[tor-talk] Designing a secure "Tor box" for safe web browsing?

intrigeri intrigeri at boum.org
Sat Apr 7 19:24:31 UTC 2012


Maxim Kammerer wrote (04 Apr 2012 22:39:09 GMT) :
> The user is expected to keep private information on the system
> (remember that Liberté had persistence from the beginning, but this
> is often true even without persistence). If the system is exploited,
> finding out the computer's MAC / IP addresses will most likely be
> the least of the user's problems.

Back to the threat model, then :)

One of the main Tails use-case we've heard of is to work on stuff that
is public, or will become public soon: in this case, what they want to
hide is not really the actual content, but instead its linkage to
particular physical locations or hardware. In this case, finding out
the computer's MAC / IP addresses is not the least of their problems.

I hope this clarifies things a bit.

  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc

More information about the tor-talk mailing list