Interesting I never heard of Tails before. It looks like a solid offering.
I'm never too concerned about my own computer, but I'm more concerned about airports wifi and other providers... The computer itself and the software I run on it is "as good as I can have".
Related question... How safe is Tor? I realised it's a deep question but have at it... Is it really untraceable? even DNS? is MiM a risk? Is using such a protocol automatically put you in the naughty shadowy corners of the internet? And is there a good spec (easy to read) that explains how it's built?
Tor is not untraceable, but neither does it need to be. If you download a 10Gb file, there is very little Tor can do to prevent the bandwidth graph correlation of 10Gb going up at the exit node and 10Gb coming down from your guard node. It's not magic. However, used optimally (browsing relatively small pages over a long period of time, avoiding transferring large amounts of data, using onion sites where possible), the deterrent it adds is sufficient for the NSA to state that "we will never be able to track 100% of Tor users 100% of the time". TAILS is described as a "CNE (computer network exploitation) nightmare". Mitm is a risk if you're browsing clearnet sites, and exit nodes regularly try to run SSL stripping attacks. You just have to use a different circuit until it works. It's not perfect, but under no circumstances are you worse off with Tor than without it, so I use it for as much of my browsing as I can manage. Really, the primary threat arises not from Tor's security model, but from the number of websites that are completely non functional without javas****t garbage. Plain text websites will stop loading """for your security""". In the 3rd security level, with scripts fully disabled, TAILS is one of the most robust solutions I'm aware of, with Whonix deserving a honorary mention.
> In the 3rd security level, with scripts fully disabled, TAILS is one of the most robust solutions I'm aware of, with Whonix deserving a honorary mention.
Tails and Whonix have different use cases. Whonix is meant to be a persistent OS that provides anonymity. If you're installing an anonymous OS to your laptop as your daily driver, Whonix is your pick.
Tails is amnesic, meaning once shut down it forgets everything. Tails runs in RAM only, so everything is destroyed on shutdown. Should your Tails disk be confiscated, the only thing that can be found is that Tails is installed. If you want to use an anonymous OS without digital evidence Tails is the better option.
What actually is the difference between .onion sites and clearnet ones? I understand Tor but I've never really looked into what's different about .onion
I'm never too concerned about my own computer, but I'm more concerned about airports wifi and other providers... The computer itself and the software I run on it is "as good as I can have".
Related question... How safe is Tor? I realised it's a deep question but have at it... Is it really untraceable? even DNS? is MiM a risk? Is using such a protocol automatically put you in the naughty shadowy corners of the internet? And is there a good spec (easy to read) that explains how it's built?