Private Company

Hardware Encrypted USB with TailsOS

313  incl. TAX
250  excl. TAX

TAILS OS is a portable operating system that protects against surveillance and censorship

Hardware encrypted(PIN Code) USB stick with Tails OS (The Amnesic Incognito Live System)

If you are looking for an operating system that offers you online anonymity and security while respecting your privacy, you should consider the Tails (The Amnesic Incognito Live System) Live OS. Tails is a Debian-based Live Linux distribution that offers online anonymity, privacy and security. It achieves these three core functions by including a curated list of advanced tools and techniques like the Tor NetworkTor BrowserCryptographyEncryptionOnionCircuitsOnionShare and browser extensions like uBlock OriginHTTPS Everywhere and NoScript into a live system. All of the tools are packaged into a single image that you can download and write onto a USB stick or DVD.

Tails uses the Tor (The Onion Router) anonymity network to protect user privacy. All incoming and outgoing network connections from the computer are routed through Tor which provides anonymity by encrypting data and routing connections through three Tor nodes. It also enables MAC address spoofing by default so that within the local network, user device can’t be identified or tracked. All the softwares installed are configured so as to route the network traffic via the Tor network. All non Tor connections are blocked by default and there by improves user security.

Your secure computer anywhere

To use Tails, shut down the computer and start on your Tails USB stick instead of starting on Windows, macOS, or Linux.You can temporarily turn your own computer into a secure machine. You can also stay safe while using the computer of somebody else.

You don’t have to worry about the computer having viruses because Tails runs independently from the other operating system and never uses the hard disk. But, Tails cannot always protect you if you install it from a computer with viruses or if you use it on a computer with malicious hardware, like keyloggers.

Amnesia

Tails always starts from the same clean state and everything you do disappears automatically when you shut down Tails.

Without Tails, almost everything you do can leave traces on the computer:

  • Websites that you visited, even in private mode
  • Files that you opened, even if you deleted them
  • Passwords, even if you use a password manager
  • All the devices and Wi-Fi networks that you used

On the contrary, Tails never writes anything to the hard disk and only runs from the memory of the computer. The memory is entirely deleted when you shutdown Tails, erasing all possible traces.

Persistent Storage

You can save some of your files and configuration in an encrypted Persistent Storage on the USB stick: your documents, your browser bookmarks, your emails, and even some additional software.

The Persistent Storage is optional and you always decide what is persistent. Everything else is amnesic.

Digital security toolbox

Tails includes a selection of applications to work on sensitive documents and communicate securely.

All the applications are ready-to-use and are configured with safe defaults to prevent mistakes.

Tails includes:

  • Tor Browser with uBlock, a secure browser and an ad-blocker
  • Thunderbird, for encrypted emails
  • KeePassXC, to create and store strong passwords
  • LibreOffice, an office suite
  • OnionShare, to share files, websites, and chat rooms over Tor
  • Metadata Cleaner, to remove metadata from files
  • and many more!

To prevent mistakes:

  • Applications are blocked automatically if they try to connect to the Internet without Tor.
  • Everything in the Persistent Storage is encrypted automatically.
  • Tails does not write anything to the hard disk. All the memory is deleted when shutting down.

Tor for everything

Everything you do on the Internet from Tails goes through the Tor network. Tor encrypts and anonymizes your connection by passing it through 3 relaysRelays are servers operated by different people and organizations around the world.

A single relay never knows both where the encrypted connection is coming from and where it is going to:

  • The 1st relay only knows where you are coming from but not where you are going to.
  • This 3rd relay only knows where you are going to but not where you are coming from.
  • The connection to the final destination is encrypted whenever possible to prevent the 3rd relay from reading its content.

This way, Tor is secure by design even if a few relays are malicious.

The Tor network has more than 6 000 relays. Organizations running Tor relays include universities like the MIT, activist groups like Riseup, nonprofits like Derechos Digitales, Internet hosting companies like Private Internet Access, and so on. The huge diversity of people and organizations running Tor relays makes it more secure and more sustainable.

Avoid online surveillance and censorship

Tor prevents someone watching your Internet connection from learning what you are doing on the Internet.

You can avoid censorship because it is impossible for a censor to know which websites you are visiting.

If connecting to Tor is blocked or dangerous to use from where you are, for example in some countries with heavy censorship, you can use bridges to hide that you are connected to the Tor network.

Avoid tracking and change identity

Tor also prevents the websites that you are visiting from learning where and who you are, unless you tell them. You can visit websites anonymously or change your identity.

Online trackers and advertisers won’t be able to follow you around from one website to another anymore.

You can publish a blog or manage a social media account entirely from Tails. If you only access it from Tails, it cannot be related to you. You can store documents and images related to this different identity in your Persistent Storage, keep your passwords in KeePassXC, have a dedicated email account in Thunderbird, etc.

Video TAILS OS

Updating…
  • No products in the cart.
Private Company
Private Company