Type: Live anonymous operating system
Boot method: USB stick — runs in RAM
Persistence: Optional encrypted storage between reboots
Built-in tools: Tor Browser, MAT2, VeraCrypt, KeePassXC, OnionShare
Clearnet: tails.boum.org
Last verified: March 2026
What Makes Tails Different
Most privacy tools run on your regular operating system — meaning any malware already on your computer can still potentially interfere. Tails takes a different approach: it replaces your operating system entirely for the duration of a session, booting from a USB stick into a clean, verified environment. When you shut down, everything in RAM is cleared. Nothing is written to the host computer’s drive.
This amnesic design means a compromised or seized computer reveals nothing about what you did in a Tails session — because nothing was stored.
| Feature | How It Works |
|---|---|
| Tor routing | System-level — all applications route through Tor automatically |
| Host computer trace | None — no writes to internal drive |
| Malware persistence | Impossible — RAM cleared at shutdown |
| Pre-installed tools | Tor Browser, OnionShare, MAT2, VeraCrypt, KeePassXC |
| Persistent encrypted storage | Optional — set up for files that must survive reboots |
Who Should Use Tails
Tails is designed for high-stakes sessions — SecureDrop submissions, sensitive journalism research, activism under surveillance. It is not designed for everyday computing. Boot from Tails when the stakes justify it; use your regular OS for everything else.
The Tor Project, Freedom of the Press Foundation and the Electronic Frontier Foundation all recommend Tails for high-risk users. Edward Snowden used it.
Requirements
A USB stick of 8GB or larger. A computer that can boot from USB. The Tails installer, downloaded and verified from tails.boum.org. Installation takes about 20 minutes on a first setup.
