Introduction to Tails OS
Discover Tails - The Amnesic Incognito Live System. Learn how this privacy-focused operating system works, its key security features, and how to navigate its unique environment designed for anonymity.
Tasks
0 / 7 completedPreview Mode
You can browse the tasks below. Sign in to track your progress and launch the lab machine.
Sign In to StartWelcome to Tails OS
🎯 Learning Objectives
- Understand what Tails OS is and its purpose
- Learn about the amnesic nature of Tails
- Navigate the Tails desktop environment
- Discover the security applications pre-installed in Tails
What is Tails?
Tails (The Amnesic Incognito Live System) is a portable operating system designed to protect your privacy and anonymity. It's used by journalists, activists, whistleblowers, and anyone needing secure communications.
🔑 Key Features of Tails:
- Amnesic - Leaves no trace on the computer after shutdown
- Incognito - All traffic forced through Tor network
- Live System - Runs entirely from USB/DVD, not your hard drive
- Debian-based - Built on stable Linux foundation
💡 Fun Fact: Edward Snowden used Tails when communicating with journalists to leak NSA documents in 2013. It's trusted by security professionals worldwide.
Your First Steps:
- Click "Start Machine" above to launch your Tails environment
- Wait for the desktop to fully load (this may take 1-2 minutes)
- Familiarize yourself with the clean, minimal desktop
Once the desktop is loaded, click Continue to start exploring!
Exploring the Tails Desktop
The Tails Desktop Environment
Tails uses the GNOME desktop environment with a clean, security-focused layout.
Top Panel Components:
📱 Activities
Click top-left corner or press Super key to view all windows and search
🧅 Tor Status
Onion icon shows Tor connection status
🔊 System Tray
Volume, network, and power controls
Accessing Applications:
- Click Activities in the top-left corner
- Or press the Super key (Windows key)
- Start typing to search for any application
- Or click the grid icon to see all applications
Common Application Locations:
- Applications → Internet - Tor Browser, Pidgin, Thunderbird
- Applications → Accessories - Text editor, Files, Calculator
- Applications → System Tools - Terminal, Disks, Settings
Explore the Activities view and find the Applications menu. Click Continue when ready.
Understanding Amnesia
The Amnesic Property
Tails is called "amnesic" because it forgets everything when you shut down. This is a crucial security feature.
⚠️ Important:
When Tails shuts down, it securely wipes all memory (RAM). This means:
- Documents you created are gone
- Browser history disappears
- Downloaded files vanish
- Login credentials are forgotten
How This Protects You:
| Threat | Protection |
|---|---|
| Forensic analysis | No traces left on disk |
| Physical seizure | Memory wiped on shutdown |
| Cold boot attacks | RAM overwritten with random data |
| Malware persistence | Fresh system on each boot |
💾 Persistent Storage: If you need to save files between sessions, Tails offers encrypted Persistent Storage - but this must be explicitly enabled and configured.
Your Task:
Tails runs entirely in memory to leave no traces. What is the 3-letter acronym for this type of memory that gets wiped on shutdown?
Security Applications in Tails
Pre-installed Security Tools
Tails comes with a carefully selected set of security applications, each chosen for its privacy features.
🧅 Tor Browser
Anonymous web browsing with all traffic routed through Tor. Pre-configured for maximum privacy.
💬 Pidgin + OTR
Secure instant messaging with Off-the-Record encryption for private conversations.
📧 Thunderbird
Email client pre-configured to use Tor, with OpenPGP encryption support.
🔐 KeePassXC
Password manager for secure storage of all your credentials.
🔏 GnuPG
OpenPGP implementation for encrypting files and emails.
🗑️ Metadata Cleaner
Remove identifying metadata from images, documents, and other files.
🎯 Exercise: Open the Applications menu and locate at least 3 of these security tools. You'll use several of them in upcoming labs!
Explore the applications, then click Continue to proceed.
The Files Application
Managing Files in Tails
The Files application (also called Nautilus) is your file manager in Tails.
Opening Files:
- Go to Activities → Files
- Or click the filing cabinet icon in the dock
- Or press Super + E
Important Locations:
- Home - Your temporary home folder (/home/amnesia)
- Tor Browser - Downloaded files from Tor Browser
- Other Locations - Access USB drives and other media
⚠️ Remember: All files in your Home folder will be deleted when you shut down Tails! Save important files to Persistent Storage or external media.
Hidden Files:
To show hidden files (starting with .), press Ctrl + H in the Files application.
Your Task:
Open the Files application and look at the path bar or window title. What is the default username in Tails? (Hint: It relates to Tails being amnesic)
Using the Terminal
Terminal Access in Tails
The terminal gives you powerful command-line access to the Tails system.
Opening the Terminal:
- Go to Applications → System Tools → Terminal
- Or search for "Terminal" in Activities
Useful Commands:
# Check your usernamewhoami# See what OS you're runningcat /etc/os-release# Check Tor connectivitycurl --socks5 127.0.0.1:9050 https://check.torproject.org/api/ip# View network connectionsss -tuln
🔐 Root Access: In Tails, you can use sudo for administrative commands. No password is required by default for the amnesia user.
Your Task:
Open the Terminal and run cat /etc/os-release. What is the NAME value shown in the output? (Enter just the first word)
Lab Complete - Tails Fundamentals
Tails Fundamentals Complete!
You now understand the basics of the Tails operating system
📚 What You Learned:
- What Tails is and why it's used for privacy
- The amnesic nature and why it leaves no traces
- How to navigate the GNOME desktop
- The security applications available in Tails
- File management and terminal basics
🔒 Key Security Features Recap:
- Amnesia - No traces left after shutdown
- Tor-only networking - All connections anonymized
- Encryption tools built-in - Ready for secure communications
- Fresh on every boot - Malware can't persist
- MAC address spoofing - Network anonymity enhanced
🚀 Next Steps:
🧅 Introduction to Tor
Deep dive into the Tor network and how it protects your anonymity.
🌐 Navigating the Dark Web
Learn to safely explore .onion sites.
💬 Secure Messaging with Pidgin
Set up encrypted instant messaging.
Remember: Tails is your shield for privacy - use it wisely and ethically! 🛡️