Yous need

Intel processor

non M1

Windows 7

or later

macOS ten.10 (Yosemite)

or later

Linux

any distribution

Debian

Ubuntu

or another derivative

Your Tails

1 USB stick

8 GB minimum

All information volition be lost!

1 USB stick

8 GB minimum

All data will be lost!

Why?

a smartphone

another computer,
or a printer
to follow the instructions

some other Tails

USB stick or DVD

1 hr in full

½ hour

¼ hour

1.two GB to download

½ 60 minutes to install

½ hour to upgrade

Your steps

Download Tails

While y'all are downloading, nosotros recommend you read the release notes for Tails 5.ane.i   They document all the changes in this new version: new features, bug that were solved, and known issues that have already been identified.

Warnings: Tails is safe but not magic!

Tails is safer than any regular operating system. Just Tails, or any software or operating organisation, cannot protect y'all from everything—fifty-fifty if they pretend to.

The recommendations below volition go on y'all even safer, especially if you lot are at high risk.

Protecting your identity when using Tails

Tails is designed to hibernate your identity.

But some of your activities could reveal your identity:

  • Sharing files with metadata, such as date, time, location, and device information
  • Using Tails for more than i purpose at a fourth dimension

Protecting your identity

Limitations of the Tor network

Tails uses the Tor network because it is the strongest and most pop network to protect from surveillance and censorship.

Merely Tor has limitations if you are concerned near:

  • Hiding that you are using Tor and Tails
  • Protecting your online communications from determined, skilled attackers

Limitations of Tor

Reducing risks when using untrusted computers

Tails can safely run on a figurer that has a virus.

Just Tails cannot always protect you lot when:

  • Installing from an infected estimator
  • Running Tails on a calculator with a compromised BIOS, firmware, or hardware

Using untrusted computers

Protecting your identity when using Tails

Many files incorporate hidden information, or metadata:

  • JPEG and other image files oft contain data about where a picture was taken and which camera was used.

  • Office documents oftentimes contain data nigh their author, and the date and time the certificate was created.

To aid you clean metadata, Tails includes mat2, a tool to remove metadata in a wide range of file formats.

Use Tails sessions for only ane purpose at a fourth dimension

If you utilize Tails sessions for more than i purpose at a time, an antagonist could link your unlike activities together.

For example, if you log into different accounts on the aforementioned website in a single Tails session, the website could determine that the accounts are used past the same person. This is considering websites can tell when 2 accounts are using the same Tor excursion.

To forestall an adversary from linking your activities together while using Tails, restart Tails between different activities. For example, restart Tails betwixt checking your work email and your whistleblowing email.

We are not enlightened of any such attacks to deanonymize people online who used Tails for different purposes at a time.

If you worry that the files in your Persistent Storage could be used to link your activities together, consider using a unlike Tails USB stick for each action. For example, use one Tails USB stick for your activism piece of work and another one for your journalism work.

Limitations of the Tor network

Tails makes it clear that you lot are using Tor and probably Tails

Everything yous do on the Internet from Tails goes through the Tor network.

Tor and Tails don't protect yous past making you look like whatever random Internet user, but by making all Tor and Tails users await the same. Information technology becomes impossible to know who is who amidst them.

  • Your Internet service provider (ISP) and local network tin can see that you lot connect to the Tor network. They however cannot know what sites you visit. To hibernate that you connect to Tor, you tin can use a Tor bridge.

  • The sites that you visit can know that you are using Tor, because the list of exit nodes of the Tor network is public.

Parental controls, Internet service providers, and countries with heavy censorship can place and block connections to the Tor network that don't apply Tor bridges.

Many websites enquire you lot to solve a CAPTCHA or block access from the Tor network.

Leave nodes tin intercept traffic to the destination server

Tor hides your location from destination servers, but it does non encrypt all your communication. The last relay of a Tor circuit, called the exit node, establishes the actual connection to the destination server. This last step can be unencrypted.

A Tor connection goes through 3 relays with the last one establishing the actual connection to the final destination

The exit node tin can:

  • Observe your traffic. That is why Tor Browser and Tails include tools, like HTTPS Everywhere, to encrypt the connection between the go out node and the destination server, whenever possible.

  • Pretend to exist the destination server, a technique known as machine-in-the-heart attack (MitM). That is why y'all should pay even more than attention to the security warnings in Tor Browser. If you go such a warning, use the New Identity feature of Tor Browser to change exit node.

Warning: Potential Security Risk Ahead

To learn more about what information is available to someone observing the different parts of a Tor excursion, run across the interactive graphics at Tor FAQ: Tin can go out nodes overhear on communications?.

