Type: Live operating system — boots from USB
Access: USB drive required — free download
Account required: No
Clearnet version: tails.boum.org
Open source: Yes — fully audited
Tor routing: All traffic — automatic, no configuration
Forensic trace: None — amnesic by design
Last verified: March 2026
What Is Tails OS?
Tails (The Amnesic Incognito Live System) is a live operating system you boot from a USB drive. It routes all internet traffic through Tor by default, leaves no forensic trace on the host computer after shutdown and resets to a completely clean state on every reboot. It is free, open-source and actively maintained by a dedicated security team.
Tails is used by journalists, whistleblowers, activists and privacy-conscious individuals worldwide. Edward Snowden used it. The Tor Project recommends it. Security researchers consistently endorse it as the most practical high-security option for users who need strong anonymity without deep technical expertise. It was designed specifically for people who need strong privacy but cannot be expected to configure complex security systems manually.
Download
Verify your download: Tails provides multiple verification methods — browser extension, OpenPGP signature and BitTorrent. Always verify before writing to USB. An unverified Tails installation is a security risk.
How Tails Works
Tails runs entirely from the USB drive and loads into your computer’s RAM. It does not interact with your computer’s internal hard drive — it cannot read files stored there and it writes nothing to it. When you shut down Tails, the RAM is wiped and the session disappears completely.
| Feature | How It Works |
|---|---|
| Tor routing | All applications route through Tor automatically — no configuration needed |
| Amnesia | RAM wiped on shutdown — no session data persists on host machine |
| Hard drive isolation | Internal drives not mounted — Tails cannot read or write to them |
| Persistent storage | Optional encrypted volume on USB for files that must persist between sessions |
| MAC address spoofing | Network hardware address randomized on each boot |
| Clock synchronization | System clock synchronized via Tor to prevent time-based fingerprinting |
What’s Included in Tails
| Tool | Purpose |
|---|---|
| Tor Browser | Anonymous web browsing — pre-configured and hardened |
| OnionShare | Anonymous file sharing and receiving |
| Thunderbird + Enigmail | Encrypted email with PGP support |
| KeePassXC | Password manager — stored in persistent volume |
| MAT2 | Metadata removal from documents and images |
| VeraCrypt | Encrypted file containers and volumes |
| LibreOffice | Document editing — full office suite |
| Electrum | Bitcoin wallet |
| GnuPG | PGP encryption and key management |
How to Install Tails
- Go to tails.boum.org/install and download the Tails image for your operating system
- Verify the download using the method appropriate for your OS — browser extension recommended for beginners
- Write the Tails image to a USB drive using Balena Etcher (Windows/Mac) or the GNOME Disks utility (Linux) — minimum 8GB USB required
- Restart your computer and boot from the USB drive — this requires changing boot order in BIOS/UEFI settings
- Tails boots to the Welcome Screen — configure language and optional settings
- Click Start Tails — you are now running a fully anonymous, Tor-routed operating system
Booting from USB: Different computers use different keys to access the boot menu — commonly F12, F2, Del, or Esc. Consult your computer’s documentation or the Tails installation guide for model-specific instructions.
Persistent Storage
By default, Tails forgets everything when you shut down. This amnesia is a core security feature — but it means you must reconfigure settings and re-enter credentials on every boot.
Persistent storage is an optional encrypted volume on the Tails USB drive that survives reboots. You can choose what to store there:
- Browser bookmarks
- Saved passwords (KeePassXC database)
- PGP keys
- Bitcoin wallet
- Personal files and documents
- Additional software installed during sessions
Persistent storage is encrypted with a passphrase you set during creation. It is protected even if someone physically obtains your USB drive — they cannot access the contents without the passphrase.
What persistent storage does not do: It does not make Tails less amnesic with respect to the host computer. The host computer’s hard drive remains untouched regardless of whether persistent storage is enabled. Persistent storage only affects what is saved on the Tails USB drive itself.
Tails vs. Regular Operating Systems for Dark Web Use
| Feature | Tails | Windows + Tor Browser | Linux + Tor Browser |
|---|---|---|---|
| All traffic through Tor | ✅ Automatic | ❌ Browser only | ❌ Browser only |
| Forensic trace on host | ✅ None | ❌ Significant | ❌ Some |
| Hard drive isolation | ✅ Complete | ❌ None | ❌ None |
| Privacy tools pre-installed | ✅ Full suite | ❌ Manual installation | ❌ Manual installation |
| Usable on any computer | ✅ Yes — boots from USB | ❌ Installed on specific machine | ❌ Installed on specific machine |
| Setup complexity | ⚠️ Moderate — USB boot | ✅ Low | ⚠️ Moderate |
Tails vs. Whonix
| Feature | Tails | Whonix |
|---|---|---|
| Amnesic | ✅ Yes — forgets everything | ❌ No — persists between sessions |
| Runs from | USB drive — any computer | Virtual machines — specific host |
| Best for | One-time high-stakes sessions | Ongoing anonymous work |
| Host computer isolation | ✅ Complete | ⚠️ Partial — VM isolation |
| Setup difficulty | ⚠️ Moderate | ⚠️ High — requires virtualization |
When to Use Tails
Use Tails when:
- You need to submit documents to journalists or whistleblower platforms
- You are accessing dark web resources from a computer you do not own or fully control
- You need to leave no forensic trace of your session
- You are in a high-risk environment where device seizure is possible
- You need all applications — not just the browser — to route through Tor
Tails may be overkill when:
- You only need anonymous browsing — Tor Browser alone is sufficient
- You need to work across multiple sessions with persistent data — consider Whonix instead
- Your computer cannot boot from USB — some older or locked-down machines prevent this
Common Mistakes When Using Tails
Logging into personal accounts. Logging into Gmail, Facebook or any account linked to your real identity inside Tails links that session to your identity — regardless of Tails’ other protections. Never use Tails for activities linked to your real identity and activities requiring anonymity in the same session.
Opening downloaded files while online. Files downloaded from .onion sites may contain code that phones home when opened — bypassing Tor and revealing your real IP. Open all downloaded files after disconnecting from the network, or use the dedicated offline mode Tails provides for this purpose.
Using public Wi-Fi that requires a login. Captive portals — hotel Wi-Fi login pages, airport networks — require browser interaction before Tor connects. Tails includes a special Unsafe Browser for completing captive portal logins, but using it exposes your real MAC address to the network briefly. Use Tails’ MAC address spoofing to mitigate this.
Forgetting that the host computer’s keyboard may be monitored. Hardware keyloggers and BIOS-level surveillance tools operate below Tails’ level of protection. In environments where physical compromise of the computer is possible, Tails cannot protect against keyloggers installed in hardware.
Frequently Asked Questions
Can I use Tails on a Mac?
Yes, with some limitations. Intel-based Macs support Tails without significant issues. Apple Silicon Macs (M1, M2, M3 chips) have compatibility limitations due to Apple’s boot security architecture — check the Tails website for current Mac compatibility status before purchasing a USB drive for this purpose.
Will using Tails slow down my computer?
Tails runs from RAM, which is faster than a traditional hard drive but slower than an SSD. Performance depends on your computer’s RAM — Tails requires a minimum of 2GB but runs better with 4GB or more. Older computers with limited RAM may run Tails slowly. The Tor routing adds latency to internet connections regardless of computer speed.
Can someone tell I’m using Tails from the outside?
Your ISP can see that you are connecting to the Tor network — this is visible regardless of whether you use Tails or Tor Browser on a regular OS. They cannot see what you are doing inside Tor. If you need to hide the fact that you are using Tor from your ISP, use Tails with Tor bridges — obfuscated entry points that make Tor traffic look like regular HTTPS traffic.
Is Tails legal?
Tails is legal software in virtually all jurisdictions. Using an operating system that routes traffic through Tor is not illegal. Some countries restrict Tor usage more broadly — in those contexts, using Tails with obfuscated bridges is advisable. What you do while running Tails is subject to the same laws as any other computing activity.
Do I need to install anything on the host computer?
No. Tails runs entirely from the USB drive and does not install anything on the host computer. You boot from the USB, use Tails, and when you shut down, the host computer is exactly as it was before — with no record of the Tails session.