: odysee.com/$/i...
    DT ON THE WEB:
    🕸️ Website: distrotube.com/
    🐿️ Gemini Capsule: gemini://distro.tube
    📁 GitLab: gitlab.com/dwt1
    FREE AND OPEN SOURCE SOFTWARE THAT I USE:
    🌐 Brave Browser - brave.com/dis872
    📽️ Open Broadcaster Software: obsproject.com/
    🎬 Kdenlive: kdenlive.org
    🎨 GIMP: www.gimp.org/
    🎵 Ardour: ardour.org/
    💻 VirtualBox: www.virtualbox...
    🗒️ Doom Emacs: github.com/hli...
    Your support is very much appreciated. Thanks, guys!

ความคิดเห็น • 231

  • @root_dnb
    @root_dnb 2 ปีที่แล้ว +70

    More security and privacy content please!

  • @tetoni
    @tetoni 2 ปีที่แล้ว +82

    Hey DT, you were wondering why you don't get a warning when going full screen:
    The TOR browser adds a margin on the sides and at the bottom of the window for making the height and width always be a multiple of 100 pixels. This results in better anonymity because the websites you visit get less information about your screen (resp windows) size.
    BTW, I love your videos, keep it up! :D

    • @alexey104
      @alexey104 2 ปีที่แล้ว +7

      Despite letterboxing, it is still not recommended to change tor-browser window size from the default 1000x1000. Doing that still makes you more unique.

    • @sjones72751
      @sjones72751 2 ปีที่แล้ว +9

      You’re fingerprint is more identifiable with a 1000x1000 resolution rather than a 1080p resolution. 1080p is so common these days that you’d be hard pressed to associate data sets to a user running a common resolution like that. That said how many users do you think sticks to a 1k resolution?

    • @alexey104
      @alexey104 2 ปีที่แล้ว +6

      ​@@sjones72751, this is not about your screen resolution, but about tor-browser defaults. TH-cam blocks comments containing links to other resources, but you can take a look at the Tor documentation. By default all tor-browser users have the same 1000x1000 window size if possible. By changing the defaults you always stand out from crowd when using Tor. Letterboxing just fakes your real screen size, but you still don't look like a default tor-browser user.

    • @sjones72751
      @sjones72751 2 ปีที่แล้ว +5

      @@alexey104 that’s exactly my point. Maintaining a 1k res it’s easy to identify as a tor browser. Using 1080 it’s not, because that’s most of the world across many different browsers. In a world where the objective is associating data sets to an identity not using the most common identifiers makes you stand out from the crowd which is the opposite of what you want.

    • @alexey104
      @alexey104 2 ปีที่แล้ว +5

      @@sjones72751, When you access any website, this site can easily see that you are using Tor. Thus, you are already identified as a tor-browser user by this website, this is not a secret. This is why you see the captcha when connecting to some sites via Tor - they know you are using Tor exit nodes, the addresses of which are publicly available. And this is why it is important for Tor users to not change the default settings. If all tor-browser users use the defaults, they look not exactly the same, but very similar to each other. When you change the default settings, window size or install addons in tor-browser, you become not an average user among an already small user base. You cannot hide the fact that you are using Tor from a website you visit, but you can at least look like other Tor users.

  • @mattiamolicacolella4319
    @mattiamolicacolella4319 2 ปีที่แล้ว +23

    Great final speech, an excellent argument masterfully exposed. You really conveyed the point of at least one main reason for free software and personal anonymity to exist, and why to support it no matter what. Bravo, sir, bravo.

  • @michi1743
    @michi1743 2 ปีที่แล้ว +24

    Finally got backa around to watch your videos! God bless you for spreading news about this amazing and absolutely quintessential operating system!

    • @DistroTube
      @DistroTube  2 ปีที่แล้ว +7

      Thanks, Michelle!

    • @notafbihoneypot8487
      @notafbihoneypot8487 2 ปีที่แล้ว +1

      th-cam.com/users/shorts_Tv6yo3oVaE?feature=share

  • @Foche_T._Schitt
    @Foche_T._Schitt 2 ปีที่แล้ว +10

    The maximize browser is no longer a concern because the browser now adds margins to decrease the number of resolutions reported.
    Say you have a 1920x1200 it may add a margin at the bottom to make it 1920x1080 thus decreasing the number of unique browser/screen sizes websites can detect.

    • @alexey104
      @alexey104 2 ปีที่แล้ว +3

      No, it is still a concern. Letterboxing fakes your real screen resolution, but changing the default tor-browser 1000x1000 window size still makes you more unique.

