Is downloading tor and PGP encryption on a USB drive any different than using TAILS?
Why use TAILS when I could just download Tor on a USB drive instead of my hard drive?
Is downloading tor and PGP encryption on a USB drive any different than using TAILS?
[5 Points] Theeconomist1:
[5 Points] sharpshooter789:
Windows and probably OSX maintain logs that would be recovered by forensics.
[2 Points] jadedsynk:
I prefer to run my favorite flavor of linux through a livecd/usb, add in a couple more security measures and ohh baby you've got yourself a stew goin'.
I personally don't trust TAILS, seems too many people rely on it just because its recommended so much, but don't actually have a clue on whats going on beneath the hood. There are tons of known security flaws, and it would be too easy for LE to turn into a honeypot .....if it not already is :)
[1 Points] None:
[deleted]
[2 Points] bobandmargaret:
The best reason to use TAILS is because you're like a Zebra in a herd. The reason you are anonymous is because there are so many people with exactly the same profile as you. Every time another person uses TAILS, another person needs to be differentiated from you.
TL;DR - Use TAILS. The more of us that do, the less of us get fucked.
Edit: shitty spelling... ffs
Better control over what is stored and later retrievable from your computer. Running Tor on a USB stick is better obviously than straight off your harddrive, but you never know what your OS, whether it be Windows, Mac, whatever, is actually persisting in terms of cache files or other files. ALSO, you could have a virus on your Windows/Mac OS - things like keyboard loggers, trojans, whatever - and that can compromise you. Running Tails is running the actual OS, you can rest better that shit isn't being cached and b/c its in-memory you are less susceptible to have viruses or keyboard loggers.