Anon Archived These Are Edward Snowden's Favorite Security Tools (That Anyone Can Use) (tomshardware.com)
submitted ago by 641572?
Posted by: 641572?
Posting time: 5.1 years ago on
Last edit time: never edited.
Archived on: 2/12/2017 1:51:00 AM
Views: 1909
SCP: 164
166 upvotes, 2 downvotes (99% upvoted it)
Anon Archived These Are Edward Snowden's Favorite Security Tools (That Anyone Can Use) (tomshardware.com)
submitted ago by 641572?
view the rest of the comments →
[–] Atarian 0 points 11 points 11 points (+11|-0) ago
Don't ever run Tails as a VM.
[–] White_Raven 0 points 5 points 5 points (+5|-0) ago
Why? I mean aside from the fact that literally every form of protection it offers is now ran directly through your unprotected daily driver, or is that what you meant?
[–] ThisIsntMe123 0 points 2 points 2 points (+2|-0) ago
Arguably, if your daily driver is fine, but you want to do not fine things, a TOR VM would be a good idea.
[–] HoneyNutStallmans 0 points 2 points 2 points (+2|-0) ago (edited ago)
It depends on the host security. If you're capable of physically and technically securing your computer, TAILS is not an issue as a VM.
You have to be very careful with swap. The memory used by Tails may be swapped onto the host's disk, which means you should be doing LUKS encryption with the host's swap. Debian and Ubuntu and many alike include installation procedures that encrypt swap and the disk(s).