News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Technical probability of Tails OS persistent attack : OpSec | Torhoo darknet markets

Curious about the probability here. I think the probability of a persistent attack on Tails is close to 0.

Set up is Tails OS with luks2 encrypted USB. The USB is unlocked for the duration of my Tails session and is used like persistent storage.

Lets say the network I am using is compromised, so either a cellualr network or a wireless network is compromised. Let's see what can the attacker do:

Everything is tunnled through TOR so they can't do a DNS redirect and serve malicious JS.
(Lets not entertain the possiblity of compromised TOR node. Not in my threat model)

What other LAN attacks could exist here? Can't think of anything likely given how Tails deals with local traffic.
Assume that I'm never using untrusted Browser.

Even if TOR browser is compromised somehow from a targeted attack, assuming there is a 0 day in Tor Browser. Sandboxing via AppArmor is pretty tight so it would be hard to get access to the open USB drive.

Even if attacker has access to the USB drive, they'd have to include an "tails specific" executable that runs everytime the USB is unlocked. It would have to be a hidden binary.

How could they even get it to auto execute? Not sure if this is possible without malicious persistence at Tails OS level which is ofcourse not possible.

I'm curious to know what are the possible "persistent" attacks against Tails? I can't think of any.
/u/HeadJanitor ۩ 𝓜𝓘𝓐 ۩
3 points
8 months ago
Let's slow down.

Who is the attacker?

What do you have that is worth attacking?

Let's say you are 18-years-old and can barely come up with $63. Are you worthy of a nation-state attack?
/u/Cyberjagu
1 points
8 months ago
i was about to say that lol !
/u/HeadJanitor ۩ 𝓜𝓘𝓐 ۩
2 points
8 months ago
Everyone feels under attack!!! You know who is under attack? The Fortune 100. Not the kid with the $8 flash drive.
/u/Cyberjagu
1 points
8 months ago
Right! If some secret agency is gunning for his $8 USB Imagine the disappointment when they crack it open and realize he just a normal person with a caffeine addiction and no Fortune 100 secrets DD
/u/HeadJanitor ۩ 𝓜𝓘𝓐 ۩
1 points
8 months ago
And he spent $34 on transfer fees using Cash App and his mom is going to be pissed at him.
/u/PlaneSabotage
1 points
8 months ago
wow you're paranoid, but then again i cant see the feds busting down your door anytime soon, better safe than sorry (even if it's overkill)
/u/mathbot
1 points
8 months ago
I'd be more worried about a back door inserted into the Tails OS build somehow.

Edit: Oh I remember they caught an extortionist that was using tails by sending a crafted video file exploit. They got his IP address and found where he lived. He was extorting teen girls to send him stuff.
/u/anoncrab
1 points
8 months ago
I remember this. Wasn't even a root exploit was it? Do you know if at least root access is required now to deanon a Tails user? Is unsafe browser disabled by default?
/u/mathbot
1 points
8 months ago
It was an older version of tails. I'm pretty sure it didn't require root since that would need yet another exploit. Search "buster hernandez extortion". Patched of course.
/u/anoncrab
1 points
8 months ago
Does the apparmor profile for tor browser grant CAP_SYS_ADMIN? If so, it doesn't protect you as much as you might think.

Do you enable root access in Tails? If so, then the attacker could also easily escalate to root once they have local access.

Does tails enable IOMMU by default? If not, then you're not protected from malicious USBs
This is not how things work mate. What is your threat model, how do you use Tails, do you have a persistence enabled, what features are enabled (dotfiles?) and so on. Based on

The OpSec is about the precise protection of your operation based on your adversaries, your vulnerabilities and your activity in the specific environment. To find out if a certain tool or a procedure is suitable and enough robust and resistant against your adversaries in your specific situation, it comes in the step 4, while the 3 previous steps are completed.

So did complete your 3 OpSec steps to discuss the step 4?