|
Anonymous #3
|
|
Quote:
Alan Rockefeller said:
Quote:
Anonymous said: 3. A VM does not randomize its MAC on each boot, but its initial MAC is random, which gives you greater security, because then if anyone comes knocking and the VM was deleted, then the MAC is gone. But think, it would cause havoc for DHCP servers to randomize the MAC on each boot!
DHCP servers would not care that the mac is random on boot unless security features are enabled that restrict the amount of MAC addresses used by each port. Using multiple MAC addresses on the same port might alert the IT Security team at a large workplace that something unusual is going on.
It is true, but most(?) Sys Admins will only give an IP to a known MAC, rather than allow any MAC to gain access. I suppose it happens, but I am assuming an enterprise that fears being prosecuted for negligence in any type of litigation. --------
The Hidden OS could work for you, try it, though it seems a lot more work than buying a netbook that can boot from USB. You should consider storing your files in the cloud (encrypted) in a country out of the jurisdiction of your home country, and only access it with a decoy e-mail and the VPN you use, which makes it difficult to establish you use this service. Beware of de-duplication on cloud servers, you have to encrypt it all. You could encrypt it steganographically, too. It depends what data it is, but I am guessing I don't want to know, and I would prefer not to know. It all depends what you're up to as to what is the best solution, but try it all, and see what works.
The dual-system could work, please try it and let us know your results. I have not heard much positive about it to date, but there is also the chance that it is the solution you need and that I could be wrong.
|
Alan Rockefeller
Mycologist

Registered: 03/10/07
Posts: 48,392
Last seen: 2 days, 23 hours
|
Re: A secure environment using a Live CD [Re: Anonymous #3]
#17833986 - 02/20/13 02:32 AM (11 years, 2 months ago) |
|
|
Quote:
Anonymous said: It is true, but most(?) Sys Admins will only give an IP to a known MAC, rather than allow any MAC to gain access. I suppose it happens, but I am assuming an enterprise that fears being prosecuted for negligence in any type of litigation.
Most sysadmins don't enable that feature because it's a lot of work to enter everyone's MAC into the switches, and change that entry every time someone gets a new computer.
In the places I have ran the switches, the admins didn't lock down every port to a certain mac, but they did look to see if any ports were using multiple MAC addresses. This usually indicated that they were setting up an unauthorized hub or wireless AP, but also could indicate that VMware is running or OS's are trying to be stealthy. If someone was using more than 2 MAC addresses, we would have a talk with them and ask them what was going on.
|
Anonymous #1
|
|
Without trying to repeat myself here, I'm just wondering what options I've got if I decide to run TAILS as a Live CD when it comes to saving files? Should I just save them to a file container held on another machine? It seems a little slack on my part but it'll have to do until I get looking into a hidden OS using TrueCrypt. I'm afraid I won't be able to get round to that until this coming weekend at the very least. With that being said, it is only a few days.
What's your opinion on a hidden OS Alan? From what my mate was telling me, it isn't that complicated to get running and once it's all sorted, I should have a repository for downloading files in addition to carrying out both secure and anonymous surfing, as long as I make sure to make frequent use of the decoy OS too. He recommended Ubuntu on both then using a virtual machine with Tails on the hidden OS. It seems overkill but would certainly do the trick. You think there's much point with the virtual machine or would you just use Tails as your hidden OS?
|
Anonymous #3
|
Re: A secure environment using a Live CD [Re: Anonymous #1]
#17853618 - 02/23/13 05:18 PM (11 years, 2 months ago) |
|
|
You will burn a bootable USB with tails, then setup TAILs with encryption pass etc. when you first boot into it. It will make you burn a new bootable USB (well, you don't have to, but you can), which will be your primary TAILs to use. You have to go through a very short setup then burn that new tails USB, which will make things secure for you. That will have an encrypted place for storing files on it for you.
You have to jump in at this point. Don't be shy.
|
Lana
Head Banana


Registered: 10/27/99
Posts: 3,109
Loc: www.MycoSupply.com
|
Re: A secure environment using a Live CD [Re: Anonymous #3]
#17906850 - 03/05/13 07:20 AM (11 years, 2 months ago) |
|
|
Nice thread, this is what this forum is about
Lana
-------------------- Myco Supply - Distributors of Mycological Products http://www.MycoSupply.com The Premiere Source for Mushroom Growing Supplies. Visit us online or call us toll free
|
|