Table of Contents
- What is Tails and why do privacy fans love it?
- Downloading and Verifying Tails
- Installing and Running Tails on a USB Stick
- Configuring Tails
- A Quick Intro to the Tails Desktop
- The Tor Browser
- Tails Tools for Privacy
- Tails and Cryptocurrencies Make a Great Team
- Is Tails always the best solution for privacy and anonymity?
- Is Tails right for you?
Want to protect yourself from the snoops, spies, and outright criminals on the Internet? If so, it’s time to learn about the operating system called Tails. But don’t take our word for it.
When whistleblower Edward Snowden was communicating with Glenn Greenwald back in 2013 about the goings on at the NSA, one of the tools he used to protect himself was Tails. But that was a long time ago. Does Snowden still like Tails? Here’s what he had to say on the subject in this December 13, 2017 tweet:
TAILS (@Tails_live, https://t.co/Re3LzE4WdO) is the most accessible for normal folks looking to "torify" non-browser traffic, and a gentle introduction to Linux (which is still gonna be a learning experience). You can boot it from a USB stick without overwriting your everyday OS. https://t.co/eHqYarXFjZ
— Edward Snowden (@Snowden) December 13, 2017
Even if you don’t understand exactly what he’s talking about (yet), this Tails thing is clearly important. Keep reading to learn what it is and why it has become so popular.
What is Tails and why do privacy fans love it?
Tails is a special computer operating system. It is designed to help you use the Internet anonymously and get around censorship. Tails is a live system (live operating system) that runs from a USB stick or DVD. It lets you connect to the Internet using virtually any computer, while leaving no trace of your activities after you are done.
Even better, Tails is free software that anyone can install and use whenever and wherever privacy and anonymity are important.
What makes Tails safer than other operating systems?
Because Tails was designed from the beginning to provide privacy and anonymity, it differs from other operating systems in several areas:
- Tails forces all Internet connections to go through the Tor network. Tor is a worldwide distributed network that prevents people watching your network connection from knowing what websites you visit while keeping those websites from knowing your physical location. For more details on how this works, visit the official About Tor page.
- Tails connects to the hardware of a computer but doesn’t use the operating system or disk drives. That means there is no permanent record of your activities on that computer. Once you remove the Tails USB Stick or DVD and restart the computer there will be no way to tell Tails was used there.
- Tails comes with state of the art encryption technology. From PGP and OTR support for secure communications, to automatic use of HTTPS when visiting websites, to the ability to encrypt the files on your USB Stick or DVD, Tails has you covered.
With all these privacy and anonymity features together in a package that you can literally carry in your pocket, it is easy to see why privacy fans love Tails.
This all sounds great, but you may still be wondering, “Is Tails safe to use?” Tails is far safer than the typical operating system, but it is not foolproof. There are various ways bad guys can get around the protections built into Tails. Here is a detailed explanation of Tails security limitations.
Watch the following video for a more detailed introduction to Tails:
One of the great things about Tails is that you can create your own Tails USB Stick or DVD and try it for yourself. And since it is free software, all it will cost you is the USB Stick or DVD you install it on.
In the next few sections we’ll talk about the process of creating and configuring a Tails System using a USB Stick. We won’t walk you through the process step by step, as the details depend on the type of computer you install from and the media you are going to install to.
We do encourage you to create your own Tails System by following the instructions on the Download and Install Tails page that apply to your situation.
Once we’re done, you’ll be able to see for yourself how Tails and its included software work.
We’re going to:
- Download and verify Tails
- Install Tails on a USB Stick
- Configure Tails & Tor
Downloading and Verifying Tails
We used a computer running Linux to create our Tails System. Clicking through the options on the Download and Install Tails page led us here:
Once we were ready, we clicked the big green “Let’s Go” button, which led us to the detailed instructions. From here on out it was just a process of following the detailed instructions provided by the Tails team.
