Tails Linux USB with Persistence (Be invisible online in 7 minutes)

Поделиться
HTML-код
  • Опубликовано: 21 дек 2024

Комментарии • 799

  • @davidbombal
    @davidbombal  Год назад +71

    How to Install Tails on a USB Flash Drive in 7 minutes :)
    PDF documentation: davidbombal.wiki/tailsprivacy
    Download from here: tails.net/
    // David's SOCIAL //
    Discord: discord.com/invite/usKSyzb
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    RUclips: ruclips.net/user/davidbombal
    // MENU //
    00:00 - Intro
    00:30 - What Is Tails?
    02:40 - Tails Installation Tutorial
    05:52 - Boot into BIOS
    07:22 - Boot into Tails
    07:30 - Create Persistant Storage
    08:09 - Tor Connection
    09:18 - Tails Installed
    tails
    tails os
    tor
    linux
    tails linux
    invisible online
    hide identity
    privacy
    kali linux
    online privacy
    internet security
    online privacy and security
    online privacy tips
    online privacy guide
    internet security tutorial
    Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration.
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    • @dim_mek
      @dim_mek Год назад

      David why you don't reply to our comment

    • @thecamvideos101
      @thecamvideos101 Год назад +1

      Kindly please guide me about the 18 courses offered by EC-Counsil "Ultimate red team cyber suite"

    • @RebellionBloodshed
      @RebellionBloodshed Год назад

      The more you know the more you afraid of government

    • @suiwave
      @suiwave Год назад

      If David talk about it, it means the FEDS made it

    • @jlrockafella
      @jlrockafella Год назад +1

      Does not hide your isp so this is pointless if you want to go online to upload or download valuable information 🙄

  • @hawkmaster381
    @hawkmaster381 Год назад +269

    I’ve used Tails for years. Something worth knowing is this: if you’re going to be downloading large files, the system will go to sleep after 5 minutes of inactivity. If it goes to sleep, your download will pause or fail. Make sure you right-click on the desktop, select SETTINGS, POWER, and set screen sleep time to something longer than 5 minutes. I just set my sleep to NEVER. You’ll have to do this every time you boot into Tails because it always boots to default values.

    • @Hdskieiendod
      @Hdskieiendod 10 месяцев назад +1

      How do I get connect WiFi in tails yk

    • @lionelfaith3646
      @lionelfaith3646 9 месяцев назад +3

      @@Hdskieiendod Ethernet would be a good option

    • @alokarpan822
      @alokarpan822 8 месяцев назад +1

      Can i use mobile hotspot for using tails?

    • @dank6372
      @dank6372 7 месяцев назад

      @@alokarpan822you can use your mobile phone wired as a hotspot, e.g android USB tethering. Unfortunately if Tails doesn’t recognize your wifi adapter by default, it’s almost impossible to make it work (install drivers etc). This is the most inconvenient thing in Tails as I think.

    • @MrGrappleMan
      @MrGrappleMan 6 месяцев назад

      ​@@HdskieiendodYour adapter is not supported. You'll need to install it every time.

  • @litheha
    @litheha Год назад +322

    as usb tails owner i am happy that you are helping people upgrade their privacy :D

    • @davidbombal
      @davidbombal  Год назад +36

      Thank you! Please share any tips and tricks you have for others to learn from you :)

    • @litheha
      @litheha Год назад +8

      okay!

    • @litheha
      @litheha Год назад +2

      idk maybe😁😅

    • @llllllblodllllll
      @llllllblodllllll Год назад +2

      @@davidbombal Have you heard of Whonix and is it any good?
      Whonix vs Tails vs both.

    • @wiktorhood8475
      @wiktorhood8475 Год назад +6

      yet you're still leaking mac adress of your device because wether it's usb or not network card own the same address regardles of OS

  • @savagepro9060
    @savagepro9060 Год назад +105

    Tails extends Tor's anonymity to the ENTIRE system, keeping it encapsulated all along.

    • @lucutes2936
      @lucutes2936 4 месяца назад

      duh

    • @savagepro9060
      @savagepro9060 4 месяца назад

      @@lucutes2936 duh

    • @MohamedBadawiEgypt
      @MohamedBadawiEgypt 4 месяца назад

      How about this (
      @wiktorhood8475
      11 months ago
      yet you're still leaking mac adress of your device because wether it's usb or not network card own the same address regardles of OS) ? Is it true?

    • @LukasMazz
      @LukasMazz 3 месяца назад +1

      ​@@MohamedBadawiEgyptdoes it really matter when you leave no evidence behind?

    • @Light-uw5es
      @Light-uw5es 3 месяца назад +1

      ​@@MohamedBadawiEgypt you can spoof tje MAC adrrss, i even have a custom made one lol 😂

  • @QuangDemo769
    @QuangDemo769 Год назад +19

    This is so great because it has context and reality. Would love to see more. David, you are awesome !!!

  • @mytechnotalent
    @mytechnotalent Год назад +51

    Great video David I have been using this for years! Tails has great features and makes it so simple to be safe and when necessary with persistence.

    • @davidbombal
      @davidbombal  Год назад +7

      Thank you! Please share any tips and tricks so others can learn from you :)

    • @mytechnotalent
      @mytechnotalent Год назад +19

      @@davidbombal the most important is 1) DO NOT resize the browser as that can be tracked from guard to relay to exit node, 2)NEVER use any PII and have completely unrelated accounts that NEVER tie back to you, 3)NEVER use the same phraseology or grammer techniques that you currently use, take the time to develop a separate persona with a different style, 4)if you are doing deep diving, physicality disable the mic and cam

    • @tigreonice2339
      @tigreonice2339 Год назад +1

      ​@@mytechnotalentwhat PII means?
      Do you need an antenna to hide the specifications of your PC like its MAC? or is it possible to hack or just browse quietly without an antenna?

    • @mytechnotalent
      @mytechnotalent Год назад

      @@tigreonice2339 PII is personally identifiable info. Anything is possible but the chances of someone targeting your location is rare.

    • @apveening
      @apveening Год назад

      @@tigreonice2339 PII: Personally Identifiable Information

  • @TinkerTech
    @TinkerTech Год назад +21

    A video on the update process could be helpful for the folks. You have a good way at explaining these things. I sure wish I had a video when I did my 1st update. I was very nervous about messing up my persistent storage.

  • @Pupeyful
    @Pupeyful 8 месяцев назад +3

    🎯 Key Takeaways for quick navigation:
    00:00 *🖥️ Introduction to Tails Operating System*
    - Explanation of Tails OS, recommended by privacy advocates like Edward Snowden and the Electronic Frontier Foundation.
    - Tails functions as a portable OS on a USB drive, erasing all data upon shutdown, providing ephemeral browsing.
    - Benefits of Tails include anonymity, avoiding online surveillance, and protection against censorship.
    01:25 *🔒 Tails Persistent Storage and Encryption*
    - Description of Tails' amnesic nature, erasing all activities upon shutdown, with an option for persistent storage.
    - Use cases for persistent storage, such as storing documents, Wi-Fi passwords, and browser bookmarks.
    - Importance of encryption for persistent storage, ensuring only authorized users can access the stored data.
    03:12 *🛠️ Tails Installation Process*
    - Requirements for installing Tails, including a USB stick, minimum RAM, and available options for operating systems.
    - Step-by-step guide on downloading and verifying the Tails image, using tools like Etcher for installation.
    - Precautions to take, such as backing up data on the USB drive before installation, and configuring BIOS settings for booting from the USB drive.
    05:55 *🚀 Final Steps and Conclusion*
    - Completion of Tails installation and confirmation of successful flashing of the USB drive.
    - Optional steps after installation, such as creating persistent storage and configuring Tor connections.
    - Demonstration of Tails' functionality, including browsing with Tor, ensuring privacy and security, and shutting down to erase all traces.
    Made with HARPA AI

  • @jeff95050
    @jeff95050 Год назад +74

    Well presented. Short, sweet, no fluff, educational as well as instructional. Oh if only all RUclips vids could be this efficient.

    • @SubieNinja
      @SubieNinja Год назад +4

      after just 10 minutes of nonsense im going to show this this COOL trick! followed by 6 minutes of nonsense so you can't just skip to the end and assume thats where the value is!

    • @lucutes2936
      @lucutes2936 4 месяца назад

      @@SubieNinja what

  • @steventelfer8186
    @steventelfer8186 10 месяцев назад +24

    I'm glad I switched my career into cybersecurity! So much to learn

    • @dohnjoe9211
      @dohnjoe9211 10 месяцев назад +1

      Same here. I was a nursing major before; this is a much better fit for me.

  • @johnfindley9470
    @johnfindley9470 Год назад +539

    Did anyone else notice (from the Tails website) that the U.S. Department of State is a sponsor of Tails and has donated more than $100,000? Hmmm...backdoor for the U.S. govt?

    • @wintrywind
      @wintrywind Год назад +349

      Don't tell this guy who created tor.

    • @cyrix_1
      @cyrix_1 Год назад +145

      The US government is so concerned about its citizens privacy an agency donated money to help it’s citizens remain anonymous online.

    • @Ym-oi2we
      @Ym-oi2we Год назад

      This privacy hack is funded by our intelligence agencies…GREAT

    • @MichiganHypnosisInstitute
      @MichiganHypnosisInstitute Год назад +79

      I'd like to think they enjoy using it for their own privacy needs and just want to support the project.

    • @troyflatland5299
      @troyflatland5299 Год назад +68

      So you think they’re advertising the fact that they’re backdooring you? Lmfaoooooooooooooooooooo

  • @spwan3
    @spwan3 Год назад +10

    Always a good content. Thanks, David.

  • @demotedc0der
    @demotedc0der Год назад +22

    David never disappoint us with his content... glad to advance my knowledge watching your videos.

  • @bensonkamau1844
    @bensonkamau1844 Год назад +4

    Note that if the USB had a previous iso file and the first flash fails, you can always reflash again. Probably leftover bits from the previous iso file caused the first error

  • @kartelune2730
    @kartelune2730 Год назад +9

    David Bombal always delivering MasterClass ❤

    • @SubieNinja
      @SubieNinja Год назад

      yeah i was pretty disappointed when he gave away a CCNP course and it was taught by kevin wallace instead of David himself. i still appreciate the free course but i like david better. KW is fine but it drives me nuts the way he says "switchies"

  • @jyffreys
    @jyffreys Месяц назад +1

    A formidably helpful video for protecting our hardly respected private informations, thanks a lot !

  • @robtihanyi1155
    @robtihanyi1155 17 дней назад

    Clean concise and easy to understand great post David

  • @cyberluk3
    @cyberluk3 8 месяцев назад

    Great tutorial @David as usual :). Interesting stuff. I had kali as a pendrive with persistence but that might change in the future.

  • @savagepro9060
    @savagepro9060 Год назад +53

    If TAILS is that powerful, imagine HEADS!

    • @vixshire3672
      @vixshire3672 Месяц назад

      Nah heads gotta be some offense Privacy system that like actually just malwares your name

    • @ZIRAEL517
      @ZIRAEL517 Месяц назад +2

      Bruhhh 😂

  • @rem000
    @rem000 Год назад +3

    Thank you David....i love the detail in your videos.

  • @JaykPuten
    @JaykPuten Год назад +2

    Thanks for making an update to the old video!

  • @danjo8673
    @danjo8673 Год назад +7

    Thank you, your tutorial was very straightforward. I'm downloading Tails now.

  • @Leaf.Commented
    @Leaf.Commented 9 месяцев назад +5

    Downloaded and installed as suggested. My win11 machine eventually gets to the three dots, then nothing then hangs. Not sure if it is my thumbdrive (kingston 64Gb)/ Excellent video David, just having a bad day installing Tails for now. I changed USB slots on the PC, now I will reformat the drive and shoot for another install.

  • @BonVoyageWorld
    @BonVoyageWorld Год назад +4

    As always great vid for beginners like me, thanks a lot Sir

  • @greatwolf.
    @greatwolf. Год назад +7

    Would have liked to see persistent storage demo'ed a bit more like rebooting and checking that data is still there for example.

    • @bigpickles
      @bigpickles Год назад +2

      What for? It just works

  • @theconstantgardene
    @theconstantgardene Год назад +4

    According to INFOSEC, some flash drives, especially SanDisk, are incompatible with TAILS. Which flash drive would you recommend; which flash drive do you use? Thhanks for your tutorials and tips!

  • @summerbee80
    @summerbee80 Год назад

    😄love how you decided to demonstrate some implications with tails using your "own" channel as a reference, hehehe. Clever man ;-)

  • @brave.freak1995
    @brave.freak1995 Год назад +9

    Won't protect you if the pc has a hardware keylogger on it. Also if BIOS is passworded and secure boot enabled then you won't be able to do any of this.

