Hi, > > intrigeri: > the message that "plugging one's Tails > device in an untrusted OS is dangerous" >
I respect this intention but struggle to see how the trust verification functions when equipped with only a warning; trust is hard to determine, especially up front, even if you "own" the machine. > > good enough > Don't let me bottleneck any development with philos. > > what problem these proposals > are tackling? > The same as this: > > detecting the presence of .DS_Store > files and friends > i.e., trusting the device. A use case could be: I see occupied bits on a USB stick I intend to use as a Tails device; I am concerned. I would like to recover this space but am unsure if reformatting is effective; it turns out extended partitions can go untouched during reformatting. I reformat. I still see the occupied bits; I am further concerned, specifically that my device has been pwnd by a powerful adversary. I wish there was a tool for this. - - - There is but should Tails provide the same service; probably not. However, if there is a potential Tails device integrity check tool, it could provide a complete service and visualize the partition table in some way; text is plenty. No worries (: Wordlife, Spencer _______________________________________________ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to tails-dev-unsubscr...@boum.org.