I’ve watched so many videos on this and you’re by far the best video I’ve ever seen. As a matter of fact, you’re probably the best teacher I’ve seen on this channel. I know so many have already have already commented, but I too was blown away by your video I had to leave a comment too. You have a gift for teaching. I literally was not bored at all unlike other videos that I have seen on this topic. The animations helps to keep the video engaging. Bravo! Thank you for your channel. I’ve learned so much since stumbling on yours.
I Usually don’t write about any kind of video. - but the experience was so good that was a pleasure to give a comment. This explanation was, by far, for the people without tech and security background, the BEST VIDEO EVER explaining about TAILS. Thank you so much.
So, I just want to say how interesting this is. I am a Human Services major, studying to be a counselor. I don't know why or how I ended up stumbling on this particular video, but I couldn't stop watching it. The information genuinely piqued my interest. Perhaps it is a new way of learning? Anyways, thank you so much for sharing.
Perhaps one of the best intro tutorials for Linux on a live session I have seen. I was initially going to comment 'but this is no different than Ubuntu or Mint etc. in a live session' then you covered 8:10 the RAM degradation and possible recovery. The wiping of Tails is clever. As is the pulling of the USB key. 👍
Can I connect to a remote VPS server through tails? Of a motherboard was hacked, could tails stop the hackers seeing info or what’s being done while using tails? Brilliantly explained! Thank you.
I see a couple of issues with Tails. If your flashdrive becomes corrupted as some do, you're screwed. There should be an option to have a backup flashdrive just in case one goes belly up. The other issue is if you lose it. In the video it shows a guys putting the flashdrive in the "coin Pocket" of his Levi's. I wouldn't call that very smart as it could come out and get lost.
Then buy a new memory and download Tails again. What's the issue? You literally lose nothing unless if you kept files in Persistence. I'd rather store these files in an open source secure cloud service or an encrypted email account that tails offer to avoid losing all my work if anything happens to the usb
I think I have run into one of the most intelligent channels on yt! Second video of yours I have watched. I have never tried Tails, got Ubuntu on dual boot, triple boot machines, but Tails appears to be by far, the best Linux os there is as far as privacy and security goes. Why is there not billions of people flocking to this video in search of relief from the tyranny and spying that has taken over? Why are they so unconcerned or unaware? Yes, I am going to create a usb boot drive with Tails. For those who have not booted from usb, it is easy to create usb drive, and a lot easier than you could imagine to set your computer bios to boot from usb. That how to should be on the playlist referenced in the video,.. Go For It!!
Hey just found and subscribed to your channel. I'm loving the content! You sound remarkably like a journalist on another channel I'm subscribed to. Keep Computing forever! Cheers
Very well explained. Even I understand it. BUT wouldn't a government be suspicious if someones internet traffic is encrypted? Wouldn't that in it self revealing that you're (probably) doing something illegal?
Great video series, very well done. I have questions. Couldn't the security, and safety, of a Tails OS session be compromised if the firmware of the "Tails possessed system" is compromised? I've watched the entire Infosec series and watching again now but just trying to pick apart any possible vulnerabilities. Albeit I'm not a tech guru by any strecth but am more tech savvy than many and just want to find a way to ensure as best as possible that the device I use to run Tails and Tor isn't compromised prior to running any live session. I understand the basic jist of the Tails firewall when using Tor only allows for communications over the Tor network but if some certain malware exists in firmware on the host system before the OS even boots wouldn't that allow certain malwares to then just communciate across the Tor network to "own" a user's live OS session?
Do any of your videos cover configuring VPN on TAILS? I had thought that VPN would be pre installed and simply require a config file but apparently not.
There's some strange info in this like the claim that microsoft is spying with key loggers, i think it's probably not microsoft but a third party rat that has made it's way onto the operating system. Not many people are 'security focused' and some who are have progressed far beyond this and are probably getting into stacking TOR with VPN's, heavy encryption, staying far away from Facebook and Facebook people, preventing wifi triangulation, and making their own customized linux os stack built from the ground up so that they know they're not getting double crossed by tails or some other weak link in their security chain including malware that third parties may try to add in after the fact.
You seem to have not understood anything he said, nor do you understand why Tails is used. It's precisely the fact that it's "USELESS" that makes it so valuable because if someone else gets their hands on your drive they won't be able to do anything with it. This is why AMNESIC is in the acronym TAILS.
I've seen other tech channels praise Tails and only list one or two benefits for it, not enough for me to look into the OS. Had I watched this video sooner I would've adopted the OS much sooner.
Are there any downsides to running Windows from Virtualbox inside of Tails? I'd disable online connectivity to the virtual machine and only access the internet from Tails. I still depend on a lot on Windows only applications.
Great video but I seem to having some problems with connecting to tor browser. It keeps telling me that tor isn't ready and I can't find a WiFi connection. I have a 128g SanDisk USB which iv download tails on but which Wi-Fi adapter is compatible with tail to connect to tor. Please help. Thanks 😊
Tails as well as a lot of Linux distros do not support certain wi-fi adapters. I had to purchase a USB wireless adapter. Edimax n150 nano is a great USB adapter. Cost around 13.00 bucks.
I use Linux (Ubuntu distro) bought a Lenovo laptop and a desktop and wiped windows off of them and installed Linux. I use Thunderbird to send encrypted emails and Signal desktop to communicate securely on my PCs. I LOVE LINUX ! :-)
If tails is booted via usb on a machine that has an internal Windows 10 drive in it, can windows or it’s drive log/register any valuable information from when tails was used? I’m sure I remember someone saying tails should ideally only be used on a computer with no other system drive in it, but why when it only loads to ram and is allegedly completely amnesic?
Linknet Infotech Windows has a setting called ‘fast boot’ which I think means windows just goes into a sleep mode, but may still be active in order to boot rapidly?
@@ericweston7353 could you please explain why you believe that a VPN is not recommended? Every other source I have found, regarding TOR usage, recommends using it with a VPN.
@@Curkri The only reason to use a VPN with TOR is if you’re not using TAILS and want to hide the fact that you’re using TOR from your ISP. If you want to hide the fact that you are using Tor from your ISP, then you can select the "More Options" button on the Tails greeting screen and then select the Option "This computer's Internet connection is censored, filter or proxied". However if you are not living under an oppressive regime in which it is illegal or not possible to use Tor normally, it is not recommended to use that options since it only takes away resources from people who really need it. If anything VPNs make the situation worse since they basically introduce either a permanent entry guard (if the VPN is set up before Tor) or a permanent exit node (if the VPN is accessed through Tor). A lot of people make the mistake of assuming that more hops is just better, and adds another layer of security, but that’s just not true. Basically by using a VPN you’re compromising your security because you’re still trusting the VPN company with your internet activity.
Is the USB drive big enough? I tried first with an "8 gb" drive, but that was not enough, as some storage is lost. I tried later with 16 gb and it works fine
hello guys has anyone managed to run on the macbookpro touchbar (2019)? I can get to the initial blue configuration screen, then it crashes. i can't run on the new macbook touchbar (T2). does anyone know how to proceed to make it work? I don't know how to solve this. If anyone knows and can share. not even the tails team knew how to explain
I mean it's meant to be used as a boot disk primarily rather than as an installed OS. If you are using a USB Flash Drive to boot Tails, then there are only 2 possible reasons that you are unable to boot. 1. Your BIOS hasn't been configured properly, likely you have disabled booting disk images or you have IOS prioritized over USB. 2. You haven't properly mounted the .ISO image file onto your USB Flash Drive; double check that.
I’ve been using live operating systems like a Ubuntu for years, I’ve even been able to use it to track down viruses on my windows computer, or organize the hard drives in ways that I could not from inside windows. I have malware one time as a teenager that would not allow me to delete it due to administrative privileges or something, from the live operating system I was able to delete all of the files and break the virus from being functional. I would say anybody running windows should have a live operating system. They are amazing. Tales is great for security, by using the power of Linux you can do amazing things. Did your windows installation crash into an unbootable state? Use a live CD to recover your data And reformat the hard drive without losing your homework. I’ve actually made money off of that kind of stuff.
just starting using tails. would like to examine my windows os for malware etc. any step by step guides you can recommend? (i have basic python experience, and very limited command line/linux experience)
@@cq33xx58 really good advice thanks a lot! let me ask you this to see what you think - what if you have a laptop that you bought cash off craiglist ( no direct tie to you) you have windows and use it for your personal things and when you wanna browse the dark web you remove the hard drive and load the usb with tails? is that a problem? - if you ever used a laptop and gone on the darkweb with your home wifi is that laptop good as done? or moving forward can you implement the steps you mentioned? Thanks
As a security fanatic, NONE of the systems I am responsible for will boot from a USB drive or anything else but the internal SSD.. And UEFI is password protected.
Unless I’m wrong, it doesn’t know you’re using Tails. It will know that a device is using Tor, but not Tails. It won’t even know which device it is being run from.
The idea that "linux is really difficult to use" is NOT simply a myth. Its just old information. Linux is no longer that difficult to install or use. To call it a myth implies it never was and that is a LIE. And its funny how everyone thinks you're so professional but you make a claim like "windows has a keylogger that sends everything you type to microsoft" but you offer no proof for an absurdly wild claim.
Linux GUI is easy. Linux as a command promt, isnt. Thats why todays linux os is so much better. Also, windows admits they log your keystrokes, voice, inking, and yes, pictures. They can be "turned off" but lets get real here, most operating systems like windows and mac have backdoors implimented for NSA snooping.
So would you get a laptop and only boot it with Linux, downloaded from another computer first, then add on Tails to it? My PC has Windows 10 but don’t really want to make changes to it. Rather just get a new machine.
@@-muhammadturk7196 now i stumbled upon this video it's late but if you still need any answer let me explain, Pre-2008 computers do not have Intel management engine or other firmware "security features", Other than that, ibm thinkpad x200 T500 etc. Models also have the privilege to flash the bios where we can remove these features. Now let's see why this is important and necessary for security; Intel management engine is a closed source program that has been used since 2008 to ensure the "security" of the device by managing computer systems from hardware and lower layers. You may have noticed that I used " here for security purposes. In recent years, Intel has begun to gain more control over these applications and put more software into its processors. This is how they can collect the traffic of the devices, all their movements and fingerprints, which has become quite a serious problem for people who are concerned about their security. You may think that Tails provides security and uses Tor, but I have to clarify. Intel me runs on the hardware of the device, so no matter what operating system we have, it will not be a problem for them. So, can we delete it? Work has been done on this, but it may block me up to a point, it may not work, or it may break the system. obviously older computers become a better option for this, So who cares so much about security? Many people doing illegal business on the Internet need this kind of privacy, But in a way, the guys who actually do things to the point of being watched by Intel me have the ability to do anything to get rid of it, Are you saying you need that much security? Well people who care so much about security can't be here but you see, We are here now on youtube, we probably used e-mail when entering here, We have social media, We can ask such questions to anyone. And nobody cares what we do But from the other side, no one has to do illegal work to demand privacy and freedom. We are the people, we are the citizens, Our own personal information and what we do should not belong to 3rd parties, Freedom should be the goal of everyone, not a particular audience. Thanks and regards for your question.
Journalism...yes...journalism is why I need Tails..yes..
i see you are only but a journalist just like me. a journalist.
This is such a good comment lol
@@lj8952 you're joking right?
lalla jha, yup.
@@lj8952 No.
This is professsional. Very impressive. It is completely accurate.