    • @bigpickles
      @bigpickles Год назад +10

      Like they say, it's not magic. You need more than 100 IQ for opsec

    • @dominicj
      @dominicj 4 месяца назад

      Yea, u typically want to use this on your personal system

  • @ЮрійМинаш
    @ЮрійМинаш Год назад +2

    I waited for that, Thanks

    • @davidbombal
      @davidbombal  Год назад +2

      Happy to hear that! I hope you enjoy the video!

  • @kentallard1881
    @kentallard1881 Год назад +1

    David,You are "AWESOME"!!!Not just because your one of the greatest pintesters but because "YOUR SMEGIN ENGLISH"!!! Benny Hill was English.❤❤❤

  • @janekmachnicki2593
    @janekmachnicki2593 Год назад

    David as usual perfect tutorial .Thanks from Brumie

  • @fear_theGhost
    @fear_theGhost Год назад +1

    i am always happy when i see you notification 🎉

  • @WorldReciter
    @WorldReciter Год назад +2

    Guys I did the same thing as given instruction on tails website and it worked.

  • @tecnicamoto75
    @tecnicamoto75 Год назад

    Great works 🎉🎉🎉 my favorite channel ❤❤❤ by fro Venice 🇮🇹🇮🇹🇮🇹👍🏻

  • @sondrax
    @sondrax Год назад +1

    Thanks for presenting that info! The Gov doesn’t need MORE of our personal info…. Nor do the pirates!

  • @uMalice
    @uMalice Год назад +3

    Good video for privacy. I'm just starting my Sec + and interested in CTF. Please consider an intro to CTF video.

  • @juliusrowe9374
    @juliusrowe9374 Год назад +1

    Great tutorial David!

  • @makinganoise6028
    @makinganoise6028 Год назад +16

    Well explained, I suggest people do this when doing online banking etc, but PLEASE keep using CASH, when they take that away it is game over

    • @MarkFugitive-
      @MarkFugitive- Месяц назад

      lol you're commenting on RUclips ffs

  • @FUNNYEMPIRE2
    @FUNNYEMPIRE2 Год назад

    i was just waiting for you to do a video about tails, and you have kill it. i have being inspire by your videos

  • @SadatayWadatah
    @SadatayWadatah Год назад +2

    I’m not sure about Tor anymore due to the recognition of a significant amount malicious nodes (e.g. kax17). I do like the ephemeralness of tails though.

  • @dieselstruck
    @dieselstruck Год назад +2

    Saw a talk on the HOPE conference from a gentleman named Michael Horowitz. At the time he stated that a Chromebook in guest mode offered anonymity as nothing of the session would be stored at all in the Chromebook. Something that may be worth checking out.

    • @mdaxe
      @mdaxe Год назад +11

      It’s Google though, maybe not on Chromebook, definitely on their servers. 😅

    • @macruz8503
      @macruz8503 4 месяца назад

      @@mdaxeYea for real. Stored in their servers for sure.

    • @Revelation-X
      @Revelation-X Месяц назад

      Bro 🤣
      That’s I suppose anonymity for that Chromebook’s itself, can’t see history etc..
      But online? Not at all, they’ll know your ip address and everything else there is to know 😂😂

  • @sika231
    @sika231 Год назад

    I'm happy to hear about this. It is essential

  • @g65_
    @g65_ Год назад +5

    This may be a stupid noob question but... Can I run Tails with Virtualbox (or similar)? Or this is only made for USB?

    • @g65_
      @g65_ Год назад +6

      NVM... I looked it up. Although possible, they don't recommend it (it's on their website)

  • @efethecaptain6
    @efethecaptain6 6 месяцев назад +1

    What's the difference from using live image of an OS. Such as puppy liunx. It removes everything upon restart, it installs itself to the ram. And you can choose to save your data

  • @anandparan3011
    @anandparan3011 Год назад +5

    You are such an inspiration sir. Love from India.🫡

  • @ludickr
    @ludickr Год назад +3

    Can you perhaps do a video on disk management. Encryption , sanitizing a disk so no data can be recovered. The main one is sanitizing a disk empty space only, say you deleted stuff and now want to clear that space only ,instead of a new installation with software and all that extra trouble

  • @bitegoatie
    @bitegoatie Год назад +9

    Duck Duck is no more "privacy-oriented" in practice than anything else. They market privacy and deliver - Google.

  • @6RZA
    @6RZA Год назад +6

    Thank you Mr Bombal, the tutorial was so simple n so useful

  • @cdvlogs7631
    @cdvlogs7631 Год назад

    Thank you sir David ❤ from PH

  • @AbcXyz-rn2lz
    @AbcXyz-rn2lz Год назад +2

    Except for exit node attacks and RCE.. Firefox exploits aren't uncommon a new bug for one shows up in JS engine every couple weeks

  • @michelamar-khodja8591
    @michelamar-khodja8591 Год назад

    Thank you for the PDF's file. 🙂👍

  • @schultzsas
    @schultzsas Год назад +1

    love this!!! thank you!

  • @ThrowawaySauce
    @ThrowawaySauce Год назад +1

    This may be a bit ignorant but what's the difference between this and a live USB installation (non persistent OS) of some other Linux install with the tor browser on it. I imagine there must be some other benefit to this over booting any old non persistent USB OS installation

    • @ThrowawaySauce
      @ThrowawaySauce Год назад

      It seems I may be confusing the use of "hard disk" when saying "Tails never writes anything to the hard disk and only runs from the memory of the computer" with the hard disk of the computer. That seemed obvious, because i figured it would still write to the flash drive's storage, but if it truly puts EVERYTHING in memory and even the flash drive that tails is installed on is safe from any kind of forensics or analysis, then tails is the tits

    • @memitim171
      @memitim171 Год назад +3

      The difference is all the traffic is routed through TOR, so if you use an internet connected app that isn't a browser/web app the traffic is still going through TOR.

  • @omaralturk3632
    @omaralturk3632 Год назад +2

    Good gob david🎉🎉

    • @davidbombal
      @davidbombal  Год назад

      My thumbnail guys having fun :)

    • @omaralturk3632
      @omaralturk3632 Год назад

      ​@@davidbombali really in love with what are you doing because you have more secsussfull than any one 🎉🎉❤❤

  • @redacted629
    @redacted629 Год назад +10

    Tails is good, I'll grant you that, but it depends upon Tor, which is only as good as the last node (and user actions)

    • @jeremywj
      @jeremywj 11 месяцев назад +2

      Been a while since I tried tor, but every time I have tried it it was so slow it was frustrating. It's like dial-up, but slower.

  • @chessmambo
    @chessmambo 11 месяцев назад

    great tutorial! Question: Do you enable SECURE BOOT when you are NOT using TAILS?

  • @michaelots8928
    @michaelots8928 Год назад +1

    Apart from the default tor browser, Whats the benefit of using Tails over for instance kali live from usb?

  • @dRoseaK
    @dRoseaK 8 месяцев назад

    Great video.
    Is a must to use Etcher, or can one use Rufus instead?

  • @fabiosimedo
    @fabiosimedo Год назад +1

    I have updated recently my tails and I wonder if you could create a video with more details about the usage of it plesae? I love your work keep doing it!

  • @MohitKhare
    @MohitKhare Год назад +1

    Thank you sir David.❤

  • @stigc.minkstuen
    @stigc.minkstuen Год назад +1

    Very useful - thanks :D

  • @hollandcodex7172
    @hollandcodex7172 Год назад +1

    I have a couple of questions, can tails and kali Linux be installed on SATA hard drives in USB enclosures, I have them. Second can you make a USB bootable windows ?

  • @ToPanPawel
    @ToPanPawel Год назад +7

    No M1/M2 installer support on Mac is really sad.

    • @LiLBitsDK
      @LiLBitsDK Год назад

      well mac is kinda anti-privacy anyways.... run a VM if needed to do the install

  • @Cam-vj1io
    @Cam-vj1io 6 месяцев назад

    I remember coming across Tails years ago, always thought, good to have and not because of any nefarious reasons, just nice to know you have privacy. I'm just a bit😊 hesitant I'll stuff it up. Not a lot of tech skills, reminds me of sitting thru junior algebra classes, yuk!!!

  • @veredictum4503
    @veredictum4503 Год назад +4

    Good and straight to the point! Questions - is the speed of the USB stick relevant, or does everything just load into RAM? Also, perhaps a comparison between TAILS vs Qubes. I understand how TAILS is used - run from USB. Because both Qubes and TAILS "disappear" when shut down and rebooted - effectively new virtual machines - then both should be quite safe. Are they just different ways of doing things, or are there different scenarios when one is superior over another. Thanks!

    • @HistoricalEventsByDay
      @HistoricalEventsByDay Год назад +3

      Not sure about tails, but lots of experience booting other Linux distros from USB.... The flashing speed and boot speed are definitely affected by speed of usb drive, so I usually use a 3.0 USB (what the SS/blue port on PC is designed for). However, once loaded into ram, I don't believe it makes much difference. I'm only about 60% sure of this though, as I don't own any 2.0 USBs. Hope this helps....

  • @ikust007
    @ikust007 Год назад +3

    Sir / can Tails be used on our own computer to make legal banking transactions before bring a computer to be repaired ? Hence being able to pay bills before the technicians open my computer ??

    • @tenfourproductionsllc
      @tenfourproductionsllc Год назад +2

      you do not want to use anything in tails that requires a password. Ever.

  • @UnanimousDelivers
    @UnanimousDelivers Год назад

    How does this compare to WinPE with PortableApps?

  • @NammaReels8
    @NammaReels8 8 месяцев назад

    5:26 Mine just says flash failed. I tried multiple times with different computers and different usb sticks and same error.

  • @andrewdimas
    @andrewdimas Год назад +1

    Hey David ! I’m new entering the tech world as well as cyber security, what are some books that would be beneficial to my learning ?

  • @whiskymarko
    @whiskymarko 7 месяцев назад +1

    Wasn't TOR dev like involved with the NSA?

  • @a320nick
    @a320nick Год назад

    Nice one David!

  • @VidsWotIMade
    @VidsWotIMade Год назад +1

    Tried it.
    Unfortunately, the Linux that it uses doesn't work well with the latest Mac hardware.
    My Mac is 2019 running Ventura, but the op system is not important.
    What fouls things up is that Linux doesn't have the drivers for the Mac WiFi and Bluetooth hardware.
    At the very best you would have to forget Bluetooth, and connect the keyboard via a cable, and use a mouse with a tail.

    • @Bareego
      @Bareego 10 месяцев назад

      On the tails website they have information on which wifi dongles work with it, if your built it ones won't.

  • @Crude-tv
    @Crude-tv 4 месяца назад +1

    I’m not sure where I’m going wrong, I did everything as you said, however It gets stuck on a black screen with a flashing underscore on the top left corner

    • @IbrahimYousef-fl8qb
      @IbrahimYousef-fl8qb 3 месяца назад

      Did u fix it

    • @Crude-tv
      @Crude-tv 3 месяца назад

      @@IbrahimYousef-fl8qb sort of, I used my laptop instead of my pc and it worked

  • @MrPromerican
    @MrPromerican Год назад

    Thank u David for this information

  • @Kevin_kyle_666
    @Kevin_kyle_666 7 месяцев назад +1

    When i was flashing the data, it failed validating. Now I'm unable to use the usb, what should i do?

  • @unapologetiktv
    @unapologetiktv Год назад

    Amazing content. What would you suggest for a beginner to get the certification training from in the UK for online courses and classroom learning in London, where can I get trained for cybersecurity?

  • @abdullahinadif6516
    @abdullahinadif6516 Год назад

    Thank you so much David

  • @benji1775
    @benji1775 9 месяцев назад

    thanks for the explanation it's a really good video but I dont mind ppl checking what Im doing in my lapttop cause I have nothing left to lose anymore 😂

  • @Atabascael
    @Atabascael Год назад +15

    One thing I would like to emphasize here:
    Just using Tails alone does not make you invincible nor invisible:
    - Even with TOR, your ISP still can create connection profiles about you (what time did you connect to the internet, and how much traffic did you send and receive)
    - Tails does not protect against physical key loggers or any other physical surveillance
    - Tails does not protect against certain attack vectors a malicious websites has to offer (yes, if there is a virus, next time you boot it is gone - probably - but not only will it be present until you reboot, but all information you enter on any website will still be sent to said website and stored there, potentially for everyone to see)
    Lesson learned: Tails is just one tool in your tool belt to becoming invisible.

    • @shinsen26
      @shinsen26 Год назад +3

      And anyway if your bootloader is hacked, bye bye the privacy, even with tails.

