Debate Magazine

Security Update: Tails OS 3.5

Posted on the 02 March 2018 by Darkwebnews @darkwebnews

Although there are several ways to browse the dark web safely, running Tails from a live bootable USB stick is about as safe as it can when it comes to hardware and the operating system (OS).

A short time ago, The Amnesic Incognito Live System (Tails) team issued an updated Tails OS with important security features and bug fixes. If you're using Tails to browse the dark web, you should make the switch to the new version of Tails as soon as possible.

All systems have holes and it's common to somehow 'get comfortable' with whatever system you have in place. It can be a huge chore to update your Tails OS live drive, especially if you have a persistent volume save, but the new security features in 3.5 make it essential.

Security updates always seem frustrating - there is always a trade-off between ease of use and security. Often the easier something is to use, the less secure it is.

It's a simple rule that rings true time and time again in the world of computing. Regardless, these updates must be done, and there are some quality features in version 3.5.

Tails as a Dark Web Access Tool

Although merely accessing the dark web isn't a mystery or risk in and of itself per se, there are multiple reasons why it's better to use a standalone system like Tails to access and browse the dark web.

Tails not only acts as an isolated operating system where mistakes can be made without affecting your computer, but masks several identifying components which provide information to your network and the internet.

Using Tails in a virtual machine is a fast and easy way to utilize many of the features, but it isn't foolproof. The virtual machine software must be trusted, therefore, it should be free.

The widely-trusted open source VirtualBox software is recommended, for example. The core machine's OS should also be trusted and preferably open source, such as one of the many Linux distributions.

This can be a problem for Mac users as well as gamers who tend to still need Windows. OSX is notoriously closed source, and regardless of how free the virtualization software is, the base OS cannot be trusted.

Windows has a similar problem, as they are basically in the business of data analysis through telemetry (although they appear confident nobody will care).

Because of this, the best method of using Tails is by creating a bootable USB drive, or in other words, a self-contained OS. This effectively separates the computer and the operating system, protecting you from whatever you encounter on the dark web.

Should you accidentally click on some shady links, it shouldn't spread to your day-to-day operating system.

Integrated Tor Updates

The Tor Launcher has been completely redesigned in Tails 3.5 to align with updates Tor Project released recently. The Launcher has been redesigned making it even easier to configure your connection to the Tor network through either a Tor bridge or a local proxy of your choice.

The web browser has been updated to the latest version of Tor Browser 7.5, including important security features in the Firefox spin-off.

Taking it further, there is a redesigned welcome screen, making accessing the dark web even simpler than before.

If you're an at-risk user in an area with active censorship, Tor Browser 7.5 has made the user interface as easy and non-technical as possible, with significant effort in ensuring access to all that need it.

Communication Updates

The mail inclusion in Tails 3.5 uses Mozilla's Thunderbird 52.5. Thunderbird can be configured to make PGP communication as seamless as it can be.

Bar trivial information, all communication across the dark web should be protected by quality encryption, with PGP (Pretty Good Privacy) being the most common means.

But the most substantial and important update comes in the update of Linux to 4.14.13 and the microcode firmware for AMD to mitigate Spectre.

Spectre protection

Spectre is the speculative execution vulnerability within nearly every computer chip manufactured in the last two decades. The patches are starting to roll out, but this is going to be a slow process, with some issues unresolvable until there is a change in the fundamental design of the chip itself. Regardless, Tails 3.5 has taken steps to attempt to soften the blow that the Spectre vulnerability pries open if you're using a machine with an AMD chip.

Whether you assess the dark web by a virtual machine on a trusted computer or a bootable live USB drive with an encrypted persistent volume, you should take the steps to upgrade to Tails 3.5 as soon as possible. It's for your own safety and privacy.

Disclaimer:

The articles and content found on Dark Web News are for general information purposes only and are not intended to solicit illegal activity or constitute legal advice. Using drugs is harmful to your health and can cause serious problems including death and imprisonment, and any treatment should not be undertaken without medical supervision.

You need to enable JavaScript to vote


Back to Featured Articles on Logo Paperblog