We downloaded the Tails USB image then verified it using the Tails Verification browser extension. Verifying your download is vitally important. This will tell you if your download is somehow corrupted.
Downloads are sometimes incomplete, or part of the download might not be 100% identical to the original. And sometimes hackers break through the security on a website, and replace the original with a hacked version. Verifying your download will spot any of these problems for you.
Once we had a verified version of the Tails USB image on our computer, we followed the instructions for installing it on the USB stick.
Installing and Running Tails on a USB Stick
Installing Tails might be overstating things a bit here. All that we really need to do is copy the verified Tails USB image onto your USB Stick. The instructions will tell you exactly how to do this for the computer you are using to install Tails.
Running Tails for the first time may actually be harder than downloading and installing it. That’s because most computers are not configured to run from a USB Stick.
We had this problem and had to spend some time figuring out how to get our computer set up properly. The Tails does not start at all troubleshooting guide helped us deal with this.
There isn’t a lot of configuring to do with Tails initially. When you start Tails you see a screen that looks like this one:
After you press Enter (or several seconds with no input) the Tails Greeter screen appears:
Here you tell Tails the Language you want to use, the Keyboard Layout, and the Formats to use for things like the date and time.
In addition, you can activate a full range of Accessibility options from the Universal Access menu:
NOTE: The Tails team configured Tails to be as safe as possible by default. If you need to deviate from the defaults, the Additional Settings section of the Greeter is where you make those changes. We recommend you avoid making any changes here if at all possible.
Once you are done setting things up in Greeter, you click the Start Tails button.
A Quick Intro to the Tails Desktop
The Top Navigation Bar contains the two main Tails menus, along with a group of icons with various functions. Here is a quick summary of what you’ll find in this navigation bar, from left to right:
- The Applications menu gives you shortcuts to the software that comes pre-installed on Tails, along with some utilities for configuring the desktop. You’ll find all the basic applications you need to get things done here, along with some specialized stuff related to the privacy and anonymity features of Tails.
- The Places menu has shortcuts to folders on the system as well as any storage media like disk drives that might be connected.
- The Calendar and Notifications appear together in the top center of the window.
- The OpenPGP Applet comes next. You’ll use this to encrypt and decrypt text for greater privacy.
- The Tor Status icon looks like an Onion, and you can click it to see the Open Onion Circuits Tails knows about.
- We talked about the Universal Access icon and menu back in the Configuring Tails section.
- The System menu contains information on your network connection, the status of the computer’s battery, and other settings.
Connecting Tails to Your Network and the Internet
Tails is of little use unless it is connected to the Internet. But before it can connect to the Internet, Tails needs to connect to your network. You can see the status of your connection to the local network in the System menu:
We had no problem connecting Tails to our local network. Once we did, it automatically connected itself to the Tor network and through that to the Internet.
You can quickly see if you are connected to the Tor network by looking at the Tor Status icon in the top Navigation Bar.
If Tails is connected to the Tor network, the Tor Status icon looks like this: . If Tails is not connected to the Tor network, the Tor Status icon looks like this: .
While we had no problems, connecting Tails to the Internet doesn’t always go so smoothly. If you have problems, the Tails documentation has detailed instructions on how to connect to the Internet anonymously.
The Tor Browser
Tails Tools for Privacy
The Tor network and browser provide you with anonymity when using the Internet. But anonymity doesn’t guarantee privacy. Let’s take a quick look at a few of the most useful encryption tools that Tails gives you to boost your privacy.
Why You Need Encryption Too
This can be confusing, so let’s look at an example. Let’s say I want to send a message to my wife, Ruth. I don’t use an encrypted application to create it, so the message starts out in plain text. Before the message leaves my computer, Tor wraps it up in three layers of encryption. That’s an essential part of how Tor works.
As my message passes through the network, Tor strips off layers of encryption. When my message leaves the Tor exit mode and goes to its destination, all the layers of encryption that Tor added are gone. What Tor has done is make it impossible to trace my message back to the computer it came from. This provides anonymity.
But what about the contents of my message? The contents are now in the same state that it went into the Tor network. Since I sent a plain text message into the network, a plain text message comes out of the network.
This might be fine, but it might be disastrous. When in doubt, it is best to be safe and use the encryption tools provided by Tails. That way, your messages and data can only be read by the people who are supposed to read them. Even if they were somehow able to get intercept your messages enroute, all any snoop would see would be incomprehensible gibberish.
Keeping Your Communications Secure
Tails gives you several ways to keep your communications secure from prying eyes.
Encrypting, Decrypting, and Verifying Messages with the OpenPGP Applet
If you want the maximum privacy, you should use the OpenPGP Applet. Encrypting and decrypting messages is riskier if you do it in the web browser. To use the applet, you can compose your message in a text editor, then use the applet to encrypt it. Likewise, you can receive an encrypted message and import it into the applet before decrypting it.
Using OpenPGP can be labor intensive. If you will be sending lots of encrypted messages by email, Thunderbird, an email program that comes pre-installed on Tails, might be a better option than OpenPGP. If you want to go this route you can find more information at the Thunderbird Help page.
Chatting Securely with the Pidgin Instant Messenger and OTR Encryption
Pidgin Instant Messenger is a chat application that can connect to several different chat systems simultaneously. When combined with OTR (Off-the-Record) messaging, you get encryption and more. If you want to be able to chat securely while using Tails, get all the details at the Chatting with Pidgin page.
Keeping Your Data Secure
Normally Tails only stores data until you shut down. But if you are running Tails on a USB Stick with additional space available, you can create a Persistent Storage area on the USB Stick to retain data longer term.
There are pros and cons to creating a Persistent Storage area, and the Tails team advises against doing so in most cases. Still, if you need to store data securely, or add additional applications beyond those that come pre-installed, this is your best option.
The Pros and Cons of Using Persistent Storage with Tails
|Allows you to store encrypted data on the Tails USB Stick||The Persistent Volume is visible to anyone who has access to the USB Stick.|
|You can install additional applications||Installing non-default applications can break Tails security|
|You can change the configuration of applications||Changing configurations of default applications can weaken anonymity|
|You can open the Persistent Storage from other operating systems||Accessing Persistent Storage from other operating systems can compromise security|
To further minimize the risks of using Persistent Storage, you get to specify exactly which types of files Tails can store there.
If you still want to go ahead after looking at the pros and cons, you’ll want to head to the Encrypted Persistence page for detailed instructions.
One of the best uses for Persistent Storage is to keep track of all your passwords. Using a different, strong password for each website and application that needs one is a must, but keeping track of them all without computerized help is almost impossible.
To address this problem, Tails comes with KeePassX, an open quality password manager. You can use it to keep track of all your passwords while only needing to remember the single password that unlocks this application.
Tails and Cryptocurrencies Make a Great Team
If you are interested in cryptocurrencies, you definitely want to check out Tails. Its privacy and anonymity make it a safer place to keep your cryptocurrency wallets than a standard computer. Tails includes a Bitcoin wallet in its pre-installed software.
Built-in Bitcoin Support with the Electrum Wallet
The Electrum Bitcoin Wallet comes standard with Tails. With only a little work, you can transfer your Bitcoin keys into Electrum. Once you do, your keys will be safer, and your Bitcoin transactions will gain the anonymity of the Tor network. To learn more about the Electrum Bitcoin Wallet, visit the Electrum Home Page.
What about using Monero with Tails?
Monero is a secure, private, and untraceable cryptocurrency. That makes Tails a natural place to store your Monero. If you want to keep your Monero on Tails, you’ll need to set up Persistent Storage on your Tails USB Stick. That’s because Tails does not have a pre-installed wallet for Monero, like it does for Bitcoin.
If you want the ultimate in security for your Monero, you’ll store it in a cold wallet. Tails is an ideal tool for creating such a wallet. Tails leaves nothing behind on a computer that could help a bad guy get access to your cold wallet or even know it exists. And by using Tails, you’ll be creating your cold wallet on a safer system.
Check out this link if you are interested in creating a Monero cold wallet using Tails.
Is Tails always the best solution for privacy and anonymity?
While Tails is a great privacy operating system, it isn’t the only one available, or even the best for every situation. In particular, people interested in online privacy and anonymity often use Whonix or Qubes.
So which is the best? As usual, the answer is, “it depends.” Let’s see how each one stacks up against Tails.
Is Whonix better than Tails?
Whonix typically runs as two VirtualBox virtual machines. You do your work in one virtual machine(the Workstation). The other (the Gateway) handles all connections between the Workstation and the Internet by passing them through the Tor network.
This design means that any computer that can run VirtualBox should be able to run Whonix. This makes it easy to install Whonix, but there are some big security implications to this design.
When you run Tails from a USB Stick or DVD, it is the only operating system running on the computer. To run Whonix, you need to have the host operating system running too. You can easily jump back and forth between the private and anonymous Whonix workstation and the host computer.
While this is convenient, it makes it all too easy to do something in the host when you should be doing it in Whonix and vice versa. Even worse, Whonix can’t force communications between the host and the Internet to go through Tor. If you do slip up and do something in the host that you shouldn’t, you’ve lost your anonymity.
While Whonix has some advantages, we think Tails is a better privacy solution than Whonix.
Is Qubes better than Tails?
In some ways, Qubes is more like Tails than Whonix is. That’s because when you run Qubes it is the only operating system running on the computer. This is inherently more secure than the Whonix approach, since there is no way to accidentally get “outside” the secure Qubes environment.
Qubes contains its own virtual machines with differing levels of trust for running applications. The virtual machines are completely isolated from each other by Qubes. This limits the damage that a bad app (like spyware or a virus) can do by confining that damage to one virtual machine.
Qubes itself doesn’t provide any real anonymity. To address this, people sometimes run Whonix inside of Qubes.
One big drawback of Qubes (with or without Whonix) is that there isn’t a Live USB version of it. This means that when you use Qubes there will likely be traces of it left over on the host computer once you end your session.
As with Whonix, while Qubes has some benefits, we think Tails is a better solution overall.
Is Tails right for you?
Whether Tails is the “right” operating system for you depends on what you plan to do with it. You probably don’t want to use it as your main operating system. The features that make it such a good privacy tool can make it clumsy for full-time use. Installing your favorite software can be a hassle and may break the privacy protection that Tails provides. Making all your connections to the Internet go through the Tor network will slow down your browsing.
But there are many situations where Tails is extremely useful for anyone concerned with online privacy and anonymity:
- Does it bother you that ISPs and websites watch what you do online and sell that information to marketers or hand it over to spy agencies? If so, using Tails can keep them from finding out anything useful about you.
- Have you ever had your personal data stolen from some poorly protected website by hackers? Using Tails can minimize the amount of data sites have about you. They can’t lose what they don’t have.
- Do you need to visit sensitive websites that your government doesn’t want you to see? With Tails you can anonymously get around the blocks they put up to stop you.
- Does your government have a system like China, where everything you do online is monitored and used to decide whether you are a good citizen or not. You can use Tails to anonymously do the things the government doesn’t like.
- Do you want to keep your cryptocurrencies safe? Keeping your cryptocurrency wallets on a Tails USB Stick adds layers of protection to your cryptos.
In short, virtually anyone reading this can think of situations where they could use the privacy and anonymity that Tails can give you. We think it is a great tool…as long as you remember that nothing is 100% safe and secure. Check out the Tails warnings page to be sure you understand the limitations, then give Tails a try.
And in case you were wondering why they call this thing “Tails,” the name is an acronym. It stands for, “The Amnesic Incognito Live System.” Now you know.