How to Install Tails on a USB Flash Drive in 7 minutes :) PDF documentation: davidbombal.wiki/tailsprivacy Download from here: tails.net/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RUclips: ruclips.net/user/davidbombal // MENU // 00:00 - Intro 00:30 - What Is Tails? 02:40 - Tails Installation Tutorial 05:52 - Boot into BIOS 07:22 - Boot into Tails 07:30 - Create Persistant Storage 08:09 - Tor Connection 09:18 - Tails Installed tails tails os tor linux tails linux invisible online hide identity privacy kali linux online privacy internet security online privacy and security online privacy tips online privacy guide internet security tutorial Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
I’ve used Tails for years. Something worth knowing is this: if you’re going to be downloading large files, the system will go to sleep after 5 minutes of inactivity. If it goes to sleep, your download will pause or fail. Make sure you right-click on the desktop, select SETTINGS, POWER, and set screen sleep time to something longer than 5 minutes. I just set my sleep to NEVER. You’ll have to do this every time you boot into Tails because it always boots to default values.
@@alokarpan822you can use your mobile phone wired as a hotspot, e.g android USB tethering. Unfortunately if Tails doesn’t recognize your wifi adapter by default, it’s almost impossible to make it work (install drivers etc). This is the most inconvenient thing in Tails as I think.
How about this ( @wiktorhood8475 11 months ago yet you're still leaking mac adress of your device because wether it's usb or not network card own the same address regardles of OS) ? Is it true?
A video on the update process could be helpful for the folks. You have a good way at explaining these things. I sure wish I had a video when I did my 1st update. I was very nervous about messing up my persistent storage.
@@davidbombal the most important is 1) DO NOT resize the browser as that can be tracked from guard to relay to exit node, 2)NEVER use any PII and have completely unrelated accounts that NEVER tie back to you, 3)NEVER use the same phraseology or grammer techniques that you currently use, take the time to develop a separate persona with a different style, 4)if you are doing deep diving, physicality disable the mic and cam
@@mytechnotalentwhat PII means? Do you need an antenna to hide the specifications of your PC like its MAC? or is it possible to hack or just browse quietly without an antenna?
Did anyone else notice (from the Tails website) that the U.S. Department of State is a sponsor of Tails and has donated more than $100,000? Hmmm...backdoor for the U.S. govt?
after just 10 minutes of nonsense im going to show this this COOL trick! followed by 6 minutes of nonsense so you can't just skip to the end and assume thats where the value is!
Downloaded and installed as suggested. My win11 machine eventually gets to the three dots, then nothing then hangs. Not sure if it is my thumbdrive (kingston 64Gb)/ Excellent video David, just having a bad day installing Tails for now. I changed USB slots on the PC, now I will reformat the drive and shoot for another install.
Note that if the USB had a previous iso file and the first flash fails, you can always reflash again. Probably leftover bits from the previous iso file caused the first error
Saw a talk on the HOPE conference from a gentleman named Michael Horowitz. At the time he stated that a Chromebook in guest mode offered anonymity as nothing of the session would be stored at all in the Chromebook. Something that may be worth checking out.
Bro 🤣 That’s I suppose anonymity for that Chromebook’s itself, can’t see history etc.. But online? Not at all, they’ll know your ip address and everything else there is to know 😂😂
yeah i was pretty disappointed when he gave away a CCNP course and it was taught by kevin wallace instead of David himself. i still appreciate the free course but i like david better. KW is fine but it drives me nuts the way he says "switchies"
One thing I would like to emphasize here: Just using Tails alone does not make you invincible nor invisible: - Even with TOR, your ISP still can create connection profiles about you (what time did you connect to the internet, and how much traffic did you send and receive) - Tails does not protect against physical key loggers or any other physical surveillance - Tails does not protect against certain attack vectors a malicious websites has to offer (yes, if there is a virus, next time you boot it is gone - probably - but not only will it be present until you reboot, but all information you enter on any website will still be sent to said website and stored there, potentially for everyone to see) Lesson learned: Tails is just one tool in your tool belt to becoming invisible.
@@shinsen26this is a point not often recognized and why you should swap burners and pgp keys often because a Zero day attacking this vector isn’t going to be recognized by almost anyone 🤷🏼♂️
@@butmunchass It does protect from keyloggers , when it's a software keylogger on windows for example. So maybe not a lie , but maybe misheard/misunderstood.
According to INFOSEC, some flash drives, especially SanDisk, are incompatible with TAILS. Which flash drive would you recommend; which flash drive do you use? Thhanks for your tutorials and tips!
Getting "Tails" loaded onto a flashdrive was easy. Getting the computer to recognize or "mount" it is the issue. Every time I have tried my pc says that the file is corrupt and will not let me open the file to even view it. But I don't have a cookie-cutter pc either. One of my closest friends helped me build this tower. So, all the software and programming is different than most everyone else's. When trying to boot into BIOS I don't get the same windows that you all get. It goes into something completely different. I have tried several times to get "Tails" to work, but it is going to take someone with far more knowledge than what I have to succeed. Not that that is very hard. I don't know a lot, but I am trying to learn.
I am positive that the "programming" and software capabilities of your PC are not very different at all from most other people if you are using store-bought components and running any popular modern OS. you mentioned getting a different BIOS screen - different motherboards have different BIOS, unless you have the same type of motherboard as the computer in the video it is likely and *normal* for your BIOS to look a little different. you just have to navigate the menus to find the same options in the video. if you use Rufus or balenaEtcher to flash your USB drive, it'll have the bootloader installed - if you're dragging and dropping the .iso onto your USB it won't work. once the USB drive is flashed properly, if you find the boot order option in your BIOS and set it to boot from USB before hard drives, it should work. hope this helps!
also for example, I have an ASUS motherboard, but even still, my BIOS screen is different from his - no worries though. generally all the same options are present on most BIOS that I've seen. hopefully you're able to get your PC booting via USB! :)
To add onto what the other person said, sometimes different f keys (or the delete key) do different things on startup for different motherboard manufacturers. Look for something that says "boot menu" or "bios" on startup and hit that key
🎯 Key Takeaways for quick navigation: 00:00 *🖥️ Introduction to Tails Operating System* - Explanation of Tails OS, recommended by privacy advocates like Edward Snowden and the Electronic Frontier Foundation. - Tails functions as a portable OS on a USB drive, erasing all data upon shutdown, providing ephemeral browsing. - Benefits of Tails include anonymity, avoiding online surveillance, and protection against censorship. 01:25 *🔒 Tails Persistent Storage and Encryption* - Description of Tails' amnesic nature, erasing all activities upon shutdown, with an option for persistent storage. - Use cases for persistent storage, such as storing documents, Wi-Fi passwords, and browser bookmarks. - Importance of encryption for persistent storage, ensuring only authorized users can access the stored data. 03:12 *🛠️ Tails Installation Process* - Requirements for installing Tails, including a USB stick, minimum RAM, and available options for operating systems. - Step-by-step guide on downloading and verifying the Tails image, using tools like Etcher for installation. - Precautions to take, such as backing up data on the USB drive before installation, and configuring BIOS settings for booting from the USB drive. 05:55 *🚀 Final Steps and Conclusion* - Completion of Tails installation and confirmation of successful flashing of the USB drive. - Optional steps after installation, such as creating persistent storage and configuring Tor connections. - Demonstration of Tails' functionality, including browsing with Tor, ensuring privacy and security, and shutting down to erase all traces. Made with HARPA AI
Good and straight to the point! Questions - is the speed of the USB stick relevant, or does everything just load into RAM? Also, perhaps a comparison between TAILS vs Qubes. I understand how TAILS is used - run from USB. Because both Qubes and TAILS "disappear" when shut down and rebooted - effectively new virtual machines - then both should be quite safe. Are they just different ways of doing things, or are there different scenarios when one is superior over another. Thanks!
Not sure about tails, but lots of experience booting other Linux distros from USB.... The flashing speed and boot speed are definitely affected by speed of usb drive, so I usually use a 3.0 USB (what the SS/blue port on PC is designed for). However, once loaded into ram, I don't believe it makes much difference. I'm only about 60% sure of this though, as I don't own any 2.0 USBs. Hope this helps....
I have updated recently my tails and I wonder if you could create a video with more details about the usage of it plesae? I love your work keep doing it!
Great video. The pdf is a stroke of genius for those of us struggling to move onwards from your remedial class! I attempted to print it off (I know 🙄) and sure enough it ran me out of (black) ink… Questions, i) does your ISP still see that you have headed off to tor? I assume it can. if so, as one of those who would like privacy, but “ have nothing to hide” ii) isn’t that a bad thing? As it will attract attention…
ISP will see that you are using Tor, but they won't know what you are exactly doing. Normally they know for example which website do you visit, but this can be mitigated when you use the onion routing. And about attracting attension, I'm pretty sure that they won't care, because many people use Tor nowadays and most of them for legitimate purposes. If you are not a wanted criminal, then I guess you don't have to worry about attracting attension.
