Get data about Tails-targeted attacks in the wild with OONI
We'd love Tails to have exactly the same network fingerprint of a TorBrowser user. This is not the case.
Is anyone actively exploiting this to perform targeted blockages, or attacks? We don't know. If we could teach OONI how to behave "like Tails", we could get real data about that.