Return to Video

ftp.acc.umu.se/.../Tails_a_technical_overview.webm

  • 0:04 - 0:07
    Hello, Thank you for coming
  • 0:07 - 0:14
    We're gonna give a talk about and
    gonna give a technical overview of Tails.
  • 0:16 - 0:20
    That's kurono, intrigeri
    and I am BitingBird.
  • 0:30 - 0:35
    We are all Tails contributors
    in different fields.
  • 0:38 - 0:42
    I don't do technical things,
  • 0:42 - 0:48
    intrigeri is one of the
    oldest tails contributors
  • 0:48 - 0:54
    and kurono contributes
    since two years now.
  • 0:56 - 1:02
    Tails is the acronym of
    The Amnesic Incognito Live System
  • 1:02 - 1:07
    And here is the nice url,
    where you can have all the information.
  • 1:09 - 1:11
    It's a live operating system.
  • 1:11 - 1:15
    It works on almost any computer -
    except ARM
  • 1:16 - 1:21
    And it boots from a dvd or a usb stick
  • 1:21 - 1:25
    and theoretically from sdcard too,
    but it doesn't work very well.
  • 1:29 - 1:35
    The focus of our distribution
    is privacy and anonymity.
  • 1:35 - 1:40
    It allows the user
    to use the internet anonymously.
  • 1:43 - 1:47
    And also, when there is censorship,
    to circumvent it.
  • 1:49 - 1:52
    All the connections to
    the internet go with tor,
  • 1:52 - 1:56
    which is an anonymization network.
  • 1:58 - 2:02
    That's the first big feature of tails.
  • 2:02 - 2:04
    And the second one is
  • 2:04 - 2:06
    that there is no trace
    on the computer you are using
  • 2:06 - 2:14
    so after you used it nobody can see
    that you've used the computer.
  • 2:16 - 2:21
    If somebody would grab your computer
    and search files
  • 2:21 - 2:24
    they would not know,
    what you have done.
  • 2:25 - 2:29
    Unless you ask for it explicitly
  • 2:30 - 2:37
    We have also a lot of data producing tools
  • 2:38 - 2:48
    because some users use it to write books,
    articles, video and such things.
  • 2:49 - 2:54
    They want to be able to create such documents without being traced.
  • 2:58 - 3:02
    Does it work ?
  • 3:02 - 3:05
    We have a very good report,
  • 3:05 - 3:07
    not from our users,
  • 3:07 - 3:12
    actually from the people
    we are supposed to protect them against.
  • 3:12 - 3:16
    The NSA says, that it's a pain in the ass.
  • 3:16 - 3:23
    When the NSA says
    you're making their life harder
  • 3:23 - 3:26
    somehow you're doing something right.
  • 3:26 - 3:31
    [klapping, laughing]
  • 3:32 - 3:37
    I guess you can imagine who's
    the famous tails user
  • 3:37 - 3:42
    who gave us access to the documents where
    they say that
  • 3:43 - 3:49
    There is also Bruce Schneier
    who says he uses Tails
  • 3:49 - 3:54
    so, not bad.
  • 3:55 - 3:57
    So, what are our goals?
  • 3:57 - 4:02
    We took a stance in the beginning of Tails
  • 4:02 - 4:05
    that it was not really common back then
  • 4:05 - 4:08
    to have usability as a security feature
  • 4:08 - 4:14
    because "ubergeeks" where already able
    to have secure communication.
  • 4:15 - 4:19
    The thing is privacy
    is not an individual matter.
  • 4:19 - 4:20
    It's a collective matter.
  • 4:20 - 4:23
    Everybody needs to have privacy
  • 4:23 - 4:33
    and new users and non geek users
    had no way to get access to this.
  • 4:33 - 4:37
    The tools existed but they had
    no user interface
  • 4:37 - 4:40
    or they where really hard to configure.
  • 4:40 - 4:46
    So, we designed a system that gives
    a quite good level of security
  • 4:46 - 4:49
    with a quite good level of usability.
  • 4:49 - 4:55
    Lots of the time people ask us, why we
    don't include more security features.
  • 4:55 - 4:59
    We have to make a balance between security and usability.
  • 4:59 - 5:02
    Because if it's really secure
    but nobody can use it
  • 5:02 - 5:06
    then it doesn't bring anything.
  • 5:06 - 5:10
    It makes security accessible
    for most people.
  • 5:12 - 5:16
    Another important point in our project
  • 5:16 - 5:20
    is to have a very small delta
    to our upstream.
  • 5:22 - 5:29
    Our main upstream is Debian and we try
    to not diverge too much from it.
  • 5:30 - 5:34
    Because the more you do things differently
  • 5:34 - 5:38
    the more work you have to maintain.
  • 5:38 - 5:41
    The work is not the work of
    implementing something once
  • 5:41 - 5:45
    it's the work of
    maintaining on the long term.
  • 5:45 - 5:50
    There where a lot of other
    security distributions
  • 5:50 - 5:52
    and there are still a few others
  • 5:52 - 5:56
    But most of them
    have a very short lifespan
  • 5:58 - 6:02
    because of maintenance.
  • 6:02 - 6:05
    It's a distribution and
  • 6:05 - 6:08
    we're a very tiny team compared to Debian
  • 6:08 - 6:10
    but we're a team.
  • 6:10 - 6:15
    Lots of other privacy distributions
    where either one person
  • 6:15 - 6:22
    or very tiny teams and they didn't make
    outrage to be joined by other people
  • 6:24 - 6:33
    Most other privacy distributions didn't
    take into account the maintenance work
  • 6:33 - 6:36
    and the user support because
  • 6:36 - 6:38
    even if we try to make it usable
  • 6:38 - 6:43
    it's still a lot of work to
    teach the users how to use it
  • 6:43 - 6:47
    and to document how to use it.
  • 6:47 - 6:49
    Also if you want to start such a project
  • 6:49 - 6:53
    you need to have a long term commitment
  • 6:53 - 6:57
    and to remember to avoid the symptom of
    "not invented here".
  • 6:58 - 7:03
    It's quite common to try to do something
    that does exactly what you want
  • 7:03 - 7:08
    but sometimes it's best
    to find an existing software
  • 7:08 - 7:12
    that does something close enough
  • 7:12 - 7:18
    to make the new features you want in it
    or use it as it is.
  • 7:21 - 7:24
    We are trying to do most of our work,
  • 7:24 - 7:27
    at least a good part of our work upstream
  • 7:27 - 7:30
    so we did AppArmor
  • 7:30 - 7:33
    in Debian specifically there is
    an AppArmor team,
  • 7:33 - 7:37
    an anonymity tools team and an OTR team
  • 7:37 - 7:42
    who work on things that we use in Tails
  • 7:43 - 7:49
    libvirt, Seahorse, Tor and Puppet
    are other projects we contributed to
  • 7:49 - 7:55
    instead of implementing ourselves
    what we need in Tails
  • 7:55 - 8:02
    we did it upstream
    and it took longer to fall down to us
  • 8:02 - 8:04
    but it's maintainable.
  • 8:04 - 8:08
    When we finally have the new features
  • 8:08 - 8:12
    we have no work of keeping them.
  • 8:13 - 8:18
    As a result we have
    really little Tails specific code
  • 8:18 - 8:21
    we mostly do glue work between the code
  • 8:21 - 8:24
    we take from our upstreams
  • 8:24 - 8:26
    and we do a lot of social work
  • 8:26 - 8:29
    we talk to upstream, we spread the word
  • 8:29 - 8:35
    we say "Oh that would be great if somebody
    where to work on that"
  • 8:36 - 8:41
    And we find the people that
    have the right skills
  • 8:41 - 8:45
    to do the work that should be done
    when it's not in Tails
  • 8:46 - 8:51
    We have a very slow rythm
    because we work in Debian
  • 8:51 - 8:55
    so we have to wait until the next Debian version is released
  • 8:55 - 9:00
    To see the work we have done in Tails
    as AppArmor
  • 9:00 - 9:03
    I mentioned earlier, we did it in Debian
  • 9:03 - 9:09
    so for two years there was work going on
    in Debian that was not visible in Tails
  • 9:09 - 9:15
    but we finally have it
  • 9:16 - 9:21
    Tails is still alive,
    because it's maintainable
  • 9:23 - 9:24
    Implementation details -
  • 9:24 - 9:31
    That's where I give the micro.
    [gives micro to kurono]
Title:
ftp.acc.umu.se/.../Tails_a_technical_overview.webm
Video Language:
English
Team:
Debconf
Project:
2015_debconf15

English subtitles

Incomplete

Revisions Compare revisions