    • @n.lightnin8298
      @n.lightnin8298 Год назад +2

      And for god sake turn off Java 🤦‍♂️

    • @n.lightnin8298
      @n.lightnin8298 Год назад +1

      @@shinsen26this is a point not often recognized and why you should swap burners and pgp keys often because a Zero day attacking this vector isn’t going to be recognized by almost anyone 🤷🏼‍♂️

    • @butmunchass
      @butmunchass Год назад +1

      Yeah I agree. The channel made an error when he said that TAILS prevents keyloggers which you're right it doesn't.

    • @raphaelfranzen9623
      @raphaelfranzen9623 Год назад +2

      @@butmunchass It does protect from keyloggers , when it's a software keylogger on windows for example. So maybe not a lie , but maybe misheard/misunderstood.

  • @adambielski2743
    @adambielski2743 Год назад +1

    Persistent storage is mounted on the flash drive or on the computer memory?

    • @Bareego
      @Bareego 10 месяцев назад

      It's on the flash drive

  • @fructu7
    @fructu7 Год назад +1

    In Tails if you use terminal commands ex. curl it will use as well TOR?

    • @Bareego
      @Bareego 10 месяцев назад +1

      Applications that don't use TOR will be automatically blocked by default.

  • @joetreadonme
    @joetreadonme Год назад +2

    Asus has the craziest bios ive ever seen. It looks like a fake hacker movie

  • @DrMerciless
    @DrMerciless Год назад +2

    you could probably use ventoy which supports secure boot.

    • @scottspa74
      @scottspa74 Год назад

      Ventoy is truly awesome. Having multiple .iso's and other tools all on one USB that you can boot from is brilliant. I turned one of my professors onto it, and he loved it so much he wants to incorporate it into his curriculum.

  • @JohnRodgers7390
    @JohnRodgers7390 Год назад +16

    One of the things I was told when using tails is not to use persistent storage or not to use tails as a VM.

    • @mihabolil4o
      @mihabolil4o Год назад +2

      My thoughts exactly

    • @keylanoslokj1806
      @keylanoslokj1806 Год назад

      ​@@captainofouterspace Is there a book or something for guiding us to implement this

  • @traviswyatt7273
    @traviswyatt7273 Год назад

    Do you have any videos or are you review deeper network?

  • @imnoname9259
    @imnoname9259 Год назад

    Mr David one question Kali Linux USB support monitor mode and packet injection does ?

  • @eltonm.t.873
    @eltonm.t.873 Год назад

    Is Tails used for browsing the web only? can I install or run any programs on it? Is it a Linux based OS? That wasn't mentioned in the video.

  • @michaelmichaels5836
    @michaelmichaels5836 5 месяцев назад

    Is there a way to partition Tails so you can live boot from the USB, but also use the USB for other files and applications separate from Tails?

  • @JamsODonnell100
    @JamsODonnell100 Год назад +9

    Great video.
    The pdf is a stroke of genius for those of us struggling to move onwards from your remedial class!
    I attempted to print it off (I know 🙄) and sure enough it ran me out of (black) ink…
    Questions,
    i) does your ISP still see that you have headed off to tor?
    I assume it can.
    if so, as one of those who would like privacy, but “ have nothing to hide”
    ii) isn’t that a bad thing? As it will attract attention…

    • @Antek1234l
      @Antek1234l Год назад +2

      ISP will see that you are using Tor, but they won't know what you are exactly doing. Normally they know for example which website do you visit, but this can be mitigated when you use the onion routing. And about attracting attension, I'm pretty sure that they won't care, because many people use Tor nowadays and most of them for legitimate purposes. If you are not a wanted criminal, then I guess you don't have to worry about attracting attension.

    • @Atabascael
      @Atabascael Год назад +8

      Here the thoughts of another random person from the internet (me):
      Can your ISP see you headed off to TOR? Well, ISPs can see all of your traffic. Meaning they can see exactly what you are sending, and where you are sending it. TOR traffic is encrypted, so they cannot see what exactly you are doing, but they can see it is encrypted, and they can also see how much data you are sending/receiving, and at what time you are online (which can in some cases be sensitive information). Also, the ISP can see where you are connecting to (in this case a TOR node). If it's a node that the ISP knows is a TOR node, then they will know you are connecting to TOR.
      Is attention a bad thing? I would say it's quite hard to know the answer to that one. Probably it's not a bad thing. If you are running tails, it is extremely hard to hack you or your connection, so even if someone suspected you to do anything illicit (which you aren't doing), what are they going to do about it?

