From 4a7c5b040f5bc2d224f8994175056d052ef925a8 Mon Sep 17 00:00:00 2001 From: stubbybubby Date: Mon, 17 Apr 2017 17:25:10 -0700 Subject: [PATCH] Rewrite last sentence. --- privacy/tails.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/privacy/tails.md b/privacy/tails.md index eb162daa..0f8e8570 100644 --- a/privacy/tails.md +++ b/privacy/tails.md @@ -77,4 +77,4 @@ There are added security concerns for Tails users when running it in a virtual m If you intend to do this, you should read [the warnings](https://tails.boum.org/doc/advanced_topics/virtualization/) from the Tails team about it. While the Qubes security model mitigates most of the risks identified, traces of the Tails session may remain on the disk. Live booting Tails, though less convenient, is always more secure than using it inside virtualization software or Qubes, because you don't run the added risk of the virtualization software or Host OS being compromised. -Depending on your security model, and why you are using Tails, this may be dangerous. +Depending on your threat model, this might induce too much risk.