Silk Road forums
Discussion => Security => Topic started by: SuckDick4Weed on September 23, 2013, 12:39 am
-
OK so I run TAILS from a live DVD within a VirtualBox VM
I require the need to copy&paste text (usually from VM to host)
I need a method to do this, two I have thought of so far but do not know how to implement.
1) Configure TAILS guest additions to allow c&p feature to host.
2) Use a Truecrypt USB to save a text file within the VM. I probably wouldn't even need to then interact with the host but could do so later if I needed to. I couldn't get virtualbox to accept USB drives.
Also truecrypt isn't going to be available once I update so I guess that's out of the question. Maybe a persistence volume would enable me to save text? Problem is if I want to do anything with it later such as sending to a PRINTER would be an issue.
That's why I just need the simple copy&paste feature.
-
bit technical for me. cant you use a pen and paper?
-
Not when it involves a ton of PGP code.
Don't worry. I got the VM to recognise USB, was simply an issue of group permissions. Looks like truecrypt will be around till TAILS 2.0 so should do for now.
-
What's so good about Tails?
-
What's so good about Tails?
It helps keep you safe and anonymous. You really should only be accessing SR with a live Linux Distribution, like TAILS. Check my sig for a quick how-to.
-
It only stores temporary files in RAM and then wipes on shutdown so leaves absolutely no trace of any browsing history, etc. Also it directs ALL internet traffic through TOR so you don't get any 'leaking' applications that could reveal your real IP.
-
Hello guys,
could somebody tell me how to combine VPN and tails?
But I need it to be mobile, i want to use tails and vpn everywere, i mean i can not do this through the router.
-
I think astor might have a guide on this.
-
Found a few topics that may be of help.
http://dkn255hz262ypmii.onion/index.php?topic=209608.0
http://dkn255hz262ypmii.onion/index.php?topic=208649.0
I think the only secure way to get TAILS to go through your VPN properly is if you set the VPN up to be a tor bridge. Just keep the bridge IP private. i.e. don't broadcast it to a bridge authority unless you want other people to use your VPN.
You COULD tunnel through to the VPN but I think it will just complicate things with tails and it is much less 'mobile'.
-
Tails should never be run in a virtual box as the whole purpose is that it's an amnesiac os. By using it in a virtual box environment you negate this effect as certain elements will be left over in virtual box. Also guest additions and enabling drag and drop, shared clipboard, and shared folders further weaken your setup.
I like whonix but trying to get KgPG working on there is a real bitch and still have had no luck.
-
I like whonix but trying to get KgPG working on there is a real bitch and still have had no luck.
Kgpg is easy to use. It has everything you need in one program. Key creation, adding keys and a text editor with encryption/decryption.
Have a look at steps 7.5 and 10.5. in my tutorial:
http://dkn255hz262ypmii.onion/index.php?topic=209572.msg1518826#msg1518826
-
Thank you Bazille , I'll go over that info. I've spet 3 days and about 10 xanax trying to figure it out. In the end I went with an unorthodox but still secure gpg set up but to me the whole point of using Whonix is isolation and using your PGP programs in Whonix is the best way to go. If I have any questions you mind if I pm you?
+1 btw :)
-
No, I don't mind stupid questions in my inbox :)