

Then simply open the folder and click to start Tor Browser.Execute the file you downloaded to extract the Tor Browser into a folder on your computer (or pendrive).It is very easy and similar to using a normal browser: Thus, as a whistleblower, in order to protect your anonymity, you must first download and install the Tor Browser. If you have concerns about your traceability and you choose to submit your information in total anonymity, you will be using a submission system that is entirely based on the use of Tor technology, which is already integrated into our platform. Watch this video for more about how Tails works.WildLeaks has implemented a Tor-based secure platform in order to allow our sources to stay anonymous and to submit sensitive information in the most secure way possible, always encrypted, in respect to data transmission and management. As always, if you’re using Tails to do something illegal, you will be caught. It’s good for letting you get around without being tracked by ads and other cookies, but there is a limit. There have been some concerns raised over the level of security Tails gives you. Go here or use the blue button to download Tails. Tails can be downloaded and used for Windows, Mac, Debian, Ubuntu, Mint and other Linux computers. Any sensitive documents or files that you want to save can be done so on another USB stick or external hard drive. Tails only uses RAM for storage space, and that is automatically erased when the computer shuts down.Īfter you shut Tails down, the computer will start up again with its usual OS. Tails is also configured to not use the computer’s hard disks, even if there is some swap space left on them. It also prevents the sites from learning your physical location. As browsing history and saved bookmarks builds up, the ratio will approach 10 to 1 or more. By doing this, Tor prevents someone from watching your internet connection and learning what sites you visit. Yes you can install Firefox to a different drive, but the 'bulk' of Firefox files will end up on the drive that has the operating system AppData folder. In simple terms, Tor works by having your communications go through a network of relays that are run by volunteers all over the world. Tor is a free and open-network software that helps defend against traffic analysis, which is a kind of network surveillance that infringes upon personal freedom and privacy, confidential business activities and relationships, and state security. Tails works with TorĪ big part of Tails’ effectiveness is the Tor anonymity network. Tails is able to protect your identity by way of using state-of-the-art cryptographic tools that encrypt your files as well as emails and instant messages. Does that sound good to you? It sounds good to us.
