Delivery-Date: Wed, 11 Jun 2014 11:26:39 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by moria.seul.org (Postfix) with ESMTPS id BA3D31E09F1
	for <archiver@seul.org>; Wed, 11 Jun 2014 11:26:36 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id BAFE52EBB6;
	Wed, 11 Jun 2014 15:26:34 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id C2DD22FAA2
 for <tor-talk@lists.torproject.org>; Wed, 11 Jun 2014 15:11:55 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id q81l8l-lwfDx for <tor-talk@lists.torproject.org>;
 Wed, 11 Jun 2014 15:11:55 +0000 (UTC)
Received: from mail.privatdemail.net (mail.privatdemail.net [217.139.17.156])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256
 bits)) (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 40FFA2F4DD
 for <tor-talk@lists.torproject.org>; Wed, 11 Jun 2014 15:11:55 +0000 (UTC)
Received: from localhost (mail.privatdemail.net [127.0.0.1])
 by mail.privatdemail.net (Postfix) with ESMTP id 4AAE923BA7
 for <tor-talk@lists.torproject.org>; Wed, 11 Jun 2014 16:32:57 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=privatdemail.net;
 h=content-type:content-type:in-reply-to:references:subject
 :subject:mime-version:user-agent:from:from:date:date:message-id;
 s=pdm200902; t=1402497176; x=1404311577; bh=8nnC1f6Ik9NoHoVHGTy
 oN8EJG/taKgjNW0SR3XuCywc=; b=j8FJfAhHL7htDx15dK1xiS2EWdeyGItFg8v
 oI8c5sJKAWgwmdJpR8KhzBrHMv/DHLpuTBfu9J4iAODVS+9AuYh0V5WNN+lFcle5
 ZQp/mqkwZAIoov7UQfWbQRDVfZSkLmXdFdrkTpklx6QcQBPZLseJuoifk3wuIfxl
 Tg37UuqI=
X-Virus-Scanned: Debian amavisd-new at mail.privatdemail.net
Received: from mail.privatdemail.net ([127.0.0.1])
 by localhost (mail.privatdemail.net [127.0.0.1]) (amavisd-new, port 10026)
 with ESMTP id pDzsOdfSAkLV for <tor-talk@lists.torproject.org>;
 Wed, 11 Jun 2014 16:32:56 +0200 (CEST)
Message-ID: <53986896.8060702@privatdemail.net>
Date: Wed, 11 Jun 2014 16:32:54 +0200
From: Rick Ross <rickross@privatdemail.net>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9;
 rv:24.0) Gecko/20100101 Thunderbird/24.5.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <53974AA4.2030302@gmail.com> <539782CD.4000202@cyblings.on.ca>
 <539811E4.9040106@gmail.com> <5398457A.7090503@cyblings.on.ca>
In-Reply-To: <5398457A.7090503@cyblings.on.ca>
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: Re: [tor-talk] Tor Jumphost
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

How about just using Tails without persistence and asking users to
reboot every time they are done?

Am 11.06.14 14:03, schrieb krishna e bera:
> On 14-06-11 04:23 AM, Wayland Morgan wrote:
>>> 4) you trust the users ?
>>>
>>> 5) you trust the websites they will visit ?
>> Yes. I don't really want or need to know what sites they will be
>> visiting and nightly rebuilds are a major success factor IMO with
>> regards to this implementation. If I go the Windows route, I'd like put
>> some restrictions in place in terms of TBB being the only choice of
>> browser on the machine as well as restrict administrative activity to
>> myself.
>>
>> Have you or anyone else tried something like this?
> I havent tried RDP access but have helped other organizations such as
> internet caf=E9s and NGO service providers with public internet access.
> There used to be cards you could insert into the pc that would reload
> the system to an image on reboot.  Microsoft's Windows Steady State (a
> software-based solution) wasnt immune to viruses, nor was system
> restore.  For Tor users and their typically stricter privacy/security
> requirements, once a day may not be enough - every session could be a
> clean start.  Check your threat model etc...
>
>
>


-- =

tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

