📝 Introduction
Tails (The Amnesic Incognito Live System) is a security-focused operating system you run from a USB stick. It routes traffic through Tor by default and leaves no trace on the computer you use unless you choose to enable Persistent Storage.
Important: This guide is for legitimate privacy and security. Always follow local laws and ethical guidelines.
🔒 What is Tails?
- Live system: Runs entirely from USB and memory.
- Amnesic: By default, it forgets everything on shutdown.
- Tor by default: Network traffic is routed through the Tor network.
- Optional persistence: You can keep selected files/settings encrypted on the USB.
🧾 Download & Verify Tails
Why verify? Verification ensures the image you downloaded is authentic and not tampered with.
Windows / macOS — easiest: use the official website’s verification
- Go to the official Tails website and download the latest
.img(or.img.xz). - Follow the on-page verification (browser extension or automatic verification flow) if offered.
Linux — verify with OpenPGP (advanced)
What it does: Uses the Tails signing key to verify the image signature.
# 1) Install GnuPG (if needed)
sudo apt update && sudo apt install -y gnupg
# 2) Download the Tails signing key and the signature file (replace filenames/URLs as needed)
# curl -O https://tails.net/tails-signing.key
# curl -O tails-amd64-latest.img.sig
# 3) Import the signing key
gpg --import tails-signing.key
# 4) Verify the image (replace with your actual image filename)
gpg --verify tails-amd64-latest.img.sig tails-amd64-latest.img
Expected: Good signature and the key fingerprint that matches Tails’ official fingerprint.
💽 Create a Bootable USB (Windows/macOS/Linux)
You need a USB drive (8 GB or larger). All data on it will be erased.
Windows & macOS — use balenaEtcher (beginner-friendly)
- Install balenaEtcher from the official site.
- Open Etcher → Flash from file → choose the Tails
.img/.img.xz. - Select your USB drive → click Flash.
- Wait for completion and safely eject the USB.
Linux — use the command line (advanced)
What it does: Writes the image directly to your USB device. Be 100% sure about the device path.
# Identify your USB device (look for the right size/name)
lsblk
# Suppose your USB device is /dev/sdX (replace X). Unmount any partitions:
sudo umount /dev/sdX* 2>/dev/null
# Write the image (replace with your actual filename and device)
sudo dd if=tails-amd64-latest.img of=/dev/sdX bs=4M status=progress oflag=sync
# Flush write cache and safely remove
sync && sudo eject /dev/sdX
Tip: On many Linux distros you can also use the “USB Image Writer” GUI tool.
⚙️ Boot from the USB Drive
- Insert the Tails USB into the computer you want to use.
- Power it on and immediately open the Boot Menu (common keys: F12, F10, Esc, Option on Macs).
- Select your USB drive and boot.
- At the Tails splash screen, choose your language/region and continue to the desktop.
Secure Boot: If the system refuses to boot, disable Secure Boot or use a different port/machine. Some Macs require additional steps for external boot.
🚀 First Steps in Tails
- Welcome Screen: Choose your language/keyboard. Advanced options (like Tor bridges) are available under Additional Settings.
- Network: Tails connects through Tor. If your network blocks Tor, configure bridges from the Welcome Screen.
- Tor Browser: Open Tor Browser from the desktop to browse. Avoid logging in to personal accounts if anonymity is your goal.
- Files: By default, files are stored in RAM and are lost on shutdown. Use Persistent Storage to keep selected data.
📦 Persistent Storage (optional)
What it is: An encrypted area on your Tails USB to store selected files and settings (like bookmarks, additional software, and OpenPGP keys).
- In Tails, open Applications → Tails → Persistent Storage.
- Create a strong passphrase and enable the features you need (e.g., Personal Data, Bookmarks, Dotfiles).
- Restart Tails and enter your persistence passphrase at boot to unlock it.
- Save files you want to keep into the Persistent folder.
Note: Only selected items persist. Review the list of supported persistence features in the tool.
📋 Common Tasks (copy & paste)
Verify a Tails image with GnuPG (Linux)
# Import key and verify (replace filenames)
gpg --import tails-signing.key
gpg --verify tails-amd64-latest.img.sig tails-amd64-latest.img
Write Tails image to USB with dd (Linux)
lsblk
sudo umount /dev/sdX* 2>/dev/null
sudo dd if=tails-amd64-latest.img of=/dev/sdX bs=4M status=progress oflag=sync
sync && sudo eject /dev/sdX
Check Tor circuit in Tor Browser
In Tor Browser, click the padlock → “Connection secure” → “Tor Circuit”.
💡 Safety Tips
- Separate identities: Don’t mix personal accounts and anonymous browsing in the same session.
- Use bridges if blocked: Configure Tor bridges on the Welcome Screen when networks censor Tor.
- Be mindful of files: Metadata (EXIF, document properties) can reveal information. Use Tails tools to clean metadata before sharing.
- Keep Tails updated: Use the latest release to get security fixes.
🛠 Troubleshooting
USB won’t boot: Try another USB port, disable Secure Boot, or recreate the USB with a different tool.
No Wi-Fi: Some adapters need non-free firmware. Try Ethernet or a different Wi-Fi adapter.
Clock is wrong: Time sync can take a while behind Tor. Wait a few minutes or check network connectivity.
Persistence not available: Make sure you created it via Persistent Storage tool and unlocked it at boot.
📚 Resources & further reading
- Tails Official Site — https://tails.net/
- Tails Documentation — https://tails.net/doc/
- Tor Project — https://www.torproject.org/