It’s no secret that using GNU/Linux is generally safer than using Microsoft Windows, however, there are specific distributions of GNU/Linux that are even more focused on privacy and safety than the usual distros like Ubuntu. In a previous article, I showed of Qubes OS; and now it’s time to look at TAILS.
The Amensic Incognito Live System, is a Debian based distribution that routes all internet traffic through the TOR network, and leaves no trace of its existence or anything done on the system when the machine is shut down. The obvious aim in this, is to aid in keeping the user anonymous and private. Tails is not installed to a users computer, but instead is run strictly as a LiveUSB / LiveDVD.
TAILS does not utilize the host machines Hard Disk at all, and is loaded entirely into RAM. When a machine is shut down, the data that is stored in RAM disappears over the course of a few minutes, essentially leaving no trace of whatever had been done. Granted, there is a method of attack known as a Cold Boot Attack, where data is extracted from RAM before it has had a chance to disappear, but TAILS has you covered on that front too; the TAILS website says,
“To prevent this attack, the data in RAM is overwritten by random data when shutting down Tails. This erases all traces from your session on that computer.”
There are numerous other security minded applications found in a Tails install, which the website lists as:
More applications can easily be installed as well, since Tails is based on Debian Stable, and has full access to the repositories. However, keep in mind that anything installed will disappear once the machine is shut down.
Installing Tails is not quite as simple as installing other distributions, and the method is a little different depending on if you’re using Windows, Ubuntu/Debian/Mint or other forms of GNU/Linux. For full instructions on how to install Tails, check out the guide found here.
Tails is ideal for keeping yourself and your activities hidden as previously stated, which is absolutely perfect for those who want to do their best to have ‘big brother’ unable to spy on their activities, as much as possible. Another major use of Tails is to avoid censorship in places where internet use is carefully monitored; because Tails routes ALL internet traffic through TOR, you can be assured that you are able to freely surf the internet.
Tails is also used by some journalists, agencies, and whistleblowers. Edward Snowden for example, was using Tails to communicate with Glen Greenwald and others, when he released his famous leaks of classified information. The point being, that for those who are extremely privacy conscious, Tails is definitely worth looking at, even if you feel you have ‘nothing to hide’, having the peace of mind of knowing that if you DO ever need something like this; it’s easily accessible.Advertisement
Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.
We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.
If you like our content, and would like to help, please consider making a contribution:
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.