tails review

Getting started with Tails, the encrypted, leave-no-trace operating system

Image of Dan Patterson

by Dan Patterson in Security 

on August 5, 2016, 4:05 AM PDT

A step-by-step guide on how to download, install, and start using Tails, the world's most secure platform.


Video Player


00:00

01:24

Tails, an encrypted and anonymous OS that bundles widely used open source privacy tools on a tiny device, is one of the most secure operating systems in the world. The Linux distribution rose to popularity when it was revealed Edward Snowden relied on Tails to secure his identity while sharing NSA secrets with journalists Glenn Greenwald and Laura Poitras. In the past half decade, Tails has been embraced as an essential security suite by journalists, hackers, and IT workers.



Tails is an acronym for The Amnesic Incognito Live System. The OS runs Debian and is easy to run on Macs and PCs from a USB drive. Tails encrypts all local files, runs every internet connection through Tor and blocks all non-secure connections, and provides a suite of secure communication tools like the Tor browser, HTTPS Everywhere, Open PGP, the Claws Mail client, I2P, an IP address overlay network, and a Windows 8 camouflage mode to deter over-the-shoulder snooping.


SEE: IT leader’s guide to the Dark Web (Tech Pro Research)


Much of Tails’ appeal is that the OS lives on a discreet and portable USB drive. It’s also easy to install, and easy to launch and navigate from almost any Mac or PC with a USB slot. This guide will walk you through the steps necessary to download, install, and get started quickly with the world’s most secure operating system.



Before getting started you will need:


Two 4GB USB drives. One USB drive will be used to prepare and install Tails; the second USB drive will run the OS.

A mobile device, like a phone or tablet, and an app that scans QR codes.

Two to three hours of time. The installation process is relatively painless, but make sure you allocate enough time to read all the documentation, download software, and to prepare your machine.

Step 1: Learn



Tails is not a magic bullet, and it cannot protect against compromised hardware, compromised software, or user error. These steps may seem simple, but for Tails to provide proper protection it’s essential you follow the most current documentation on the boum.org website. Installing Tails is fast and simple. Understanding how to use the security tools inside the operating system takes planning and preparation.



How do I make sure I have a safe version of Tails?

The first thing you need to know before you use Tails is that even though it is quite secure and anonymous in comparison with other operating systems, it is not bulletproof. It is not a miracle solution. You also need to do your own research to ensure that Tails is the right choice for you.


Once you make that decision, you need to remember that Tails could get compromised if you are installing it onto a flash drive from a compromised or infected device in the first place. You could also be using a modified version that has been compromised by bad actors. This is why it is recommended that you get Tails by cloning it from someone you trust. But since that isn’t always possible, it is important to know how to download and install Tails on a flash drive while using a (non-compromised and non-infected) Windows machine.



“Be sure they download Tails from the official website. You must also verify that the website certificate is genuine and valid,” Jean-Pierre Lesser, cybersecurity researcher and independent programmer told indianexpress.com. Lesser is the original developer of the malware Dark Comet, which was modified and deployed by hacking group Modified Elephant against Indian citizens. He also recommends that you read the Tails website and attached documentation very rigorously to ensure that it is right for your use case.



Tails vs. Linux Kodachi: Which Privacy Protection Distro Should You Choose?

BY JT MCGINTY

PUBLISHED FEB 06, 2022

When it comes to maintaining privacy on Linux, you have two options: Tails and Linux Karachi. But which one should you go for? Let's find out.


 tails vs linux kodachi 

When it comes to privacy protection, you can’t beat Linux. And for those who want the ultimate in privacy and security, two Linux distributions are leading the way: Tails and Linux Kodachi. Both distributions are self-contained, portable, and use the latest technologies to allow you to remain anonymous online without leaving any trace of your activity when you’re done.



But what are the differences? And which ultra-private Linux distribution is right for you? We’re going to answer these questions by taking a look at the overall goals of these two specialized Linux distributions, how they are alike, and what makes them different.


How Tails and Linux Kodachi Protect Your Privacy

Kodachi and Tails (an acronym for "The Amnesic Incognito Live System") have quite a few things in common. Both come in the form of a bootable live image that you can run on just about any computer without the need to install it on the host system.



Both distributions also use the same basic tools and concepts to achieve the overall goal of extreme privacy. Many of the most important options will be configured and enabled automatically as the operating system boots, making it possible for you to get online and get to work quickly and easily.Here’s what you can expect from either distribution when you boot the system.


Self-Contained Live System

Both distros are fully functional live systems that boot from a USB drive without storing any information on the host computer. When the system loads, you will find many of the most commonly used applications available and ready to use.When you shut down the computer and remove the USB stick, there will be no trace of your activity left on the machine.

Post a Comment

Previous Post Next Post