Here the thoughts of another random person from the internet (me): Can your ISP see you headed off to TOR? Well, ISPs can see all of your traffic. Meaning they can see exactly what you are sending, and where you are sending it. TOR traffic is encrypted, so they cannot see what exactly you are doing, but they can see it is encrypted, and they can also see how much data you are sending/receiving, and at what time you are online (which can in some cases be sensitive information). Also, the ISP can see where you are connecting to (in this case a TOR node). If it's a node that the ISP knows is a TOR node, then they will know you are connecting to TOR. Is attention a bad thing? I would say it's quite hard to know the answer to that one. Probably it's not a bad thing. If you are running tails, it is extremely hard to hack you or your connection, so even if someone suspected you to do anything illicit (which you aren't doing), what are they going to do about it?
@@AtabascaelThank you very much. I appreciate that you have taken the time to clarify for me something that probably seems obvious to you. And fair play for tackling the second part which will be dependent on an individual’s circumstances (& ISP). It is good to have someone point out how much information I would or wouldn’t be revealing and then it’s ‘my call’. Cheers
The only inconvenience for me is that Tails may not recognize some wifi adapters, both built-in or external ones, which is very usual for linux system, but you cannot install any drivers here, the system always boots in default state. So your option is either using some wired mobile phone or buying some special linux supported wifi adapter, or always looking for a LAN around you. That’s why I would prefer Whonix and VM. But other than that Tails is a real gem, especially in situations where FBI is knocking at your door and you don’t wanna leave any clues, and you just remove your usb flash drive, you swallow it and you’re done)
I remember coming across Tails years ago, always thought, good to have and not because of any nefarious reasons, just nice to know you have privacy. I'm just a bit😊 hesitant I'll stuff it up. Not a lot of tech skills, reminds me of sitting thru junior algebra classes, yuk!!!
Won't protect you if the pc has a hardware keylogger on it. Also if BIOS is passworded and secure boot enabled then you won't be able to do any of this.
Even though Snowden uses it or did use it Tails has always had a bad reputation among white hats due to the persistent rumors of a back door forced on them by the NSA. I personally believe this to be true and therefore avoid it. A decent VPN and mac address spoofer will provide the same level of anonymity if your just looking for private browsing.
I’m not sure about Tor anymore due to the recognition of a significant amount malicious nodes (e.g. kax17). I do like the ephemeralness of tails though.
Can you perhaps do a video on disk management. Encryption , sanitizing a disk so no data can be recovered. The main one is sanitizing a disk empty space only, say you deleted stuff and now want to clear that space only ,instead of a new installation with software and all that extra trouble
Ventoy is truly awesome. Having multiple .iso's and other tools all on one USB that you can boot from is brilliant. I turned one of my professors onto it, and he loved it so much he wants to incorporate it into his curriculum.
thanks for the explanation it's a really good video but I dont mind ppl checking what Im doing in my lapttop cause I have nothing left to lose anymore 😂
i Appreciate all the content you provide us David but Tails doesn't works for M1 and M2 mac's, please kindly provide us a solution for this David, that would realy helps people like me !!
Amazing content. What would you suggest for a beginner to get the certification training from in the UK for online courses and classroom learning in London, where can I get trained for cybersecurity?
Any system can be defeated if a keystroke logger is installed without your knowledge. That’s why it’s vital to password protect the primary OS and always log off before leaving.
What's the difference from using live image of an OS. Such as puppy liunx. It removes everything upon restart, it installs itself to the ram. And you can choose to save your data
Brilliant, when you 'verify' the downloaded file, tails fingerprints you and your download. I don't know this for sure but if I was the government that's something that I think they would do
Removing the tails usb and going to windows with the same computer with same serial pc components and mac address you can expose your computer signature very easy.. Have to be mentioned the connection too.. Never use the home network and WiFi connection.. Use a dedicated preassembled PC not a laptop, use a new USB key, because the USB memory stick has a serial number.
Rich content with valuable information. Thank you for your wonderful efforts. I hope you will make a video explaining how hacking SMS messages. Sniffe or forwarded to hacking phone.
For privacy live usb is the best option I agree. But I have used live usb with kali, parrot, tails but I realised it is ridiculous as performance is worst, Even though the PC is very much capable, just because it is running live from USB it is a huge bottleneck for performance. Running the OS for some quick private task is ok, but using it for long period of time is just not practical with live usb. Not to mention the booting time, method varies also if you boot from random computers woth different bios settings etc. it is just better to purchase a pine phone/ or rooted phone and actually install the OS there.
Security always comes with a bit of inconvenience. It’s the price we have to pay for piece of mind. I’ve never had bottleneck issues with Tails once it was up and running.
doesnt matter if you have intel me and all that other bullcrap in modern pcs. If you want to be anonymous you need to steal a computer and never connect it to you homerouter and never write anything that could be personal. such as old passwords, old emails etc. They will probably find you based on typing patterns or other habbits if your a target
if you want privacy tails in usb is perfect choice but for normal people(not me :I) i would look dont usable trick:set administrator password so you can install addititional software warning :some kind of software might dont be 100% private
How to Install Tails on a USB Flash Drive in 7 minutes :)
PDF documentation: davidbombal.wiki/tailsprivacy
Download from here: tails.net/
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
RUclips: ruclips.net/user/davidbombal
// MENU //
00:00 - Intro
00:30 - What Is Tails?
02:40 - Tails Installation Tutorial
05:52 - Boot into BIOS
07:22 - Boot into Tails
07:30 - Create Persistant Storage
08:09 - Tor Connection
09:18 - Tails Installed
tails
tails os
tor
linux
tails linux
invisible online
hide identity
privacy
kali linux
online privacy
internet security
online privacy and security
online privacy tips
online privacy guide
internet security tutorial
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
David why you don't reply to our comment
Kindly please guide me about the 18 courses offered by EC-Counsil "Ultimate red team cyber suite"
The more you know the more you afraid of government
If David talk about it, it means the FEDS made it
Does not hide your isp so this is pointless if you want to go online to upload or download valuable information 🙄
I’ve used Tails for years. Something worth knowing is this: if you’re going to be downloading large files, the system will go to sleep after 5 minutes of inactivity. If it goes to sleep, your download will pause or fail. Make sure you right-click on the desktop, select SETTINGS, POWER, and set screen sleep time to something longer than 5 minutes. I just set my sleep to NEVER. You’ll have to do this every time you boot into Tails because it always boots to default values.
How do I get connect WiFi in tails yk
@@Hdskieiendod Ethernet would be a good option
Can i use mobile hotspot for using tails?
@@alokarpan822you can use your mobile phone wired as a hotspot, e.g android USB tethering. Unfortunately if Tails doesn’t recognize your wifi adapter by default, it’s almost impossible to make it work (install drivers etc). This is the most inconvenient thing in Tails as I think.
@@HdskieiendodYour adapter is not supported. You'll need to install it every time.
Tails extends Tor's anonymity to the ENTIRE system, keeping it encapsulated all along.
duh
@@lucutes2936 duh
How about this (
@wiktorhood8475
11 months ago
yet you're still leaking mac adress of your device because wether it's usb or not network card own the same address regardles of OS) ? Is it true?
@@MohamedBadawiEgyptdoes it really matter when you leave no evidence behind?
@@MohamedBadawiEgypt you can spoof tje MAC adrrss, i even have a custom made one lol 😂
as usb tails owner i am happy that you are helping people upgrade their privacy :D
Thank you! Please share any tips and tricks you have for others to learn from you :)
okay!
idk maybe😁😅
@@davidbombal Have you heard of Whonix and is it any good?
Whonix vs Tails vs both.
yet you're still leaking mac adress of your device because wether it's usb or not network card own the same address regardles of OS
This is so great because it has context and reality. Would love to see more. David, you are awesome !!!
A video on the update process could be helpful for the folks. You have a good way at explaining these things. I sure wish I had a video when I did my 1st update. I was very nervous about messing up my persistent storage.
Still waiting for this video ..
Still waiting too!!!
Great video David I have been using this for years! Tails has great features and makes it so simple to be safe and when necessary with persistence.
Thank you! Please share any tips and tricks so others can learn from you :)
@@davidbombal the most important is 1) DO NOT resize the browser as that can be tracked from guard to relay to exit node, 2)NEVER use any PII and have completely unrelated accounts that NEVER tie back to you, 3)NEVER use the same phraseology or grammer techniques that you currently use, take the time to develop a separate persona with a different style, 4)if you are doing deep diving, physicality disable the mic and cam
@@mytechnotalentwhat PII means?
Do you need an antenna to hide the specifications of your PC like its MAC? or is it possible to hack or just browse quietly without an antenna?
@@tigreonice2339 PII is personally identifiable info. Anything is possible but the chances of someone targeting your location is rare.
@@tigreonice2339 PII: Personally Identifiable Information
Did anyone else notice (from the Tails website) that the U.S. Department of State is a sponsor of Tails and has donated more than $100,000? Hmmm...backdoor for the U.S. govt?
Don't tell this guy who created tor.
The US government is so concerned about its citizens privacy an agency donated money to help it’s citizens remain anonymous online.
This privacy hack is funded by our intelligence agencies…GREAT
I'd like to think they enjoy using it for their own privacy needs and just want to support the project.
So you think they’re advertising the fact that they’re backdooring you? Lmfaoooooooooooooooooooo
I'm glad I switched my career into cybersecurity! So much to learn
Same here. I was a nursing major before; this is a much better fit for me.
Well presented. Short, sweet, no fluff, educational as well as instructional. Oh if only all RUclips vids could be this efficient.
after just 10 minutes of nonsense im going to show this this COOL trick! followed by 6 minutes of nonsense so you can't just skip to the end and assume thats where the value is!
@@SubieNinja what
A formidably helpful video for protecting our hardly respected private informations, thanks a lot !
David never disappoint us with his content... glad to advance my knowledge watching your videos.
Downloaded and installed as suggested. My win11 machine eventually gets to the three dots, then nothing then hangs. Not sure if it is my thumbdrive (kingston 64Gb)/ Excellent video David, just having a bad day installing Tails for now. I changed USB slots on the PC, now I will reformat the drive and shoot for another install.
Did you solve the problem?
If TAILS is that powerful, imagine HEADS!
Nah heads gotta be some offense Privacy system that like actually just malwares your name
Bruhhh 😂
Note that if the USB had a previous iso file and the first flash fails, you can always reflash again. Probably leftover bits from the previous iso file caused the first error
Good video for privacy. I'm just starting my Sec + and interested in CTF. Please consider an intro to CTF video.
Saw a talk on the HOPE conference from a gentleman named Michael Horowitz. At the time he stated that a Chromebook in guest mode offered anonymity as nothing of the session would be stored at all in the Chromebook. Something that may be worth checking out.
It’s Google though, maybe not on Chromebook, definitely on their servers. 😅
@@mdaxeYea for real. Stored in their servers for sure.
Bro 🤣
That’s I suppose anonymity for that Chromebook’s itself, can’t see history etc..
But online? Not at all, they’ll know your ip address and everything else there is to know 😂😂
Would have liked to see persistent storage demo'ed a bit more like rebooting and checking that data is still there for example.
What for? It just works
Well explained, I suggest people do this when doing online banking etc, but PLEASE keep using CASH, when they take that away it is game over
lol you're commenting on RUclips ffs
Always a good content. Thanks, David.
Thank you, your tutorial was very straightforward. I'm downloading Tails now.
Great tutorial @David as usual :). Interesting stuff. I had kali as a pendrive with persistence but that might change in the future.
Thanks for making an update to the old video!
David Bombal always delivering MasterClass ❤
yeah i was pretty disappointed when he gave away a CCNP course and it was taught by kevin wallace instead of David himself. i still appreciate the free course but i like david better. KW is fine but it drives me nuts the way he says "switchies"
One thing I would like to emphasize here:
Just using Tails alone does not make you invincible nor invisible:
- Even with TOR, your ISP still can create connection profiles about you (what time did you connect to the internet, and how much traffic did you send and receive)
- Tails does not protect against physical key loggers or any other physical surveillance
- Tails does not protect against certain attack vectors a malicious websites has to offer (yes, if there is a virus, next time you boot it is gone - probably - but not only will it be present until you reboot, but all information you enter on any website will still be sent to said website and stored there, potentially for everyone to see)
Lesson learned: Tails is just one tool in your tool belt to becoming invisible.
And anyway if your bootloader is hacked, bye bye the privacy, even with tails.
And for god sake turn off Java 🤦♂️
@@shinsen26this is a point not often recognized and why you should swap burners and pgp keys often because a Zero day attacking this vector isn’t going to be recognized by almost anyone 🤷🏼♂️
Yeah I agree. The channel made an error when he said that TAILS prevents keyloggers which you're right it doesn't.
@@butmunchass It does protect from keyloggers , when it's a software keylogger on windows for example. So maybe not a lie , but maybe misheard/misunderstood.
According to INFOSEC, some flash drives, especially SanDisk, are incompatible with TAILS. Which flash drive would you recommend; which flash drive do you use? Thhanks for your tutorials and tips!
😄love how you decided to demonstrate some implications with tails using your "own" channel as a reference, hehehe. Clever man ;-)
Thank you David....i love the detail in your videos.
Duck Duck is no more "privacy-oriented" in practice than anything else. They market privacy and deliver - Google.
Guys I did the same thing as given instruction on tails website and it worked.
