How to Install Tails on a USB Flash Drive in 7 minutes :) PDF documentation: davidbombal.wiki/tailsprivacy Download from here: tails.net/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RUclips: ruclips.net/user/davidbombal // MENU // 00:00 - Intro 00:30 - What Is Tails? 02:40 - Tails Installation Tutorial 05:52 - Boot into BIOS 07:22 - Boot into Tails 07:30 - Create Persistant Storage 08:09 - Tor Connection 09:18 - Tails Installed tails tails os tor linux tails linux invisible online hide identity privacy kali linux online privacy internet security online privacy and security online privacy tips online privacy guide internet security tutorial Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
I’ve used Tails for years. Something worth knowing is this: if you’re going to be downloading large files, the system will go to sleep after 5 minutes of inactivity. If it goes to sleep, your download will pause or fail. Make sure you right-click on the desktop, select SETTINGS, POWER, and set screen sleep time to something longer than 5 minutes. I just set my sleep to NEVER. You’ll have to do this every time you boot into Tails because it always boots to default values.
@@alokarpan822you can use your mobile phone wired as a hotspot, e.g android USB tethering. Unfortunately if Tails doesn’t recognize your wifi adapter by default, it’s almost impossible to make it work (install drivers etc). This is the most inconvenient thing in Tails as I think.
How about this ( @wiktorhood8475 11 months ago yet you're still leaking mac adress of your device because wether it's usb or not network card own the same address regardles of OS) ? Is it true?
@@davidbombal the most important is 1) DO NOT resize the browser as that can be tracked from guard to relay to exit node, 2)NEVER use any PII and have completely unrelated accounts that NEVER tie back to you, 3)NEVER use the same phraseology or grammer techniques that you currently use, take the time to develop a separate persona with a different style, 4)if you are doing deep diving, physicality disable the mic and cam
@@mytechnotalentwhat PII means? Do you need an antenna to hide the specifications of your PC like its MAC? or is it possible to hack or just browse quietly without an antenna?
A video on the update process could be helpful for the folks. You have a good way at explaining these things. I sure wish I had a video when I did my 1st update. I was very nervous about messing up my persistent storage.
🎯 Key Takeaways for quick navigation: 00:00 *🖥️ Introduction to Tails Operating System* - Explanation of Tails OS, recommended by privacy advocates like Edward Snowden and the Electronic Frontier Foundation. - Tails functions as a portable OS on a USB drive, erasing all data upon shutdown, providing ephemeral browsing. - Benefits of Tails include anonymity, avoiding online surveillance, and protection against censorship. 01:25 *🔒 Tails Persistent Storage and Encryption* - Description of Tails' amnesic nature, erasing all activities upon shutdown, with an option for persistent storage. - Use cases for persistent storage, such as storing documents, Wi-Fi passwords, and browser bookmarks. - Importance of encryption for persistent storage, ensuring only authorized users can access the stored data. 03:12 *🛠️ Tails Installation Process* - Requirements for installing Tails, including a USB stick, minimum RAM, and available options for operating systems. - Step-by-step guide on downloading and verifying the Tails image, using tools like Etcher for installation. - Precautions to take, such as backing up data on the USB drive before installation, and configuring BIOS settings for booting from the USB drive. 05:55 *🚀 Final Steps and Conclusion* - Completion of Tails installation and confirmation of successful flashing of the USB drive. - Optional steps after installation, such as creating persistent storage and configuring Tor connections. - Demonstration of Tails' functionality, including browsing with Tor, ensuring privacy and security, and shutting down to erase all traces. Made with HARPA AI
after just 10 minutes of nonsense im going to show this this COOL trick! followed by 6 minutes of nonsense so you can't just skip to the end and assume thats where the value is!
Did anyone else notice (from the Tails website) that the U.S. Department of State is a sponsor of Tails and has donated more than $100,000? Hmmm...backdoor for the U.S. govt?
Note that if the USB had a previous iso file and the first flash fails, you can always reflash again. Probably leftover bits from the previous iso file caused the first error
yeah i was pretty disappointed when he gave away a CCNP course and it was taught by kevin wallace instead of David himself. i still appreciate the free course but i like david better. KW is fine but it drives me nuts the way he says "switchies"
Downloaded and installed as suggested. My win11 machine eventually gets to the three dots, then nothing then hangs. Not sure if it is my thumbdrive (kingston 64Gb)/ Excellent video David, just having a bad day installing Tails for now. I changed USB slots on the PC, now I will reformat the drive and shoot for another install.
According to INFOSEC, some flash drives, especially SanDisk, are incompatible with TAILS. Which flash drive would you recommend; which flash drive do you use? Thhanks for your tutorials and tips!
Won't protect you if the pc has a hardware keylogger on it. Also if BIOS is passworded and secure boot enabled then you won't be able to do any of this.
I’m not sure about Tor anymore due to the recognition of a significant amount malicious nodes (e.g. kax17). I do like the ephemeralness of tails though.
Saw a talk on the HOPE conference from a gentleman named Michael Horowitz. At the time he stated that a Chromebook in guest mode offered anonymity as nothing of the session would be stored at all in the Chromebook. Something that may be worth checking out.
Bro 🤣 That’s I suppose anonymity for that Chromebook’s itself, can’t see history etc.. But online? Not at all, they’ll know your ip address and everything else there is to know 😂😂
What's the difference from using live image of an OS. Such as puppy liunx. It removes everything upon restart, it installs itself to the ram. And you can choose to save your data
Can you perhaps do a video on disk management. Encryption , sanitizing a disk so no data can be recovered. The main one is sanitizing a disk empty space only, say you deleted stuff and now want to clear that space only ,instead of a new installation with software and all that extra trouble
This may be a bit ignorant but what's the difference between this and a live USB installation (non persistent OS) of some other Linux install with the tor browser on it. I imagine there must be some other benefit to this over booting any old non persistent USB OS installation
It seems I may be confusing the use of "hard disk" when saying "Tails never writes anything to the hard disk and only runs from the memory of the computer" with the hard disk of the computer. That seemed obvious, because i figured it would still write to the flash drive's storage, but if it truly puts EVERYTHING in memory and even the flash drive that tails is installed on is safe from any kind of forensics or analysis, then tails is the tits
The difference is all the traffic is routed through TOR, so if you use an internet connected app that isn't a browser/web app the traffic is still going through TOR.
I have updated recently my tails and I wonder if you could create a video with more details about the usage of it plesae? I love your work keep doing it!
I have a couple of questions, can tails and kali Linux be installed on SATA hard drives in USB enclosures, I have them. Second can you make a USB bootable windows ?
I remember coming across Tails years ago, always thought, good to have and not because of any nefarious reasons, just nice to know you have privacy. I'm just a bit😊 hesitant I'll stuff it up. Not a lot of tech skills, reminds me of sitting thru junior algebra classes, yuk!!!
Good and straight to the point! Questions - is the speed of the USB stick relevant, or does everything just load into RAM? Also, perhaps a comparison between TAILS vs Qubes. I understand how TAILS is used - run from USB. Because both Qubes and TAILS "disappear" when shut down and rebooted - effectively new virtual machines - then both should be quite safe. Are they just different ways of doing things, or are there different scenarios when one is superior over another. Thanks!
Not sure about tails, but lots of experience booting other Linux distros from USB.... The flashing speed and boot speed are definitely affected by speed of usb drive, so I usually use a 3.0 USB (what the SS/blue port on PC is designed for). However, once loaded into ram, I don't believe it makes much difference. I'm only about 60% sure of this though, as I don't own any 2.0 USBs. Hope this helps....
Sir / can Tails be used on our own computer to make legal banking transactions before bring a computer to be repaired ? Hence being able to pay bills before the technicians open my computer ??
Tried it. Unfortunately, the Linux that it uses doesn't work well with the latest Mac hardware. My Mac is 2019 running Ventura, but the op system is not important. What fouls things up is that Linux doesn't have the drivers for the Mac WiFi and Bluetooth hardware. At the very best you would have to forget Bluetooth, and connect the keyboard via a cable, and use a mouse with a tail.
I’m not sure where I’m going wrong, I did everything as you said, however It gets stuck on a black screen with a flashing underscore on the top left corner
Amazing content. What would you suggest for a beginner to get the certification training from in the UK for online courses and classroom learning in London, where can I get trained for cybersecurity?
thanks for the explanation it's a really good video but I dont mind ppl checking what Im doing in my lapttop cause I have nothing left to lose anymore 😂
One thing I would like to emphasize here: Just using Tails alone does not make you invincible nor invisible: - Even with TOR, your ISP still can create connection profiles about you (what time did you connect to the internet, and how much traffic did you send and receive) - Tails does not protect against physical key loggers or any other physical surveillance - Tails does not protect against certain attack vectors a malicious websites has to offer (yes, if there is a virus, next time you boot it is gone - probably - but not only will it be present until you reboot, but all information you enter on any website will still be sent to said website and stored there, potentially for everyone to see) Lesson learned: Tails is just one tool in your tool belt to becoming invisible.
@@shinsen26this is a point not often recognized and why you should swap burners and pgp keys often because a Zero day attacking this vector isn’t going to be recognized by almost anyone 🤷🏼♂️
@@butmunchass It does protect from keyloggers , when it's a software keylogger on windows for example. So maybe not a lie , but maybe misheard/misunderstood.
Ventoy is truly awesome. Having multiple .iso's and other tools all on one USB that you can boot from is brilliant. I turned one of my professors onto it, and he loved it so much he wants to incorporate it into his curriculum.
Great video. The pdf is a stroke of genius for those of us struggling to move onwards from your remedial class! I attempted to print it off (I know 🙄) and sure enough it ran me out of (black) ink… Questions, i) does your ISP still see that you have headed off to tor? I assume it can. if so, as one of those who would like privacy, but “ have nothing to hide” ii) isn’t that a bad thing? As it will attract attention…
ISP will see that you are using Tor, but they won't know what you are exactly doing. Normally they know for example which website do you visit, but this can be mitigated when you use the onion routing. And about attracting attension, I'm pretty sure that they won't care, because many people use Tor nowadays and most of them for legitimate purposes. If you are not a wanted criminal, then I guess you don't have to worry about attracting attension.
Here the thoughts of another random person from the internet (me): Can your ISP see you headed off to TOR? Well, ISPs can see all of your traffic. Meaning they can see exactly what you are sending, and where you are sending it. TOR traffic is encrypted, so they cannot see what exactly you are doing, but they can see it is encrypted, and they can also see how much data you are sending/receiving, and at what time you are online (which can in some cases be sensitive information). Also, the ISP can see where you are connecting to (in this case a TOR node). If it's a node that the ISP knows is a TOR node, then they will know you are connecting to TOR. Is attention a bad thing? I would say it's quite hard to know the answer to that one. Probably it's not a bad thing. If you are running tails, it is extremely hard to hack you or your connection, so even if someone suspected you to do anything illicit (which you aren't doing), what are they going to do about it?
@@AtabascaelThank you very much. I appreciate that you have taken the time to clarify for me something that probably seems obvious to you. And fair play for tackling the second part which will be dependent on an individual’s circumstances (& ISP). It is good to have someone point out how much information I would or wouldn’t be revealing and then it’s ‘my call’. Cheers
i Appreciate all the content you provide us David but Tails doesn't works for M1 and M2 mac's, please kindly provide us a solution for this David, that would realy helps people like me !!
Tails has much smaller attack surface. Notice how minimal it is compared to Kali. Also it has some nice features out of the box that you would have to configure otherwise(such as ability to shred files or remove metadata in one click)
I am stuck in the last step where only need to boot.l use HP victus core í5 12th gen laptop. It isn't show the boot priority setting and if I disable safe boot, it will show me the recovery page. Please help me 😢😢
Getting "Tails" loaded onto a flashdrive was easy. Getting the computer to recognize or "mount" it is the issue. Every time I have tried my pc says that the file is corrupt and will not let me open the file to even view it. But I don't have a cookie-cutter pc either. One of my closest friends helped me build this tower. So, all the software and programming is different than most everyone else's. When trying to boot into BIOS I don't get the same windows that you all get. It goes into something completely different. I have tried several times to get "Tails" to work, but it is going to take someone with far more knowledge than what I have to succeed. Not that that is very hard. I don't know a lot, but I am trying to learn.
I am positive that the "programming" and software capabilities of your PC are not very different at all from most other people if you are using store-bought components and running any popular modern OS. you mentioned getting a different BIOS screen - different motherboards have different BIOS, unless you have the same type of motherboard as the computer in the video it is likely and *normal* for your BIOS to look a little different. you just have to navigate the menus to find the same options in the video. if you use Rufus or balenaEtcher to flash your USB drive, it'll have the bootloader installed - if you're dragging and dropping the .iso onto your USB it won't work. once the USB drive is flashed properly, if you find the boot order option in your BIOS and set it to boot from USB before hard drives, it should work. hope this helps!
also for example, I have an ASUS motherboard, but even still, my BIOS screen is different from his - no worries though. generally all the same options are present on most BIOS that I've seen. hopefully you're able to get your PC booting via USB! :)
To add onto what the other person said, sometimes different f keys (or the delete key) do different things on startup for different motherboard manufacturers. Look for something that says "boot menu" or "bios" on startup and hit that key
How to Install Tails on a USB Flash Drive in 7 minutes :)
PDF documentation: davidbombal.wiki/tailsprivacy
Download from here: tails.net/
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
RUclips: ruclips.net/user/davidbombal
// MENU //
00:00 - Intro
00:30 - What Is Tails?
02:40 - Tails Installation Tutorial
05:52 - Boot into BIOS
07:22 - Boot into Tails
07:30 - Create Persistant Storage
08:09 - Tor Connection
09:18 - Tails Installed
tails
tails os
tor
linux
tails linux
invisible online
hide identity
privacy
kali linux
online privacy
internet security
online privacy and security
online privacy tips
online privacy guide
internet security tutorial
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
David why you don't reply to our comment
Kindly please guide me about the 18 courses offered by EC-Counsil "Ultimate red team cyber suite"
The more you know the more you afraid of government
If David talk about it, it means the FEDS made it
Does not hide your isp so this is pointless if you want to go online to upload or download valuable information 🙄
I’ve used Tails for years. Something worth knowing is this: if you’re going to be downloading large files, the system will go to sleep after 5 minutes of inactivity. If it goes to sleep, your download will pause or fail. Make sure you right-click on the desktop, select SETTINGS, POWER, and set screen sleep time to something longer than 5 minutes. I just set my sleep to NEVER. You’ll have to do this every time you boot into Tails because it always boots to default values.
How do I get connect WiFi in tails yk
@@Hdskieiendod Ethernet would be a good option
Can i use mobile hotspot for using tails?
@@alokarpan822you can use your mobile phone wired as a hotspot, e.g android USB tethering. Unfortunately if Tails doesn’t recognize your wifi adapter by default, it’s almost impossible to make it work (install drivers etc). This is the most inconvenient thing in Tails as I think.
@@HdskieiendodYour adapter is not supported. You'll need to install it every time.
as usb tails owner i am happy that you are helping people upgrade their privacy :D
Thank you! Please share any tips and tricks you have for others to learn from you :)
okay!
idk maybe😁😅
@@davidbombal Have you heard of Whonix and is it any good?
Whonix vs Tails vs both.
yet you're still leaking mac adress of your device because wether it's usb or not network card own the same address regardles of OS
Tails extends Tor's anonymity to the ENTIRE system, keeping it encapsulated all along.
duh
@@lucutes2936 duh
How about this (
@wiktorhood8475
11 months ago
yet you're still leaking mac adress of your device because wether it's usb or not network card own the same address regardles of OS) ? Is it true?
@@MohamedBadawiEgyptdoes it really matter when you leave no evidence behind?
@@MohamedBadawiEgypt you can spoof tje MAC adrrss, i even have a custom made one lol 😂
This is so great because it has context and reality. Would love to see more. David, you are awesome !!!
Great video David I have been using this for years! Tails has great features and makes it so simple to be safe and when necessary with persistence.
Thank you! Please share any tips and tricks so others can learn from you :)
@@davidbombal the most important is 1) DO NOT resize the browser as that can be tracked from guard to relay to exit node, 2)NEVER use any PII and have completely unrelated accounts that NEVER tie back to you, 3)NEVER use the same phraseology or grammer techniques that you currently use, take the time to develop a separate persona with a different style, 4)if you are doing deep diving, physicality disable the mic and cam
@@mytechnotalentwhat PII means?
Do you need an antenna to hide the specifications of your PC like its MAC? or is it possible to hack or just browse quietly without an antenna?
@@tigreonice2339 PII is personally identifiable info. Anything is possible but the chances of someone targeting your location is rare.
@@tigreonice2339 PII: Personally Identifiable Information
A video on the update process could be helpful for the folks. You have a good way at explaining these things. I sure wish I had a video when I did my 1st update. I was very nervous about messing up my persistent storage.
Still waiting for this video ..
Still waiting too!!!
🎯 Key Takeaways for quick navigation:
00:00 *🖥️ Introduction to Tails Operating System*
- Explanation of Tails OS, recommended by privacy advocates like Edward Snowden and the Electronic Frontier Foundation.
- Tails functions as a portable OS on a USB drive, erasing all data upon shutdown, providing ephemeral browsing.
- Benefits of Tails include anonymity, avoiding online surveillance, and protection against censorship.
01:25 *🔒 Tails Persistent Storage and Encryption*
- Description of Tails' amnesic nature, erasing all activities upon shutdown, with an option for persistent storage.
- Use cases for persistent storage, such as storing documents, Wi-Fi passwords, and browser bookmarks.
- Importance of encryption for persistent storage, ensuring only authorized users can access the stored data.
03:12 *🛠️ Tails Installation Process*
- Requirements for installing Tails, including a USB stick, minimum RAM, and available options for operating systems.
- Step-by-step guide on downloading and verifying the Tails image, using tools like Etcher for installation.
- Precautions to take, such as backing up data on the USB drive before installation, and configuring BIOS settings for booting from the USB drive.
05:55 *🚀 Final Steps and Conclusion*
- Completion of Tails installation and confirmation of successful flashing of the USB drive.
- Optional steps after installation, such as creating persistent storage and configuring Tor connections.
- Demonstration of Tails' functionality, including browsing with Tor, ensuring privacy and security, and shutting down to erase all traces.
Made with HARPA AI
Well presented. Short, sweet, no fluff, educational as well as instructional. Oh if only all RUclips vids could be this efficient.
after just 10 minutes of nonsense im going to show this this COOL trick! followed by 6 minutes of nonsense so you can't just skip to the end and assume thats where the value is!
@@SubieNinja what
I'm glad I switched my career into cybersecurity! So much to learn
Same here. I was a nursing major before; this is a much better fit for me.
Did anyone else notice (from the Tails website) that the U.S. Department of State is a sponsor of Tails and has donated more than $100,000? Hmmm...backdoor for the U.S. govt?
Don't tell this guy who created tor.
The US government is so concerned about its citizens privacy an agency donated money to help it’s citizens remain anonymous online.
This privacy hack is funded by our intelligence agencies…GREAT
I'd like to think they enjoy using it for their own privacy needs and just want to support the project.
So you think they’re advertising the fact that they’re backdooring you? Lmfaoooooooooooooooooooo
Always a good content. Thanks, David.
David never disappoint us with his content... glad to advance my knowledge watching your videos.
Note that if the USB had a previous iso file and the first flash fails, you can always reflash again. Probably leftover bits from the previous iso file caused the first error
David Bombal always delivering MasterClass ❤
yeah i was pretty disappointed when he gave away a CCNP course and it was taught by kevin wallace instead of David himself. i still appreciate the free course but i like david better. KW is fine but it drives me nuts the way he says "switchies"
A formidably helpful video for protecting our hardly respected private informations, thanks a lot !
Clean concise and easy to understand great post David
Great tutorial @David as usual :). Interesting stuff. I had kali as a pendrive with persistence but that might change in the future.
If TAILS is that powerful, imagine HEADS!
Nah heads gotta be some offense Privacy system that like actually just malwares your name
Bruhhh 😂
Thank you David....i love the detail in your videos.
Thanks for making an update to the old video!
Thank you, your tutorial was very straightforward. I'm downloading Tails now.
Downloaded and installed as suggested. My win11 machine eventually gets to the three dots, then nothing then hangs. Not sure if it is my thumbdrive (kingston 64Gb)/ Excellent video David, just having a bad day installing Tails for now. I changed USB slots on the PC, now I will reformat the drive and shoot for another install.
Did you solve the problem?
As always great vid for beginners like me, thanks a lot Sir
Would have liked to see persistent storage demo'ed a bit more like rebooting and checking that data is still there for example.
What for? It just works
According to INFOSEC, some flash drives, especially SanDisk, are incompatible with TAILS. Which flash drive would you recommend; which flash drive do you use? Thhanks for your tutorials and tips!
😄love how you decided to demonstrate some implications with tails using your "own" channel as a reference, hehehe. Clever man ;-)
Won't protect you if the pc has a hardware keylogger on it. Also if BIOS is passworded and secure boot enabled then you won't be able to do any of this.
Like they say, it's not magic. You need more than 100 IQ for opsec
Yea, u typically want to use this on your personal system
I waited for that, Thanks
Happy to hear that! I hope you enjoy the video!
David,You are "AWESOME"!!!Not just because your one of the greatest pintesters but because "YOUR SMEGIN ENGLISH"!!! Benny Hill was English.❤❤❤
David as usual perfect tutorial .Thanks from Brumie
i am always happy when i see you notification 🎉
Happy to hear that!
Guys I did the same thing as given instruction on tails website and it worked.
Great works 🎉🎉🎉 my favorite channel ❤❤❤ by fro Venice 🇮🇹🇮🇹🇮🇹👍🏻
Thanks for presenting that info! The Gov doesn’t need MORE of our personal info…. Nor do the pirates!
Good video for privacy. I'm just starting my Sec + and interested in CTF. Please consider an intro to CTF video.
Great tutorial David!
Well explained, I suggest people do this when doing online banking etc, but PLEASE keep using CASH, when they take that away it is game over
lol you're commenting on RUclips ffs
i was just waiting for you to do a video about tails, and you have kill it. i have being inspire by your videos
I’m not sure about Tor anymore due to the recognition of a significant amount malicious nodes (e.g. kax17). I do like the ephemeralness of tails though.
Saw a talk on the HOPE conference from a gentleman named Michael Horowitz. At the time he stated that a Chromebook in guest mode offered anonymity as nothing of the session would be stored at all in the Chromebook. Something that may be worth checking out.
It’s Google though, maybe not on Chromebook, definitely on their servers. 😅
@@mdaxeYea for real. Stored in their servers for sure.
Bro 🤣
That’s I suppose anonymity for that Chromebook’s itself, can’t see history etc..
But online? Not at all, they’ll know your ip address and everything else there is to know 😂😂
I'm happy to hear about this. It is essential
This may be a stupid noob question but... Can I run Tails with Virtualbox (or similar)? Or this is only made for USB?
NVM... I looked it up. Although possible, they don't recommend it (it's on their website)
What's the difference from using live image of an OS. Such as puppy liunx. It removes everything upon restart, it installs itself to the ram. And you can choose to save your data
You are such an inspiration sir. Love from India.🫡
Thank you very much!
Can you perhaps do a video on disk management. Encryption , sanitizing a disk so no data can be recovered. The main one is sanitizing a disk empty space only, say you deleted stuff and now want to clear that space only ,instead of a new installation with software and all that extra trouble
Linux dd
Shred
Duck Duck is no more "privacy-oriented" in practice than anything else. They market privacy and deliver - Google.
Thank you Mr Bombal, the tutorial was so simple n so useful
Thank you sir David ❤ from PH
Except for exit node attacks and RCE.. Firefox exploits aren't uncommon a new bug for one shows up in JS engine every couple weeks
Thank you for the PDF's file. 🙂👍
You are welcome!
love this!!! thank you!
This may be a bit ignorant but what's the difference between this and a live USB installation (non persistent OS) of some other Linux install with the tor browser on it. I imagine there must be some other benefit to this over booting any old non persistent USB OS installation
It seems I may be confusing the use of "hard disk" when saying "Tails never writes anything to the hard disk and only runs from the memory of the computer" with the hard disk of the computer. That seemed obvious, because i figured it would still write to the flash drive's storage, but if it truly puts EVERYTHING in memory and even the flash drive that tails is installed on is safe from any kind of forensics or analysis, then tails is the tits
The difference is all the traffic is routed through TOR, so if you use an internet connected app that isn't a browser/web app the traffic is still going through TOR.
Good gob david🎉🎉
My thumbnail guys having fun :)
@@davidbombali really in love with what are you doing because you have more secsussfull than any one 🎉🎉❤❤
Tails is good, I'll grant you that, but it depends upon Tor, which is only as good as the last node (and user actions)
Been a while since I tried tor, but every time I have tried it it was so slow it was frustrating. It's like dial-up, but slower.
great tutorial! Question: Do you enable SECURE BOOT when you are NOT using TAILS?
Apart from the default tor browser, Whats the benefit of using Tails over for instance kali live from usb?
Great video.
Is a must to use Etcher, or can one use Rufus instead?
I have updated recently my tails and I wonder if you could create a video with more details about the usage of it plesae? I love your work keep doing it!
Thank you sir David.❤
Very useful - thanks :D
I have a couple of questions, can tails and kali Linux be installed on SATA hard drives in USB enclosures, I have them. Second can you make a USB bootable windows ?
No M1/M2 installer support on Mac is really sad.
well mac is kinda anti-privacy anyways.... run a VM if needed to do the install
I remember coming across Tails years ago, always thought, good to have and not because of any nefarious reasons, just nice to know you have privacy. I'm just a bit😊 hesitant I'll stuff it up. Not a lot of tech skills, reminds me of sitting thru junior algebra classes, yuk!!!
Good and straight to the point! Questions - is the speed of the USB stick relevant, or does everything just load into RAM? Also, perhaps a comparison between TAILS vs Qubes. I understand how TAILS is used - run from USB. Because both Qubes and TAILS "disappear" when shut down and rebooted - effectively new virtual machines - then both should be quite safe. Are they just different ways of doing things, or are there different scenarios when one is superior over another. Thanks!
Not sure about tails, but lots of experience booting other Linux distros from USB.... The flashing speed and boot speed are definitely affected by speed of usb drive, so I usually use a 3.0 USB (what the SS/blue port on PC is designed for). However, once loaded into ram, I don't believe it makes much difference. I'm only about 60% sure of this though, as I don't own any 2.0 USBs. Hope this helps....
Sir / can Tails be used on our own computer to make legal banking transactions before bring a computer to be repaired ? Hence being able to pay bills before the technicians open my computer ??
you do not want to use anything in tails that requires a password. Ever.
How does this compare to WinPE with PortableApps?
5:26 Mine just says flash failed. I tried multiple times with different computers and different usb sticks and same error.
Hey David ! I’m new entering the tech world as well as cyber security, what are some books that would be beneficial to my learning ?
Wasn't TOR dev like involved with the NSA?
Nice one David!
Tried it.
Unfortunately, the Linux that it uses doesn't work well with the latest Mac hardware.
My Mac is 2019 running Ventura, but the op system is not important.
What fouls things up is that Linux doesn't have the drivers for the Mac WiFi and Bluetooth hardware.
At the very best you would have to forget Bluetooth, and connect the keyboard via a cable, and use a mouse with a tail.
On the tails website they have information on which wifi dongles work with it, if your built it ones won't.
I’m not sure where I’m going wrong, I did everything as you said, however It gets stuck on a black screen with a flashing underscore on the top left corner
Did u fix it
@@IbrahimYousef-fl8qb sort of, I used my laptop instead of my pc and it worked
Thank u David for this information
When i was flashing the data, it failed validating. Now I'm unable to use the usb, what should i do?
Amazing content. What would you suggest for a beginner to get the certification training from in the UK for online courses and classroom learning in London, where can I get trained for cybersecurity?
Thank you so much David
thanks for the explanation it's a really good video but I dont mind ppl checking what Im doing in my lapttop cause I have nothing left to lose anymore 😂
One thing I would like to emphasize here:
Just using Tails alone does not make you invincible nor invisible:
- Even with TOR, your ISP still can create connection profiles about you (what time did you connect to the internet, and how much traffic did you send and receive)
- Tails does not protect against physical key loggers or any other physical surveillance
- Tails does not protect against certain attack vectors a malicious websites has to offer (yes, if there is a virus, next time you boot it is gone - probably - but not only will it be present until you reboot, but all information you enter on any website will still be sent to said website and stored there, potentially for everyone to see)
Lesson learned: Tails is just one tool in your tool belt to becoming invisible.
And anyway if your bootloader is hacked, bye bye the privacy, even with tails.
And for god sake turn off Java 🤦♂️
@@shinsen26this is a point not often recognized and why you should swap burners and pgp keys often because a Zero day attacking this vector isn’t going to be recognized by almost anyone 🤷🏼♂️
Yeah I agree. The channel made an error when he said that TAILS prevents keyloggers which you're right it doesn't.
@@butmunchass It does protect from keyloggers , when it's a software keylogger on windows for example. So maybe not a lie , but maybe misheard/misunderstood.
Persistent storage is mounted on the flash drive or on the computer memory?
It's on the flash drive
In Tails if you use terminal commands ex. curl it will use as well TOR?
Applications that don't use TOR will be automatically blocked by default.
Asus has the craziest bios ive ever seen. It looks like a fake hacker movie
you could probably use ventoy which supports secure boot.
Ventoy is truly awesome. Having multiple .iso's and other tools all on one USB that you can boot from is brilliant. I turned one of my professors onto it, and he loved it so much he wants to incorporate it into his curriculum.
One of the things I was told when using tails is not to use persistent storage or not to use tails as a VM.
My thoughts exactly
@@captainofouterspace Is there a book or something for guiding us to implement this
Do you have any videos or are you review deeper network?
Mr David one question Kali Linux USB support monitor mode and packet injection does ?
Is Tails used for browsing the web only? can I install or run any programs on it? Is it a Linux based OS? That wasn't mentioned in the video.
Is there a way to partition Tails so you can live boot from the USB, but also use the USB for other files and applications separate from Tails?
Great video.
The pdf is a stroke of genius for those of us struggling to move onwards from your remedial class!
