From 75fe1b766a19c61f272d928cabe324dd879eab28 Mon Sep 17 00:00:00 2001 From: stubbybubby Date: Mon, 17 Apr 2017 17:24:04 -0700 Subject: [PATCH] Change a word --- privacy/tails.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/privacy/tails.md b/privacy/tails.md index c1c986a5..eb162daa 100644 --- a/privacy/tails.md +++ b/privacy/tails.md @@ -76,5 +76,5 @@ You will probably want to implement [MAC spoofing](https://www.qubes-os.org/doc/ There are added security concerns for Tails users when running it in a virtual machine. If you intend to do this, you should read [the warnings](https://tails.boum.org/doc/advanced_topics/virtualization/) from the Tails team about it. While the Qubes security model mitigates most of the risks identified, traces of the Tails session may remain on the disk. -Live booting Tails, while less convenient, is always more secure than using it inside virtualization software or Qubes, because you don't run the added risk of the virtualization software or Host OS being compromised. +Live booting Tails, though less convenient, is always more secure than using it inside virtualization software or Qubes, because you don't run the added risk of the virtualization software or Host OS being compromised. Depending on your security model, and why you are using Tails, this may be dangerous.