  • @RTPTechTips
    @RTPTechTips 2 ปีที่แล้ว +4

    To those commenting "but... but... using Tails or Tor puts you on a list!" consider this: "Linux Journal" was on 'list' as "extremist"... Come on now? just not using Windows classifies someone? and, the word "CLOUD" was also flagged on said leaked list... Bottom line is this: we are all in this Human Rights thing, together. The more we use things like Tor Browser for our normal browsing activity, the more hay we add to the haystack. We have the Right to privacy. Privacy is fundamental to being a free person. A fundamental Human Right according to the United Nations themselves. Use Tor more, not less. Be the change you want to see.

  • @hsiulbluish
    @hsiulbluish 2 ปีที่แล้ว +50

    I've always kept this in the back of my mind. I know people who have gone to protests or protest online, but have zero knowledge about computer privacy and security. Although I have heard the rumor that downloading/searching it places you on a watch list, it's good to see secure options that are somewhat easy to use being broadcast out there. It almost makes me want to do a small workshop for my friend group, showing how to stay private and what options there are.

    • @RamasesBullock
      @RamasesBullock 2 ปีที่แล้ว +3

      On a watchlist lol they know what time you poop and how long just from your facebook if you have one

    • @hsiulbluish
      @hsiulbluish 2 ปีที่แล้ว +3

      @Arpit Rajput It's not a youtube video if it doesn't have a few unrelated political comments on it.

    • @skaruts
      @skaruts 2 ปีที่แล้ว +1

      @@thomasrossbabin3671 I've seen many leftists incite doxxing, canceling, or even outright violence, so I'm not sure leftists are the ones needing this the most.

    • @mr.bazuka9756
      @mr.bazuka9756 2 ปีที่แล้ว +1

      It's a serious topic. Some of my friends share their phone number at their first meeting with a person on internet.

    • @justgivemetheaccount
      @justgivemetheaccount 2 ปีที่แล้ว

      Ah, you mean the peaceful events, where people are murdered for not being a Marxist?

  • @wild467
    @wild467 2 ปีที่แล้ว +15

    If you use Tails or Tor the NSA automatically puts you on a watchlist because you are considered an "Extremist".

    • @DistroTube
      @DistroTube  2 ปีที่แล้ว +37

      As "Linux" users, I'm pretty sure that we are all already on a watchlist.

    • @root_dnb
      @root_dnb 2 ปีที่แล้ว +7

      Source? Sounds like internet FUD to me.

    • @DistroTube
      @DistroTube  2 ปีที่แล้ว +28

      As a BSD user, I'm pretty sure that you're on the FBI's most wanted list. ;)

    • @root_dnb
      @root_dnb 2 ปีที่แล้ว +26

      @@DistroTube At least somebody wants me...

    • @notafbihoneypot8487
      @notafbihoneypot8487 2 ปีที่แล้ว +4

      Y'all based

  • @alexey104
    @alexey104 2 ปีที่แล้ว +17

    Tails is great, but it still can leak your real IP to adversaries, because it runs on "real hardware" and uses your real network adapter. Whonix is a more solid choice in that regard. It can be configured to behave exactly like Tails(forget everything after restart), but it requires some Qemu/KVM knowledges and needs to be actually installed.

    • @adamwallwork6120
      @adamwallwork6120 2 ปีที่แล้ว +2

      Quote from the tails doc:
      Most DNS leaks are avoided by having the system resolver query the Tor network using the DNSPort configured in torrc.
      There is a concern that any application could attempt to do its own DNS resolution without using the system resolver; UDP datagrams are therefore blocked in order to prevent leaks. Another solution may be to use the Linux network filter to forward outgoing UDP datagrams to the local DNS proxy.
      Tails also forbids DNS queries to RFC1918 addresses; those might indeed allow the system to learn the local network's public IP address.
      If you want ip/dns leaks to be impossible then you’ll want to use Whonix.

    • @evildragon1774
      @evildragon1774 2 ปีที่แล้ว

      Agreed, i'd say tails is good for journalists and whonix is perfect for daily user. Tails has more security in terms of physical attack.

    • @adamwallwork6120
      @adamwallwork6120 2 ปีที่แล้ว +1

      @@evildragon1774 tails for daily use might be better. If you want a live system with dns/ip leaks to be impossible then whonix live is the way to go.

    • @jasperzanjani
      @jasperzanjani 2 ปีที่แล้ว

      How many knowledges does it need exactly?

    • @skylinefx049
      @skylinefx049 2 ปีที่แล้ว +1

      @@jasperzanjani about tree fiddy

  • @Handy-Handy
    @Handy-Handy 2 ปีที่แล้ว +15

    ahh Tails is freaking awesome!

    • @DistroTube
      @DistroTube  2 ปีที่แล้ว +9

      Agreed!

    • @tailsorange2872
      @tailsorange2872 2 ปีที่แล้ว

      @@DistroTube Is it daily drivable?

    • @doomguy8718
      @doomguy8718 2 ปีที่แล้ว

      @@tailsorange2872 not really

  • @andrewnorris5415
    @andrewnorris5415 ปีที่แล้ว +1

    Protect the physical security of your USB stick. Someone could tamper with it, and you would not be secure. They only need to plug it into a portable unit and the US could be replaced with a hacked version. Also be careful of PCs you plug it into. If they are tampered with they could also go over the USB stick with a hacked/code injected version of Tails.
    Governments etc must have systems to do this for Tails.

  • @kentjensen4504
    @kentjensen4504 2 ปีที่แล้ว +3

    That was awesome, Derek. Now I just need an island with a dead volcano, my own range of satellites, at least one submarine, and a band of assassin vixens to do my bidding.

  • @mark8200
    @mark8200 2 ปีที่แล้ว +4

    A nice and much needed os, thank you tails team what champs 🏆 keep at it, and thank you DT you're a champ to here's your trophy 🏆 Buddha Bless

  • @BrunodeSouzaLino
    @BrunodeSouzaLino 2 ปีที่แล้ว +2

    I would be very careful with selling the Tor network like that. It may have been secure when it first started, but nowadays it's trivial to de-anonymize users of it by directing them to specific nodes, since you have no control over it and nodes are run by people that may or may not have malicious intents, governments, etc.

  • @tvrdi369
    @tvrdi369 2 ปีที่แล้ว +3

    Great video👍
    Exellently explained essence of Tails. I have tried it few times out of curiosity. I live in relatively safe country and don't need it daily but still make monthly donations to them just because I belive that it is a great project.
    All the best to you, keep making great videos!

  • @AlbandAquino
    @AlbandAquino 2 ปีที่แล้ว +10

    Unfortunately for some people in 2021, it's still a matter of life and death when it comes out as digital communications.
    The ONE tool that can unite us all, is struggling right now to keep us afloat. You know what you have to do ...
    Use Linux (the flavor you like) and if it's mostly Open Source software, you should be fine.

  • @xc13z829
    @xc13z829 2 ปีที่แล้ว +4

    I love many things about Tails. But my GOD, do they have to use g-nome?

    • @PhilosopherRex
      @PhilosopherRex 2 ปีที่แล้ว +2

      "Heads linux", similar to Tails uses openbox and is based on Devuan not Debian. Also doesn't use the unaudited systemD, nor any non-free software and heads uses a deblobbed and hardened Linux kernel. It does so by using a Linux kernel patched with grsecurity.

    • @adamwallwork6120
      @adamwallwork6120 2 ปีที่แล้ว

      Tails is meant for anonymity and privacy dont get it confused with what you see on unixporn. Its purpose is clear if you want to rice go use something else.

    • @GreyDeathVaccine
      @GreyDeathVaccine 2 ปีที่แล้ว

      @@PhilosopherRex Thx man. I absolutely hate gnome 3.

  • @RHTORAS
    @RHTORAS 2 ปีที่แล้ว +2

    No i won't use tails. I d rather use heads because of systemD non existance.

  • @MrDanderskoff
    @MrDanderskoff 2 ปีที่แล้ว +1

    Are there any white papers/write ups/etc that shows how TAILS handles caching the information? If you're super concerned about anonymity then physical evidence would also be a concern. If it caches everything you're doing on the USB/whatever storage space, then even if it's a live OS you'll still have residual data left in the storage space that can be recovered. If it doesn't have a scrub function when it loads itself that would be surprising for something so geared towards security.

  • @Rundik
    @Rundik 2 ปีที่แล้ว +2

    Tor isn't entirely anonymous. Even if you're doing everything perfectly right

    • @GreyDeathVaccine
      @GreyDeathVaccine 2 ปีที่แล้ว

      You are wright. That's why you need extra help like combining power of TOR with VPN, and there is more than one way how you can do it.

    • @Rundik
      @Rundik 2 ปีที่แล้ว +1

      @@GreyDeathVaccine vpn wouldn't make a difference. The way tor works is vulnerable to sybil and similar kind of attacks. Consider switching from tor to something more secure like i2p

  • @PhilosopherRex
    @PhilosopherRex 2 ปีที่แล้ว +6

    "Heads linux", similar to Tails uses openbox and is based on Devuan not Debian. Also doesn't use the unaudited systemD, nor any non-free software and heads uses a deblobbed and hardened Linux kernel. It does so by using a Linux kernel patched with grsecurity.

    • @hammerheadcorvette4
      @hammerheadcorvette4 2 ปีที่แล้ว

      " _unaudited systemD_ " 🤔

    • @BrunodeSouzaLino
      @BrunodeSouzaLino 2 ปีที่แล้ว

      Which also means the amount of hardware it can run on is extremely limited.

    • @PhilosopherRex
      @PhilosopherRex 2 ปีที่แล้ว

      @@BrunodeSouzaLino how so?

    • @GreyDeathVaccine
      @GreyDeathVaccine 2 ปีที่แล้ว

      ​@@hammerheadcorvette4 Original Creator of systemd was working for corporate Red Hat and probably still working for them.
      Connect the dots.

    • @hammerheadcorvette4
      @hammerheadcorvette4 2 ปีที่แล้ว +2

      @@GreyDeathVaccine Red Hat ? The same company who has done a ton for Open Source projects and the Linux Kernel? You know, the same company with the *most* developers working on the Linux Kernel... Yes, Lennart does work for Red Hat to this day.

  • @echologname
    @echologname 2 ปีที่แล้ว +1

    I have a Lenovo Chromebook C330, and because of its ARM processor, it's incompatible with custom firmware that would allow me to access a BIOS menu and boot from an external media source. Otherwise, I would LOVE to live boot Linux distros on it! For now, I'm just using Crouton to try out Linux variations on it. Thanks for the video! I'll have to try out Tailes sometime, but maybe on my Dell laptop instead.

  • @Kispalkovich
    @Kispalkovich 2 ปีที่แล้ว +1

    if you want to send encrypted message to someone, you only need his or her public key, they need only their private key. It's not that complicated

  • @marcusjay8103
    @marcusjay8103 2 ปีที่แล้ว

    Hey dude, you all good?
    Got a burning question nobody seems to care to want to answer 😭
    So I'm looking at some kind of mini form factor pc 'box' to run tails from. Don't need it for anything else really as plan to build a decent mini ITX or even just a powerful android box as it's literal purpose would he just YT, browsing on sites i have accounts etc.
    Firstly any advice for decent password creator/manager?
    And as for my 'Tails OS' machine, I'm just wondering if you can give me specific details or link me to a laptop/mini pc (NUC style) etc.
    There's so much conflicting info on what on board graphics work etc. Id like for either 8 or 12gb ram a 64/128gb SSD and the best value cpu.
    Looking at around £300/£350..
    So $420/$380.
    Even if its used im not fussed. Just so confused. Got my new full fibre connected tomorrow (well today now) so wanna get up and secure ASAP.
    Please help a bro out.
    Appreciate everything you do my man 👌
    Peace

  • @-bazoona3654
    @-bazoona3654 2 ปีที่แล้ว +1

    Can't wait for sonicOS and knucklesOS

  • @mikerotcherson
    @mikerotcherson 2 ปีที่แล้ว

    11:36 That's not how you're supposed to do encrypted email communication. It sounds like you don't understand the difference between symmetric and asymmetric encryption and are under the impression that you can't email securely without Alice and Bob knowing the same decryption key. I agree, trying to communicate using a symmetric-key algorithm would be difficult or impossible in some scenarios, but that's the whole point of asymmetric (public key) encryption. You should look into how public key encryption works.
    Here's a tutorial for using PGP for email from nearly a decade ago and it was still pretty simple even back then: th-cam.com/video/l1eKh2omRbo/w-d-xo.html

  • @milanpanic3755
    @milanpanic3755 2 ปีที่แล้ว

    You are wrong about the security from a virtual machine. You can run the virtual machine in bridged mode. In that case, the dhcp will directly give the vm an ip address which will directly go throught the gateway to access the internet, and not the host's ip (like in NAT mode).
    Infact, it is more secure to run it in vm.

  • @phillipschmidt1423
    @phillipschmidt1423 2 ปีที่แล้ว

    Used it before. Now I'm working on new projects. I really liked the utopia ecosystem. Recommend for use

  • @donpeer4477
    @donpeer4477 2 ปีที่แล้ว +1

    I carry Tails with me for use in someone else's computer, which I cannot guarantee is not infected or compromised.

  • @12Q46HPRN
    @12Q46HPRN 2 ปีที่แล้ว +1

    Thank you so much for this! I was wondering as I watched, "How long until YT takes this down. . . ?"
    The way things are going now wherever one might live, it might be a good idea to keep a USB of Tails stored in a safe place, just in case.
    I had not heard of this before, but will be prepared now. Thank you again!

  • @mrdoode1991
    @mrdoode1991 2 ปีที่แล้ว

    And still you think, no one has to fear not being anonymous in such a rich environment like Europe.
    Look at Belarus. They still have a dictator! There is a need for this even in western countries!

  • @Mr.Eminem
    @Mr.Eminem 2 ปีที่แล้ว +2

    Finally i can buy cocaine online without worrying about anything 😂

    • @joehephwer1299
      @joehephwer1299 2 ปีที่แล้ว

      Was meant to protect you, not to encourage you to self-destruct

  • @richardharding5776
    @richardharding5776 2 ปีที่แล้ว +1

    Hey DT Tails is important and sadly needed for the very words you spoke. We are not all in "that comfortable place" many of us take for granted,yet another great video,content from the heart.

  • @gamerking64
    @gamerking64 2 ปีที่แล้ว +1

    I think that this is the easiest thumbnail to create! Its just a plain color with text on it. I assume it took less time to finish too.

  • @fawzanfawzi9993
    @fawzanfawzi9993 2 ปีที่แล้ว +1

    This video has the most purple thumbnail of any video

  • @norse8825
    @norse8825 2 ปีที่แล้ว +1

    The whistle-blowing aspect is possibly the strongest reason for this to exist in the west.

  • @pomo1238
    @pomo1238 2 ปีที่แล้ว +4

    I've always loved TAILS, glad to see more coverage on this great OS.

    • @notuxnobux
      @notuxnobux 2 ปีที่แล้ว +1

      I've always loved CUNNY

  • @C6438911
    @C6438911 2 ปีที่แล้ว +2

    Hey DT! If possible could you take a look at Qubes OS ?
    I understand if it is NOT possible, because the hardware "requirements" might not be in your favor for running Qubes OS and I think it doesn't run well or at all in a virtual machine. But if it does, could you please have a look and give your opinion about it ?

    • @rockytom5889
      @rockytom5889 2 ปีที่แล้ว

      I think you could run it in a vm, just gotta make sure to give it at least 8gb of ram and enable nested virtualization in qemu/kvm/libvirt.

    • @adamwallwork6120
      @adamwallwork6120 2 ปีที่แล้ว

      @@rockytom5889 qubes should be used as a host OS and not in a VM. Read the qubes documentation to learn more.

    • @rockytom5889
      @rockytom5889 2 ปีที่แล้ว

      @@adamwallwork6120
      I know that. I was just stating that it may be possible to virtualize it if you passthrough the cpu and expose its virtualization instructions. Never did I say you should virtualize it.

  • @tomnag3750
    @tomnag3750 2 ปีที่แล้ว +8

    Hey dt have you heard that a group is trying to de anonymize people on tor by having control of a large amount of tor nodes? Looks like a well funded group of people
    Might be worth looking into for a video. Because it is easy to combat if more people host tor nodes.

    • @Elhamidi0249
      @Elhamidi0249 2 ปีที่แล้ว +3

      You mean the group KAX17 Mental Outlaw talked about in 2 of his latest videos?

    • @tomnag3750
      @tomnag3750 2 ปีที่แล้ว

      @@Elhamidi0249 yea kax17 is the group couldnt think of the name :p

    • @devilmanscott
      @devilmanscott 2 ปีที่แล้ว

      The only way to truly be anonymous is to not use the internet and live in the woods, I am not saying you shouldn't do as much as you can, but there's not true anonymity online.

    • @fossforever512
      @fossforever512 2 ปีที่แล้ว +2

      @@devilmanscott yeah true, but as a wise boomer who does live in the woods once said “don’t let perfection be the enemy of progress when it comes to privacy and freedom”

  • @vsynk-hk3ph
    @vsynk-hk3ph 2 ปีที่แล้ว +1

    Ah yes the only thing people use this for is watching stuff

  • @МаксимСтојановић
    @МаксимСтојановић 2 ปีที่แล้ว +1

    i have liked the video after hearing the first sentence, great job man

  • @xorsirenz
    @xorsirenz 2 ปีที่แล้ว +3

    pro tip, use tailsOS inside QubesOS thats ran on a persistent USB.

    • @adamwallwork6120
      @adamwallwork6120 2 ปีที่แล้ว

      This isnt a pro tip. Tails is meant to be used as a live OS not in a VM. Qubes lets you make ‘disposable’ VM’s so in this case a “pro tip” would be to create a disposable whonix workstation VM.

    • @xorsirenz
      @xorsirenz 2 ปีที่แล้ว

      @@adamwallwork6120 guess you dont know the best way to protect yourself downloading malware for RE on the dark web then.. lol

    • @adamwallwork6120
      @adamwallwork6120 2 ปีที่แล้ว

      @@xorsirenz ignornace doesn’t = Intelligence or competence. If you understood Qubes-Whonix you would not say that “lol”.

    • @xorsirenz
      @xorsirenz 2 ปีที่แล้ว

      @@adamwallwork6120 someone sounds like they get mad easily over the internet. Keep being a warrior! Hold those overly aggressive opinions and try to get defensive on TH-cam comments. I love that for you!

    • @joehephwer1299
      @joehephwer1299 2 ปีที่แล้ว

      @@xorsirenz what's RE?

  • @momomaniac1234
    @momomaniac1234 2 ปีที่แล้ว

    in my opinion Kodashi Linux offer more privacy apps and options

  • @solarwolf678
    @solarwolf678 2 ปีที่แล้ว +1

    I have a secondary usb with tails on it all the time

  • @srivathsansudarsanan3372
    @srivathsansudarsanan3372 2 ปีที่แล้ว +1

    Congrats DT you successfully triggered all tor users by going maximised

    • @adamwallwork6120
      @adamwallwork6120 2 ปีที่แล้ว

      Thanks to letterboxing which is built into the browser you can full screen your browser with no issue. Letterboxing is the empty white boarder you see around the window.

  • @starblaiz1986
    @starblaiz1986 2 ปีที่แล้ว +1

    "If you have nothing to hide, you have nothing to fear"

    • @demonking86420
      @demonking86420 2 ปีที่แล้ว +1

      Or how about having the government or private entities physically be in your bedroom or personal quarters where they can see your every action

    • @biggusdickus269
      @biggusdickus269 2 ปีที่แล้ว

      I would say "better safe than sorry" 😅 as a reply to that phrase

  • @yannrampitsch6678
    @yannrampitsch6678 2 ปีที่แล้ว +2

    i'm the second view!!!

  • @hoterychannel
    @hoterychannel 2 ปีที่แล้ว

    Why ip of tor nodes are public available? They was blocked just in one click, so for not available without not-public bridges... But anyway, many of them blocked by dpi so...

  • @GreyDeathVaccine
    @GreyDeathVaccine 2 ปีที่แล้ว

    Too bad you didn'tmention that if your life depend on it, you could combine power of TOR with VPN (Onion over VPN).
    Donated in the past, will add that on my weekend to do list.

  • @GuyWhoChad
    @GuyWhoChad 2 ปีที่แล้ว

    Meanwhile Vladimir Putin be like : thanks USA-tshirt comrade, thanks...

  • @PhilParadis
    @PhilParadis 2 ปีที่แล้ว

    PGP/GPG don’t use pre-shared symmetric keys; that’s the whole point of it. A lot of media orgs and journalists publish their public keys on their official web sites to make it easy to send them a secure message with no prior arrangements.

  • @AndyDavis007
    @AndyDavis007 2 ปีที่แล้ว +1

    No comment is better left unSAiD

  • @jasperzanjani
    @jasperzanjani 2 ปีที่แล้ว +1

    Tor is a great solution for other countries but if you think Tor will anonymize your traffic while conducting criminal or espionage activity in the US you are gravely mistaken

    • @adamwallwork6120
      @adamwallwork6120 2 ปีที่แล้ว

      To date the US government has not broken tor so any use even misuse wont get you caught simply through network usage. Other investigative techniques will be used other than simply looking for the users IP.

    • @user-he4ef9br7z
      @user-he4ef9br7z 2 ปีที่แล้ว

      Plenty of well known criminal sites work on Tor. But yes it's not a 100% secure. It's more of a cat and mouse game.

    • @jasperzanjani
      @jasperzanjani 2 ปีที่แล้ว

      @@adamwallwork6120 you need to read more

  • @duffelo
    @duffelo 2 ปีที่แล้ว

    Don't know if it's just me but your video looks kind of yellow and audio "feels" a bit unusual. Anyway appreciate your Content!

  • @CoasterMan13Official
    @CoasterMan13Official 2 ปีที่แล้ว

    Now you're finally covering the drunk step-dad os.

  • @koosschutter1675
    @koosschutter1675 2 ปีที่แล้ว

    I don't think it is just other countries that have this issue. I think censorship and persecution is being made more popular worldwide. I believe that it was on the same show where the Canadian prime minister called a certain group of people names, that a boy said that these people should be jailed and a young girl said that all their possessions should be taken, and then the audience applauded. But I just came here because I already have Batocera on one usb and was wandering what I could do with another empty usb.

  • @nelsono4315
    @nelsono4315 2 ปีที่แล้ว +1

    Thanks for this video!

  • @xtilakx
    @xtilakx 2 ปีที่แล้ว

    GURU Ji Namaskar from India-You are the 1, unlike rest of us>

  • @AlucardNoir
    @AlucardNoir 2 ปีที่แล้ว

    Your machine is not secure either. Open source doe not mean secure.
    EDIT. Either Tor or Mozilla added a feature that loads all pages at a default resolution and allows them to fit to windows only after the page is fully loaded. Given how web pages comunicate with servers this means that any site you visit would think you're on a given resolution indifferent of what resolution you would be using.

  • @knutblaise9437
    @knutblaise9437 2 ปีที่แล้ว

    Is there a way to make a flash drive read only? I'm thinking of an adapter you plug into a computer into which you plug in the flash drive. The adapter would somehow physically sever the physical connections used to write data to the flash drive.

  • @lemonarioi
    @lemonarioi 2 ปีที่แล้ว

    It would be great idea if you could make a video tut of how to setup a vm on gnome boxes and get them locally accessible. Host to VM and vice versa. Thank you.

  • @themroc8231
    @themroc8231 2 ปีที่แล้ว

    Hey DT! You never did a video on Cubes OS. Is it because you' re not interested in it? If so why is that?

  • @PauloConstantino167
    @PauloConstantino167 2 ปีที่แล้ว

    dt is over. he became a proprietary product owned by Patreon. lol.

  • @josephbrandenburg4373
    @josephbrandenburg4373 2 ปีที่แล้ว

    19:15 I give this answer a C+
    The correct answer is "I have a right to privacy. It is not true that an honest man has nothing to hide. I do not have the obligation to let other people snoop on me."

  • @timtreichel3161
    @timtreichel3161 2 ปีที่แล้ว

    I'm by no means an expert on this subject but I don't think your statement at the beginning of the video regarding the security of VMs "A VM is only secure if the underlying host is secure and the hypervisor is free and open source software" (may not be the word to word literally quote). So first things first: open source software is NOT necessarily more secure (especially not 100% secure). Yes I understand the argument for security of open source software: "more eyes on the code" and I can see that this can lead to increased security over proprietary software. However, both proprietary software and open source software are done by humans and if the project is big enough you will probably encounter security flaws at some point. The second point of this statement, that if the host os is insecure the VM is insecure also doesn't necessarily have to be the case. I'm not an expert on VMs and OSs, but I'd imagine that in order to exploit the vulnerability of the host OS a VM needs to have an exploitable connection to the host OS. I would be very surprised if this was the case for any "serious" virtualization Software. Virtualization in the server world is a wide spread custom and I would guess that the benefit of security by having an enclosed virtual system is one of the reasons. I know for a fact that many chemistry companies (at least in Germany and probably other countries and industries too) use windows as host os and as virtual machines (often VMware). I mean obviously you can never really be sure if there are security leaks, but I would be surprised if windows and VMware did not try to do a good job in security.

    • @Anonymous4045
      @Anonymous4045 2 ปีที่แล้ว

      I mean if you're just guessing and don't have experience, why even comment?

  • @Khaleda-277
    @Khaleda-277 2 ปีที่แล้ว

    Hey DT! Can you make a video on customising IceWM

  • @nevoyu
    @nevoyu 2 ปีที่แล้ว

    In the meantime, I have converted a second machine to be a dedicated emacs machine.
    Setup my own self hosted email server, working on a new website.
    And I'm working out a whole new home network setup because I have a hatred for my current solution.
    But alas, I've actually been considering switching back to pigeon, lmao

  • @absolutelyproprietary6896
    @absolutelyproprietary6896 2 ปีที่แล้ว +1

    Kax17 enters the chat

  • @icy-spoon85
    @icy-spoon85 2 ปีที่แล้ว

    Can we please have a review of the best privacy-respecting distros for home use?

  • @0x007A
    @0x007A 2 ปีที่แล้ว

    The are public key servers available which make sharing your public key with other people.

  • @Itreallydoesnotmatter-p9o
    @Itreallydoesnotmatter-p9o 2 ปีที่แล้ว

    your white balance is off 🤣
    great video as always :)

  • @agyemanboaten4385
    @agyemanboaten4385 2 ปีที่แล้ว

    What about Mac addresses?

  • @Sharp931
    @Sharp931 2 ปีที่แล้ว +1

    Whonix is my fav in this category.

  • @byrongilbert3720
    @byrongilbert3720 2 ปีที่แล้ว

    its great that the trumpsters dont know bout this. yeay for windows.

  • @utubepunk
    @utubepunk 2 ปีที่แล้ว

    Are you sure you're not ETA Prime?? Just between you and me.

  • @jongangloff8076
    @jongangloff8076 2 ปีที่แล้ว

    The Absolute Invisible Lurking Server.
    makes sense to me.

  • @alexdelarge9425
    @alexdelarge9425 2 ปีที่แล้ว

    You're just now getting around to covering Tails? LOL

  • @windowsxseven
    @windowsxseven 2 ปีที่แล้ว

    what about being anonymous offline mr. distro tuba

  • @nosuchthing8
    @nosuchthing8 2 ปีที่แล้ว +1

    I bet the NSA has backdoors into tails

    • @tailsorange2872
      @tailsorange2872 2 ปีที่แล้ว +1

      NSA doesn't need to put backdoors into the TAILS operating system. It only needs to compromise the TOR network - The network that the system is using.
      Which is easier to compromise? A pail, or the river that the pail is getting water from? I think you get the point.

    • @nosuchthing8
      @nosuchthing8 2 ปีที่แล้ว

      @@tailsorange2872 fantastic post. But my original intuition was correct in essence.

    • @tailsorange2872
      @tailsorange2872 2 ปีที่แล้ว

      @@nosuchthing8 True - but uh, if it's compromised, Edward Snowden wouldn't be able to use it.

  • @rubberduckey5630
    @rubberduckey5630 2 ปีที่แล้ว

    Instead of a persistent volume since using Tails you are already trading convenience for privacy i would think that using a separate encrypted USB would be better from a privacy standpoint. Then if you wanted to add back a layer of convenience back, on the encrypted drive write a simple BASH script to mount the directories where they would be used.
    If anyone has a reason that this wouldn't be a good idea please let me know, I'm always looking for other ways to do things.

