
Tails
Tails is part of the Tor Project, a global nonprofit developing tools for online privacy and anonymity. To better protect you, the same people are building the Tor network, the Tor Browser, and Tails.
Tails - Install Tails
Feb 26, 2026 · Tails doesn't work on smartphones or tablets. The hardware of smartphones and tablets is very different from the hardware of computers. For now, it's impossible to make smartphone and …
Tails
Tails incluye una selección de aplicaciones para trabajar en documentos confidenciales y para comunicarse de forma segura. Todo en Tails está listo para usar y tiene una configuración segura …
Tails - Cómo funciona Tails
Tails es una descarga de 1.9 GB y toma ½ hora para instalar. Tails puede ser instalado en una memoria USB de al menos 8 GB. Tails funciona en la mayoría de las computadoras de menos de 10 años. …
Tails - Tails 7.0
Sep 18, 2025 · Tails 7.0 brings new versions of many applications included in Tails. Dedication Tails 7.0 is dedicated to the memory of Lunar (1982–2024). Lunar was a traveling companion for Tails, a Tor …
Tails - How Tails works
Tails is made by the Tor Project, a global nonprofit developing tools for online privacy and anonymity. Our work is funded by donations from people like you and organizations that support Internet …
Install Tails from Windows
Tails is safer than any regular operating system. But Tails, or any software or operating system, cannot protect you from everything—even if they pretend to. The recommendations below will keep you …
Tails - Tails 7.5
Feb 26, 2026 · Until Tails 7.5, a new version of Thunderbird was released by Mozilla only a few days after we released a new version of Tails. As a consequence, the version of Thunderbird in Tails was …
Tails - Installation instructions
Design document of Tails Cloner Design document of the download verification Archive of our design artifacts Usability tests from December 2021 Implementation tricks The installation instructions are …
Tails - Documentation
Warnings: Tails is safe but not magic! Protecting your identity when using Tails Limitations of the Tor network Reducing risks when using untrusted computers Features and included software How can I …