Tails (The Amnesic Incognito Live System) is a security-focused Linux distribution designed for maximum privacy and anonymity. It runs from USB drives, routes all internet through Tor, and leaves no trace on computers used. For serious privacy needs, Tails provides comprehensive protection beyond regular Tor Browser.

What Makes Tails Special

Live Operating System

Tails runs entirely from USB without installing to hard drives. When you shut down, all activity disappears. No files, no history, no traces remain on the computer.

This "amnesia" protects against forensic analysis. Even if authorities seize computers, they can't recover Tails activity from hard drives.

Forced Tor Routing

Every internet connection in Tails routes through Tor automatically. Applications can't accidentally leak your IP address. If a program tries connecting outside Tor, Tails blocks it.

This prevents the mistakes possible with regular operating systems where you might forget to use Tor for something.

State-of-the-Art Cryptography

Tails includes encryption tools for files, emails, and communications. Everything uses current cryptographic standards. Tools integrate seamlessly rather than requiring separate installations.

Portable and Universal

Carry Tails on USB stick and use it on any computer. Boot from USB, use Tails with full privacy, shut down, and the computer shows no signs of Tails usage.

This portability enables privacy on public computers, travel, or any situation where using personal devices is impractical.

Best Use Cases: Journalists protecting sources, activists in hostile environments, researchers handling sensitive data, whistleblowers, anyone needing maximum privacy beyond Tor Browser alone.

Requirements

Hardware Needed

Two USB sticks minimum 8GB each. One for initial Tails download, one for final installation. Using two USBs creates verified installation preventing corrupted or malicious copies.

Computer with USB boot capability. Most computers from last 10 years support USB booting. You might need to change BIOS settings to enable it.

Download Requirements

Reliable internet connection to download Tails image (1.3GB). Sufficient time for download and installation - plan for 30-60 minutes total.

Downloading Tails

Official Source Only

Only download Tails from the official website: tails.net. Third-party downloads might contain malware or backdoors compromising all security.

The official site provides Tor .onion address for downloading through Tor if desired. This prevents surveillance of your Tails download.

Verification

Tails provides cryptographic signatures verifying downloads aren't tampered with. The installation process includes verification steps. Don't skip these - they ensure your Tails copy is genuine.

Installation Process

Step 1: Create Intermediate USB

Download Tails USB image and use balenaEtcher (recommended tool) to write it to your first USB stick. This creates intermediate Tails that won't be your final installation.

BalenaEtcher works on Windows, Mac, and Linux. It's simple - select the Tails image, select your USB drive, click Flash. The process takes 5-10 minutes.

Step 2: Boot Intermediate USB

Insert the USB and restart your computer. Enter BIOS/boot menu (usually F2, F12, DEL, or ESC during startup - varies by computer). Select USB drive from boot menu.

Tails loads showing welcome screen. Select your language and keyboard layout. Click Start Tails to launch the desktop.

Step 3: Create Final USB

Once running intermediate Tails, insert your second USB stick. Open "Tails Installer" from applications menu. Choose "Install Tails" and select your second USB.

The installer clones Tails to the second USB. This final USB will be your actual Tails system. The installation takes 10-15 minutes.

Step 4: Verification

After installation completes, restart using the final USB. If it boots successfully and shows the Tails welcome screen, installation succeeded.

You can now erase the intermediate USB or keep it as backup. Your final USB is ready for use.

Important: Never install Tails to computer hard drives. The whole security model depends on running from USB without touching hard drives. Installing to hard drives defeats Tails' purpose.

First Use Configuration

Welcome Screen

Each Tails boot starts with the welcome screen. Here you configure language, keyboard, and additional settings before starting Tails.

Additional settings include administration password (for advanced tasks), MAC address spoofing (changing network card identifier), and persistence setup.

Network Connection

After starting Tails, connect to internet. Tails waits for connection before enabling Tor. Click network icon in top bar and select WiFi network or plug in Ethernet.

Tor connection establishes automatically after internet connects. Wait for "Tor is ready" notification before browsing.

Tor Circuit View

Click onion icon in top bar to see Tor circuits for your connections. This shows which countries route your traffic. You can create new circuits if desired though it's rarely necessary.

Persistence Feature

What Persistence Does

By default, Tails forgets everything when shut down. Persistence creates encrypted storage on USB saving specific things between sessions.

You choose what to persist: browser bookmarks, files, email client settings, cryptocurrency wallets, etc. Everything else still disappears on shutdown.

Setting Up Persistence

Open "Configure persistent volume" from applications. Enter a strong passphrase - this encrypts your persistent storage.

Choose features to persist. Common choices include Network Connections (saved WiFi passwords), Browser Bookmarks, GnuPG (PGP keys), and Personal Data folder.

Persistence requires rebooting to take effect. After reboot, unlock persistence at welcome screen by entering your passphrase.

Persistence Security

Persistence passphrase is critical. If forgotten, persistent data is permanently inaccessible. If weak, attackers with your USB can break encryption.

Use strong random passphrase from password manager or dice-generated words. Write it securely but don't store it on the Tails USB itself.

Using Tails Safely

Trust the System

Tails handles security automatically. Don't try "improving" security through additional VPNs or proxies - this usually makes things worse by adding complexity and potential leaks.

Use applications provided by Tails. They're configured correctly for anonymity. Installing additional software might compromise security.

Never Use Admin Password Carelessly

Administration password grants root access. This is powerful but dangerous. Only use it when absolutely necessary for specific technical tasks.

Setting admin password makes Tails less secure by enabling root access. Only do so if you understand why you need it.

Physical Security

Tails USB contains your persistent data if enabled. Treat it like you'd treat sensitive documents. Don't lose it. Don't let others access it. Consider what happens if it's stolen.

For maximum security, carry Tails USB separately from the passphrase. Someone finding the USB can't access persistence without the passphrase.

Public Computer Usage

Tails works on public computers but consider physical security. Libraries or internet cafes might have surveillance cameras recording your screen or keystrokes.

Public computers might have malicious BIOS that compromises Tails despite USB boot. This is rare but possible in high-threat environments.

Included Applications

Tor Browser

Tails includes Tor Browser configured identically to the standalone version. Use it for all web browsing. It's optimized for anonymity.

Thunderbird with Enigmail

Email client with integrated PGP encryption. Configure your email accounts and manage encrypted communications.

KeePassXC

Password manager for securing credentials. Store passwords in encrypted database. If persisted, your passwords survive reboots.

OnionShare

Share files anonymously through Tor. Create temporary onion service for file sharing without revealing identity.

Electrum

Bitcoin wallet included for cryptocurrency management. Use it with good OpSec for private Bitcoin transactions.

LibreOffice

Full office suite for documents, spreadsheets, and presentations. All work is private and leaves no traces.

Common Issues

USB Won't Boot

Check BIOS settings. Secure Boot might prevent Tails booting - disable it in BIOS. Change boot order to prioritize USB drives.

Some computers don't support USB booting well. Try different USB ports. USB 2.0 ports sometimes work better than 3.0 for booting.

WiFi Not Working

Some WiFi cards lack Linux drivers. Tails can't support every hardware combination. Try USB WiFi adapters - many work better than built-in cards.

Check if MAC address spoofing causes problems. Disable it at welcome screen and test.

Slow Performance

Tails runs from USB which is slower than hard drives. This is normal. Fast USB 3.0 drives help. Using newer computers with more RAM improves performance.

When to Use Tails

High-Risk Situations

Journalists protecting sources, activists under surveillance, whistleblowers, or anyone facing serious consequences from surveillance should use Tails.

Traveling

Cross border with Tails USB. Even if devices are seized and searched, Tails contains nothing incriminating without persistence passphrase.

Public Computers

Using internet cafes or public computers safely requires Tails. Don't trust public systems - boot your own OS from USB.

Regular Privacy

For everyday privacy, Tor Browser on your normal OS usually suffices. Tails is overkill for casual privacy. It's for serious threat models.

Final Thoughts

Tails provides maximum privacy and security but requires effort to use correctly. The learning curve is steeper than Tor Browser but benefits are substantial for high-risk users.

Start practicing with Tails before you need it urgently. Familiarize yourself with the interface, test persistence, and learn included applications. Being comfortable with Tails before emergencies is important.

Remember: Tails is a tool. It provides technical security but can't protect against all threats. Physical security, good judgment, and understanding your threat model remain essential.