4.5
121 votes

Tails helps you to:

  • Disclose the Cyber web anonymously and circumvent censorship
  • All connections to the Cyber web are pressured to battle thru the Tor network
  • Leave no hint on the computer you would possibly well perchance well perchance additionally very properly be the usage of except you build a query to it explicitly
  • Disclose state-of-the-artwork cryptographic tools to encrypt your files, emails and instantaneous messaging

Tails is a are residing system that goals to wait for your privateness and anonymity. It helps you to spend the Cyber web anonymously and circumvent censorship almost wherever you plod and on any computer but leaving no hint except you build a query to it to explicitly.

It is an whole working system designed to be outmoded from a DVD, USB stick, or SD card independently of the computer’s normal working system.

Tails comes with several constructed-in applications pre-configured with security in thoughts: web browser, instantaneous messaging client, email client, state of enterprise suite, image and sound editor, and loads of others.

Whenever you happen to would possibly well perchance well perchance additionally very properly be drawn to giving Tails a are attempting for your most up-to-date computer without running any risk, please are attempting our Files: Running Linux From a USB Power As a Virtual Machine or Bootable Disk.

On-line anonymity and censorship circumvention with Tor

Tails depends on the Tor anonymity network to supply protection to your privateness on-line:

  • all blueprint is configured to construct to the Cyber web thru Tor
  • if an application tries to construct to the Cyber web straight, the connection is robotically blocked for security.

Tor is free blueprint and an start network that helps you protect towards a make of network surveillance that threatens non-public freedom and privateness, confidential substitute actions and relationships, and state security is named site visitors evaluation.

Tor protects you by bouncing your communications spherical a distributed network of relays flee by volunteers all across the sector: it prevents any individual looking at your Cyber web connection from finding out what sites you seek recommendation from, and it prevents the sites you seek recommendation from from finding out your physical living.

Utilizing Tor you would possibly well perchance well perchance:

  • be nameless on-line by hiding your living
  • connect to companies and products that will perchance well perchance be censored in every other case
  • withstand assaults that block the usage of Tor the usage of circumvention tools similar to bridges

What’s New

We’re particularly proud to most up-to-date you Tails 5.0, the major version of Tails in accordance to Debian 11 (Bullseye). It brings fresh versions of rather a couple of the blueprint included in Tails and fresh OpenPGP tools.

New aspects

Kleopatra

  • We added Kleopatra to interchange the OpenPGP Applet and the Password and Keys utility, additionally is named Seahorse.
  • The OpenPGP Applet used to be not actively developped anymore and used to be subtle for us to retain in Tails. The Password and Keys utility used to be additionally poorly maintained and Tails users suffered from too many of its considerations unless now, enjoy #17183.
  • Kleopatra affords identical aspects in a single tool and is more actively developed.

Changes and updates

  • The Extra Instrument characteristic of the Chronic Storage is enabled by default to manufacture it faster and more strong to configure your first further blueprint equipment.
  • You too can now spend the Actions overview to entry your own residence windows and applications. To entry the Actions overview, you would possibly well perchance well perchance either:
  • Click on the Actions button.
  • Throw your mouse pointer to the highest-left hot corner.
  • Press the Natty () key for your keyboard.
  • You too can be taught your own residence windows and applications within the overview. You too can additionally originate typing to search your applications, files, and folders.

Incorporated blueprint

Most included blueprint has been upgraded in Debian 11, as an illustration:

  • Update Tor Browser to 11.0.11.
  • Update GNOME from 3.30 to 3.38, with an whole bunch limited enhancements to the desktop, the core GNOME utilities, and the locking veil.
  • Update MAT from 0.8 to 0.12, which adds toughen to colorful metadata from SVG, WAV, EPUB, PPM, and Microsoft Office files.
  • Update Audacity from 2.2.2 to 2.4.2.
  • Update Disk Utility from 3.30 to 3.38.
  • Update GIMP from 2.10.8 to 2.10.22.
  • Update Inkscape from 0.92 to 1.0.
  • Update LibreOffice from 6.1 to 7.0.

Hardware toughen

  • The fresh toughen for driverless printing and scanning in Linux makes it much less difficult to manufacture most up-to-date printers and scanners work in Tails.

Fixed considerations

  • Fix unlocking VeraCrypt volumes that obtain very prolonged passphrases. (#17474)
  • For more facts, read our changelog.

Acknowledged considerations

  • Extra Instrument on occasion doesn’t work when restarting for the major time perfect after growing a Chronic Storage. (#18839)
  • To resolve this, set up the identical further blueprint equipment again after restarting with the Chronic Storage for the major time.
  • Thunderbird shows a popup to procure an application when opening links. (#18913)
  • Tails Installer on occasion fails to clone. (#18844)

Backup utility

  • We added a utility to manufacture a backup of the Chronic Storage to yet every other Tails USB stick.

Tor Connection

  • Switch the custom bridge interface to handiest enable entering 1 bridge. (#18550)
  • Enable saving 1 custom bridge within the Chronic Storage. (#5461)
  • Enable fixing the clock manually when connecting to Tor the usage of bridges fails. (#15548)
  • Lop the timeout that determines whether or not we are able to connect to Tor at all from 30 seconds to 10 seconds. Magnify the timeout to originate Tor fully from 120 seconds to 600 seconds. (#18501).
  • Enable attempting again to construct to Tor from the error veil. (#18539)

Unsafe Browser

  • Stop restarting Tor when exiting the Unsafe Browser. (#18562)
  • Handiest mention the Chronic Storage within the Unsafe Browser warning when there would possibly well be already a Chronic Storage. (#18551)

Others

  • Develop certain automatic upgrades are downloaded from a working replicate. (#15755)
  • Add Russian to the offline documentation included in Tails.

Fixed considerations

Tor Connection

  • Fix connecting to Tor the usage of the default bridges. (#18462)
  • Fix connecting to Tor when the Wi-Fi settings are saved within the Chronic Storage. (#18532)
  • Stop making an strive to construct to Tor within the background when Tor Connection reaches the error veil. (#18740)

Instrument comparable to Tails 8

  • 4.3

    933 votes

    Protect your privateness. Defend yourself towards network surveillance and site visitors evaluation. Tor is free blueprint and an start network that helps you protect towards surveillance that threatens non-public freedom and privateness.

    • Freeware
    • Windows/macOS/Linux
  • 4.5

    247 votes

    Quick, free and incredibly easy to spend, the Ubuntu working system powers hundreds of thousands of desktop PCs, laptops and servers across the sector.

    • Freeware
    • Linux
  • 4.3

    43 votes

    Arch Linux is an independently developed, i686/x86-64 general reason GNU/Linux distribution versatile enough to suit any role.

    • Freeware
    • Windows
  • 4.3

    78 votes

    Debian is a free working system (OS) to your computer. This version is is named “Bullseye”.

    • Freeware
    • Linux
  • More identical downloads

Standard apps
in Working Programs

LEAVE A REPLY

Please enter your comment!
Please enter your name here