What is Tails and Why should you use Tails? Ankit Chaubey, 2, June 202226, June 2022 Tails, or The Amnesic Incognito Live System, is a security-centered Debian-based Linux conveyance pointed toward safeguarding protection and obscurity. It associates with the Internet solely through the obscurity network Tor. The framework is intended to be booted as a live DVD or live USB, and leaves no computerized impression on the machine except if expressly told to do as such. It can likewise be run as a virtual machine, with some extra security chances. The Tor Project offered monetary help for its advancement in the starting points of the venture, and keeps on doing as such close by various corporate and mysterious backers.TABLE OF CONTENTS1 History of Tails2 Features of Tails3 Why should you use Tails?3.1 Advantages of Tails OS:3.2 Disadvantages of Tails OS:3.3 About The Author3.3.1 Ankit Chaubey3.4 RelatedHistory of TailsTails was first released on June 23, 2009. It is the next iteration of development on Incognito, a discontinued Gentoo-based Linux distribution. The Tor Project provided financial support for its development in the beginnings of the project. Tails also received funding from the Open Technology Fund, Mozilla, and the Freedom of the Press Foundation.Laura Poitras, Glenn Greenwald, and Barton Gellman have each said that Tails was an important tool they used in their work with National Security Agency whistleblower Edward Snowden.Edward SnowdenFeatures of TailsTails’s pre-installed desktop environment is GNOME 3. The system includes essential software for functions such as reading and editing documents, image editing, video watching and printing. Other software from Debian can be installed at the user’s behest.Tails includes a unique variety of software that handles the encryption of files and internet transmissions, cryptographic signing and hashing, and other functions important to security. It is pre-configured to use Tor with multiple connection options. It tries to force all connections to use Tor and blocks connection attempts outside Tor. For networking, it features a modified version of Tor Browser with the inclusion of uBlock Origin, instant messaging, email, file transmission and monitoring local network connections for security.By design, Tails is “amnesic”. It runs in the computer’s Random Access Memory (RAM) and does not write to a hard drive or other storage medium. The user may choose to keep files, applications or some settings on their Tails drive in “Persistent Storage”. Though the Persistent Storage is encrypted by default, it is not hidden and detectable by forensic analysis. While shutting down, Tails overwrites most of the used RAM to avoid a cold boot attack.Why should you use Tails?Every other day, you hear about another breach, browser exploit, or malicious piece of software. You are even more vulnerable to these types of hacks if you want your browsing on public Wi-Fi networks. Tails is a Linux distribution operating system focused on security, and it can assist you. If you are required to utilize a public Wi-Fi network, this distribution may protect your traffic from prying eyes. Similarly, if you’re concerned about someone following your location, whether a creepy stalker or something worse, it can randomize your traffic that keeps you safe.Tails may run in a virtual system or a Live CD/USB. You may keep them in the pocket and boot into them as needed without creating too much trouble. You don’t require this all of the time, but if you’re checking bank statements, submitting papers to a work server, or even going shopping, it’s better to be safe than sorry.Advantages of Tails OS:It is very easy to use and understand.It is packaged with the OpenPGP encryption applet.It offers a safe place to store passwords.It may start browsing anonymously right out of the box.It allows the users to store the encrypted data on the Tails OS USB Stick.It is packaged with Pidgin IM, LibreOffice, Poedit, etc.It also provides various media applications.Disadvantages of Tails OS:In the Tails OS, a flash drive may be easily misplaced.It must be used as a live boot OS.ToR has been compromised for a while.About The Author Ankit Chaubey See author's postsRelated Hacking Linux Asvantages of Tails OSDisadvantages of Tails OSEdward Snowden.Features of TailsHistory of TailsWhat is Tails?Why should you use Tails?