I wouldn't recommend TOR for anything personally identifying (anything done on TOR has a chance of greater scrutiny and malicious subversion). Have used Facebook through TOR with SSL enabled and watched a friends computer get exploited during a chat session. SSL is pretty well broken from my point of view. I wouldnt trust TOR for any executable download or software update (pdfs and other exploited forms of media are questionable too). Best use for tor is in a read only environment where no writable media is present on your computer. I would recommend locking your bios, it might not matter if there is a default secondary password.
--- On Sun, 7/29/12, Katya Titov <katti...@yandex.com> wrote: > From: Katya Titov <katti...@yandex.com> > Subject: [tor-talk] Free WiFi Bootable Ditros > To: tor-talk@lists.torproject.org > Date: Sunday, July 29, 2012, 12:57 AM > Hi all, > > This is not specifically a Tor question, but there may be > some on the > list who know the answer. > > I'm wondering whether there are any bootable distros out > there which > are designed to be used on free WiFi networks (e.g. > Starbucks, > McDonalds) and enforce some level of network encryption. > Tails would > obviously provide a solution here by forcing everything > through Tor, > but I can also see alternatives which force the use of an > IPSEC VPN, or > only allow outbound access to ports which are commonly used > for secure > access (443, 993, etc). > > It wouldn't need to be an entire distro, just a set of > scripts which > configured the local firewall (iptables, ipfw, even the > regular Windows > firewall) to only allow secure connections, and established > a Tor or > VPN connection (if necessary). This would mean I could use > my > regular desktop environment to read email, check social > networks, etc > all the while being reasonably confident that any traffic > which would > normally traverse the network unsecured (updates, etc, and > any > misconfigured software) would not get access. > > I guess that the set up would need to be somewhat aware of > the network > it was connecting to to allow access to captive portals to > agree with > the AUP. > > Anything out there which does this? > > Thanks > -- > kat > _______________________________________________ > tor-talk mailing list > tor-talk@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk