This documentation is a work in progress and a collective task.
If this section doesn't answer your questions, you can also look at our FAQ.
Read about how you can help improving Tails documentation.
- System requirements
- Features and included software
- Why does Tails use Tor?
- Can I hide the fact that I am using Tails?
- Trusting Tails
- Acknowledgments and similar projects
Download and install
- Install from another Tails (for PC)
- Install from another Tails (for Mac)
- Install from Windows
- Install from Ubuntu
- Install from Ubuntu and the command line
- Install from other Linux distributions
- Install from Mac OS X by burning a DVD first
- Install from Mac OS X and the command line
- Burn a DVD
- Download without installing
- Verify the ISO image
First steps with Tails
For installing and starting Tails, we recommend you try our new installation assistant. The following pages are the old instructions, provided as a fallback.
- Choosing between burning a DVD and installing onto a USB stick or SD card
- Burning a DVD
- Installing onto a USB stick or SD card (recommended)
- Start Tails
- Startup options
- Introduction to GNOME and the Tails desktop
- Encrypted persistence
- Report an error
- Shutting down Tails
- Upgrading a Tails USB stick or SD card
- Uninstalling Tails or resetting a USB stick or SD card using Linux, Windows, or Mac
Connect to the Internet anonymously
- Connecting to a network
- Viewing the status and circuits of Tor
- Browsing the web with Tor Browser
- Chatting with Pidgin & OTR
- Emailing with Icedove (Thunderbird)
- Exchange bitcoins using Electrum
- Using I2P
- Why Tor is slow?
Encryption and privacy
- Your data won't be saved unless explicitly asked
- Using the virtual keyboard
- Create and use encrypted volumes
- Opening TrueCrypt volumes using cryptsetup
- Encrypt, decrypt, sign, and verify text using OpenPGP and OpenPGP Applet
- Securely delete files and clean diskspace using Nautilus Wipe
- Manage passwords using KeePassX
- Calculating checksums using GtkHash
- Sharing encrypted secrets using keyringer