I’ve watched so many videos on this and you’re by far the best video I’ve ever seen. As a matter of fact, you’re probably the best teacher I’ve seen on this channel. I know so many have already have already commented, but I too was blown away by your video I had to leave a comment too. You have a gift for teaching. I literally was not bored at all unlike other videos that I have seen on this topic. The animations helps to keep the video engaging. Bravo! Thank you for your channel. I’ve learned so much since stumbling on yours.
Who ever explained this , He is awesome 😊, loud and clear
I Usually don’t write about any kind of video. - but the experience was so good that was a pleasure to give a comment.
This explanation was, by far, for the people without tech and security background, the BEST VIDEO EVER explaining about TAILS. Thank you so much.
So, I just want to say how interesting this is. I am a Human Services major, studying to be a counselor. I don't know why or how I ended up stumbling on this particular video, but I couldn't stop watching it. The information genuinely piqued my interest. Perhaps it is a new way of learning? Anyways, thank you so much for sharing.
hi ?
This is without a doubt the best and most proffessional video explained about Tails.
Thank You ;)
hey can you plz reply me ? i need to ask one question
Perhaps one of the best intro tutorials for Linux on a live session I have seen. I was initially going to comment 'but this is no different than Ubuntu or Mint etc. in a live session' then you covered 8:10 the RAM degradation and possible recovery. The wiping of Tails is clever. As is the pulling of the USB key. 👍
Secure. Contain. Protect.
SCP foundation
This is the best guide I've ever heard, very soothing.
I love your tutorial.
Clarification = 100%
This was really good, best one on YT.
Your voice is very good. Very calm and relaxed. I enjoyed watching. Keep on good work 👌👍
Excellent video! Explained to perfection.
Can I connect to a remote VPS server through tails?
Of a motherboard was hacked, could tails stop the hackers seeing info or what’s being done while using tails?
Brilliantly explained! Thank you.
Looks like I have everything I need on the writing assignment my teacher assigned me.
I remember those college days. Good times, kinda miss it tbh.
I see a couple of issues with Tails. If your flashdrive becomes corrupted as some do, you're screwed. There should be an option to have a backup flashdrive just in case one goes belly up. The other issue is if you lose it. In the video it shows a guys putting the flashdrive in the "coin Pocket" of his Levi's. I wouldn't call that very smart as it could come out and get lost.
Then buy a new memory and download Tails again.
What's the issue? You literally lose nothing unless if you kept files in Persistence. I'd rather store these files in an open source secure cloud service or an encrypted email account that tails offer to avoid losing all my work if anything happens to the usb
I think I have run into one of the most intelligent channels on yt! Second video of yours I have watched. I have never tried Tails, got Ubuntu on dual boot, triple boot machines, but Tails appears to be by far, the best Linux os there is as far as privacy and security goes. Why is there not billions of people flocking to this video in search of relief from the tyranny and spying that has taken over? Why are they so unconcerned or unaware? Yes, I am going to create a usb boot drive with Tails. For those who have not booted from usb, it is easy to create usb drive, and a lot easier than you could imagine to set your computer bios to boot from usb. That how to should be on the playlist referenced in the video,.. Go For It!!
For Windows I use a PCIe reborn card, it works like the amnesia feature in tails.
hey can you plz reply me ? i need to ask one question
Excellent guide, best on the internet
Can you do one for pgp and email on tails. This is a brilliant. Thanks
th-cam.com/video/sRmrvrM3y6o/w-d-xo.html
Hey just found and subscribed to your channel. I'm loving the content! You sound remarkably like a journalist on another channel I'm subscribed to. Keep Computing forever! Cheers
Very well explained. Even I understand it. BUT wouldn't a government be suspicious if someones internet traffic is encrypted? Wouldn't that in it self revealing that you're (probably) doing something illegal?
Excelente presentation !
Thank you. Best found so far.