I attempted to print it off (I know 🙄) and sure enough it ran me out of (black) ink…
Questions,
i) does your ISP still see that you have headed off to tor?
I assume it can.
if so, as one of those who would like privacy, but “ have nothing to hide”
ii) isn’t that a bad thing? As it will attract attention…
ISP will see that you are using Tor, but they won't know what you are exactly doing. Normally they know for example which website do you visit, but this can be mitigated when you use the onion routing. And about attracting attension, I'm pretty sure that they won't care, because many people use Tor nowadays and most of them for legitimate purposes. If you are not a wanted criminal, then I guess you don't have to worry about attracting attension.
Here the thoughts of another random person from the internet (me):
Can your ISP see you headed off to TOR? Well, ISPs can see all of your traffic. Meaning they can see exactly what you are sending, and where you are sending it. TOR traffic is encrypted, so they cannot see what exactly you are doing, but they can see it is encrypted, and they can also see how much data you are sending/receiving, and at what time you are online (which can in some cases be sensitive information). Also, the ISP can see where you are connecting to (in this case a TOR node). If it's a node that the ISP knows is a TOR node, then they will know you are connecting to TOR.
Is attention a bad thing? I would say it's quite hard to know the answer to that one. Probably it's not a bad thing. If you are running tails, it is extremely hard to hack you or your connection, so even if someone suspected you to do anything illicit (which you aren't doing), what are they going to do about it?
@@AtabascaelThank you very much. I appreciate that you have taken the time to clarify for me something that probably seems obvious to you. And fair play for tackling the second part which will be dependent on an individual’s circumstances (& ISP). It is good to have someone point out how much information I would or wouldn’t be revealing and then it’s ‘my call’. Cheers
it would be safer if using your neighbor's ISP...
@@rongziwang8722 😉
Wouldnt this be just like running Ubuntu on a flash drive?
i Appreciate all the content you provide us David but Tails doesn't works for M1 and M2 mac's, please kindly provide us a solution for this David, that would realy helps people like me !!
So... whats the benifit of running tails compared to running say a Kali-live USB with persistence and using tor and anonsurf?
Tails has much smaller attack surface. Notice how minimal it is compared to Kali. Also it has some nice features out of the box that you would have to configure otherwise(such as ability to shred files or remove metadata in one click)
Thank you .
I have nothing to hide.
But my business is my business.
It's a good idea to install this on a HDD with persistent storage option?
Is there any trace of tails left on a machine after the usb thumb drive is removed?
No. 👍
@@SchoolforHackers Thanks
Cool bios
Is Tails somewhat virus resistant or perhaps virus proof to some degree because of limited persistence?
Like you said it's not invincible but will it be good for stopping hackers getting your debt/credit card numbers and stuff like that ?
I am stuck in the last step where only need to boot.l use HP victus core í5 12th gen laptop. It isn't show the boot priority setting and if I disable safe boot, it will show me the recovery page. Please help me 😢😢
Getting "Tails" loaded onto a flashdrive was easy. Getting the computer to recognize or "mount" it is the issue. Every time I have tried my pc says that the file is corrupt and will not let me open the file to even view it. But I don't have a cookie-cutter pc either. One of my closest friends helped me build this tower. So, all the software and programming is different than most everyone else's. When trying to boot into BIOS I don't get the same windows that you all get. It goes into something completely different. I have tried several times to get "Tails" to work, but it is going to take someone with far more knowledge than what I have to succeed. Not that that is very hard. I don't know a lot, but I am trying to learn.
I am positive that the "programming" and software capabilities of your PC are not very different at all from most other people if you are using store-bought components and running any popular modern OS. you mentioned getting a different BIOS screen - different motherboards have different BIOS, unless you have the same type of motherboard as the computer in the video it is likely and *normal* for your BIOS to look a little different. you just have to navigate the menus to find the same options in the video. if you use Rufus or balenaEtcher to flash your USB drive, it'll have the bootloader installed - if you're dragging and dropping the .iso onto your USB it won't work. once the USB drive is flashed properly, if you find the boot order option in your BIOS and set it to boot from USB before hard drives, it should work. hope this helps!
also for example, I have an ASUS motherboard, but even still, my BIOS screen is different from his - no worries though. generally all the same options are present on most BIOS that I've seen. hopefully you're able to get your PC booting via USB! :)
To add onto what the other person said, sometimes different f keys (or the delete key) do different things on startup for different motherboard manufacturers. Look for something that says "boot menu" or "bios" on startup and hit that key