×

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

How Tails Does What it Does

TyperTech

Regular Member
Joined
Feb 26, 2024
Posts
44
Reaction score
0
Status
Offline
Last Seen
How Tails does its job.



Tails is a specialized live Linux Distro aimed at privacy and anonymity.
It does this job by forcing all traffic to go through the Tor network. This is called ]Tor Enforcement.

Thereby leaving no trace on local storage devices. (Unless the user explicitly requested so: the case of permanence.

Tails heavily relies on Tor for its anonymity and communications.

Once a circuit has been established, several different kinds of communication can be exchanged and different sorts of applications can be deployed over the Tor network.

Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connections’ source and destination.

For efficiency, the Tor software uses the same circuit for connections that happen, earlier, within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.

Tails gets its security updates from Debian’s repositories — it is still important to run sudo apt-get update && sudo apt-get upgrade -y.

Tor’s slow web surfing speed comes from its additional protection and configuration.

Tails is protected against memory recovery; on shutdown or when the drive is ejected, the computer’s memory is wiped. When the memory process is triggered, a new Linux kernel is trigged with kexec and all free memory is overwritten once with zeros.

This way, each part of the memory is either overwritten by loading the new kernel or erased explicitly once the new kernel is loaded.

Second, the memory exposure process is triggered when the boot medium is physically removed during runtime. This is implemented by a custom udev-watchdog program that brutally invokes the memory erasure procedure, bypassing all other scripts.

Tails has configured its firewall to drop incoming packets by default and to forbid queries to DNS resolvers on the LAN.

The developers are really serious about security, as you can see, with their highest concern being leakage of any kind.
 
Top