Tails 5.2.0 comes with several improvements, updated Tor Browser

Tails is a portable operating system that protects against surveillance and censorship. Tails can be installed on any USB stick with a minimum of 8 GB. Tails works on most computers under ten years old. You can start again on the other operating system… Continue reading Tails 5.2.0 comes with several improvements, updated Tor Browser

Secure portable operating system Tails 5.5 released

Tails, based on Debian GNU/Linux, is a portable operating system that protects against surveillance and censorship, and version 5.5 is now available for download. When composing an email, you can now see whether it will be encrypted or not. You can shu… Continue reading Secure portable operating system Tails 5.5 released

Facebook paid for a 0-day to help FBI unmask child predator

A third-party cybersecurity firm were paid to drill a hole in a Tor-reliant operating system to uncover a man who spent years sextorting young girls. Continue reading Facebook paid for a 0-day to help FBI unmask child predator

Using Technology to Defend Digital Privacy & Human Rights – Presentation Notes

If you attended my talk “Using Technology to Defend Digital Privacy & Human Rights”, thank you! Here’s a list of supplemental material discussed during the presentation as well as where you can find out additional information abou… Continue reading Using Technology to Defend Digital Privacy & Human Rights – Presentation Notes

33C3: If You Can’t Trust Your Computer, Who Can You Trust?

It’s a sign of the times: the first day of the 33rd Chaos Communications Congress (33C3) included two talks related to assuring that your own computer wasn’t being turned against you. The two talks are respectively practical and idealistic, realizable today and a work that’s still in the idea stage.

In the first talk, [Trammell Hudson] presented his Heads open-source firmware bootloader and minimal Linux for laptops and servers. The name is a gag: the Tails Linux distribution lets you operate without leaving any trace, while Heads lets you run a system that you can be reasonably sure is secure. …read more

Continue reading 33C3: If You Can’t Trust Your Computer, Who Can You Trust?