Hi,

It is so great to see discussions like this.

Unfortunately the tails bootloader signature changes every install, and the
upgrade process is a little not consistent between upgrade paths, so
cryptographic verification can be more complex than it needs to be.

What do you think of some kind of usb sniffing to help deal with such an
issue?
On Aug 27, 2014 7:31 AM, "mercedes508" <[email protected]> wrote:

> Hi,
>
> > I was wondering how to tell if your usb's firmware has been modified
> > by malicious malware/trojans and what effect would this have on
> > tails? Could the malware phone home bypassing Tor without necessarily
> > having to be made for tails? And if this malware was designed to
> > infect tails, how could one integrity check tails system files to
> > make sure nothing critical was modified?
>
> Actually it is hard to tell anything about such complex and generally
> kept-secret possibilities.
>
> But unfortunately, you can do a cryptographic verification once it's
> installed.
>
> Cheers.
> _______________________________________________
> tails-support mailing list
> [email protected]
> https://mailman.boum.org/listinfo/tails-support
> To unsubscribe from this list, send an empty email to
> [email protected].
>
_______________________________________________
tails-support mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-support
To unsubscribe from this list, send an empty email to 
[email protected].

Reply via email to