[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] janusvm still safe?



Couldn't one simply use Tails in a VM the way JanusVM was designed to run and get the benefits of tails without having to reboot constantly from a general purpose use OS to a task-specific OS (Tails)?  It would be nice to run Tails in a VM and have your main OS up and running for virtually everything else you need your computer for.

On Wednesday, December 21, 2011 08:19:58 AM hmoh@xxxxxxxxxxxxx wrote:
> Something come up to my mind... Vulnerabilitys could be,
> - the user forgets to start the VPN, or
> - the VPN connection breaks down for some reason (Windows bug or crash), traffic continues without Tor
> 
> I like the basic idea of JanusVM. I can say nothing about the concept of the deployed virtual machine but those vulnerabilitys I posted here could be fixed using a software firewall in whitelisting mode. Everything incoming and outgoing blocked expect the VPN connection.
> 
> Furthermore the VPN connection and the firewall should be forced enabled by an administrator and all applications should run as user. Not sure if that's best possible. Probable the Tor transparent proxy approach [1] is even better.
> 
> What I liked about JanusVM is that it's very easy to install and use.
> 
> [1] https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
> 
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk