Tails (The Amnesic Incognito Live System) is a portable operating system that leaves no trace on the computer you use it on. Every session starts fresh from the same clean state, and everything — every file, every connection history, every browser cookie — disappears completely when you shut it down. This amnesic design is its core privacy property.
Why an Amnesic OS Matters
A regular OS accumulates traces: browser history, cached files, log entries, swap file contents, application state. Even if you delete files, forensic recovery tools can often retrieve them. Tails eliminates this problem by design — no persistence means no forensic trail. The OS runs entirely in RAM and never writes to your hard drive.
Installing Tails on a USB Drive
Download Tails from tails.boum.org — verify the GPG signature and the checksum before installing. Use Balena Etcher to flash the image to a USB drive of at least 8GB. Boot from the USB by pressing your computer's boot menu key (usually F12, F2, or Escape) and selecting the USB device. On first run, configure the welcome screen (no need to enable persistence for maximum privacy).
Tails Networking
All network traffic in Tails is automatically routed through Tor. There is no way to accidentally create a non-Tor connection — applications that attempt to connect directly are blocked by a firewall rule enforced at the OS level. The included Tor Browser is pre-configured with Safest security settings.
Persistence (Use With Caution)
Tails offers an optional encrypted Persistent Storage on the same USB drive for storing files and settings between sessions. Enable only what you need, and understand that persistence reintroduces some of the traceability that Tails' amnesic design eliminates. For most use cases, avoid persistence entirely.
Combining Tails with a VPN
Tails does not support adding a VPN through its standard network configuration — doing so incorrectly can break Tor protections. The recommended approach for VPN+Tor is to use Whonix (a different OS) or to connect to a VPN at the router level before booting Tails. Research your specific setup carefully before implementing.
Complete OpSec Stack
Tails is one component of a comprehensive anonymity setup. See our full OpSec Guide for the complete recommended toolkit.