As always great vid for beginners like me, thanks a lot Sir
Getting "Tails" loaded onto a flashdrive was easy. Getting the computer to recognize or "mount" it is the issue. Every time I have tried my pc says that the file is corrupt and will not let me open the file to even view it. But I don't have a cookie-cutter pc either. One of my closest friends helped me build this tower. So, all the software and programming is different than most everyone else's. When trying to boot into BIOS I don't get the same windows that you all get. It goes into something completely different. I have tried several times to get "Tails" to work, but it is going to take someone with far more knowledge than what I have to succeed. Not that that is very hard. I don't know a lot, but I am trying to learn.
I am positive that the "programming" and software capabilities of your PC are not very different at all from most other people if you are using store-bought components and running any popular modern OS. you mentioned getting a different BIOS screen - different motherboards have different BIOS, unless you have the same type of motherboard as the computer in the video it is likely and *normal* for your BIOS to look a little different. you just have to navigate the menus to find the same options in the video. if you use Rufus or balenaEtcher to flash your USB drive, it'll have the bootloader installed - if you're dragging and dropping the .iso onto your USB it won't work. once the USB drive is flashed properly, if you find the boot order option in your BIOS and set it to boot from USB before hard drives, it should work. hope this helps!
also for example, I have an ASUS motherboard, but even still, my BIOS screen is different from his - no worries though. generally all the same options are present on most BIOS that I've seen. hopefully you're able to get your PC booting via USB! :)
To add onto what the other person said, sometimes different f keys (or the delete key) do different things on startup for different motherboard manufacturers. Look for something that says "boot menu" or "bios" on startup and hit that key
🎯 Key Takeaways for quick navigation:
00:00 *🖥️ Introduction to Tails Operating System*
- Explanation of Tails OS, recommended by privacy advocates like Edward Snowden and the Electronic Frontier Foundation.
- Tails functions as a portable OS on a USB drive, erasing all data upon shutdown, providing ephemeral browsing.
- Benefits of Tails include anonymity, avoiding online surveillance, and protection against censorship.
01:25 *🔒 Tails Persistent Storage and Encryption*
- Description of Tails' amnesic nature, erasing all activities upon shutdown, with an option for persistent storage.
- Use cases for persistent storage, such as storing documents, Wi-Fi passwords, and browser bookmarks.
- Importance of encryption for persistent storage, ensuring only authorized users can access the stored data.
03:12 *🛠️ Tails Installation Process*
- Requirements for installing Tails, including a USB stick, minimum RAM, and available options for operating systems.
- Step-by-step guide on downloading and verifying the Tails image, using tools like Etcher for installation.
- Precautions to take, such as backing up data on the USB drive before installation, and configuring BIOS settings for booting from the USB drive.
05:55 *🚀 Final Steps and Conclusion*
- Completion of Tails installation and confirmation of successful flashing of the USB drive.
- Optional steps after installation, such as creating persistent storage and configuring Tor connections.
- Demonstration of Tails' functionality, including browsing with Tor, ensuring privacy and security, and shutting down to erase all traces.
Made with HARPA AI
Tails is good, I'll grant you that, but it depends upon Tor, which is only as good as the last node (and user actions)
Been a while since I tried tor, but every time I have tried it it was so slow it was frustrating. It's like dial-up, but slower.
Good and straight to the point! Questions - is the speed of the USB stick relevant, or does everything just load into RAM? Also, perhaps a comparison between TAILS vs Qubes. I understand how TAILS is used - run from USB. Because both Qubes and TAILS "disappear" when shut down and rebooted - effectively new virtual machines - then both should be quite safe. Are they just different ways of doing things, or are there different scenarios when one is superior over another. Thanks!
Not sure about tails, but lots of experience booting other Linux distros from USB.... The flashing speed and boot speed are definitely affected by speed of usb drive, so I usually use a 3.0 USB (what the SS/blue port on PC is designed for). However, once loaded into ram, I don't believe it makes much difference. I'm only about 60% sure of this though, as I don't own any 2.0 USBs. Hope this helps....
I have updated recently my tails and I wonder if you could create a video with more details about the usage of it plesae? I love your work keep doing it!
Great video.
Is a must to use Etcher, or can one use Rufus instead?
One of the things I was told when using tails is not to use persistent storage or not to use tails as a VM.
My thoughts exactly
@@captainofouterspace Is there a book or something for guiding us to implement this
Great video.
The pdf is a stroke of genius for those of us struggling to move onwards from your remedial class!
I attempted to print it off (I know 🙄) and sure enough it ran me out of (black) ink…
Questions,
i) does your ISP still see that you have headed off to tor?
