Introduction to Tails OS

Discover Tails - The Amnesic Incognito Live System. Learn how this privacy-focused operating system works, its key security features, and how to navigate its unique environment designed for anonymity.

BEGINNER
Estimated: 35 minutes
Type: GUI Desktop
Tasks: 7
XP: 120 XP
Sign in to start this lab
Sign In

Tasks

0 / 7 completed

Preview Mode

You can browse the tasks below. Sign in to track your progress and launch the lab machine.

Sign In to Start
1

Welcome to Tails OS

🎯 Learning Objectives

  • Understand what Tails OS is and its purpose
  • Learn about the amnesic nature of Tails
  • Navigate the Tails desktop environment
  • Discover the security applications pre-installed in Tails

What is Tails?

Tails (The Amnesic Incognito Live System) is a portable operating system designed to protect your privacy and anonymity. It's used by journalists, activists, whistleblowers, and anyone needing secure communications.

🔑 Key Features of Tails:

  • Amnesic - Leaves no trace on the computer after shutdown
  • Incognito - All traffic forced through Tor network
  • Live System - Runs entirely from USB/DVD, not your hard drive
  • Debian-based - Built on stable Linux foundation

💡 Fun Fact: Edward Snowden used Tails when communicating with journalists to leak NSA documents in 2013. It's trusted by security professionals worldwide.

Your First Steps:

  1. Click "Start Machine" above to launch your Tails environment
  2. Wait for the desktop to fully load (this may take 1-2 minutes)
  3. Familiarize yourself with the clean, minimal desktop

Once the desktop is loaded, click Continue to start exploring!

2

Exploring the Tails Desktop

The Tails Desktop Environment

Tails uses the GNOME desktop environment with a clean, security-focused layout.

Top Panel Components:

📱 Activities

Click top-left corner or press Super key to view all windows and search

🧅 Tor Status

Onion icon shows Tor connection status

🔊 System Tray

Volume, network, and power controls

Accessing Applications:

  1. Click Activities in the top-left corner
  2. Or press the Super key (Windows key)
  3. Start typing to search for any application
  4. Or click the grid icon to see all applications

Common Application Locations:

  • Applications → Internet - Tor Browser, Pidgin, Thunderbird
  • Applications → Accessories - Text editor, Files, Calculator
  • Applications → System Tools - Terminal, Disks, Settings

Explore the Activities view and find the Applications menu. Click Continue when ready.

3

Understanding Amnesia

The Amnesic Property

Tails is called "amnesic" because it forgets everything when you shut down. This is a crucial security feature.

⚠️ Important:

When Tails shuts down, it securely wipes all memory (RAM). This means:

  • Documents you created are gone
  • Browser history disappears
  • Downloaded files vanish
  • Login credentials are forgotten

How This Protects You:

Threat Protection
Forensic analysis No traces left on disk
Physical seizure Memory wiped on shutdown
Cold boot attacks RAM overwritten with random data
Malware persistence Fresh system on each boot

💾 Persistent Storage: If you need to save files between sessions, Tails offers encrypted Persistent Storage - but this must be explicitly enabled and configured.

Your Task:

Tails runs entirely in memory to leave no traces. What is the 3-letter acronym for this type of memory that gets wiped on shutdown?

4

Security Applications in Tails

Pre-installed Security Tools

Tails comes with a carefully selected set of security applications, each chosen for its privacy features.

🧅 Tor Browser

Anonymous web browsing with all traffic routed through Tor. Pre-configured for maximum privacy.

💬 Pidgin + OTR

Secure instant messaging with Off-the-Record encryption for private conversations.

📧 Thunderbird

Email client pre-configured to use Tor, with OpenPGP encryption support.

🔐 KeePassXC

Password manager for secure storage of all your credentials.

🔏 GnuPG

OpenPGP implementation for encrypting files and emails.

🗑️ Metadata Cleaner

Remove identifying metadata from images, documents, and other files.

🎯 Exercise: Open the Applications menu and locate at least 3 of these security tools. You'll use several of them in upcoming labs!

Explore the applications, then click Continue to proceed.

5

The Files Application

Managing Files in Tails

The Files application (also called Nautilus) is your file manager in Tails.

Opening Files:

  1. Go to Activities → Files
  2. Or click the filing cabinet icon in the dock
  3. Or press Super + E

Important Locations:

  • Home - Your temporary home folder (/home/amnesia)
  • Tor Browser - Downloaded files from Tor Browser
  • Other Locations - Access USB drives and other media

⚠️ Remember: All files in your Home folder will be deleted when you shut down Tails! Save important files to Persistent Storage or external media.

Hidden Files:

To show hidden files (starting with .), press Ctrl + H in the Files application.

Your Task:

Open the Files application and look at the path bar or window title. What is the default username in Tails? (Hint: It relates to Tails being amnesic)

6

Using the Terminal

Terminal Access in Tails

The terminal gives you powerful command-line access to the Tails system.

Opening the Terminal:

  1. Go to Applications → System Tools → Terminal
  2. Or search for "Terminal" in Activities

Useful Commands:

# Check your username
whoami

# See what OS you're running
cat /etc/os-release

# Check Tor connectivity
curl --socks5 127.0.0.1:9050 https://check.torproject.org/api/ip

# View network connections
ss -tuln

🔐 Root Access: In Tails, you can use sudo for administrative commands. No password is required by default for the amnesia user.

Your Task:

Open the Terminal and run cat /etc/os-release. What is the NAME value shown in the output? (Enter just the first word)

7

Lab Complete - Tails Fundamentals

🛡️

Tails Fundamentals Complete!

You now understand the basics of the Tails operating system

📚 What You Learned:

  • What Tails is and why it's used for privacy
  • The amnesic nature and why it leaves no traces
  • How to navigate the GNOME desktop
  • The security applications available in Tails
  • File management and terminal basics

🔒 Key Security Features Recap:

  • Amnesia - No traces left after shutdown
  • Tor-only networking - All connections anonymized
  • Encryption tools built-in - Ready for secure communications
  • Fresh on every boot - Malware can't persist
  • MAC address spoofing - Network anonymity enhanced

🚀 Next Steps:

🧅 Introduction to Tor

Deep dive into the Tor network and how it protects your anonymity.

🌐 Navigating the Dark Web

Learn to safely explore .onion sites.

💬 Secure Messaging with Pidgin

Set up encrypted instant messaging.

Remember: Tails is your shield for privacy - use it wisely and ethically! 🛡️

Lab Environment
Open in Tab