1 [[!meta title="Warning"]]
3 Even though we're doing our best to offer you good tools to protect your
4 privacy while using a computer, **there is no magic or perfect solution to such
5 a complex problem**. Understanding well the limits of such tools is a crucial
6 step in, first, deciding whether Tails is the right tool for you, and second,
7 helping you making a good use of it.
11 <a id="exit_node"></a>
13 Tor exit nodes can eavesdrop on communications
14 ==============================================
16 **Tor is about hiding your location, not about encrypting your communication.**
18 Instead of taking a direct route from source to destination, communications
19 using the Tor network take a random pathway through several Tor relays that
20 cover your tracks. So no observer at any single point can tell where the data
21 came from or where it's going.
23 [[!img htw2-tails.png link=no alt="A Tor connection usually goes through 3 relays with the last one establishing the actual connection to the final destination"]]
25 The last relay on this circuit, called the exit node, is the one that
26 establishes the actual connection to the destination server. As Tor does not,
27 and by design cannot, encrypt the traffic between an exit node and the
28 destination server, **any exit node is in a position to capture any traffic
29 passing through it**. See [Tor FAQ: Can exit nodes eavesdrop on
30 communications?](https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#CanexitnodeseavesdroponcommunicationsIsntthatbad).
32 For example, in 2007, a security researcher intercepted thousands of private
33 e-mail messages sent by foreign embassies and human rights groups around the
34 world by spying on the connections coming out of an exit node he was running.
35 See [Wired: Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's
36 Paradise](http://www.wired.com/politics/security/news/2007/09/embassy_hacks).
38 **To protect yourself from such attacks you should use end-to-end encryption.**
40 **Tails includes many tools to help you using strong encryption** while
41 browsing, sending email or chatting, as presented on our [[about
42 page|/about#cryptography]].
44 <a id="fingerprint"></a>
46 Tails makes it clear that you are using Tor and probably Tails
47 ==============================================================
49 **Your Internet Service Provider (ISP) or your local network administrator**
50 can see that you're connecting to a Tor relay, and not a normal web server for
51 example. Using [[Tor bridges in certain
52 conditions|first_steps/startup_options/bridge_mode]] can help you hide the fact
53 that you are using Tor.
55 **The destination server that you are contacting through Tor** can know whether your
56 communication comes out from a Tor exit node by consulting the publicly
57 available list of exit nodes that might contact it. For example using the [Tor
58 Bulk Exit List tool](https://check.torproject.org/cgi-bin/TorBulkExitList.py) of
61 **So using Tails doesn't make you look like any random Internet user.**
62 The anonymity provided by Tor and Tails works by trying to make all of their
63 users look the same so it's not possible to identify who is who amongst them.
65 See also [[Can I hide the fact that I am using Tails?|fingerprint]]
67 <a id="man-in-the-middle"></a>
69 Man-in-the-middle attacks
70 =========================
72 A man-in-the-middle attack (MitM) is a form of active eavesdropping in which the
73 attacker makes independent connections with the victims and relays messages
74 between them, making them believe that they are talking directly to each other
75 over a private connection, when in fact the entire conversation is controlled by
78 [[!img man-in-the-middle.png link=no alt="Illustration of a man-in-the-middle attack"]]
79 <!-- Source: wiki/lib/man-in-the-middle.svg -->
81 While using Tor, man-in-the-middle attacks can still happen between the exit
82 node and the destination server. The exit node itself can also act as a
83 man-in-the-middle. For an example of such an attack see [MW-Blog: TOR exit-node
85 attacks](http://www.teamfurry.com/wordpress/2007/11/20/tor-exit-node-doing-mitm-attacks).
