Is there any currently supported way of making your security slider for TBB in tails persistent? The fact that it defaults to allowing JS in fucking tails, an entire OS designed around security and anonymity is completely retarded. Are there are decent alternatives to tails if there's no simple way of forcing it to default to blocking JS?
Plenty of people have asked this on various forums before. There's even a 3 year old ticket for it to be changed. Apparently one of the worlds most renowned security focused operating systems is developed by people who are perfectly fine with people forgetting to switch off niggerscript being one of the single biggest points of failure and leaving it the way it is. At this point I'm convinced tails is just a honeypot designed to lure people into a false sense of security so they will inevitably forget to turn off niggerscript on one of the hundreds of times they run the OS so they can then leak their IP. There is literally no other reason it would be on by default with no way to create a persistent security slider. The funniest part is that the homepage they force you to load runs niggerscript too, so if they are compromised your IP is leaked before you even have a chance to manually change the security slider.
>>1558 >The funniest part is that the homepage they force you to load runs niggerscript too, so if they are compromised your IP is leaked before you even have a chance to manually change the security slider.
You can change the security slider offline and then reconnect.
>>1558 It was cute seeing how Tails niggered the TorBrowser's default homepage. As soon as you start TB it notifies the cianiggers that you're online first thing.
Sure maybe I'm paranoid but I thought the whole shtick was not standing out. So you got to wonder: if they customized the browser homepage, who knows what else they customized that could be fingerprintable?
another problem with Tails is that it uses different entry node every time you use it
>Are there are decent alternatives to tails if there's no simple way of forcing it to default to blocking JS?
https://whonix.org difference is that whonix does not delete any data inside. but you can achieve that effect by cloning whonix VM, then doing something inside it, then nuking it
also whonix is isolated (you run two VMs) but Tails only prevents clearnet requests with some shit firewall
in Whonix you can make clearnet requests and they go through Tor
>>1556 Check under persistence tweaks. Some tweaks are old and don't work with the newest Tails. The browser persistence should still work AFAIK. Use tweaks at your own risk.
https://www.reddit.com/r/tailswiki/wiki/index
>>1812 Linking to Reddit isn't the same as endorsing or using it, and sadly some people use it as the only main place for discussion.
>09:33:33
Nice Masonic dubs.
>>1814 >Linking to Reddit isn't the same as using it
that is exactly what you have done when you link to reddit, you have used it and are telling people to use it.
Tails is a piece of shit, it fails to randomize my MAC address on startup and uses uBlock Origin on their Tor browser which isn't present in the standalone TBB. Stay far away from it.
>>1893 >uses uBlock Origin on their Tor browser
The default Tor Browser should do this though, out of the box uBlock Origin works quite well and blocks most trackers and advertisements, and it has millions of users using it daily so any problem with the block-lists will be fixed quite quickly.
I'm using uBlock Origin with Tor Browser... not sure if smart but I don't really care either because I consider it quite unlikely that a 1st-party server will know whether or not I fetched some resource from a 3rd-party server (with Javascript disabled)
>Tails
have used it in the past but I consider it a bloated piece of shit (mostly due to GNOME and systemd) and some other reason I can't quite remember.
>>1558 >There is literally no other reason...
You are forgetting incompetence, lack of interest, and petty infighting.
>>1895 Using an adblocker makes fingerprinting trivial, especially as different visitors are served slightly different ads.
>>1901 >different visitors are served slightly different ads
Well when I visit 8chan for example, there's no reason to fetch all embeds as well (by default Tor Browser sends the HTTP referrer with it as well) since 8chan won't know whether you loaded a YouTube embed or not... or will it?
>since 8chan won't know whether you loaded a YouTube embed or not... or will it?
Anything that takes space on the screen or moves other elements around can be detected, in theory.
Detecting viewport and window size is especially easy, and can be used to identify people with non-standard scrollbar widths among other things, detecting single elements within the page is trickier but very much possible.
Not running js will help, but it's not foolproof as I remember a pure CSS example for viewport side.
>>1911 I've seen one image hosting site that was able to detect whether I had viewed the tab or not without Javascript, I'll try to find out what method was used.
>>1913 >I've seen one image hosting site that was able to detect whether I had viewed the tab or not without Javascript, I'll try to find out what method was used.
what ?
it can detect it extremely simply, just add a javascript code that will send signal "javascript"
if someone visit the page but signal "javascript" doesn't arrive within some second, mark user as no-javascript
or when there is a html form, you can put hidden element inside <noscript> tag
Is there any currently supported way of making your security slider for TBB in tails persistent? The fact that it defaults to allowing JS in fucking tails, an entire OS designed around security and anonymity is completely retarded. Are there are decent alternatives to tails if there's no simple way of forcing it to default to blocking JS?