I want to start remote use of Tails OS on public and hacked wifi.
System in place is ok but not good as I would like it to be.
General q's,
If you connect to public wifi, offices, apt buildings, free wifi spots,
Would they have any way of intercepting traffic? Could see how much down/upstream? But seeing MAC address (spoofed anyway), seeing what type of boot device you are using (SD or USB, CD-R ISO?) or type of computer?
How long would you feel comfortable spending at one wifi location? example, 1hr daily? 2hr?
Switch up locations and distance proximity for each use?
Other example, If I am in remote area for 3 months on 50 different public wifi and every day there is different location with same PC or Mac using wifi system with Tails OS, this could increase targetting or suspicion in major way?
How reliable is it to use Tails/Tor in remote situation? Would there be some major OpSec concern?
example, wifi drops while changing curcuits, logging into DNM, confirm shipping order, or sending BTC?
Would you add VPN? Bridges?
How about wifi-extender that sold on DNM? Would it be better to work from safe-house and try to do this way?
Tails is RELIABlE. I like to continue use. Want to learn Whonix system too... maybe better for this?
Time spent on DNM is about 3-4hr per day.
What are best TECHNICAL security practices for this?
The wifi spot can only see your mac address and how much you download/upload.
The key here is using a VPN or a Bridge; either one, not both. By using bridges, the wifi provider thinks you are using normal https traffic. By using a VPN the wifi provider only think you are using a VPN (which is common on public wifi) but the VPN provider knows you are using TOR so research a good VPN (not in 5 eyes, pay by BTC, etc).
If you are using bridges: as long as you are using the TOR browser connection drop should be fine.
If you are using a VPN, you need to sort out a system to send the traffic only through VPN and block anything else.
That about it I think.