Just wondering if it's necessary to remove all other hard drives connected to the pc when booting up with tails to ensure good OPSEC? Would there be chance that keylogging malware on one of the other drives gaining access to the Tails OS?
[OPSEC/Computer] Tails on pc - other drives?
Just wondering if it's necessary to remove all other hard drives connected to the pc when booting up with tails to ensure good OPSEC? Would there be chance that keylogging malware on one of the other drives gaining access to the Tails OS?
[3 Points] bbq250:
[1 Points] None:
[deleted]
[1 Points] obsidianchao:
If you're booting tails as an OS, you're fine. If you boot it in a virtual machine, you could get key logged.
[1 Points] sapiophile:
The risk here is that if Tails gets infected with malware (as through an exploit like the FreedomHosting takedown or operation TorPedo), it would have almost no trouble mounting the hard disk that's installed and possibly compromising the OS on it. Even if that drive uses self-bootstrapping full disk encryption (FDE), like LUKS-dmcrypt or TrueCrypt, a malicious superuser program could replace the bootloader and compromise the encryption password used, and then propogate itself into the OS itself, even while it isn't running (e.g., while Tails is booted and re-exploited, or still exploited if it's on a USB drive instead of read-only media). Theoretically. Note that Tails is pretty damn well built to avoid being infected with malware, but against state-sponsored crackers, I doubt that any OS is entirely secure (though protocols and cryptosystems certainly can be).
So yes, it helps. But it depends on your threat model how much sense it actually makes.
You can get an old laptop for like $30 online, and taking the hard drive out for good isn't too hard...
It shouldn't but if you really want a good OPSEC you should have a burner computer.