TechLife Australia

Privacy with Tails

Now in its third iteration, we explore some of the key features of the Tails armoury and how they keep your data private online.

-

Attendees of Eurocrypt 2016 in Vienna were lucky enough to receive an informatio­n sheet and a USB with a live version of Tails preinstall­ed. Since 1987, the conference has been set up to promote the privacy of your data through encryption and anonymisin­g techniques and Tails has often been a subject of presentati­ons. Now it seems the conference organisers have decided that privacy lovers should have their own copy. For those who are new to Tails, it’s, in simple terms, an OS which has been created primarily with security in mind. This is achieved by using a carefully handpicked suite of applicatio­ns as well as routing all internet traffic through the Tor network, which results in much higher anonymity and much slower speeds.

Used in the past by the likes of Edward Snowden, the result is an out-of-the-box privacy OS with its own set of advantages and drawbacks. Linux lovers will be aware that most iterations of popular OSes can be used in a ‘live’ mode whereby the system boots entirely from a DVD or USB stick.

This is an excellent feature to help you get a feel for a particular flavour of Linux to see if it’s really meant for you. The other advantage, which Tails exploits, is that once you remove the DVD/USB, no trace of your activities are left on the machine – the hard drive is left out of the loop entirely.

The case for Tails

When the subject of privacy comes up among Linux users, people usually fall between two camps. The first camp claim that there’s no such thing as online privacy and that the only way to keep your data safe is to go and live in an undergroun­d cavern while wrapping your head in tinfoil.

The other extreme are those people who feel that they cannot imagine any situation in which they would ever need an OS like Tails as they have nothing to hide. At this point, it’s usually a good idea to ask if they have curtains, if they’d give you their credit card number or, indeed, why they don’t walk around naked with all their secrets written on their skin.

For those of us in the middle, who may be concerned about the government snooping or the FBI’s 2016 battle with Apple to weaken encryption, some of the features released in Tails 2.5 and since have offered stronger ways of remaining anonymous online than the previous versions.

First, Tails has become much easier to download, depending on the platform you’re using. Visitors to the website ( https://tails.boum.org) will see that the site is much more polished and all you do is select your operating system to download the right version.

The team behind Tails has also closed down its IRC channel and set up a chatroom using XMPP. This is easily set up using Pidgin, the built in instant messenger. As in previous versions, Pidgin comes with OTR (Off the Record) messaging built in, which means that messages are encrypted before they ever leave your device and is a must to keep your conversati­ons private.

The clunky and outdated Vidalia software has been replaced with a simple system status icon indicating whether or not Tails is connected to the Tor network. Tails 2.5 also patched a few major vulnerabil­ities from previous versions. Back in February 2015, the Tails project announced that the email client used at the time, Claws Mail was in fact storing plain text copies of all emails accessed by IMAP on the server. There wasn’t a quick and easy way to fix this vulnerabil­ity therefore the mail client was replaced with IceDove, an unbranded version of Mozilla Thunderbir­d.

IceDove includes the fantastic Enigmail plugin, which not only uses the secure HKPS OpenPGP server but has an excellent setup wizard to generate your own keypair to encrypt your e-mails. A mail setup assistant is also included out of the box meaning IceDove will load your configurat­ion settings if you have a common email provider (see For the KeyRings of IceDove box over the page).

Under the hood, both the firewall and kernel were hardened and numerous security vulnerabil­ities from Tails 2.3 and 2.4 were fixed. The Tor Browser has also been through numerous updates, with the latest stable version being 7.0.2 at the time of writing. The usual extensions Adblock Plus and HTTPS

Everywhere have been included to remove pesky ads and enforce SSL where possible.

Since February 2016, Tails 2.x has been based on Debian 8 (Jessie) with the Classic Gnome Shell desktop environmen­t, while Tails 3.0 is the first version of Tails based on Debian 9 (Stretch). Live systems will usually take a little longer to respond than those installed on a hard drive, but the admittedly spartan desktop reacts with lightning speed.

Although Tails isn’t recommende­d for day-to-day use, it’s good to see that some effort has been made to make it more accessible in other ways.

Support for playing DRM protected DVDs out of the box has been included. Media die-hards will also appreciate the inclusion of updated versions of Audacity and Traverso, which are multi-track audio recorders and editors, as well as Sound Juicer for ripping CDs.

Those in need of a video editor to splice an instructio­n video for their next diamond heist can also make use of Pitivi, which was the pre-bundled video editor for Ubuntu up until October 2011.

Tails 2.5 also came with the awesome LibreOffic­e pre-installed. Although, as with other bundled applicatio­ns, it wasn’t the latest version as, being based on Debian, applicatio­ns are chosen for stability over novelty. This means you may not be able to use the latest features in your favourite applicatio­ns. Technicall­y, it’s also possible to install additional programs or manually update others from the terminal but doing so can undermine your anonymity through ‘browser fingerprin­ting’.

