Tails if you become infected can and has leaked IP addresses. For sending an email it is unlikely but with extreme privacy for things like was addressing it just isn’t good enough.
Sure it doesn’t save any information to later be recovered but if you need to worry about infections at all it isn’t it. Plus not sure how VPN works with that at this time.
As for not just Tor? If your worry is government then as I said Guard nodes have been compromised before. Winter 2020 a quarter of All guard nodes were found to be malicious, and that would only be done to deanonymize users.
You’re welcome, and that is the idea of using a USB option. Any malware would have to first escape the VM first, which is damn rare to see, then it would have to be just as rare to infect say your BIOS as otherwise with a normally encrypted main drive it can’t really get on there meaningfully.
So after you use the USB destroy it. Very cheap as you can do everything on a 64gb one. Less than $20. As for a laptop option? Sure if you want to use more money or not use your home address.
Used laptop that you reformatted, and reset the BIOS first in case it is itself already infected from the previous user downloading something malicious or they themselves put on in hopes of getting your information such as credit card or tax information.
Anyway you then use as described previously and then destroy it. If you have a good drill you can do it yourself smoothly but a big hammer will do, just be careful to wear protective glasses to not have any land in your eyes.
Humor me by explaining how, if it were in fact the president of the united states or the FBI doing the investigating, they would find you in this scenario. I would like to understand this specifically and technically.
Yes, I forget which provider it is but I remember a while back looking into privacy centered email servers and one had an option for emails that will essentially delete after a set amount of time.
Also, I doubt that at this point in time, malware infections on Tails are much of a concern if you don’t plug in random USB sticks, execute random binaries and keep JS turned off, as is the default in Tor browser.
Assuming they are in fact don’t log. What about netflow data from their hosters and your ISP? Yes, rather difficult to access but three letters agency usuable able to get those data.
Possible better idea is to use VPN from country which doesn’t like yours and likely will not cooperate (think Russia or China if you are from USA)
I am not going to get into detail, but most people screw up their security at some point. With enough resources it’s often possible to pice evidence together and get back to an identity.
True, but some people want to or are required to download files. Or they forget to turn off JS as Tails resets the Security Level each time, as last time I used it was set to Safe instead of Safest, which is what Tor defaults to.
Safest turns off JS, though not in about:config which is even better for any zero day BS.
Conspiracy thought is a bad update could also cause IP to be revealed, where Whonix and Qubes aren’t likely to do so even with malicious update. And yeah that has happened just last year I believe with that one major Linux update.
Guy tried to add BS but by pure luck it was caught.
I see proton has that feature too, but not sure is it the same we are talking, the mail message opens up on a different page and expires after the set time.
Because Qubes/Whonix make it so it all needs to get out of VM first to compromise the actual OS and to leak your true IP or network information.
A direct corruption of base Linux kernal would effect all to various degrees, but if it was on Tor alone? It would then be locked in the VM safely. As we have seen such on other parts in the past it is not an impossible threat to consider.