Discussion:
tails-support Digest, Vol 15, Issue 3
(too old to reply)
Marcos Eugenio Kehl
2014-10-02 18:24:31 UTC
Permalink
Subject: tails-support Digest, Vol 15, Issue 3
Date: Thu, 2 Oct 2014 18:59:42 +0200
Send tails-support mailing list submissions to
To subscribe or unsubscribe via the World Wide Web, visit
https://mailman.boum.org/listinfo/tails-support
or, via email, send a message with subject or body 'help' to
You can reach the person managing the list at
When replying, please edit your Subject line so it is more specific
than "Re: Contents of tails-support digest..."
1. Forensics on Tails 1.1.2 persistent volume. (Marcos Eugenio Kehl)
2. Re: Forensics on Tails 1.1.2 persistent volume. (intrigeri)
3. Did I verify Tails correctly?
----------------------------------------------------------------------
Message: 1
Date: Thu, 2 Oct 2014 14:27:13 +0000
Subject: [Tails-support] Forensics on Tails 1.1.2 persistent volume.
Content-Type: text/plain; charset="iso-8859-1"
Hello white hats and Tails developers!
I have created a persistent volume in my Tails 1.1.2 usb device. Worked very well and I saved important docs inside it for testing.
As I understand, the persistent volume uses Luks encryption.
1. But what kind of encryption? AES 256 bits?
What level of security this persistent volume provides me against forensics tools like Helix, Kali, Encase, Authopsy, Vinetto, brute force... supposing I have this volume protected under a very strong password?
2. What kind of metadata could be recovered after formating this usb device? Just a mess of encrypted algorithms?
I intend to use Tails as my graduation theme at university.
Many thanks especially to "mercedes508".
Marcos Kehl (Brasil)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/tails-support/attachments/20141002/e7489f15/attachment.html>
------------------------------
Message: 2
Date: Thu, 02 Oct 2014 17:50:35 +0200
Subject: Re: [Tails-support] Forensics on Tails 1.1.2 persistent
volume.
Content-Type: text/plain
1. But what kind of encryption? AES 256 bits?
What level of security this persistent volume provides me against forensics tools
like Helix, Kali, Encase, Authopsy, Vinetto, brute force... supposing I have this
volume protected under a very strong password?
https://tails.boum.org/support/faq/index.en.html#index15h2
2. What kind of metadata could be recovered after formating this usb device? Just a mess of encrypted algorithms?
What do you mean by "formatting" exactly?
Cheers,
--
intrigeri
Hello Intrigeri.
I mean "wipe", "erase", "reinstall the OS". What world in english could I use to explain such task? In portuguese is "formatar" for this reason I wrote "formatting". Sorry.
Marcos Kehl (Brasil)
------------------------------
Message: 3
Date: Thu, 2 Oct 2014 16:59:53 -0000
Subject: [Tails-support] Did I verify Tails correctly?
Content-Type: text/plain; charset="iso-8859-1"
I'm not sure if I've verified the Tails key correctly. I've attached an
image file in the email attachment to show you my results. When I tried to
decrypt/verify the tails-signing.key file, the results said that no
signatures are found.
According to your instructions on
https://tails.boum.org/download/index.en.html, I am supposed to see this
"Not enough information to check the signature validity.
The validity of the signature cannot be verified."
The above warning is not the same as the warning I received in the
verification results, which is why I don't know if did everything right.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: tails signing help 01.png
Type: image/png
Size: 39757 bytes
Desc: not available
URL: </pipermail/tails-support/attachments/20141002/23c7e991/attachment.png>
------------------------------
Subject: Digest Footer
_______________________________________________
tails-support mailing list
https://mailman.boum.org/listinfo/tails-support
------------------------------
End of tails-support Digest, Vol 15, Issue 3
********************************************
intrigeri
2014-10-02 19:26:13 UTC
Permalink
Hi,

(please don't quote pages and pages of text that's unrelated to the
question at hand -- thanks :)
2. What kind of metadata could be recovered after formating this usb device? Just a mess of encrypted algorithms?
What do you mean by "formatting" exactly?
I mean "wipe", "erase", "reinstall the OS". What world in english could I use to
"formatting". Sorry.
Likely, the fact that this device contained a Tails installation can
be recovered. Same for the LUKS header, and big parts of the
encrypted data.

Loading...