Adversaries watching both ends of a Tor circuit could place users

A powerful adversary, who could analyze the timing and shape of the traffic entering and exiting the Tor network, might be able to deanonymize Tor users. These attacks are called finish-to-end correlation attacks, because the attacker has to observe both ends of a Tor circuit at the same time.

No anonymity network used for rapid connections, like browsing the web or instant messaging, tin protect 100% from end-to-end correlation attacks. In this case, VPNs (Virtual Private Networks) are less secure than Tor, because they practise not use 3 independent relays.

Reducing risks when using untrusted computers

Install Tails from a calculator that you trust

Tails protects you from viruses and malware on your usual operating system. This is considering Tails runs independently from other operating systems.

But your Tails might be corrupted if y'all install from a compromised operating organization. To reduce that risk:

  • Always install Tails from a trusted operating system. For example, download Tails on a estimator without viruses or clone Tails from a trusted friend.

  • Do non plug your Tails USB stick while another operating system is running on the computer.

  • Utilize your Tails USB stick only to run Tails. Practise non use your Tails USB stick to transfer files to or from some other operating system.

If y'all worry that your Tails might be corrupted, do a manual upgrade from a trusted operating system.

We don't know of whatever virus able to infect a Tails installation, but one could be created in the hereafter.

No operating system can protect against hardware alterations

Your computer might be compromised if its concrete components have been altered. For case, if a keylogger has been physically installed on your computer, your passwords, personal information, and other information typed on your keyboard could exist stored and accessed by someone else, fifty-fifty if you are using Tails.

Try to go on your computer in a prophylactic location. Hardware alterations are more likely on public computers, in internet cafés or libraries, and on desktop computers, where a device is easier to hide.

If you worry that a calculator might be modified:

  • Use a password manager to paste saved passwords. This fashion, you don't take to blazon passwords that might be visible to people or cameras near you.

  • Use the Screen Keyboard, if you are using a public figurer or worry that the computer might take a keylogger.

No operating system can protect against BIOS and firmware attacks

Firmware includes the BIOS or UEFI and other software stored in electronic chips on the figurer. All operating systems, including Tails, depend on firmware to first and run, so no operating arrangement can protect confronting a firmware attack. In the same way that a car depends on the quality of the road it is driving on, operating systems depend on their firmware.

Keeping your calculator in a safe location tin can protect against some firmware attacks, merely some other firmware attacks can be performed remotely.

v.1.one

Verify your download

Verify your download to brand sure that it is prophylactic and was not corrupted during download.

Your BitTorrent client will automatically verify your download when it completes.

The verification below is optional for a BitTorrent download.

You seem to be using Internet Explorer. To verify your download, please use a unlike browser.

or verify using the OpenPGP signature

Verification successful! ( $FILENAME )

Verification failed! ( $FILENAME )

X

Most likely, the verification failed because of an mistake or intermission during the download.

The verification also fails if you attempt to verify a different download than the latest version, Tails v.1.one .

Less likely, the verification might have failed because of a malicious download from our download mirrors or due to a network assault in your country or local network.

Downloading again is usually plenty to set up this trouble. Otherwise, please endeavor downloading from a unlike place or a different computer.

How does the verification work?

Delight endeavour to download again…

Please try to download over again…

Error selecting epitome.

Make sure that you select a USB image that is readable by your browser.

Make sure that y'all select an ISO image that is readable past your browser.

Retry…

Error downloading checksum file from our website.

Make sure that your browser is connected to the Internet.

Retry…

Error reading image $FILENAME .

Make sure that $FILENAME is readable by your browser.

Retry…

Download balenaEtcher

In the following steps, you will install an intermediary Tails using the Tails USB image that y'all downloaded earlier.

  1. Click on the following push to download balenaEtcher:

    Download balenaEtcher for Windows

  2. Open up Finder and choose balenaEtcher in Applications.

    Open the balenaEtcher download.

    At the security alert, confirm that you want to open balenaEtcher.

    balenaEtcher starts.

Install an intermediary Tails using balenaEtcher

  1. Plug in the USB stick on which you lot desire to install Tails. the intermediary Tails.

    The Persistent Storage of your Tails USB stick will not be copied to the temporary Tails.

  2. Click the Wink from file button.

    Choose the USB image that you lot downloaded earlier.

  3. Click the Select target push button to select your USB stick.

    All the data on this USB stick will exist lost.

  4. Click Wink.

    Enter your password if you are asked for it.

    The installation takes a few minutes.

    After installing Tails, balenaEtcher verifies the installation.

    If the verification of balenaEtcher fails, try to install again or endeavour using a different USB stick.

  5. Close balenaEtcher.

    If a notification near the USB stick not being readable appears, click Eject to squirt the USB stick.

Tails USB stick

Congratulations, you lot have installed Tails on your USB stick!

You will now restart your computer on this USB stick.

Information technology might exist a bit complicated or non work on your computer, so skilful luck!

If y'all already started on the other Tails, become directly to stride 3: Verify that the other Tails is up-to-appointment.

Open these instructions on another device

In the next step, you volition shut down the computer. To be able to follow the rest of the instructions after, yous can either:

Restart on the other Tails

Restart on your Tails USB stick

Make the computer start on the USB stick

  1. Make sure that y'all have installed Tails using either:

    • balenaEtcher from Windows
    • balenaEtcher from macOS
    • GNOME Disks from Linux
    • the Linux command line
  2. Click on the push.

  3. Press and hold the Shift key while y'all choose Ability ▸ Restart.

  4. In the Choose an option screen, cull Utilise a device.

  5. In the Use a device screen, cull Boot Menu.

    Windows shuts down, the calculator restarts, and a Kick Bill of fare appears.

    Plug in your Tails USB stick before long after choosing Boot Menu and while Windows is shutting down.

    In the future, we We recommend that y'all only plug in your Tails USB stick while Windows is shutting downward. Otherwise, a virus in Windows could infect your Tails USB stick and break its security.

    Such an assail is possible in theory but very unlikely in exercise. We don't know of any virus capable of infecting Tails. Encounter our warning on plugging Tails in untrusted systems.

    The Boot Card is a list of possible devices to start from. The following screenshot is an example of a Boot Menu:

  6. In the Kick Menu, select your USB stick and press Enter.

  7. If the computer starts on Tails, the Boot Loader appears and Tails starts automatically after four seconds.

    Black screen ('GNU GRUB') with Tails logo and 2 options: 'Tails' and 'Tails (Troubleshooting Mode)'.

Most computers do not start on the Tails USB stick automatically only you tin press a Boot Card primal to display a list of possible devices to start from.

The following screenshot is an example of a Boot Menu:

This animation summarizes how to utilise the Boot Carte key to start on the USB stick:

The following instructions explain in detail how to apply the Kicking Menu key to kickoff on the USB stick:

  1. Make sure that you take installed Tails using either:

    • balenaEtcher from Windows
    • balenaEtcher from macOS
    • GNOME Disks from Linux
    • the Linux command line
  2. Shut down the computer while leaving the USB stick plugged in.

    Close downward the figurer and plug in the Tails USB stick.

    Shut down the computer.

    Plug in the other Tails USB stick that yous want to install upgrade from.

    Unplug your Tails USB stick while leaving the intermediary USB stick plugged in.

  3. Identify the possible Boot Carte keys for the computer depending on the computer manufacturer in the following list:

    Manufacturer Fundamental
    Acer F12, F9, F2, Esc
    Apple tree Option
    Asus Esc
    Clevo F7
    Dell F12
    Fujitsu F12, Esc
    HP F9
    Huawei F12
    Intel F10
    Lenovo F12
    MSI F11
    Samsung Esc, F12, F2
    Sony F11, Esc, F10
    Toshiba F12
    others… F12, Esc

    On many computers, a message is displayed very briefly when switching on that also explains how to get to the Kicking Menu or edit the BIOS settings.

  4. Switch on the computer.

    Immediately press several times the first possible Boot Carte central identified in stride 2.

  5. If the figurer starts on some other operating arrangement or returns an mistake bulletin, shut down the reckoner again and repeat step 3 for all the possible Boot Menu keys identified in stride 2.

    If a Boot Menu with a list of devices appears, select your USB stick and printing Enter.

  6. If the computer starts on Tails, the Boot Loader appears and Tails starts automatically after 4 seconds.

    Black screen ('GNU GRUB') with Tails logo and 2 options: 'Tails' and 'Tails (Troubleshooting Mode)'.

  1. Brand certain that you have installed Tails using either:

    • balenaEtcher from macOS
    • balenaEtcher from Windows
    • GNOME Disks from Linux
    • the Linux control line
  2. Close downwardly the calculator.

    Close down the computer while leaving the USB stick plugged in.

    Plug in the other Tails USB stick that you want to install from.

  3. Plug in your Tails USB stick.

  4. Switch on the estimator.

    Immediately press-and-hold the Option central (Alt fundamental) when the startup chime is played.

