Silk Road forums

Discussion => Security => Topic started by: Fallkniven on January 29, 2013, 07:59 pm

Title: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on January 29, 2013, 07:59 pm
READ ME!!! I'M IMPORTANT!!! ***>>> Pendrivelinux Universal USB Installer has a new "persistence" feature in the latest version (1.9.3.6). I have not tried this with Tails yet, as such I will not entertain any questions on how to go about using it until I am satisfied my own knowledge of it is sound. Thanks for your patience and understanding, also, If you have successfully used this "persistence" feature in UUI while installing Tails, let us know what happened. <<<***



Tutorial Part 1 - How to install Tails onto a USB drive.
-------------------------------------------------------------------

Tails stands for "The Amnesiac Incognito Live System". Tails is a live system that aims at preserving your privacy and anonymity. It helps you to use the Internet anonymously almost anywhere you go and on any computer but leave no trace using unless you ask it explicitly. It is a complete operating-system designed to be used from a DVD or a USB stick independently of the computer's original operating system. It is free software and based on Debian GNU/Linux.

Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. Tails relies on the Tor anonymity network to protect your privacy online: the pre-installed software is configured to connect through Tor, and direct (non-anonymous) connections are blocked.

Tails is being constantly updated for security flaws - you WILL need to do this all over again soon to stay safe! This comes from the Tails website - "It's very important to keep your version of Tails up-to-date, otherwise your system will be vulnerable to numerous security holes. The development team is doing its best to release new versions fixing known security holes on a regular basis."

You will need 2 x 8GB USB thumb drives (4GB may pass), they are very cheap and available almost everywhere.


*** Update: Meatgrinder has posted steps on how to install Tails to a DVD first, then onto a USB from there. Thanks! ***
*** Update #2: Vegeta has offered a way to install Tails to USB with the use of a virtual machine. Thanks! ***
*** If any of the links do not work, please PM me and I will update them for you! ***
*** All of the following links can and should be downloaded through the Tor network! ***

1 - Download the latest version of the Tails .iso file from here - remember where you save it (latest stable version: 0.19) -
https://tails.boum.org/download/index.en.html

1a - If you are an advanced user, you can download the cryptographic signature on this same page and then verify the download with the Tails key from here -
https://tails.boum.org/tails-signing.key

2 - Download the latest version of the Linux Universal-USB-Installer from here (latest stable version: 1.9.3.6) -
http://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/

3 - Run the newly downloaded Universal-USB-Installer

   3a - Read and 'agree to' the disclaimer

   3b - Select "Tails" from the first drop-down list, it's towards the end of the list (step 1)

   3c - Browse to and select the Tails .iso file (step 2)

   3d - Select your USB drive letter (format the drive if its not empty already) (step 3)

   3e - Click 'Create' button then wait for it to finish. Will be a few minutes at least.

4 - Restart the computer and boot into Tails from the USB drive (see below for details on Booting from a USB drive)

**** (Steps continue in the next post!) ****


Booting from a USB drive:
-------------------------------------
If it does not automatically boot to the USB drive, you need to select the boot order, some newer computers will allow you to select which drive to boot to with a small menu, without changing BIOS settings.  You might instead need to edit the BIOS settings, restart your computer, and watch for a message telling you which key to press to enter the BIOS setup. It will usually be one of F1, F2, DEL, ESC or F10. Press this key while your computer is booting to edit your BIOS settings. You need to edit the Boot Order. Depending on your computer you should see an entry for 'removable drive' or 'USB media'. Move this to the top of the list to force the computer to attempt to boot from USB before booting from the hard disk. Save your changes and continue.

Many Flash Drives ship USB-FDD formatted and some systems will not detect or even boot USB-FDD. Most systems can however boot USB-ZIP, and or USB-HDD. If you are having a hard time getting your BIOS to detect your flash drive, you can try to format it as USB-HDD or USB-ZIP using the BOOTICE program (or similar).
(Caution - this is a very advanced program! Use with caution - follow links for the latest version) http://www.pendriveapps.com/bootice-partition-flash-drive-edit-boot-sector/

For more detailed instruction on how to boot from USB you can read
http://pcsupport.about.com/od/tipstricks/ht/bootusbflash.htm

If you have problems accessing the BIOS, read this
http://www.pendrivelinux.com/how-to-access-bios/

Any other questions, ask away. or PM.  ;D

I will not accept donations for this tutorial, I offer this only in hope that more people will start using Tor. If you have excess bitcoins you feel like donating to a worthy cause, please send them to Tor or Tails...
https://www.torproject.org/donate/donate.html.en
https://tails.boum.org/contribute/how/donate/#bitcoin

Next up: Installing a Persistent Volume alongside a LiveUSB copy of Tails (this is why you need TWO USB drives)
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB drive.
Post by: Fallkniven on January 29, 2013, 08:15 pm
Tutorial Part 2 - Setting up a LiveUSB version of Tails, then an Encrypted Persistent Volume.
-------------------------------------------------------------------------------------------------------------------
You may want to print this text out on paper for easier reference.
 

*** (Continued from first post!) ***
 
5 - You should now be presented with a log in prompt for a temporary session administration password - this is reset every time you load Tails, it is optional to enter this, it is used to allow current session access to system functions, if you get any errors about access rights try using an admin password at log in. Also at this point you can optionally select to use a Windows XP camo 'skin' to make Tails look more like XP if you're in a public place for example, this is also optional.
 
7 - Once Tails is up and running, insert the second USB drive. Click the 'Applications/Accessories' menu, then highlight 'Tails', then click 'Tails USB Installer'.
 
    7a - Click the 1st option "Clone & Install"
     
    7b - Select your target device from the drop-down menu (your second USB drive!)
     
    7c - Click 'Next', then wait for it to finish (however long to copy about 1gb to a USB drive - usually a few minutes). This will install a new copy of Tails onto your second USB drive, this will be your new proper Tails USB.
     
8 - Shutdown this session of Tails with the Power Button up in the right-hand corner. Don't forget to take out the FIRST USB you created and BOOT INTO THE NEW SECOND TAILS USB! You can format the first USB drive later on, that copy of tails is no longer required.
 
9 - Log in to the new Tails USB, once logged in click the 'Applications' menu, then highlight the 'System Tools' sub-menu, then click on "Configure Persistent Volume". (The size of the persistent volume is automatically determined by how much left over space is on the USB drive after installing Tails in the previous steps.)
 
    9a - Choose your pass-phrase for the persistent volume - you will need to enter this every time you login to Tails. The persistent volume is an encrypted partition protected by a pass-phrase. Once the persistent volume is created, you can choose to activate it or not each time you start Tails. It is a good place to store sensitive materials. When choosing your pass-phrase remember that short, easily guessed pass-phrases are very easily cracked - it would take one Intel I7 2600k CPU over 200,000,000 YEARS to brute-force crack an AES-256 encrypted 32 random character pass-phrase using lowercase, UPPERCASE, 0-9 & "$p3c|4!" characters  ;) )
     
    9b - Click "Create" and wait for it to finish.
     
    9c - On completion, a window will popup allowing you to select what Tails will save in the new persistent volume automatically, internet shortcuts, PGP keys, nudie pictures, application settings etc... I recommend selecting everything.
     
10 - Close and reboot with your modem plugged in and switched on, log back into Tails with your new persistent volume.
     
11 - Make sure your modem is plugged in and turned ON! Click the 'System' menu, then highlight the 'Preferences' submenu, then click on 'Network Connections'. Now, only YOU know what type of internet connection you pay for, I cannot help you with that! My personal internet connection was amazingly simple to setup (i was quite surprised by its pre-configured setups, it has many different countries options for local telcos pre-installed).
     
Another note - Tails is PRE-CONFIGURED to go through Tor! It is pre-installed with Vidalia and a Torified browser called 'IceWeasel'. It SHOULD automatically open up when connected to the internet. If not, Use the 'IceWeasel' browser menu shortcut to get onto the Road. Also, this operating system is NOT persistent for security measures, meaning that any changes you make (that are not saved in the persistent volume) will not be saved on restarting Tails! Example is Desktop Backgrounds and general GUI appearance settings (if you manage to get these settings saved and persistent, please let us know!)
 
silkroadvb5piz3r.onion - remember it!
 
You are now finished! Feel free to click through all the menus and play with the applications, log into the SR forum and let us know you're using Tails.

You can also head over to this excellent thread by Just Chipper - "HOWTO: Install Electrum Bitcoin Wallet on Tails LiveUSB"
http://dkn255hz262ypmii.onion/index.php?topic=94939.0


Any comments, questions or criticisms are welcome  ;) 8)
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: Meatgrinder on January 31, 2013, 04:30 am
Hi Fallkniven,

I did not need 2 USB sticks to make a persistent tails, only 1.

I downloaded the tails ISO, burned it to a blank DVD, left it in the DVD tray and rebooted.

Booted into tails, hit Applications' menu, then highlight 'Tails', then click 'Tails USB Installer' then clone and install (as directed above)

It made the USB stick into a tails bootloader.

Once finished, I plugged the USB into my laptop (the above was done on my gaming/media computer) once booted into tails on my laptop, I went back to "Applications -> Tails -> Configure persistent volume, chose what I wanted, rebooted and it was done (encryption keys, password hashes etc all saved) tried it on my 3 laptops and my brothers too, all working fine with my tails USB as a persistent volume with files I made as a test. Must have done 30 or so reboots to test it :)

Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: Fallkniven on January 31, 2013, 08:10 am
Hi Fallkniven,

I did not need 2 USB sticks to make a persistent tails, only 1.

I downloaded the tails ISO, burned it to a blank DVD, left it in the DVD tray and rebooted.

Booted into tails, hit Applications' menu, then highlight 'Tails', then click 'Tails USB Installer' then clone and install (as directed above)

It made the USB stick into a tails bootloader.

Once finished, I plugged the USB into my laptop (the above was done on my gaming/media computer) once booted into tails on my laptop, I went back to "Applications -> Tails -> Configure persistent volume, chose what I wanted, rebooted and it was done (encryption keys, password hashes etc all saved) tried it on my 3 laptops and my brothers too, all working fine with my tails USB as a persistent volume with files I made as a test. Must have done 30 or so reboots to test it :)

Hey Meatgrinder :)

Glad to see you got Tails up and running, an added measure of security to your own safety is always a good thing. Thanks for also mentioning the DVD/USB method of installing Tails - a valid option for many people.

Remember to check the tails website regularly for updates and security fixes. This OS is still very young, bugs and backdoors are bound to be found out eventually and need patching. Kinda like Windows, it's always being picked apart by hackers looking for another way in, so microshit are constantly releasing updates to patch the holes.
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: thelovedragon on April 27, 2013, 05:58 am
Thanks for posting this Fallkniven.
I have managed to get tails set up on a usb stick, but without the persistent volume.

Once I get my hands on another usb stick (or a dvd that works with my burner)I will go through it all again and set one up with persistent volume.
Can't hurt to practice since I will be forced to redo it every time an update comes out anyway.

So, once you have persistent volume you can just copy pgp keys etc onto the usb stick?
Am I correctly assuming, that I need to re-copy the keys everytime I update because all data on the stick is lost every time one makes an update?

I was hoping to leave no trace of tor or encryption on my computer once I have tails all figured out.
Where do you keep your keys?

Thanks so much for your help.
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: mezzomixtor on April 27, 2013, 09:21 am
yes, the persistent volume is like a normal folder, you can copy anything you want inside it, create other folders, even install programs inside this persistent folder.

And i think the persistent folder will remain even after an update (although a back up would not be a bad idea), but i am not 100% sure about this as there was no update yet since i installed my tails on an usb stick
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: Fallkniven on April 27, 2013, 10:02 pm
So, once you have persistent volume you can just copy pgp keys etc onto the usb stick?
Correct, Tails has a built-in PGP encryption program that has a digital keyring to store all your keys in, this program can be set up to store the pgp keys on the persistent volume. It's also good practice to export your keyring/keys to a physically separate encrypted USB drive.

Am I correctly assuming, that I need to re-copy the keys everytime I update because all data on the stick is lost every time one makes an update?
I may be mistaken here but I think there may be a way to 'upgrade/update' Tails to the newer version instead of formatting and re-installing. Check out the Tails homepage for details, I have never tried this. Due to all my shit experiences with 'upgrading/updating' versions of Windows, I now prefer to do clean installs of any OS.

I was hoping to leave no trace of tor or encryption on my computer once I have tails all figured out.
Where do you keep your keys?
Tails is designed to leave no traces of its use on your computer, if set up correctly, it will do just that. I keep my keys in the encrypted persistent Tails volume and on a backup encrypted USB drive. Most of the time I just make a 1:1 bit for bit copy of the USB drive, encrypt the backup file with my PGP key and save it to another USB - full backup.

Thanks so much for your help.
No worries  8)
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: thelovedragon on April 28, 2013, 02:01 am
Fallkniven, Mezzomixtor,
thanks for the info. I'm not the most technologically adept, so a lot of this shit goes right over my head.
I've made it this far not really by understanding but by trial and error, which has then resulted in understanding (sometimes).
Your replies have filled quite a few gaps in my knowledge and understanding of how to work with tails.
People like you play no small part in keeping me safe on the road and it is much appreciated.
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: Vegeta on May 01, 2013, 01:01 am
If you don't have a DVD drive or burner or DVD's to burn, but have access to a virtual machine, you could also install tails to USB using the virtual machine.
It would go something like this:
1) Download latest tails iso from: https://tails.boum.org/download/index.en.html
2) Create a linux virtual machine and point the cd/dvd drive to the tails iso file
3) Boot the virtual machine using the tails iso
4) Insert a USB flash drive
5) Connect the USB flash drive to the virtual machine: it will disconnect from your computer and connect to the virtual machine instead
6) Go to Applications -> Tails -> Tails USB Installer
7) Click "Clone & Install"
8) Verify that the correct "Target Device" is selected by matching the size of the USB Flash Drive you inserted with what is written
9) Click "Create Live USB"
10) Click "Next"
11) Once installation is completed, click "OK"

That's it! Now you can shut off the virtual machine, and your USB flash drive can boot tails on any computer capable of booting from USB
If you want to configure a persistent volume on a virtual machine, that's also possible! Though I doubt anyone wants to do it once they have the bootable USB with tails on it. If there's any interest, I can post how to do that as well. It's a bit more involved
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: happertand on May 03, 2013, 03:43 pm
@Fallkniven

Thank you for providing the detailed tutorial, some effort you put into it! Not entirely evident from your posts but I assume this has to do with running Tor from a USB pendrive/flashdrive? I just have a few questions.

Should I follow your first post or the second one or both?

Do you have any other information regarding these procedures?

Regards
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: Ro-Jaws on May 03, 2013, 07:34 pm
Up until yesterday I scorned this thread, but now I have been forced to com crawling back! The ignominy!

I am looking to set up tails with a persistent volume BUT (and this is the tricky bit) I want to run a VM within tails (specifically whonix). I have been browsing both the tails and whonix documentation and this is my question: If I run whonix on a VM on a tails live USB will it leave a trace? The whonix documentation says that whonix shares swap space with the host OS, which in this case would be a USB = wear leveling issues.

Does tails even have swap space in the traditional sense? I'm hoping this is a non-issue that my tiny monkey brain has failed to grasp but google has failed me in this instance.

All help appriciated!
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: Fallkniven on May 03, 2013, 11:03 pm
@Fallkniven

Thank you for providing the detailed tutorial, some effort you put into it! Not entirely evident from your posts but I assume this has to do with running Tor from a USB pendrive/flashdrive? I just have a few questions.

Should I follow your first post or the second one or both?

Do you have any other information regarding these procedures?

Regards

Hey mate, everything you need to get the Tails operating system up and running on a USB drive with a persistent volume is contained in the first two posts... I have updated them regarding the numbering of steps and i've updated the latest version numbers... follow the first post, then the second post - steps 1 through 10a.

What other information would you like? Just ask...

I know my regular posts are kinda stupid sometimes, but that's me, kinda stupid sometimes... :P



Up until yesterday I scorned this thread, but now I have been forced to com crawling back! The ignominy!

I am looking to set up tails with a persistent volume BUT (and this is the tricky bit) I want to run a VM within tails (specifically whonix). I have been browsing both the tails and whonix documentation and this is my question: If I run whonix on a VM on a tails live USB will it leave a trace? The whonix documentation says that whonix shares swap space with the host OS, which in this case would be a USB = wear leveling issues.

Does tails even have swap space in the traditional sense? I'm hoping this is a non-issue that my tiny monkey brain has failed to grasp but google has failed me in this instance.

All help appriciated!

You lost me after you mentioned running a VM in Tails, sorry :(

Maybe another, more experienced forum member can offer their advice?
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: samesamebutdifferent on May 04, 2013, 02:31 am
sub'd.

Gonna give this a try later today, cheers Fallkniven great thread!
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: scout on May 04, 2013, 03:49 am
sub'd.

Gonna give this a try later today, cheers Fallkniven great thread!

Tails is great, SSBD - especially with a persistent volume!
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: 1mIcedout on May 04, 2013, 03:38 pm
Great work on the thread mate... +1

This is the only way I go on SR or SRF..

Tails live USB is simple to set up and easy to use..

Everything you need including password protected storage on one little USB stick..
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: XXXotica on May 04, 2013, 04:50 pm
Amazing thread. This should definitely be stickied! Everyone should be using LiveUSB/ LiveCDs. Many people aren't fans of the persistent aspect of it but nonetheless it should be everyones way of accessing and conducting business here.
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: Ro-Jaws on May 04, 2013, 08:35 pm

You lost me after you mentioned running a VM in Tails, sorry :(

Maybe another, more experienced forum member can offer their advice?

Thanks anyway Fallkniven, its still a great original post, as XXXotica states a live CD should be more much more widely used.

A quick point though, in the uk at least you can be forced to give access to encrypted files under threat of prison time so keep any sensitive information in the persistent folder as a hidden truecrypt volume to give you deniability. Truecrypt ships with tails but is disabled by default - at the boot screen press tab and add a space then type truecrypt, once tails starts it will be available under accessories IIRC.

If anyone is interested in installing a VM via virtualbox in tails its actually not that hard BUT be warned that you need to update the kernel headers! I can't say for sure this is all that is needed but it works enough to let me install whonix (but I haven't tried an actual OS). Once I get a USB stick big enough to hold the whole thing I'll update this.

I think that using persistence in read-only mode should stop any potential security problems but if anyone can make downloaded packages persist I would be interested to know, I cannot get virtualbox to persist!
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: Fallkniven on May 04, 2013, 08:53 pm
Thanks to the last few posters for the positive feedback, I'm glad I could help people secure their anonymity whilst being online, anything I can do to help thwart the governments efforts to oppress the people really ;)
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: happertand on May 04, 2013, 11:31 pm
Thanks Fallkniven, I'll give this a try.

I bought a 16GB drive and it has its own security software on it, could I use that in addition to the Tails setup or would you advise against that?

Rgrds
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: Fallkniven on May 04, 2013, 11:57 pm
I'd recommend just formatting any brand new USB drive, i've never needed to use any of those 'free' programs that they come pre-installed with...
Title: Re: Step-By-Step Tutorial - How to install Tails onto a USB with Persistent Volume.
Post by: samesamebutdifferent on May 05, 2013, 01:09 am
Ok has anyone tried this on a computer that comes pre-installed with windows 8?

I have followed all the instructions, created the USB and installed Tails etc and even edited the BIOS to select the USB as first in line for start-up and I can't get it to work  :(

Help!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on May 05, 2013, 01:19 am
I have not tried it with Windows 8 mate, so the computer will not boot to the USB drive? post any sort of error codes you got...

my motherboard has an option during boot - F12 brings up a Boot Load Menu which allows me to select the boot device without altering any BIOS settings, do you have that option?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: samesamebutdifferent on May 05, 2013, 01:36 am
It just comes up with a black screen with a blue box with the following error message:

"The selected boot device failed. Press <Enter> to continue."

Then if I press enter I am taken to another screen that has:

Boot Option Menu

OS boot manager
Boot from EFI File

up arrow and down arrow to change option, ENTER to select option.

Press F10 to BIOS setup options, ESC to exit.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on May 05, 2013, 09:24 pm
SSBD - Sorry for the late reply mate, I was having trouble trying to install the latest Tails - ended up in bed at about 3 this morning fucking around with it :P

First, the line that says "OS Boot Manager", is that an entry you can select? Select it if you can, then let me know what options you are given, or just try them if you think they will work.

Make sure your BIOS settings regarding Boot Load Priorities are something like the following,

1st: USB
 2nd: CD/DVD-ROM
 3rd: HDD
 4th: anything else

also make sure Legacy USB options are enabled.

this link has some excellent, well worded information:
http://www.pendrivelinux.com/usb-bios-boot-options/

quotes from link:

Newer BIOS Boot Menu:
Many newer computers detect the USB device as a hard drive (USB-HDD0). In which case, you can press a specific key (F2, F10, F11 or ESC) during system post to access the "Boot Menu". Select your USB DISK from the Boot Menu and resume startup.
Older BIOS Setup method:
If your system is a bit older or uses a simplified BIOS, you may not have a Boot Menu option. In this case you will need to make the system detect and boot your USB device by changing the settings in the BIOS.


So maybe if you have a newer computer (2009+), try changing the boot order in the BIOS settings back to what it was (typically: HDD then CD/DVD then USB) and just use only the Boot Menu to select your USB (without going into BIOS settings)


also, these links could help if still having troubles:

http://www.pendrivelinux.com/testing-your-system-for-usb-boot-compatibility/
http://www.pendrivelinux.com/recommended-usb-flash-drives/
http://www.pendrivelinux.com/booting-linux-from-usb-zip-on-older-systems/
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: White 0ut on May 05, 2013, 09:27 pm
Sub'd

Well done!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on May 05, 2013, 09:50 pm
Sub'd

Well done!

thanks mate, are you running tails?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on May 06, 2013, 12:50 am
It just comes up with a black screen with a blue box with the following error message:

"The selected boot device failed. Press <Enter> to continue."

Not sure what kind of error that is, but just in case, do you have EFI disabled?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: fullmetal on May 06, 2013, 01:12 am
Posting to subscribe / remind myself of this thread. Great work comrades, going to get on this very soon.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: White 0ut on May 06, 2013, 01:42 am
Sub'd

Well done!

thanks mate, are you running tails?

I carry a disposable laptop, strictly for SR.

It goes everywhere with me, along with a container of gasoline & a match :D
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on May 06, 2013, 04:18 am
haha cool :) there's nothing like physical destruction to make digital evidence disappear
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: AnonymousAddict on May 06, 2013, 09:26 pm
Iv never really looked into Tails much, Is it just for Linux OS?

On my Laptop with my vital info i use Truecrypt, I LOVE IT..

ON another laptop iv been playing with (DESCKCRYPTOR")<<< WHAT do you all feel about that? is it secure? Only thing i dont like about it is, u have to mount it on the comp that the program is on, its not like you can take the usb youv encrypted with it to another person house.. Only downfall i see. What if any do u feel about that program>?

Good? semi good? No Good.. I feel its semi good for the reason i stated above. Trucrypt would have to be my Fav at this point.. Thanks for any insight member. Also when responding about Diskcryptor risk the bad about it if any..
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on May 07, 2013, 12:19 am
Wiki can explain Debian GNU/Linux better than I can ;)

https://en.wikipedia.org/wiki/Debian
http://wiki.debian.org/
https://en.wikipedia.org/wiki/Linux

And i've never used DiskCryptor before so I can't comment on how it functions...
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Mcrad on May 07, 2013, 12:53 am
wondering about liberte linux vs. tails.



Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: CiscoYankerStuck on May 07, 2013, 07:07 am
wondering about liberte linux vs. tails.

I've tried them both. Love TAILS and can't stand liberte.

Personal preference though.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Mcrad on May 07, 2013, 07:20 am
wondering about liberte linux vs. tails.

I've tried them both. Love TAILS and can't stand liberte.

Personal preference though.

is there really any difference? im debating making the switch.

what does everyone think?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: CiscoYankerStuck on May 07, 2013, 07:59 am
TAILS is just way more user friendly for my purposes.

It's simple and all I need it for is surfing the darknet and encrypting messages, both of which it does very well.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: django on May 12, 2013, 11:35 am
It just comes up with a black screen with a blue box with the following error message:

"The selected boot device failed. Press <Enter> to continue."

Then if I press enter I am taken to another screen that has:

Boot Option Menu

OS boot manager
Boot from EFI File

up arrow and down arrow to change option, ENTER to select option.

Press F10 to BIOS setup options, ESC to exit.

SSBD- if you still need a fix for this pm me.

is there anyway of configuring it so that your isp company couldnt see that you are using tor?

i recently tried a VM with whonix installed on a ubuntu truecrypted drive, but it was impractical and had some user issues.however i liked the fact that it prevented your isp company from even knowing you were using tor.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Ro-Jaws on May 12, 2013, 06:56 pm
wondering about liberte linux vs. tails.

I've tried them both. Love TAILS and can't stand liberte.

Personal preference though.

is there really any difference? im debating making the switch.

what does everyone think?

As far as I know the main difference (from the users point of view) is how flexible they are. Liberte is locked down, you can only act as root for 2 minutes after booting and then only if you enable root login at the boot menu. If you want to put anything else on liberte you would have to make your own build. Liberte (used to at least) randomize your MAC address every time you booted it (though tails does have a MAC changer I think) though I vaguely remember their being some debate about how useful this feature was.


Tails allows you to add anything that can be used with debian and allows you root access for an entire session.

There are many developers for tails but only 1 for liberte - whether you think that is an issue or not I don't know but tails is certainly more widely used and presumably this means problems will be noticed and fixed quicker (hence the endless new releases).

So really it depends on what you need from the distro. I used to use Liberte but I changed to tails as it allowed me more options to try different software/tor options and so forth.

Naturally and as usual the final choice is one you have to make yourself.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on May 12, 2013, 07:04 pm
To add to the Ro-Jaws' nice list, Tails uses TorBrowser, which is used by the entire Tor community and undergoes a lot of security auditing, while Liberte rolls its own torified browser, which has comparatively little testing. How do you know it isn't leaking info about your browsing activity? I trust it a lot less.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: CHROOT on May 12, 2013, 07:46 pm
TAILS is just way more user friendly for my purposes.

That's what got me to switch. I spent all last year on Liberte.

It's basically a custom distro based off the Hardened Gentoo linux distro.

If you're extremely tech-savvy and extremely paranoid Liberte will offer the best security but it comes at a price.

TAILS is easy as fuck to use, has a GUI for everything, and has a robust development community who are constantly updating the code.

Liberte has no support, no forums, hasn't been updated since 9/1/2012, and we don't even really know about the development team. You think Satoshi or DPR are ghosts in the machine, try finding out about Maxim Kammerer, or mkdesu as he goes by.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: z3n on May 12, 2013, 08:40 pm
The whole point with Tails is that you have to trust the tails dev...

If the goal is to use it as a persistent USB system, add apps and the like, I feel like it might be better to install debian (encrypted with luks) on a USB key, with the TBB & the proper firewall rules - and take a few ideas from tails, wiping the RAM for example an getting rid of the bash history and stuff like that. You get something that's easy/safe to upgrade - and you start with the debian packages themselves, that have been audited by the community.

That's what I like with Liberte, it's that you can create your own easily. Though I didn't really like it when I did test it, and would rather use Tails (but not sure about whether I trust em or not) or good old debian...
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: CHROOT on May 12, 2013, 10:42 pm
The whole point with Tails is that you have to trust the tails dev...

Hasn't the TAILS code also been audited by the community though?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on May 13, 2013, 12:06 am
You think Satoshi or DPR are ghosts in the machine, try finding out about Maxim Kammerer, or mkdesu as he goes by.

Not sure if people realize this, but Maxim Kammerer is a pseudonym, too.

https://en.wikipedia.org/wiki/Maxim_Kammerer

I wonder why there aren't more people screaming that he's an FSB agent or something.

I've always found the anonymity community's selective application of paranoia to be curious and entertaining.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: django on May 13, 2013, 02:12 am
i notice that the latest version of tails offers obfsproxy which in theory i believe prevent isp from seeing you are even using tor? i hope i got that right.so can anyone who is tech savvy as i certainly arent answer this for me please.

so if my above statement is correct would this work in preventing my isp from seeing my tor activity?

press tab on bootup, press space write bridge at the end of the text and press enter.

this would then prompt me to set up bridge mode in tails. i got 2 obfs2 addresses off torproject. i saved them to text in my persistence file following the tutorial above which was awesome by the way.

So every time i boot into tails i press tab type bridge on boot up i enter the two obfs2 address into my network settings and off i go.

is this correct?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on May 13, 2013, 03:34 am
i notice that the latest version of tails offers obfsproxy which in theory i believe prevent isp from seeing you are even using tor? i hope i got that right.so can anyone who is tech savvy as i certainly arent answer this for me please.

so if my above statement is correct would this work in preventing my isp from seeing my tor activity?

It depends on how interested your ISP is in finding out if you're using Tor.

In most cases, using any bridge should be sufficient, since the vast majority of ISPs are not spamming the BridgeDB to identify the bridge IPs.

The purpose of an obfsproxy bridge is to defend against deep packet inspection, which is a way to fingerprint (even encrypted) connections, to determine what type of connection it is. obsproxy tries to look like another type of connection.

There may be a couple dozen countries in the world where ISPs are doing that, and the victims of this censorship are a small minority of Tor users, but Tor Project gets paid to help those people, so we have obfsproxy.

Now, the reason why I didn't give an absolute Yes answer to your question, is that apparently China is able to identify and block connections to obfsproxy bridges that use version 2 of the protocol. They've either figured out how to DPI the connection, or they blast suspicious IP addresses with random blocks of data and look at the response.

So, it is possible to identify obfs2 bridges, and it could be possible to identify obfs3 bridges in the future. I guess then they'll come up with an obfs4 protocol or something totally different. It's a never ending cat and mouse game where they try to stay one step ahead of the adversary.


But if you're in a western country, you're *probably* ok with any bridge.



So every time i boot into tails i press tab type bridge on boot up i enter the two obfs2 address into my network settings and off i go.

is this correct?

Well, you might as well go with obfs3 at this point, to future proof your setup a little. :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Ro-Jaws on May 13, 2013, 04:53 am
So every time i boot into tails i press tab type bridge on boot up i enter the two obfs2 address into my network settings and off i go.

is this correct?

You don't need to type bridges in the boot menu, tails supports obfsproxy2 bridges natively through the vidalia settings in the normal way (at least you can in 17.2). Nothing wrong with doing at boot up either, its all pretty much of a muchness.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: django on May 13, 2013, 05:00 am
i notice that the latest version of tails offers obfsproxy which in theory i believe prevent isp from seeing you are even using tor? i hope i got that right.so can anyone who is tech savvy as i certainly arent answer this for me please.

so if my above statement is correct would this work in preventing my isp from seeing my tor activity?

It depends on how interested your ISP is in finding out if you're using Tor.

In most cases, using any bridge should be sufficient, since the vast majority of ISPs are not spamming the BridgeDB to identify the bridge IPs.

The purpose of an obfsproxy bridge is to defend against deep packet inspection, which is a way to fingerprint (even encrypted) connections, to determine what type of connection it is. obsproxy tries to look like another type of connection.

There are only a handful of countries in the world where ISPs appear to be doing that, and the victims of this censorship are a small minority of Tor users, but Tor Project gets paid to help those people, so we have obfsproxy.

Now, the reason why I didn't give an absolute Yes answer to your question, is that apparently China is able to identify and block connections to obfsproxy bridges that use version 2 of the protocol. They've either figured out how to DPI the connection, or they blast suspicious IP addresses with random blocks of data and look at the response.

So, it is possible to identify obfs2 bridges, and it could be possible to identify obfs3 bridges in the future. I guess then they'll come up with an obfs4 protocol or something totally different. It's a never ending cat and mouse game where they try to stay one step ahead of the adversary.


But if you're in a western country, you're *probably* ok with any bridge.



So every time i boot into tails i press tab type bridge on boot up i enter the two obfs2 address into my network settings and off i go.

is this correct?

Well, you might as well go with obfs3 at this point, to future proof your setup a little. :)

cheers for your help, i just get paranoid about my isp seeing me sitting in tor all day, so if that helps it then i'd rather use it. i'll get some obfs3.

thanks for the advice, just got to figure out pgp on it now, i'm so use to gpa in liberte linux.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: django on May 13, 2013, 05:03 am
So every time i boot into tails i press tab type bridge on boot up i enter the two obfs2 address into my network settings and off i go.

is this correct?

You don't need to type bridges in the boot menu, tails supports obfsproxy2 bridges natively through the vidalia settings in the normal way (at least you can in 17.2). Nothing wrong with doing at boot up either, its all pretty much of a muchness.

do you mean i can just add them into my network settings in vidalia instead?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Ro-Jaws on May 13, 2013, 02:13 pm
do you mean i can just add them into my network settings in vidalia instead?

you are correct sir.

Its worth getting 3 or 4 bridge addresses though, obfsproxy bridges have a tendency to be more flaky than normal bridges.

However its no better or worse a way than you are currently using. just different
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: django on May 13, 2013, 11:47 pm
do you mean i can just add them into my network settings in vidalia instead?

you are correct sir.

Its worth getting 3 or 4 bridge addresses though, obfsproxy bridges have a tendency to be more flaky than normal bridges.

However its no better or worse a way than you are currently using. just different

cheers for this, i figured that was what you meant after i had played around with it. quite liking this this tails set up much better than the liberte linux i was using for a year. think this could be my new setup seeing as i couldnt really get the whonix set up working to my advantage.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Ro-Jaws on May 14, 2013, 02:40 am
cheers for this, i figured that was what you meant after i had played around with it. quite liking this this tails set up much better than the liberte linux i was using for a year. think this could be my new setup seeing as i couldnt really get the whonix set up working to my advantage.

No problem. I know what you mean about tails, I used to use liberte but changed to tails recently to make use of the flexibility. The main problem for me was the change from gpa. The encrypted clipboard thing annoys me so I actually went back to the terminal.

Do you mind if I ask what went wrong with whonix? I was looking to install whonix on tails but struggled with persistence. I was under the impression that whonix would work more or less out the box? what problems, precisely did you have?

[edit: damn forgot to mention what I started this post for! I would be interested to know if obfs3 bridges work with tails as I can find no mention on the tails site]
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: django on May 14, 2013, 03:07 am
cheers for this, i figured that was what you meant after i had played around with it. quite liking this this tails set up much better than the liberte linux i was using for a year. think this could be my new setup seeing as i couldnt really get the whonix set up working to my advantage.

No problem. I know what you mean about tails, I used to use liberte but changed to tails recently to make use of the flexibility. The main problem for me was the change from gpa. The encrypted clipboard thing annoys me so I actually went back to the terminal.

Do you mind if I ask what went wrong with whonix? I was looking to install whonix on tails but struggled with persistence. I was under the impression that whonix would work more or less out the box? what problems, precisely did you have?

[edit: damn forgot to mention what I started this post for! I would be interested to know if obfs3 bridges work with tails as I can find no mention on the tails site]


with regards putting bridges into tails, i have found that unless i enter bridge into the boot up option it will not save the obfs2 bridges that i saved into my persistent file, but would start tor automatically using the 127.0 etc. i dont know if i am doing something wrong as i followed the instructions to the letter but it will not automatically load the bridges that i have sourced myself. just thought i would mention that.

Also it would automatically load tor on boot up and although i entered the bridge addresses manually each time i didnt chose the bridge option on boot up,i wasnt sure if it was working properly, so figured it safer to do the bridge from start.

whonix- the way i installed this was by loading my laptop to boot with ubuntu, from there i made a truecrypt folder which stored all my SR activity.

i then installed virtual box and downloaded the gateway and station ova and saved them to my truecrypt folder. First problem was that upon booting up the virtualmachine it saw the ova files which were saved in truecrypt although would not load them. so in essence if my system was comprised they could still see the ova files.

secondly once in the whonix station i could not save any files on it from outside the virtual machine.

then there was all the hassle of trying to get kgpg working in it, plus trying to get obfsproxy and a bitcoin wallet installed on it. i still have it saved on my laptop so i am going to keep playing around with it.

imo and as i mention i am shit with computers, it would have been a good set up but i just couldn't get it to work to my satisfaction without having to use other programmes as well,for me it all got too messy.

someone who is more clued up will probably have more success and i see some do use it.so i am in no way suggesting peeps dont use it if they know what they are doing.

tbh unless i am missing something with this tails setup, by using the truecrypt option,by adding bridges and by installing electrum onto it, i hope i have a pretty save setup that prevents peeps seeing i am using tor and keeps my bitcoin save.

i have added a link about gpg in tails, in case you havent seen it.

CLEARNET---https://tails.boum.org/doc/encryption_and_privacy/gpgapplet/index.en.html

I havent found any obfs3 bridges yet either.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Ro-Jaws on May 14, 2013, 04:24 am
That's interesting about the bridges not persisting. Its not something I have ever noticed since I use a non-persistent version of tails so re-entering the bridges is par for the course. I had forgotten about it going straight into tor, which of course means you have to enter the bridges then shut down and restart vidalia to go throught them (perhaps simply switching to a new circuit would work but as you said - better safe than sorry).

Thanks for the info about whonix, especially the truecrypt thing, something to watch out for.
I think your problem with the whonix workstation was simply part of the way it is designed. Its designed to run on an unsafe machine and thus does not allow communication between the VM and the host. I expect you could override that and change the NAT settings or set a shared folder or summat but if you don't know what your doing (like me) you would likely defeat the whole point of running whonix in the first place.
On a side note I think whonix does support obfsproxy but you have to edit torcc directly.

Thanks for the link but its not that I can't use gpgapplet, just that I don't like it. Mostly because you can't see what you have encrypted - it just takes whats on the clipboard and for me the clipboard is somewhat unreliable in acknowledging what I have copied. so I might well send someone a message containing my password, a chunk of text I was interested in or the gpg commands I append to gpg.conf. Terminal lets me see both the message I started with and the finished product plus it lets me armor it at the same time. Easier all round (for me at least).

That set-up sounds pretty good to me. Seems like a good balance between security and usability for your use of SR and related activities.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: django on May 14, 2013, 06:58 am
That's interesting about the bridges not persisting. Its not something I have ever noticed since I use a non-persistent version of tails so re-entering the bridges is par for the course. I had forgotten about it going straight into tor, which of course means you have to enter the bridges then shut down and restart vidalia to go throught them (perhaps simply switching to a new circuit would work but as you said - better safe than sorry).

Thanks for the info about whonix, especially the truecrypt thing, something to watch out for.
I think your problem with the whonix workstation was simply part of the way it is designed. Its designed to run on an unsafe machine and thus does not allow communication between the VM and the host. I expect you could override that and change the NAT settings or set a shared folder or summat but if you don't know what your doing (like me) you would likely defeat the whole point of running whonix in the first place.
On a side note I think whonix does support obfsproxy but you have to edit torcc directly.

Thanks for the link but its not that I can't use gpgapplet, just that I don't like it. Mostly because you can't see what you have encrypted - it just takes whats on the clipboard and for me the clipboard is somewhat unreliable in acknowledging what I have copied. so I might well send someone a message containing my password, a chunk of text I was interested in or the gpg commands I append to gpg.conf. Terminal lets me see both the message I started with and the finished product plus it lets me armor it at the same time. Easier all round (for me at least).

That set-up sounds pretty good to me. Seems like a good balance between security and usability for your use of SR and related activities.

i know what you mean about gpg applet not 100% convinced myself on it.any chance you can give some instructions on how to use gpg in terminal? i had a look on the net but couldnt find anything useful for this.

thanks
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Ro-Jaws on May 14, 2013, 02:26 pm
sure

the basic structure for commands is always:

gpg [options][commands][filename] - you can combine various options but only 1 commands at a time

There are a couple of ways to encrypt to a given public key but I usually start with

gpg --list-keys

then

gpg --encrypt notarealfile

and then type in the name associated with the correct key

Of course there are a million extra options you can append to these commands but I have taken to adding these lines to my gpg.conf before use thanks to an extremely informative discussion about identification via ciphertext analysis elsewhere in the security forum:

throw-keyids
trust-model always
utf8-strings
no-greeting
no-emit-version
no-comments
no-mdc-warning
armor

Here is a list of the more usual commands  - http://www.gnupg.org/documentation/manuals/gnupg/Operational-GPG-Commands.html#Operational-GPG-Commands but for use on here most of them are entirely unneeded.

This does not cover importing, exporting or generating keys in the terminal because the key manager in tails is similar enough to gpa that its not worth using the terminal.

Hope that helps

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: z3n on May 14, 2013, 10:03 pm

Of course there are a million extra options you can append to these commands but I have taken to adding these lines to my gpg.conf before use thanks to an extremely informative discussion about identification via ciphertext analysis elsewhere in the security forum:

throw-keyids
trust-model always
utf8-strings
no-greeting
no-emit-version
no-comments
no-mdc-warning
armor


Thanks for sharing that, pretty precious information!

Thanks :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Ro-Jaws on May 14, 2013, 11:14 pm

Of course there are a million extra options you can append to these commands but I have taken to adding these lines to my gpg.conf before use thanks to an extremely informative discussion about identification via ciphertext analysis elsewhere in the security forum:

throw-keyids
trust-model always
utf8-strings
no-greeting
no-emit-version
no-comments
no-mdc-warning
armor


Thanks for sharing that, pretty precious information!

Thanks :)

No problem but its Pine and Astor you should be thanking for those gems! By the way, watch out with throw-keyids can cause issues if the recipient doesn't know whats going on as they get prompted over and over again for their password. Its also a little redundant for normal SR use though its certainly not without its uses for particularly sensitive messages.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: django on May 15, 2013, 07:45 am
sure

the basic structure for commands is always:

gpg [options][commands][filename] - you can combine various options but only 1 commands at a time

There are a couple of ways to encrypt to a given public key but I usually start with

gpg --list-keys

then

gpg --encrypt notarealfile

and then type in the name associated with the correct key

Of course there are a million extra options you can append to these commands but I have taken to adding these lines to my gpg.conf before use thanks to an extremely informative discussion about identification via ciphertext analysis elsewhere in the security forum:

throw-keyids
trust-model always
utf8-strings
no-greeting
no-emit-version
no-comments
no-mdc-warning
armor

Here is a list of the more usual commands  - http://www.gnupg.org/documentation/manuals/gnupg/Operational-GPG-Commands.html#Operational-GPG-Commands but for use on here most of them are entirely unneeded.

This does not cover importing, exporting or generating keys in the terminal because the key manager in tails is similar enough to gpa that its not worth using the terminal.

Hope that helps

thanks for this info going to read up on this way. :D
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on May 15, 2013, 03:36 pm
No problem but its Pine and Astor you should be thanking for those gems!

I thought that list looked familiar. :)

Here's my simplified gpg.conf, which I've winnowed down over a few years of using GPG. Some of the stuff only applies to command line GPG, but it's all designed to reduce annoyances, and make GPG easier and safer to use. You can use or modify it to your liking.

Code: [Select]
no-greeting                 # suppress the copyright notice in command line gpg
no-emit-version             # remove the version string from keys and messages
no-comments                 # remove the comment lines from keys and messages

utf8-strings                # interpret all command line arguments as UTF-8 encoded
armor                       # ASCII armor encrypted output

expert                      # allow incompatible actions
trust-model always          # suppress warnings about unsigned keys
no-mdc-warning              # suppress warnings about MDC integrity protection, since no one uses it


## Ordered lists of preferred ciphers. Your GPG will pick the first one that it supports,
## which should be the first one on each list.

personal-cipher-preferences AES256 TWOFISH CAMELLIA256 AES192 CAMELLIA192 AES CAMELLIA128 CAST5 3DES BLOWFISH
personal-digest-preferences SHA512 SHA384 SHA256 SHA224 RIPEMD160 SHA1
personal-compress-preferences BZIP2 ZLIB ZIP Uncompressed
cert-digest-algo SHA512

default-key <keyid>         # set this if you have multiple keys. newbies should not use multiple keys!
#encrypt-to <keyid>         # automatically encrypt with a specific key

## Optional

#throw-keyid                # anonymize all recipients by zeroing out the key IDs
#hidden-encrypt-to          # anonymize a specific key ID


## Use the IndyMedia key server hidden service. This prevents accidentally connecting over clearnet.
## You need an HTTP proxy like Privoxy listening on port 8118, or adjust the lines below accordingly.
## The HTTP proxy forwards to Tor's SockPort. Here's a Privoxy config for that:
## https://trac.torproject.org/projects/tor/wiki/doc/PrivoxyConfig

keyserver hkp://2eghzlv2wwcq7u7y.onion
keyserver-options http-proxy=http://127.0.0.1:8118,debug,verbose
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Ro-Jaws on May 15, 2013, 10:47 pm
It should do, its taken direct from your post to my gpg.conf file  :P

Thanks again for the info but I have a question about the last line - does that refer to the symmetric encryption function of GPG? I thought that cast5 was the default?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on May 15, 2013, 11:02 pm
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Are you talking about cert-digest-algo?

It forces a specific hash algorithm, for example the SHA512 hash on this clear
signed message. The standard is SHA1 (like in DPR's signed messages), but it is
becoming obsolete. Some PGP programs use MD5, which is retarded.

The GPG manpage does warn that you shouldn't force cert-digest-algo, because
some PGP programs don't support SHA512 for message hashing, but I say fuck em.
If your PGP program fails to verify a signed message because it doesn't support
SHA512, you need a better PGP program.

We shouldn't reduce our safety for the lowest common denominator.

-----BEGIN PGP SIGNATURE-----
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=Wy6i
-----END PGP SIGNATURE-----
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Ro-Jaws on May 16, 2013, 01:23 am
I see the problem, like a dingbat I didn't realise that the box had a scroll bar!  What I meant was the personal-cipher-preferences.

However the cert-digest-algo info was something I was shockingly ignorant about. Something else to go and learn about!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: entreterra on May 16, 2013, 04:25 am
Thanks so much for this tutorial Fallkniven!

I am currently accessing tor through my Tails USB! I'm running into a few problems/confusions however. If there is any advice anyone can offer, please, I would greatly appreciate the help!
Here are my questions:

1. I went through the steps to configure my usb for persistent volume. Upon rebooting, I was able to start tails with my persistent volume (via my passphrase) and it opened up rather quickly with no problem. However, with every subsequent reboot, I enter my passphrase to run tails with the persistent volume, and it loads for a long time at the log-in page and never opens up tails. I've only waited about 5 minutes total, but the first time  I rebooted it took only several seconds. I went ahead and deleted the persistent volume. I will reconfigure, but is it normal to wait several minutes to get through the log-in when starting tails up with the persistent volume?

2. I'm a bit confused how I can copy files into my persistent volume. When I configured, there were general choices to save things like pgp keys, network configurations, etc. I selected everything as per the Fallkniven's tutorial recommendation, but there doesn't seem to be anything saved onto the volume. How do I copy files to the volume? Can I copy anything I want, say like a word document or pictures that are on my HDD? How so?

Thanks!

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on May 16, 2013, 08:32 am
Thanks so much for this tutorial Fallkniven!

I am currently accessing tor through my Tails USB! I'm running into a few problems/confusions however. If there is any advice anyone can offer, please, I would greatly appreciate the help!
Here are my questions:

1. I went through the steps to configure my usb for persistent volume. Upon rebooting, I was able to start tails with my persistent volume (via my passphrase) and it opened up rather quickly with no problem. However, with every subsequent reboot, I enter my passphrase to run tails with the persistent volume, and it loads for a long time at the log-in page and never opens up tails. I've only waited about 5 minutes total, but the first time  I rebooted it took only several seconds. I went ahead and deleted the persistent volume. I will reconfigure, but is it normal to wait several minutes to get through the log-in when starting tails up with the persistent volume?

2. I'm a bit confused how I can copy files into my persistent volume. When I configured, there were general choices to save things like pgp keys, network configurations, etc. I selected everything as per the Fallkniven's tutorial recommendation, but there doesn't seem to be anything saved onto the volume. How do I copy files to the volume? Can I copy anything I want, say like a word document or pictures that are on my HDD? How so?

Thanks!



Good to see you got it (sorta) working, loading Tails with a persistent volume shouldn't take longer than 1 or 2 minutes at the most from power on to Tails gui. Try formatting and re-installing Tails is the only thing I could recommend as I have not had this problem before. I believe that the settings files and other information stored in the persistent volume by Tails are hidden by default, you can open up the volume just like Windows Explorer from the 'Locations' menu at the top of the screen.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: entreterra on May 16, 2013, 12:28 pm
Reconfigured and it's working now. Quite simple to see how to add files to the volume now that it's working smoothly. This is great!

Thanks again!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on May 16, 2013, 12:38 pm
:)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: mezzomixtor on May 16, 2013, 03:18 pm
i have got also a problem, my obfs2 bridges wont be saved, i have to put them in every time i reboot, and this is kind of annoying, isnt there a way that all your preferred bridges will be saved too? In my persistent volume configuration i have marked "Network Connections", i thought this would be what i was looking for, but it still wont save them :/

and although i have marked "network connections" i have to put in my network password every time i reboot, is this normal?

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on May 16, 2013, 09:01 pm
I don't think Vidalia is set up to save its settings in the persistent volume - this could be a general oversight by Tails authors, or it could be a security issue. You can check the Tails Forums to see if there are any threads on the subject. Unless someone else has found a way of making the Vidalia settings persistent, you will have to enter them manually every time :(
https://tails.boum.org/forum/

The password you mention is a temporary session administration password, allowing you access to system functions and other admin stuff, including access to addon Disks. It is reset each session for security, it is normal to have to enter it in on every boot. Try logging in to Tails without the password and go about your business, if you run into any problems you can always re-boot and use the session admin password, it is not necessary unless you specifically need admin access.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: mezzomixtor on May 17, 2013, 10:25 am
i just looked into the forums, could only find this, so it seems that there is no way to store them at the moment, just like you said! but at least its in the "ToDo"-section  ;)

Quote

Quote
It would be great to be able to have persistent Tor bridges settings.


    This makes sense. If a user wants to use only bridges to connect to the Tor network it makes sense to be able to store their bridges as a persistence option. I currently save my bridges in a text file in the persistent storage and manually enter them into Vidalia, and use the "bridge" parameter when tails first starts booting. There seem to be problems with tordate and tor not connecting quickly enough for the tordate script(s) when using bridges.


About my second question, i might have been a little bit unclear, what i meant was the password for my Home-WLan Connection! I just searched the tails-forum and found this:

https://tails.boum.org/todo/persistence_preset_-_NM_connections/

Dont understand much about this, but if i am getting this right, i have to activate the GNOME Key ring as well so that my WLan Password is going to be stored?

edit: it worked, after activating the GNOME Key ring my Wlan password is being stored as well!

and again thank you so much for this great thread!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on May 17, 2013, 11:18 am
Another success :) well done!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: upsidedownsex on May 17, 2013, 03:37 pm
I'm stuck on step 8

Every time I boot, with the second USB plugged in, it says no bootable system partition found. Nothing seems to work. All other steps completed successfully though

When I restarted the computer and plugged in the usb key to see what was on it, it doesnt come up. Not sure if that has anything to do with shit but though i Would mention.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: mezzomixtor on May 17, 2013, 04:03 pm
did you try to format the second usb-stick and reinstall it? sounds like there went something wrong during installation? just my 2 cents :S
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on May 17, 2013, 04:40 pm
I see the problem, like a dingbat I didn't realise that the box had a scroll bar!  What I meant was the personal-cipher-preferences.

However the cert-digest-algo info was something I was shockingly ignorant about. Something else to go and learn about!

I was wondering what you meant by last line, because your question had nothing to do with key server options. :)

So, I interpreted it as "the last line of the block about cipher preferences".

To answer your question, yes that changes the default from CAST5 to AES256. The ciphers are ordered by strength (ie, safety), and as you can see, CAST5 is pretty far down the list. The advantage of using CAST5 is en/decryption speed and compatibility with many encryption programs. I err on the side of safety.

Of course, as always, your encryption scheme is only as good as your password.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: entreterra on May 18, 2013, 05:26 pm
Tails v. 0.18 is out today!

I burned the new iso to a dvd and booted it. I then inserted the same usb stick that I had the previous version of tails copied on. Upon running the Tails usb installer, I choose the Clone and Upgrade option this time instead of the Clone and Install option, because I already had Tails installed on the usb. My persistent volume was maintained, just checked, all files that I copied are still there, no problems!

Was this the correct way of going about updating Tails on my usb, choosing Clone and Upgrade, or should I have choosen a different option? I notice the last option when running the Tails usb installer says: Upgrade from ISO.

It seems like with this option you would not need to burn the new version of tails onto a dvd. Couldn't you just boot the old verion of Tails from the original burned dvd that you used (or extra usb that you used), proceed to applications--> system tools --> Tails usb installer --> Upgrade from ISO --> browse --> access the downloaded new version (0.18) iso image from your hardrive --> then upgrade your usb.

One thing I notice is that if you boot into tails with the main usb that you are using and then try to 'Upgrade from ISO' with the same main usb device, you cannot choose the same usb you are running tails with as your targeted device in the tails liveusb creator window. So, to upgrade you will need two devices either way. However, is there any reason you shouldn't use the original dvd or usb that you burned with an old version of tails to boot into in order to 'Upgrade from ISO' when updating your main usb with a new version of tails. I guess this wouldn't matter much if you are using two usbs, but this would save on having to use a new dvd every time to first burn the new version onto when updating your usb.

Anyways, the new version of tails is running great! Lots of little bugs are fixed from the last version.

-entreterra



Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Copycats on May 19, 2013, 10:24 am
just in case I lose the URL
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: theonetheonlyandy on May 20, 2013, 10:45 pm
part of the tutorial they should show silkroaders how to use macchanger on tails. i used to use liberte linux becuase all mac's were changer as soon as you loaded it.

qucik question does anybody know if tails go thru any alternate routes i.e. if isp blocks tor? or if the goverment blocks tor? on regular tor you can give alternate routes if it is bloacked but wonder if tails does it automatically.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: theonetheonlyandy on May 20, 2013, 10:53 pm
part of the tutorial they should show silkroaders how to use macchanger on tails. i used to use liberte linux becuase all mac's were changer as soon as you loaded it.

qucik question does anybody know if tails go thru any alternate routes/bridges i.e. if isp blocks tor? or if the goverment blocks tor? on regular tor you can give alternate/bridges routes if it is blocked but wonder if tails does it automatically.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: whorledpeas on May 21, 2013, 05:22 am
great stuff- just need to post so i can find it later
thanks
wp
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: P2P on May 21, 2013, 05:26 am
This is great. Would you say this is more versatile than pine's VM suggestion?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on May 21, 2013, 05:51 am
qucik question does anybody know if tails go thru any alternate routes/bridges i.e. if isp blocks tor? or if the goverment blocks tor? on regular tor you can give alternate/bridges routes if it is blocked but wonder if tails does it automatically.

I'm unsure if the newer Tails 0.18 has fixed the problem of Vidalia not storing its settings in the persistent volume, can anyone else confirm this?
You usually have to either enter the bridge info at startup (command prompt), or you could enter them into Vidalias network settings.

This is great. Would you say this is more versatile than pine's VM suggestion?

I've never tried using a VM to install Tails so I can't comment...
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: django on May 21, 2013, 09:26 am
qucik question does anybody know if tails go thru any alternate routes/bridges i.e. if isp blocks tor? or if the goverment blocks tor? on regular tor you can give alternate/bridges routes if it is blocked but wonder if tails does it automatically.

I'm unsure if the newer Tails 0.18 has fixed the problem of Vidalia not storing its settings in the persistent volume, can anyone else confirm this?
You usually have to either enter the bridge info at startup (command prompt), or you could enter them into Vidalias network settings.

This is great. Would you say this is more versatile than pine's VM suggestion?

I've never tried using a VM to install Tails so I can't comment...

even if you enter the bridges in manually it doesnt save them to persistent for next boot up,so you have to use tab on boot and type bridge and enter them in each time.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: WhiteShark on May 23, 2013, 08:36 am
Awesome tutorial Fallkniven!

Give me a reminder on your next order, I'll throw in some extra!

Always like to reward those who are keeping others safe. Great job!
Thanks again!

W. Sharl <3
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on May 23, 2013, 10:28 am
Awesome tutorial Fallkniven!

Give me a reminder on your next order, I'll throw in some extra!

Always like to reward those who are keeping others safe. Great job!
Thanks again!

W. Sharl <3

Thank you very much for the kind words WS, I like to try and help people where I can and it seems this thread is getting that done en masse :)

Yay for Freedom!

Yay for DPR!

Yay for WS's buds!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: P2P on May 27, 2013, 02:17 am
Fallkniven,

So is the general idea here an unencrypted USB which contains an OS that has an encrypted volume in it? Or is it possible to encrypt the whole USB itself? I would prefer the latter, but I think that would complicate things as far as booting goes. Plus you didn't suggest it. I'm just not sure if it was understood that the USB should be encrypted with TC beforehand. I would very much like to know about this, since I'd prefer to have all my storage systems, even if they don't house sensitive data, encrypted either way.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on May 27, 2013, 02:35 am
I've never tried to encrypt the entire Tails USB drive before, personally I don't see the point when using a separate encrypted volume/partition.

There may come a time though when one must try to hide the fact that Tails is installed on the USB in question, in which case it would be very pertinent to encrypt the entire drive. I am unsure how to go about this for Tails specifically, although I have used TrueCrypt on a Windows system and it functioned extremely well.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: P2P on May 27, 2013, 03:17 am
It would be an extra layer of security. You could do a hidden volume with it on Tor; no one would ever know you had anything to hide if they DID obtain the drive and you had to give them "a" password. Owning tails definitely implies you've got something to hide, and if attackers could enter into your tails OS and see you have an encrypted volume (I'm not sure how this works. Whether you first login to tails, then the encrypted volume, or if your tails password is just the password to the encrypted volume? And there is just no password to enter into normal tails like a hidden volume?), then there could be problems. Although, I don't know how it works, like I said. If it is like a hidden volume where you have no pass (or a dummy pass) for your regular tails OS, and then another pass for your persistent volume when you're prompted for a pass after the tails boot, then that's a different story. But either way I would prefer someone didn't know I had tails in the first place (implies hidden files that no you don't want people to see), not to mention it's an extra layer of security. You protect all of these things with strong passes and you've got a layered security system that would take ages to crack brute force style, no?


What I'm interested to know tho is whether or not you could still boot from your USB if it was encrypted, but still had tails and everything on it. Basically, your system, but with an encrypted USB stick. I don't know if the comp would even recognize the usb at boot, though, given this model, or if it will but can't boot, or if it would just be a matter of entering the passphrase to decrypt the USB (although I doubt this last one very much). And I don't think it could boot off an encrypted USB, because that would defeat the purpose of encryption (you'd get straight to tails anyway). So is this practical, or no? It sounds like no, but I just wanted to ask more experienced users of tails what they thought could be done, if anything.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: NatureMed on May 27, 2013, 07:45 pm
Done on 16gb microsd :)

Microsd are so easy to hide, I wouldn't recomand the use of usb...

cheers
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: milliardo23 on May 31, 2013, 01:25 pm
Would I have to download these links from tor browser?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: QuarterBaked on June 02, 2013, 03:16 pm
great guide, very useful.
+1
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: PrincessButtercup on June 02, 2013, 08:55 pm
Excellent!

+1 from me too.

Regarding usb distros, any thoughts on Liberte Linux v. TAILS?

I love Liberte' as it's so lightweight (around 200mb) but I'm worried the project is not being maintained.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on June 02, 2013, 11:25 pm
Would I have to download these links from tor browser?
I recommend downloading these files through Tor, but it is not absolutely necessary.

great guide, very useful.
+1
Thanks :)

Excellent!

+1 from me too.

Regarding usb distros, any thoughts on Liberte Linux v. TAILS?

I love Liberte' as it's so lightweight (around 200mb) but I'm worried the project is not being maintained.

Tails does everything I need, it's easy to install and use so I have no reason to try anything else.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: saidanddone on June 03, 2013, 06:18 am
Hi Everyone,

I wanted to thank Fallkniven and all of the other smart people who have contributed to this thread. I have been running TAILS and now I have just gotten set up to connect via obfs2 bridges. My understanding was that my before adding bridges, my ISP could pretty readily determine that I was using tor, especially since I live in a sparsely populated area. Not that they would be tracking that, but I don't trust them. From what I have read about obfuscated bridges, I am feeling more protected now.

Someone mentioned in this thread the existence of next level obfs3 obfuscated bridges. I am not a technical expert, so I have no real understanding about what that means, or where to obtain obfs3 addresses (I got 4 obfs2 addresses from the tor project website). Additional info about obfs3 would be appreciated.

Anyway, thanks again everyone.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on June 03, 2013, 06:24 am

https://bridges.torproject.org/?transport=obfs3

obfs3 support was only added in Tails 0.18, so make sure you have the latest one.

https://tails.boum.org/news/version_0.18/index.en.html
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: saidanddone on June 03, 2013, 06:50 am
Thanks kindly, Astor! I do have the latest version, and the obfs3 addresses worked like a charm.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: VersacePandaEgg on June 03, 2013, 07:19 pm
Subbed

I'm not very tech savvy and am not currently using TAILS.

I just have an old 8GB USB of mine with the TOR browser bundle and GPG4USB on it

No Bridges, noTruecrypt, I'm not even sure what it is  :-\
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: entreterra on June 04, 2013, 02:06 am
Subbed

I'm not very tech savvy and am not currently using TAILS.

I just have an old 8GB USB of mine with the TOR browser bundle and GPG4USB on it

No Bridges, noTruecrypt, I'm not even sure what it is  :-\

I don't consider myself very tech savvy either, but this guide is really all you need. It's very easy to follow; just do so step by step and you will have Tails running with an encrypted persistent volume (place to save files that don't get wiped when you shutdown from the Tails OS) in no time.

The hardest thing for me was figuring out which key to press as soon as my computer powered on in order that I could get to the BIOS menu to change the boot order. Any small road blocks like that can easily be resolved with a google search though.

Just be patient and you will have it running smoothly, and once you do it's great (it took me a couple hours or so to figure everything out!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: WingWong on June 04, 2013, 04:32 am
I haven't read all seven pages but I am wondering if anybody has had much success running TAILS with persistent volume on an Intel based iMac?

I have but quite accidently and only after hours of fucking around.

1. I made a bootable USB drive with TAILS and a persistent volume. (Tested on non mac and works perfectly)
2. Installed reFit boot loader on iMac ((or reFind, one or the other) Can already boot into OSX or Ubuntu)

Will not boot into TAILS from USB despite the bootloader recognising it. Tried over and over. Will not work!

3. Burned TAILS to a DVD and booted iMac from the DVD (The above USB drive was left in iMac). This worked and TAILS booted!

HERE'S WHERE IT GETS GOOD.

4. It asks for my pass to access the persistent volume and successfully loads it.

So, for all those who cannot get Intel based iMacs to boot TAILS with a persistent volume from a USB drive just set up the persistent volume on a 'regular' computer THEN leave it in you Mac as you boot TAILS from a DVD.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: PrincessButtercup on June 05, 2013, 03:33 pm

https://bridges.torproject.org/?transport=obfs3

obfs3 support was only added in Tails 0.18, so make sure you have the latest one.

https://tails.boum.org/news/version_0.18/index.en.html

I'm playing with TAILS and have found two issues:
- when using Vidalia to configure obfsproxy bridges, these fail to work unless I remove the port address that follows the ip (X.X.X.X:port) - I have the feeling I'm doing something wrong here.
- and when I try to configure a VPN, the "ADD" button is greyed out so while VPN configuration appears as an option I can"t see how I can input the information to get it going ... ?

help!

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on June 05, 2013, 04:51 pm
The hardest thing for me was figuring out which key to press as soon as my computer powered on in order that I could get to the BIOS menu to change the boot order. Any small road blocks like that can easily be resolved with a google search though.

haha, I can never remember either, so I always keep my fingers on F1 and F12, ready to press whatever pops up on the screen.


I'm playing with TAILS and have found two issues:
- when using Vidalia to configure obfsproxy bridges, these fail to work unless I remove the port address that follows the ip (X.X.X.X:port) - I have the feeling I'm doing something wrong here.

Odd. The part you need to remove is "bridge". When you ask the BridgeDB for addresses, you get a result like this:

  bridge 12.34.56.78:443

You need to enter  12.34.56.78:443 in the Vidalia interface.

- and when I try to configure a VPN, the "ADD" button is greyed out so while VPN configuration appears as an option I can"t see how I can input the information to get it going ... ?

You probably need to install a specific VPN program like OpenVPN, along with the helper apps, network-manager-openvpn and network-manager-openvpn-gnome.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: PrincessButtercup on June 05, 2013, 08:43 pm
The hardest thing for me was figuring out which key to press as soon as my computer powered on in order that I could get to the BIOS menu to change the boot order. Any small road blocks like that can easily be resolved with a google search though.

haha, I can never remember either, so I always keep my fingers on F1 and F12, ready to press whatever pops up on the screen.


I'm playing with TAILS and have found two issues:
- when using Vidalia to configure obfsproxy bridges, these fail to work unless I remove the port address that follows the ip (X.X.X.X:port) - I have the feeling I'm doing something wrong here.

Odd. The part you need to remove is "bridge". When you ask the BridgeDB for addresses, you get a result like this:

  bridge 12.34.56.78:443

You need to enter  12.34.56.78:443 in the Vidalia interface.

- and when I try to configure a VPN, the "ADD" button is greyed out so while VPN configuration appears as an option I can"t see how I can input the information to get it going ... ?

You probably need to install a specific VPN program like OpenVPN, along with the helper apps, network-manager-openvpn and network-manager-openvpn-gnome.

Ok. It seems to be working but I'm confused about bridges - obfs2, obfs3. I've managed to download: 

 bridge
 bridge obfs2 
 bridge obfs3 

'bridge' works great, but obfs2 and obfs3 (5 digit port #) won't ... So I'm wondering what the differences between the three bridges are, and if the bridges I'm using are ok?

 ::)
 
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on June 05, 2013, 09:18 pm
obfs2 and obfs3 are different versions of the obfsproxy protocol, which is used to make Tor circuits look like another type of connection.

You can get the different ones with these links:

Regular bridges:   https://bridges.torproject.org

obfs2 bridges:      https://bridges.torproject.org/?transport=obfs2

obfs3 bridges:      https://bridges.torproject.org/?transport=obfs3

For regular bridges, you copy the ip:port.  For obfs2 and obfs3, you also have to copy that word.

So for an obfs2 bridge, you'll get this:

    bridge obfs2 12.34.56.78:443

You copy and enter into Vidalia "obfs2 12.34.56.78:443".

Note: you need a special obfsproxy browser bundle to use obfsproxy bridges on Windows, OS X and non-Tails Linux.

Tail 0.18 supports obfs2 and obfs3 out of the box.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: PrincessButtercup on June 06, 2013, 07:52 am
obfs2 and obfs3 are different versions of the obfsproxy protocol, which is used to make Tor circuits look like another type of connection.

You can get the different ones with these links:

Regular bridges:   https://bridges.torproject.org

obfs2 bridges:      https://bridges.torproject.org/?transport=obfs2

obfs3 bridges:      https://bridges.torproject.org/?transport=obfs3

For regular bridges, you copy the ip:port.  For obfs2 and obfs3, you also have to copy that word.

So for an obfs2 bridge, you'll get this:

    bridge obfs2 12.34.56.78:443

You copy and enter into Vidalia "obfs2 12.34.56.78:443".

Note: you need a special obfsproxy browser bundle to use obfsproxy bridges on Windows, OS X and non-Tails Linux.

Tail 0.18 supports obfs2 and obfs3 out of the box.

Thank you for helping me with this.

I've tried downloading and using fresh obfs2 and obfs3 bridges but these just time out without connecting - regular bridges work fine though. I'm using TAILS 0.18 and I'm wondering if there's a box that needs checking or some small change somewhere that will allow these to work? Are regular bridges still safe to use? Do they effectively mask tor from my ISP?

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on June 06, 2013, 07:58 am
Bridges can be hit or miss. I've grabbed bridge IPs that didn't work, then I grabbed some more and they worked. If they don't work for you the first time, you can try new ones.

Will regular bridges mask your Tor use from your ISP?  Yes, if they are only looking at IPs. If they are using deep packet inspection to examine the stream, then probably no. But if you're in a western country, chances are very high they're not looking at your Tor use in the first place.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: PrincessButtercup on June 06, 2013, 08:44 am
Thanks, I'll keep trying.

+1 to you!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: forgettegrof on June 10, 2013, 02:43 am
I followed the instructions and put tails on the first usb to load onto another usb. I then changed the bios settings so that it booted from the usb. Anyways, it boots, but then it just shows a screen saying syslinux developed by yadayadayada on somesuch date. Just general information about the developer and has that little blinking line cursor object underneath it. It does nothing after that, no gui pops up, no instructions, nothing. The keyboard also does nothing during this. Not sure what it is, I followed the instructions exactly twice now and it's the same thing....Am I missing something incredibly obvious?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Parabolic45 on June 10, 2013, 04:36 am
Holy shit, Fallkniven...I'm very impressed with this thread

this took me from not knowing anything about tails->running it to post this reply in less than 2 hours
and that may seem like a long time but I'm not the most technologically inclined..This is a really useful thread! I wasn't able to get any working obsf3 bridges going; my pages just time out when they are enabled. I would love it if my ISP was blocked access aswell but this can wait to be fixed. I was obviously a lot more exposed before today without any issues. I think I'm off to Chipper's thread to look into Electrum!
thanks again
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on June 11, 2013, 01:38 am
I followed the instructions and put tails on the first usb to load onto another usb. I then changed the bios settings so that it booted from the usb. Anyways, it boots, but then it just shows a screen saying syslinux developed by yadayadayada on somesuch date. Just general information about the developer and has that little blinking line cursor object underneath it. It does nothing after that, no gui pops up, no instructions, nothing. The keyboard also does nothing during this. Not sure what it is, I followed the instructions exactly twice now and it's the same thing....Am I missing something incredibly obvious?

I've had the same problem before, it was solved by using a different brand and size of USB drive, i'm 80% sure it had something to do with the USB partition boot records. Buying a new USB drive may not solve this problem for you though it is worth a try.