    • @JamsODonnell100
      @JamsODonnell100 Год назад +4

      @@AtabascaelThank you very much. I appreciate that you have taken the time to clarify for me something that probably seems obvious to you. And fair play for tackling the second part which will be dependent on an individual’s circumstances (& ISP). It is good to have someone point out how much information I would or wouldn’t be revealing and then it’s ‘my call’. Cheers

    • @rongziwang8722
      @rongziwang8722 Год назад +2

      it would be safer if using your neighbor's ISP...

    • @JamsODonnell100
      @JamsODonnell100 Год назад

      @@rongziwang8722 😉

  • @JohnnyNubs
    @JohnnyNubs 8 месяцев назад +1

    Wouldnt this be just like running Ubuntu on a flash drive?

  • @akhilmanikanth5880
    @akhilmanikanth5880 Год назад +3

    i Appreciate all the content you provide us David but Tails doesn't works for M1 and M2 mac's, please kindly provide us a solution for this David, that would realy helps people like me !!

  • @thelikebutton2464
    @thelikebutton2464 Год назад

    So... whats the benifit of running tails compared to running say a Kali-live USB with persistence and using tor and anonsurf?

    • @Antek1234l
      @Antek1234l Год назад +4

      Tails has much smaller attack surface. Notice how minimal it is compared to Kali. Also it has some nice features out of the box that you would have to configure otherwise(such as ability to shred files or remove metadata in one click)

  • @HAL-ol1lh
    @HAL-ol1lh 4 месяца назад +1

    Thank you .
    I have nothing to hide.
    But my business is my business.

  • @Andrea_Bassi
    @Andrea_Bassi Год назад +1

    It's a good idea to install this on a HDD with persistent storage option?

  • @Hugh_de_Mortimer
    @Hugh_de_Mortimer Год назад +1

    Is there any trace of tails left on a machine after the usb thumb drive is removed?

  • @spelz1751
    @spelz1751 Год назад +3

    Cool bios

  • @scottrussell6646
    @scottrussell6646 Год назад +1

    Is Tails somewhat virus resistant or perhaps virus proof to some degree because of limited persistence?

  • @objectivesovereignty
    @objectivesovereignty Год назад

    Like you said it's not invincible but will it be good for stopping hackers getting your debt/credit card numbers and stuff like that ?

  • @sahil9349
    @sahil9349 Год назад

    I am stuck in the last step where only need to boot.l use HP victus core í5 12th gen laptop. It isn't show the boot priority setting and if I disable safe boot, it will show me the recovery page. Please help me 😢😢

  • @Michael-fs8km
    @Michael-fs8km Год назад

    Getting "Tails" loaded onto a flashdrive was easy. Getting the computer to recognize or "mount" it is the issue. Every time I have tried my pc says that the file is corrupt and will not let me open the file to even view it. But I don't have a cookie-cutter pc either. One of my closest friends helped me build this tower. So, all the software and programming is different than most everyone else's. When trying to boot into BIOS I don't get the same windows that you all get. It goes into something completely different. I have tried several times to get "Tails" to work, but it is going to take someone with far more knowledge than what I have to succeed. Not that that is very hard. I don't know a lot, but I am trying to learn.

    • @fractal_aura
      @fractal_aura Год назад +1

      I am positive that the "programming" and software capabilities of your PC are not very different at all from most other people if you are using store-bought components and running any popular modern OS. you mentioned getting a different BIOS screen - different motherboards have different BIOS, unless you have the same type of motherboard as the computer in the video it is likely and *normal* for your BIOS to look a little different. you just have to navigate the menus to find the same options in the video. if you use Rufus or balenaEtcher to flash your USB drive, it'll have the bootloader installed - if you're dragging and dropping the .iso onto your USB it won't work. once the USB drive is flashed properly, if you find the boot order option in your BIOS and set it to boot from USB before hard drives, it should work. hope this helps!

    • @fractal_aura
      @fractal_aura Год назад

      also for example, I have an ASUS motherboard, but even still, my BIOS screen is different from his - no worries though. generally all the same options are present on most BIOS that I've seen. hopefully you're able to get your PC booting via USB! :)

    • @7R15M3G1
      @7R15M3G1 4 месяца назад

      To add onto what the other person said, sometimes different f keys (or the delete key) do different things on startup for different motherboard manufacturers. Look for something that says "boot menu" or "bios" on startup and hit that key