Monday, August 19, 2013

Tails: A System for Web Security, Privacy and Anonymity

In the digital age of growing government and corporate surveillance all across the world, the Internet remains a crucial medium of everyday life. E-mail, social networks, digital media and seemingly unlimited data allow us to connect with the people and things we love whenever we want. Through the internet we can all be publishers and the world can be our audience, and our personal information has never been more valuable.

At the same time, our privacy and anonymity are increasingly coming under attack. Our personal data and information have never been more sought after by both states and corporations, and human rights groups are often the primary targets (as was recognised in this recent landmark UN report).

Human rights groups at risk

Trends of censorship and surveillance are troubling for human rights defenders and those who document and track human rights violations. This is primarily because

  • human rights defenders often hold data about people who have become victims of human rights violations
  • this data needs to be protected to prevent further abuse
  • this data oftentimes incriminates the powerful and state institutions that want to prevent information from spreading

This is especially worrisome in countries where governments themselves are committing abuses; where states have every incentive to shutter the people and institutions that chronicle and speak out against human rights violations. Through intimidation, censorship and cyber-attacks, some governments go far beyond simply aggregating metadata and conducting surveillance. Even governments who may not have the capacity themselves to do this opt to purchase these services from hackers or ask other governments for help.

A degree of privacy and anonymity on the Internet

While total privacy and anonymity of online communications is hardly possible, there are some things you can do. This is not only about tools, but more importantly about thinking about security and changing your behaviour. Tools, however, help you to achieve your aims, although you should not see them as silver bullets that can guarantee 100% privacy, security and anonymity. This is especially true if you are specifically targeted by governments or corporations that possess significant manpower and resources for monitoring. Today, I shed the spotlight on one tool Internet users can employ in order to conveniently enhance security through an incognito online experience: Tails.

Tails is a live operating system that you can download onto a DVD or thumb drive, so there is nothing you need to install on your computer or in fact on any computer –you can use it without leaving a trace or harming your running system. Tails’ essential purpose is to provide a safer and more anonymous web platform where users have a much higher degree of online privacy; shielded from tracking, locating software and identity detection. Tails even allows you to choose a user interface similar in appearance and navigability to Windows XP.

Tails network components: a sum of its parts

Shorthand for The Amnesic Incognito Live System, Tails works as a bundle of a few different privacy and security tools:

  • the Tor Browser Bundle and network for anonymous web browsing (using the plugin HTTPS Everywhere that forces an encrypted SSL connection)
  • simple user interface with a Windows XP-like option
  • ability to leave no trace of using the system
  • the chat client pidgin as well as an email program for both standard and encrypted mail
One of its most central components is Tor, a volunteer-powered network that directs web traffic through multiple servers. Once in the network, web information is then encrypted and re-encrypted multiple times to hide your location. These measures confirm that one’s web use is relatively free from traffic analysis or network surveillance. Or that at least it is very difficult to connect the dots between you and the services you are using.

You can also use the Tor network with your existing operating system by downloading it directly onto your computer. Just download the Tor Browser Bundle which includes HTTPS Everywhere, a plugin to your browser that will force https with major websites (they all offer this service, but it is not always used automatically). You may also download this by itself for Firefox or Google Chrome.

The Tails interface also comes with e-mail and instant messaging applications so you can use your existing accounts (which can be problematic) or create new ones. While working within Tails, you may also choose to record your activities or wipe all traces of using the live system.

What’s really convenient about Tails—especially for activists—is that not only does the system have privacy and anonymity tools; it also comes with photo and video editing programs. This allows for Tails as a whole to encompass an arsenal of tools that activists would need to conduct their work on the go.

Before trying out Tails for yourself, check out the system’s website which offers directions on how to authenticate the Tails files downloaded from the site. Authenticating the files is critical to ensure you are not a victim to a man-in-the-middle attack. In other words, it helps you to be sure you are downloading the real Tails and not a bogus one created by your most cherished intelligence agency.

While using this system may not be for everyone, and while there are limits to its enhanced security and privacy (and making them usable on a daily basis), Tails is a convenient tool for those who work with sensitive documents and information, especially if you use several computers, some of which you maybe cannot trust. It’s easy to install and use, and a great way to get a head start with many tools that help you protect your privacy and communications – just do not believe that building web security and privacy stops with Tails.

No comments:

Post a Comment