Holy shit, Fallkniven...I'm very impressed with this thread

this took me from not knowing anything about tails->running it to post this reply in less than 2 hours
and that may seem like a long time but I'm not the most technologically inclined..This is a really useful thread! I wasn't able to get any working obsf3 bridges going; my pages just time out when they are enabled. I would love it if my ISP was blocked access aswell but this can wait to be fixed. I was obviously a lot more exposed before today without any issues. I think I'm off to Chipper's thread to look into Electrum!
thanks again

Welcome to anonymity, the place where nobody knows anyone else ;)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: awesome1126 on June 16, 2013, 10:33 pm
Alright, do all of these instructions work for Windows 8?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: yodude420 on June 16, 2013, 10:57 pm
need this
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: awesome1126 on June 17, 2013, 12:42 am
Try turning off UEFI and secure boot in the BIOS, that should do the trick. :)

This worked perfectly after changing the boot order too, for legacy mode. Now I just shift/click the restart button after controlaltelete and I can choose to boot from the USB :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: samesamebutdifferent on June 17, 2013, 01:14 pm
Try turning off UEFI and secure boot in the BIOS, that should do the trick. :)

This worked perfectly after changing the boot order too, for legacy mode. Now I just shift/click the restart button after controlaltelete and I can choose to boot from the USB :)

This sounds like the fix to the issue I was having when trying to set up Tails on a my windows 8 machine a few weeks ago which would be awesome if I was actually still using that computer regularly. I need to get Tails configured and working on my Mac OS, if anyone is able to post a step by step process I will be most grateful, having spend the last few hours going around in circles (and not for the first time either) some guidance would be wonderful.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: bigbootybitches on June 19, 2013, 06:28 am
So i got tails working now... How do I use the pgp program. Seems more complicated then installing and booting tails its self.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: heatcheck on June 20, 2013, 03:48 am
I tried to get Tails up and running today but ran into a problem. I am using a MBP with 10.8 on it. I had to install rEFInder in order to get the computer to try and boot from the USB. Once it started to boot though, I just got a black screen with a blinking cursor line. Nothing would change.

If it matters, I was installing the latest tails using a virtual machine onto a 4bg drive.

Any help is greatly appreciated.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: ☼LightOfPi☼ on June 22, 2013, 12:32 am
Great info in this thread: turns out getting tails up and running is pretty easy.
BUT....

What I'm interested to know tho is whether or not you could still boot from your USB if it was encrypted, but still had tails and everything on it. Basically, your system, but with an encrypted USB stick. I don't know if the comp would even recognize the usb at boot, though, given this model, or if it will but can't boot, or if it would just be a matter of entering the passphrase to decrypt the USB (although I doubt this last one very much). And I don't think it could boot off an encrypted USB, because that would defeat the purpose of encryption (you'd get straight to tails anyway). So is this practical, or no? It sounds like no, but I just wanted to ask more experienced users of tails what they thought could be done, if anything.

I'm very much interested in this also. That way you can hide the fact that you have Tails in the first place which sounds like a big plus to me.
It can be done with Windows so I imagine it should technically be possible with tails, but maybe I'm wrong I don't know.

I do know it's possible to install tails inside an encrypted Truecrypt container on a USB stick, but I I can't seem to find the option in Truecrypt to actually boot from this container.
Does anyone know how to do this? Maybe there is a workaround, or is it actually impossible?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on June 22, 2013, 01:07 am
It's not possible. TrueCrypt only supports system encryption of Windows operating systems. See here:

http://www.truecrypt.org/docs/sys-encryption-supported-os#Y0

The way to do it on Linux is with LUKS/dm-crypt, but it's more complicated than encrypting the volume. The boot partition has to be unencrypted in order to boot the kernel to decrypt the rest of the disk / volume, and currently the boot folder  is part of the unwritable Tails system image.

The Tails developers would have to modify the default Tails configuration to support it. Here's a discussion about it:

https://tails.boum.org/forum/Persistent_Truecrypt_+_encrypt_entire_system_drive/
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: P2P on June 22, 2013, 07:07 am
Have been using tails for a little while now and I love it. Two questions, though:

1. I need a VPN. Can one be ran through tails?
2. I need a mac changer. Can one be ran through tails?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on June 22, 2013, 03:01 pm
1. It's complicated to do and the Tails developers are against it. Do you want to run Tor over a VPN to hide your Tor use from a local observer? In that case you can use bridges. If you want to run a VPN over Tor to get a non-exit IP address, there are lists of web proxies you can use, like http://www.publicproxyservers.com

2. Tails has a MAC changer called macchanger. It doesn't run at boot though.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: leaf on June 22, 2013, 04:54 pm
thanks for posting this, there is a need to make Tor and cryptography easier and more ubiquitous.  You are making it happen :).
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: P2P on June 22, 2013, 07:51 pm
1. It's complicated to do and the Tails developers are against it. Do you want to run Tor over a VPN to hide your Tor use from a local observer? In that case you can use bridges. If you want to run a VPN over Tor to get a non-exit IP address, there are lists of web proxies you can use, like http://www.publicproxyservers.com

2. Tails has a MAC changer called macchanger. It doesn't run at boot though.

1. Yes, to hide Tor use from my ISP. That is essential, in my opinion, to total security. I'll do some searching on bridges. And could you elaborate on your second point? I'm not sure I understood. By non-exit IP address do you mean an extra layer of security (connecting to tor through an IP that is not my own) so even if I am unmasked I am safe?

2. I could not find it in accessories. Where is it located? Or do I have to manually start it up upon boot? If so, how can this be done?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Pusci on June 23, 2013, 02:14 am
Subbing , need to have a good look at this when i get time .

Thanks!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Parabolic45 on June 23, 2013, 05:52 am
It's awesome that this got stickied to the main page of SR...This should be at the top of everyones todo list if you havent already...
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on June 24, 2013, 02:34 am
I come back from a 5 star holiday and find that my Tails tutorial has been put up on the front page of SR.

Fantastic! Thanks to whoever got that rolling, now even more people can be safer and more anonymous while online :)

Happy days!

(and more thanks to astor for filling in answering questions while I was out... another +1 coming your way mate)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Real_Drugs on June 25, 2013, 12:55 am
Should this be used for general internet browsing or to run SR or?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: m1ddle on June 25, 2013, 03:26 am
What are people's thoughts on running Tails in Parallels for Mac?

Safe enough?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: heatcheck on June 25, 2013, 07:25 pm
What are people's thoughts on running Tails in Parallels for Mac?

Safe enough?

No, probably not. When I ran tails in a VM to make a USB, it warned me that my host machine could track all of the activities in the virtual machine.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: P2P on June 25, 2013, 10:24 pm
I have a quick question on bridges:

If these are public, and anyone can start one, could certain bureaucracies not start one? It seems way less secure than a VPN would be. A VPN is a trusted company. in an entirely different country. A bridge is just some random IP address from someone who you do not know. This is a very shoddy way to do tor's so-called "circumventing" of the powers that be.

I'm starting to think, as far as flying under the radar and staying low profile goes, that a non-tails setup would be far superior. Yes, it has it's disadvantages, but so does tails itself. I believe tails is useful for those who believe that it is inevitable they will face LE at some point. I do not believe this to be the case for myself (unless using tor becomes a crime, which, given the current system, doesn't seem too unlikely).

Hiding tor use from the "big picture" that these bureaucracies hold in their databases is absolutely essential. You can and will be placed on a list; if not now, you will eventually, for using tor. This hugely narrows down the search, as astor explained in another thread. However, I am not comfortable with astor's suggestion of using bridges. It seems far too easy to me for people with malicious intent to set up a bridge (entry node?) and at least know you're using Tor, if not for them to be able to monitor the connections you are making (silkroadvb5piz3r.onion? Yes, let's put him/her on the list). I am not sure about the latter, though, as I am no tor expert. Maybe someone else could weigh in.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Ro-Jaws on June 25, 2013, 11:24 pm
I'm no Tor expert either but I can take a stab. As far as I know even if a bridge was malicious (or an entry node) they cannot see the content of your traffic. The traffic is encrypted before it gets to the network so a bridge/VPN would see only encrypted traffic, not the content, otherwise malicious entry nodes/ guards/bridges would be a massive potential problem (actually they are but not because they can read all your messages straight out of the connection).

Why do you assume a VPN is going to be more trustworthy? Sure a bridge could be bad, but so could a VPN. Just because they charge you money and promise not to log anything certainly doesn't make it so. For all you know they break as fast  as Microsoft and throw your data at any LEA that comes near them (they are hardly going to brag about it).

Staying off the radar is a good idea but I'm not sure why you think tails puts you on it? If you can secure another system to your satisfaction then go ahead but tails does most of it for you if you lack the know how and does it well considering its threat model.

Actually if you want to stop ever ending up on the radar you should be using something like whonix or your own annonymizing middlebox, so even if you an exploit gains access they can't get your IP, just the box's.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Sweetwilliam on June 26, 2013, 08:53 pm
Thanks for the tutorial! It works great!

Now I wonder how I can make one bootable for a Mac... Has anyone done that yet? I will start looking into it and will post results if anyone else is interested.

thanks!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Sweetwilliam on June 27, 2013, 03:27 pm
Quote

edit: it worked, after activating the GNOME Key ring my Wlan password is being stored as well!

and again thank you so much for this great thread!

How do I activate the GNOME Key ring?

Thanks!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: cowpie34 on June 27, 2013, 07:07 pm
Awesome!!  Thank you!!!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: cabinman01 on June 28, 2013, 03:36 am
Thanks so much for the great tutorial!! I got mine all set up in about 30 min. 

One question though, I keep having trouble getting it to boot persistantly to tails? It will only do it when I go to the boot options and select hard drive(weird) and then at boot press cntrl+alt+delete.
Any suggestions?

Cheers
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: upthera on June 28, 2013, 12:43 pm
hello all,

1st.)  Thanks to the OP for posting a good piece on what I consider to be one of if not the safest method(Tails), but I'm no cryptologist.

 There has been something thats has bothered me since skimming through the first pages a couple days ago and I'm sorry if it has already been addressed.
I noticed a question about plug-ins and desktop customization and other ways to make your tails pretty and the OP responded by saying if the person found a way to keep these changes persistant over reboot's to let him know.

**OP  PLEASE DO NOT TAKE OFFENSE AS NONE IS INTENDED, I would hate to see someone make fingerprinting of themselves that much easier because they like specific fonts or backgrounds/colours etc. 

BAD ADVICE:  NEVER CUSTOMIZE YOUR TAILS DISTRO!!  unless of course you want to weaken its core purpose, keeping you SAFE. 

*Use the default settings other than JS, which should be the first thing you do as Iceweasel opens after you connect. In Iceweasel, open preferences > Content and  un-check "enable Javascript"

**  these are settings and recommendations are by people with much more knowledge than me or the OP & they are there for a reason.

 I like to customize my personal OS a bit like most, but!  to do so, or feel the need to on tails means you're missing the point.  Do not make yourself unique.  No font changes, no unique terminal profiles, be careful about add-ons and such.  I hate the default background colour but I'm pretty sure I'd hate the colour of my prison cell worse so I deal with it.  just my .02btc
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: PrincessButtercup on June 30, 2013, 01:24 am
 * subbed *
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: morphjow on June 30, 2013, 05:30 am
Struggling!

When I try and enter BIOS (it doesn't tell me a specific key to hit but escape and F1 and F2 take me to the same place) by pressing either ESC, F1 or F2 it takes me to a screen that says 'Windows Boot Manager'. Windows 7 is the only option there for operating systems. I don't even think this is the BIOS screen because it doesn't seem like there are enough options... like the examples I've found on the net. All I can do is go to another screen which then begins a 'memory test'.

Anyone have any clues of where I'm going wrong? I've used the links provided to try and trouble shoot and get into BIOS without any luck.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on July 01, 2013, 03:01 am
Tails 0.19 is out

Time to upgrade!

OP updated...
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on July 01, 2013, 03:20 am
Struggling!

When I try and enter BIOS (it doesn't tell me a specific key to hit but escape and F1 and F2 take me to the same place) by pressing either ESC, F1 or F2 it takes me to a screen that says 'Windows Boot Manager'. Windows 7 is the only option there for operating systems. I don't even think this is the BIOS screen because it doesn't seem like there are enough options... like the examples I've found on the net. All I can do is go to another screen which then begins a 'memory test'.

Anyone have any clues of where I'm going wrong? I've used the links provided to try and trouble shoot and get into BIOS without any luck.

Windows Boot Manager.

:/

This is Microsofts attempt at forcing Personal Computer systems to only use the Windows OS.

I do not know how to get around it because I have not nor will i EVER use it!

If anyone else could offer this person some assistance regarding Windows Boot Manager, I and They would be very appreciative..,.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on July 01, 2013, 03:25 am
Thanks so much for the great tutorial!! I got mine all set up in about 30 min. 

One question though, I keep having trouble getting it to boot persistantly to tails? It will only do it when I go to the boot options and select hard drive(weird) and then at boot press cntrl+alt+delete.
Any suggestions?

Cheers

I think you may mean CONsistently... ;)

In the boot options, are you selecting USB-HDD or just an HDD?

This is the part that most people have trouble with, it seems the different motherboard manufacturers do not know what the word CONFORMITY means...

Try using a permanent Boot Order setting by actually going into the BIOS and saving the settings...
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on July 01, 2013, 03:28 am
Quote

edit: it worked, after activating the GNOME Key ring my Wlan password is being stored as well!

and again thank you so much for this great thread!

How do I activate the GNOME Key ring?

Thanks!

The keyring stores its settings in the persistent volume, you have to tell it to do this.


Try this:
Goto "Applications" > "System Tools" > "Configure Persistent Volume" & make sure everything is checked (selected) and then save the settings.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on July 01, 2013, 03:31 am
NEVER CUSTOMIZE YOUR TAILS DISTRO!!

Agreed.

A utilitarian OS such as Tails is not meant to look "pretty" =)

If you don't like the look of the Tails desktop, you can always use the "Windows XP Camoflage Skin" when you are logging in...
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: morphjow on July 02, 2013, 08:35 am


Thank you for sharing your technical intel & know how, and for taking the time to lift up other fellow Roadies.

 ;D

I agree totally
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Raoul Duke on July 02, 2013, 08:42 am
just upgraded my USB to the latest version of TAILS and it's fucked my pidgin up -  just getting 'disconnected', and hitting reconnect just loops through the same thing. worked fine on TAILS 0.18. any ideas?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on July 02, 2013, 11:53 pm
Sorry Hunter, I really do not use any kind of instant messaging so I cannot offer help with that... anyone else?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 03, 2013, 12:04 am
just upgraded my USB to the latest version of TAILS and it's fucked my pidgin up -  just getting 'disconnected', and hitting reconnect just loops through the same thing. worked fine on TAILS 0.18. any ideas?

Many people have experienced this in the upgrade to 0.19. Change the settings in Accounts -> Manage Accounts -> <Whatever the chat service is called> -> Modify -> Proxy tab to use the default Gnome settings (ie, not Tor/Privacy).
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: wheres wally on July 03, 2013, 01:07 am
i keep getting a security warning unencrypted connection "The information you have entered is to be sent over an unencrypted connection and could easily be read by a third party.

Are you sure you want to continue sending this information?"

 message. using tails0.19 without persistence and all standard settings. i dont know whats wrong. can anyone help please?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: m1ddle on July 03, 2013, 10:11 am
A few people have cited issues starting tails from Apple products, including Macbooks.

Simply insert the tails disc before shutting down. Hold down the 'c' button as the computer turns on, and it will automatically boot from the disc.

Pretty simple, really.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on July 04, 2013, 12:17 am
Waldo - it's because Onion address do not use regular SSL encryption, if you have connected correctly to the Tor network, all your communications will be encrypted.

(correct me if i'm wrong, please...)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Raoul Duke on July 04, 2013, 07:19 am
just upgraded my USB to the latest version of TAILS and it's fucked my pidgin up -  just getting 'disconnected', and hitting reconnect just loops through the same thing. worked fine on TAILS 0.18. any ideas?

Many people have experienced this in the upgrade to 0.19. Change the settings in Accounts -> Manage Accounts -> <Whatever the chat service is called> -> Modify -> Proxy tab to use the default Gnome settings (ie, not Tor/Privacy).

tell ya - you are some kind of genius astor - muchas gracias! all fixed
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: shawnmichaels on July 04, 2013, 12:00 pm
Question from me if possible... Tails has been so good for me, I have gone out and bought a bigger drive. However it won't copy accross the stored information.

Can someone tell me how to do it - have looked on the tails site, but the answer made no sense to me.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on July 04, 2013, 11:27 pm
Question from me if possible... Tails has been so good for me, I have gone out and bought a bigger drive. However it won't copy accross the stored information.

Can someone tell me how to do it - have looked on the tails site, but the answer made no sense to me.

You have to open Tails with the persistent volume, then copy what you want to keep onto another USB thumb drive.

Tails does not copy over the persistent volume when upgrading to a newer version. You must start from the beginning and make a new persistent volume, then copy back your saved files from USB.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: fbny71 on July 09, 2013, 08:28 pm
Thanks for this Fallkniven.

I've been inspired to make my own TAILS stick.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: fbny71 on July 10, 2013, 01:43 pm
Should I be worried that the first thing I see upon boot is: "Invalid Partition Table"? I press enter and boot continues uneventfully, and everything is working including persistence.

Another question: can I continue to use the public PGP key I created on another computer to receive and decrypt messages on TAILS now or should I be making a new one from within TAILS? I imported my public key but not sure how to go from there.

Thanks.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Oxidizer on July 10, 2013, 03:26 pm
Hey,

So I've been trying to set up a Persistent LiveUSB for Mac for what feels like forever now.  I have heard many people bring this up here in the forums, but not many people have very much information on it.  I've been able to boot up a Tails LiveCD, but it is not persistent.

So I've made a LiveUSB using a Sandisk Cruzer 4GB, using Tail's built in Live USB Creater (while using my LiveCD).  I turn my computer off, plug in this LiveUSB, and then turn the computer back on while holding the option key (with reEFIt installed on a macbook pro). Then I see a menu and select the penguin with a label "Tails from Linux".  Once that is selected a penguin appears and begins to load, but then my screen goes black with the message "Missing Operating System".

This has happened every time and it's so frustrated, I've tried recreating the LiveUSB, Redownloading the Tails iso file, and trying reEFIt and reEFInd, but I always get the Missing Operating System message.

Any help would be appreciated...I'm sure i'm not the only one with a Mac who is trying to set this type of system up.

Thanks,
Oxidizer 
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on July 11, 2013, 12:15 am
Should I be worried that the first thing I see upon boot is: "Invalid Partition Table"? I press enter and boot continues uneventfully, and everything is working including persistence.

Another question: can I continue to use the public PGP key I created on another computer to receive and decrypt messages on TAILS now or should I be making a new one from within TAILS? I imported my public key but not sure how to go from there.

Thanks.

I have not seen that error before, try re-installing Tails on a new USB drive using Tails USB Installer (within Tails OS).

Yes you can use your original PGP key, you need to export your Private key from whatever program you use to store it. Or just create a new one in Tails:
Click 'OpenPGP applet" in the taskbar, click "Manage Keys", click "File" menu, click "New...", click "PGP Key" & continue from there...
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: MissNatural on July 11, 2013, 05:48 am
I've been told TAILS is the most secure method for browsing SR/Darkweb.... but how is having an USB with an obvious Hidden/encrypted partition laying around safer than a simpler truecrypt file container with multiple key-files which are all disguised as legitimate files, including the container.

-Both can be bruteforced, with the password length/complexity being the time-length estimate.
-The truecrypt file container with multiple unidentifiable keyfiles combined with an extremely complicated password would be a million times harder to crack. Not to mention they have to identify and find the file that is encrypted in the first place!

The only downside with the truecrypt container is that you may as well have to delete and readd your keys to your keyring and store them somewhere secure each time you need to use them so they're not found in your keyring... even though I'm pretty sure certain GPG/PGP keyring applications can be set to load the keyrings from specific locations.

So what am I missing here? I have read all 11 pages and understand how tails works and how to install it, yet I fail to see why it is so much superior. Having tails on a usb proves that you have something to hide. Having a Linux-OS with truecrypt and an empty key-ring says nothing other than the fact that you're using linux that has some security-based programs on it that may as well have been default on the installation.

I am not trying to defend my method of security here, but rather I am trying to understand what I am not understanding that makes tails so much more secure than the aforementioned methods.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on July 12, 2013, 11:38 pm
I've been told TAILS is the most secure method for browsing SR/Darkweb.... but how is having an USB with an obvious Hidden/encrypted partition laying around safer than a simpler truecrypt file container with multiple key-files which are all disguised as legitimate files, including the container.

-Both can be bruteforced, with the password length/complexity being the time-length estimate.
-The truecrypt file container with multiple unidentifiable keyfiles combined with an extremely complicated password would be a million times harder to crack. Not to mention they have to identify and find the file that is encrypted in the first place!

The only downside with the truecrypt container is that you may as well have to delete and readd your keys to your keyring and store them somewhere secure each time you need to use them so they're not found in your keyring... even though I'm pretty sure certain GPG/PGP keyring applications can be set to load the keyrings from specific locations.

So what am I missing here? I have read all 11 pages and understand how tails works and how to install it, yet I fail to see why it is so much superior. Having tails on a usb proves that you have something to hide. Having a Linux-OS with truecrypt and an empty key-ring says nothing other than the fact that you're using linux that has some security-based programs on it that may as well have been default on the installation.

I am not trying to defend my method of security here, but rather I am trying to understand what I am not understanding that makes tails so much more secure than the aforementioned methods.

Hey, same argument being made at the Tails Forum...

https://tails.boum.org/forum/Persistent_Truecrypt_+_encrypt_entire_system_drive/
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 13, 2013, 12:01 am
I've been told TAILS is the most secure method for browsing SR/Darkweb.... but how is having an USB with an obvious Hidden/encrypted partition laying around safer than a simpler truecrypt file container with multiple key-files which are all disguised as legitimate files, including the container.

The down side to Truecrypt files is that information about the contents might leak onto the unencrypted parts of the hard drive. For example, if you open a document that is stored in the encrypted file, it may be added to a Recent Documents or Recent Files list in whatever program.

Take a look at the traces that the browser bundle leaves behind on Windows:

http://dkn255hz262ypmii.onion/index.php?topic=148291.msg1152452#msg1152452

Presumably some of those traces are left behind when it is run from an encrypted file too. Full disk / volume encryption, where there is no unencrypted area to leak data to, is much safer.

But Tails isn't really about the encrypted persistent volume. That's just one feature. Even if Truecrypt volumes were just as good or safer, the reasons to use Tails include:

-- it's Linux, so there's effectively no malware to worry about <-- this is the main reason it's safer
-- it transparently torifies network connections  <-- the second biggest reason
-- it comes with many apps that are configured to use Tor
-- it implements new Tor features early, such as obfsproxy bridge support and stream isolation
-- it never touches the main hard drive, so there is absolutely no data leakage
-- it's run from media (DVD, USB) that is easy to get rid of

Tails is definitely safer than running TBB from a Truecrypt file on Windows.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: MissNatural on July 13, 2013, 05:00 am
I have been using tails today and configuring it to my liking, though the one thing I cannot get over is it's obviousness. I just wish they would make it not like......"Hey lookie here intruder, this here is an encrypted drive. Do you want to try to guess the password to the encrypted part or log into the decoy part?

