[[!meta Error: stylesheet not found]]

  • The Unsafe Browser is not anonymous.

    The Unsafe Browser does not use Tor. The websites that you visit can see your real IP address.

    This is why we recommend that you:

  • The Unsafe Browser can be used to deanonymize you.

    An attacker could exploit a security vulnerability in another application in Tails to start an invisible Unsafe Browser and reveal your IP address, even if you are not using the Unsafe Browser.

    For example, an attacker could exploit a security vulnerability in Thunderbird by sending you a phishing email that could start an invisible Unsafe Browser and reveal them your IP address.

    Such an attack is very unlikely but could be performed by a strong attacker, such as a government or a hacking firm.

    This is why we recommend that you:

    • Only enable the Unsafe Browser if you need to log in to a captive portal.
    • Always upgrade to the latest version of Tails to fix known vulnerabilities as soon as possible.

    We have plans to fix the root cause of this problem but it requires important engineering work.

Logging in to captive portals

Many publicly accessible Internet connections (usually available through a wireless network connection) require users to first log in to a captive portal in order to access the Internet.

A captive portal is a web page that is displayed to the user before the user can access the Internet. Captive portals usually require the user to log in to the network or enter information such as an email address. Captive portals are commonly encountered at Internet cafés, libraries, airports, hotels, and universities.

This is an example of a captive portal (by AlexEng):

Welcome! Please enter your credentials to connect.

Tor cannot start when the Internet connection is initially blocked by a captive portal. That is why Tails includes an Unsafe Browser to log in to captive portals before starting Tor.

To log in to a captive portal:

  1. Try visiting any website using the Unsafe Browser.

    Choose a website that is common in your location, for example a search engine or news site.

  2. You should be redirected to the captive portal instead of the website.

  3. After you logged in to the captive portal, Tor should start.

  4. After Tor is ready, close the Unsafe Browser.

    You can use Tor Browser and any other application as usual.