Any developer here want to help the Tails secure distro?

For discussions about security.
Post Reply
Message
Author
purple379
Posts: 157
Joined: Sat 04 Oct 2014, 22:23

Any developer here want to help the Tails secure distro?

#1 Post by purple379 »

Tails is the, supposedly super privacy distro which is based on Debian. I know that I can always get Puppy to boot, whereas Tails, gets lost on its own boot.

I am not competent to work on a project like this. Maybe some of those who work on Debian Puppy might take a glance at the problems with Tails

User avatar
edoc
Posts: 4729
Joined: Sun 07 Aug 2005, 20:16
Location: Southeast Georgia, USA
Contact:

#2 Post by edoc »

Did anyone step-up to this?

If so, do you have a there a link to that thread, please?

With the increased popularity of Linux, and well-financed techno-thugs around the world, it makes good sense to have an intentionally-secure Puppy alternative.
[b]Thanks! David[/b]
[i]Home page: [/i][url]http://nevils-station.com[/url]
[i]Don't google[/i] [b]Search![/b] [url]http://duckduckgo.com[/url]
TahrPup64 & Lighthouse64-b602 & JL64-603

User avatar
technosaurus
Posts: 4853
Joined: Mon 19 May 2008, 01:24
Location: Blue Springs, MO
Contact:

#3 Post by technosaurus »

I hardly think input from the "run as root" distro will be welcome.
Check out my [url=https://github.com/technosaurus]github repositories[/url]. I may eventually get around to updating my [url=http://bashismal.blogspot.com]blogspot[/url].

anikin
Posts: 994
Joined: Thu 10 May 2012, 06:16

#4 Post by anikin »

I don't think they're interested that much in getting outside help or feedback from users, they don't even have a forum. I have tested Tails, it is over bloated and slow. With some effort, it can be remastered though, to make it usable.

User avatar
edoc
Posts: 4729
Joined: Sun 07 Aug 2005, 20:16
Location: Southeast Georgia, USA
Contact:

#5 Post by edoc »

We have some password-protected Puppies and some "bloated" versions.

Lighthouse 64, for example, is not root by default - which can be a nuisance when one tries to save images from the Internet.

To have a full-featured intentionally- private and secure version would fill a gap.

Where's the best place to monitor their progress, please?
[b]Thanks! David[/b]
[i]Home page: [/i][url]http://nevils-station.com[/url]
[i]Don't google[/i] [b]Search![/b] [url]http://duckduckgo.com[/url]
TahrPup64 & Lighthouse64-b602 & JL64-603

User avatar
Ray MK
Posts: 774
Joined: Tue 05 Feb 2008, 09:10
Location: UK

#6 Post by Ray MK »

Attack-pup can bite and puli-pup really barks when needed.
[b]Asus[/b] 701SD. 2gig ram. 8gb SSD. [b]IBM A21m[/b] laptop. 192mb ram. PIII Coppermine proc. [b]X60[/b] T2400 1.8Ghz proc. 2gig ram. 80gb hdd. [b]T41[/b] Pentium M 1400Mhz. 512mb ram.

User avatar
edoc
Posts: 4729
Joined: Sun 07 Aug 2005, 20:16
Location: Southeast Georgia, USA
Contact:

#7 Post by edoc »

If I read this thread correctly Attack-pup is abandonware:

http://www.murga-linux.com/puppy/viewtopic.php?t=55874

True?
[b]Thanks! David[/b]
[i]Home page: [/i][url]http://nevils-station.com[/url]
[i]Don't google[/i] [b]Search![/b] [url]http://duckduckgo.com[/url]
TahrPup64 & Lighthouse64-b602 & JL64-603

User avatar
Ray MK
Posts: 774
Joined: Tue 05 Feb 2008, 09:10
Location: UK

#8 Post by Ray MK »

Still a very usable puppy - in fact most puppies with growl added are ok.
[b]Asus[/b] 701SD. 2gig ram. 8gb SSD. [b]IBM A21m[/b] laptop. 192mb ram. PIII Coppermine proc. [b]X60[/b] T2400 1.8Ghz proc. 2gig ram. 80gb hdd. [b]T41[/b] Pentium M 1400Mhz. 512mb ram.

User avatar
edoc
Posts: 4729
Joined: Sun 07 Aug 2005, 20:16
Location: Southeast Georgia, USA
Contact:

#9 Post by edoc »

I'm already experiencing stability problems with older Puppies (one 32-bit, one 64-bit) - they seem to result from updates to Web browsers creating some sort of resource conflict - but that's a wild guess.

I'd like to see a best-of several Puppies into one:

Combo 32 & 64 bit.

High security.

Tested repository of apps vs tons stuffed in (the latter design tends to be more difficult to maintain as security and interoperability challenges present over time).

Handles Microsoft-imposed UEFI/EFI anti-competitiveness BIOS nonsense.

Team developed & supported with a second person for each section so one developer leaving doesn't leave a gaping hole in support & improvement.

I'd be willing to donate to help support such a critter.
[b]Thanks! David[/b]
[i]Home page: [/i][url]http://nevils-station.com[/url]
[i]Don't google[/i] [b]Search![/b] [url]http://duckduckgo.com[/url]
TahrPup64 & Lighthouse64-b602 & JL64-603

User avatar
Blackfish
Posts: 324
Joined: Wed 26 Feb 2014, 15:36
Location: Brookings, SD

#10 Post by Blackfish »

If one boots Puppy from the CD and runs it from memory, not even using a USB stick, which is write-able media, isn't that security enough? After one shuts down the computer, nothing is saved, there is nothing to track or trace? It's as though the session never took place?

Also, does Puppy consider itself "free software" or "open source" software-or both-or what?

purple379
Posts: 157
Joined: Sat 04 Oct 2014, 22:23

Think about being a journalist in a repressive country

#11 Post by purple379 »

I apologize for repeating some things many of you already know.

There is a distinct difference between making sure I do not have Malware, that can steal my bank account number. Rather than preventing anyone from knowing my IP Address, being able to see anything I send or where I am sending it too.

I know that I had a huge delay in booting one high end 2014 laptop with Tails. On the other hand Tails booted in less than three minutes to my 2009 Mac Book Pro. The difference in the distro finding the right drivers.

I feel this is the area Puppy Linux developers can help, many more hardware drivers for Tails.

Using the Tor Browser is always going to be more slow than other browsers.

If one boots into Tails itself, one can report issues to those who work on it from there.

As I have learned from being on one of the unofficial Tails Chats, which had one of the Tails Developers on it, the developers are not interested in re-hashing discussions about how they made their design decisions, as they have explained their point of view in the documentation. For Example: Tails allows some Java Script to operate, while some want to argue that all Java Script should be disabled. If it is the individual users' view that he should disable all Java Script, he has the ability to do so.

As most encryption, and Security systems are broken not by because the encryption is cracked, but by mistakes made by operators. So reading the documentation, and thinking about what one is doing seems to be extremely important. For another instance, how the NSA found people who were using the Tor Browser (Example: Silk Road), and thought themselves safe.

You might more closely at the Tor Documentation of why some say not to set a PW for Tails Root.

I personally suspect that the reasons the publicly known Chat is not working is based on something the NSA did, or forced one of the Chats to do. I do not think the Tails developers will have anything to say about why some things happen. They are busy working, and test, test, test.

If I lived in some repressive countries. I might not, based upon what the local government might do to those who do, go to the Tails Website, look at its documentation, or download the ISO, and the same for the Tor Browser.

User avatar
8Geee
Posts: 2181
Joined: Mon 12 May 2008, 11:29
Location: N.E. USA

#12 Post by 8Geee »

Blackfish wrote:If one boots Puppy from the CD and runs it from memory, not even using a USB stick, which is write-able media, isn't that security enough? After one shuts down the computer, nothing is saved, there is nothing to track or trace? It's as though the session never took place?

Also, does Puppy consider itself "free software" or "open source" software-or both-or what?
But you are NOT invisible when usiing the WWW! Websites do know you visited.
Linux user #498913 "Some people need to reimagine their thinking."
"Zuckerberg: a large city inhabited by mentally challenged people."

User avatar
Blackfish
Posts: 324
Joined: Wed 26 Feb 2014, 15:36
Location: Brookings, SD

#13 Post by Blackfish »

8Geee wrote:
Blackfish wrote:If one boots Puppy from the CD and runs it from memory, not even using a USB stick, which is write-able media, isn't that security enough? After one shuts down the computer, nothing is saved, there is nothing to track or trace? It's as though the session never took place?

Also, does Puppy consider itself "free software" or "open source" software-or both-or what?
But you are NOT invisible when usiing the WWW! Websites do know you visited.
Oh, so true. But one can use things like the Tor Browser, proxy sites, etc., and circumvent all of that, too.

Post Reply