    Hold the key pressed until a list of possible startup disks appears.

    'Option' or 'alt' key in the bottom left of Mac keyboard

  5. Cull the USB stick and printing Enter. The USB stick appears as an external hard disk and might be labeled EFI Kicking or Windows like in the following screenshot:

    Screen with the logo of an internal hard disk labeled 'Macintosh HD' and an external hard disk labelled 'Windows' (selected)

    If the USB stick does non appear in the listing of startup disks:

    1. Make sure that you have installed Tails using either:

      • balenaEtcher from Windows
      • balenaEtcher from macOS
      • GNOME Disks from Linux
      • the Linux command line
    2. Make sure that you have verified your download of Tails.

    3. Brand sure that y'all are running the latest version of macOS.

    4. Make certain that you have verified your download.

    5. Attempt installing again on the same USB stick.

    6. Attempt installing on a dissimilar USB stick.

    7. Try using the same USB stick to start on a different computer.

    If your figurer still does not display the Boot Loader, it might currently be impossible to starting time Tails on your estimator.

  6. If your Mac displays the following mistake:

    Security settings practise not allow this Mac to use an external startup disk.

    Then you have to alter the settings of the Startup Security Utility of your Mac to authorize starting from Tails.

    To open up Startup Security Utility:

    1. Plough on your Mac, so press and agree Control(⌘)+R immediately after you lot come across the Apple tree logo. Your Mac starts up from macOS Recovery.

    2. When you lot see the macOS Utilities window, choose Utilities ▸ Startup Security Utility from the menu bar.

    3. When you lot are asked to authenticate, click Enter macOS Password, then choose an administrator business relationship and enter its password.

    Startup Security Utility

    In the Startup Security Utility:

    • Cull No Security in the Secure Boot section.

    • Cull Permit booting from external media in the External Boot.

    To nevertheless protect your Mac from starting on untrusted external media, y'all tin can set a firmware password, available on macOS Mountain Lion or later. A firmware password prevents users who practice not take the countersign from starting up from any media other than the designated startup deejay.

    If you forget your firmware password you will require an in-person service engagement with an Apple tree Shop or Apple tree Authorized Service Provider.

    Read more on Apple Support virtually:

    • Startup Security Utility
    • How to set a firmware password on your Mac
  7. If the computer starts on Tails, the Kick Loader appears and Tails starts automatically after 4 seconds.

    Black screen ('GNU GRUB') with Tails logo and 2 options: 'Tails' and 'Tails (Troubleshooting Mode)'.

Troubleshooting

  • If no Boot Menu appears, or if your USB stick is not listed in the Kick Menu, refer to the instructions on starting Tails using the Boot Menu cardinal.

  • If none of the possible Boot Menu keys from the previous technique work, or if your USB stick is non listed in the Kicking Menu, refer to the troubleshooting instructions about Tails non starting at all.

  • If your USB stick is listed in the Boot Carte du jour but the Boot Loader does non appear:

    If your USB stick appears in the list of startup disks merely the Kicking Loader does non appear:

    1. Make sure that you have installed Tails using either:

      • balenaEtcher from Windows
      • balenaEtcher from macOS
      • GNOME Disks from Linux
      • the Linux control line
    2. Make sure that you accept verified your download of Tails.

    3. Make sure that y'all are running the latest version of macOS.

    4. Make sure that you take verified your download.

    5. Try installing once more on the same USB stick.

    6. Effort installing on a different USB stick.

    7. Endeavour using the same USB stick to start on a different computer.

    If your computer still does not display the Boot Loader, it might currently be impossible to start Tails on your estimator.

  • If the Boot Loader appears but Tails fails to start after the Boot Loader, refer to the troubleshooting department about Tails not starting later the Boot Loader. the troubleshooting section virtually Tails not starting later the Boot Loader.

Starting the figurer using a Boot Carte du jour key can be faster than starting the computer on Windows first and and so on Tails. We recommend yous learn how to get-go Tails using the Kicking Card central if you use Tails regularly.

Apple does not prioritize collaborating with Free Software projects. Their newest hardware is commonly very difficult for Costless Software developers to get working with Linux, and thus Tails. PC hardware tends to be more than open up and work better with Linux.

Welcome to Tails!

Starting Tails

  1. After the Kicking Menu, a loading screen appears.

  2. One to ii minutes after the Boot Loader and the loading screen, the Welcome Screen appears.

    Welcome to Tails!