I assume it can.
if so, as one of those who would like privacy, but “ have nothing to hide”
ii) isn’t that a bad thing? As it will attract attention…
ISP will see that you are using Tor, but they won't know what you are exactly doing. Normally they know for example which website do you visit, but this can be mitigated when you use the onion routing. And about attracting attension, I'm pretty sure that they won't care, because many people use Tor nowadays and most of them for legitimate purposes. If you are not a wanted criminal, then I guess you don't have to worry about attracting attension.
Here the thoughts of another random person from the internet (me):
Can your ISP see you headed off to TOR? Well, ISPs can see all of your traffic. Meaning they can see exactly what you are sending, and where you are sending it. TOR traffic is encrypted, so they cannot see what exactly you are doing, but they can see it is encrypted, and they can also see how much data you are sending/receiving, and at what time you are online (which can in some cases be sensitive information). Also, the ISP can see where you are connecting to (in this case a TOR node). If it's a node that the ISP knows is a TOR node, then they will know you are connecting to TOR.
Is attention a bad thing? I would say it's quite hard to know the answer to that one. Probably it's not a bad thing. If you are running tails, it is extremely hard to hack you or your connection, so even if someone suspected you to do anything illicit (which you aren't doing), what are they going to do about it?
@@AtabascaelThank you very much. I appreciate that you have taken the time to clarify for me something that probably seems obvious to you. And fair play for tackling the second part which will be dependent on an individual’s circumstances (& ISP). It is good to have someone point out how much information I would or wouldn’t be revealing and then it’s ‘my call’. Cheers
it would be safer if using your neighbor's ISP...
@@rongziwang8722 😉
Thanks for presenting that info! The Gov doesn’t need MORE of our personal info…. Nor do the pirates!
great tutorial! Question: Do you enable SECURE BOOT when you are NOT using TAILS?
Asus has the craziest bios ive ever seen. It looks like a fake hacker movie
The only inconvenience for me is that Tails may not recognize some wifi adapters, both built-in or external ones, which is very usual for linux system, but you cannot install any drivers here, the system always boots in default state. So your option is either using some wired mobile phone or buying some special linux supported wifi adapter, or always looking for a LAN around you. That’s why I would prefer Whonix and VM. But other than that Tails is a real gem, especially in situations where FBI is knocking at your door and you don’t wanna leave any clues, and you just remove your usb flash drive, you swallow it and you’re done)
remove swallow and done? lmao how did i even get here, lol
You are such an inspiration sir. Love from India.🫡
Thank you very much!
David as usual perfect tutorial .Thanks from Brumie
Thank you Mr Bombal, the tutorial was so simple n so useful
i was just waiting for you to do a video about tails, and you have kill it. i have being inspire by your videos
I remember coming across Tails years ago, always thought, good to have and not because of any nefarious reasons, just nice to know you have privacy. I'm just a bit😊 hesitant I'll stuff it up. Not a lot of tech skills, reminds me of sitting thru junior algebra classes, yuk!!!
Won't protect you if the pc has a hardware keylogger on it. Also if BIOS is passworded and secure boot enabled then you won't be able to do any of this.
Like they say, it's not magic. You need more than 100 IQ for opsec
Yea, u typically want to use this on your personal system
Even though Snowden uses it or did use it Tails has always had a bad reputation among white hats due to the persistent rumors of a back door forced on them by the NSA. I personally believe this to be true and therefore avoid it. A decent VPN and mac address spoofer will provide the same level of anonymity if your just looking for private browsing.
Where did you hear this from?
@@yd_kingdom From several colleagues who were in a position to know. The encryption was compromised from day one.
@@yd_kingdom The space aliens.
i am always happy when i see you notification 🎉
Happy to hear that!
I’m not sure about Tor anymore due to the recognition of a significant amount malicious nodes (e.g. kax17). I do like the ephemeralness of tails though.
Great tutorial David!
Thank you .
I have nothing to hide.
But my business is my business.
I waited for that, Thanks
Happy to hear that! I hope you enjoy the video!
David,You are "AWESOME"!!!Not just because your one of the greatest pintesters but because "YOUR SMEGIN ENGLISH"!!! Benny Hill was English.❤❤❤
Hey David ! I’m new entering the tech world as well as cyber security, what are some books that would be beneficial to my learning ?
my sweet uncle david greetings from turkey
Cool bios
I'm happy to hear about this. It is essential
Can you perhaps do a video on disk management. Encryption , sanitizing a disk so no data can be recovered. The main one is sanitizing a disk empty space only, say you deleted stuff and now want to clear that space only ,instead of a new installation with software and all that extra trouble
Linux dd
Shred
you could probably use ventoy which supports secure boot.
Ventoy is truly awesome. Having multiple .iso's and other tools all on one USB that you can boot from is brilliant. I turned one of my professors onto it, and he loved it so much he wants to incorporate it into his curriculum.
This may be a stupid noob question but... Can I run Tails with Virtualbox (or similar)? Or this is only made for USB?
NVM... I looked it up. Although possible, they don't recommend it (it's on their website)
Except for exit node attacks and RCE.. Firefox exploits aren't uncommon a new bug for one shows up in JS engine every couple weeks
Great works 🎉🎉🎉 my favorite channel ❤❤❤ by fro Venice 🇮🇹🇮🇹🇮🇹👍🏻
thanks for the explanation it's a really good video but I dont mind ppl checking what Im doing in my lapttop cause I have nothing left to lose anymore 😂
i Appreciate all the content you provide us David but Tails doesn't works for M1 and M2 mac's, please kindly provide us a solution for this David, that would realy helps people like me !!
Amazing content. What would you suggest for a beginner to get the certification training from in the UK for online courses and classroom learning in London, where can I get trained for cybersecurity?
Thank you for the PDF's file. 🙂👍
You are welcome!
Thank you, I haven’t heard about it before. I guess, try partitioning flash to have os and storage. Nice necessity
The applications in tails remains its biggest weakness, persistence is probably an awful idea to have on tails due to the potential for logging
Any system can be defeated if a keystroke logger is installed without your knowledge. That’s why it’s vital to password protect the primary OS and always log off before leaving.
I’ll install tails on my usb right now!!
Thank you sir David ❤ from PH
No M1/M2 installer support on Mac is really sad.
well mac is kinda anti-privacy anyways.... run a VM if needed to do the install
love this!!! thank you!
What's the difference from using live image of an OS. Such as puppy liunx. It removes everything upon restart, it installs itself to the ram. And you can choose to save your data
Naomi will love this video
Thank you sir David.❤
This looks cool. Thing is i would want to use this or some similar for financial info when traveling. Wifi are never secure when traveling.
Brilliant, when you 'verify' the downloaded file, tails fingerprints you and your download. I don't know this for sure but if I was the government that's something that I think they would do
The mere fact that you watch content about tails is suspicious for a government
Nice one David!
Tails/tor was strong in its heyday. Not as much as today.
Strong as ever. The user base, however...
Apart from the default tor browser, Whats the benefit of using Tails over for instance kali live from usb?
I use TAILS a lot. It's cake to install and boot up. Quite easy to use.
You just dd the iso over to the usb. Takes 5 minutes with my slow ones.
Removing the tails usb and going to windows with the same computer with same serial pc components and mac address you can expose your computer signature very easy..
Have to be mentioned the connection too.. Never use the home network and WiFi connection.. Use a dedicated preassembled PC not a laptop, use a new USB key, because the USB memory stick has a serial number.
Thank u David for this information
Rich content with valuable information. Thank you for your wonderful efforts. I hope you will make a video explaining how hacking SMS messages. Sniffe or forwarded to hacking phone.
Very useful - thanks :D
For privacy live usb is the best option I agree. But I have used live usb with kali, parrot, tails but I realised it is ridiculous as performance is worst, Even though the PC is very much capable, just because it is running live from USB it is a huge bottleneck for performance. Running the OS for some quick private task is ok, but using it for long period of time is just not practical with live usb. Not to mention the booting time, method varies also if you boot from random computers woth different bios settings etc. it is just better to purchase a pine phone/ or rooted phone and actually install the OS there.
I kind of agree. I find using bodhi Linux configured like tails works smooth as a live usb.
A ping phone? Or rooted phone as a Hotspot? Can you explain?
Agreed
Security always comes with a bit of inconvenience. It’s the price we have to pay for piece of mind. I’ve never had bottleneck issues with Tails once it was up and running.
I’ve been watching this project since it’s inception and I use every chance it can 😎
doesnt matter if you have intel me and all that other bullcrap in modern pcs. If you want to be anonymous you need to steal a computer and never connect it to you homerouter and never write anything that could be personal. such as old passwords, old emails etc. They will probably find you based on typing patterns or other habbits if your a target
Black Shark, Dizo, and VingaJoy - GoCartopias evaluations have been my guiding mild for tech brand decisions.
Ive built a linux persistant usb before. Handy.
if you want privacy tails in usb is perfect choice but for normal people(not me :I) i would look dont usable
trick:set administrator password so you can install addititional software warning :some kind of software might dont be 100% private
My mouth fell open when I saw that ASUS bios.
How does this compare to WinPE with PortableApps?
its the safest way , legendary tails.
Thank you so much David
Do you have any videos or are you review deeper network?
That quote by Abraham Lincoln is quite a paradox all things considered...