The flaw is one of several found by Exodus Intelligence, a vulnerability broker A vulnerability broker published a video demonstrating one of several flaws it has found in the privacy-focused Tails operating system, which is used by those seeking to make their Web browser harder to trace.Exodus Intelligence of Austin, Texas, said its short clip shows how the real IP address of a Tails user can be revealed using the flaw. The company said it hoped publicizing its findings would serve as a warning to users about putting “unconditional trust” in a software platform.“Users should question the tools they use, they should go even further to understand the underlying mechanisms that interlock to grant them security,” Exodus said in a blog post on Wednesday.Tails is a self-contained, Linux-based operating system and suite of applications that can be carried on a USB stick, an SD card or a DVD. It is designed in part for use on public Internet terminals, protecting a person’s online activity and leaving few digital traces on the computer it runs on. Exodus, which sells software vulnerabilities to vetted parties, came under fire earlier this week for how it approached disclosing the problem in Tails, which has been endorsed by former NSA contractor Edward Snowden.The company tweeted on Monday that it had found several zero-day vulnerabilities in Tails without notifying developers of the project first. Critics worried that Exodus might sell the information, potentially putting users at risk. [Zero-day flaws in Tails aren’t for sale, vulnerability broker says]CEO Aaron Portnoy later said the company would not sell the information and would provide it to Tails so the issues could be fixed. It wasn’t clear if public pressure contributed to that decision, but the Tails project said it appreciated the disclosure.The flaw Exodus described in its blog post is contained in an open-source networking component within Tails called I2P, which encrypts Web traffic and masks a computer’s true IP address. Exodus said the vulnerability is present on default, fully patched versions of Tails and allows a malicious payload to be delivered to the victim’s computer.Obtaining a computer’s true IP address does not necessarily identify a specific user. But it does indicate what service provider supplies Internet connectivity to the machine, which could then be forced by court order to disclose the subscriber.Developers from Tails wrote on Tuesday that there are many programs in its software package, all of which periodically have security vulnerabilities. It encourages security researchers to audit and report flaws.“Some people report such vulnerabilities, and then they get fixed: This is the power of free and open source software,” the project wrote. “Others don’t disclose them, but run lucrative businesses by weaponizing and selling them instead. This is not new and comes as no surprise.” Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk Related content news UK Cyber Security Council CEO reflects on a year of progress Professor Simon Hepburn sits down with broadcaster ITN to discuss Council’s work around cybersecurity professional standards, careers and learning, and outreach and diversity. By Michael Hill Sep 27, 2023 3 mins Government Government Government news FIDO Alliance certifies security of edge nodes, IoT devices Certification demonstrates that products are at low risk of cyberthreats and will interoperate securely. By Michael Hill Sep 27, 2023 3 mins Certifications Internet Security Security Hardware news analysis Web app, API attacks surge as cybercriminals target financial services The financial services sector has also experienced an increase in Layer 3 and Layer 4 DDoS attacks. By Michael Hill Sep 27, 2023 6 mins Financial Services Industry Cyberattacks Application Security news Immersive Labs adds custom 'workforce exercising' for each organizational role With the new workforce exercising capability, CISOs will be able to see each role’s cybersecurity readiness, risk areas, and exercise progress. By Shweta Sharma Sep 27, 2023 3 mins Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe