Ask Lemmy
A Fediverse community for open-ended, thought provoking questions
Rules: (interactive)
1) Be nice and; have fun
Doxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them
2) All posts must end with a '?'
This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?
3) No spam
Please do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.
4) NSFW is okay, within reason
Just remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either !asklemmyafterdark@lemmy.world or !asklemmynsfw@lemmynsfw.com.
NSFW comments should be restricted to posts tagged [NSFW].
5) This is not a support community.
It is not a place for 'how do I?', type questions.
If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email info@lemmy.world. For other questions check our partnered communities list, or use the search function.
6) No US Politics.
Please don't post about current US Politics. If you need to do this, try !politicaldiscussion@lemmy.world or !askusa@discuss.online
Reminder: The terms of service apply here too.
Partnered Communities:
Logo design credit goes to: tubbadu
view the rest of the comments
Could the same be achieved by running it in a VM?
Yes and no.
It's point is to limit identifiable information for any operations done on the os. Using it within a VM only sets it within a box, any use of the OS to connect to the outside world, or create some file with longer term persistence will finger print you as that main OS is the pass-through between the VM and the outside world.
Giving an example of how I might use it would help:
If I'm speaking with an international activist, early career reporter, or high-risk private sector worker, I have a custom tails that I can flash and offer them to use.
For a private sector worker it has a doc on some basic information on requesting whistle-blower protection from a given government, agency contact points, etc.
For a reporter or activist it might have a doc on how to ensure they have a social safety net for informing others of their movements, basic tools for performing field work if local computers might be being monitored, and of course how to connect to the internet in areas where traffic monitoring is routine.
I can have that information persistent on the drive only useful for reference, while the rest of the OS can be used as intended without being easily fingerprinted as intended, but only if that drive is the ONLY thing that's acting as any form of operation on a computer. If it's on a VM, installed onto an onboard drive, it looses some of it's ability to act as a real tool.
So the risk is more about what breadcrumbs I leave on the host OS?
It's more the inverse, the host OS running a VM will fingerprint any information you are sending out.
If your plan is to just run it offline through a VM, then it's unlikely to leave much persistent information.
Tails is meant as a secure non-persistent tool for communication at it's base, and that's what it is best for. I might recommend looking at running a properly containerized environment on your VM for getting similar effects if you're working on software and OS testing, it's how I go. Think rolling vs production environments.
Got it, thanks!