Hey experts! Reading about Tails and Whonix, I learnd that Whonix is for 
virtual machines and Tails don't. 
https://www.whonix.org/wiki/Comparison_with_Others The questions are: 1. What 
kind of metadata could remain on Windows 8 when running Tails and Whonix on 
virtual machine (VMWare and VirtualBox)? Should I inquire the developers? If no 
metadata remains, the fact virtual machine provides us another IP and mac 
adress, would not be safer?  2. Should we disable or block by firewall my 
antivirus when running Tails or Whoinx on virtual machine? 3. No metadata 
remains on the live dvd-rw when running Tails as main boot? 4. No metadata 
remains when running Tor on Ubuntu? If yes, how can I clean it? 5. "The Tor 
design doesn't try to protect against an attacker who can see or measure both 
traffic going into the Tor network and also traffic coming out of the Tor 
network. That's because if you can see both flows, some simple statistics let 
you decide whether they match up. That could also be t
 he case if your ISP (or your local network administrator) and the ISP of the 
destination server (or the destination server itself) cooperate to attack you. 
Tor tries to protect against traffic analysis, where an attacker tries to learn 
whom to investigate, but Tor can't protect against traffic confirmation (also 
known as end-to-end correlation), where an attacker tries to confirm an 
hypothesis by monitoring the right locations in the network and then doing the 
math" The sentence above means that downloads through Tor are encrypted? If 
yes, it means that, even if the entry node and the exit node are compromissed, 
the attacker can't easily decrypt what I have downloaded? Cheers!Marcos Kehl 
(Brasil)  

                                          
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to