Seems kinda like the first thing the creators of tails would have done is make it so it doesn't look suspect when booted?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: tbart on July 14, 2013, 08:12 pm
Fallkniven - wanted to say thanks bigtime - especially for the instructions on changing boot priority - i'm a fred flintstone of this stuff but got it up and running - only took (and i kid not) three days of 4-5 hours each session to get it all the way - the bootice app helped - before reformating ZIP, after installing Tails, computer wouldn't recognize the usb drive

tks -

question - is there any way to save the bookmarks in iceweasel - i'ved saved them in persistent volume but am having to "restore" them each time i boot into tails

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on July 14, 2013, 09:09 pm
Fallkniven - wanted to say thanks bigtime - especially for the instructions on changing boot priority - i'm a fred flintstone of this stuff but got it up and running - only took (and i kid not) three days of 4-5 hours each session to get it all the way - the bootice app helped - before reformating ZIP, after installing Tails, computer wouldn't recognize the usb drive

tks -

question - is there any way to save the bookmarks in iceweasel - i'ved saved them in persistent volume but am having to "restore" them each time i boot into tails

Reading what you wrote gave me a better feeling than any drug i've consumed in the last 6 months, thank you & +1 :)

You should not have to reload your bookmarks every time, to set up what is saved in the persistent volume - go to 'System Tools' > 'Configure Persistent Volume' and make sure every option is selected (or in your case specifically - "Browser bookmarks")... click 'Save' & reboot if necessary.

Don't forget to export your bookmarks somewhere safe before upgrading Tails to a newer version, else they will be lost.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on July 15, 2013, 12:46 am
OK. I've gotten Tails successfully installed and even with a persistence volume. I can connect here fine and use Tor for browsing.

But when I go to new pages on the website and even when accessing here, a little security screen says         

"The information you have entered is to be sent over an unencrypted connection and could easily be read by a third party."

Are you sure you want to continue sending this information?

Should I be alarmed by this? Is this normal?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: cirrus on July 15, 2013, 12:48 am
OK. I've gotten Tails successfully installed and even with a persistence volume. I can connect here fine and use Tor for browsing.

But when I go to new pages on the website and even when accessing here, a little security screen says         

"The information you have entered is to be sent over an unencrypted connection and could easily be read by a third party."

Are you sure you want to continue sending this information?

Should I be alarmed by this? Is this normal?

You don't need to be alarmed at all - it's normal, and happens every time I sign in to the main site or the forum, too!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on July 15, 2013, 01:05 am
Whew! I feel better now.

Thanks Cirrus  ;D
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: tbart on July 15, 2013, 01:44 am
Fallkniven - okay, reset the preferences and checked the browser under confirgure persistent volume and it saved my bookmarks

now for the last assist request (bear in mind, i'm an idiot on this stuff - what i've done so far not only took me 12-15 hours over 3 days, but at least one bottle of bayer aspirin -

loading gpg4usb - i tried downloading directly to persistent volume via iceweasel (ie saving file), and then opening it while downloading, and the only selection was to use "archive manager" to open with. In either case when i hit the "start_windows.exe" file, it opens what looks the debian version of the text editor in gpg4usb with a choice of 3 files,  but no "encrypt" or decrypt options on the task bar

????? is there another way i should be installing gpg4usb on tails usb?

thanks in advance
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on July 15, 2013, 02:11 am
^^Funny, I was just about to ask that same question...
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: tbart on July 15, 2013, 03:24 am
good - now i won't feel as bad for imposing with two questions  :D
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Fallkniven on July 15, 2013, 02:06 pm
GPG4USB is designed to be used in Windows, Tails is a Linux based operating system, it wont work & you don't need it anyway...

Tails comes with an encryption/decryption applet, it's the clipboard icon in the task bar, it works differently to gpg4usb but it is no harder to use once learnt.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 15, 2013, 06:41 pm
Yeah, why not just use the built in PGP app in Tails?

But if you really want to use GPG4USB, you need to double click the file start_linux, not start_windows.exe.

First it has to be made executable by right-clicking on it and Properties -> Permissions and checking "Allow executing file as program."
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on July 15, 2013, 07:00 pm
I would use the built in one on Tails, but I don't know how to access the clipboard and what not to create encrypted messages and decrypt messages...
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: tbart on July 15, 2013, 07:30 pm
Yeah, why not just use the built in PGP app in Tails?

But if you really want to use GPG4USB, you need to double click the file start_linux, not start_windows.exe.

First it has to be made executable by right-clicking on it and Properties -> Permissions and checking "Allow executing file as program."

FIRST - BIG THANKS ON THAT - gpg4sb works like a champ now

as to why not use the built in one - i tried - couldn't figure out how to import msgs or to encrypt msgs either - got the keys in though
factually, you younger guys grew up with this stuff so it comes more naturally to you - to an old fart like me, it might as well be greek with a heavy creole dialect thrown in -
after working out gpg4usb, and it works so predictably for me, i'd rather stay with a known quantity


but do have a general encryption question - when someone posts a public key that shows Gnupg v2.1xxxxx and mine from gpg4usb shows    GnuPG v1.4.12 (MingW32), will their public key work in my gpg4usb to encrypt msgs they can decrypt, and vice versa?

tks
again, thanks
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 15, 2013, 10:26 pm
but do have a general encryption question - when someone posts a public key that shows Gnupg v2.1xxxxx and mine from gpg4usb shows    GnuPG v1.4.12 (MingW32), will their public key work in my gpg4usb to encrypt msgs they can decrypt, and vice versa?

The only time that might be a problem is if someone uses a key size that the other person's client doesn't support, but the vast majority of PGP clients support key sizes up to 4096 bits, so anything up to that should be good. A few clients support larger key sizes. One SR vendor has an 8192 bit key, which could be a problem for some people, but differing PGP clients or versions generally is not a problem.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: WhiteShark on July 17, 2013, 07:07 am
Just wanted to say much love to astor and Fallkniven =D please stay safe and secure guys!!

Always nice to know a little more =D
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Oneyedwilly on July 17, 2013, 11:29 am
bang tidy!

setup and browsing within the hour - thanks guys!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: uglydoll on July 17, 2013, 12:29 pm
Wow really NICE . but i got a couple of questions:

1. do i need to put windows first on the laptop/pc. or is it possible to have an pc without an OS and put it on there?

2. i use a label printer to print the addresses does that software works for TAILS or do i need openoffice ad print it from that.

iam a total n00b when it comes to linux dont understand it . are there some tutorials how to work with TAILS?
and if you put this on your computer are you better secured then truecrypt?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 17, 2013, 02:18 pm
1. do i need to put windows first on the laptop/pc. or is it possible to have an pc without an OS and put it on there?

You don't need any OS on the main hard drive. Tails runs independently off a DVD or thumb drive.

Quote
2. i use a label printer to print the addresses does that software works for TAILS or do i need openoffice ad print it from that.

Linux drivers for printers can be hit or miss. Depends a lot on the brand. Many printers you can plug in and a few seconds later they are ready for printing. Some brands, like Lexmark last I remember, have poor support though.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: uglydoll on July 17, 2013, 03:21 pm
1. do i need to put windows first on the laptop/pc. or is it possible to have an pc without an OS and put it on there?

You don't need any OS on the main hard drive. Tails runs independently off a DVD or thumb drive.

Quote
2. i use a label printer to print the addresses does that software works for TAILS or do i need openoffice ad print it from that.

Thnx its a Dymo i think but its support linux to . but dont know for sure

Linux drivers for printers can be hit or miss. Depends a lot on the brand. Many printers you can plug in and a few seconds later they are ready for printing. Some brands, like Lexmark last I remember, have poor support though.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 17, 2013, 04:54 pm
Yep, looks like they have Linux drivers.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: tbart on July 18, 2013, 07:45 pm
one more question - i've looked everywhere on how to make an adjustment on display size on my desktop and can't find anything - the display screen image is short on the right side by about an inch (black border on right side) but i can live with that. The actual screen image is "taller" than the screen by a considerable amount, so that when i minimize iceweasel or electrum, it disappears at the bottom , ie below the viewable area

it's been something of an issue when, for example, i'm scrolling bookmarks, open a folder and can't get to the bookmarks below the bottom screen's edge
or when there's a choice i need to click on whatever screen, where the choice is at the bottom

i can pull the scroll bar on the right down all the way, and even though i've got it stuffed to the bottom, there's part of the display hidden

is there anyway to correct this?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 18, 2013, 08:39 pm
Not sure what you mean exactly. Go to System -> Preferences -> Monitors. Are there different screen resolution options?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: tbart on July 18, 2013, 10:34 pm
went to system>preferences>monitors and at least found what it might be - resolution was up at the highest 1024 X xxx, - i tried setting it to 640 x 480 and it made the problem much worse. iirc, this screen is a 1680 x 1200 or somewhere in that region, resolution wise but there were only 3 choice in "monitors" with 1024 being the highest

best way to explain it, in windows when you minimize a program, it drops down to a small icon on the lower left, i guess what you'd call the lower task bar - well, whether in normal debian or windows camoflage, there is no lower task bar and there's part of what should be displayed on the screen below the lower edge of the monitor - so if i want to maximize iceweasel back to full screen, i can't - i have to hit the icon at the top and sometimes it brings the page i had up, before minimizing, and sometimes it reopens iceweasel back to the home page.

 it's kind of like having a 16" tall picture and you've overlaid a mask that has an opening only 14" tall -
so that you can't see the bottom 2" of the picture
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 18, 2013, 10:42 pm
I get it, yeah, because the screen resolution is too high. There are ways to fix it through x.org or randr, but they are complicated and you'd probably have to do it on each reboot. What kind of graphics card are you using?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: tbart on July 18, 2013, 11:30 pm
had to shut down and reboot in windows to get the answers
Okay, under device manager,

for monitor it shows “ Generic Pnp Monitor”

for display adaptors it shows “intel G45/G43 Express Chipset

and on the spec sheet for Graphics it sez

   Chipset : Intel® G45 Express Chipset

   Processor : Mobile Intel® Graphics Media Accelerator X4500HD

   with Intel® Clear Video Technology Total Available Gra

 and had one hell of a scare rebooting into Tails - for some odd reason it skipped the queries if i wanted to use Persistent volume and whatever the other one is - and booted straight to Tails and would not show the Persistent volume at all - don't know why it did that, but it kind makes it more imperative i learn how to back up my electrum wallet to the other usb flash -

for the heck of it, i shut down, and rebooted into tails a 2nd time and the 2nd time it showed those queries and i've got persistent volume back
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 18, 2013, 11:58 pm
Ok, I thought you might have an Nvidia or AMD graphics card. It should work well with Intel.

Yeah, not sure what to tell you. Is there any available resolution that's comfortable to work with?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Mcrad on July 19, 2013, 12:40 am
Ok i've asked this before but never really got a straight answer...


Which do you prefer. Tails or Liberte Linux and why?

much love_mcrad!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: tbart on July 19, 2013, 12:42 am
astor - think i figured it out - if, while in windows on the desktop, i adjust display down to 1240 x ??? resolution, then when i reboot into tails, all is fine . This is a sony vaio computer and there are more than a few items unique / perculiar to sony, from what i've learned

tks for the assist - you got me to think about looking at display settings
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 19, 2013, 12:50 am
Glad it worked out for you! :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 19, 2013, 12:53 am
Which do you prefer. Tails or Liberte Linux and why?

Liberte is ostensibly more lightweight and hardened than Tails, but it hasn't been updated since September of last year, while Tails gets updated about once a month with bug fixes and new features. It implements things like obfsproxy bridge support and stream isolation, which Liberte does not. It uses Tor Browser, which is created with a set of 27 patches against Firefox, along with many changes in the default settings, to protect your anonymity and security, while Liberte uses the default Gnome browser. Overall, there are many reasons to prefer Tails over Liberte.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 19, 2013, 12:56 am
Here is why you should be using Tor Browser on any operating system, rather than a regular browser (like the one on Liberte):

https://www.torproject.org/projects/torbrowser/design/
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Mcrad on July 19, 2013, 02:41 am
Which do you prefer. Tails or Liberte Linux and why?

Liberte is ostensibly more lightweight and hardened than Tails, but it hasn't been updated since September of last year, while Tails gets updated about once a month with bug fixes and new features. It implements things like obfsproxy bridge support and stream isolation, which Liberte does not. It uses Tor Browser, which is created with a set of 27 patches against Firefox, along with many changes in the default settings, to protect your anonymity and security, while Liberte uses the default Gnome browser. Overall, there are many reasons to prefer Tails over Liberte.


liberte uses Tor also. but i think i may give tails a try in the near future:p

much love_mcrad!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 19, 2013, 02:54 am
Tor Browser, not Tor. Of course they both you use Tor, but Tails uses Tor Browser, a modified version of Firefox with many anonymity and security enhancements.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 19, 2013, 02:25 pm
exe files are for Windows. Tails is a Linux distribution. There's a program called Wine that can run some Windows programs on Linux, but generally in order to run exe files, you'll need Windows.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: helpmywife on July 20, 2013, 11:00 am
can somebody please post how to make a persistent volume with the virtual machine!!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on July 21, 2013, 09:10 am
I finally did it! This is a dream come true for me! I have an important question though- Tails has a built in PGP encryption tool. How do I use it? I read there's absolutely no reason to get another PGP program outside of the Tails one. Okay cool but now where is it and what do I do with it? Also, I kept getting pop-ups saying webpages aren't encrypted and that anybody could easily see my activity or something like that. Is this something I should be worried about? I just clicked the "do not warn me again [or whatever]" box.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on July 21, 2013, 04:13 pm
The part with the webpages being unencrypted is fine.. I've talked to several people, and they all said they encounter the same thing when browsing Tor via Tails...

As for using PGP on Tails, your going to need to...

1.) Create a password for your secret key, and setting up a secret key by clicking on the little tablet that is to the left of where you click to connect to Wi-fi. In there, you will find a glossary of sort describing to you how you set up your own personal key..

2.)  After you do that, your going to want to find other peoples' public key and paste them into the third tab in the encryption applet labeled "other keys". You will need to sign there key, which will prompt you to enter a password again.

3.) In order to encrypt messages open G-edit under applications>accessories- third one down... type in your message, go to edit at the top and go down to Encrypt. It will then ask you who to send it to... once you decide who to send it to it will prompt you to enter your password you set up earlier.

4.) Decrypting is done in the same way as encyrpting, basically. All you need to to is paste the encrypted message you are trying to decrypting into G-edit and click on edit up at the top and this time click on decrypt instead of encrypt. I think it will prompt you to enter the password you set up earlier.

5.) And last step would be to send others your public key so that way they can communicate with you. This is accomplished by clicking the second tab in the encryption applet, going to the second tab labeled "my personal keys" copy  and then paste it into G-edit and it will generate your public key for you... then copy and paste your new public key to whomever you are trying to communicate with.... and Voila, should be good to go!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: tbart on July 21, 2013, 04:26 pm
i finally found the gedit app would encrypt, by accident - but still the process is a little "dis-combobulated" compared to the gpg4usb app

i just imported it into my Persistent volume, then once extracted, in the file i clik on the start_linux icon and it opens - that app is much more intuitive, for me anyway
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on July 21, 2013, 04:39 pm
Ya, but the PGP on Tails really isn't as difficult as I thought it was...
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on July 21, 2013, 11:27 pm
hielonite- Thanks so much for the response! I'll be trying that out in a little bit. Thank you!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: QuickSilverHawk on July 22, 2013, 09:05 pm
Sorry if it's been addressed before (too lazy to sift through all the posts, sorry), but I have a question...

Any upside/downside in opting to using an SD card instead of a USB stick? For some reason I just tend to prefer the SD cards. Compact, y'know.
I'm not too knowledgeable about hardware these days either, so I'd like to know - does it really matter what SD card I choose to buy/use?

Thanks in advance.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on July 23, 2013, 12:20 am
QuickSilverHawk- Well, SD cards are smaller and also easier to break which is a plus.

anybody- please explain how the fuck I find my private and public key blocks on the tails PGP because I cannot do it.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on July 23, 2013, 03:46 am
I think the way to get your public key is to open the PGP applet. Then go to the second tab "My Personal Keys"
Right click your key and go to copy. Then paste it into G-edit.

I think?

 I'm not really sure how to get the private key though.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: TMan99 on July 23, 2013, 05:20 am
I am going to become a vendor. So I need to make sure I am doing everything I can.

I run tails on a CD, connect to my own internet, and then tor pops up through ice weasel and I use SR.

I have never decrypted a message before, I have encrypted plenty, so it should be easy enough once I decide to get a key. There was never a need for one in the past...

What else should I do to ensure I am 100% anonymous? I don't "encrypt" anything and when I switch web pages I get that, "You are sending over and unencrypted connection are you sure you want to continue, etc."
Should I set up bridges?
Should I stay on a CD instead of switching to a USB?

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: helpmywife on July 23, 2013, 10:07 am
tman99 my advice is set up the obfs3 bridges immiediately!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 23, 2013, 08:38 pm
I am going to become a vendor. So I need to make sure I am doing everything I can.

I run tails on a CD, connect to my own internet, and then tor pops up through ice weasel and I use SR.

I have never decrypted a message before, I have encrypted plenty, so it should be easy enough once I decide to get a key. There was never a need for one in the past...

What else should I do to ensure I am 100% anonymous? I don't "encrypt" anything and when I switch web pages I get that, "You are sending over and unencrypted connection are you sure you want to continue, etc."
Should I set up bridges?
Should I stay on a CD instead of switching to a USB?

Well, there's no such as being 100% anonymous, but your anonymity is measured by the size of your anonymity set, ie the group of people that you are indistinguishable from. If someone knows nothing about you, your anonymity set would be the 7 billion people on earth, but you appear to be a native English speaker (although I could be wrong), so that narrows you down to a few hundred million people. With other details, people could reduce your anonymity set even further. An anonymity set of a few people, or perhaps a few dozen people, is dangerous to our security because LE has the resources to investigate all of them. Also, a single crucial detail could uniquely identify you, so that's what you want to avoid.

You're using Tails, so that's a good start. It's an open source operating system that is unlikely to be backdoored. The developers aren't going to work with LE. There's basically zero chance of getting infected by malware. It gives you the option to create an encrypted volume and doesn't leave evidence on unencrypted media. It provides transparent proxying of network connections over Tor, reducing the chances of accidental IP address leaks. It even scrambles RAM on shutdown.

The one thing I would strongly suggest you do is start using bridges. You'll have to enter them manually on each boot, since there is no mechanism to make them persistent yet, but you don't want to change entry guards during each session, as that reduces your anonymity by increasing the chances that an adversary owns one of your entry guards.

Of course, this is half the battle. If you want robust anonymity, you need to change your behavior. There are obvious things like not telling anyone your name or logging into sites that are linked to your identity (Facebook), but also less obvious things like providing minor details about yourself. Don't describe the weather where you live, don't tell people you are going to festival X, don't inform people when you are going on vacation, that kind of stuff. Little data crumbs can add up to uniquely identify you, just ask that Hammond guy in Chicago.

As a vendor, you should read through the Shipping forum to get ideas about secure shipping, eliminating smell and fingerprints, discreet packaging, rotating drop points, etc. Don't bring your mobile phone when you mail packages! That's a big one. You'll learn more as you go along.

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: helpmywife on July 24, 2013, 04:45 am
astor i have a question i use bridges on tails but i cant run the obfs2 or 3 bridges
! are the reg good enough what should i do?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 24, 2013, 06:46 am
helpmywife, the most likely reason is that you are not putting "obfs2" or "obfs3" before the IP address.

Normally when you add bridges, you enter something like this:

12.34.56.78:433

But for an obfs2 bridge, you enter:

obfs2 12.34.56.78:433

Also note when you go to bridges.torproject.org that the obfs2 and obfs3 bridges are listed separately from normal bridges. Not all bridges support the version 2 and 3 protocols.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: TMan99 on July 24, 2013, 07:01 am
I am going to become a vendor. So I need to make sure I am doing everything I can.

I run tails on a CD, connect to my own internet, and then tor pops up through ice weasel and I use SR.

I have never decrypted a message before, I have encrypted plenty, so it should be easy enough once I decide to get a key. There was never a need for one in the past...

What else should I do to ensure I am 100% anonymous? I don't "encrypt" anything and when I switch web pages I get that, "You are sending over and unencrypted connection are you sure you want to continue, etc."
Should I set up bridges?
Should I stay on a CD instead of switching to a USB?

Well, there's no such as being 100% anonymous, but your anonymity is measured by the size of your anonymity set, ie the group of people that you are indistinguishable from. If someone knows nothing about you, your anonymity set would be the 7 billion people on earth, but you appear to be a native English speaker (although I could be wrong), so that narrows you down to a few hundred million people. With other details, people could reduce your anonymity set even further. An anonymity set of a few people, or perhaps a few dozen people, is dangerous to our security because LE has the resources to investigate all of them. Also, a single crucial detail could uniquely identify you, so that's what you want to avoid.

You're using Tails, so that's a good start. It's an open source operating system that is unlikely to be backdoored. The developers aren't going to work with LE. There's basically zero chance of getting infected by malware. It gives you the option to create an encrypted volume and doesn't leave evidence on unencrypted media. It provides transparent proxying of network connections over Tor, reducing the chances of accidental IP address leaks. It even scrambles RAM on shutdown.

The one thing I would strongly suggest you do is start using bridges. You'll have to enter them manually on each boot, since there is no mechanism to make them persistent yet, but you don't want to change entry guards during each session, as that reduces your anonymity by increasing the chances that an adversary owns one of your entry guards.

Of course, this is half the battle. If you want robust anonymity, you need to change your behavior. There are obvious things like not telling anyone your name or logging into sites that are linked to your identity (Facebook), but also less obvious things like providing minor details about yourself. Don't describe the weather where you live, don't tell people you are going to festival X, don't inform people when you are going on vacation, that kind of stuff. Little data crumbs can add up to uniquely identify you, just ask that Hammond guy in Chicago.

As a vendor, you should read through the Shipping forum to get ideas about secure shipping, eliminating smell and fingerprints, discreet packaging, rotating drop points, etc. Don't bring your mobile phone when you mail packages! That's a big one. You'll learn more as you go along.
Astor, thanks for the reply. I have a couple more questions...

Do I have to download TOR onto a USB so I can access my PGP key? How else would I access my PGP key if I don't use a USB and stick to a CD... Is this possible? Other than my key, I have no reason to ever safe anything onto tails.

+ Basically, if I run tails there will never be anything written on my hard drive or router, so if the LE confinscates my laptop they will find nothing?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 24, 2013, 07:15 am
Astor, thanks for the reply. I have a couple more questions...

Do I have to download TOR onto a USB so I can access my PGP key? How else would I access my PGP key if I don't use a USB and stick to a CD... Is this possible? Other than my key, I have no reason to ever safe anything onto tails.

+ Basically, if I run tails there will never be anything written on my hard drive or router, so if the LE confinscates my laptop they will find nothing?

You need to transfer Tails to a thumb drive to enable the persistent volume, to save your key. You can't do that on a CD.

LE won't find anything on your hard drive. They could find the thumb drive but they would only see an encrypted volume, not its contents. Of course, an thumb drive is relatively easy to get rid of, flush it down the toilet, throw it out the window. You could have time to get rid of it even in a raid. It's much better than having data stored on your hard drive, which takes hours to overwrite.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: TMan99 on July 24, 2013, 07:57 am
I understand. Thanks for your help Astor.

Basically I am going to set up a USB from my CD. Then get on my USB and set up a persistent volume then get and save a PGP.

Everytime I run Tails I will enter in some bridges. How many bridges should I run? 1? 2? 3? Should they or should they not be the same bridges everytime?

And I should be allset to go from there...

Is all of this correct? + when I am on tails browsing TOR on one laptop, is it ok to have another laptop next to it browsing regular clearnet not running tails or anything? Or even using my phone to browse the internet.

All of this would be connected to one router.
Again, thanks for all the help Astor
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 24, 2013, 08:10 am
Everytime I run Tails I will enter in some bridges. How many bridges should I run? 1? 2? 3? Should they or should they not be the same bridges everytime?

Bridges can be hit or miss. Grab 2 or 3, see if they work. If not, grab a few more. Once you find a few that work, definitely stick with them. Don't change them. It's for your safety. You don't want to rotate your entry points often. They may be taken offline eventually and you'll have to get more, it's the nature of the Tor network. Relays/bridges exist because of volunteers who may quit at some point. Just stick with the useful ones for as long as possible.

Quote
Is all of this correct? + when I am on tails browsing TOR on one laptop, is it ok to have another laptop next to it browsing regular clearnet not running tails or anything? Or even using my phone to browse the internet.

I don't know why so many people ask this question. Yes of course it's safe. What happens on one computer has no effect on what happens on the other computer.


Quote
Again, thanks for all the help Astor

No problem man. :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: automatic on July 24, 2013, 12:27 pm
Nice tutorial Falkniven. So far, everything works like a charm. Thanks a lot for that.

I just tried to input a obfs3 bridge to Tor. For that, i thought to shut down Tor / Vidalia. So i right click on the Tor icon on the top and choose "exit". Then i recnogized, that in the background(?) Tor must still running, because i am still able to access this forum. What should be the correct way to do that?

I dont use a wireless network. I connected to a LAN wire. After Tails has started, i have to connect to the LAN manually. If i would use WiFi, Tor would connect automaticially and would start Tor, before i could enter the bridge.

So i am wonder, how is the correct way.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on July 24, 2013, 01:01 pm
I believe you hit "tab" while Tails is in the section where it just loaded and you have to choose between two options 1. I think is starting Tails normally 2. Is starting tails in a safefail. When you at that screen hit "tab".
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on July 24, 2013, 01:04 pm
How exactly do you find more bridges? And safe ones at that?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: automatic on July 24, 2013, 01:11 pm
I believe you hit "tab" while Tails is in the section where it just loaded and you have to choose between two options 1. I think is starting Tails normally 2. Is starting tails in a safefail. When you at that screen hit "tab".

This option i know so far. I wonder how to handle it while Tor / Vidalia is running already.

And i hope, that in the next release of Tails the bridges will be saved on the persitent volume. Now they get lost after reboot.

To find bridges;

CLEARNET
https://bridges.torproject.org/?transport=obfs2
CLEARNET
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on July 24, 2013, 01:29 pm
Ahh ya I heard that you have to update the bridges every time you run Tails again. But I'm not a computer tech so there might be a way to upload bridges while it is running. But I really don't see it likely considering you would want to open the bridges before connecting to Tor, not while it is running.

Thanks for the link  :D
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Candy on July 24, 2013, 03:56 pm
Hi all.

I have run into a bit of a problem in my efforts to set up a Tails Usb.

I consider myself as an advanced Windows user, and whenever i experience problems of any kind, a bit of research and logical sense will almost always provide a solution.

I started out by creating a Tails Usb, from windows and it worked like a charm on several machines. However i wanted to have the persistent volume feature, and went on to acquire another usb i could set up from inside Tails. Once this was done i formatted the first usb, and also set that one up with persistent volume.

So far so good.

But now my laptop (Which was originally intended to run all my Tor activities from now on), is refusing to boot from either of the usb's! (It had no problem before the persistent volume feature).

I am beginning to feel like i have tried everything short of formatting the entire Pc, but I still can't get it to boot up!
As a last resort i tried to make a Tails dvd, and again that seems to work like a charm. I then proceeded to create another Tails Usb from the laptop itself, while running Tails (To see if this could get it to accept it), but that wont work either!

Whenever i try to boot from the usb, the laptop will just ignore the boot order and boot into Windows anyway! This seems to be the case no matter what i do, accept if i make the hdd first boot priority, and then, when booting, hit F12 and manually select the usb (so I am bypassing the hdd entirely in the boot order?). In this case it will just say that there are no operating system found!

In my attempt at fault finding, i have discovered that windows seem to create an error message whenever i try to boot from usb but it boots windows instead. This error message goes something along the lines of "ACPI BIOS Is Attempting to Create an Illegal Memory OpRegion starting at 0x0", and while i have been trying to seek for solutions, I cant seem to find any that is applicable for my situation (most recommend updating BIOS, but i am already at the newest version).

I have also been looking at advice in this thread, but after working with this for ~ the last 26 hours, I must admit that I could easily have missed something.

Hoping someone can provide some kind of advice, or guide me towards anything that might work.

Thanks in advance  ???
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: helpmywife on July 25, 2013, 04:04 am
TAILS having amnesia doesnt save my wifi password so it doesnt sign in until i do. therefore if i write down say 10 bridges and put them in the same order everytime before signing into the wifi and im using tails. i got around the rotating issue and then i can start using tails at home correct?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 25, 2013, 04:29 am
TAILS having amnesia doesnt save my wifi password so it doesnt sign in until i do. therefore if i write down say 10 bridges and put them in the same order everytime before signing into the wifi and im using tails. i got around the rotating issue and then i can start using tails at home correct?

Sounds good, except 10 is too many. If you know they work, use 2 or 3.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 25, 2013, 04:35 am
Whenever i try to boot from the usb, the laptop will just ignore the boot order and boot into Windows anyway! This seems to be the case no matter what i do, accept if i make the hdd first boot priority, and then, when booting, hit F12 and manually select the usb (so I am bypassing the hdd entirely in the boot order?). In this case it will just say that there are no operating system found!

In my attempt at fault finding, i have discovered that windows seem to create an error message whenever i try to boot from usb but it boots windows instead. This error message goes something along the lines of "ACPI BIOS Is Attempting to Create an Illegal Memory OpRegion starting at 0x0", and while i have been trying to seek for solutions, I cant seem to find any that is applicable for my situation (most recommend updating BIOS, but i am already at the newest version).

I doubt anyone here has encountered this problem or knows how to solve it, but by Googling the error message I found this:

http://support.microsoft.com/kb/330054

Microsoft recommends contacting the BIOS manufacturer for a possible update.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: helpmywife on July 25, 2013, 04:53 am
Quote from: helpmywife on Today at 04:04 am

    TAILS having amnesia doesnt save my wifi password so it doesnt sign in until i do. therefore if i write down say 10 bridges and put them in the same order everytime before signing into the wifi and im using tails. i got around the rotating issue and then i can start using tails at home correct?


Sounds good, except 10 is too many. If you know they work, use 2 or 3.


thanks but why does it matter, i thought it would be faster? also should i use the same order does that matter?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 25, 2013, 05:09 am
If there are any malicious bridges, using 10 instead of 2 increases the chances that you pick a malicious one by 5 fold.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: helpmywife on July 25, 2013, 05:25 am
but i use bridges from the yorproject website how can it be compromised sir?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 25, 2013, 05:37 am
Relays and bridges are run by volunteers, not by the Tor Project developers. Any of them could theoretically be run by malicious operators. There's a lot of research analyzing potential attacks based on this assumption. You're not 100% safe using Tor, you're just a lot safer than when you connect over clearnet or other anonymity networks (while still getting certain functionality). The whole point of entry guards is to minimize the threat of picking malicious nodes. The reason I strongly suggest using bridges as persistent entry guards with Tails rather than rotating guards with each session is to minimize the threat of picking malicious nodes. Using 2 bridges instead of 10, when 2 is all you need anyway, also minimizes the threat of picking malicious nodes.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: helpmywife on July 25, 2013, 05:54 am
if i can get a fiend or two to set up relays inside network only then is he unsafe? and also i really only need one friend to do it right?
and thanks for your help and prompt responce sir! its much appreciated.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on July 25, 2013, 04:14 pm
Astor, what is your opinion on other anonymous services like "Freenet" and "I2P"?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 25, 2013, 04:19 pm
I think kmf has the best description of the three main anonymity networks, along with the benefits and weaknesses of each. Take a look at this thread:

http://dkn255hz262ypmii.onion/index.php?topic=170508.msg1216201#msg1216201
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 25, 2013, 04:21 pm
if i can get a fiend or two to set up relays inside network only then is he unsafe? and also i really only need one friend to do it right?
and thanks for your help and prompt responce sir! its much appreciated.

On its face this shouldn't be a problem as long as your friend is trustworthy and won't record or mess with your connection, but I have this bias that I'd rather not know any of the people who run the relays that I use. I guess it comes from thinking about exit bridges and plausible deniability.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: helpmywife on July 25, 2013, 08:00 pm
hes going to set up only internal only .onion sites. honestly its cool i know this person well i can trust them actually with my debit card and pin . itd cool
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: TMan99 on July 25, 2013, 10:08 pm
What is the best option concerned with security:

Talis ---> Bridges ----> Tor
Tails ---> VPN ---> Tor
Tails ---> VPN ---> Bridges ---> Tor

The VPN I would use would most likely be private internet access

With the 3rd option the VPN hides TOR usage from your ISP, while the bridges hide your usage from the VPN. But mainly the bridges are in place in the case the VPN fails (this has happened to me before as I run VPN 24/7 on clearnet, and twice I have looked and saw that I had been disconnected) If this were to happen my tor usage would be seen by the ISP.

I am not an expert, so I thouhgt I would leave the options here for the experts
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: helpmywife on July 26, 2013, 12:39 am
What is the best option concerned with security:

Talis ---> Bridges ----> Tor
Tails ---> VPN ---> Tor
Tails ---> VPN ---> Bridges ---> Tor

The VPN I would use would most likely be private internet access

With the 3rd option the VPN hides TOR usage from your ISP, while the bridges hide your usage from the VPN. But mainly the bridges are in place in the case the VPN fails (this has happened to me before as I run VPN 24/7 on clearnet, and twice I have looked and saw that I had been disconnected) If this were to happen my tor usage would be seen by the ISP.

I am not an expert, so I thouhgt I would leave the options here for the experts

+1 for a good question, although all almost all my questions got me neg karma ima give you good karma because i like the question AND I CAN.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Candy on July 26, 2013, 01:09 am

I doubt anyone here has encountered this problem or knows how to solve it,

Yeah I was kind of afraid of that, but figured it was worth a try.

but by Googling the error message I found this:
http://support.microsoft.com/kb/330054

Microsoft recommends contacting the BIOS manufacturer for a possible update.

I also came across that one, but unfortunately I already have the latest Bios version.

I am now at a point where I have successfully booted a Tails Usb, but this is only possible when the Usb have been created from Windows, via Usb Installer.
If I try to create persistent volume, or in any way fiddle with this installation from another Tails Usb, the laptop (again) refuses to boot from it!
So I guess that this means that I will have to settle for an Usb without persistent volume.

But aside from my fucked up laptop, I am really enjoying my Tails experience at this point.
Kind of makes me want to switch from Microsoft, to Linux...  :D
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on July 26, 2013, 07:26 am
What is the best option concerned with security:

Talis ---> Bridges ----> Tor
Tails ---> VPN ---> Tor
Tails ---> VPN ---> Bridges ---> Tor

The VPN I would use would most likely be private internet access

With the 3rd option the VPN hides TOR usage from your ISP, while the bridges hide your usage from the VPN. But mainly the bridges are in place in the case the VPN fails (this has happened to me before as I run VPN 24/7 on clearnet, and twice I have looked and saw that I had been disconnected) If this were to happen my tor usage would be seen by the ISP.

I am not an expert, so I thouhgt I would leave the options here for the experts

+1 for a good question, although all almost all my questions got me neg karma ima give you good karma because i like the question AND I CAN.

LOL, helpmywife... why didn't you just quote what Tman said... instead of copying and pasting it. It kind of threw me for a loop. I thought you two were the same account at first..
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on July 26, 2013, 07:57 am
I think the way to get your public key is to open the PGP applet. Then go to the second tab "My Personal Keys"
Right click your key and go to copy. Then paste it into G-edit.

I think?

 I'm not really sure how to get the private key though.
You're fucking right! I really appreciate you taking the time to address my (silly?) issues.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: tbart on July 26, 2013, 03:48 pm
this TAILS thing has kind of opened my eyes to a lot of possibilities, and i'm curious to ask a couple of linux questions

 this linux seems to work beautifully, and easy - the fact that it has a windows "mask" makes it a little easier as well (i figured there was some sort of DOS screen, where i'd have to learn to type in commands.

Okay, keeping in my i'm still a fred flintstone of computerese, just a general answer(s) will serve.

 - i've got a samsung notebook that i'd love to use, ie install TAILS on it and use it exclusively, wiping windows off the hard drive entirely. Now, the persistent volume i'd leave on the USB flash drive. Is this "do-able". Reason is i'd rather not have anything near the desktop computer ( i still have a couple of internet enterprises that i just don't want TOR even installed on, etc. 2nd reason, the samsung notebook is a first gen unit that the BIOS will not let me adjust the boot priority to allow it to boot of the USB drive - i spent more than a couple of hours on the samsung chat forums and this was a definite issue with this model - i even spent time with samsung tech assist online (which are 24/7 and great) and they helped me update BIOS but still, with no option for USB boot - later models do have the option in their BIOS

 1st Reason is basically, that notebook is only for browsing the web when i'm on the couch or take with me somewhere - for general browsing (the two news sites i visit) i assume there are faster or non-TOR browsers available. Is this correct?

2) i'm figuring, with Tails on the system, it should recognize the USB drive with the persistent volume - am i correct and is this possible?

thanks in advance


Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: TMan99 on July 27, 2013, 03:36 am
What is the best option concerned with security:

Talis ---> Bridges ----> Tor
Tails ---> VPN ---> Tor
Tails ---> VPN ---> Bridges ---> Tor

The VPN I would use would most likely be private internet access

With the 3rd option the VPN hides TOR usage from your ISP, while the bridges hide your usage from the VPN. But mainly the bridges are in place in the case the VPN fails (this has happened to me before as I run VPN 24/7 on clearnet, and twice I have looked and saw that I had been disconnected) If this were to happen my tor usage would be seen by the ISP.

I am not an expert, so I thouhgt I would leave the options here for the experts
Does anyone have any info on the above?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: helpmywife on July 28, 2013, 01:47 am
this TAILS thing has kind of opened my eyes to a lot of possibilities, and i'm curious to ask a couple of linux questions

 this linux seems to work beautifully, and easy - the fact that it has a windows "mask" makes it a little easier as well (i figured there was some sort of DOS screen, where i'd have to learn to type in commands.

Okay, keeping in my i'm still a fred flintstone of computerese, just a general answer(s) will serve.

 - i've got a samsung notebook that i'd love to use, ie install TAILS on it and use it exclusively, wiping windows off the hard drive entirely. Now, the persistent volume i'd leave on the USB flash drive. Is this "do-able". Reason is i'd rather not have anything near the desktop computer ( i still have a couple of internet enterprises that i just don't want TOR even installed on, etc. 2nd reason, the samsung notebook is a first gen unit that the BIOS will not let me adjust the boot priority to allow it to boot of the USB drive - i spent more than a couple of hours on the samsung chat forums and this was a definite issue with this model - i even spent time with samsung tech assist online (which are 24/7 and great) and they helped me update BIOS but still, with no option for USB boot - later models do have the option in their BIOS

 1st Reason is basically, that notebook is only for browsing the web when i'm on the couch or take with me somewhere - for general browsing (the two news sites i visit) i assume there are faster or non-TOR browsers available. Is this correct?

2) i'm figuring, with Tails on the system, it should recognize the USB drive with the persistent volume - am i correct and is this possible?

thanks in advance




In my opinion if you dont need the laptop, actually take out the hardrive and itll look like worthless piece of metal. Only you will know what is for! It will then be forced to load right into the USB stick.TAILS should only be used for SR and other such things that end in .ONION     
for everything else use a normal computer for that normal stuff. And make sure you use Bridges and write them down so you can use the same 3. THEY ARE NOT PERSISTENT IF YOU CHANGE BRIDGES EVERYDAY YOU WILL PUT UP CRAZY RED FLAGS
BE SAFE ASK MORE QUESTIONS
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: onesickpuppy on July 28, 2013, 02:16 am
This is not bad. Better than Liberte. Just one question.. I tested a  user account on SR and when logging in it says:


The information you have entered is to be sent over an unencrypted connection and could easily be read by a third party.

Are you sure you want to continue sending this information?


I never got that message when using the tor bundle on windows....

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: tbart on July 28, 2013, 02:34 am
this TAILS thing has kind of opened my eyes to a lot of possibilities, and i'm curious to ask a couple of linux questions

 this linux seems to work beautifully, and easy - the fact that it has a windows "mask" makes it a little easier as well (i figured there was some sort of DOS screen, where i'd have to learn to type in commands.

Okay, keeping in my i'm still a fred flintstone of computerese, just a general answer(s) will serve.

 - i've got a samsung notebook that i'd love to use, ie install TAILS on it and use it exclusively, wiping windows off the hard drive entirely. Now, the persistent volume i'd leave on the USB flash drive. Is this "do-able". Reason is i'd rather not have anything near the desktop computer ( i still have a couple of internet enterprises that i just don't want TOR even installed on, etc. 2nd reason, the samsung notebook is a first gen unit that the BIOS will not let me adjust the boot priority to allow it to boot of the USB drive - i spent more than a couple of hours on the samsung chat forums and this was a definite issue with this model - i even spent time with samsung tech assist online (which are 24/7 and great) and they helped me update BIOS but still, with no option for USB boot - later models do have the option in their BIOS

 1st Reason is basically, that notebook is only for browsing the web when i'm on the couch or take with me somewhere - for general browsing (the two news sites i visit) i assume there are faster or non-TOR browsers available. Is this correct?

2) i'm figuring, with Tails on the system, it should recognize the USB drive with the persistent volume - am i correct and is this possible?

thanks in advance




In my opinion if you dont need the laptop, actually take out the hardrive and itll look like worthless piece of metal. Only you will know what is for! It will then be forced to load right into the USB stick.TAILS should only be used for SR and other such things that end in .ONION     
for everything else use a normal computer for that normal stuff. And make sure you use Bridges and write them down so you can use the same 3. THEY ARE NOT PERSISTENT IF YOU CHANGE BRIDGES EVERYDAY YOU WILL PUT UP CRAZY RED FLAGS
BE SAFE ASK MORE QUESTIONS


it's not going to boot off the usb drive - i've actually gotten to level 2 tech assist at samsung, level 2 guy seemed to know quite abit about this issue and said the BIOS can't be changed to the later vs BIOS like the other models have

it has to be the notebook's SSD - this was sammie's first gen SSD notebook btw, suspect that has something to do with my issue - the archectiture is "unique" or peculiar

appreciate the input though - that was a good thought for a regular HDD notebook or a later gen sammie notebook
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 28, 2013, 02:44 am
What is the best option concerned with security:

Talis ---> Bridges ----> Tor
Tails ---> VPN ---> Tor
Tails ---> VPN ---> Bridges ---> Tor

The VPN I would use would most likely be private internet access

With the 3rd option the VPN hides TOR usage from your ISP, while the bridges hide your usage from the VPN. But mainly the bridges are in place in the case the VPN fails (this has happened to me before as I run VPN 24/7 on clearnet, and twice I have looked and saw that I had been disconnected) If this were to happen my tor usage would be seen by the ISP.

I am not an expert, so I thouhgt I would leave the options here for the experts
Does anyone have any info on the above?

The question is moot because you can't run OpenVPN on Tails and the developers are against adding that functionality.

Your only option right now is to manually enter bridges on each boot for persistence, and hope they add persistence presets in the near future. The easy solution is to symlink torrc to the persistent volume, but Tails is designed for non-techie people and the developers are probably strongly against letting them fuck with torrc.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 28, 2013, 03:01 am
this TAILS thing has kind of opened my eyes to a lot of possibilities, and i'm curious to ask a couple of linux questions

 this linux seems to work beautifully, and easy - the fact that it has a windows "mask" makes it a little easier as well (i figured there was some sort of DOS screen, where i'd have to learn to type in commands.

haha no, but that's the stereotype. A lot more Linux users use a terminal than Windows users use the DOS prompt, but that's because they are more tech savvy in general. You can completely avoid it though.

Quote
- i've got a samsung notebook that i'd love to use, ie install TAILS on it and use it exclusively, wiping windows off the hard drive entirely. Now, the persistent volume i'd leave on the USB flash drive. Is this "do-able".

Sure. First check if your hard drive has ATA Secure Erase, because hardware based erasure is the most secure. From reading your description of the laptop, it probably doesn't. In that case, burn DBAN to a CD and use that to overwrite it. The default settings (2 random writes + 1 zero write) are fine.

Quote
2) i'm figuring, with Tails on the system, it should recognize the USB drive with the persistent volume - am i correct and is this possible?

So you want to put the Tails image on the hard drive? I'm not sure how you would do that. If you remove the hard drive, shouldn't the BIOS check for other bootable media and use whatever is available, even if doesn't let you change the default boot order in the case of multiple bootable devices? That might be an easier solution.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 28, 2013, 03:08 am
This is not bad. Better than Liberte. Just one question.. I tested a  user account on SR and when logging in it says:


The information you have entered is to be sent over an unencrypted connection and could easily be read by a third party.

Are you sure you want to continue sending this information?


I never got that message when using the tor bundle on windows....

That is a Firefox warning, because your connection to hidden services doesn't involve the SSL protocol, so it thinks the connection is unencrypted, but it is end-to-end encrypted by Tor and Firefox doesn't know that. They should patch Firefox to remove the warning for onion addresses but haven't done it yet. You can ignore/disable the warning for now.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: TMan99 on July 28, 2013, 06:06 am
What is the best option concerned with security:

Talis ---> Bridges ----> Tor
Tails ---> VPN ---> Tor
Tails ---> VPN ---> Bridges ---> Tor

The VPN I would use would most likely be private internet access

With the 3rd option the VPN hides TOR usage from your ISP, while the bridges hide your usage from the VPN. But mainly the bridges are in place in the case the VPN fails (this has happened to me before as I run VPN 24/7 on clearnet, and twice I have looked and saw that I had been disconnected) If this were to happen my tor usage would be seen by the ISP.

I am not an expert, so I thouhgt I would leave the options here for the experts
Does anyone have any info on the above?

The question is moot because you can't run OpenVPN on Tails and the developers are against adding that functionality.

Your only option right now is to manually enter bridges on each boot for persistence, and hope they add persistence presets in the near future. The easy solution is to symlink torrc to the persistent volume, but Tails is designed for non-techie people and the developers are probably strongly against letting them fuck with torrc.
Well, that sucks.

So the best option is Tails, Bridges, Tor. There are no other perks to be more secure then possibly using public wifi..

Also, when I start tails I enter "Bridges" into the boot options by pressing tab. But I am not able to enter in the bridges until I actually connect to the internet and tor starts where i go in and enter the bridges. But at this point I already see the tails homepage and am connected to tor.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Frylexa on July 28, 2013, 07:04 am
What is the best option concerned with security:

Talis ---> Bridges ----> Tor
Tails ---> VPN ---> Tor
Tails ---> VPN ---> Bridges ---> Tor

The VPN I would use would most likely be private internet access

With the 3rd option the VPN hides TOR usage from your ISP, while the bridges hide your usage from the VPN. But mainly the bridges are in place in the case the VPN fails (this has happened to me before as I run VPN 24/7 on clearnet, and twice I have looked and saw that I had been disconnected) If this were to happen my tor usage would be seen by the ISP.