    • @RTPTechTips
      @RTPTechTips 2 ปีที่แล้ว

      compartmentalizing disks from one another gives you more option to store them separately.. Only a good thing. I went over some of this idea in a not long ago Tails install persistence video. Nice addition on the bash scripts. :)

  • @stacksmasherninja7266
    @stacksmasherninja7266 2 ปีที่แล้ว

    Sorry for being naive, but won't my MAC address still be logged via this ?

    • @adamwallwork6120
      @adamwallwork6120 2 ปีที่แล้ว

      @en svart melon its enabled by default.

  • @fluca1978
    @fluca1978 2 ปีที่แล้ว

    reminds me knoppix

  • @amiraloi1694
    @amiraloi1694 2 ปีที่แล้ว

    Gnome 40 is out, anyone likes to check it out?

  • @noe_calles
    @noe_calles 2 ปีที่แล้ว

    I use kodachi, what is the difference with Tails?

  • @afanhaqulfadillah6992
    @afanhaqulfadillah6992 2 ปีที่แล้ว

    Then people using Tails to login to their google account

  • @arkvsi8142
    @arkvsi8142 2 ปีที่แล้ว

    I wane TailsOS to run Skyrim

  • @jackfrog
    @jackfrog ปีที่แล้ว

    Great video

  • @phoenixbyrd79
    @phoenixbyrd79 2 ปีที่แล้ว

    Needs an arm version for raspberry pi 4!

  • @xarisfil58
    @xarisfil58 2 ปีที่แล้ว

    I think it may be nice for sandbox

  • @source8093
    @source8093 2 ปีที่แล้ว

    Nice. Merry Christmas DT.

  • @mark8200
    @mark8200 2 ปีที่แล้ว

    Could maybe add somthing related to the signal protocol for Internet messaging ? As a replacement to pidgin

    • @adamwallwork6120
      @adamwallwork6120 2 ปีที่แล้ว

      A replacement for pidgin would be dino/gajim. Signal and telegram are terrible. Using your phone number is a bad idea for opsec. Using a jabber/xmpp server is far superior. These servers dont require any personal information to register an account.

  • @thgreenshaman8503
    @thgreenshaman8503 2 ปีที่แล้ว

    The luks got you looking golden today DT

  • @AndersJackson
    @AndersJackson 2 ปีที่แล้ว

    Notice that Thor only hide where you are surfing from. But it doens't protect the contents. So you STILL need to encrypt your communications. That is a common missconception, that just because your IP is protected your data is. But no, it isn't. Some protocol even send you login name and IP address. So you need to encrypt the transfer.

    • @thesoulsender
      @thesoulsender 2 ปีที่แล้ว

      I’m pretty sure tor encrypts and isn’t just a glorified proxy chain. Even if it didn’t, most websites are HTTPS and encrypted now anyways.

    • @BrunodeSouzaLino
      @BrunodeSouzaLino 2 ปีที่แล้ว

      And this is the marketing model of every single popular VPN service out there.

    • @thesoulsender
      @thesoulsender 2 ปีที่แล้ว

      @@AndersJackson no that’s wrong. It encrypts from your computer to the exit node so whatever sever you are reaching will not be encrypted traffic

  • @jasondrummond9451
    @jasondrummond9451 2 ปีที่แล้ว

    Is it possible to configure a persistent volume on another USB stick - other than the one tails is on?

  • @iii-ei5cv
    @iii-ei5cv 2 ปีที่แล้ว

    Perfect for my trolling needs

  • @DaKingof
    @DaKingof 2 ปีที่แล้ว

    Tor has been comprimised.

  • @carlobucosse5458
    @carlobucosse5458 2 ปีที่แล้ว

    Ay man this looks pretty good man

  • @jordixboy
    @jordixboy 2 ปีที่แล้ว

    hey! what are those random "images" when you launch a terminal? how can i get those?

    • @GreyDeathVaccine
      @GreyDeathVaccine 2 ปีที่แล้ว

      learn bash scripting + fancy tools
      look for awesome cli apps

    • @jordixboy
      @jordixboy 2 ปีที่แล้ว

      @@GreyDeathVaccine bro, im a software engineer I dont need to learn bash, I am bash. I asked because I know this is a package, thanks anyway, already found the package.,

  • @NofarahTech
    @NofarahTech 2 ปีที่แล้ว +3

    what you said about maximizing tor browser is not correct, did you notice the grey borders around the main page, that is because tails team customized the browser to maintain the page size when maximized like mental outlaw did in one of his videos

    • @adamwallwork6120
      @adamwallwork6120 2 ปีที่แล้ว

      The boarders around your window is called ‘letter boxing’ and was implemented by the tor project.

  • @blankdash_8087
    @blankdash_8087 2 ปีที่แล้ว

    Qubes is good.