87 **Again, to protect yourself from such attacks you should use end-to-end
88 encryption** and while doing so taking extra care at verifying the server
91 Usually, this is automatically done throught SSL certificates checked by your
92 browser against a given set of recognized [[!wikipedia
93 Certificate_authority desc="certificate authorities"]]).
94 If you get a security exception message such as this one you might be victim of
95 a man-in-the-middle attack and should not bypass it unless you have another
96 trusted way of checking the certificate's fingerprint with the people running
99 [[!img ssl_warning.png link=no alt="This Connection is Untrusted"]]
101 But on top of that the certificate authorities model of trust on Internet is
102 susceptible to various methods of compromise.
104 For example, on March 15, 2011,
105 Comodo, one of the major SSL certificates company, reported that a user account
106 with an affiliate registration authority had been compromised. It was then used
107 to create a new user account that issued nine certificate signing requests for
108 seven domains: mail.google.com, login.live.com, www.google.com, login.yahoo.com
109 (three certificates), login.skype.com, addons.mozilla.org, and global trustee.
110 See [Comodo: The Recent RA
111 Compromise](http://blogs.comodo.com/it-security/data-security/the-recent-ra-compromise/).
113 Later in 2011, DigiNotar, a Dutch SSL certificate company, incorrectly issued
114 certificates to a malicious party or parties. Later on, it came to light that
115 they were apparently compromised months before or perhaps even in May of 2009 if
116 not earlier. Rogue certificates were issued for domains such as google.com,
117 mozilla.org, torproject.org, login.yahoo.com and many more. See, [The Tor
118 Project: The DigiNotar Debacle, and what you should do about
119 it](https://blog.torproject.org/blog/diginotar-debacle-and-what-you-should-do-about-it).
121 **This still leaves open the possibility of a man-in-the-middle attack even when
122 your browser is trusting an HTTPS connection.**
124 On one hand, by providing anonymity, Tor makes it more difficult to perform a
125 man-in-the-middle attack targeted at **one specific person** with the blessing
126 of a rogue SSL certificate. But on the other end, Tor makes it easier for people
127 or organizations running exit nodes to perform large scale MitM attempts, or
128 attacks targeted at **a specific server**, and especially those among its users
129 who happen to use Tor.
131 <p class="quoted-from">Quoted from [[!wikipedia Man-in-the-middle_attack
132 desc="Wikipedia: %s"]], [[!wikipedia
133 Comodo_Group#Iran_SSL_certificate_controversy desc="Wikipedia: %s"]] and <a
134 href="https://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-browser-collusion">Tor
135 Project: Detecting Certificate Authority compromises and web browser
141 The Tor design doesn't try to protect against an attacker who can see or measure
142 both traffic going into the Tor network and also traffic coming out of the Tor
143 network. That's because if you can see both flows, some simple statistics let
144 you decide whether they match up.
146 That could also be the case if your ISP (or your local network administrator)
147 and the ISP of the destination server (or the destination server itself)
148 cooperate to attack you.
150 Tor tries to protect against traffic analysis, where an attacker tries to learn
151 whom to investigate, but Tor can't protect against traffic confirmation (also
152 known as end-to-end correlation), where an attacker tries to confirm an
153 hypothesis by monitoring the right locations in the network and then doing the
156 <p class="quoted-from">Quoted from <a
157 href="https://blog.torproject.org/blog/one-cell-enough">Tor Project: "One cell
158 is enough to break Tor's anonymity"</a>.</p>
160 Tails doesn't encrypt your documents by default
161 ===============================================
163 The documents that you might save on storage devices will not be encrypted by
164 default, except in the [[encrypted persistent volume|doc/first_steps/persistence]]. But Tails provides you with tools to encrypt your documents, such as
165 GnuPG, or encrypt your storage device, such as LUKS. It is likely that the files
166 you may create will keep tracks that they were created using Tails.
168 **If you need to access the local hard-disks** of the computer you are using, be
169 conscious that you might then leave trace of your activities with Tails on it.
