📝 Introduction

Tails (The Amnesic Incognito Live System) is a security-focused operating system you run from a USB stick. It routes traffic through Tor by default and leaves no trace on the computer you use unless you choose to enable Persistent Storage.

Important: This guide is for legitimate privacy and security. Always follow local laws and ethical guidelines.

🔒 What is Tails?

  • Live system: Runs entirely from USB and memory.
  • Amnesic: By default, it forgets everything on shutdown.
  • Tor by default: Network traffic is routed through the Tor network.
  • Optional persistence: You can keep selected files/settings encrypted on the USB.

🧾 Download & Verify Tails

Why verify? Verification ensures the image you downloaded is authentic and not tampered with.

Windows / macOS — easiest: use the official website’s verification

  1. Go to the official Tails website and download the latest .img (or .img.xz).
  2. Follow the on-page verification (browser extension or automatic verification flow) if offered.

Linux — verify with OpenPGP (advanced)

What it does: Uses the Tails signing key to verify the image signature.

# 1) Install GnuPG (if needed)
sudo apt update && sudo apt install -y gnupg

# 2) Download the Tails signing key and the signature file (replace filenames/URLs as needed)
# curl -O https://tails.net/tails-signing.key
# curl -O tails-amd64-latest.img.sig

# 3) Import the signing key
gpg --import tails-signing.key

# 4) Verify the image (replace with your actual image filename)
gpg --verify tails-amd64-latest.img.sig tails-amd64-latest.img

Expected: Good signature and the key fingerprint that matches Tails’ official fingerprint.


💽 Create a Bootable USB (Windows/macOS/Linux)

You need a USB drive (8 GB or larger). All data on it will be erased.

Windows & macOS — use balenaEtcher (beginner-friendly)

  1. Install balenaEtcher from the official site.
  2. Open Etcher → Flash from file → choose the Tails .img/.img.xz.
  3. Select your USB drive → click Flash.
  4. Wait for completion and safely eject the USB.

Linux — use the command line (advanced)

What it does: Writes the image directly to your USB device. Be 100% sure about the device path.

# Identify your USB device (look for the right size/name)
lsblk

# Suppose your USB device is /dev/sdX (replace X). Unmount any partitions:
sudo umount /dev/sdX* 2>/dev/null

# Write the image (replace with your actual filename and device)
sudo dd if=tails-amd64-latest.img of=/dev/sdX bs=4M status=progress oflag=sync

# Flush write cache and safely remove
sync && sudo eject /dev/sdX
Tip: On many Linux distros you can also use the “USB Image Writer” GUI tool.

⚙️ Boot from the USB Drive

  1. Insert the Tails USB into the computer you want to use.
  2. Power it on and immediately open the Boot Menu (common keys: F12, F10, Esc, Option on Macs).
  3. Select your USB drive and boot.
  4. At the Tails splash screen, choose your language/region and continue to the desktop.
Secure Boot: If the system refuses to boot, disable Secure Boot or use a different port/machine. Some Macs require additional steps for external boot.

🚀 First Steps in Tails

  1. Welcome Screen: Choose your language/keyboard. Advanced options (like Tor bridges) are available under Additional Settings.
  2. Network: Tails connects through Tor. If your network blocks Tor, configure bridges from the Welcome Screen.
  3. Tor Browser: Open Tor Browser from the desktop to browse. Avoid logging in to personal accounts if anonymity is your goal.
  4. Files: By default, files are stored in RAM and are lost on shutdown. Use Persistent Storage to keep selected data.

📦 Persistent Storage (optional)

What it is: An encrypted area on your Tails USB to store selected files and settings (like bookmarks, additional software, and OpenPGP keys).

  1. In Tails, open Applications → Tails → Persistent Storage.
  2. Create a strong passphrase and enable the features you need (e.g., Personal Data, Bookmarks, Dotfiles).
  3. Restart Tails and enter your persistence passphrase at boot to unlock it.
  4. Save files you want to keep into the Persistent folder.
Note: Only selected items persist. Review the list of supported persistence features in the tool.

📋 Common Tasks (copy & paste)

Verify a Tails image with GnuPG (Linux)

# Import key and verify (replace filenames)
gpg --import tails-signing.key
gpg --verify tails-amd64-latest.img.sig tails-amd64-latest.img

Write Tails image to USB with dd (Linux)

lsblk
sudo umount /dev/sdX* 2>/dev/null
sudo dd if=tails-amd64-latest.img of=/dev/sdX bs=4M status=progress oflag=sync
sync && sudo eject /dev/sdX

Check Tor circuit in Tor Browser

In Tor Browser, click the padlock → “Connection secure” → “Tor Circuit”.


💡 Safety Tips

  • Separate identities: Don’t mix personal accounts and anonymous browsing in the same session.
  • Use bridges if blocked: Configure Tor bridges on the Welcome Screen when networks censor Tor.
  • Be mindful of files: Metadata (EXIF, document properties) can reveal information. Use Tails tools to clean metadata before sharing.
  • Keep Tails updated: Use the latest release to get security fixes.

🛠 Troubleshooting

USB won’t boot: Try another USB port, disable Secure Boot, or recreate the USB with a different tool.

No Wi-Fi: Some adapters need non-free firmware. Try Ethernet or a different Wi-Fi adapter.

Clock is wrong: Time sync can take a while behind Tor. Wait a few minutes or check network connectivity.

Persistence not available: Make sure you created it via Persistent Storage tool and unlocked it at boot.


📚 Resources & further reading