[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Free WiFi Bootable Ditros
I wouldn't recommend TOR for anything personally identifying (anything done on TOR has a chance of greater scrutiny and malicious subversion). Have used Facebook through TOR with SSL enabled and watched a friends computer get exploited during a chat session. SSL is pretty well broken from my point of view. I wouldnt trust TOR for any executable download or software update (pdfs and other exploited forms of media are questionable too). Best use for tor is in a read only environment where no writable media is present on your computer. I would recommend locking your bios, it might not matter if there is a default secondary password.
--- On Sun, 7/29/12, Katya Titov <kattitov@xxxxxxxxxx> wrote:
> From: Katya Titov <kattitov@xxxxxxxxxx>
> Subject: [tor-talk] Free WiFi Bootable Ditros
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Date: Sunday, July 29, 2012, 12:57 AM
> Hi all,
>
> This is not specifically a Tor question, but there may be
> some on the
> list who know the answer.
>
> I'm wondering whether there are any bootable distros out
> there which
> are designed to be used on free WiFi networks (e.g.
> Starbucks,
> McDonalds) and enforce some level of network encryption.
> Tails would
> obviously provide a solution here by forcing everything
> through Tor,
> but I can also see alternatives which force the use of an
> IPSEC VPN, or
> only allow outbound access to ports which are commonly used
> for secure
> access (443, 993, etc).
>
> It wouldn't need to be an entire distro, just a set of
> scripts which
> configured the local firewall (iptables, ipfw, even the
> regular Windows
> firewall) to only allow secure connections, and established
> a Tor or
> VPN connection (if necessary). This would mean I could use
> my
> regular desktop environment to read email, check social
> networks, etc
> all the while being reasonably confident that any traffic
> which would
> normally traverse the network unsecured (updates, etc, and
> any
> misconfigured software) would not get access.
>
> I guess that the set up would need to be somewhat aware of
> the network
> it was connecting to to allow access to captive portals to
> agree with
> the AUP.
>
> Anything out there which does this?
>
> Thanks
> --
> kat
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk