Difference between revisions of "Assembly:Tails"

From 34C3_Wiki
Jump to: navigation, search
 
(One intermediate revision by one other user not shown)
Line 3: Line 3:
 
|Has orga contact=muri+34c3@immerda.ch
 
|Has orga contact=muri+34c3@immerda.ch
 
|Has description=Tails is a live operating system that you can start on almost any computer from a USB stick or a DVD.
 
|Has description=Tails is a live operating system that you can start on almost any computer from a USB stick or a DVD.
 +
|Subassembly of=Assembly:Anarchist
 
|Related to Assembly=Qubes OS, Tor, I2P, Reproducible-Builds
 
|Related to Assembly=Qubes OS, Tor, I2P, Reproducible-Builds
|Has assembly tag=anonymity, privacy, secure desktop, tor
+
|Has assembly tag=anonymity, privacy, secure desktop, tor, os
 
|Provides session location=no
 
|Provides session location=no
 
|Provides stage=no
 
|Provides stage=no

Latest revision as of 14:58, 30 November 2017

Website https://tails.boum.org
Description Tails is a live operating system that you can start on almost any computer from a USB stick or a DVD.
Members
Projects create project
Self-organized Sessions create self-organized session
Subassembly of Assembly:Anarchist
Related to Assembly Assembly:Qubes OS, Assembly:Tor, Assembly:I2P, Assembly:Reproducible-Builds
Tags anonymity, privacy, secure desktop, tor, os
Registered on
Provides stage no
Location for self-organized sessions no
Orga contact muri+34c3@immerda.ch
Brings
Projects
Uses money yes we handle money
Need fibre no
Extra Power {{{Extra power}}}
Near passage whatever
Character of assembly place to show and meet
Seats needed 6
Extra seats 0
Aread needed 0
Arrival and build up

refresh

Privacy for anyone anywhere

Tails is a live operating system that you can start on almost any computer from a USB stick or a DVD.

It aims at preserving your privacy and anonymity, and helps you to:

  • use the Internet anonymously and circumvent censorship;
  • all connections to the Internet are forced to go through the Tor network;
  • leave no trace on the computer you are using unless you ask it explicitly;
  • use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.