I am not an expert, so I thouhgt I would leave the options here for the experts
Does anyone have any info on the above?

The question is moot because you can't run OpenVPN on Tails and the developers are against adding that functionality.

Your only option right now is to manually enter bridges on each boot for persistence, and hope they add persistence presets in the near future. The easy solution is to symlink torrc to the persistent volume, but Tails is designed for non-techie people and the developers are probably strongly against letting them fuck with torrc.

Well, that's interesting, as I run Tails from a thumb drive, while maintaining a VPN connection. So it isn't totally impossible.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: PrincessButtercup on July 30, 2013, 07:53 pm
What is the best option concerned with security:

Talis ---> Bridges ----> Tor
Tails ---> VPN ---> Tor
Tails ---> VPN ---> Bridges ---> Tor

The VPN I would use would most likely be private internet access

With the 3rd option the VPN hides TOR usage from your ISP, while the bridges hide your usage from the VPN. But mainly the bridges are in place in the case the VPN fails (this has happened to me before as I run VPN 24/7 on clearnet, and twice I have looked and saw that I had been disconnected) If this were to happen my tor usage would be seen by the ISP.

I am not an expert, so I thouhgt I would leave the options here for the experts
Does anyone have any info on the above?

The question is moot because you can't run OpenVPN on Tails and the developers are against adding that functionality.

Your only option right now is to manually enter bridges on each boot for persistence, and hope they add persistence presets in the near future. The easy solution is to symlink torrc to the persistent volume, but Tails is designed for non-techie people and the developers are probably strongly against letting them fuck with torrc.
Well, that sucks.

So the best option is Tails, Bridges, Tor. There are no other perks to be more secure then possibly using public wifi..

Also, when I start tails I enter "Bridges" into the boot options by pressing tab. But I am not able to enter in the bridges until I actually connect to the internet and tor starts where i go in and enter the bridges. But at this point I already see the tails homepage and am connected to tor.

Try this:

Open Vidalia before opening your internet connection. A pop-up will say something about Tor exiting unexpectedly - ignore it and press ok.  Right click the icon and open settings. click on network and add your bridges as usual. When you click ok it will say something about not being able to save - ignore it.  Exit from Tor. Now open your internet connection and when Tor is up and running, check the settings again. You'll find the bridges you added remain and your connecion is now seemlessly flowing over the one of the bridge relays you've loaded.

hope this helps.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on July 30, 2013, 09:28 pm
Well, that's interesting, as I run Tails from a thumb drive, while maintaining a VPN connection. So it isn't totally impossible.

That is interesting. Can you explain to us how you did it, and did you confirm the VPN is going over Tor and not connecting directly?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: RevDrGod on August 04, 2013, 05:30 pm
I have a question about TAILS.  As I understand it, TAILS "announces" that it is anonymous and that you are surfing anonymously when you use it. If you ask me that attracts attention. So why if your trying to surf anonymously, would you want to announce to the entire world that  your trying not to be noticed, while your trying not to be noticed???
 I think this situation is really 'South Park" material LOLOLOL
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on August 07, 2013, 07:43 pm
Normally, when I'm using TAILS for about half an hour, it suddenly loses connection and I can't reconnect, even to my wifi. Sometimes when I'm trying to change my settings around and shit I get a message saying "System policy prevents modification of system settings [...]" Then it asks for the "Password for root". What the fuck is this "root" business? I'm normally connected to autoetho, then it disconnects and I haven't figured out how to connect again. When not using TAILS, my computer is connected to my wi-fi. I've entered my MAC address and selected "autoconnect" for my wi-fi connection but it still isn't working for me. I'd really appreciate some help.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on August 07, 2013, 09:16 pm
I have a question about TAILS.  As I understand it, TAILS "announces" that it is anonymous and that you are surfing anonymously when you use it. If you ask me that attracts attention. So why if your trying to surf anonymously, would you want to announce to the entire world that  your trying not to be noticed, while your trying not to be noticed???

The source of this misinformation seems to be Riseup, since I've seen other people reference it on their web site. When you surf clearnet sites, your connection comes from a Tor exit node, and there are public lists of those relays. In fact, they are added to some block lists, which many web sites use, which is why you might be blocked from accessing some sites when using Tor.

Tails isn't "announcing" that you're anonymous, it's just known by the fact that your connection is coming from an exit node. You can't hide the fact that you are using Tor from the destination site unless you point the Tor Browser at a web proxy, which would stand between the exit node and the destination site. But none of that matters. You are still anonymous within the set of all Tor users, which is millions of people. The destination site knows you're browsing anonymously, but it doesn't know your identity, which is the only thing Tor claims to protect.

The Tor Project is actually against obfuscating the fact that you are using Tor. They believe you have a right to surf anonymously, but site operators have a right to block whoever they want from accessing their site, and you shouldn't be hiding the fact that you are using Tor from them.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on August 07, 2013, 09:23 pm
Normally, when I'm using TAILS for about half an hour, it suddenly loses connection and I can't reconnect, even to my wifi. Sometimes when I'm trying to change my settings around and shit I get a message saying "System policy prevents modification of system settings [...]" Then it asks for the "Password for root". What the fuck is this "root" business?

Root is the Linux term for administrator or super user. It's telling you that when you are logged in as a regular user, you don't have administrator privileges, so you can't change system settings. In order to do that, you have to click the option at the login prompt to set an administrator (root) password.

But you shouldn't be using Tails as the administrator. You should do normal activities as the regular user. The fact that root has no password set when you log in as a regular user is a security feature, because an attacker can't get root privileges on Tails by guessing a password. He would have to exploit a privilege escalation bug, which may be considerably harder.

Quote
I'm normally connected to autoetho, then it disconnects and I haven't figured out how to connect again. When not using TAILS, my computer is connected to my wi-fi. I've entered my MAC address and selected "autoconnect" for my wi-fi connection but it still isn't working for me. I'd really appreciate some help.

I'm not sure. It sounds like the Linux driver for your wireless card is buggy. I recommend buying a cheap wifi dongle that works well with Linux. You can search the reviews on a site like Newegg for the key word "Linux" and see what other people have to say. You can find wifi dongles that work excellent on Linux for like $10-15.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: djtiesto on August 08, 2013, 08:00 am
11 - Make sure your modem is plugged in and turned ON! Click the 'System' menu, then highlight the 'Preferences' submenu, then click on 'Network Connections'. Now, only YOU know what type of internet connection you pay for, I cannot help you with that! My personal internet connection was amazingly simple to setup (i was quite surprised by its pre-configured setups, it has many different countries options for local telcos pre-installed).
     

Does that mean it's safe to connect to my wifi network after I completed all the steps?

I'm not familiar with linux...can someone show me the steps on how to set up pgp on tails?

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on August 08, 2013, 08:10 am
Normally, when I'm using TAILS for about half an hour, it suddenly loses connection and I can't reconnect, even to my wifi. Sometimes when I'm trying to change my settings around and shit I get a message saying "System policy prevents modification of system settings [...]" Then it asks for the "Password for root". What the fuck is this "root" business?

Root is the Linux term for administrator or super user. It's telling you that when you are logged in as a regular user, you don't have administrator privileges, so you can't change system settings. In order to do that, you have to click the option at the login prompt to set an administrator (root) password.

But you shouldn't be using Tails as the administrator. You should do normal activities as the regular user. The fact that root has no password set when you log in as a regular user is a security feature, because an attacker can't get root privileges on Tails by guessing a password. He would have to exploit a privilege escalation bug, which may be considerably harder.

Quote
I'm normally connected to autoetho, then it disconnects and I haven't figured out how to connect again. When not using TAILS, my computer is connected to my wi-fi. I've entered my MAC address and selected "autoconnect" for my wi-fi connection but it still isn't working for me. I'd really appreciate some help.

I'm not sure. It sounds like the Linux driver for your wireless card is buggy. I recommend buying a cheap wifi dongle that works well with Linux. You can search the reviews on a site like Newegg for the key word "Linux" and see what other people have to say. You can find wifi dongles that work excellent on Linux for like $10-15.
My network connection on TAILS disconnected and I just selected a different one (I don't remember if it was wi-fi or wired) and I'm connected again. So far it's been about 20 minutes and I'm still good. Maybe it was because I just recently entered the MAC address for my wi-fi and haven't tried to reconnect this way yet. Thanks for the reply. Informative. I'll keep that in mind if need be.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on August 08, 2013, 08:27 am
11 - Make sure your modem is plugged in and turned ON! Click the 'System' menu, then highlight the 'Preferences' submenu, then click on 'Network Connections'. Now, only YOU know what type of internet connection you pay for, I cannot help you with that! My personal internet connection was amazingly simple to setup (i was quite surprised by its pre-configured setups, it has many different countries options for local telcos pre-installed).
     

Does that mean it's safe to connect to my wifi network after I completed all the steps?

I'm not familiar with linux...can someone show me the steps on how to set up pgp on tails?


I stored my old tor on a unsecured usb before this, so should I just throw that away?
Seeing as how Astor didn't tell me not to, I think it's safe. Plus, people do it (not that that alone makes it safe) in internet cafes and shit, right?

When you're running the normal TAILS layout, look in the top right corner for a little clipboard. Click it. Select "Manage Keys". In the new window, select file>new and go from there. Before you finish creating your key, there's a little box that says "Advanced". You can increase the bit there for a stronger key.

Why wouldn't you throw it away? Destroy it first, then throw it away because you now have a better method.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on August 08, 2013, 08:30 am
Here's what helped me when I inquired about PGP for TAILS

The part with the webpages being unencrypted is fine.. I've talked to several people, and they all said they encounter the same thing when browsing Tor via Tails...

As for using PGP on Tails, your going to need to...

1.) Create a password for your secret key, and setting up a secret key by clicking on the little tablet that is to the left of where you click to connect to Wi-fi. In there, you will find a glossary of sort describing to you how you set up your own personal key..

2.)  After you do that, your going to want to find other peoples' public key and paste them into the third tab in the encryption applet labeled "other keys". You will need to sign there key, which will prompt you to enter a password again.

3.) In order to encrypt messages open G-edit under applications>accessories- third one down... type in your message, go to edit at the top and go down to Encrypt. It will then ask you who to send it to... once you decide who to send it to it will prompt you to enter your password you set up earlier.

4.) Decrypting is done in the same way as encyrpting, basically. All you need to to is paste the encrypted message you are trying to decrypting into G-edit and click on edit up at the top and this time click on decrypt instead of encrypt. I think it will prompt you to enter the password you set up earlier.

5.) And last step would be to send others your public key so that way they can communicate with you. This is accomplished by clicking the second tab in the encryption applet, going to the second tab labeled "my personal keys" copy  and then paste it into G-edit and it will generate your public key for you... then copy and paste your new public key to whomever you are trying to communicate with.... and Voila, should be good to go!


I think the way to get your public key is to open the PGP applet. Then go to the second tab "My Personal Keys"
Right click your key and go to copy. Then paste it into G-edit.

I think?

 I'm not really sure how to get the private key though.
(he's right)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: PrincessButtercup on August 10, 2013, 06:34 pm
**subbed**

Great tutorial for those thinking of moving over to TAILS (new build just out!).

pb.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: helpmywife on August 10, 2013, 09:21 pm
so the new TAILS is out i have a brand new unused usb and want to make is a persistent volume, im on a friends computer using my TAILS usb its not a persistent volume though. do i just follow the steps above to upgrade to the new version an a persistent volume?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: batfucker on August 11, 2013, 12:31 am
Hi all, been on the Road for a while but just recently decided to go through with it.  (I think) I got my persistent drive all set up and ready to go.  Just have a couple n00by questions.  Whenever I click to submit a piece of information, for instance my log-in info to get on the SR, or when I click the post button on the forums, it comes up with a notification telling me that I am sending information over an unencrypted server and it could easily be read by a third party.  Is this indicative of a bad installation or is this just the nature of me submitting anything using my internet and happens to pretty much everyone? 

Also, I should probably be asking this in the Electrum tutorial thread, but the issue is more related to tails i think.  When I try to configure my persistent volume to add the /home/amnesia/.electrum to my persistent volume, I don't have the option to add anything new, it only allows me to select or unselect what type of files I want to be saved into my encrypted partition(Personal data, GnuPG, SSH client, etc.). 

Just yesterday I installed tails for the first time, so I am running on the new 0.20 update.  I apologize in advance for the noobie questions.  I'm pretty lame when it comes to computers and I really appreciate what all of you guys do here in this forum.  Without you guys I'd practically be a sitting duck for uncle sammy to make an example of.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: zandermanreturns on August 11, 2013, 12:38 am
Tails up and running for the first time, no problems so far and the instructions made this so easy. Much respect for the author and community for the informative help :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on August 11, 2013, 03:21 am
Whenever I click to submit a piece of information, for instance my log-in info to get on the SR, or when I click the post button on the forums, it comes up with a notification telling me that I am sending information over an unencrypted server and it could easily be read by a third party.  Is this indicative of a bad installation or is this just the nature of me submitting anything using my internet and happens to pretty much everyone? 
That's normal for everybody, although, I thought they took that out in the 0.20 update
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: BandWThomas on August 11, 2013, 11:04 am
Got tails up and running and so far have managed to encrypt an address (practise only)

Thanks to those who took time to compile these instructions and to those who answered peoples questions in the thread
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Miss Sexy Boots on August 11, 2013, 01:30 pm
11 - Make sure your modem is plugged in and turned ON! Click the 'System' menu, then highlight the 'Preferences' submenu, then click on 'Network Connections'. Now, only YOU know what type of internet connection you pay for, I cannot help you with that! My personal internet connection was amazingly simple to setup (i was quite surprised by its pre-configured setups, it has many different countries options for local telcos pre-installed).
     

Does that mean it's safe to connect to my wifi network after I completed all the steps?

I'm not familiar with linux...can someone show me the steps on how to set up pgp on tails?


I stored my old tor on a unsecured usb before this, so should I just throw that away?

Edit*
hmm it works perfect on pc laptops but macbook doesn't recognize it

Does Mac's support this Tails set up?    Y / N...

Apologies well in advance for this most Uber-N00B question...

:)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: samesamebutdifferent on August 11, 2013, 02:01 pm
I was never able to get tails to work on OSX, after much faffing around I gave up and have now installed Whonix instead, as far as I know its even more secure than tails.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: zandermanreturns on August 11, 2013, 05:43 pm
Been trying to figure out how to use PGP inside tails and having troubles.
https://tails.boum.org/doc/encryption_and_privacy/gpgapplet/public-key_cryptography/index.en.html
This kinda helped but i still cannot figure out how to use it correctly. Need a "For dummies" guide for these things. Any help in its most basic form would be appriciated, laymans terms :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: django on August 12, 2013, 08:54 am
hoping someone can help me with my question.

i upgraded from .19 to .20

i press tab then enter bridge, on the boot up screen from there, it comes up with a pch file registry error or something, it flashes really quick, then boots up fine after that.

is this something to be worried about?

thanks
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Real_Drugs on August 13, 2013, 12:38 am
I was never able to get tails to work on OSX, after much faffing around I gave up and have now installed Whonix instead, as far as I know its even more secure than tails.

Is Whonix hard to instal? It would be great if someone could post a guide.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on August 13, 2013, 01:13 am
Is Whonix hard to instal? It would be great if someone could post a guide.

For the default images that the Whonix people provide, it's extremely easy. Install VirtualBox, start it up, then File -> Import Appliance for each of the images, then click Start to run them.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Q789123 on August 13, 2013, 01:58 am
hey guys, I am a computer dumby, so i just purchased this in order to use tails(as is advised)

http://www.ninjastik.com/

What do you all think? Have i wasted my btc?

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on August 13, 2013, 03:41 am
Been trying to figure out how to use PGP inside tails and having troubles.
https://tails.boum.org/doc/encryption_and_privacy/gpgapplet/public-key_cryptography/index.en.html
This kinda helped but i still cannot figure out how to use it correctly. Need a "For dummies" guide for these things. Any help in its most basic form would be appriciated, laymans terms :)
Personal Messaging you
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: zandermanreturns on August 13, 2013, 12:36 pm
Been trying to figure out how to use PGP inside tails and having troubles.
https://tails.boum.org/doc/encryption_and_privacy/gpgapplet/public-key_cryptography/index.en.html
This kinda helped but i still cannot figure out how to use it correctly. Need a "For dummies" guide for these things. Any help in its most basic form would be appriciated, laymans terms :)
Personal Messaging you

Good man  /\ /\ /\   working like a charm now and have passed on the good word . +1  :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: theman22 on August 13, 2013, 05:31 pm
Have tails burned to a dvd been trying to get it working just don't know how to do any help? Going to keep trying tho
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: theman22 on August 13, 2013, 07:28 pm
Update got it working :)

Time to figure out pgp

Here when on the internet and i log into the forums and post it says "The information you have entered is to be sent over an unencrypted connection and could easily be read by a third party.

Are you sure you want to continue sending this information?"

Is this normal through tails?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on August 13, 2013, 08:16 pm
Been trying to figure out how to use PGP inside tails and having troubles.
https://tails.boum.org/doc/encryption_and_privacy/gpgapplet/public-key_cryptography/index.en.html
This kinda helped but i still cannot figure out how to use it correctly. Need a "For dummies" guide for these things. Any help in its most basic form would be appriciated, laymans terms :)
Personal Messaging you

Good man  /\ /\ /\   working like a charm now and have passed on the good word . +1  :)
Thanks for the shout-out and I'm glad it's working for you.

Update got it working :)

Time to figure out pgp

Here when on the internet and i log into the forums and post it says "The information you have entered is to be sent over an unencrypted connection and could easily be read by a third party.

Are you sure you want to continue sending this information?"

Is this normal through tails?
PM you too
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: VersacePandaEgg on August 13, 2013, 10:27 pm
Finally got around to using Tails, glad I took the time out to figure it it out a long with PGP, definitely feel much safer now.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: theman22 on August 14, 2013, 09:51 am
Thanks to livestrongs nice little pm iv got my head around pgp with tails seemed pretty straight forward once i gave it a try.

Now for my next question :s..I'm using tails through a DVD and every time i switch it off and restart i have to set everything on it up again. For example i made a pgp key and saved it as a file sent a message then shutdown, once i restarted the file saved was gone and i need to make a new key. Theres no way that i will have to do that every time i go on tails is there? Is there a way to permanently save files?

Any guidance will be appreciated :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: fbny71 on August 14, 2013, 04:36 pm
Use the DVD to create a USB Tails with persistence so it saves many of your settings and has space to write files. You can choose whether or not to enable the feature on login.

Thanks to livestrongs nice little pm iv got my head around pgp with tails seemed pretty straight forward once i gave it a try.

Now for my next question :s..I'm using tails through a DVD and every time i switch it off and restart i have to set everything on it up again. For example i made a pgp key and saved it as a file sent a message then shutdown, once i restarted the file saved was gone and i need to make a new key. Theres no way that i will have to do that every time i go on tails is there? Is there a way to permanently save files?

Any guidance will be appreciated :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: theman22 on August 14, 2013, 05:03 pm
Use the DVD to create a USB Tails with persistence so it saves many of your settings and has space to write files. You can choose whether or not to enable the feature on login.

Thanks to livestrongs nice little pm iv got my head around pgp with tails seemed pretty straight forward once i gave it a try.

Now for my next question :s..I'm using tails through a DVD and every time i switch it off and restart i have to set everything on it up again. For example i made a pgp key and saved it as a file sent a message then shutdown, once i restarted the file saved was gone and i need to make a new key. Theres no way that i will have to do that every time i go on tails is there? Is there a way to permanently save files?

Any guidance will be appreciated :)

Cheers does that mean i need to install tails on a usb stick?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: fbny71 on August 14, 2013, 05:12 pm
As far as I know that is only way to run persistence. There's a tutorial at the beginning of this thread regarding setting up a persistent USB stick.

Use the DVD to create a USB Tails with persistence so it saves many of your settings and has space to write files. You can choose whether or not to enable the feature on login.

Thanks to livestrongs nice little pm iv got my head around pgp with tails seemed pretty straight forward once i gave it a try.

Now for my next question :s..I'm using tails through a DVD and every time i switch it off and restart i have to set everything on it up again. For example i made a pgp key and saved it as a file sent a message then shutdown, once i restarted the file saved was gone and i need to make a new key. Theres no way that i will have to do that every time i go on tails is there? Is there a way to permanently save files?

Any guidance will be appreciated :)

Cheers does that mean i need to install tails on a usb stick?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: theman22 on August 14, 2013, 05:24 pm
As far as I know that is only way to run persistence. There's a tutorial at the beginning of this thread regarding setting up a persistent USB stick.

Use the DVD to create a USB Tails with persistence so it saves many of your settings and has space to write files. You can choose whether or not to enable the feature on login.

Thanks to livestrongs nice little pm iv got my head around pgp with tails seemed pretty straight forward once i gave it a try.

Now for my next question :s..I'm using tails through a DVD and every time i switch it off and restart i have to set everything on it up again. For example i made a pgp key and saved it as a file sent a message then shutdown, once i restarted the file saved was gone and i need to make a new key. Theres no way that i will have to do that every time i go on tails is there? Is there a way to permanently save files?

Any guidance will be appreciated :)

Cheers does that mean i need to install tails on a usb stick?

Okie dokie looks like ill need to give it another few reads and get my hands on a usb stick. you got a +1 for your help :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: bigbabbablue on August 14, 2013, 06:19 pm
Tails up and running!
Thanks...Wasn't that hard, even for a noob like me  :P

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: fbny71 on August 14, 2013, 07:37 pm
Thanks, I'll hit you back with one too.


Okie dokie looks like ill need to give it another few reads and get my hands on a usb stick. you got a +1 for your help :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Lysergix on August 15, 2013, 08:55 pm
So i downloaded Tails and the USB installer, and booted from the USB but it always gets stuck at the same point.

It gives me the option of Fail Safe Tails and regular tails for a second or two and then boots, and a black screen with a loading bar and "debian" in the bottom right comes up. The bar loads, but then freezes once it is fully loaded.

Any ideas?

I used the latest version of Tails and the installer, should i be using an older one?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: djtiesto on August 16, 2013, 02:08 am
I got tails running on persistent vol  and follow guide all way and no issues but when use ice weazel and try to make SR account it said

Security Warning

The information you entered is to be sent over an unencrypted connection and could easily be read by a third party

are you sure you want to continue sending this information?

I clicked cancel


HAve javascript turn off nd connected to my wifi is this normal? i m not safe? and can be read 3rd party?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on August 16, 2013, 04:34 am
I got tails running on persistent vol  and follow guide all way and no issues but when use ice weazel and try to make SR account it said

Security Warning

The information you entered is to be sent over an unencrypted connection and could easily be read by a third party

are you sure you want to continue sending this information?

I clicked cancel


HAve javascript turn off nd connected to my wifi is this normal? i m not safe? and can be read 3rd party?
I see that question about as often as TAILS PGP questions. It's normal, don't worry about it. I think there's ways to be even more secure and not have those pop-ups (VPN?) but they're not a big deal.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: djtiesto on August 16, 2013, 05:51 am
Sorry for nuub questions and thank you for the help


last question, so if i connect to wifi through router or network name its secured as long as I'm on tails?

I wish I can send u sum karma +1
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hitit on August 16, 2013, 07:12 am
@Fallkniven

Thanks so much for the great tutorial mate!! I found it so easy to follow and have successfully installed the new tails and got it all up and running!

It's legends like you that make this community what it is! Once I am a full member I will be returning to give you yet another well deserved +1

Thanks again champion :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on August 16, 2013, 07:22 pm
Sorry for nuub questions and thank you for the help


last question, so if i connect to wifi through router or network name its secured as long as I'm on tails?

I wish I can send u sum karma +1
It's all good. I needed help when I was starting out too. All in due time, buddy. I've always been under the under the impression that it's safe. This post made me more confident that it is:

I'm normally connected to autoetho, then it disconnects and I haven't figured out how to connect again. When not using TAILS, my computer is connected to my wi-fi. I've entered my MAC address and selected "autoconnect" for my wi-fi connection but it still isn't working for me. I'd really appreciate some help.

I'm not sure. It sounds like the Linux driver for your wireless card is buggy. I recommend buying a cheap wifi dongle that works well with Linux. You can search the reviews on a site like Newegg for the key word "Linux" and see what other people have to say. You can find wifi dongles that work excellent on Linux for like $10-15.
(Astor has a reputation as somewhat of a computer genius, especially when it comes to security, if you didn't know.)

P.S. I've since fixed this problem.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on August 17, 2013, 02:05 am
Can .20 update be made from USB with .19 already installed? Or do I have to go out and buy 2 new USBs?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on August 17, 2013, 05:51 am
Can .20 update be made from USB with .19 already installed? Or do I have to go out and buy 2 new USBs?
After hours of work, I discovered it can be done! Go to the TAILS website (I prefer on my normal OS) and download the .20 ISO. Remember where it was saved to. Run TAILS and click more to enter a root password for the session. In TAILS USB Installer, select Upgrade from ISO. Insert the USB you want upgraded. Find where you saved the .20 ISO, select it, and you should just have to follow directions from there.

I know that wasn't a very detailed explanation but I think you're a smart person who can figure it out. If not, just let me know.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: wheres wally on August 17, 2013, 07:54 pm
Waldo - it's because Onion address do not use regular SSL encryption, if you have connected correctly to the Tor network, all your communications will be encrypted.

(correct me if i'm wrong, please...)

Fallkniven, thankyou for this thread.
it's been very helpful. :)
peace man
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: hielonite on August 18, 2013, 07:36 pm
Can .20 update be made from USB with .19 already installed? Or do I have to go out and buy 2 new USBs?
After hours of work, I discovered it can be done! Go to the TAILS website (I prefer on my normal OS) and download the .20 ISO. Remember where it was saved to. Run TAILS and click more to enter a root password for the session. In TAILS USB Installer, select Upgrade from ISO. Insert the USB you want upgraded. Find where you saved the .20 ISO, select it, and you should just have to follow directions from there.

I know that wasn't a very detailed explanation but I think you're a smart person who can figure it out. If not, just let me know.

Thank you sir... sounds pretty reasonable the way you outlined it...
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: bho4ever on August 20, 2013, 06:41 pm
Really nice tutorial and easy to follow, but i did run into a problem that i need help with. I've followed all the steps without any issues until  it's time to create an Encrypted Persistent Volume at step 9b - Click "Create" and wait for it to finish. After i click create, the computer just freezes and nothing seems to happen. Is this a problem with not having enough system memory? I'm using 512MB on a disposable laptop. Thanks for any help.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: djtiesto on August 21, 2013, 09:35 am
is having tails on usb with persistent voume just ass safe as tails image burnd into dvd?

i kno u cant sav on cd so will cd be jus as safe?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: theman22 on August 22, 2013, 04:50 pm
Ive got yet another question for you computer geniuses :D

Ive finally burnt tails onto the usb now when i go to reboot with just the usb in at the start when the screen is black it quickly flashes "USB boot failed.....Generic drive" what does this mean? however after a little bit of fiddling about and keeping the disc and the usb in it lets me run off the usb and create a persistent volume. Will i always need to keep the disc in as well to use the usb or I'm i missing something?

If this is explained at the start i allow you all to cyber-slap me
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: THUMBSuP. on August 23, 2013, 02:05 am
just started running Tails from a Live CD..
and when i go to websites like this it pops up saying..
"you are connecting to an unencrypted network third parties could easily see.."

blah blah..
how do i get Tails utilized for safety and anonymity?
it is running through iceweasel.. with the tor button.

i usually just use the tor browser..
but i figured it's been way overdue to jump on a THUMBdrive.. ;)

thanks for any and all help!!!



cheers.
/thumbs
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: zandermanreturns on August 23, 2013, 03:29 am
nevermind i figured out jabber but my next question is this. I was given a handel for chat "blahblah@blah.me" and i dont have the faintest idea how to add this to a chat list or buddy list so we can infact chat. any help is appreciated :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on August 23, 2013, 07:12 am
just started running Tails from a Live CD..
and when i go to websites like this it pops up saying..
"you are connecting to an unencrypted network third parties could easily see.."

blah blah..
how do i get Tails utilized for safety and anonymity?
it is running through iceweasel.. with the tor button.

i usually just use the tor browser..
but i figured it's been way overdue to jump on a THUMBdrive.. ;)

thanks for any and all help!!!



cheers.
/thumbs
I think you have to set up bridges or VPN to make that go away but as long as your TAILS is up to date, you should have nothing to worry about.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: djtiesto on August 23, 2013, 08:15 am
ok so running tails from usb persistent volume,, every time launch ice weazel I see that on the top right that vidalia is yellow until after few minutes

wat if u connect to silk raod if it yellow? does mean i wasnt annonymous... or is me being paranoid


only happened first 2 days I got tails when i log in without waiting to be green or complete ly in tor

but usually me checked https://check.torproject.org/ and it said im configuered
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: THUMBSuP. on August 23, 2013, 11:50 pm
just started running Tails from a Live CD..
and when i go to websites like this it pops up saying..
"you are connecting to an unencrypted network third parties could easily see.."

blah blah..
how do i get Tails utilized for safety and anonymity?
it is running through iceweasel.. with the tor button.

i usually just use the tor browser..
but i figured it's been way overdue to jump on a THUMBdrive.. ;)

thanks for any and all help!!!



cheers.
/thumbs
I think you have to set up bridges or VPN to make that go away but as long as your TAILS is up to date, you should have nothing to worry about.

thanks!
and another question, sorry if it is dumb..
but, under the Tor Button, Preferences..
should i use the "recommended proxy for Firefox"..
or the "Socksv5"

??
thanks!


/thumbs
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: bho4ever on August 24, 2013, 04:52 am
djtiesto, are you talking about the onion icon is flashing yellow? that sounds like it's letting you know there's an update for Tor Browser Bundle.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: THUMBSuP. on August 24, 2013, 02:56 pm
djtiesto, are you talking about the onion icon is flashing yellow? that sounds like it's letting you know there's an update for Tor Browser Bundle.

onion with a red X = not connected to the Tor network.
onion(yellow) = means it is connecting to the Tor network.
onion(green) = connected to the Tor network.

right?
i could be wrong and sorry if i am.



pewpew.
/thumbs
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: bho4ever on August 24, 2013, 04:32 pm
djtiesto, are you talking about the onion icon is flashing yellow? that sounds like it's letting you know there's an update for Tor Browser Bundle.

onion with a red X = not connected to the Tor network.
onion(yellow) = means it is connecting to the Tor network.
onion(green) = connected to the Tor network.

right?
i could be wrong and sorry if i am.



pewpew.
/thumbs

that's correct. when he's connected to the network and the browser is open, the icon next to the address bar will flash yellow, I'm sure that means an update is available.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: THUMBSuP. on August 25, 2013, 12:25 am
where is the meatgrinder guide from LiveCD -> USB..
sorry if i missed it.



thanks!


/thumbs
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: pathenry76 on August 25, 2013, 06:06 am
When I boot tails it gives me the option for "tails" or "tails(failsafe)". What is the difference?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: THUMBSuP. on August 25, 2013, 06:25 am
When I boot tails it gives me the option for "tails" or "tails(failsafe)". What is the difference?

i believe (failsafe)
is Tails version of Safe Mode.
i could be wrong.



/thumbs
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: pathenry76 on August 25, 2013, 06:27 am
When I boot tails it gives me the option for "tails" or "tails(failsafe)". What is the difference?

i believe (failsafe)
is Tails version of Safe Mode.
i could be wrong.



/thumbs

At the risk of sounding like a complete newb, what's safe mode?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Bazille on August 25, 2013, 10:07 am
Safe mode means it's more likely to boot without crashing due to driver issues etc.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: p1klz on August 26, 2013, 04:43 am
Just wnated to give a big thanks to Fallkniven for the great guide. Your guide was as clear and concise as it could possibly come. I can't issue enough good karma for the time you've taken to help out others the way you have. Thanks man!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: pathenry76 on August 26, 2013, 10:21 pm
Does anyone know where I can download the iso image for tails 0.19? I need it to successfully instal the electrum wallet on tails 0.20. The tor project website directs me to the 0.20 download page even after searching for 0.19.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: skeezoo8586 on September 01, 2013, 05:21 am
sub
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Daily Deals on September 02, 2013, 11:18 am
thanks for the tutorial man
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: ManofKush766 on September 05, 2013, 03:41 pm
Can somebody help me out with a fairly simple Tails issue?

Have been having some trouble figuring out how to get an address encrypted, then output in the ASCII character mode in the LiveUSB Tails. Installed and followed every instruction to the dot, the problem is that I am fairly unfamiliar with the Linux/Tails OS and need help figuring this last piece of information out.

Thanks to all Community members! Have a good day you guys

Found my answer guys: To all future users here is the information

https://tails.boum.org/doc/encryption_and_privacy/gpgapplet/public-key_cryptography/index.en.html

Hope this helps out!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Mcrad on September 10, 2013, 08:05 am
im no newbie but for the life of me i cant remember how to verify the iso file.


fml

Much love _mcrad!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on September 11, 2013, 10:00 pm
I just noticed this tidbit from the Tor Blog:

Quote
Not all new Tor users are computer programs! According to their latest report, Tails is now booted twice as much as it was six months ago (from 100,865 to 190,521 connections to the security feed).

Could we call that the SR bump? :)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Mcrad on September 12, 2013, 11:54 pm
im having lots of trouble. im trying to create a bootable SD card with tails. but when i go to verify and sign the tails .iso it says key not valid?

can anyone walk me through this. i was using liberte but am switching to tails because they seem to me more up to date:)

love and light_mcrad!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: astor on September 13, 2013, 12:20 am
How are you trying to verify the signature?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: charas420 on September 13, 2013, 02:26 pm
Hi  it's a happy day day today, even with no opiates.
I have had no TOR connection with the browser bundle for a weekor so. I kept getting 'Proxy' error messages.
Finally decided to  install Tails.
I'm a little long in the tooth, & not to IT proficient. BUT I have finally got Tails to work for me!!
I have not got the persistent volume yet. I am just happy to have some TOR access again.
Thanks for the tips in this thread!!
C

Update 24hrs later I now have the persistent volume set up and configured.  I am unsure of exactly how to use it, any tips would be really helpful, if any one has the time. Thanks.
C
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Llama Socks on September 15, 2013, 03:11 pm
I've been meaning to set up tails for sometime, I clicked on this thread and it laid it out so well I just did it.
Sadly the laptop I usually work with doesn't seem to give any other boot options, when it even allows me in the menu :(

I like how it warns me when I'm about to enter un-encrypted data though.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: charas420 on September 18, 2013, 05:11 pm
Hi again

 I'm using Tails all the time now, I need some help with the pgp applet please.
If any one could link me to a guide or the like I would be very grateful.
Thank you in advance.
C

 I found this guide for dummies, I have got it sussed. Here is the link
http://dkn255hz262ypmii.onion/index.php?topic=202385.msg1454796#msg1454796
in case any one else needs it

C
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on September 19, 2013, 04:42 am
Hi again

 I'm using Tails all the time now, I need some help with the pgp applet please.
If any one could link me to a guide or the like I would be very grateful.
Thank you in advance.
C

 I found this guide for dummies, I have got it sussed. Here is the link
http://dkn255hz262ypmii.onion/index.php?topic=202385.msg1454796#msg1454796
in case any one else needs it

C
Thanks for sharing  ;)
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: A1pha on September 23, 2013, 07:18 pm
I am going to give this tails a go. one question.  do I need a new unused USB stick or will an old one with a few miles on the clock be ok?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: John555 on September 24, 2013, 01:54 pm
Hi,
can somebody tell me, how to compare VPN and tails?
I know tails do not has any VPN support, so is it possible to to combine it?

I can not manage router to let all all traffic go thruogh VPN.
Can i install open VPN on tails? How to do it?
Do i need to save it in persistance?
regards
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: awesome1126 on September 24, 2013, 02:03 pm
This worked so well for me for so long on my Windows 8 computer using the following method, but now it's broken, any advice?

1. Set boot mode to legacy and change boot order to USB stick as the first one.

2. Download universal USB installer and the most recent TAILS.iso. Install onto USb stick after formatting.

3. Restart computer and hold shift while restarting to enter the UEFI Boot mode. Choose to boot from the disk.

Now here's where things get weird, usually I get one "boot device not recognized" error, followed by me selecting the USb stick as the boot device again on a different screen, and then TAILS will load. BUT NOW when I follow all of these instructions with the newest version of TAILS on a diff USB stick I get a "No boot device error" and then am unable to go any further.... any advice?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Mcrad on September 24, 2013, 06:56 pm
How are you trying to verify the signature?


what i've been doing is opening the .ISO in gpg4win and trying to sign and verify with the downloaded iso signature and pgp key?

but it keeps giving me that damn error message!

much love_mcrad!
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on September 24, 2013, 08:41 pm
I am going to give this tails a go. one question.  do I need a new unused USB stick or will an old one with a few miles on the clock be ok?
The drive will be formatted anyway so it doesn't really  matter if there was something on it as long as there's at least 3 GB of memory on it.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: A1pha on September 24, 2013, 10:12 pm
thank you. I am going to start playing with it over the weekend.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Beachyshapes on September 25, 2013, 02:46 am
Do you have to set up tails through Tor or will clearnet be fine?

As in the downloading of the two programs?

Cheers.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on September 25, 2013, 11:05 pm
Do you have to set up tails through Tor or will clearnet be fine?

As in the downloading of the two programs?

Cheers.
Well, I didn't have any success with downloading through tor (tried twice and the download froze each time) so I used clearnet. Tor was literally taking hours but clearnet took a few minutes. I'm not necessarily advising you, I'm just sharing a personal relevant story.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: batfucker on September 26, 2013, 10:43 pm
Anyone else having issues updating to the newest version of tails?  I've tried twice to upgrade and clone following the directions on the tails site.  When I try to do this, it installs the old version and doesn't clone any of my persistent files.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Porn Star on September 28, 2013, 01:56 am
Yes, I'm also having trouble updating to 0.20.1
What's up with that?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: django on September 28, 2013, 02:08 am
i lost everything on my usb electrum wallet the lot doing the upgrade from 20 to 20.1. came up with a error message 17 or something.

i am in the process of following the setup here which i overlooked. i will report back if installing 19, selecting electrum wallet in the persistent setup and then upgrading from 19 to 20 and from 20 to 20.1 will work.

update- i am unable to succesfully get 20.1 working without having to do a complete fresh install.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: batfucker on September 28, 2013, 05:38 am
Damn dude sucks about your wallet. Is it gone for good?  And same here with upgrading.  I've tried a couple times to clone and upgrade but it just isn't working.  I'm not getting an error message or anything, and it looks like everything was properly installed but when I boot up the new cloned drive it has just installed .20 and tells me I need to upgrade.  Before upgrading it I completely wiped the drive I'm cloning to so I know its not leftovers from when I installed .20 when it came out.. I think lol.

When you do a fresh install, you are basically starting out with a blank slate right? Like no information or anything can be transferred from your persistent drive?
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: django on September 28, 2013, 05:55 am
Damn dude sucks about your wallet. Is it gone for good?  And same here with upgrading.  I've tried a couple times to clone and upgrade but it just isn't working.  I'm not getting an error message or anything, and it looks like everything was properly installed but when I boot up the new cloned drive it has just installed .20 and tells me I need to upgrade.  Before upgrading it I completely wiped the drive I'm cloning to so I know its not leftovers from when I installed .20 when it came out.. I think lol.

When you do a fresh install, you are basically starting out with a blank slate right? Like no information or anything can be transferred from your persistent drive?


didnt have any coins in it luckily, but i always keep the passphrase on a encrypted usb so i was able to restore it on completion kind of.

to answer your question yes i had to start from stratch, download 20.1 install on one usb,then clone and install onto 2nd one.then reboot and create persistent again.

this is the only way i have gotten it to work, i may well be wrong though.it wouldnt be the first time.lol.

i havent got electrum to save the wallet and reboot it on login, i dont think it works on 20.1.

so what i have done is keep a copy of the passphrase on encrypted usb and then when you click on the electrum symbol  restore using the existing passphrase created on the 20.1 usb or if you have a copy of your original electrum passphrase you can restore it but it wont be persistent you will need to restore everytime you want to use it. if that makes sense.


i would save everything that you need on a usb and transfer it over once you have created a new persistent folder in 20.1 and then obviously delete/reformat etc.

tbh i am looking at migrating to whonix. 8)

Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: batfucker on September 28, 2013, 06:15 am
didnt have any coins in it luckily, but i always keep the passphrase on a encrypted usb so i was able to restore it on completion kind of.

to answer your question yes i had to start from stratch, download 20.1 install on one usb,then clone and install onto 2nd one.then reboot and create persistent again.

this is the only way i have gotten it to work, i may well be wrong though.it wouldnt be the first time.lol.

i havent got electrum to save the wallet and reboot it on login, i dont think it works on 20.1.

so what i have done is keep a copy of the passphrase on encrypted usb and then when you click on the electrum symbol  restore using the existing passphrase created on the 20.1 usb or if you have a copy of your original electrum passphrase you can restore it but it wont be persistent you will need to restore everytime you want to use it. if that makes sense.


i would save everything that you need on a usb and transfer it over once you have created a new persistent folder in 20.1 and then obviously delete/reformat etc.

tbh i am looking at migrating to whonix. 8)

Thanks for the tips man.  I guess I'm gonna have to do the same to get a persistent 20.1.  I never bothered with installing electrum because I never have a need to store any bitcoins in a wallet, so that saves me that hassle.  I get my shit as I need to spend it so I never have any coins I need to store safely.  Gives me some peace of mind lol.  I'm gonna have to check out whonix too.  I see people who rave about it but I've been pretty satisfied with tails thus far and I'm a computer noob so anything new is always a drawn-out process for me haha.  Anyways, I appreciate the info, SR-onward brother
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: p1klz on September 29, 2013, 03:51 am
Damn dude sucks about your wallet. Is it gone for good?  And same here with upgrading.  I've tried a couple times to clone and upgrade but it just isn't working.  I'm not getting an error message or anything, and it looks like everything was properly installed but when I boot up the new cloned drive it has just installed .20 and tells me I need to upgrade.  Before upgrading it I completely wiped the drive I'm cloning to so I know its not leftovers from when I installed .20 when it came out.. I think lol.

When you do a fresh install, you are basically starting out with a blank slate right? Like no information or anything can be transferred from your persistent drive?


Ok I was having the exact same problem as you when I ws trying to upgrade. I used the 'Clone & Upgrade' feature in the Tails USB installer and had the 0.21 .iso on a seperate USB stick. I thought that after completing the upgrade that it would update my current LIVE USB but in fact it was installed as an updated version of the secondary USB stick (the one with the 0.21 .iso on it).
So after a fair few times of shutting down and running Tails I was also getting the same "You need to update" message as soon as I got onto TOR ans furthermore I couldn't understand why the update didn't work. Then I shut down Tails again and ran pulled out my original Live USB and lo and behold, voila, I've the upgrade worked but now it was on the wrong USB stick!! So I stupdily clicked on Clone & Install when trying to clone it to my original USB and it wiped everything in persistent volume (which it says it would).

SO in short your upgrade is on the second USB stick that you've put the upgraded .iso on and if you absolutely must have it on your original Live USB stick then click on 'Clone & Upgrade' in order to maintain whatever's saved in your persistent volume otherwise you'll be in the position I found myself in and having to start afresh with your persistent volume.

Thank God I didn't have a bitcoin wallet saved there like you Django! I just installed Electrum yesterday.

I hope I haven't confused you in any way and moreso I hope I've been of some assistance to you. I'm glad I wasn't the only one who had this problem aswell.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: fbny71 on September 30, 2013, 02:32 pm
I've upgrade twice now without issue using the clone and upgrade feature.

I burn the new TAILS to CD, boot from the CD, stick my TAILS USB stick to be upgraded and click, click, click and it's done in like five minutes.

Damn dude sucks about your wallet. Is it gone for good?  And same here with upgrading.  I've tried a couple times to clone and upgrade but it just isn't working.  I'm not getting an error message or anything, and it looks like everything was properly installed but when I boot up the new cloned drive it has just installed .20 and tells me I need to upgrade.  Before upgrading it I completely wiped the drive I'm cloning to so I know its not leftovers from when I installed .20 when it came out.. I think lol.

When you do a fresh install, you are basically starting out with a blank slate right? Like no information or anything can be transferred from your persistent drive?


Ok I was having the exact same problem as you when I ws trying to upgrade. I used the 'Clone & Upgrade' feature in the Tails USB installer and had the 0.21 .iso on a seperate USB stick. I thought that after completing the upgrade that it would update my current LIVE USB but in fact it was installed as an updated version of the secondary USB stick (the one with the 0.21 .iso on it).
So after a fair few times of shutting down and running Tails I was also getting the same "You need to update" message as soon as I got onto TOR ans furthermore I couldn't understand why the update didn't work. Then I shut down Tails again and ran pulled out my original Live USB and lo and behold, voila, I've the upgrade worked but now it was on the wrong USB stick!! So I stupdily clicked on Clone & Install when trying to clone it to my original USB and it wiped everything in persistent volume (which it says it would).

SO in short your upgrade is on the second USB stick that you've put the upgraded .iso on and if you absolutely must have it on your original Live USB stick then click on 'Clone & Upgrade' in order to maintain whatever's saved in your persistent volume otherwise you'll be in the position I found myself in and having to start afresh with your persistent volume.

Thank God I didn't have a bitcoin wallet saved there like you Django! I just installed Electrum yesterday.

I hope I haven't confused you in any way and moreso I hope I've been of some assistance to you. I'm glad I wasn't the only one who had this problem aswell.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: fbny71 on September 30, 2013, 02:34 pm
Oh...just to be safe I back up the USB stick using an imager program so I can revert to previous state in the case there are issues.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: A1pha on September 30, 2013, 02:58 pm
is it safe to allow cookies in the tails os? obviously I just want to be safe but typing long random passwords at each login is a drag.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: livestr0ng on October 01, 2013, 07:55 pm
About 3 boots or so after upgrading TAILS, my drive has stopped working. I get all the way to the white and blue (two shades of blue) loading bar then the bar just gets all white and doesn't move on. That's my stick with a persistent volume. I'm on my stick without it right now. I din't have anything too important on it so I'm okay if I lose the info on it but what do I do? I've tried cloning and installing as well and cloning and upgrading from the no persistent volume stick to the persistent volume. At this point, I think my best option it to just format it and start over. My normal OS doesn't recognize the TAILS USB when plugged in though so how do I do this? Any other appropriate suggestions are welcome.
Title: Re: Full Tutorial - Installing Tails LiveUSB with a Persistent Volume.
Post by: Bazille on October 01, 2013, 10:30 pm
@livestr0ng
Maybe your USB stick is crap. Try booting it more often. Also stick it into another USB port.
Anyway, the information on the persistent volume may not be lost. It's probably possible to copy it to another USB stick. Don't ask me how though, I don't use Tails.