Tails is a privacy focused Live operating system
I have not covered Live operating systems in a long while. These systems are usually Linux-based and allow you to boot into the system without installing software or making any changes to the data that is on a computer.
Basically, they run independent of the host system they are run on which, as an added side-effect, means you can run them on nearly any computer system that supports USB, SD cards or optical discs.
Tails is a privacy-focused Live operating system that is easy to use but mighty powerful at the same time.
Preparing Tails
Probably the easiest way to create bootable media using Tails is to download the latest ISO image that is offered on the official site. You can use the direct download for that or download it via BitTorrent instead.
The team suggests you verify the ISO image after the download to make sure it is legitimate and has not been tampered with. Instructions on how to do that are provided on the website.
Once done, burn the ISO image directly to DVD or install it on a USB device or SD card. Instructions on how to do that are also provided on the website under First steps with Tails.
The main advantage of USB or SD is that you can create encrypted persistent storage to save data across sessions.
Using Tails
This is where it gets interesting. You may need to configure the boot order of the system to boot Tails and not the other operating systems that may be installed on computer's hard drives.
Once Tails starts up, you are walked through a short introductory sequence that already highlights some of the unique features of Tails.
Among the options there are to activate a camouflage option to make Tails look more like Windows 8, an option to spoof MAC addresses and initial network configuration options.
This may sound confusing but the options presented are easy to understand and don't require that you make any manual input at this point in time (apart from selecting an administrator password that is).
Tails should work automatically from that moment on in most cases. The system connects to TOR automatically to secure network traffic and the TOR browser is the main Internet browser. It is a modified version of Firefox with improved privacy and several add-ons such as NoScript or HTTPS Everywhere installed.
Tails ships with a truck load of nice to have features including LibreOffice, the instant messaging software Pidgin that is preconfigured with OTR (Off the Record Messaging), a feed reader, Bitcoin client, the mail program Claws Mail with GnuPGP support and a lot more. The full list of supported programs is provided on the official website.
You may run into issues however when using Tails due to security limitations. File uploads to the Internet are not permitted for instance, and if you connect another USB drive to the computer, you will notice that you cannot select it to save files on it.
Closing Words
Tails is a privacy powerhouse. It encrypts Internet connections using TOR so that you remain anonymous on the Internet and can bypass censorship or blocked resources. Files, emails and instant messaging ships with encryption turned on by default for extra security, and since it is a live environment, it won't leave any traces on the underlying system unless explicitly permitted by the user first.
Linux users will feel right at home for the most part while Windows users may have a harder time adjusting especially if something is not working out of the box.
A good place to start troubleshooting is the official website and there especially the getting started guide and documentation.
Scary stuff… The only ppl using Tails are the ppl that have something to hide, so the NSA is tracking ’em…
The encrypted persistent storage mentioned is a bit different than some may expect. I found Tails to be an interesting tool, but TOR is compromised–NSA and all other security agencies–know exactly how it works, so forget the fiction that Tails is the stuff of spy movies.
If one is online, one is compromised and leaving a trail. The best way to take care of whatever business needs to be taken care of is to stay off of computers. Try a “burner” phone and meet in person? That’s even traceable. Try a 9/11–learn to think like they thought. How can I use “the enemy of my enemy is my friend” motif to be invisible by being completely visible. 9/11, from a military strategist point of view, was brilliant.
It’s a sad day that most don’t know about: MIA. If readers haven’t watched the ceremony performed, it may be on YouTube. If anyone has a lost brother or father or mother, KIA, MIA, POW, mostly Vietnam era folks, may that candle at the table continue to burn in our hearts. We don’t forget you Sam and Timothy.
https://tails.boum.org/contribute/design/persistence/
The reality here in Europe right now seems to be that the people who benefit most from all the brilliant tools for privacy and security are: terrorists, jihadists, paedophiles, drug barons, hit men, enslavers, human-trafficers, [the list goes on].
I’d like to keep all my communication secure and private, but the price is too high. I’m not going to oppose our spy programs on the basis that the future might be like 1984. The spy programs probably already saved my life at least once and without the hard-working people at these intelligence centres, there wouldn’t be a future for the free world anyway. Any future without freedom isn’t worth having.
If only there were a way to guarantee that the information gathered is used only for security against terrorism and not for general purpose law enforcement which has proven itself highly error prone and to be enforcing laws that are inhumane and completely illogical. Not to mention the psychopathic and irregular punishment regime used in some countries like the U.S..
When I no longer have reason to fear my government’s irrational and savage behavior toward its citizens I will be far more likely to accept surveillance.
And you completly forget the lates UN report that our pricacy level is already lower then in the 1984 novel.
go figure.
I think this is probably the way any adult who is capable of rationalizing his thoughts will view the situation. Sadly the internet rarely reflects this.
The problem is most laws are up to date in regards to internet privacy. The courts are loosy goosey in what government can do with it meta data collections. You might think that you have nothing to hide, but modern government is so onerous, interpretation of law so broad, everyone, I mean everyone breaks laws without knowing it and whether you actually get in trouble with them is based on what bureaucrats choose to emphasis or clamp down at any given time.
Oh! you brought anecdotal evidence.
I don’t see how spies from other countries ever saved me, quite the contrary, and even in my (supposedly democratic European) country I have to be careful about what I say and where. If not for the government, then for the regular people (and occasionally forum admins and site guards) who generally don’t like anyone who is a bit different. Once I needed Tor in a case of domestic violence too…
And as they say â€Those Who Sacrifice Liberty For Security Deserve Neither.â€
You’re conveniently forgetting people like whistleblowers.
Be careful.
https://en.wikipedia.org/wiki/Tails_%28operating_system%29#History
Just use https://startpage.com for your search and a VPN.
Torrents are the best way to go. No man in the middle attack but you still need to verify the hash.
Booting onto a TAILS USB thumb drive after wardriving around for open WIFI provides complete anonymity providing you don’t do something stupid like log onto FaceBook with it. Great tool for whistle blowers and the government alike!
…and once your done sending your message, for extra security, wipe the usb several times and throw it away if for complete anonymity. The USB drive is only ten bucks.