Tor Merges With Security-Focused OS Tails

Share This Post

The Tor Project announced on Thursday that it has merged operations with the security-focused operating system Tails. 

The maintainer of the Tor privacy and anonymity network has worked closely with Tails for nearly a decade and they have now decided to pool their resources for their shared goal of protecting journalists, activists, and other high-risk users against surveillance and censorship.

Discussions about a potential merger started in late 2023, after Tails concluded that it had outgrown its existing structure. 

A representative of the Debian-based Linux distribution pointed out that the technical part was not the most difficult. Instead, the project struggled with tasks like HR, finances, and fundraising.

“Rather than expanding Tails’s operational capacity on their own and putting more stress on Tails workers, merging with the Tor Project, with its larger and established operational framework, offered a solution,” the Tor Project said

“By joining forces, the Tails team can now focus on their core mission of maintaining and improving Tails OS, exploring more and complementary use cases while benefiting from the larger organizational structure of The Tor Project,” it added.

The Tor anonymity network and the Tails OS offer complementary protections and they are often used together, and the merger will bring more improvements in terms of network and system security. 

In addition, with Tails integrated into its educational efforts, Tor will be able to address a wider range of privacy and security scenarios. 

Advertisement. Scroll to continue reading.

“Lastly, this merger will lead to increased visibility for Tails. Many users familiar with Tor may not yet know about Tails OS. By bringing Tails within the Tor Project umbrella, we can introduce this powerful tool to more individuals and groups needing to remain anonymous while working in hostile environments,” the Tor Project said.

Related: Tor Responds to Reports of German Police Deanonymizing Users

Related: Okta Warns of Credential Stuffing Attacks Using Tor, Residential Proxies

Related: Tor Code Audit Finds 17 Vulnerabilities

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.