Hi,
I'm quite new to tails but I did some tests, to help answer your
questions. I use tails 2.4.

1.) While the gnome shutdown menu has only the power down and reset
functionality, you could invoke suspend from command line. But at my
system it does nothing. According to https://wiki.debian.org/Suspend
you can disable suspend and hibernate at system level with
sudo systemctl mask sleep.target suspend.target hibernate.target
hybrid-sleep.target.
I'm not sure, why suspend doesn't work at my system. Strangely I
couldn't find a binary with that name. Has someone other experiences?

2.) I couldn't find any traces of syslog in /var/log. The existing logs
don't contain any informations on connections either and I see no reason
to do so. Even my standard debian doesn't do that with tor.
I'm not sure if I understand the post translated with google correctly.
There a two possibilities to connect a VPN and tor.
a) You connect to tor through a VPN. Then your ISP isn't able to detect,
that you use tor. And you don't have to trust that VPN.
b) You connect to a VPN through tor. Then you don't have to trust the
tor exit node. But you have to trust the VPN service provider, if you
have to create an account.
So there is a possibility that Mr. 0chiaki leaked information about him
through a VPN account.
I couldn't really understand, what he did with twitter. But there is
also the chance to connect your activities and person with postings. In
the past people were uncovered because they mixed identities at some
time.
It seems he was caught with a PC running Tails. So they didn't need logs
to see what he did right at the moment.
But thats all speculation, because the translation from google is not
that good and it is a story from someone who has heard something
somewhere.
Further material would be appreciated.

3.) It's an old issue of security products, that try to protect the user
from unlawful surveillance. It's the same with encryption or tor. Sadly
you can't prevent that the bad guys use these too. Nevertheless they are
needed to protect the rights of many people around the world and it is
important too help them.

Kind regards,
 Ulrich

Am Donnerstag, den 14.07.2016, 08:47 +0000 schrieb Unknown:
> 1. Can I put Tails to sleep, like Windows(for fastboot)?
> 2. Does Tails save connection log to syslog?
> According to this blog[1], Tails user was arrested from syslog log.
> 3. As a Tails developer, I would like to hear what do you think
> about "criminals" like this[1] who use Tails against your wish.
> 
> [1] https://archive.is/fW7co (need Google Translate)
> _______________________________________________
> tails-support mailing list
> [email protected]
> https://mailman.boum.org/listinfo/tails-support
> To unsubscribe from this list, send an empty email to 
> [email protected].

-- 

Diese Nachricht wurde mittels GNU Privacy Guard (GPG) signiert. Um die
Signatur dieser Nachricht auf Korrektheit zu überprüfen, benötigen Sie
meinen öffentlichen GPG Schlüssel.
Mit diesem können Sie auch    verschlüsselte    Nachrichten an mich
senden.
Mein Schlüssel mit der ID BB50A3F1 kann von folgendem Schlüsselserver
geladen werden:
hkp://keys.gnupg.net

Eine umfassende Anleitung zur Verwendung von GPG finden Sie hier:
https://gnupg.org/howtos/de/index.html

Warum Verschlüsselung und Signaturen für Mails sinnvoll sind?
Bruce Schneier, international bekannter Autor zum Thema IT-Sicherheit,
hat es in einem Essay gut zusammengefasst, welches hier in der Übersetzung zu 
finden ist:
https://netzpolitik.org/2015/bruce-schneier-warum-wir-verschluesseln/

Weitere Tipps der Electronic Frontier Foundation:
https://www.ifightsurveillance.org/


_______________________________________________
tails-support mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-support
To unsubscribe from this list, send an empty email to 
[email protected].

Reply via email to