Any developer here want to help the Tails secure distro?
Any developer here want to help the Tails secure distro?
Tails is the, supposedly super privacy distro which is based on Debian. I know that I can always get Puppy to boot, whereas Tails, gets lost on its own boot.
I am not competent to work on a project like this. Maybe some of those who work on Debian Puppy might take a glance at the problems with Tails
I am not competent to work on a project like this. Maybe some of those who work on Debian Puppy might take a glance at the problems with Tails
Did anyone step-up to this?
If so, do you have a there a link to that thread, please?
With the increased popularity of Linux, and well-financed techno-thugs around the world, it makes good sense to have an intentionally-secure Puppy alternative.
If so, do you have a there a link to that thread, please?
With the increased popularity of Linux, and well-financed techno-thugs around the world, it makes good sense to have an intentionally-secure Puppy alternative.
[b]Thanks! David[/b]
[i]Home page: [/i][url]http://nevils-station.com[/url]
[i]Don't google[/i] [b]Search![/b] [url]http://duckduckgo.com[/url]
TahrPup64 & Lighthouse64-b602 & JL64-603
[i]Home page: [/i][url]http://nevils-station.com[/url]
[i]Don't google[/i] [b]Search![/b] [url]http://duckduckgo.com[/url]
TahrPup64 & Lighthouse64-b602 & JL64-603
- technosaurus
- Posts: 4853
- Joined: Mon 19 May 2008, 01:24
- Location: Blue Springs, MO
- Contact:
We have some password-protected Puppies and some "bloated" versions.
Lighthouse 64, for example, is not root by default - which can be a nuisance when one tries to save images from the Internet.
To have a full-featured intentionally- private and secure version would fill a gap.
Where's the best place to monitor their progress, please?
Lighthouse 64, for example, is not root by default - which can be a nuisance when one tries to save images from the Internet.
To have a full-featured intentionally- private and secure version would fill a gap.
Where's the best place to monitor their progress, please?
[b]Thanks! David[/b]
[i]Home page: [/i][url]http://nevils-station.com[/url]
[i]Don't google[/i] [b]Search![/b] [url]http://duckduckgo.com[/url]
TahrPup64 & Lighthouse64-b602 & JL64-603
[i]Home page: [/i][url]http://nevils-station.com[/url]
[i]Don't google[/i] [b]Search![/b] [url]http://duckduckgo.com[/url]
TahrPup64 & Lighthouse64-b602 & JL64-603
If I read this thread correctly Attack-pup is abandonware:
http://www.murga-linux.com/puppy/viewtopic.php?t=55874
True?
http://www.murga-linux.com/puppy/viewtopic.php?t=55874
True?
[b]Thanks! David[/b]
[i]Home page: [/i][url]http://nevils-station.com[/url]
[i]Don't google[/i] [b]Search![/b] [url]http://duckduckgo.com[/url]
TahrPup64 & Lighthouse64-b602 & JL64-603
[i]Home page: [/i][url]http://nevils-station.com[/url]
[i]Don't google[/i] [b]Search![/b] [url]http://duckduckgo.com[/url]
TahrPup64 & Lighthouse64-b602 & JL64-603
I'm already experiencing stability problems with older Puppies (one 32-bit, one 64-bit) - they seem to result from updates to Web browsers creating some sort of resource conflict - but that's a wild guess.
I'd like to see a best-of several Puppies into one:
Combo 32 & 64 bit.
High security.
Tested repository of apps vs tons stuffed in (the latter design tends to be more difficult to maintain as security and interoperability challenges present over time).
Handles Microsoft-imposed UEFI/EFI anti-competitiveness BIOS nonsense.
Team developed & supported with a second person for each section so one developer leaving doesn't leave a gaping hole in support & improvement.
I'd be willing to donate to help support such a critter.
I'd like to see a best-of several Puppies into one:
Combo 32 & 64 bit.
High security.
Tested repository of apps vs tons stuffed in (the latter design tends to be more difficult to maintain as security and interoperability challenges present over time).
Handles Microsoft-imposed UEFI/EFI anti-competitiveness BIOS nonsense.
Team developed & supported with a second person for each section so one developer leaving doesn't leave a gaping hole in support & improvement.
I'd be willing to donate to help support such a critter.
[b]Thanks! David[/b]
[i]Home page: [/i][url]http://nevils-station.com[/url]
[i]Don't google[/i] [b]Search![/b] [url]http://duckduckgo.com[/url]
TahrPup64 & Lighthouse64-b602 & JL64-603
[i]Home page: [/i][url]http://nevils-station.com[/url]
[i]Don't google[/i] [b]Search![/b] [url]http://duckduckgo.com[/url]
TahrPup64 & Lighthouse64-b602 & JL64-603
If one boots Puppy from the CD and runs it from memory, not even using a USB stick, which is write-able media, isn't that security enough? After one shuts down the computer, nothing is saved, there is nothing to track or trace? It's as though the session never took place?
