How to Install Tails on a USB Flash Drive in 7 minutes :) PDF documentation: davidbombal.wiki/tailsprivacy Download from here: tails.net/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal TH-cam: th-cam.com/users/davidbombal // MENU // 00:00 - Intro 00:30 - What Is Tails? 02:40 - Tails Installation Tutorial 05:52 - Boot into BIOS 07:22 - Boot into Tails 07:30 - Create Persistant Storage 08:09 - Tor Connection 09:18 - Tails Installed tails tails os tor linux tails linux invisible online hide identity privacy kali linux online privacy internet security online privacy and security online privacy tips online privacy guide internet security tutorial Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
I’ve used Tails for years. Something worth knowing is this: if you’re going to be downloading large files, the system will go to sleep after 5 minutes of inactivity. If it goes to sleep, your download will pause or fail. Make sure you right-click on the desktop, select SETTINGS, POWER, and set screen sleep time to something longer than 5 minutes. I just set my sleep to NEVER. You’ll have to do this every time you boot into Tails because it always boots to default values.
@@alokarpan822you can use your mobile phone wired as a hotspot, e.g android USB tethering. Unfortunately if Tails doesn’t recognize your wifi adapter by default, it’s almost impossible to make it work (install drivers etc). This is the most inconvenient thing in Tails as I think.
How about this ( @wiktorhood8475 11 months ago yet you're still leaking mac adress of your device because wether it's usb or not network card own the same address regardles of OS) ? Is it true?
@@davidbombal the most important is 1) DO NOT resize the browser as that can be tracked from guard to relay to exit node, 2)NEVER use any PII and have completely unrelated accounts that NEVER tie back to you, 3)NEVER use the same phraseology or grammer techniques that you currently use, take the time to develop a separate persona with a different style, 4)if you are doing deep diving, physicality disable the mic and cam
@@mytechnotalentwhat PII means? Do you need an antenna to hide the specifications of your PC like its MAC? or is it possible to hack or just browse quietly without an antenna?
A video on the update process could be helpful for the folks. You have a good way at explaining these things. I sure wish I had a video when I did my 1st update. I was very nervous about messing up my persistent storage.
Did anyone else notice (from the Tails website) that the U.S. Department of State is a sponsor of Tails and has donated more than $100,000? Hmmm...backdoor for the U.S. govt?
after just 10 minutes of nonsense im going to show this this COOL trick! followed by 6 minutes of nonsense so you can't just skip to the end and assume thats where the value is!
yeah i was pretty disappointed when he gave away a CCNP course and it was taught by kevin wallace instead of David himself. i still appreciate the free course but i like david better. KW is fine but it drives me nuts the way he says "switchies"
Note that if the USB had a previous iso file and the first flash fails, you can always reflash again. Probably leftover bits from the previous iso file caused the first error
Downloaded and installed as suggested. My win11 machine eventually gets to the three dots, then nothing then hangs. Not sure if it is my thumbdrive (kingston 64Gb)/ Excellent video David, just having a bad day installing Tails for now. I changed USB slots on the PC, now I will reformat the drive and shoot for another install.
One thing I would like to emphasize here: Just using Tails alone does not make you invincible nor invisible: - Even with TOR, your ISP still can create connection profiles about you (what time did you connect to the internet, and how much traffic did you send and receive) - Tails does not protect against physical key loggers or any other physical surveillance - Tails does not protect against certain attack vectors a malicious websites has to offer (yes, if there is a virus, next time you boot it is gone - probably - but not only will it be present until you reboot, but all information you enter on any website will still be sent to said website and stored there, potentially for everyone to see) Lesson learned: Tails is just one tool in your tool belt to becoming invisible.
@@shinsen26this is a point not often recognized and why you should swap burners and pgp keys often because a Zero day attacking this vector isn’t going to be recognized by almost anyone 🤷🏼♂️
@@butmunchass It does protect from keyloggers , when it's a software keylogger on windows for example. So maybe not a lie , but maybe misheard/misunderstood.
Saw a talk on the HOPE conference from a gentleman named Michael Horowitz. At the time he stated that a Chromebook in guest mode offered anonymity as nothing of the session would be stored at all in the Chromebook. Something that may be worth checking out.
Bro 🤣 That’s I suppose anonymity for that Chromebook’s itself, can’t see history etc.. But online? Not at all, they’ll know your ip address and everything else there is to know 😂😂
According to INFOSEC, some flash drives, especially SanDisk, are incompatible with TAILS. Which flash drive would you recommend; which flash drive do you use? Thhanks for your tutorials and tips!
I remember coming across Tails years ago, always thought, good to have and not because of any nefarious reasons, just nice to know you have privacy. I'm just a bit😊 hesitant I'll stuff it up. Not a lot of tech skills, reminds me of sitting thru junior algebra classes, yuk!!!
🎯 Key Takeaways for quick navigation: 00:00 *🖥️ Introduction to Tails Operating System* - Explanation of Tails OS, recommended by privacy advocates like Edward Snowden and the Electronic Frontier Foundation. - Tails functions as a portable OS on a USB drive, erasing all data upon shutdown, providing ephemeral browsing. - Benefits of Tails include anonymity, avoiding online surveillance, and protection against censorship. 01:25 *🔒 Tails Persistent Storage and Encryption* - Description of Tails' amnesic nature, erasing all activities upon shutdown, with an option for persistent storage. - Use cases for persistent storage, such as storing documents, Wi-Fi passwords, and browser bookmarks. - Importance of encryption for persistent storage, ensuring only authorized users can access the stored data. 03:12 *🛠️ Tails Installation Process* - Requirements for installing Tails, including a USB stick, minimum RAM, and available options for operating systems. - Step-by-step guide on downloading and verifying the Tails image, using tools like Etcher for installation. - Precautions to take, such as backing up data on the USB drive before installation, and configuring BIOS settings for booting from the USB drive. 05:55 *🚀 Final Steps and Conclusion* - Completion of Tails installation and confirmation of successful flashing of the USB drive. - Optional steps after installation, such as creating persistent storage and configuring Tor connections. - Demonstration of Tails' functionality, including browsing with Tor, ensuring privacy and security, and shutting down to erase all traces. Made with HARPA AI
Even though Snowden uses it or did use it Tails has always had a bad reputation among white hats due to the persistent rumors of a back door forced on them by the NSA. I personally believe this to be true and therefore avoid it. A decent VPN and mac address spoofer will provide the same level of anonymity if your just looking for private browsing.
Getting "Tails" loaded onto a flashdrive was easy. Getting the computer to recognize or "mount" it is the issue. Every time I have tried my pc says that the file is corrupt and will not let me open the file to even view it. But I don't have a cookie-cutter pc either. One of my closest friends helped me build this tower. So, all the software and programming is different than most everyone else's. When trying to boot into BIOS I don't get the same windows that you all get. It goes into something completely different. I have tried several times to get "Tails" to work, but it is going to take someone with far more knowledge than what I have to succeed. Not that that is very hard. I don't know a lot, but I am trying to learn.
I am positive that the "programming" and software capabilities of your PC are not very different at all from most other people if you are using store-bought components and running any popular modern OS. you mentioned getting a different BIOS screen - different motherboards have different BIOS, unless you have the same type of motherboard as the computer in the video it is likely and *normal* for your BIOS to look a little different. you just have to navigate the menus to find the same options in the video. if you use Rufus or balenaEtcher to flash your USB drive, it'll have the bootloader installed - if you're dragging and dropping the .iso onto your USB it won't work. once the USB drive is flashed properly, if you find the boot order option in your BIOS and set it to boot from USB before hard drives, it should work. hope this helps!
also for example, I have an ASUS motherboard, but even still, my BIOS screen is different from his - no worries though. generally all the same options are present on most BIOS that I've seen. hopefully you're able to get your PC booting via USB! :)
To add onto what the other person said, sometimes different f keys (or the delete key) do different things on startup for different motherboard manufacturers. Look for something that says "boot menu" or "bios" on startup and hit that key
I have updated recently my tails and I wonder if you could create a video with more details about the usage of it plesae? I love your work keep doing it!
thanks for the explanation it's a really good video but I dont mind ppl checking what Im doing in my lapttop cause I have nothing left to lose anymore 😂
Won't protect you if the pc has a hardware keylogger on it. Also if BIOS is passworded and secure boot enabled then you won't be able to do any of this.
Good and straight to the point! Questions - is the speed of the USB stick relevant, or does everything just load into RAM? Also, perhaps a comparison between TAILS vs Qubes. I understand how TAILS is used - run from USB. Because both Qubes and TAILS "disappear" when shut down and rebooted - effectively new virtual machines - then both should be quite safe. Are they just different ways of doing things, or are there different scenarios when one is superior over another. Thanks!
Not sure about tails, but lots of experience booting other Linux distros from USB.... The flashing speed and boot speed are definitely affected by speed of usb drive, so I usually use a 3.0 USB (what the SS/blue port on PC is designed for). However, once loaded into ram, I don't believe it makes much difference. I'm only about 60% sure of this though, as I don't own any 2.0 USBs. Hope this helps....
The only inconvenience for me is that Tails may not recognize some wifi adapters, both built-in or external ones, which is very usual for linux system, but you cannot install any drivers here, the system always boots in default state. So your option is either using some wired mobile phone or buying some special linux supported wifi adapter, or always looking for a LAN around you. That’s why I would prefer Whonix and VM. But other than that Tails is a real gem, especially in situations where FBI is knocking at your door and you don’t wanna leave any clues, and you just remove your usb flash drive, you swallow it and you’re done)
Amazing content. What would you suggest for a beginner to get the certification training from in the UK for online courses and classroom learning in London, where can I get trained for cybersecurity?
I’m not sure about Tor anymore due to the recognition of a significant amount malicious nodes (e.g. kax17). I do like the ephemeralness of tails though.
Rich content with valuable information. Thank you for your wonderful efforts. I hope you will make a video explaining how hacking SMS messages. Sniffe or forwarded to hacking phone.
Ventoy is truly awesome. Having multiple .iso's and other tools all on one USB that you can boot from is brilliant. I turned one of my professors onto it, and he loved it so much he wants to incorporate it into his curriculum.
What's the difference from using live image of an OS. Such as puppy liunx. It removes everything upon restart, it installs itself to the ram. And you can choose to save your data
Removing the tails usb and going to windows with the same computer with same serial pc components and mac address you can expose your computer signature very easy.. Have to be mentioned the connection too.. Never use the home network and WiFi connection.. Use a dedicated preassembled PC not a laptop, use a new USB key, because the USB memory stick has a serial number.
Any system can be defeated if a keystroke logger is installed without your knowledge. That’s why it’s vital to password protect the primary OS and always log off before leaving.
i Appreciate all the content you provide us David but Tails doesn't works for M1 and M2 mac's, please kindly provide us a solution for this David, that would realy helps people like me !!
Can you perhaps do a video on disk management. Encryption , sanitizing a disk so no data can be recovered. The main one is sanitizing a disk empty space only, say you deleted stuff and now want to clear that space only ,instead of a new installation with software and all that extra trouble
How to Install Tails on a USB Flash Drive in 7 minutes :)
PDF documentation: davidbombal.wiki/tailsprivacy
Download from here: tails.net/
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
TH-cam: th-cam.com/users/davidbombal
// MENU //
00:00 - Intro
00:30 - What Is Tails?
02:40 - Tails Installation Tutorial
05:52 - Boot into BIOS
07:22 - Boot into Tails
07:30 - Create Persistant Storage
08:09 - Tor Connection
09:18 - Tails Installed
tails
tails os
tor
linux
tails linux
invisible online
hide identity
privacy
kali linux
online privacy
internet security
online privacy and security
online privacy tips
online privacy guide
internet security tutorial
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
David why you don't reply to our comment
Kindly please guide me about the 18 courses offered by EC-Counsil "Ultimate red team cyber suite"
The more you know the more you afraid of government
If David talk about it, it means the FEDS made it
Does not hide your isp so this is pointless if you want to go online to upload or download valuable information 🙄
I’ve used Tails for years. Something worth knowing is this: if you’re going to be downloading large files, the system will go to sleep after 5 minutes of inactivity. If it goes to sleep, your download will pause or fail. Make sure you right-click on the desktop, select SETTINGS, POWER, and set screen sleep time to something longer than 5 minutes. I just set my sleep to NEVER. You’ll have to do this every time you boot into Tails because it always boots to default values.
How do I get connect WiFi in tails yk
@@Hdskieiendod Ethernet would be a good option
Can i use mobile hotspot for using tails?
@@alokarpan822you can use your mobile phone wired as a hotspot, e.g android USB tethering. Unfortunately if Tails doesn’t recognize your wifi adapter by default, it’s almost impossible to make it work (install drivers etc). This is the most inconvenient thing in Tails as I think.
@@HdskieiendodYour adapter is not supported. You'll need to install it every time.
