• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Google confirms Salesforce CRM breach, faces extortion threat

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

 | 

Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Embargo Ransomware nets $34.2M in crypto since April 2024

 | 

Germany limits police spyware use to serious crimes

 | 

Phishing attacks exploit WinRAR flaw CVE-2025-8088 to install RomCom

 | 

French firm Bouygues Telecom suffered a data breach impacting 6.4M customers

 | 

Columbia University data breach impacted 868,969 people

 | 

SonicWall dismisses zero-day fears after Ransomware probe

 | 

Air France and KLM disclosed data breaches following the hack of a third-party platform

 | 

CISA, Microsoft warn of critical Exchange hybrid flaw CVE-2025-53786

 | 

Microsoft unveils Project Ire: AI that autonomously detects malware

 | 

CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

 | 

Over 100 Dell models exposed to critical ControlVault3 firmware bugs

 | 

How CTEM Boosts Visibility and Shrinks Attack Surfaces in Hybrid and Cloud Environments

 | 

WhatsApp cracks down on 6.8M scam accounts in global takedown

 | 

Trend Micro fixes two actively exploited Apex One RCE flaws

 | 

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog

 | 

Google fixed two Qualcomm bugs that were actively exploited in the wild

 | 

Zero Day Quest returns: Microsoft ups the stakes with $5M bug bounty

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Digital ID
  • Security
  • Tails 1.4 is out to preserve your privacy and anonymity

Tails 1.4 is out to preserve your privacy and anonymity

Pierluigi Paganini May 16, 2015

The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user privacy and anonymity.

The Debian-based distribution Tails, “The Amnesiac Incognito Live System,”version 1.4 is available online! Tails is a popular live operating system (that means that users can start it on almost any computer from removable devices like a DVD, USB stick, and SD card) designed to preserve user privacy and anonymity.

The popular live Linux distribution is used by the famous whistleblower Edward Snowden, just released version 1.4.

This Debian-based system is designed to preserve your privacy and anonymity online, providing better protection than just using the Tor browser alone on a typical operating system. Tails includes a set of tools to protect the user anonymity, such as the Tor Browser and the I2P anonymizing software. The Tails live OS is designed to route all the user traffic over the Tor network to prevent applications from leaking it.

tails 1.4

 

The Tails ability to boot and run from a disc, USB drive, or SD card ensures no traces of a user’s activity remain on the local host hard drive and registry, this means that it could also run on an untrusted computer. Another point of strength for the Tails live distribution is the impossibility for spyware to run infect the Tails OS.

Theoretically the unique possibility for an attacker to spy on a Tails session is to use a malicious implant at firmware level on the targeted host.

Tails use other privacy software like KeePassX password manager, Electrum BitCoin wallet, Pidgin, and disk-wiping and encryption tools.

Pidgin for example, is a free chat client used by to connect to AIM, MSN, Yahoo, and more chat networks all at once. The version installed in the Tails 1.4 version comes with the Off-the-Record plug-in for encrypted chatting. You’ll also find software like the KeePassX password manager, Electrum BitCoin wallet, and disk-wiping and encryption tools.

What’s new in Tails release 1.4?

Of course, the new Tails 1.4 includes the new Tor Browser version 4.5, and fix numerous security issues as reported in the Tails 1.4 release notes.

Among the issues resolved in the Tails 1.4 release there, is the browser theme of the Windows 8 camouflage that has been made compatible with the I2P and Unsafe browsers.

The new version support for more printers, and better support for Vietnamese fonts in LibreOffice, and includes a Tails OpenPGP Applet that has a shortcut to the gedit text editor.

“Tails, The Amnesic Incognito Live System, version 1.4, is out,” was stated in the official release announcement for Tails 1.4. “This release fixes numerous security issues and all users must upgrade as soon as possible. […] There are numerous other changes that might not be apparent in the daily operation of a typical user.” states the Tails 1.4 official page. 

The new release includes Paperkey that is a tool that allows users to print a backup of their OpenPGP secret keys on paper.

Tails 1.4 also removes the obsolete #i2p-help IRC channel from the Pidgin multi-protocol instant messaging client and disables the new circuit view of the Tor Browser 4.5 application.

Let me suggest to read the about page and warnings before starting use the Tails 1.4.

Pierluigi Paganini

(Security Affairs – Tails 1.4, anonymity)


facebook linkedin twitter

anonymity Edward Snowden live os privacy Tails Tails 1.4

you might also like

Pierluigi Paganini August 10, 2025
Google confirms Salesforce CRM breach, faces extortion threat
Read more
Pierluigi Paganini August 10, 2025
BadCam: Linux-based Lenovo webcam bugs enable BadUSB attacks
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Google confirms Salesforce CRM breach, faces extortion threat

    Data Breach / August 10, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

    Breaking News / August 10, 2025

    Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / August 10, 2025

    Embargo Ransomware nets $34.2M in crypto since April 2024

    Cyber Crime / August 09, 2025

    Germany limits police spyware use to serious crimes

    Laws and regulations / August 09, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT