Untrusted partitions |
40 |
0 |
0 |
0 |
0 |
40 |
4 |
0 |
4 |
5:58.033 |
Passed |
Root access control enforcement |
7 |
1 |
1 |
0 |
0 |
9 |
1 |
1 |
2 |
3:3.891 |
Failed |
Time syncing |
80 |
0 |
0 |
0 |
0 |
80 |
10 |
0 |
10 |
7:36.959 |
Passed |
Using Tor bridges and pluggable transports |
120 |
0 |
0 |
0 |
0 |
120 |
11 |
0 |
11 |
7:48.006 |
Passed |
System memory erasure on shutdown |
53 |
0 |
0 |
0 |
0 |
53 |
6 |
0 |
6 |
9:53.270 |
Passed |
Installing Tails to a USB drive |
64 |
1 |
5 |
0 |
0 |
70 |
9 |
1 |
10 |
24:32.349 |
Failed |
Additional software |
75 |
0 |
0 |
0 |
0 |
75 |
5 |
0 |
5 |
23:59.927 |
Passed |
Upgrading an old Tails USB installation |
87 |
0 |
0 |
0 |
0 |
87 |
7 |
0 |
7 |
16:51.978 |
Passed |
Emergency shutdown |
36 |
0 |
0 |
0 |
0 |
36 |
5 |
0 |
5 |
5:20.691 |
Passed |
APT sources are correctly configured |
7 |
0 |
0 |
0 |
0 |
7 |
1 |
0 |
1 |
51.747 |
Passed |
Backing up the persistent storage |
17 |
0 |
0 |
0 |
0 |
17 |
1 |
0 |
1 |
1:17.772 |
Passed |
custom APT sources to build branches |
338 |
0 |
0 |
0 |
0 |
338 |
40 |
0 |
40 |
12.541 |
Passed |
Getting a DHCP lease without leaking too much information |
16 |
0 |
0 |
0 |
0 |
16 |
2 |
0 |
2 |
52.766 |
Passed |
Tails documentation |
8 |
0 |
0 |
0 |
0 |
8 |
2 |
0 |
2 |
1:23.689 |
Passed |
Electrum Bitcoin client |
4 |
0 |
0 |
0 |
0 |
4 |
1 |
0 |
1 |
22.019 |
Passed |
Using Evince |
41 |
0 |
0 |
0 |
0 |
41 |
5 |
0 |
5 |
1:42.609 |
Passed |
GNOME is well-integrated into Tails |
35 |
0 |
0 |
0 |
0 |
35 |
3 |
0 |
3 |
3:43.529 |
Passed |
Hardware failures |
9 |
0 |
0 |
0 |
0 |
9 |
2 |
0 |
2 |
1:8.637 |
Passed |
Hardware support |
3 |
0 |
0 |
0 |
0 |
3 |
1 |
0 |
1 |
49.168 |
Passed |
Tails-related cryptographic keys are up-to-date |
4 |
0 |
0 |
0 |
0 |
4 |
2 |
0 |
2 |
32.326 |
Passed |
Localization |
163 |
0 |
0 |
0 |
0 |
163 |
16 |
0 |
16 |
29:27.171 |
Passed |
Spoofing MAC addresses |
55 |
0 |
0 |
0 |
0 |
55 |
6 |
0 |
6 |
9:53.623 |
Passed |
Metadata Anonymization Toolkit |
4 |
0 |
0 |
0 |
0 |
4 |
1 |
0 |
1 |
1:25.214 |
Passed |
Packages are up-to-date |
2 |
0 |
0 |
0 |
0 |
2 |
1 |
0 |
1 |
2.716 |
Passed |
Networking |
15 |
0 |
0 |
0 |
0 |
15 |
2 |
0 |
2 |
1:56.498 |
Passed |
Onion Circuits |
4 |
0 |
0 |
0 |
0 |
4 |
1 |
0 |
1 |
52.765 |
Passed |
Tails persistence |
121 |
0 |
0 |
0 |
0 |
121 |
17 |
0 |
17 |
33:28.586 |
Passed |
Using persistent Tor bridges and pluggable transports |
49 |
0 |
0 |
0 |
0 |
49 |
2 |
0 |
2 |
6:47.594 |
Passed |
Tails has a sane default configuration |
12 |
0 |
0 |
0 |
0 |
12 |
5 |
0 |
5 |
1:17.645 |
Passed |
Shutdown buttons in the system menu |
6 |
0 |
0 |
0 |
0 |
6 |
2 |
0 |
2 |
1:31.339 |
Passed |
Logging in via SSH |
15 |
0 |
0 |
0 |
0 |
15 |
3 |
0 |
3 |
1:13.933 |
Passed |
Thunderbird email client |
19 |
0 |
0 |
0 |
0 |
19 |
2 |
0 |
2 |
1:46.518 |
Passed |
Tor Connection helps the user in connecting to Tor |
23 |
0 |
0 |
0 |
0 |
23 |
2 |
0 |
2 |
1:52.658 |
Passed |
The Tor enforcement is effective |
43 |
0 |
0 |
0 |
0 |
43 |
9 |
0 |
9 |
2:40.859 |
Passed |
Tor stream isolation is effective |
17 |
0 |
0 |
0 |
0 |
17 |
4 |
0 |
4 |
1:54.659 |
Passed |
Browsing the web using the Tor Browser |
131 |
0 |
0 |
0 |
0 |
131 |
17 |
0 |
17 |
16:50.666 |
Passed |
Cloning a Git repository |
7 |
0 |
0 |
0 |
0 |
7 |
2 |
0 |
2 |
40.424 |
Passed |
Various checks for torified software |
11 |
0 |
0 |
0 |
0 |
11 |
3 |
0 |
3 |
37.628 |
Passed |
Using Totem |
50 |
0 |
0 |
0 |
0 |
50 |
3 |
0 |
3 |
1:53.686 |
Passed |
Browsing the web using the Unsafe Browser |
52 |
0 |
0 |
0 |
0 |
52 |
9 |
0 |
9 |
8:29.359 |
Passed |
Using VeraCrypt encrypted volumes |
67 |
0 |
0 |
0 |
0 |
67 |
9 |
0 |
9 |
5:58.327 |
Passed |
I can report a bug with WhisperBack |
7 |
0 |
0 |
0 |
0 |
7 |
3 |
0 |
3 |
38.936 |
Passed |