You’ll also find software like the KeePassX password manager, Electrum BitCoin wallet, and disk-wiping and encryption tools. For example, Pidgin is preinstalled with the Off-the-Record plug-in for encrypted chatting. Not only does it force browser traffic through the Tor browser, it also routes other applications’ traffic over Tor, doing its best to prevent any anonymity-compromising traffic from leaking.Īlong with Tor and I2P, Tails ships other privacy software. The Tor enforcement document explains exactly how the underlying system is configured to force traffic through Tor. Unlike simply installing the Tor Browser on a typical computer, Tails is designed to route all communications possible over Tor and prevent applications from leaking traffic. ![]() Tails includes the Tor Browser as well as the I2P anonymizing software. It isn’t absolutely foolproof, however-in theory, malicious firmware on the PC’s hardware could be sitting in the background and snooping on you. Boot up into Tails and you can now trust the computer much more, as you don’t have to worry about software running in the background snooping on you. ![]() ![]() ![]() Even if you’re using an untrusted computer, you can reboot it with Tails inserted.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |