Tails (operating system)
APT (front-end), dpkg | |
Platforms | x86-64[3] |
---|---|
Kernel type | Monolithic |
Userland | GNU |
Default user interface | GNOME 3 |
License | GNU GPLv3[4] |
Preceded by | Incognito |
Official website | tails |
Tails, or "The Amnesic Incognito Live System", is a
The
History
Tails was first released on June 23, 2009. It is the next iteration of development on Incognito, a discontinued Gentoo-based Linux distribution.[9] The original project was called Amnesia. The operating system was born when Amnesia was merged with Incognito.[10] The Tor Project provided financial support for its development in the beginnings of the project.[8] Tails also received funding from the Open Technology Fund, Mozilla, and the Freedom of the Press Foundation.[11]
Laura Poitras, Glenn Greenwald, Bruce Schneier and Barton Gellman have each said that Tails was an important tool they used in their work with National Security Agency whistleblower Edward Snowden.[10][12][13][14]
From release 3.0, in 2017, Tails requires a
Features
Tails's pre-installed desktop environment is GNOME 3. The system includes essential software for functions such as reading and editing documents, image editing, video watching and printing. Other software from Debian can be installed at the user's behest.[16][17] Despite being open-source, Tails contains non-free firmware blobs.[18]
Tails includes a unique variety of software that handles the encryption of files and internet transmissions,
By design, Tails is "amnesic". It runs in the computer's
Security incidents
In 2014
In the same year, Der Spiegel published slides from an internal National Security Agency presentation dating to June 2012, in which the NSA deemed Tails on its own as a "major threat" to its mission and in conjunction with other privacy tools as "catastrophic".[24][25]
In 2017, the
See also
References
- ^ "Tails 6.1". March 27, 2024. Retrieved March 27, 2024.
- ^ "Tails - Incremental upgrades". tails.boum.org. Archived from the original on December 1, 2017. Retrieved June 15, 2017.
- ^ "Tails - System requirements". tails.boum.org.
- The H. April 30, 2012. Retrieved August 12, 2012.
- ^ Vervloesem, Koen (April 27, 2011). "The Amnesic Incognito Live System: A live CD for anonymity". LWN.net. Retrieved August 12, 2012.
- TecChannel(in German). February 6, 2012. Retrieved August 12, 2012.
- ^ "Running Tails in a virtual machine". tails.boum.org. Retrieved September 20, 2021.
- ^ a b "Finances". Tails. April 4, 2013. Retrieved May 13, 2013.
- ^ Gray, James (September 16, 2011). "The Tails Project's The Amnesic Incognito Live System (Tails)". Linux Journal. Retrieved August 12, 2012.
- ^ a b Finley, Klint (April 14, 2014). "Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA". WIRED. Retrieved April 18, 2014.
- ^ "Tails report for May, 2014". Tails. June 14, 2014. Archived from the original on July 1, 2014. Retrieved July 6, 2014.
- ^ Timm, Trevor (April 2, 2014). "Help Support the Little-Known Privacy Tool That Has Been Critical to Journalists Reporting on the NSA". Freedom of the Press Foundation. Retrieved April 18, 2014.
- ^ Condliffe, Jamie (April 15, 2014). "Try the Super-Secure USB Drive OS That Edward Snowden Insists on Using". Gizmodo. Retrieved April 15, 2014.
- ^ "Air Gaps - Schneier on Security". www.schneier.com. Retrieved August 3, 2023.
- ^ "Tails - Tails 3.0 is out". tails.boum.org. Archived from the original on May 22, 2019. Retrieved June 14, 2017.
- ^ "APT repository". tails.boum.org. October 7, 2019. Archived from the original on September 25, 2019. Retrieved October 7, 2019.
- ^ a b "Features and included software". tails.boum.org. October 7, 2019. Archived from the original on August 23, 2019. Retrieved October 7, 2019.
- ^ "Explaining Why We Don't Endorse Other Systems". www.gnu.org. Archived from the original on June 22, 2023. Retrieved June 23, 2023.
- ^ "Browsing the web with Tor Browser". tails.boum.org. Archived from the original on February 8, 2022. Retrieved March 16, 2022.
- ^ "Tails - Creating and configuring the Persistent Storage". tails.boum.org. Archived from the original on October 7, 2019. Retrieved October 7, 2019.
- ^ "Tails - Memory erasure". tails.boum.org.
- ^ Appelbaum, J.; Gibson, A.; Goetz, J.; Kabisch, V.; Kampf, L.; Ryge, L. (July 3, 2014). "NSA targets the privacy-conscious". DasErste.de.
- ^ Bruce Schneier (July 3, 2014). "NSA Targets Privacy Conscious for Surveillance". Schneier on Security.
- ^ SPIEGEL Staff (December 28, 2014). "Prying Eyes: Inside the NSA's War on Internet Security". Der Spiegel. Retrieved January 23, 2015.
- ^ "Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not" (PDF). Der Spiegel. December 28, 2014. Archived from the original (PDF) on December 30, 2014. Retrieved January 23, 2015.
- ^ Franceschi-Bicchierai, Lorenzo (June 10, 2020). "Facebook Helped the FBI Hack a Child Predator". Vice.