Find the answer to your Linux question:
Results 1 to 2 of 2
I don't plan on entering any credit card info or things like that, but I'd like to log into sites instead of just web searching. Would using Tails Linux be ...
Enjoy an ad free experience by logging in. Not a member yet? Register.
  1. #1
    Just Joined!
    Join Date
    Jun 2012
    Posts
    68

    Should I use Golden Frog or Tails Linux for public wifi?


    I don't plan on entering any credit card info or things like that, but I'd like to log into sites instead of just web searching. Would using Tails Linux be enough or should I go for a paid VPN?
    Last edited by Sharpghost6; 06-13-2014 at 10:03 AM. Reason: more words

  2. #2
    Super Moderator Roxoff's Avatar
    Join Date
    Aug 2005
    Location
    Nottingham, England
    Posts
    3,906
    Tails uses TOR to do its anonymity thing (and I've no experience of Golden Frog at all). What that means is that your data packets will be passed through more hosts than normal during routing - and you can't trust -any- of the nodes your data is going to pass through. This has the effect you want, i.e. it makes it very difficult to detect where information came from and hence who generated it. But it also exposes any credential information you provide to every host.

    Even if you're talking to a site secured with SSL, i.e. one that uses https rather than http, its not all that hard for one of the hosts to substitute its own certificate, one that looks like it's owned by the real web site you're connecting to, but in reality is owned by one of the hosts on the route, who can therefore decrypt any information you send (this is a man-in-the-middle crack).

    Because of this, sending any credential information over TOR means that anyone who has a bit of security knowledge may be able to discern your username and password, and these may lead to a breach of that anonymity. This is especially a problem if you use the same credentials for other sites that the ones you connect to across TOR. The two effects are - 1. your identity may be exposed not by the computer you're connecting from but by the credentials you use and 2. potentially hands your credentials to anyone that could use them.

    So please be extra careful - there is a huge difference between anonymity and privacy. Only use TOR for anonymity.
    Linux user #126863 - see http://linuxcounter.net/

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •