Tails (operating system) explained

Tails
Developer:The Tails Project
Family:Linux (Unix-like)
Source Model:Open source
Working State:Active
Marketing Target:Personal computers
Language Count:33
Kernel Type:Monolithic
Userland:GNU
Ui:GNOME 43
Updatemodel:Tails Upgrader[1]
Preceded By:Incognito
Package Manager:APT (front-end), dpkg
Supported Platforms:x86-64[2]
License:GNU GPLv3

Tails, or "The Amnesic Incognito Live System", is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity against surveillance. It connects to the Internet exclusively through the anonymity network Tor. The system is designed to be booted as a live DVD or live USB and never writes to the hard drive or SSD, leaving no digital footprint on the machine unless explicitly told to do so. It can also be run as a virtual machine, with some additional security risks.[3]

The Tor Project provided financial support for Tails' development in the beginnings of the project, and continues to do so alongside numerous corporate and anonymous sponsors.

History

Tails was first released on June 23, 2009. It is the next iteration of development on Incognito, a discontinued Gentoo-based Linux distribution. The original project was called Amnesia. The operating system was born when Amnesia was merged with Incognito.[4] The Tor Project provided financial support for its development in the beginnings of the project.[5] Tails also received funding from the Open Technology Fund, Mozilla, and the Freedom of the Press Foundation.[6]

Laura Poitras, Glenn Greenwald, Bruce Schneier and Barton Gellman have each said that Tails was an important tool they used in their work with National Security Agency whistleblower Edward Snowden.[4] [7] [8] [9]

From release 3.0, in 2017, Tails requires a 64-bit processor to run.[10]

Features

Tails's pre-installed desktop environment is GNOME 3. The system includes essential software for functions such as reading and editing documents, image editing, video watching and printing. Other software from Debian can be installed at the user's behest.[11] [12] Despite being open-source, Tails contains non-free firmware blobs.[13]

Tails includes a unique variety of software that handles the encryption of files and internet transmissions, cryptographic signing and hashing, and other functions important to security. It is pre-configured to use Tor with multiple connection options. It tries to force all connections to use Tor and blocks connection attempts outside Tor. For networking, it features a modified version of Tor Browser with the inclusion of uBlock Origin,[14] instant messaging, email, file transmission and monitoring local network connections for security.[12]

By design, Tails is "amnesic". It runs in the computer's random access memory (RAM) and does not write to a hard drive or other storage medium. The user may choose to keep files, applications or some settings on their Tails drive in "Persistent Storage". Though the Persistent Storage is encrypted by default, it is not hidden and detectable by forensic analysis.[15] While shutting down, Tails overwrites most of the used RAM to avoid a cold boot attack.[16]

Security incidents

In 2014 Das Erste reported that the NSA's XKeyscore surveillance system sets threat definitions for people who search for Tails using a search engine or visit the Tails website. A comment in XKeyscore's source code calls Tails "a comsec mechanism advocated by extremists on extremist forums".[17] [18]

In the same year, German: [[Der Spiegel]] published slides from an internal National Security Agency presentation dating to June 2012, in which the NSA deemed Tails on its own as a "major threat" to its mission and in conjunction with other privacy tools as "catastrophic".

In 2017, the FBI used malicious code developed by Facebook, identifying sexual extortionist and Tails user Buster Hernandez through a zero-day vulnerability in the default video player. The exploit was never explained to or discovered by the Tails developers, but it is believed that the vulnerability was patched in a later release of Tails. Hernandez had eluded authorities for a long time; the FBI and Facebook had searched for him with no success, and resorted to developing the custom hacking tool. He was arrested in 2017, and in 2021 he was sentenced to 75 years in prison.[19]

See also

Notes and References

  1. Web site: Tails - Incremental upgrades. tails.boum.org. June 15, 2017. December 1, 2017. https://web.archive.org/web/20171201033355/https://tails.boum.org/contribute/design/incremental_upgrades/. dead.
  2. Web site: Tails - System requirements. tails.boum.org.
  3. Web site: Running Tails in a virtual machine . . tails.boum.org . 20 September 2021 .
  4. Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA . Finley . Klint . 14 Apr 2014 . WIRED . 18 Apr 2014 .
  5. Web site: Finances. Tails. 13 May 2013. 4 April 2013.
  6. Web site: Tails report for May, 2014. Tails. 14 Jun 2014. July 6, 2014. July 1, 2014. https://web.archive.org/web/20140701134844/https://tails.boum.org/news/report_2014_05/index.en.html. dead.
  7. Web site: Help Support the Little-Known Privacy Tool That Has Been Critical to Journalists Reporting on the NSA . Timm . Trevor . 2 Apr 2014 . Freedom of the Press Foundation . 18 Apr 2014 .
  8. Web site: Try the Super-Secure USB Drive OS That Edward Snowden Insists on Using. Condliffe. Jamie. 15 Apr 2014. Gizmodo. 15 Apr 2014.
  9. Web site: Air Gaps - Schneier on Security . 2023-08-03 . www.schneier.com.
  10. Web site: Tails - Tails 3.0 is out. tails.boum.org. 14 June 2017. May 22, 2019. https://web.archive.org/web/20190522152235/https://tails.boum.org/news/version_3.0/index.en.html. dead.
  11. Web site: APT repository. 7 October 2019. tails.boum.org. 7 October 2019. https://web.archive.org/web/20190925050831/https://tails.boum.org/contribute/APT_repository/. 25 September 2019. live.
  12. Web site: Features and included software. 7 October 2019. tails.boum.org. 7 October 2019. https://web.archive.org/web/20190823092502/https://tails.boum.org/doc/about/features/index.en.html. 23 August 2019. live.
  13. Web site: Explaining Why We Don't Endorse Other Systems . live . https://web.archive.org/web/20230622234047/https://www.gnu.org/distros/common-distros.html . 2023-06-22 . 2023-06-23 . www.gnu.org.
  14. Web site: Browsing the web with Tor Browser . live . https://web.archive.org/web/20220208114930/https://tails.boum.org/doc/anonymous_internet/Tor_Browser/index.en.html#expand . 2022-02-08 . 2022-03-16 . tails.boum.org.
  15. Web site: Tails - Creating and configuring the Persistent Storage. tails.boum.org. October 7, 2019. October 7, 2019. https://web.archive.org/web/20191007142456/https://tails.boum.org/doc/first_steps/persistence/configure/index.en.html. dead.
  16. Web site: Tails - Memory erasure. tails.boum.org.
  17. Web site: NSA targets the privacy-conscious . J. . Appelbaum . Jacob Appelbaum . A. . Gibson . J. . Goetz . V. . Kabisch . L. . Kampf . L. . Ryge . DasErste.de . 3 Jul 2014.
  18. Web site: NSA Targets Privacy Conscious for Surveillance. Bruce Schneier. Schneier on Security. 3 Jul 2014.
  19. News: Facebook Helped the FBI Hack a Child Predator . . 10 Jun 2020 . Lorenzo . Franceschi-Bicchierai.