Great video series, very well done. I have questions. Couldn't the security, and safety, of a Tails OS session be compromised if the firmware of the "Tails possessed system" is compromised? I've watched the entire Infosec series and watching again now but just trying to pick apart any possible vulnerabilities. Albeit I'm not a tech guru by any strecth but am more tech savvy than many and just want to find a way to ensure as best as possible that the device I use to run Tails and Tor isn't compromised prior to running any live session. I understand the basic jist of the Tails firewall when using Tor only allows for communications over the Tor network but if some certain malware exists in firmware on the host system before the OS even boots wouldn't that allow certain malwares to then just communciate across the Tor network to "own" a user's live OS session?
he sounds like hes wearing sunglasses and a suit
Harold finch?
@@ankursalunke6349 not quit, he might be the voice tho
can you have programs on tails like an antivirus or vpn or tor that don't get deleted after the computer is shut down.
What an excellent video, very good job thank you, now subscribed.
legendary info subscribed and a LIKE!!! THANK YOU🙏🏽
please add more video .
I Have tails in VM, but i cannot open the tor browser. Please I need help with this.
Please make an introduction to Kali Linux. Appreciate your guides very much.👍
Incredible tutorial!
How secure/private are persistent files?
Do any of your videos cover configuring VPN on TAILS? I had thought that VPN would be pre installed and simply require a config file but apparently not.
it is advised not to use a VPN or Proxy with TOR services :)
Tor service is your best vpn
The best explanation of Tails .... why so few views?
There's some strange info in this like the claim that microsoft is spying with key loggers, i think it's probably not microsoft but a third party rat that has made it's way onto the operating system. Not many people are 'security focused' and some who are have progressed far beyond this and are probably getting into stacking TOR with VPN's, heavy encryption, staying far away from Facebook and Facebook people, preventing wifi triangulation, and making their own customized linux os stack built from the ground up so that they know they're not getting double crossed by tails or some other weak link in their security chain including malware that third parties may try to add in after the fact.
Yeap, Edward Snowden agrees with you.
@Anon no idea
i am at 03:32 when he says "... And a very intuitive interface",
if Tails is not gona let us choose the Desktop of our choice, then its a USELESS OS
You seem to have not understood anything he said, nor do you understand why Tails is used. It's precisely the fact that it's "USELESS" that makes it so valuable because if someone else gets their hands on your drive they won't be able to do anything with it. This is why AMNESIC is in the acronym TAILS.
Highly underated
Maine new video 4 with New operating system? New version?
I've seen other tech channels praise Tails and only list one or two benefits for it, not enough for me to look into the OS. Had I watched this video sooner I would've adopted the OS much sooner.
love it ! so well explained its amazing ! thanks so much ... liked , shared and subscribed ! off to next part ...
Great video. Very informative
What size usb is needed for this?
Awesome video, help it learn
Are there any downsides to running Windows from Virtualbox inside of Tails? I'd disable online connectivity to the virtual machine and only access the internet from Tails. I still depend on a lot on Windows only applications.
9:00 if they gotta do this youre a damn supervillian lmao
Thank you
please do some guide in kleopatra
How to connect to wifi
Great video but I seem to having some problems with connecting to tor browser. It keeps telling me that tor isn't ready and I can't find a WiFi connection. I have a 128g SanDisk USB which iv download tails on but which Wi-Fi adapter is compatible with tail to connect to tor. Please help. Thanks 😊
Tails as well as a lot of Linux distros do not support certain wi-fi adapters. I had to purchase a USB wireless adapter. Edimax n150 nano is a great USB adapter. Cost around 13.00 bucks.
Very good. Recommendation.
you have a great accent! where are you from?
I use Linux (Ubuntu distro) bought a Lenovo laptop and a desktop and wiped windows off of them and installed Linux. I use Thunderbird to send encrypted emails and Signal desktop to communicate securely on my PCs. I LOVE LINUX ! :-)
Tremendous video.
If tails is booted via usb on a machine that has an internal Windows 10 drive in it, can windows or it’s drive log/register any valuable information from when tails was used?
I’m sure I remember someone saying tails should ideally only be used on a computer with no other system drive in it, but why when it only loads to ram and is allegedly completely amnesic?
That's a good question
When you boot from Tails OS via USB Windows OS is not active so it can not register anything
Linknet Infotech Windows has a setting called ‘fast boot’ which I think means windows just goes into a sleep mode, but may still be active in order to boot rapidly?
How to make download in torrent with tails?
Do we need a VPN to use TAILS in case if we are using TOR?
There is no point in using a VPN with Tor. In fact, the VPN would actually remove a layer of privacy in this case.
@@ericweston7353 could you please explain why you believe that a VPN is not recommended? Every other source I have found, regarding TOR usage, recommends using it with a VPN.
@@Curkri The only reason to use a VPN with TOR is if you’re not using TAILS and want to hide the fact that you’re using TOR from your ISP. If you want to hide the fact that you are using Tor from your ISP, then you can select the "More Options" button on the Tails greeting screen and then select the Option "This computer's Internet connection is censored, filter or proxied". However if you are not living under an oppressive regime in which it is illegal or not possible to use Tor normally, it is not recommended to use that options since it only takes away resources from people who really need it.
If anything VPNs make the situation worse since they basically introduce either a permanent entry guard (if the VPN is set up before Tor) or a permanent exit node (if the VPN is accessed through Tor). A lot of people make the mistake of assuming that more hops is just better, and adds another layer of security, but that’s just not true.
Basically by using a VPN you’re compromising your security because you’re still trusting the VPN company with your internet activity.
My usb drive keeps screwing up upon setting up a persistence. It's stuck in a loading loop once I encrypt my storage with my pass rip.
Is the USB drive big enough? I tried first with an "8 gb" drive, but that was not enough, as some storage is lost. I tried later with 16 gb and it works fine
hello guys has anyone managed to run on the macbookpro touchbar (2019)? I can get to the initial blue configuration screen, then it crashes.
i can't run on the new macbook touchbar (T2). does anyone know how to proceed to make it work?
I don't know how to solve this. If anyone knows and can share. not even the tails team knew how to explain
I mean it's meant to be used as a boot disk primarily rather than as an installed OS.
If you are using a USB Flash Drive to boot Tails, then there are only 2 possible reasons that you are unable to boot.
1. Your BIOS hasn't been configured properly, likely you have disabled booting disk images or you have IOS prioritized over USB.
2. You haven't properly mounted the .ISO image file onto your USB Flash Drive; double check that.
I’ve been using live operating systems like a Ubuntu for years, I’ve even been able to use it to track down viruses on my windows computer, or organize the hard drives in ways that I could not from inside windows. I have malware one time as a teenager that would not allow me to delete it due to administrative privileges or something, from the live operating system I was able to delete all of the files and break the virus from being functional. I would say anybody running windows should have a live operating system. They are amazing. Tales is great for security, by using the power of Linux you can do amazing things. Did your windows installation crash into an unbootable state? Use a live CD to recover your data And reformat the hard drive without losing your homework. I’ve actually made money off of that kind of stuff.
just starting using tails. would like to examine my windows os for malware etc. any step by step guides you can recommend?
(i have basic python experience, and very limited command line/linux experience)
Wait, why have I never heard of this “Welcome to the game” esc kind of journalism before?
Hey is it a risk when I use tor on windows and another one at the same use my wifi for internet?
please answer
HACKKER and that’s it ? Anything else I should use on top of tails to stay anonymous?
@@cq33xx58 really good advice thanks a lot! let me ask you this to see what you think
- what if you have a laptop that you bought cash off craiglist ( no direct tie to you) you have windows and use it for your personal things and when you wanna browse the dark web you remove the hard drive and load the usb with tails? is that a problem?
- if you ever used a laptop and gone on the darkweb with your home wifi is that laptop good as done? or moving forward can you implement the steps you mentioned?
