Researchers Demonstrate Zero-Day Flaws in Tails Operating System
Researchers Demonstrate Zero-Day Vulnerabilities in Tails Operating System, Researchers Demonstrate Zero-Day Flaws in Tails Operating System, hacking TOR network, haking tails OS, security of TAILS OS
On the blog post Exodus researcher have thoroughly described the vulnerability and also posted a demonstrated video of vulnerability that unmask an anonymous user of the Tails operating system. On the demostrated video researcher have demonstrate the exploit using Tail s 1.1, but they have noted that the current version of the Tails operating system was still vulnerable to methods that could expose the identity of the user
Tails is a Debian Linux-based operating system which integrates tools that run the connection through the TOR network in order to keep the identity of the user secret.Exodus Intelligence claims that there are number of vulnerability present in Security oriented operating system, and there is no available patch.
On the blog post Exodus says that actual problem lies in the heavily encrypted networking program called the Invisible Internet Project (I2P). The network layer that Tails uses to hide the user's public IP address from other websites and servers in order to keep the user anonymous on the web.
Users should question the tools they use, they should go even further to understand the underlying mechanisms that interlock to grant them security," reads the blog post.