Tails is a live operating system that you can start on many computers from a DVD, a USB stick or an SD card.
The operating system that is also used by Edward Snowden. Edward strongly recommends the use of this operating system for privacy protection!
It aims to be yours Privacy and a anonymity to preserve and help you:
- to use the internet anonymously and a To bypass censorship;
All connections to the Internet are mandatory through the Gate network passed;
- on the computer used to leave no tracesunless you expressly request it;
- cryptographic tools Using state-of-the-art technology to encrypt your files, emails and instant messaging messages.
Tails is also easy to use and runs on almost all devices (Windows PC, Apple Mac Hardware etc.)
Tails is Free Software that has been released under the GNU General Public License (version 3 or higher) free!
Tails is a complete operating system that is used directly from a DVD, USB flash drive or SD card, regardless of the operating system installed on the computer. Tails is Free Software and is based on Debian GNU / Linux.
Tails includes several programs that have been preconfigured for security: a web browser, an instant messaging client, an e-mail program, an office suite, an image and audio editor, etc.
The "Tails' homepage also informs very simply and also in German about the installation.
Anonymity online and censorship evasion with Tor
Tails relies on the Tor anonymization network to protect your online privacy:
- All software is configured to connect to the Internet via Tor.
- If an application attempts to connect directly to the Internet, the connection is automatically blocked for security.
Tor is Free Software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business relationships, and country security: so-called "traffic data analysis."
Tor protects you by leaping your communications through a distributed network of relays run by volunteers from around the world. It prevents anyone who is watching your Internet connection from seeing which pages you are visiting and makes sure that the pages you visit can not locate your actual location.
With Tor you can:
- Be anonymous by hiding your location online.
- Connect with services that would otherwise be censored.
- Resist attacks that block Tor, by using bypass software such as the Tor Bridges (bridges in the Tor network).
More about Tor can be found on the official Website of the Tor project:
- Why we need Tor (in English)
- How Tor works (in English)
- Who uses Tor? (in English)
- Understanding and using Tor - An introduction for laymen (in English)
Use a computer everywhere without leaving a trace
Using Tails on a computer does not change the installed operating system, nor does it depend on it. So it can be used equally on your own computer, a friend's, or a local library computer. After you have shut down Tails, the computer can start as usual with its usual operating system.
Tails is configured with great care not to use the hard drives of the computer, even if swap space is available. The only memory used by Tails is random access memory (RAM), which is automatically deleted when the computer shuts down. So they leave no trace of the Tails system, nor of what you have done on the computer. That's why we call Tails "amnesic".
This allows you to work on sensitive documents on any computer and protects you from data recovery after shutdown. Of course, you can still save selected documents and files to another USB flash drive or external hard drive, and take it with you for future use.
TOR is a great thing for surfing the web, unfortunately many services are not supported, such as. Filesharing or watching videos. In addition, some banking sites also block the use of TOR. Thus, the combination is certainly only sufficiently successful in connection with an anonymous VPN provider.