LEGIT A+ L0 · trustless
Tails
Tails

Amnesic Debian live OS that boots from USB and forces all traffic through Tor.

TOR

Tails forgets you on shutdown. After sixteen years and a Tor Project merger, that is still the point.

*A Debian live system that boots from USB, routes everything through Tor, and writes nothing to disk by design.*

Jurisdiction Winchester, Massachusetts
Operating since 2009
Category Field Tools
Rubric v2.7

How it works

Tails is a Debian-based live operating system that runs entirely from RAM after booting off a USB stick. It does not install. It does not touch the host disk unless the user explicitly mounts it. Network traffic is forced through the Tor network at the system level, so an application cannot accidentally bypass the anonymity layer. When the machine is shut down, RAM is overwritten and every trace of the session — pages visited, files opened, keys entered — disappears with it. An optional encrypted persistent storage can be enabled on the same USB stick for documents, GnuPG keys, Wi-Fi passwords, and a small set of supported applications, but it is opt-in and locked behind a passphrase the project never sees.

KYC & privacy

There is no signup. There is no account. There is no server holding user data because there is no service in the conventional sense — Tails is a download. The project distributes signed images and verification instructions; what happens after the USB is written is between the user and their hardware. Tor handles the network identity. The amnesic architecture handles forensic recovery. Donations to the project accept Bitcoin and conventional rails, but no payment is required to use the system. The closest thing to telemetry is the unattended upgrader checking signed releases over Tor.

Strengths and limits

The architecture removes whole categories of attack. There is no persistent disk for malware to colonise between sessions, no account database to leak, no IP logs because the project sees only Tor exits. Sixteen years of clean operation in the hands of journalists, activists, and security researchers is its own evidence. In late 2024 Radically Open Security audited the upgrader and adjacent paths and reported four issues — all requiring an already-compromised low-privilege user, none allowing remote code execution. The findings were patched in Tails 6.11 in January 2025. The limits are practical rather than architectural. Tor over a USB live system is slow. Persistent storage carries the obvious trade-off — convenience returns, amnesia retreats. Tails is not a daily driver for office work; it is a tool for sessions where the threat model demands the disk be empty by morning. Hardware compatibility on locked-down laptops, especially machines with awkward Secure Boot, can frustrate first-time installers.

Verdict

Tails is the rare privacy tool whose value compounds with age: every year of clean operation, every audit cycle, every release through the Tor Project's signing keys reinforces the same simple proposition. If your work requires that a machine be plausibly forgettable, Tails is the reference implementation. If you only need a private browser on a personal laptop, this is overkill — use Tor Browser instead. Grade: A+ (9.7/10). Trust: LEGIT.

verdict.tails.diff +5 pros −3 cons
what works
+ 01 Amnesic by default; RAM is wiped on shutdown, leaving no forensic trace on the host machine
+ 02 Open source, signed releases, audited by Radically Open Security in 2024 with all findings patched
+ 03 All traffic forced through Tor at the system level — apps cannot bypass the anonymity layer
+ 04 Maintained by The Tor Project since the 2024 merger; sixteen-year clean operational record
+ 05 Optional encrypted persistent storage for keys, documents, and supported apps, strictly opt-in
what to know
01 Tor over a USB live OS is slow; not suitable as a daily driver for streaming or office work
02 Hardware compatibility issues on Secure Boot laptops can frustrate first-time installers
03 Persistent storage trades amnesia for convenience — using it weakens the core guarantee

Tails remains the gold standard for sessions that must vanish on shutdown — sixteen years old, open source, recently re-audited, and now under The Tor Project's umbrella. Use it when the threat model requires the disk to be empty by morning; reach for Tor Browser instead for everyday private browsing. Grade: A+ (9.7/10). Trust: LEGIT.