Tails OS — Anonymous Operating System Guide (2026)

Type: Live operating system — boots from USB

Access: USB drive required — free download

Account required: No

Clearnet version: tails.boum.org

Open source: Yes — fully audited

Tor routing: All traffic — automatic, no configuration

Forensic trace: None — amnesic by design

Last verified: March 2026

What Is Tails OS?

Tails (The Amnesic Incognito Live System) is a live operating system you boot from a USB drive. It routes all internet traffic through Tor by default, leaves no forensic trace on the host computer after shutdown and resets to a completely clean state on every reboot. It is free, open-source and actively maintained by a dedicated security team.

Tails is used by journalists, whistleblowers, activists and privacy-conscious individuals worldwide. Edward Snowden used it. The Tor Project recommends it. Security researchers consistently endorse it as the most practical high-security option for users who need strong anonymity without deep technical expertise. It was designed specifically for people who need strong privacy but cannot be expected to configure complex security systems manually.

Download

https://tails.boum.org/install/

Verify your download: Tails provides multiple verification methods — browser extension, OpenPGP signature and BitTorrent. Always verify before writing to USB. An unverified Tails installation is a security risk.

How Tails Works

Tails runs entirely from the USB drive and loads into your computer’s RAM. It does not interact with your computer’s internal hard drive — it cannot read files stored there and it writes nothing to it. When you shut down Tails, the RAM is wiped and the session disappears completely.

Feature How It Works
Tor routing All applications route through Tor automatically — no configuration needed
Amnesia RAM wiped on shutdown — no session data persists on host machine
Hard drive isolation Internal drives not mounted — Tails cannot read or write to them
Persistent storage Optional encrypted volume on USB for files that must persist between sessions
MAC address spoofing Network hardware address randomized on each boot
Clock synchronization System clock synchronized via Tor to prevent time-based fingerprinting

What’s Included in Tails

Tool Purpose
Tor Browser Anonymous web browsing — pre-configured and hardened
OnionShare Anonymous file sharing and receiving
Thunderbird + Enigmail Encrypted email with PGP support
KeePassXC Password manager — stored in persistent volume
MAT2 Metadata removal from documents and images
VeraCrypt Encrypted file containers and volumes
LibreOffice Document editing — full office suite
Electrum Bitcoin wallet
GnuPG PGP encryption and key management

How to Install Tails

  1. Go to tails.boum.org/install and download the Tails image for your operating system
  2. Verify the download using the method appropriate for your OS — browser extension recommended for beginners
  3. Write the Tails image to a USB drive using Balena Etcher (Windows/Mac) or the GNOME Disks utility (Linux) — minimum 8GB USB required
  4. Restart your computer and boot from the USB drive — this requires changing boot order in BIOS/UEFI settings
  5. Tails boots to the Welcome Screen — configure language and optional settings
  6. Click Start Tails — you are now running a fully anonymous, Tor-routed operating system

Booting from USB: Different computers use different keys to access the boot menu — commonly F12, F2, Del, or Esc. Consult your computer’s documentation or the Tails installation guide for model-specific instructions.

Persistent Storage

By default, Tails forgets everything when you shut down. This amnesia is a core security feature — but it means you must reconfigure settings and re-enter credentials on every boot.

Persistent storage is an optional encrypted volume on the Tails USB drive that survives reboots. You can choose what to store there:

  • Browser bookmarks
  • Saved passwords (KeePassXC database)
  • PGP keys
  • Bitcoin wallet
  • Personal files and documents
  • Additional software installed during sessions

Persistent storage is encrypted with a passphrase you set during creation. It is protected even if someone physically obtains your USB drive — they cannot access the contents without the passphrase.

What persistent storage does not do: It does not make Tails less amnesic with respect to the host computer. The host computer’s hard drive remains untouched regardless of whether persistent storage is enabled. Persistent storage only affects what is saved on the Tails USB drive itself.

Tails vs. Regular Operating Systems for Dark Web Use

Feature Tails Windows + Tor Browser Linux + Tor Browser
All traffic through Tor ✅ Automatic ❌ Browser only ❌ Browser only
Forensic trace on host ✅ None ❌ Significant ❌ Some
Hard drive isolation ✅ Complete ❌ None ❌ None
Privacy tools pre-installed ✅ Full suite ❌ Manual installation ❌ Manual installation
Usable on any computer ✅ Yes — boots from USB ❌ Installed on specific machine ❌ Installed on specific machine
Setup complexity ⚠️ Moderate — USB boot ✅ Low ⚠️ Moderate

Tails vs. Whonix

Feature Tails Whonix
Amnesic ✅ Yes — forgets everything ❌ No — persists between sessions
Runs from USB drive — any computer Virtual machines — specific host
Best for One-time high-stakes sessions Ongoing anonymous work
Host computer isolation ✅ Complete ⚠️ Partial — VM isolation
Setup difficulty ⚠️ Moderate ⚠️ High — requires virtualization

When to Use Tails

Use Tails when:

  • You need to submit documents to journalists or whistleblower platforms
  • You are accessing dark web resources from a computer you do not own or fully control
  • You need to leave no forensic trace of your session
  • You are in a high-risk environment where device seizure is possible
  • You need all applications — not just the browser — to route through Tor

Tails may be overkill when:

  • You only need anonymous browsing — Tor Browser alone is sufficient
  • You need to work across multiple sessions with persistent data — consider Whonix instead
  • Your computer cannot boot from USB — some older or locked-down machines prevent this

Common Mistakes When Using Tails

Logging into personal accounts. Logging into Gmail, Facebook or any account linked to your real identity inside Tails links that session to your identity — regardless of Tails’ other protections. Never use Tails for activities linked to your real identity and activities requiring anonymity in the same session.

Opening downloaded files while online. Files downloaded from .onion sites may contain code that phones home when opened — bypassing Tor and revealing your real IP. Open all downloaded files after disconnecting from the network, or use the dedicated offline mode Tails provides for this purpose.

Using public Wi-Fi that requires a login. Captive portals — hotel Wi-Fi login pages, airport networks — require browser interaction before Tor connects. Tails includes a special Unsafe Browser for completing captive portal logins, but using it exposes your real MAC address to the network briefly. Use Tails’ MAC address spoofing to mitigate this.

Forgetting that the host computer’s keyboard may be monitored. Hardware keyloggers and BIOS-level surveillance tools operate below Tails’ level of protection. In environments where physical compromise of the computer is possible, Tails cannot protect against keyloggers installed in hardware.

Frequently Asked Questions

Can I use Tails on a Mac?

Yes, with some limitations. Intel-based Macs support Tails without significant issues. Apple Silicon Macs (M1, M2, M3 chips) have compatibility limitations due to Apple’s boot security architecture — check the Tails website for current Mac compatibility status before purchasing a USB drive for this purpose.

Will using Tails slow down my computer?

Tails runs from RAM, which is faster than a traditional hard drive but slower than an SSD. Performance depends on your computer’s RAM — Tails requires a minimum of 2GB but runs better with 4GB or more. Older computers with limited RAM may run Tails slowly. The Tor routing adds latency to internet connections regardless of computer speed.

Can someone tell I’m using Tails from the outside?

Your ISP can see that you are connecting to the Tor network — this is visible regardless of whether you use Tails or Tor Browser on a regular OS. They cannot see what you are doing inside Tor. If you need to hide the fact that you are using Tor from your ISP, use Tails with Tor bridges — obfuscated entry points that make Tor traffic look like regular HTTPS traffic.

Is Tails legal?

Tails is legal software in virtually all jurisdictions. Using an operating system that routes traffic through Tor is not illegal. Some countries restrict Tor usage more broadly — in those contexts, using Tails with obfuscated bridges is advisable. What you do while running Tails is subject to the same laws as any other computing activity.

Do I need to install anything on the host computer?

No. Tails runs entirely from the USB drive and does not install anything on the host computer. You boot from the USB, use Tails, and when you shut down, the host computer is exactly as it was before — with no record of the Tails session.