Hi,
I have been looking for information on Intrusion detection systems (or
similar) used in secure OS like Tails and others, without much success.
Aren't them been used? If that is the case what might be the reason?
I could imagine that using some system to monitor "anomalous" stuff in
the file s
We should start writing the monthly report for last month.
A blueprint with the current report, who volunteered to curate it, and
tips on how to fill it can be found on:
https://tails.boum.org/blueprint/monthly_report/
But *you* should make sure that the cool stuff that *you* did will be