171 Tails doesn't clear the metadata of your documents for you and doesn't encrypt the Subject: and other headers of your encrypted e-mail messages
172 ===========================================================================================
174 Numerous files format store hidden data or metadata inside of the files. Text
175 processors or PDF files could store the name of the author, the date and time of
176 creation of the file, and sometimes even parts of the editing history of the
177 fileā¦ those hidden data depend on the file format and the software used. Please note also, that the Subject: as well as the rest of the header lines of your OpenPGP encrypted e-mail messages are not encrypted. This is not a bug of Tails or the [OpenPGP](http://www.mozilla-enigmail.org/forum/viewtopic.php?f=3&t=328) protocol; it's for backwards compatibility with the original SMTP protocol. Unfortunately no RFC standard exists yet for Subject encryption.
179 Images file formats, like TIFF of JPEG, probably take the prize in this field.
180 Those files, created by digital cameras or mobile phones, contain a metadata
181 format called EXIF which can include the date, time and sometimes the GPS
182 coordinates of the picture, the brand and serial number of the device which took
183 it as well as a thumbnail of the original image. Image processing software tend
184 to keep those data intact. Internet is full of cropped or blurred images for
185 which the EXIF thumbnail still contains the full original picture.
187 **Tails doesn't clear the metadata of your files for you**. Yet. Still it's in
188 Tails' design goal to help you do that. For example, Tails already comes with
189 the [Metadata anonymisation toolkit](https://mat.boum.org/).
191 Tor doesn't protect you from a global adversary
192 ===============================================
194 A global passive adversary would be a person or an entity able to monitor at the
195 same time the traffic between all the computers in a network. By studying, for
196 example, the timing and volume patterns of the different communications across
197 the network, it would be statistically possible to identify Tor circuits and
198 thus matching Tor users and destination servers.
200 It is part of Tor's initial trade-off not to address such a threat in order to
201 create a low-latency communication service usable for web browsing, Internet
202 chat or SSH connections.
204 For more expert information see [Tor Project: The Second-Generation Onion
205 Router](https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf),
206 part 3. Design goals and assumptions.
208 <a id="identities"></a>
210 Tails doesn't magically separate your different contextual identities
211 =====================================================================
213 It is usually not advisable to use the same Tails session to perform two tasks
214 or endorse two contextual identities that you really want to keep separate
215 from another. For example hiding your location to check your email and
216 publishing anonymously a document.
218 First, because Tor tends to reuse the same circuits, for example amongst a same
219 browsing session. Since the exit node of a circuit knows both the destination
220 server (and possibly the content of the communication if not encrypted) and the
221 address of the previous relay it received the communication from, it makes it
222 easier to correlate the several browsing requests as part of a same circuit and
223 possibly made by a same user. If you are facing a global adversary as described
224 above, it might then also be in position to do this correlation.
226 Second, in case of a security hole or a misuse in using Tails or one of its
227 application, information about your session could be leaked. That could reveal
228 that the same person was behind the various actions made during the session.
230 **The solution to both threats is to shutdown and restart Tails** every time
231 you're using a new identity, if you really want to isolate them better.
233 As explained in our documentation about [[Vidalia|anonymous_internet/vidalia#new_identity]]
234 and [[Tor Browser|anonymous_internet/Tor_Browser#new_identity]],
235 their **New identity** features are not perfect solutions to separate
236 different contextual identities. **Shutdown and restart Tails
239 Tails doesn't make your crappy passwords stronger
240 =================================================
242 Tor allows you to be anonymous online; Tails allows you to leave no trace on the
243 computer you're using. But again, **neither of both are magic spells for computer
246 If you use weak passwords, they can be guessed by brute-force attacks with or
247 without Tails in the same way. To know if your passwords are weak and learn good
248 practices to create better password, you can read [[!wikipedia
249 Weak_password#Examples_of_weak_passwords desc="Wikipedia: Weak Passwords"]].
251 Tails is a work in progress
252 ===========================
254 Tails, as well as all the software it includes, are on continuous development
255 and might contain programming errors or security holes. [[Stay
256 tuned|download#stay_tuned]] to Tails development.