  3. In the Welcome Screen, select your language and keyboard layout in the Language & Region section. Click Outset Tails.

    If your keyboard, touchpad, or mouse doesn't work:

    • Please allow usa know.
    • Endeavor using an external keyboard and mouse.
  4. After 15–30 seconds, the Tails desktop appears.

    Tails desktop

Welcome to your new Tails!

Test your Wi-Fi

Problems with Wi-Fi are unfortunately quite common in Tails and Linux in general. To test if your Wi-Fi interface works in Tails:

  1. Open up the organization bill of fare in the superlative-right corner:

  2. Cull Wi-Fi Not Connected and so Select Network.

  3. Subsequently establishing a connectedness to a local network, the Tor Connection assistant appears to help you lot connect to the Tor network.

If your Wi-Fi interface is not working, for example:

  • There is no Wi-Fi option in the system carte:

  • You receive the notification Connection failed: Activation of network connection failed.

  • The interface is disabled when starting Tails or when plugging in your USB Wi-Fi adapter:

    Notification about network card being disabled

    In this example, you tin disable MAC accost anonymization to become your Wi-Fi interface to work in Tails. Disabling MAC address anonymization has security implications, so read carefully our documentation about MAC accost anonymization before doing and then.

To connect to the Internet, you tin can try to:

  • Use an Ethernet cable instead of Wi-Fi if possible. Wired interfaces piece of work much more reliably than Wi-Fi in Tails.

  • Share the Wi-Fi or mobile data connectedness of your phone using a USB cable. Sharing a connection this style is called USB tethering.

    See instructions for:

    • iPhones or iPads

      Only sharing mobile data works on iPhones and iPads; sharing Wi-Fi does not piece of work.

    • Android

    Tails cannot hibernate the information that identifies your telephone on the local network. If you connect your phone to:

    • A Wi-Fi network, so the network will know the MAC address of your phone. This has security implications that are discussed in our documentation on MAC address anonymization. Some phones have a feature to hide the real MAC address of the phone.

    • A mobile information network, and so the network volition be able to know the identifier of your SIM card (IMSI) and also the serial number of your phone (IMEI).

  • Purchase a USB Wi-Fi adapter that works in Tails:

    Vendor Model Size Speed Price Purchase offline Buy online
    Panda Wireless Ultra Nano 150 Mbit/s $12 No Amazon
    Panda Wireless PAU05 Pocket-size 300 Mbit/s $14 No Amazon
    ThinkPenguin TPE-N150USB Nano 150 Mbit/s $54 No ThinkPenguin

    If you find another USB Wi-Fi adapter that works in Tails, please let u.s.a. know. You can write to sajolida@pimienta.org (individual email).

Create a Persistent Storage (optional)

Y'all can optionally create an encrypted Persistent Storage in the remaining free space on your new Tails USB stick to store any of the post-obit:

  • Personal files
  • Some settings
  • Additional software
  • Encryption keys

The information in the Persistent Storage:

  • Remains available across separate working sessions.
  • Is encrypted using a passphrase of your choice.

The Persistent Storage is not hidden. An assailant in possession of your USB stick can know that there is a Persistent Storage on it. Take into consideration that y'all can be forced or tricked to requite out its passphrase.

It is possible to unlock the Persistent Storage from other operating systems. But, doing then might compromise the security provided by Tails.

For example, image thumbnails might be created and saved by the other operating organisation. Or, the contents of files might exist indexed by the other operating organisation.

Other operating systems should probably non be trusted to handle sensitive information or get out no trace.

Create the Persistent Storage

  1. Choose .

  2. Specify a passphrase of your choice in both the Passphrase and Verify Passphrase text boxes.

  3. Click on the Create push button.

  4. Wait for the creation to cease.

  5. The list of features of the Persistent Storage appears. Each characteristic corresponds to a ready of files or settings that can be saved in the Persistent Storage.

    We recommend y'all to only turn on the Personal Data feature for the time being. You can turn on more than features afterwards on according to your needs.

  6. Click Save.

Restart and unlock the Persistent Storage

  1. Shut downwards the computer and restart on your new Tails USB stick.

  2. In the Welcome Screen:

    Welcome to Tails!

    • Select your language and keyboard layout in the Language & Region department.

    • In the Encrypted Persistent Storage department, enter your passphrase and click Unlock to unlock the Persistent Storage for the current working session.

    • Click Kickoff Tails.

  3. After 15–30 seconds, the Tails desktop appears.

  4. Y'all can now save your personal files and working documents in the Persistent folder. To open the Persistent folder choose .

Tails USB stick with Persistent Storage

You now have a consummate Tails, congrats!

Terminal recommendations

Nosotros hope you lot enjoy using Tails :)