You are viewing a single comment's thread from:

RE: Lets have a talk about how safe you really feel on the internet... #foxacid

in #life8 years ago

I have been using Tails. It was really easy to setup and if you clone the OS you can run an encrypted persistant storage and secure all your files and App data. Also the OS leaves no trace the only strorage used is your RAM.

Sort:  

I read somewhere that it was compromised, will have to find the source.

There were some security holes in version 2.6. The 2.7 update resolved all of the issues.

Has to do with all of the exit nodes being comprimised...

http://www.makeuseof.com/tag/priority-wretched-hive-scum-villainy-5-ways-stay-safe-bad-tor-exit-nodes/

Mononymous Swedish security researcher “Chloe,” developed a clever technique for tricking corrupt nodes into outing themselves. Basically, it works like this: Chloe set up a website, using a legitimate-looking domain names and web design, to serve as a honeypot. For this specific test, she created a domain intended to resemble a Bitcoin merchant. She then downloaded a list of every exit node, logged onto Tor, and used each exit node in turn to log into the site, using a unique account specific to the exit node in question.

Then she sat back and waited for a month. Any nodes that were attempting to steal login credentials would see her login, steal her user name and password, and attempt to use it. Her honeypot websites would notice the multiple login attempts, and make a note. Because the passwords are unique to each node, Chloe can pin down exactly which node took the bait.

The results of the experiment are interesting. Of about 1400 exit notes, 16 attempted to steal the password and log in. This number isn’t too alarming on the face of it, but there are a few facts it’s worth remembering.

Coin Marketplace

STEEM 0.16
TRX 0.15
JST 0.030
BTC 59106.19
ETH 2538.36
USDT 1.00
SBD 2.37