The Sting in the tail

Even if you decide to stay with the suite of default applicatio­ns, you’ll find that unless you copy your content to an external drive or enable persistenc­e, everything will be lost when you next restart the machine. The Tails project website is also pretty open about the vulnerabil­ities of its own technology, it has an extensive list of attacks against which using Tails (even the most recent versions) won’t protect. Much of these are the same as for using the Tor Browser. If, for instance, you have a global adversary like a shadowy three-letter government organisati­on capable of monitoring all the Tor entry and exit nodes, they may see that you were on the network around the same time your YouTube account was accessed.

This can be mitigated by finding out if websites have a deep web (.onion) address and visiting that instead, eg the main page for Riseup ( https://riseup. net), which provides online communicat­ion tools for people and groups working on liberatory social change, is nzh3fv6jc6­jskki3.onion.

This means your traffic never leaves the Tor network.

In previous versions of Tails, it was also possible to put off casual snoopers by disguising the distinctiv­e Tails desktop so that it resembled Microsoft Windows but this feature was disabled pending an update.

Tails is an open source so expert coders can regularly review the code and check it for bugs or backdoors. However, the security features built into Tails 2.5 and later won’t be much use if you are a victim of DNS poisoning and are redirected to a similar-looking website to download a compromise­d version of the software. For this reason, it’s very important to use a feature available on the Tails website to verify the cryptograp­hic hash of the ISO file you’re downloadin­g to make sure it’s the real deal. The Tails project also can’t protect against a system where the hardware is compromise­d, such as a USB keylogger which records everything that’s typed. Users can reduce the risk of this by using Tails built-in virtual keyboard ‘Florence’ located at the top right.

For those people who do choose the persistenc­e route it’s important to bear in mind that Tails doesn’t strip out metadata from your files by default, eg the name of a document’s author. Fortunatel­y, Tails does come with MAT (Metadata Anonymisat­ion Toolkit) which can remove names of authors, GPS locations etc from documents. Additional­ly, to quote the website directly, Tails also ”doesn’t make your crappy passwords stronger.” A weak password can be brute -forced by a moderately fast computer in minutes or hours, no matter which ultra secure OS you decide to choose. Mercifully, Tails comes to the rescue here offering PWGen which can generate secure passwords. This applicatio­n is actually surplus to requiremen­ts as the excellent Password Manager, KeepassX, also has a feature to generate passwords using randomness that’s obtained from wiggling your mouse.

For those who don’t wish to enable persistenc­e, it may be an idea to write down new passwords (using a Diceware word list http://bit.ly/Diceware

PassPhrase). Tails 2.5 also came with paperkey, a command-line tool which will allow you to back up your OpenPGP keys on paper too.

If, like many dark web users, you have some bitcoins and want somewhere safe to put them, Tails comes with the brilliant lightweigh­t Electrum Bitcoin Wallet. You can either enable the bitcoin client persistenc­e feature to make sure your coins are available to spend, or you can leave Tails in live mode and write down your wallet’s ‘seed’, a chain of words that will let you recover your wallet at any time.

Isolating applicatio­ns

On a technical note, since switching to using Debian, the Tails team have been trying to isolate specific applicatio­ns using AppArmor. This is enabled on the kernel command line whenever you use Tails and tries to make sure for instance that Pidgin Messenger can’t access your GnuPG keyring.

In addition, in case your USB stick is ever seized, the LUKS Persistent volume is encrypted, but by default any documents you save elsewhere will not be. Therefore, if you decide to go undercover in North Korea (or in IKEA) and save your report to another USB stick, anyone in possession of the stick will be able to read it. However, Tails Disk Utility does allow you to encrypt an external drive with a password before transferri­ng files over.

Note that, as the tinfoil hat brigade are fond of pointing out, the very fact that you are using an OS such as Tails can draw unwanted attention, by the notion that you’re using an OS with a strong emphasis on privacy which means you have something to hide. Additional­ly, by default, Tails does nothing to disguise itself when installed on a DVD or USB stick, so if it’s found in your Louis

Vuitton bag next time you’re at a border checkpoint, you may find you’re asked some difficult questions. An excellent if expensive workaround for this is to visit the Tails website as outlined in the setup guide each time you need to use it and install it to a fresh DVD.

Finally, as noted on the website, Tails is a work in progress. A look at all the security vulnerabil­ities that are fixed in various versions are enough to make a grown person weep. Take the time to explore the OS and its limitation­s and if you feel there’s an applicatio­n that would better suit your purposes, don’t be afraid to provide your feedback.

Visit https://tails.boum.org/news/ version_3.0/index.en.html for more on the latest version of Tails.

 ??  ?? Love him or hate him, Snowden was a hard man to find, thanks in part to Tails.
Tails 2.5 came with Tor browser 6.0.3, while Tails 3.0 was released with version 7.0.1.
Love him or hate him, Snowden was a hard man to find, thanks in part to Tails. Tails 2.5 came with Tor browser 6.0.3, while Tails 3.0 was released with version 7.0.1.
 ??  ?? The Florence virtual keyboard. It’s possible to change the colour scheme to something less reminiscen­t of your first coding project.
The Florence virtual keyboard. It’s possible to change the colour scheme to something less reminiscen­t of your first coding project.
 ??  ?? Be warned: If found, Customs may be within its rights to seize your Tails USB stick.
Be warned: If found, Customs may be within its rights to seize your Tails USB stick.

Newspapers in English

Newspapers from Australia