331
Security / Re: Let's talk about security
« on: August 14, 2013, 09:28 pm »These rankings seem to be biased towards systems that maximise security for individuals who will predominantly be committing their offences from a single location and/or using the same network repeatedly. More bluntly, people sitting at home ordering their drugs to be delivered to their door While the set-ups you've described are brilliant, they're also involved and unwieldy, inelegant.
You're absolutely right. The first 5 setups are beyond the capabilities of the vast majority of people, but I've listed them because they really are the most secure. So now you have a fun challenge. Can you convert an old laptop into a Whonix Gateway, or install PORTAL on your router? If you never try anything hard, how will you ever grow?
In any case, I think Whonix on a Linux host or Tails with persistent bridges are safe enough for most people, and within their capabilities to setup. Either of these options is much safer than running TBB on Windows, which is what most people do right now. I want to lift the collective security of the community, and I've given them a variety of options.
Quote
I prefer Tails as not only is it a secure OS, but it's a means of encouraging secure behaviour. Used as recommended, the lack of persistent entry guards isn't really an issue. Used as recommended, I believe, tor bridges may be less safe, at best redundant, as you would want to randomise them as much as possible, also. Spoof your mac address, briefly access random networks to conduct your business, ram wiped, away you go. Easy as...
If by "used as recommended" you mean used as a mobile operating system where you log on to different, random wifi spots, then you're correct, your bridges should be different each time so you aren't linked to other logons (of course, you should randomize your MAC address in that case too, which unfortunately Tails doesn't give you an option to do during boot).
However, the vast majority of Tails users in this community don't use it as a mobile OS. They repeatedly connect from home. In that case, you want persistent entry guards, because choosing different ones all the time increases the chances that you pick a malicious node.