• AerialTest@lemmy.worldOP
    link
    fedilink
    arrow-up
    3
    arrow-down
    5
    ·
    edit-2
    11 months ago

    That’s not what I’m saying. The point I’m making is tails feature where it wipes memory when turned off is pointless because ISP can look at the times of tor usage and see what times you were likely using tails, which us why I ask if there is any point in using it?

    • Lemongrab@lemmy.one
      link
      fedilink
      arrow-up
      20
      arrow-down
      1
      ·
      11 months ago

      Memory stores more data than just when you used tor, like websites visited (like resources downloaded on page load through GETs). Your ISP should only be able to tell what the first node you are using is, and if you use an unlisted bridge it should be much harder to even try to correlate, which if your smart should be near impossible anyways.

    • m-p{3}@lemmy.ca
      link
      fedilink
      arrow-up
      9
      ·
      11 months ago

      If you leave it on as much as you can, and make it generate random traffic, then you’re effectively obfuscating the pattern.

    • BlackPit@feddit.ch
      link
      fedilink
      arrow-up
      10
      arrow-down
      2
      ·
      11 months ago

      I think the first responder @grant did understand and answered in a relevant way. I’ll answer your question with a question. What is the point of using VPN if your ISP can correlate times from logs? I think you should get on the Tails site and educate yourself further to better understand use case for Tails.

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      11 months ago

      Don’t let perfect be the enemy of good. Just because it’s physically possible, doesn’t mean you have to make it easy for somebody