Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Some questions about Tails


  • Please log in to reply

#1
kingneil

kingneil

    New Member

  • Member
  • Pip
  • 7 posts
Hi, I would like to ask some security-focused questions on Tails, the Linux privacy OS.
 
1. We know that Javascript and plugins are removed from the Firefox Tor browser, because these are 2 of the most common ways to hack a browser. But, is there any way to hack Firefox that doesn't depend on these 2 things..? The NSA has documents where they were confident to exploit so-called "native" Firefox exploits. I would like to see someone link me proof of any such exploits. The only thing I could think of would be things like, using GIF images or something like that. I've heard of exploits that Involve nothing other than GIF images.
 
2. Let's just say that the answer to (1) is "yes, they can hack Firefox even with JS and plugins disabled"... So, the question is.... what happens next...? We know that Tails runs in non-administrator/non-root mode, and we know that Tails blocks access to the user's local hard drive.... So the question is..... how would any hacker achieve persistence...? Surely when the browser window closes, the virus is now gone for good.... Or is it...? That's what I'm asking.... How would they achieve persistence...? Can programs be run simply out of the computer's RAM alone...? Or, could they install the virus to any USB hard drive that was plugged in..? Does Tails allow executable files to be run off of an external USB device..?
 
3. Question 3 is another question about persistence.... Would it be possible for a hacker to hack Firefox, and then install the drivers required to read off of the user's local hard drive...? Or not...? Does it require a computer restart in order for such drivers to take effect..? If so, then obviously it's useless for the hacker, because once Tails is restarted, it's back to its original non-modified state all over again.
 
That's it...
 
As you can see, the questions are mainly about persistence...
Thanks

Edited by kingneil, 22 December 2015 - 10:01 PM.

  • 0

Advertisements







Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP