Tails Guide
Tails Guide
html
Unknown Title
You need
2 GB of RAM
64-bit
Intel processor
not M1
2 GB of RAM
64-bit
1/33
Windows 7
or later
or later
Linux
any distribution
Debian
2/33
Ubuntu
or another derivative
Your Tails
1 USB stick
8 GB minimum
1 USB stick
8 GB minimum
Why?
It is currently impossible to manually upgrade a Tails USB stick while running from itself. This scenario
requires creating an intermediary Tails on another USB stick, from which to upgrade your Tails.
3/33
a smartphone
another computer,
or a printer
to follow the instructions
another Tails
1 hour in total
½ hour
¼ hour
1.2 GB to download
½ hour to install
½ hour to upgrade
Your steps
Download Tails
4/33
While you are downloading, we recommend you read the release notes for Tails 5.0 . They document all
the changes in this new version: new features, problems that were solved, and known issues that have
already been identified.
If the download fails, try to download from another mirror. download from another mirror.
The recommendations below will keep you even safer, especially if you are at high risk.
Sharing files with metadata, such as date, time, location, and device information
Using Tails for more than one purpose at a time
5/33
Tails uses the Tor network because it is the strongest and most popular network to protect from
surveillance and censorship.
Limitations of Tor
JPEG and other image files often contain information about where a picture was taken and which
camera was used.
Office documents often contain information about their author, and the date and time the document
was created.
To help you clean metadata, Tails includes mat2, a tool to remove metadata in a wide range of file
formats.
Metadata has been used in the past to locate people from pictures they took. For an example, see NPR:
Betrayed by metadata, John McAfee admits he's really in Guatemala.
6/33
If you use Tails sessions for more than one purpose at a time, an adversary could link your different
activities together.
For example, if you log into different accounts on the same website in a single Tails session, the website
could determine that the accounts are used by the same person. This is because websites can tell when
2 accounts are using the same Tor circuit.
To prevent an adversary from linking your activities together while using Tails, restart Tails between
different activities. For example, restart Tails between checking your work email and your whistleblowing
email.
We are not aware of any such attacks to deanonymize people online who used Tails for different
purposes at a time.
If you worry that the files in your Persistent Storage could be used to link your activities together, consider
using a different Tails USB stick for each activity. For example, use one Tails USB stick for your activism
work and another one for your journalism work.
Tor and Tails don't protect you by making you look like any random Internet user, but by making all Tor
and Tails users look the same. It becomes impossible to know who is who among them.
Your Internet service provider (ISP) and local network can see that you connect to the Tor network.
They still cannot know what sites you visit. To hide that you connect to Tor, you can use a Tor
bridge.
The sites that you visit can know that you are using Tor, because the list of exit nodes of the Tor
network is public.
Parental controls, Internet service providers, and countries with heavy censorship can identify and block
connections to the Tor network that don't use Tor bridges.
Many websites ask you to solve a CAPTCHA or block access from the Tor network.
7/33
The exit node can:
Observe your traffic. That is why Tor Browser and Tails include tools, like HTTPS Everywhere, to
encrypt the connection between the exit node and the destination server, whenever possible.
To learn more about what information is available to someone observing the different parts of a Tor
circuit, see the interactive graphics at Tor FAQ: Can exit nodes eavesdrop on communications?.
Tor exit nodes have been used in the past to collect sensitive information from unencrypted connections.
Malicious exit nodes are regularly identified and removed from the Tor network. For an example, see Ars
Technica: Security expert used Tor to collect government e-mail passwords.
No anonymity network used for rapid connections, like browsing the web or instant messaging, can
protect 100% from end-to-end correlation attacks. In this case, VPNs (Virtual Private Networks) are less
secure than Tor, because they do not use 3 independent relays.
End-to-end correlation attacks have been studied in research papers, but we don't know of any actual
use to deanonymize Tor users. For an example, see Murdoch and Zieliński: Sampled Traffic Analysis by
Internet-Exchange-Level Adversaries.
8/33
Tails protects you from viruses and malware on your usual operating system. This is because Tails runs
independently from other operating systems.
But your Tails might be corrupted if you install from a compromised operating system. To reduce that risk:
Always install Tails from a trusted operating system. For example, download Tails on a computer
without viruses or clone Tails from a trusted friend.
Do not plug your Tails USB stick while another operating system is running on the computer.
Use your Tails USB stick only to run Tails. Do not use your Tails USB stick to transfer files to or
from another operating system.
If you worry that your Tails might be corrupted, do a manual upgrade from a trusted operating system.
We don't know of any virus able to infect a Tails installation, but one could be created in the future.
Try to keep your computer in a safe location. Hardware alterations are more likely on public computers, in
internet cafés or libraries, and on desktop computers, where a device is easier to hide.
Use a password manager to paste saved passwords. This way, you don't have to type passwords
that might be visible to people or cameras near you.
Use the Screen Keyboard, if you are using a public computer or worry that the computer might
have a keylogger.
Keyloggers are easy to buy and hide on desktop computers but not on laptops. For an example, see
KeeLog: KeyGrabber forensic keylogger getting started.
Other hardware alterations are much more complicated and expensive to install. For an example, see Ars
Technica: Photos of an NSA “upgrade” factory show Cisco router getting implant.
9/33
Keeping your computer in a safe location can protect against some firmware attacks, but some other
firmware attacks can be performed remotely.
Firmware attacks have been demonstrated, but are complicated and expensive to perform. We don't
know of any actual use against Tails users. For an example, see LegbaCore: Stealing GPG keys/emails
in Tails via remote firmware infection.
Because you always have to adapt your digital security practices to your specific needs and threats, we
encourage you to learn more by reading the following guides:
5.0
Verify your download to make sure that it is safe and was not corrupted during download.
Your BitTorrent client will automatically verify your download when it completes.
You seem to have JavaScript disabled. To verify your download, you can either:
Compare manually the checksum of your download with the checksum of our images.
See our documentation on calculating checksums using GtkHash.
Verify your download using our OpenPGP signing key and OpenPGP signature. OpenPGP
signature.
10/33
We don't provide instructions to verify downloads with OpenPGP anymore.
You seem to be using Internet Explorer. To verify your download, please use a different browser.
If you don't know how to use the OpenPGP signature, click instead on the button Select your
download… to verify your download with JavaScript.
Verifying $FILENAME…
Why?
Most likely, the verification failed because of an error or interruption during the download.
The verification also fails if you try to verify a different download than the latest version, Tails 5.0 .
Less likely, the verification might have failed because of a malicious download from our download mirrors
or due to a network attack in your country or local network.
Downloading again is usually enough to fix this problem. Otherwise, please try downloading from a
different place or a different computer.
Make sure that you select a USB image that is readable by your browser.
Make sure that you select an ISO image that is readable by your browser.
Retry…
11/33
Error downloading checksum file from our website.
Retry…
Retry…
Download balenaEtcher
In the following steps, you will install an intermediary Tails using the Tails USB image that you
downloaded earlier.
balenaEtcher starts.
12/33
Install an intermediary Tails using balenaEtcher
13/33
1. Plug in the USB stick on which you want to install Tails. the intermediary Tails.
If the verification of balenaEtcher fails, try to install again or try using a different USB stick.
5. Close balenaEtcher.
If a notification about the USB stick not being readable appears, click Eject to eject the USB stick.
14/33
Open these instructions on another device
If you already started on the other Tails, go directly to step 3: Verify that the other Tails is up-to-date.
In the next step, you will shut down the computer. To be able to follow the rest of the instructions
afterwards, you can either:
15/33
Print these instructions on paper.
https://tails.boum.org/install/windows?back=1
https://tails.boum.org/install/mac?back=1
https://tails.boum.org/install/linux?back=1
https://tails.boum.org/install/expert?back=1
https://tails.boum.org/install/clone/pc?back=1
https://tails.boum.org/install/clone/mac?back=1
https://tails.boum.org/upgrade/tails?back=1
https://tails.boum.org/upgrade/windows?back=1
https://tails.boum.org/upgrade/mac?back=1
https://tails.boum.org/upgrade/linux?back=1
https://tails.boum.org/upgrade/clone?back=1
16/33
Make the computer start on the USB stick
1. Click on the Start button.
2. Press and hold the Shift key while you choose Power ▸ Restart.
If the Choose an option screen does not appear, refer to the instructions on starting Tails using the
Boot Menu key.
