PrivacyGear.nl
Operating systems · Free

Tails OS review — the amnesic operating system

Tails is a live operating system you run from USB that leaves no trace. All traffic goes through Tor. For whistleblowers, journalists and situations where no trace may remain.

Tails OS review — the amnesic operating system

Tails OS review

Tails (The Amnesic Incognito Live System) is an operating system you run from a USB drive. It leaves no trace on the computer you use it on — no browsing history, no files, no session information. Everything disappears when you remove the USB.


What Tails does

Amnesic: Tails saves nothing by default. Every time you boot you start with a clean slate. Files, settings and browsing history disappear on shutdown. Optionally you can set up “Persistent Storage” for specific files — but that is a conscious choice, not a default.

Tor for all traffic: Every internet connection from Tails automatically goes through the Tor network. No application can bypass this — if Tor is not available, no traffic passes. Your IP address is hidden from all websites and services you visit.

Runs on any x86 computer: Nothing to install. Boot the computer from the USB drive, Tails loads into RAM, and you have a fully isolated environment.


Specifications

PropertyValue
BaseDebian GNU/Linux
RoutingTor (100% of traffic)
StorageNone — everything in RAM
Persistent StorageOptional — encrypted on USB
Built-in toolsTor Browser, Thunderbird, KeePassXC, OnionShare, MAT2
Hardware requirementx86-64, 2 GB RAM minimum (4 GB recommended)
USB sizeMinimum 8 GB
PriceFree

Built-in tools

Tails contains a selection of pre-configured privacy tools:

  • Tor Browser: Fully configured, JavaScript manageable per security level
  • Thunderbird + Enigmail: Email with PGP encryption
  • KeePassXC: Password management — database saveable in Persistent Storage
  • OnionShare: Share files via Tor (receives via a .onion address)
  • MAT2: Remove metadata from files (documents, images)
  • Electrum Bitcoin Wallet: Bitcoin wallet without installation

Persistent Storage — when to use, when not

By default everything disappears. If you want to keep certain files (PGP keys, documents, Tor Browser settings), you can activate Persistent Storage. This is an encrypted partition on the USB drive itself.

Use Persistent Storage for:

  • PGP keys
  • Documents you need in every session
  • Thunderbird email account configuration

Do NOT use Persistent Storage for:

  • Files you want to delete after a session — those belong in the non-persistent environment
  • Anything you consciously want to keep out of the trace

Who is Tails for?

Journalists and sources: Tails is the standard recommendation for source protection in sensitive communications. The Tails documentation mentions use by journalists worldwide.

Whistleblowers: A whistleblower wanting to leak documents via SecureDrop uses Tails on a computer not linked to them.

Activists in risk areas: Accessing censored information via Tor from an environment that leaves no trace on a shared or confiscated computer.

Communicating securely on untrusted hardware: If you must use a hotel or library computer, Tails gives you a known, clean environment regardless of what’s on the computer.


What Tails does NOT protect against

Physical observation: If someone is looking over your shoulder, Tails doesn’t help.

Hardware attacks: A manipulated computer (hardware keylogger, compromised BIOS) undermines Tails’ security. Only use Tails on hardware you trust or that you brought yourself.

Identity mistakes: If you log in to an account linked to your identity (Gmail, Facebook) while running Tails, you have identified yourself despite Tor.

Tor vulnerabilities: Tails is as secure as Tor. Traffic analysis, de-anonymisation attacks and end-node monitoring are theoretical risks for advanced adversaries.


Comparison with other approaches

TailsWhonixGrapheneOSVPN
Traceless✅ (amnesic)
Tor routingFullFullOptional
Portable✅ (USB)❌ (VM)✅ (phone)
Daily use
DifficultyLow-mediumHighMediumLow

Conclusion

Tails is the right tool for specific situations: sensitive communication, source protection, accessing censored information without trace. It is not a daily operating system — for that it is too restrictive and too slow (everything via Tor).

Those wanting a privacy-friendly system for daily use look at GrapheneOS (phone) or Fedora/Linux Mint (desktop).

See also: