Everything you do on a laptop or desktop — from the moment you begin to use it — is contributing to your online persona. You are continually leaking digital exhaust about who you are, where you are, your activities, preferences, and interests. Each activity and interaction further develops a unique persona footprint that can be attributed to you.
This becomes a challenge when your employees need to quietly research cyber threats or malicious organizations. When they need to do competitive research without being noticed. Or when they have sensitive work that requires a tightly managed online presence.
You have two ways to manage this challenge — known as managed attribution, or obfuscation:
There are easily available ways to do this with Tor and other one-hop proxies. However, these methods are easily tracked and traced — typically running only in a browser or for specific applications — and suffer from predictable performance challenges. They are therefore inadequate solutions for truly sensitive and high-risk endeavors.
To properly manage all aspects of your online attribution, you must obfuscate all aspects of each device completely — not merely the browser or specific applications — and without suspicious performance delays. In order to do this successfully, you must address two distinct issues:
Once a machine is used for anything other than the persona with which it was set up, the original persona becomes polluted with new data and any attempts at obfuscation will fail. However, having a unique laptop or desktop for each persona used by each analyst or investigator can be logistically and fiscally challenging.
Telos Ghost®’s Virtual Desktop Interface (VDI) has solved this challenge. With Telos Ghost’s VDI, you can set up a series of Virtual Machines (VMs), each of which can be used to establish a distinct persona in a given location. These non-persistent VMs give you the power to control both the technical and personal pieces of the equation, successfully managing attribution for your entire device. All information you leak from the VM will support and enhance the authenticity of the persona you seek to establish. When you log off from your virtual session, your persona disappears.
Benefits of the Telos Ghost VDI over Tor and other one-hop proxy solutions:
Reduce risk. Strengthen security. Simplify workflow. Increase productivity. All with Telos Ghost’s Virtual Desktop Interface (VDI).
To learn more, request a demo, or inquire about a free, no-obligation trial of Telos Ghost, call us at 1-800-70-TELOS (800-708-3567) or fill out our contact form today.
Learn why threats outside your network can lead to breaches within your network.