1 [[!meta title="Frequently asked questions"]]
5 Can I install other add-ons in the browser?
6 -------------------------------------------
8 Installing add-ons in the browser might break the security built in Tails.
10 Add-ons can do anything within the browser, and even if all the networking goes
11 through Tor, some add-ons might interact badly with the rest of the
12 configuration or leak private information.
14 1. They can track and reveal information about your browsing behaviour, browsing
15 history, or system information, either on purpose or by mistake.
17 2. They can have bugs and security holes that can be remotely exploited by an
20 4. They can have bugs breaking the security from the other add-ons, for example
21 Torbutton, and break your anonymity.
23 5. They can break your anonymity by making your browsing behaviour
24 distinguishable amongst other Tails users.
26 No add-on, apart from the ones already included in Tails, have been seriously
27 audited and should be considered safe to use in this context, unless proven
32 <li>[[Warnings about persistence|doc/first_steps/persistence/warnings#index3h1]]</li>
33 <li>[[Browsing the web with Iceweasel|doc/anonymous_internet/iceweasel]]</li>
34 <li>[[Can I hide the fact that I am using Tails?|doc/about/fingerprint/]]</li>
39 XXX: Push that information to the browser documentation?
40 XXX: Check https://www.torproject.org/torbutton/torbutton-faq.html.en#recommendedextensions
43 Does Tails work with 64-bit processors?
44 ---------------------------------------
46 Tails is a 32-bit operating system. But it also works on 64-bit processors, such
47 as 64-bit Intel and AMD processors, since they have backwards compatibility with
50 We are working on a 64-bit version of Tails see [[!tails_ticket 5456]].
52 Does Tails work on ARM architecture, Raspberry Pi, or tablets?
53 --------------------------------------------------------------
55 For the moment, Tails is only available on the x86 and x86_64 architectures.
56 The Raspberry Pi and many tablets are based on the ARM architecture. Tails do
57 not work on the ARM architecture so far.
59 Look for a tablet with an AMD or Intel processor. Try to verify its
60 compatibility with Debian beforehand, for example make sure that the Wi-Fi card
63 Can I download using BitTorrent with Tails?
64 -------------------------------------------
66 Tails does not ship any BitTorrent software and is unlikely to do so in the
69 The problem with using BitTorrent over Tor is double:
71 - It is technically hard to do it properly, see:
72 <https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea>.
73 - It harms the network, see:
74 <https://blog.torproject.org/blog/why-tor-is-slow>.
76 We have (relatively vague) [[!tails_ticket 5991 desc="plans to improve
77 this situation"]], though.
79 Is it safe to use Tails on a compromised system?
80 ------------------------------------------------
82 Tails runs independently from the operating system installed on the computer.
83 So, if the computer has only been compromised by software, running from inside
84 your operating system (virus, trojan, etc.), it is safe to use Tails. This is
85 true as long as Tails itself has been installed on a trusted system.
87 If the computer has been compromised by someone having physical access to it and
88 who installed untrusted pieces of hardware, then it might not be safe to use
91 Why does tails.boum.org rely on a commercial SSL certificate?
92 -------------------------------------------------------------
94 HTTPS provides encryption and authentication on the web. The standard
95 authentication mechanism through SSL certificates is centralized and based on
96 commercial or institutional certificate authorities. This mechanism has proven
97 to be susceptible to various methods of compromise. See our [[warning about
98 man-in-the-middle attacks|doc/about/warning#man-in-the-middle]].
100 Still, we use HTTPS on our website and rely on a commercial certificate even if
101 we acknowledge those security problems.
103 1. Providing no HTTPS and no kind of encryption would be a worse option.
105 2. Providing a self-signed certificate or another marginally supported
106 authentication mechanism would not work for the majority of users. Modern
107 browsers provide very strong warning when facing a self-signed certificate, and
108 many people would think the website is broken when it is not.
110 We prefer to provide weak security, using a commercial certificate, that still
111 works for most people. At the same time, we make clear this security is limited
112 and encourage stronger ways of verifying the authenticity of Tails once
113 downloaded. See our documentation on [[verifying the ISO|download#verify]].
115 How to analyse the results of online anonymity tests?
116 -----------------------------------------------------
118 Fingerprinting websites such as <https://panopticlick.eff.org/> or
119 <https://ip-check.info/> try to retrieve as much information as possible from
120 your browser to see if it can be used to identify you.
122 As explained in our documentation about
123 [[fingerprinting|doc/about/fingerprint]], Tails provides anonymity on the web by
124 making it difficult to distinguish a particular user amongst all the users of
125 Tails and the Tor Browser Bundle (TBB).
127 So, the information retrieved by such fingerprinting websites is not harmful for
128 anonymity in itself, as long as it is the same for all Tor users.
130 For example, the user-agent property of the browser is set to `Mozilla/5.0
131 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3`,
132 as of Tails 0.21 and TBB 2.3.25-13. This value preserves your anonymity even if
133 the operating system installed on the computer is Windows NT and you usually run
134 Firefox. On the other hand, changing this value makes you distinguishable from
135 others Tor users and breaks your anonymity.
137 Furthermore, we verify the result of those websites before each release, see our
138 [[test suite|contribute/release_process/test]].
140 Can I view websites using Adobe Flash with Tails?
141 -------------------------------------------------
143 Adobe Flash is not included in Tails for several reasons:
145 - It is proprietary software which prevents us from legally including it in
147 - It is closed source and so we have no idea of what it really does.
148 - It has a very long history of serious security vulnerabilities.
149 - It is known to favor privacy invasive technologies such as
150 [Flash cookies](XXX Add link to Flash cookies,
151 https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/?).
152 - Adobe has basically stopped maintaining their Flash plugin for
155 We have considered including open-source alternative software to Adobe
156 Flash, such as [Gnash](http://www.gnu.org/software/gnash/), but it is
157 not the case yet, see [[!tails_ticket 5363]].
159 But you can already watch HTML5 videos and view WebGL websites with the Tails
162 Can I install Tails permanently onto my hard disk?
163 --------------------------------------------------
165 This is not possible using the recommended installation methods. Tails is
166 designed to be a live system running from a removable media: DVD, USB stick or
169 This is a conscious decision as this mode of operation is better for what we
170 want to provide to our users: amnesia, the fact that Tails leaves no traces on
171 the computer after a session is closed.
173 Can I verify the integrity of a Tails device?
174 ---------------------------------------------
176 It is not possible to verify the integrity of a Tails device when running Tails
177 from this same device. This would be like asking to someone whether she is a
178 liar; the answer of a true liar would always be "no".
180 - To verify the integrity of a DVD from a separate trusted system , you can
181 verify the signature of the ISO image as documented in [[verify the ISO image
182 using the command line|doc/get/verify_the_iso_image_using_the_command_line]]
183 against the DVD itself.
185 - There is no documented method of verifying the integrity of a USB stick or SD
186 card installed using <span class="application">Tails
187 Installer</span>. However, given another trusted Tails system,
188 [[cloning it onto the untrusted one|doc/first_steps/upgrade]] will
189 reset it to a trusted state.
191 Is Java installed in the Tails browser?
192 ---------------------------------------
194 Tails does not include a Java plugin in its browser because it could break your anonymity.
196 Why is JavaScript enabled by default in the Tails browser?
197 ----------------------------------------------------------
199 Many websites today require JavaScript to work correctly. As a consequence
200 JavaScript is enabled by default in Tails to avoid confusing many users. But
201 the [[Torbutton|doc/anonymous_internet/iceweasel#torbutton]] extension,
202 included in Tails, takes care of blocking dangerous JavaScript functionalities.
204 Tails also includes the [[NoScript|doc/anonymous_internet/iceweasel#noscript]]
205 extension to disable more JavaScript if needed. Note that if you disable
206 JavaScript, then your browser [[fingerprint|doc/about/fingerprint]] might
207 differ from most of Tor users and break your anonymity.
209 We think that having JavaScript enabled by default is the best possible
210 compromise between usability and security in this case.
212 Is it possible to recover the passphrase of the persistent volume?
213 ------------------------------------------------------------------
215 No. The encryption of the persistent volume is very strong and it is not
216 possible to recover the passphrase of the persistent volume. If the passphrase
217 is weak enough, an attacker, using a brute force attack, could try many
218 possible passphrases and end up guessing your passphrase.
220 Does Tails change the MAC address of my network cards by default?
221 -----------------------------------------------------------------
223 No, but we are working on this topic, see [[!tails_ticket 5421]].
225 Note that Tails includes <span class="application">macchanger</span>, a tool to
226 change your MAC address. But if you use <span
227 class="application">macchanger</span> after Tails is started, your MAC address
228 might have already been leaked on the local network.
230 To prevent this, unplug your network cable or switch off the hardware switch of
231 your Wi-Fi card, and execute the following commands:
233 - `sudo service network-manager stop`
234 - `sudo macchanger -a -e eth0`
235 - `sudo macchanger -a -e wlan0`
236 - `sudo service network-manager start`
238 Then only plug your network cable or switch on the hardware switch of your
241 Can I use the memory wipe feature of Tails on another operating system?
242 -----------------------------------------------------------------------
244 The memory wipe mechanism that Tails uses on shutdown to [[protect against cold
245 boot attacks|doc/advanced_topics/cold_boot_attacks]] is not yet available in
246 other Linux distributions. In the future, we would like to package it for
249 If you want to implement this feature outside of Tails, have a look at the
250 corresponding [design documentation](contribute/design/memory_erasure/).
252 Is it safe to use the new identity feature of Vidalia?
253 ------------------------------------------------------
256 The <span class="guilabel">New Identity</span> feature of the web browser is
257 not available anymore (ticket [[!tails_ticket 6383]]).
260 In our [[warning page|doc/about/warning#identities]] we advice to restart Tails
261 every time that you want to use a different contextual identity. The <span
262 class="guilabel">New Identity</span> feature of <span
263 class="application">Vidalia</span> forces Tor to use new circuits but only for
264 new connections. The two main drawbacks of this techniques are:
266 - The circuits used by connections that remain open might not be changed, for
267 example, a circuit used to connect to an open webpage or to an instant
270 - Each application might contain information that can identify you,
271 independently of the Tor circuit that are used. For example, the browser might
272 contain cookies from previous websites, <span
273 class="application">[[Pidgin|doc/anonymous_internet/pidgin]]</span> will reuse the
274 same nickname by default, etc.
276 Tails is a full operating system, so a *new identity* should be thought on a
277 broader level than only changing the Tor circuits.
284 That is not an official Debian package and in that sense it won't benefit from
285 the many advantages of a real inclusion in Debian, which makes it otherwise
286 non-sustainable for us to include such packages:
288 - be under the scrutiny of the Debian community
289 - provide OpenPGP signed packages
290 - follow the Debian process for security updates and new versions
292 But if Retroshare already proposes a non-official Debian package, maybe they are not so far from having it into Debian. You could check with them if that is in their plan.
294 Why doesn't Tails ship software XYZ?
296 First of all, please ask yourself, seriously, why should Tails ship
299 There are many, many possible reasons why Tails does not ship software
302 0. It may have licensing issues that prohibit us from shipping it (or
303 shipping modified versions of it, which is just as bad).
304 0. It may not be part of Debian stable, or even part of Debian, or
305 even packaged for Debian.
306 0. It may be in conflict with our [[specification|contribute/design]],
307 or it may satisfy use cases Tails is not supposed to support.
308 0. It may have privacy or anonymity issues. Was it ever audited in
311 Also, generally we try not to add too much software into Tails,
312 and are very careful before adding more stuff:
314 * More software implies more security issues.
315 * We do care about backward compatibility. Removing a software package
316 is problematic, even if it should be removed due to e.g. security
317 concerns, since users may have come to rely on it. In these cases we
318 really want to provide them with suitable alternatives.
319 * Tails ISO image size matters.
321 To end with, it might be that we simply have not thought of software
322 XYZ yet. Reading our [[design document|contribute/design]] may help
323 you understand which use cases Tails covers and hence which types of
324 software we may consider. If you feel that XYZ would fill up an empty
325 space, please [[!tails_redmine "" desc="suggest it to us"]] and give valid
326 points for its inclusion.
331 How_do_you_chain_a_proxy_after_TOR___63__
332 Next_Tails_version_should_have_proxychains_for_socks_after_exit_node
333 alternative_way_to_connect_to_web
334 featurerequest:_proxychains
336 easy way to chain a SOCKS5 proxy after the hop off the exit node of TOR.
338 I need to hide the fact that I'm coming from TOR, because many websites block tor.
340 I have found some websites that explain how to create an SSH tunnel, but using the terminal is above my level of skills :)
342 It should be possible to use a program like Proxify to chain a proxy, but I
343 don't know if this creates conflicts, and I don't know how to install a program
344 that can run of the persistent volume.
346 Surely there is someone who can simply give us a paragraph of text to enter into
347 the polipo config file ( where i add the ip address and port for the SOCKS5 i
348 bought ) or give some other instructions.
350 * Use something like `ssh -D 1081`. See `DynamicFoward` in `ssh_config(5)`. * Use `iptables` to allow connections to 1081 on localhost.
351 * For websites, modify FoxyProxy settings to add a new proxy, before rules
352 for Tor, that contains the addresses that needs to be reached, and
353 which directs connections to 1081.
354 * For other programs, draft a dedicated `tsocks.conf`. Use
355 `TSOCKS_CONF_FILE=tsocks-specific.conf tsocks ssh one.example.org`.
357 `proxychains` is in Debian, the package is called by the same name. This means
358 it is straightforword to install it in Tails. There is no way in can be
359 preconfigured for every Tails users, so it's hard to see why it should be
360 included in the default package set.
367 - XXX_NICK_XXX in Pidgin might be caused by a lack of RAM