• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

 | 

Interlock ransomware group deploys new PHP-based RAT via FileFix

 | 

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

 | 

Experts uncover critical flaws in Kigen eSIM technology affecting billions

 | 

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 

UK NCA arrested four people over M&S, Co-op cyberattacks

 | 

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

 | 

Qantas data breach impacted 5.7 million individuals

 | 

DoNot APT is expanding scope targeting European foreign ministries

 | 

Nippon Steel Solutions suffered a data breach following a zero-day attack

 | 

Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates

 | 

Hackers weaponize Shellter red teaming tool to spread infostealers

 | 

Microsoft Patch Tuesday security updates for July 2025 fixed a zero-day

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Digital ID
  • Security
  • Tails 1.4 is out to preserve your privacy and anonymity

Tails 1.4 is out to preserve your privacy and anonymity

Pierluigi Paganini May 16, 2015

The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user privacy and anonymity.

The Debian-based distribution Tails, “The Amnesiac Incognito Live System,”version 1.4 is available online! Tails is a popular live operating system (that means that users can start it on almost any computer from removable devices like a DVD, USB stick, and SD card) designed to preserve user privacy and anonymity.

The popular live Linux distribution is used by the famous whistleblower Edward Snowden, just released version 1.4.

This Debian-based system is designed to preserve your privacy and anonymity online, providing better protection than just using the Tor browser alone on a typical operating system. Tails includes a set of tools to protect the user anonymity, such as the Tor Browser and the I2P anonymizing software. The Tails live OS is designed to route all the user traffic over the Tor network to prevent applications from leaking it.

tails 1.4

 

The Tails ability to boot and run from a disc, USB drive, or SD card ensures no traces of a user’s activity remain on the local host hard drive and registry, this means that it could also run on an untrusted computer. Another point of strength for the Tails live distribution is the impossibility for spyware to run infect the Tails OS.

Theoretically the unique possibility for an attacker to spy on a Tails session is to use a malicious implant at firmware level on the targeted host.

Tails use other privacy software like KeePassX password manager, Electrum BitCoin wallet, Pidgin, and disk-wiping and encryption tools.

Pidgin for example, is a free chat client used by to connect to AIM, MSN, Yahoo, and more chat networks all at once. The version installed in the Tails 1.4 version comes with the Off-the-Record plug-in for encrypted chatting. You’ll also find software like the KeePassX password manager, Electrum BitCoin wallet, and disk-wiping and encryption tools.

What’s new in Tails release 1.4?

Of course, the new Tails 1.4 includes the new Tor Browser version 4.5, and fix numerous security issues as reported in the Tails 1.4 release notes.

Among the issues resolved in the Tails 1.4 release there, is the browser theme of the Windows 8 camouflage that has been made compatible with the I2P and Unsafe browsers.

The new version support for more printers, and better support for Vietnamese fonts in LibreOffice, and includes a Tails OpenPGP Applet that has a shortcut to the gedit text editor.

“Tails, The Amnesic Incognito Live System, version 1.4, is out,” was stated in the official release announcement for Tails 1.4. “This release fixes numerous security issues and all users must upgrade as soon as possible. […] There are numerous other changes that might not be apparent in the daily operation of a typical user.” states the Tails 1.4 official page. 

The new release includes Paperkey that is a tool that allows users to print a backup of their OpenPGP secret keys on paper.

Tails 1.4 also removes the obsolete #i2p-help IRC channel from the Pidgin multi-protocol instant messaging client and disables the new circuit view of the Tor Browser 4.5 application.

Let me suggest to read the about page and warnings before starting use the Tails 1.4.

Pierluigi Paganini

(Security Affairs – Tails 1.4, anonymity)


facebook linkedin twitter

anonymity Edward Snowden live os privacy Tails Tails 1.4

you might also like

Pierluigi Paganini July 15, 2025
An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance
Read more
Pierluigi Paganini July 14, 2025
Interlock ransomware group deploys new PHP-based RAT via FileFix
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

    Hacking / July 15, 2025

    Interlock ransomware group deploys new PHP-based RAT via FileFix

    Cyber Crime / July 14, 2025

    Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

    Data Breach / July 14, 2025

    Experts uncover critical flaws in Kigen eSIM technology affecting billions

    Security / July 14, 2025

    Spain awarded €12.3 million in contracts to Huawei

    Intelligence / July 14, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT