Your secure computer anywhere within an only 32 GB USB Stick


To use Tails, shut down the computer and start on your Tails USB stick instead of starting on Windows, macOS, or Linux.

You can temporarily turn your own computer into a secure machine. You can also stay safe while using the computer of somebody else.

You don't have to worry about the computer having viruses because Tails runs independently from the other operating system and never uses the hard disk. But, Tails cannot always protect you if you install it from a computer with viruses or if you use it on a computer with malicious hardware, like keyloggers.


Tails - is a portable operating system that protects against surveillance and censorship.

Avoid surveillance, censorship, advertising, and viruses 
  • Tails uses the Tor network to protect your privacy online and help you avoid censorship. Enjoy the Internet like it should be.
Your secure computer anywhere
  • Shut down the computer and start on your Tails USB stick instead of starting on Windows, macOS, or Linux. Tails leaves no trace on the computer when shut down.
Digital security toolbox
  • Tails includes a selection of applications to work on sensitive documents and communicate securely. Everything in Tails is ready-to-use and has safe defaults.
Tails always starts from the same clean state and everything you do disappears automatically when you shut down Tails.

Without Tails, almost everything you do can leave traces on the computer:

  • Websites that you visited, even in private mode
  • Files that you opened, even if you deleted them
  • Passwords, even if you use a password manager
  • All the devices and Wi-Fi networks that you used
On the contrary, Tails never writes anything to the hard disk and only runs from the memory of the computer. The memory is entirely deleted when you shutdown Tails, erasing all possible traces.

Persistent Storage
You can save some of your files and configuration in an encrypted Persistent Storage on the USB stick: your documents, your browser bookmarks, your emails, and even some additional software.

Digital security toolbox
Tails includes a selection of applications to work on sensitive documents and communicate securely.

All the applications are ready-to-use and are configured with safe defaults to prevent mistakes.

Tails includes:

  • Tor Browser with uBlock, a secure browser and an ad-blocker
  • Thunderbird, for encrypted emails
  • KeePassXC, to create and store strong passwords
  • LibreOffice, an office suite
  • OnionShare, to share files over Tor
  • and many more!
To prevent mistakes:
  • Applications are blocked automatically if they try to connect to the Internet without Tor.
  • Everything in the Persistent Storage is encrypted automatically.
  • Tails does not write anything to the hard disk. All the memory is deleted when shutting down.
Leave no trace on the Internet
Everything you do on the Internet from Tails goes through the Tor network. Tor encrypts and anonymizes your connection by passing it through 3 relays. Relays are servers operated by different people and organizations around the world.

Avoid online surveillance and censorship
Tor prevents someone watching your Internet connection from learning what you are doing on the Internet.
You can avoid censorship because it is impossible for a censor to know which websites you are visiting.

Avoid tracking and change identity
Tor also prevents the websites that you are visiting from learning where and who you are, unless you tell them. You can visit websites anonymously or change your identity.

Online trackers and advertisers won't be able to follow you around from one website to another anymore.
Most computers will boot from USB automatically:
Insert the USB flash drive
Restart your computer
If your computer doesn’t automatically boot from USB, try holding F12 when your computer first starts. With most machines, this will allow you to select the USB device from a system-specific boot menu.
F12 is the most common key for bringing up your system’s boot menu, but both Escape and F2 are typical alternatives. If you’re unsure, look for a brief message when your system starts - this will often inform you of which key to press to bring up the boot menu.


From Windows: 

Make the computer start on the USB stick
1. Click on the Start   button.
2. Press and hold the Shift key while you choose Power ▸ Restart.
3. In the Choose an option screen, choose Use a device.
4. In the Use a device screen, choose Boot Menu.
5. In the Boot Menu, select your USB stick and press Enter.