Thanks
As a security fanatic, NONE of the systems I am responsible for will boot from a USB drive or anything else but the internal SSD..
And UEFI is password protected.
Hey that's pretty good.
“Journalism”
Strange, my room suddenly started to glow, just as I opened this video. Anyone having the same problem?
I'm there man....
Me too! Me too! I an a jernalist too!
Yeah the ISP can still see that you are using Tails and the o.s does not encrypt your information. it's not safe in my opinion.
What OS would you recommend over Tails for security? And how would my ISP know if I’m using Tails OS?
Unless I’m wrong, it doesn’t know you’re using Tails. It will know that a device is using Tor, but not Tails. It won’t even know which device it is being run from.
@@ericweston7353 good luck
@@darhtmedia2988 On what?
I need tails for iPhone 📱!
iBad is a compromised hardware designed to spy on you and control you.
wish Ross William Ulbricht was using tails
They actually got him by stealing his laptop while he wasn't looking. Either way they would've gotten to him.
wifi isnt working for me for my tails os. what the heck.
This is fucking goooood!
Can someone just tell me how to run fucking torrents on these things? FUCK
I know this voice. This is Dave Cullen
WINDOWS DOES WHAT?!?!
Ewan McGregor knows Tails inside and out, who knew?
I've made a translation to Arabic . you may approve it !
i helped make it
*logins with ‘12345678’ into gmail on Tor and Tails*
The idea that "linux is really difficult to use" is NOT simply a myth. Its just old information. Linux is no longer that difficult to install or use. To call it a myth implies it never was and that is a LIE. And its funny how everyone thinks you're so professional but you make a claim like "windows has a keylogger that sends everything you type to microsoft" but you offer no proof for an absurdly wild claim.
Linux GUI is easy. Linux as a command promt, isnt. Thats why todays linux os is so much better. Also, windows admits they log your keystrokes, voice, inking, and yes, pictures. They can be "turned off" but lets get real here, most operating systems like windows and mac have backdoors implimented for NSA snooping.
So would you get a laptop and only boot it with Linux, downloaded from another computer first, then add on Tails to it? My PC has Windows 10 but don’t really want to make changes to it. Rather just get a new machine.
Yup, you forgot about the Intel Management Engine. All this shit is useless if you don't have an old enough pc
can you explain please ?
@@-muhammadturk7196 now i stumbled upon this video it's late but if you still need any answer let me explain,
Pre-2008 computers do not have Intel management engine or other firmware "security features", Other than that, ibm thinkpad x200 T500 etc. Models also have the privilege to flash the bios where we can remove these features. Now let's see why this is important and necessary for security;
Intel management engine is a closed source program that has been used since 2008 to ensure the "security" of the device by managing computer systems from hardware and lower layers. You may have noticed that I used " here for security purposes. In recent years, Intel has begun to gain more control over these applications and put more software into its processors. This is how they can collect the traffic of the devices, all their movements and fingerprints, which has become quite a serious problem for people who are concerned about their security. You may think that Tails provides security and uses Tor, but I have to clarify. Intel me runs on the hardware of the device, so no matter what operating system we have, it will not be a problem for them. So, can we delete it? Work has been done on this, but it may block me up to a point, it may not work, or it may break the system. obviously older computers become a better option for this, So who cares so much about security? Many people doing illegal business on the Internet need this kind of privacy, But in a way, the guys who actually do things to the point of being watched by Intel me have the ability to do anything to get rid of it, Are you saying you need that much security? Well people who care so much about security can't be here but you see, We are here now on youtube, we probably used e-mail when entering here, We have social media, We can ask such questions to anyone. And nobody cares what we do
But from the other side, no one has to do illegal work to demand privacy and freedom. We are the people, we are the citizens, Our own personal information and what we do should not belong to 3rd parties, Freedom should be the goal of everyone, not a particular audience. Thanks and regards for your question.
F O X