hello, ho cani deactivate the email from your support staff?

i just wanted to know how to use tails but no one has ever helped me so im
not intrested in pther issues

2016-03-20 11:20 GMT+00:00 Bill Dumke <[email protected]>:

> I am not a member of the Tails support group, however I have used Tails in
> the past
>
> Your questions seem to be of the form, "Can a cow jump over the moon?".
> While there is an finite probablility that it could.
> That probability is infinitesimal, so it is usually considered impossible.
>
> When I have used Tails in the past it has worked for me although with a
> steep learning curve
> since there is little documentation for new comers.
>
> The biggest complaint I had about using tails is that many of the servers
> in the system are very
>  slow, and your throughput speed is limited by the slowest server.
>
> Also videos could not be viewed directly but had to be downloaded first
> and then run after downloading.
>
> Other than that it did work with the above limitations.
>
> Bill
>
>
>
> On 3/18/2016 11:40 AM, john smith wrote:
>
>> These questions are addressed to the Tails Team. Everyone is welcome to
>> discuss, but I am particularly interested in the devs' opinions, so if
>> you are a member of the Tails Team replying to these questions, please
>> identify yourself as such.
>>
>> These questions were originally posted in private support lists. First
>> in [email protected] on 2016-02-24, but no reply of any
>> kind was given. They were then posted in [email protected] on 2016-03-06,
>> and no reply of any kind was given. Now I am using this public list on
>> the assumption that my prior attempts simply did not reach any Tails
>> Team members. Each time I edit the questions for clarity, but they
>> remain essentially the same.
>>
>> -------------------------------------------------------------------
>>
>> Dear Tails team,
>>
>>
>> I really hope you will take time to think about my questions, since I
>> cannot be the only one asking them. I am rather convinced that many of
>> your users are wondering about these things as well. I sincerely hope
>> that nothing in this email will be perceived as offensive or
>> disrespectful, and that includes my tone. Whatever comes next, I am
>> personally grateful to you for your ongoing effort to build an operating
>> system tailored to provide its users with elevated levels of privacy and
>> security.
>>
>> -------------------------------------------------------------------
>>
>> What do you think are the chances that Tails distributes malware along
>> with the Linux kernel? Before you answer, please consider the following
>> points.
>>
>> Linux kernel contains megabytes of just the closed source network card
>> firmware, which would not need any access to a main CPU in order to be
>> effective spyware. It also contains many more megabytes of other
>> firmware, and all of that code is actually capable of gaining the access
>> to the main RAM and the main CPU via the DMA mechanism.
>> http://www.stewin.org/papers/dimvap15-stewin.pdf
>>
>> Any closed source firmware distributor can insert spyware and/or
>> backdoors at any time, virtually without consequences, do you agree? The
>> examples are many, so let's take one of the most recent ones, involving
>> Juniper Networks. They basically declared themselves heroes after
>> removing a backdoor, which they themselves were in the best position to
>> insert. They faced no repercussions of legal nature.
>>
>> In general, the "respected" software vendors can't get arrested in this
>> town. Starting with SONY rootkit case, and to this day, the law
>> enforcement seems to be just fine with computer crimes of absolutely any
>> magnitude, as long as they are committed by large corporations, rather
>> than individual basement-dwellers. The law enforcement is also openly
>> warm towards the firms which are willing to work with them on making a
>> panopticon society a reality by depriving all computer users of privacy
>> and security.
>>
>> In this legal climate, no "respected" network card manufacturer would
>> get in trouble if malware was suddenly discovered inside a
>> reverse-engineered blob, do you agree? Big firms have done so in the
>> past, every single time. They could get away with any of the following
>> excuses:
>>
>> (1) We were compelled by law enforcement
>> (2) We were cracked by Russian/Jewish/Chinese/Iranian/... criminals
>> (3) We were sabotaged by an employee we are now unable to id
>> (4) It's a feature inserted in good faith, never meant to be abused
>>
>> (The last one is my absolute favorite :)
>>
>> At any rate, they would just issue a "fixed" blob, just like Juniper.
>> Scary quotes because there would be no way to see whether a "fixed" blob
>> contains malware. So here's another sub-question: in this hypothetical
>> situation, and if the blob was OKayed by the Linux project, would you
>> then redistribute the "fixed" blob too?
>>
>> Of course, it is far more likely they'll never have to explain anything,
>> as long as the malware is well designed.
>>
>> So once again, the biggest question I have is:
>>
>> How would you quantify the chances of you currently redistributing
>> malware, and more specifically spyware along with the Linux kernel?
>>
>> -------------------------------------------------------------------
>>
>> Here is a related question, Tails claims:
>>
>>
>> Tails is a live system that aims to preserve your privacy and
>> anonymity.
>>
>> How is this claim compatible with distributing the absolute mystery
>> code, which runs within users' network cards? To be more specific, what
>> is the point of supporting network interfaces and other peripherals,
>> when each one of them offers an unprecedented attack surface, virtually
>> rendering all of your privacy-related achievements worthless?
>>
>> -------------------------------------------------------------------
>>
>> My final barrage of questions concerns your claims about free software.
>> Your front page claims with really big letters:
>>
>>
>> FREE SOFTWARE Tails is Free Software.
>>
>> Your statements on a linked page seem to directly contradict each other:
>>
>>
>> Tails is Free Software released under the GNU/GPL (version 3 or
>> above).
>>
>> However, Tails includes non-free firmware in order to work on as much
>> hardware as possible.
>>
>> What do you mean by "free software"? It cannot possibly be what FSF
>> calls "free software", or what OSI calls "open source software", since
>> what you call "firmware" is software in every sense of the word, and you
>> admit you distribute non-free firmware as a part of Tails.
>>
>> Are you claiming that firmware is not software, even though it runs on
>> users' CPU and RAM (albeit auxiliary ones)?
>>
>> The first one of these statements, "Tails is Free Software...", links to
>> an FSF page, implying that here you use the term "free software" in the
>> same sense as they do, and yet FSF does not consider Tails to be free
>> software, a fact you must be aware of:
>>
>> [ http://www.gnu.org/distros/common-distros.en.html ]
>>
>> How would you characterize your statement "Tails is Free Software"? An
>> honest mistake, a defiant lie, or something else entirely?
>> _______________________________________________
>> tails-support mailing list
>> [email protected]
>> https://mailman.boum.org/listinfo/tails-support
>> To unsubscribe from this list, send an empty email to
>> [email protected].
>>
>>
> _______________________________________________
> tails-support mailing list
> [email protected]
> https://mailman.boum.org/listinfo/tails-support
> To unsubscribe from this list, send an empty email to
> [email protected].
>
_______________________________________________
tails-support mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-support
To unsubscribe from this list, send an empty email to 
[email protected].

Reply via email to