Hacker News new | past | comments | ask | show | jobs | submit login

I think a better approach to a strong security and privacy would be to use Whonix[0] in Qubes[1].

It's not too hard[2].

  0: https://www.whonix.org
  1: https://www.qubes-os.org
  2: https://www.qubes-os.org/doc/whonix/install



I see overlap between these approaches, but not sure I'd go so far as considering one or another "better" for all use cases. Tails specifically targets "less sophisticated" users, and is pretty self-explanatory. And true to its name (and unlike Qubes and Whonix), Tails goes to pains to be "amnesiac" by design, although you can of course subvert that by enabling persistence. It's hard to hold a candle to Tails when using computers at local libraries or internet cafes, or when you really need to maintain a minimimal data footprint when traveling internationally.


Why do you think so?


The whonix setup has tor and your browser on different VMs, whereas tails relies on linux' firewall to funnel traffic through tor. Tails is "just" one kernel exploit away from deanonymization.

More importantly, qubes is far superior to anything else for day to day security. You can do your banking in one isolated domain, your "let's download a thousand unverified dependencies from strangers" development on another, your internet browsing in a third, you can create domains with no internet connectivity to store your private files, and it's a lot easier than trying to juggle VMs yourself. A side benefit for the people who never close tabs is that qubes never becomes unresponsive due to running low on memory.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: