An Operating System Designed to Disappear

Most operating systems are designed to remember everything — your files, your browsing history, your logins. Tails (The Amnesic Incognito Live System) is designed to do the opposite. It's a live operating system that you boot from a USB drive or DVD, and when you shut it down, it leaves no trace on the machine you used.

Tails has been used by journalists communicating with whistleblowers, activists operating in repressive regimes, security researchers, and privacy-conscious individuals around the world. Edward Snowden reportedly used it. The Tor Project endorses it. And it's entirely free and open source.

How Tails Works

Tails is based on Debian Linux and is designed to run entirely in your computer's RAM. Here's what makes it special:

  • Amnesic by design: Nothing is written to the host computer's hard drive. Shut it down and the session is gone.
  • All traffic routed through Tor: Every internet connection made in Tails is automatically tunneled through the Tor network, masking your IP address.
  • Included privacy tools: Comes pre-installed with the Tor Browser, KeePassXC password manager, OnionShare, Thunderbird with OpenPGP, and more.
  • Persistent storage (optional): You can create an encrypted persistent volume on the USB drive to save files and settings securely between sessions.

Who Uses Tails and Why?

User TypeWhy They Use Tails
JournalistsCommunicate securely with sources without leaving metadata trails
ActivistsOrganize and communicate safely in countries with internet censorship
Security ResearchersAnalyze malware in an isolated, disposable environment
Privacy AdvocatesBrowse and communicate without surveillance or tracking
WhistleblowersLeak sensitive documents without exposing their identity

Getting Started with Tails

What You Need

  • A USB drive with at least 8 GB of storage (16 GB recommended if you want persistent storage)
  • A computer that can boot from USB
  • A trusted machine to download and verify Tails initially

Installation Steps

  1. Download the Tails ISO image from the official site: tails.boum.org
  2. Verify the download using the provided cryptographic signature — this step is critical to ensure you have a legitimate copy.
  3. Flash the image to your USB drive using the Tails Installer or a tool like Balena Etcher.
  4. Reboot your computer and select the USB drive as the boot device (usually via F12 or the BIOS boot menu).
  5. Tails will boot into a desktop environment — you're now running anonymously.

Limitations to Be Aware Of

Tails is powerful, but it's not a silver bullet for anonymity. Understand its limitations:

  • Behavioral patterns matter: If you log into personal accounts while using Tails, you've de-anonymized yourself.
  • BIOS/UEFI malware: A deeply compromised host machine could theoretically interfere at the firmware level.
  • Tor exit node monitoring: Traffic exiting the Tor network can be monitored if it's unencrypted (always use HTTPS).
  • Not for everyday use: Tails is optimized for anonymity, not convenience. Expect to adapt your workflow.

Is It Legal?

Using Tails is entirely legal in most countries. It's a tool — like a VPN or encrypted messaging app. What you do with it determines legality. Tails is actively maintained, audited, and endorsed by respected organizations in the privacy and security community.