Also, does Puppy consider itself "free software" or "open source" software-or both-or what?
Also, does Puppy consider itself "free software" or "open source" software-or both-or what?
Think about being a journalist in a repressive country
I apologize for repeating some things many of you already know.
There is a distinct difference between making sure I do not have Malware, that can steal my bank account number. Rather than preventing anyone from knowing my IP Address, being able to see anything I send or where I am sending it too.
I know that I had a huge delay in booting one high end 2014 laptop with Tails. On the other hand Tails booted in less than three minutes to my 2009 Mac Book Pro. The difference in the distro finding the right drivers.
I feel this is the area Puppy Linux developers can help, many more hardware drivers for Tails.
Using the Tor Browser is always going to be more slow than other browsers.
If one boots into Tails itself, one can report issues to those who work on it from there.
As I have learned from being on one of the unofficial Tails Chats, which had one of the Tails Developers on it, the developers are not interested in re-hashing discussions about how they made their design decisions, as they have explained their point of view in the documentation. For Example: Tails allows some Java Script to operate, while some want to argue that all Java Script should be disabled. If it is the individual users' view that he should disable all Java Script, he has the ability to do so.
As most encryption, and Security systems are broken not by because the encryption is cracked, but by mistakes made by operators. So reading the documentation, and thinking about what one is doing seems to be extremely important. For another instance, how the NSA found people who were using the Tor Browser (Example: Silk Road), and thought themselves safe.
You might more closely at the Tor Documentation of why some say not to set a PW for Tails Root.
I personally suspect that the reasons the publicly known Chat is not working is based on something the NSA did, or forced one of the Chats to do. I do not think the Tails developers will have anything to say about why some things happen. They are busy working, and test, test, test.
If I lived in some repressive countries. I might not, based upon what the local government might do to those who do, go to the Tails Website, look at its documentation, or download the ISO, and the same for the Tor Browser.
There is a distinct difference between making sure I do not have Malware, that can steal my bank account number. Rather than preventing anyone from knowing my IP Address, being able to see anything I send or where I am sending it too.
I know that I had a huge delay in booting one high end 2014 laptop with Tails. On the other hand Tails booted in less than three minutes to my 2009 Mac Book Pro. The difference in the distro finding the right drivers.
I feel this is the area Puppy Linux developers can help, many more hardware drivers for Tails.
Using the Tor Browser is always going to be more slow than other browsers.
If one boots into Tails itself, one can report issues to those who work on it from there.
As I have learned from being on one of the unofficial Tails Chats, which had one of the Tails Developers on it, the developers are not interested in re-hashing discussions about how they made their design decisions, as they have explained their point of view in the documentation. For Example: Tails allows some Java Script to operate, while some want to argue that all Java Script should be disabled. If it is the individual users' view that he should disable all Java Script, he has the ability to do so.
As most encryption, and Security systems are broken not by because the encryption is cracked, but by mistakes made by operators. So reading the documentation, and thinking about what one is doing seems to be extremely important. For another instance, how the NSA found people who were using the Tor Browser (Example: Silk Road), and thought themselves safe.
You might more closely at the Tor Documentation of why some say not to set a PW for Tails Root.
I personally suspect that the reasons the publicly known Chat is not working is based on something the NSA did, or forced one of the Chats to do. I do not think the Tails developers will have anything to say about why some things happen. They are busy working, and test, test, test.
If I lived in some repressive countries. I might not, based upon what the local government might do to those who do, go to the Tails Website, look at its documentation, or download the ISO, and the same for the Tor Browser.
But you are NOT invisible when usiing the WWW! Websites do know you visited.Blackfish wrote:If one boots Puppy from the CD and runs it from memory, not even using a USB stick, which is write-able media, isn't that security enough? After one shuts down the computer, nothing is saved, there is nothing to track or trace? It's as though the session never took place?
Also, does Puppy consider itself "free software" or "open source" software-or both-or what?
Linux user #498913 "Some people need to reimagine their thinking."
"Zuckerberg: a large city inhabited by mentally challenged people."
"Zuckerberg: a large city inhabited by mentally challenged people."
Oh, so true. But one can use things like the Tor Browser, proxy sites, etc., and circumvent all of that, too.8Geee wrote:But you are NOT invisible when usiing the WWW! Websites do know you visited.Blackfish wrote:If one boots Puppy from the CD and runs it from memory, not even using a USB stick, which is write-able media, isn't that security enough? After one shuts down the computer, nothing is saved, there is nothing to track or trace? It's as though the session never took place?
Also, does Puppy consider itself "free software" or "open source" software-or both-or what?