Windows shuts down, the computer restarts, and a Boot Menu appears.
Plug in your Tails USB stick shortly after choosing Boot Menu and while Windows is shutting down.
In the future, we We recommend that you only plug in your Tails USB stick while Windows is
shutting down. Otherwise, a virus in Windows could infect your Tails USB stick and break its
security.
17/33
Such an attack is possible in theory but very unlikely in practice. We don't know of any virus
capable of infecting Tails. See our warning on plugging Tails in untrusted systems.
The Boot Menu is a list of possible devices to start from. The following screenshot is an example of
a Boot Menu:
5. In the Boot Menu, select your USB stick and press Enter.
6. If the computer starts on Tails, the Boot Loader appears and Tails starts automatically after 4
seconds.
Most computers do not start on the Tails USB stick automatically but you can press a Boot Menu key to
display a list of possible devices to start from.
18/33
If Windows 8 or 10 is also installed on the computer, you can refer instead to the instructions on starting
Tails from Windows 8 or 10. Starting Tails from Windows is easier than using the Boot Menu key.
This animation summarizes how to use the Boot Menu key to start on the USB stick:
0:00
The following instructions explain in detail how to use the Boot Menu key to start on the USB stick:
1. Shut down the computer while leaving the USB stick plugged in.
Shut down the computer and plug in the Tails USB stick.
Plug in the other Tails USB stick that you want to install upgrade from.
Unplug your Tails USB stick while leaving the intermediary USB stick plugged in.
19/33
2. Identify the possible Boot Menu keys for the computer depending on the computer manufacturer in
the following list:
Manufacturer Key
Acer F12, F9, F2, Esc
Apple Option
Asus Esc
Clevo F7
Dell F12
Fujitsu F12, Esc
HP F9
Huawei F12
Intel F10
Lenovo F12
MSI F11
Samsung Esc, F12, F2
Sony F11, Esc, F10
Toshiba F12
others… F12, Esc
On many computers, a message is displayed very briefly when switching on that also explains how
to get to the Boot Menu or edit the BIOS settings.
Immediately press several times the first possible Boot Menu key identified in step 2.
4. If the computer starts on another operating system or returns an error message, shut down the
computer again and repeat step 3 for all the possible Boot Menu keys identified in step 2.
If a Boot Menu with a list of devices appears, select your USB stick and press Enter.
5. If the computer starts on Tails, the Boot Loader appears and Tails starts automatically after 4
seconds.
20/33
1. Shut down the computer.
Shut down the computer while leaving the USB stick plugged in.
Plug in the other Tails USB stick that you want to install from.
Immediately press-and-hold the Option key (Alt key) when the startup chime is played.
Hold the key pressed until a list of possible startup disks appears.
21/33
4. Choose the USB stick and press Enter. The USB stick appears as an external hard disk and might
be labeled EFI Boot or Windows like in the following screenshot:
If the USB stick does not appear in the list of startup disks:
3. Make sure that you are running the latest version of macOS.
22/33
7. Try using the same USB stick to start on a different computer.
If your computer still does not display the Boot Loader, it might currently be impossible to start Tails
on your computer.
Security settings do not allow this Mac to use an external startup disk.
Then you have to change the settings of the Startup Security Utility of your Mac to authorize
starting from Tails.
1. Turn on your Mac, then press and hold Command(⌘)+R immediately after you see the
Apple logo. Your Mac starts up from macOS Recovery.
2. When you see the macOS Utilities window, choose Utilities ▸ Startup Security Utility from
the menu bar.
3. When you are asked to authenticate, click Enter macOS Password, then choose an
administrator account and enter its password.
23/33
To still protect your Mac from starting on untrusted external media, you can set a firmware
password, available on macOS Mountain Lion or later. A firmware password prevents users who do
not have the password from starting up from any media other than the designated startup disk.
If you forget your firmware password you will require an in-person service appointment with
an Apple Store or Apple Authorized Service Provider.
6. If the computer starts on Tails, the Boot Loader appears and Tails starts automatically after 4
seconds.
Troubleshooting
If no Boot Menu appears, or if your USB stick is not listed in the Boot Menu, refer to the instructions
on starting Tails using the Boot Menu key.
If none of the possible Boot Menu keys from the previous technique work, or if your USB stick is not
listed in the Boot Menu, refer to the troubleshooting instructions about Tails not starting at all.
If your USB stick is listed in the Boot Menu but the Boot Loader does not appear:
If your USB stick appears in the list of startup disks but the Boot Loader does not appear:
24/33
2. Make sure that you are running the latest version of macOS.
If your computer still does not display the Boot Loader, it might currently be impossible to start Tails
on your computer.
If the Boot Loader appears but Tails fails to start after the Boot Loader, refer to the troubleshooting
section about Tails not starting after the Boot Loader. the troubleshooting section about Tails not
starting after the Boot Loader.
Starting the computer using a Boot Menu key can be faster than starting the computer on Windows first
and then on Tails. We recommend you learn how to start Tails using the Boot Menu key if you use Tails
regularly.
Apple does not prioritize collaborating with Free Software projects. Their newest hardware is usually very
hard for Free Software developers to get working with Linux, and thus Tails. PC hardware tends to be
more open and work better with Linux.
Welcome to Tails!
Starting Tails
1. After the Boot Menu, a loading screen appears.
25/33
2. One to two minutes after the Boot Loader and the loading screen, the Welcome Screen appears.
3. In the Welcome Screen, select your language and keyboard layout in the Language & Region
section. Click Start Tails.
26/33
Welcome to your new Tails!
27/33
2. Choose Wi-Fi Not Connected and then Select Network.
3. After establishing a connection to a local network, the Tor Connection assistant appears to help you
connect to the Tor network.
28/33
You receive the notification Connection failed: Activation of network connection failed.
The interface is disabled when starting Tails or when plugging in your USB Wi-Fi adapter:
In this case, you can disable MAC address anonymization to get your Wi-Fi interface to work in
Tails. Disabling MAC address anonymization has security implications, so read carefully our
documentation about MAC address anonymization before doing so.
Use an Ethernet cable instead of Wi-Fi if possible. Wired interfaces work much more reliably than
Wi-Fi in Tails.
Share the Wi-Fi or mobile data connection of your phone using a USB cable. Sharing a connection
this way is called USB tethering.
iPhones or iPads
Only sharing mobile data works on iPhones and iPads; sharing Wi-Fi does not work.
Android
Tails cannot hide the information that identifies your phone on the local network. If you connect your
phone to:
A Wi-Fi network, then the network will know the MAC address of your phone. This has
security implications that are discussed in our documentation on MAC address
29/33
anonymization. Some phones have a feature to hide the real MAC address of the phone.
A mobile data network, then the network will be able to know the identifier of your SIM card
(IMSI) and also the serial number of your phone (IMEI).
You can optionally create an encrypted Persistent Storage in the remaining free space on your new Tails
USB stick to store any of the following:
Personal files
Some settings
Additional software
Encryption keys
The Persistent Storage is not hidden. An attacker in possession of your USB stick can know that there is
a Persistent Storage on it. Take into consideration that you can be forced or tricked to give out its
passphrase.
It is possible to unlock the Persistent Storage from other operating systems. But, doing so might
compromise the security provided by Tails.
30/33
For example, image thumbnails might be created and saved by the other operating system. Or, the
contents of files might be indexed by the other operating system.
Other operating systems should probably not be trusted to handle sensitive information or leave no trace.
2. Specify a passphrase of your choice in both the Passphrase and Verify Passphrase text boxes.
We recommend choosing a long passphrase made of five to seven random words. See this article
about memorizable and secure passphrases.
5. The list of features of the Persistent Storage appears. Each feature corresponds to a set of files or
settings that can be saved in the Persistent Storage.
We recommend you to only turn on the Personal Data feature for the time being. You can turn on
more features later on according to your needs.
6. Click Save.
31/33
Select your language and keyboard layout in the Language & Region section.
In the Encrypted Persistent Storage section, enter your passphrase and click Unlock to
unlock the Persistent Storage for the current working session.
4. You can now save your personal files and working documents in the Persistent folder. To open the
Persistent folder choose Places ▸ Persistent.
Final recommendations
32/33
You should regularly make a backup of your Persistent Storage in case your Tails USB stick becomes lost
or damaged.
33/33