You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Ubuntu Live CD is not really fit for the task described. I suggest the use of Tails - it supports encrypted volumes, may be burned to a CD/DVD, installed onto a USB disk, and so on. It is designed to ensure that the network fails closed, so if the system was accidentally online, it would only connect through Tor. This also gives you native Tor support without any configuration.
The text was updated successfully, but these errors were encountered:
We have talked internally about using tails for the secure viewing station
and will probably make that change in the documentation. Though for the
newyorker installation the machine they are using does not have wireless or
network card. Thanks for the input. Also looking at other options for the
source interface server possibly using tor-ramdisk.
The Ubuntu Live CD is not really fit for the task described. I suggest the
use of Tails https://tails.boum.org/ - it supports encrypted volumes, may
be burned to a CD/DVD, installed onto a USB disk, and so on. It is designed
to ensure that the network fails closed, so if the system was accidentally
online, it would only connect through Tor. This also gives you native Tor
support without any configuration.
—
Reply to this email directly or view it on
GitHubhttps://github.com//issues/3
.
tor-ramdisk is probably a reasonable choice for the server - I bet they'd even be interested in adding DeadDrop as a package/feature.
If you need help with Tails, let me know - it is designed to do what you need, even without network cards. It also supports the use of GnuPG hardware tokens. This might be a useful compartmentalization depending on your threat model.
The Ubuntu Live CD is not really fit for the task described. I suggest the use of Tails - it supports encrypted volumes, may be burned to a CD/DVD, installed onto a USB disk, and so on. It is designed to ensure that the network fails closed, so if the system was accidentally online, it would only connect through Tor. This also gives you native Tor support without any configuration.
The text was updated successfully, but these errors were encountered: