An amnesic live operating system that routes all traffic through Tor and leaves no trace on the host machine — the highest-assurance option for sensitive one-off operations.
This toolkit is for informational purposes. Security needs vary by situation. No tool guarantees complete privacy or anonymity.
Forces all network traffic through Tor; includes LUKS persistent storage encryption and GnuPG for file-level encryption.
Routes every connection through Tor by default; amnesic design leaves zero forensic trace on the host computer after shutdown.
Fully open source Debian-based distribution maintained by the Tor Project; all components are auditable.
Maintained by the Tor Project, a US 501(c)(3), but the amnesic architecture means there is no user data to compel.
Used by Edward Snowden, journalists, and activists worldwide; over a decade of active development with regular security updates.
Must boot from USB on every use; no persistent apps by default; workflow is intentionally restrictive and unfamiliar.
Runs on most x86_64 computers via USB boot; no mobile support, no native install, limited hardware compatibility.
Completely free to download and use; requires only a USB drive, no account or identity needed at any step.
Tails (The Amnesic Incognito Live System) is a portable operating system that boots from a USB drive, routes all internet traffic through Tor, and leaves absolutely no trace on the computer you use it on. When you shut down Tails, everything is wiped from RAM — your browsing history, your files, your passwords, every byte of data vanishes as if you were never there. Tails is built on Debian Linux and comes preloaded with privacy tools: Tor Browser, the Thunderbird email client with OpenPGP, OnionShare for anonymous file sharing, KeePassXC for password management, and LibreOffice for document editing.
For crisis scenarios, Tails serves a specific and irreplaceable role: it lets you use any computer — a library computer, a friend's laptop, an internet café machine, a hotel business center — without leaving any forensic evidence of what you did. If your devices have been seized or compromised, Tails on a USB drive in your pocket is your entire secure computing environment. Plug it in, boot from USB, do what you need to do, shut down, and the computer returns to its original state with no evidence you used it for anything.
Tails is not a daily-driver operating system. It's deliberately limited — no persistent storage by default, no app installation, slower performance because all traffic routes through Tor. It's the tool you use when the situation demands maximum operational security: when you cannot trust the hardware, when forensic deniability matters, or when you need to access the internet from a device that isn't yours.
Tails routes all network traffic through Tor by default at the operating system level — this is not a browser setting but a kernel-level configuration that ensures no application can accidentally leak traffic outside the Tor network. Applications that attempt to connect directly to the internet (bypassing Tor) are blocked by the firewall. DNS requests are resolved through Tor. This is the most comprehensive Tor integration available in any operating system.
Tails runs entirely in RAM, with no data ever written to the computer's hard drive. When the system shuts down (or when the USB drive is removed), the RAM is overwritten with random data to prevent cold boot attacks — a technique where an attacker freezes the RAM chips and extracts residual data. If you enable the optional encrypted persistent storage on the USB drive, it's encrypted with LUKS (Linux Unified Key Setup) using AES-256-XTS with a passphrase-derived key. The persistent storage is the only data that survives a reboot, and it's encrypted at rest until you unlock it.
Tails requires no account, no registration, and no identity. You download the ISO image, write it to a USB drive, and boot from it. There is no user profile, no device identifier, and no telemetry. Tails spoofs the MAC address of your network adapter by default, which prevents the local network from identifying your physical hardware. Combined with Tor routing, this means the network you're connecting through sees a spoofed device address, and the websites you visit see a Tor exit node's IP — your real identity is hidden at every layer.
Each Tails session starts completely clean. There are no cookies, no cached files, no saved passwords, no browsing history from previous sessions. If you need persistence between sessions — for example, to keep a set of encryption keys or a password database — you can enable the encrypted persistent volume, which stores specific types of data on the USB drive. But the default is amnesia: every session is a blank slate. This makes Tails ideal for one-off sensitive tasks where you need to ensure no evidence remains.
Tails is fully open source, built on Debian (one of the oldest and most trusted Linux distributions). All components — the operating system configuration, the Tor integration, the network firewall rules, and the included applications — are open source and auditable. The Tails source code is available on their GitLab instance, and the build process is reproducible. Multiple independent security audits have been conducted, including audits by Cure53 (2014) and ongoing reviews by the broader Debian security team.
Tails has been actively developed since 2009 and is one of the Tor Project's recommended tools. The project receives funding from the Tor Project, Mozilla, and multiple European privacy foundations. The development process is transparent, with all design decisions, bug reports, and code changes publicly visible. Because Tails is built entirely from open-source components (Debian, Tor, GNOME, Firefox), the security properties of each component have been independently verified by their respective communities.
Tails is developed by the Tails Project, a decentralized group of contributors with no single legal entity or geographic base. The project operates under the umbrella of the Tor Project for fiscal sponsorship, which is a U.S.-based 501(c)(3), but the development team is distributed globally. There is no server infrastructure, no user database, and no organization that stores or processes user data. Tails runs entirely on your hardware with no cloud component.
The jurisdictional protection comes from architecture, not geography. Because Tails stores nothing and connects through Tor, there is no data for any government to request. The amnesic design means that even physical seizure of the USB drive (without the persistent volume, or with a strong passphrase on the persistent volume) yields no usable data. In multiple documented law enforcement cases, Tails has effectively prevented forensic analysis — notably in the case of Reality Winner and in various investigations where suspects used Tails to cover their digital tracks.
Tails has been in continuous development since 2009, making it one of the longest-running privacy operating systems. It was Edward Snowden's tool of choice when communicating with journalists Laura Poitras and Glenn Greenwald during the NSA surveillance disclosures in 2013 — perhaps the highest-stakes real-world test of any privacy tool in history. The system performed as designed: Snowden used Tails on various computers to communicate and share documents without leaving traces that could be attributed to him.
Tails has been the subject of academic research on live system forensics, and in controlled testing, researchers have consistently confirmed that Tails' amnesic properties work — no recoverable data remains on the host computer or in RAM after shutdown. No security breach has exposed Tails users through a flaw in Tails itself (as opposed to user error or external compromise). The project has a responsible disclosure process and responds quickly to vulnerability reports.
Tails is functional but not polished. The GNOME desktop environment is clean and organized, and the included applications (Tor Browser, Thunderbird, LibreOffice, KeePassXC, OnionShare) are standard Linux tools that work well. But this is a live Linux system running from a USB drive — performance is limited by USB read/write speeds, all internet traffic goes through Tor (slow for large downloads), and you cannot install arbitrary software without significant Linux knowledge.
The initial setup is straightforward: download the image from tails.net, verify it, and write it to a USB drive using a program like Etcher. Booting from USB requires changing the boot order in your computer's BIOS/UEFI settings, which is the main technical hurdle for non-technical users. Tails' documentation is excellent — some of the best in the privacy tool ecosystem — with illustrated step-by-step guides for every supported platform. For someone who has never used Linux, the learning curve is moderate but manageable if you follow the official guide.
Tails runs on any 64-bit computer that can boot from USB — this covers virtually all PCs and Macs manufactured in the last 15 years. It is hardware-agnostic by design: the entire operating system lives on the USB drive, and the host computer's hard drive is never touched. This means you can carry your entire secure computing environment in your pocket and use it on any available hardware.
The trade-off is that Tails cannot run on phones or tablets (it requires x86_64 architecture), and some very new or very specialized hardware may have driver compatibility issues (though Debian's broad hardware support minimizes this). Mac users with Apple Silicon (M1/M2/M3/M4) chips cannot run Tails because Apple Silicon does not support booting from USB into non-macOS operating systems. For Mac users, an inexpensive used ThinkPad is the standard recommendation — they're reliable, widely available, and have excellent Linux compatibility.
Tails is completely free. It is open-source software distributed at no cost by the Tails Project. There are no paid features, no subscriptions, and no financial relationship required. You download the ISO image from tails.net, verify its authenticity using the provided PGP signatures, and write it to a USB drive.
The only cost is the USB drive itself — a minimum of 8 GB is required, though 16 GB or larger is recommended if you plan to use encrypted persistent storage. A suitable USB 3.0 flash drive costs $5-10 and can be purchased with cash at any electronics or office supply store. The total cost of a fully functional, forensically clean, Tor-integrated operating system is under $10 and leaves no financial trail.
Start by downloading the Tails USB image from tails.net on any computer. Verify the download using the verification tool on the Tails website — this checks that the image hasn't been tampered with. You'll need a USB drive with at least 8 GB of storage (16 GB recommended). Use a tool like Etcher (balenaetcher.com) to write the Tails image to the USB drive. This will erase everything on the USB drive, so use a new or empty one.
To boot Tails, insert the USB drive into the computer you want to use, then restart the computer and access the boot menu (usually by pressing F12, F2, Escape, or holding Option on a Mac during startup — the specific key varies by manufacturer). Select the USB drive from the boot menu. Tails will load and present a Welcome Screen where you can set language, keyboard layout, and enable the persistent volume if desired. For first-time use, skip the persistent volume and explore the system. Click "Start Tails" to boot into the desktop.
Once on the desktop, Tails automatically connects to the Tor network. If you're in a censored environment, the Welcome Screen offers a "Configure a Tor bridge" option before connecting. Open Tor Browser from the taskbar to browse the web anonymously. Open Thunderbird for encrypted email (configure it with your ProtonMail account using ProtonMail Bridge on another device, or use it with a Riseup.net email account). Open KeePassXC to manage passwords. If you decide to enable persistent storage (for keeping files, Wi-Fi passwords, or your KeePassXC database across sessions), go to Applications > Tails > Configure Persistent Volume, set a strong passphrase, and select which types of data to persist. Remember: the persistent volume is encrypted, but it exists on the USB drive — if the USB drive is seized and your passphrase is weak, the data could be compromised. Use a passphrase of at least 7 random words.