this post was submitted on 23 Sep 2024
70 points (101.5% liked)

Privacy

32471 readers
337 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

how do they know?

top 11 comments
sorted by: hot top controversial new old
[–] Mechanize@feddit.it 43 points 3 months ago (1 children)

I didn't know about this project, so I took a quick look around.

I didn't see any mention of Telemetry or Metrics, but I assume they can use this:

After starting Tails and connecting to Tor, Tails Upgrader automatically checks if upgrades are available and then proposes you to upgrade your USB stick. The upgrades are checked for and downloaded through Tor.

https://tails.net/doc/upgrade/index.en.html#automatic

Still, I just gave this a few minutes, so there could be more.

[–] Sibbo@sopuli.xyz 10 points 3 months ago (3 children)

What a convenient way for police to ship you a backdoored version.

[–] emuspawn@orbiting.observer 5 points 3 months ago

Don't worry, the authorities already have the slightly less convenient way to backdoor things. Why make a fake release when you can just include it in the real release for the price of just a little coercion?

[–] delirious_owl@discuss.online 3 points 3 months ago* (last edited 3 months ago)

Thats why we use cryptography.

You could host the release on the police servers and they still couldn't get a client with a pinned public key to download a malicious version, because releases are signed.

That said, while TAILS takes security seriously, you shouldn't just expect all package managers to update themselves securely. This is why you want to avoid these new tools that don't care about security, like flatpak, snap, brew, chocolaty, docker, pip, npm, etc

[–] BertramDitore@lemm.ee 15 points 3 months ago (1 children)

how do they know?

I have to know now, this is bugging the hell out of me. Is it an estimate based on daily downloads? Do they get a ping when you connect to the internet, and if so, why would they count that as a boot? If I boot this on an air gapped laptop, there’s no way they could ever know, right? So many questions. Regardless, this seems like a weird thing for them to brag about.

[–] BelatedPeacock@lemmy.world 17 points 3 months ago

Maybe estimated based up checking for updates or something? Just a blind guess though.

[–] LodeMike@lemmy.today 8 points 3 months ago

Probably with update pings.

[–] rcbrk@lemmy.ml 5 points 3 months ago
[–] sbv@sh.itjust.works 3 points 3 months ago

lucky guess

[–] Mwa@lemm.ee 1 points 3 months ago

tbh i only use tails for using tor thats it i dont wanna download the tor browser on my pc :P