Tails на русском скачать

      Комментарии к записи Tails на русском скачать отключены

Уважаемый гость, на данной странице Вам доступен материал по теме: Tails на русском скачать. Скачивание возможно на компьютер и телефон через торрент, а также сервер загрузок по ссылке ниже. Рекомендуем также другие статьи из категории «Бланки».

Tails на русском скачать.rar
Закачек 1692
Средняя скорость 3394 Kb/s

Tails на русском скачать

Новое в версии 3.7 (09.05.2018)

Системные требования

  • CD/DVD-привод или возможность загрузки с помощью USB-флешки или SD-карты.
  • 64-bit (x86-64) совместимый процессор, IBM PC совместимый
  • 2 ГБ оперативной памяти для беспроблемной работы

Подробное описание

Tails — система, ранее известная как Incognito Live CD/USB, поддерживает только live загрузку с носителей и обеспечивает пользователей идеальной средой для анонимного серфинга в Интернете.

Система основана на дистрибутиве Debian GNU/Linux и использует технологии Tor.

Распространяется как 64-битный Live CD

Tails (сокр. от “The Amnesic Incognito Live System”) является дистрибутивом Linux с открытым исходным кодом, распространяемым как отдельный единичный Live CD ISO-образ, который поддерживает 64-битную архитектуру набора инструкции. Tails может быть развернут на SD карте, USB-устройстве флеш-памяти или CD/DVD диске.

Опции загрузки

Загрузочный носитель предоставляет две опции загрузки — запустить среду со стандартными параметрами или в безопасном режиме (в случае, если первая опция не работает корректно). При нажатии клавиши Enter на первом варианте начнется запуск загрузочного окружения.

Пользователей будет приветствовать сообщение, которое позволяет авторизоваться для live-сессии или поменять различные другие опции, например, добавить пароль для root (системного администратора), сделать маскировку под Windows XP или подделать Mac адреса.

Кроме того, Вы можете выбрать прямое подключение к сети Tor (по умолчанию) или настроить мост, фаервол или прокси-сервер для цензурируемого или фильтруемого Интернет-подключения.

Все данные сеанса зашифровываются

При использовании Tails, все передаваемые в течение сессии данные зашифровываются и обезличиваются с помощью сети Tor, никакие следы активности на хост-компьютере не остаются, если Вы не настроите Tails иначе. Система использует современные криптографические технологии с открытым исходным кодом для шифрования всех данных сеанса, включая сообщения сообщения электронной почты, переписку в клиентах мгновенного обмена сообщениями, а также персональные файлы.

Использует графическую оболочку GNOME и популярные открытые приложения

Live-сессия включает традиционный рабочий стол GNOME с установленными известными приложениями с открытым исходным кодом, в частности LibreOffice, веб-браузер Tor Browser, почтовый клиент IceDOve, просмотрщик новостных лент Liferea, клиент мгновенного обмена сообщениями Pidgin, редактор изображений GIMP, векторный графический редактор Inkscape, аудиоредактор Audacity, видеоредактор PiTiVi и другие приложения.

Direct download

1. 1 Download Tails

1. 2 Verify your download using your browser

For your security,
always verify your download!

With an unverified download, you might:

  • Lose time if your download is incomplete or broken due to an error during the download. This is quite frequent.
  • Get hacked while using Tails if our download mirrors have been compromised and are serving malicious downloads.
    This already happened to other operating systems.
  • Get hacked while using Tails if your download is modified on the fly by an attacker on the network.
    This is possible for strong adversaries.

Our browser extension makes it quick and easy.

Our browser extension is broken in Tails 3.6 and 3.6.1. Please use it from Firefox, Chrome, or Tor Browser outside of Tails.

You seem to have JavaScript disabled. To use our browser extension, please allow all this page:

Your extension is an older version.

Tails Verification extension installed!

Verify Tails 3.7 …

Most likely, the verification failed because of an error or interruption during the download.

The verification also fails if you try to verify a different download than the latest version ( 3.7 ).

Less likely, the verification might have failed because of a malicious download from our download mirrors or due to a network attack in your country or local network.

Downloading again is usually enough to fix this problem.

Verification failed again!

The verification might have failed again because of:

  • A software problem in our verification extension
  • A malicious download from our download mirrors
  • A network attack in your country or local network

Trying from a different place or a different computer might solve any of these issues.

Please try to download again from a different place or a different computer…

1. 3 Continue installing upgrading installing or upgrading

You are using $DETECTED-BROWSER .

Direct download is only available for:

  • Firefox $MINVER-FIREFOX and later (Download)
  • Chrome $MINVER-CHROME and later (Download)
  • Tor Browser $MINVER-TOR-BROWSER and later (Download)

Please update your browser to the latest version.

For your security,
always verify your download!

With an unverified download, you might:

  • Lose time if your download is incomplete or broken due to an error during the download. This is quite frequent.
  • Get hacked while using Tails if our download mirrors have been compromised and are serving malicious downloads.
    This already happened to other operating systems.
  • Get hacked while using Tails if your download is modified on the fly by an attacker on the network.
    This is possible for strong adversaries.

Our browser extension for Firefox, Chrome, and Tor Browser makes this quick and easy.

Copy and paste this link in Firefox, Chrome, or Tor Browser:

BitTorrent download

BitTorrent is a peer-to-peer technology for file sharing that makes your download faster and easier to resume.

You need to install BitTorrent software on your computer, like Transmission (for Windows, macOS, and Linux).

BitTorrent doesn’t work over Tor or in Tails.

1. 1 Download Tails (Torrent file)

1. 2 Verify your download using BitTorrent

Your BitTorrent client will automatically verify your download when it is complete.

1. 3 Continue installing upgrading installing or upgrading

Open and download the Torrent file with your BitTorrent client. It contains the Tails 3.7 ISO image that you will use in the next step.

Verify using OpenPGP (optional)

If you know OpenPGP, you can also verify your download using an OpenPGP signature instead of, or in addition to, our browser extension or BitTorrent.

Download the Tails 3.7 OpenPGP signature and save it to the same folder where you saved the ISO image.

Basic OpenPGP verification

This section provides simplified instructions:

In Windows with Gpg4win

Verify that the date of the signature is at most five days earlier than the latest version: 2018-05-09.

If the following warning appears:

Then the ISO image is still correct according to the signing key that you downloaded. To remove this warning you need to authenticate the signing key through the OpenPGP Web of Trust.

In macOS using GPGTools

  1. Open Finder and navigate to the folder where you saved the ISO image and the signature.
  2. Right-click on the ISO image and choose Services ▸ OpenPGP: Verify Signature of File .
  1. Open the file browser and navigate to the folder where you saved the ISO image and the signature.
  2. Right-click on the signature and choose Open With Verify Signature .
  3. The verification of the ISO image starts automatically:

  • After the verification finishes, you should see a notification that the signature is good:

    Verify that the date of the signature is at most five days earlier than the latest version: 2018-05-09.

    Using the command line

    1. Open a terminal and navigate to the folder where you saved the ISO image and the signature.

    gpg —no-options —keyid-format 0xlong —verify tails-amd64-3.7.iso.sig tails-amd64-3.7.iso

    The output of this command should be the following:

    gpg: Signature made 2018-05-08T01:18:06 UTC
    gpg: using RSA key 2FAF9BA0D65BB371F0BC2D463020A7A9C2B72733
    gpg: Good signature from «Tails developers » [undefined]
    gpg: aka «Tails developers (offline long-term identity key) » [full]

    Verify that the date of the signature is at most five days earlier than the latest version: 2018-05-09.

    If the output also includes:

    gpg: WARNING: This key is not certified with a trusted signature!
    gpg: There is no indication that the signature belongs to the owner.

    Then the ISO image is still correct according to the signing key that you downloaded. To remove this warning you need to authenticate the signing key through the OpenPGP Web of Trust.

    Authenticate the signing key through the OpenPGP Web of Trust

    Authenticating our signing key through the OpenPGP Web of Trust is the only way that you can be protected in case our website is compromised or if you are a victim of a man-in-the-middle attack. However, it is complicated to do and it might not be possible for everyone because it relies on trust relationships between individuals.

    The verification techniques that we present (browser extension, BitTorrent, or OpenPGP verification) all rely on some information being securely downloaded using HTTPS from our website:

    • The checksum for the Firefox extension
    • The Torrent file for BitTorrent
    • The Tails signing key for OpenPGP verification

    It is possible that you could download malicious information if our website is compromised or if you are a victim of a man-in-the-middle attack.

    OpenPGP verification is the only technique that protects you if our website is compromised or if you are a victim of a man-in-the-middle attack. But, for that you need to authenticate the Tails signing key through the OpenPGP Web of Trust.

    If you are verifying an ISO image from inside Tails, for example, to do a manual upgrade, then you already have the Tails signing key. You can trust this signing key as much as you already trust your Tails installation since this signing key is included in your Tails installation.

    One of the inherent problems of standard HTTPS is that the trust put in a website is defined by certificate authorities: a hierarchical and closed set of companies and governmental institutions approved by your web browser vendor. This model of trust has long been criticized and proved several times to be vulnerable to attacks as explained on our warning page.

    We believe that, instead, users should be given the final say when trusting a website, and that designation of trust should be done on the basis of human interactions.

    The OpenPGP Web of Trust is a decentralized trust model based on OpenPGP keys that can help with solving this problem. Let’s see this with an example:

    1. You are friends with Alice and you really trust her way of making sure that OpenPGP keys actually belong to their owners.
    2. Alice met Bob, a Tails developer, in a conference and certified Bob’s key as actually belonging to Bob.
    3. Bob is a Tails developer who directly owns the Tails signing key. So, Bob has certified the Tails signing key as actually belonging to Tails.

    In this scenario, you found, through Alice and Bob, a path to trust the Tails signing key without the need to rely on certificate authorities.

    If you are on Debian, Ubuntu, or Linux Mint, you can install the debian-keyring package which contains the OpenPGP keys of all Debian developers. Some Debian developers have certified the Tails signing key and you can use these certifications to build a trust path. This technique is explained in detail in our instructions on installing Tails from Debian, Ubuntu, or Linux Mint using the command line.

    Relying on the Web of Trust requires both caution and intelligent supervision by the users. The technical details are outside of the scope of this document.

    Since the Web of Trust is based on actual human relationships and real-life interactions, it is best to get in touch with people knowledgeable about OpenPGP and build trust relationships in order to find your own trust path to the Tails signing key.

    For example, you can start by contacting a local Linux User Group, an organization offering Tails training, or other Tails enthusiasts near you and exchange about their OpenPGP practices.

    After you build a trust path, you can certify the Tails signing key by signing it with your own key to get rid of some warnings during the verification process.


    Статьи по теме