Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. It routes all its internet connections through the Tor network and leaves no trace on the computer it's run on unless explicitly asked to do so. Tails is designed to be run from a USB stick or a DVD independent of the computer's original operating system.
0 / day
0 / day
0 page per visit
Domain Rating
Domain Authority
Citation Level
English, etc
All internet traffic is automatically routed through the Tor network to ensure anonymity.
Tails does not store any data unless explicitly told to do so, ensuring no trace is left on the host computer.
Includes tools for encrypted emails and instant messaging to secure communications.
Provides tools for securely deleting files to prevent recovery.
Comes with a suite of privacy tools pre-installed, including the Tor Browser, KeePassXC, and more.
Can be run directly from a USB stick or DVD without installation, leaving the host system untouched.
Tails is free and open-source software, allowing for transparency and community audits.
Optional encrypted persistent storage allows users to save files and settings between sessions.
Comprehensive documentation and a supportive community are available to help users.
Regular updates ensure the latest security patches and features are always available.
Tails is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version.
Tails is developed by a community of volunteers and is supported by several non-profit organizations and donations.
Tails is used by journalists, activists, whistleblowers, and anyone needing to protect their privacy and anonymity online.
Tails requires a 64-bit x86-64 compatible processor and at least 2 GB of RAM to run smoothly. It can be booted from a USB stick (minimum 8 GB) or a DVD.
Tails includes several security features such as MAC address spoofing, an automatic screen lock, and the ability to easily disable or enable network connectivity.
Security headers report is a very important part of user data protection. Learn more about http headers for tails.boum.org