Tails, or The Amnesic Incognito Live System, is a
security-focused Debian
Debian (), also known as Debian GNU/Linux, is a Linux distribution composed of free and open-source software, developed by the community-supported Debian Project, which was established by Ian Murdock on August 16, 1993. The first version of De ...
-based
Linux distribution
A Linux distribution (often abbreviated as distro) is an operating system made from a software collection that includes the Linux kernel and, often, a package management system. Linux users usually obtain their operating system by downloading on ...
aimed at preserving
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
and
anonymity. It connects to the Internet exclusively through the anonymity network
Tor. The system is designed to be booted as a
live DVD or
live USB
A live USB is a portable USB-attached external data storage device containing a full operating system that can be booted from. The term is reminiscent of USB flash drives but may encompass an external hard disk drive or solid-state drive, tho ...
, and leaves no
digital footprint on the machine unless explicitly told to do so. It can also be run as a
virtual machine
In computing, a virtual machine (VM) is the virtualization/ emulation of a computer system. Virtual machines are based on computer architectures and provide functionality of a physical computer. Their implementations may involve specialized har ...
, with some additional security risks. The
Tor Project provided financial support for its development in the beginnings of the project, and continues to do so alongside numerous corporate and anonymous sponsors.
History
Tails was first released on June 23, 2009. It is the next iteration of development on
Incognito, a discontinued
Gentoo-based Linux distribution. The Tor Project provided financial support for its development in the beginnings of the project.
Tails also received funding from the
Open Technology Fund
The Open Technology Fund (OTF) is an American nonprofit corporation that aims to support global Internet freedom technologies. Its mission is to "support open technologies and communities that increase free expression, circumvent censorship, and ...
,
Mozilla
Mozilla (stylized as moz://a) is a free software community founded in 1998 by members of Netscape. The Mozilla community uses, develops, spreads and supports Mozilla products, thereby promoting exclusively free software and open standards, w ...
, and the
Freedom of the Press Foundation.
Laura Poitras
Laura Poitras (; born February 2, 1964) is an American director and producer of documentary films.
Poitras has received numerous awards for her work, including the 2015 Academy Award for Best Documentary Feature for '' Citizenfour'', about Ed ...
,
Glenn Greenwald
Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author and lawyer. In 2014, he cofounded ''The Intercept'', of which he was an editor until he resigned in October 2020. Greenwald subsequently started publishing on Substa ...
, and
Barton Gellman
Barton David Gellman (born 1960) is an American author and journalist known for his reports on September 11 attacks, on Dick Cheney's vice presidency and on the global surveillance disclosure.
Beginning in June 2013, he authored ''The Washington P ...
have each said that Tails was an important tool they used in their work with
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
whistleblower
Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and s ...
.
From release 3.0, Tails requires a
64-bit processor
In computer architecture, 64-bit integers, memory addresses, or other data units are those that are 64 bits wide. Also, 64-bit CPUs and ALUs are those that are based on processor registers, address buses, or data buses of that size. A compute ...
to run.
Features
Tails's pre-installed desktop environment is
GNOME 3
GNOME 3 is the third major release of the GNOME desktop environment. A major departure from technologies implemented by its predecessors, GNOME 3 introduced a dramatically different user interface. It was the first GNOME release to utilize a unifi ...
. The system includes essential software for functions such as reading and editing documents, image editing, video watching and printing. Other software from Debian can be installed at the user's behest.
Tails includes a unique variety of software that handles the encryption of files and internet transmissions,
cryptographic signing and
hashing, and other functions important to security. It is pre-configured to use
Tor with multiple connection options. It tries to force all connections to use Tor and blocks connection attempts outside Tor. For networking, it features a modified version of
Tor Browser with the inclusion of
uBlock Origin, instant messaging, email, file transmission and monitoring local network connections for security.
By design, Tails is "amnesic". It runs in the computer's
Random Access Memory
Random-access memory (RAM; ) is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the s ...
(RAM) and does not write to a hard drive or other storage medium. The user may choose to keep files, applications or some settings on their Tails drive in "Persistent Storage". Though the Persistent Storage is encrypted by default, it is not hidden and detectable by forensic analysis. While shutting down, Tails overwrites most of the used RAM to avoid a
cold boot attack
In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random-access memory (RAM) ...
.
Security incidents
In 2014
Das Erste
Das Erste (; "The First") is the flagship national television channel of the ARD association of public broadcasting corporations in Germany. ''Das Erste'' is jointly operated by the nine regional public broadcasting corporations that are memb ...
reported that the
NSA's
XKeyscore surveillance system sets threat definitions for people who search for Tails using a search engine or visit the Tails website. A comment in XKeyscore's source code calls Tails "a comsec
communications security">/nowiki>communications security">communications_security.html" ;"title="/nowiki>communications security">/nowiki>communications security/nowiki> mechanism advocated by extremists on extremist forums".
In the same year, ''Der Spiegel'' published slides from an internal National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
presentation dating to June 2012, in which the NSA deemed Tails on its own as a "major threat" to its mission and in conjunction with other privacy tools as "catastrophic".
In 2017, the FBI used malicious code developed by Facebook
Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin ...
, identifying sexual extortionist and Tails user Buster Hernandez
Buster Hernandez (born 1987 or 1988) is a sexual extortionist, child pornography producer and cyberterrorist from Bakersfield, California. He used the internet extensively to target hundreds of underage girls under the pseudonyms Brian Kil and Pur ...
through a zero-day vulnerability in the default video player. The exploit was never explained to or discovered by the Tails developers, but it is believed that the vulnerability was patched in a later release of Tails. It was not easy to find Hernandez: for a long time, the FBI and Facebook had searched for him with no success, resorting to developing the custom hacking tool.
See also
* Crypto-anarchism
* Dark web
The dark web is the World Wide Web content that exists on '' darknets'': overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can commu ...
* Deep web
* Freedom of information
Freedom of information is freedom of a person or people to publish and consume information. Access to information is the ability for an individual to seek, receive and impart information effectively. This sometimes includes "scientific, Indigeno ...
* GlobaLeaks
GlobaLeaks is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives.
History
The project started on 15 December 2010 and the first software prototype was announced on 6 September 2011.
Relevant figure ...
* GNU Privacy Guard
GNU Privacy Guard (GnuPG or GPG) is a free-software replacement for Symantec's PGP cryptographic software suite. The software is compliant with RFC 4880, the IETF standards-track specification of OpenPGP. Modern versions of PGP are interoper ...
* I2P
* Internet censorship
Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains (such as Wikipedia.org) but exceptionally may extend to all Int ...
* Internet privacy
Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via Internet. Internet privacy is a subset of data privacy. P ...
* Off-the-Record Messaging
Off-the-Record Messaging (OTR) is a cryptographic protocol that provides encryption for instant messaging conversations. OTR uses a combination of AES symmetric-key algorithm with 128 bits key length, the Diffie–Hellman key exchange with 1536 bi ...
* Proxy server
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
Instead of connecting directly to a server that can fulfill a requ ...
* Security-focused operating system
This is a list of operating systems specifically focused on security. Operating systems for general-purpose usage may be secure without having a specific focus on security.
Similar concepts include security-evaluated operating systems that have ...
s
* Tor (anonymity network)
Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than seven thousand relays, to co ...
* Tor2web
Tor2web (pronounced "Tor to Web") is a software project to allow Tor hidden services to be accessed from a standard browser without being connected to the Tor network. It was created by Aaron Swartz and Virgil Griffith.
History
Tor is a networ ...
* Whonix
Whonix (, ) is a Kicksecure–based security hardened Linux distribution. Its main goals are to provide strong privacy and anonymity on the Internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", run ...
References
External links
*
*
{{DEFAULTSORT:Amnesic Incognito
2009 software
Anonymity networks
Debian-based distributions
Free security software
I2P
Linux distributions
Operating system distributions bootable from read-only media
Privacy software
Tor (anonymity network)