Tails extends Tor's anonymity to the ENTIRE system, keeping it encapsulated all along.
duh
@@lucutes2936 duh
How about this (
@wiktorhood8475
11 months ago
yet you're still leaking mac adress of your device because wether it's usb or not network card own the same address regardles of OS) ? Is it true?
@@MohamedBadawiEgyptdoes it really matter when you leave no evidence behind?
@@MohamedBadawiEgypt you can spoof tje MAC adrrss, i even have a custom made one lol 😂
as usb tails owner i am happy that you are helping people upgrade their privacy :D
Thank you! Please share any tips and tricks you have for others to learn from you :)
okay!
idk maybe😁😅
@@davidbombal Have you heard of Whonix and is it any good?
Whonix vs Tails vs both.
yet you're still leaking mac adress of your device because wether it's usb or not network card own the same address regardles of OS
This is so great because it has context and reality. Would love to see more. David, you are awesome !!!
Great video David I have been using this for years! Tails has great features and makes it so simple to be safe and when necessary with persistence.
Thank you! Please share any tips and tricks so others can learn from you :)
@@davidbombal the most important is 1) DO NOT resize the browser as that can be tracked from guard to relay to exit node, 2)NEVER use any PII and have completely unrelated accounts that NEVER tie back to you, 3)NEVER use the same phraseology or grammer techniques that you currently use, take the time to develop a separate persona with a different style, 4)if you are doing deep diving, physicality disable the mic and cam
@@mytechnotalentwhat PII means?
Do you need an antenna to hide the specifications of your PC like its MAC? or is it possible to hack or just browse quietly without an antenna?
@@tigreonice2339 PII is personally identifiable info. Anything is possible but the chances of someone targeting your location is rare.
@@tigreonice2339 PII: Personally Identifiable Information
A video on the update process could be helpful for the folks. You have a good way at explaining these things. I sure wish I had a video when I did my 1st update. I was very nervous about messing up my persistent storage.
Still waiting for this video ..
Still waiting too!!!
Did anyone else notice (from the Tails website) that the U.S. Department of State is a sponsor of Tails and has donated more than $100,000? Hmmm...backdoor for the U.S. govt?
Don't tell this guy who created tor.
The US government is so concerned about its citizens privacy an agency donated money to help it’s citizens remain anonymous online.
This privacy hack is funded by our intelligence agencies…GREAT
I'd like to think they enjoy using it for their own privacy needs and just want to support the project.
So you think they’re advertising the fact that they’re backdooring you? Lmfaoooooooooooooooooooo
Well presented. Short, sweet, no fluff, educational as well as instructional. Oh if only all TH-cam vids could be this efficient.
after just 10 minutes of nonsense im going to show this this COOL trick! followed by 6 minutes of nonsense so you can't just skip to the end and assume thats where the value is!
@@SubieNinja what
I'm glad I switched my career into cybersecurity! So much to learn
Same here. I was a nursing major before; this is a much better fit for me.
If TAILS is that powerful, imagine HEADS!
Nah heads gotta be some offense Privacy system that like actually just malwares your name
Bruhhh 😂
David never disappoint us with his content... glad to advance my knowledge watching your videos.
A formidably helpful video for protecting our hardly respected private informations, thanks a lot !
Always a good content. Thanks, David.
David Bombal always delivering MasterClass ❤
yeah i was pretty disappointed when he gave away a CCNP course and it was taught by kevin wallace instead of David himself. i still appreciate the free course but i like david better. KW is fine but it drives me nuts the way he says "switchies"
Well explained, I suggest people do this when doing online banking etc, but PLEASE keep using CASH, when they take that away it is game over
lol you're commenting on TH-cam ffs
Guys I did the same thing as given instruction on tails website and it worked.
Thank you, your tutorial was very straightforward. I'm downloading Tails now.
Thank you David....i love the detail in your videos.
Great tutorial @David as usual :). Interesting stuff. I had kali as a pendrive with persistence but that might change in the future.
Thanks for making an update to the old video!
Note that if the USB had a previous iso file and the first flash fails, you can always reflash again. Probably leftover bits from the previous iso file caused the first error
Downloaded and installed as suggested. My win11 machine eventually gets to the three dots, then nothing then hangs. Not sure if it is my thumbdrive (kingston 64Gb)/ Excellent video David, just having a bad day installing Tails for now. I changed USB slots on the PC, now I will reformat the drive and shoot for another install.
Did you solve the problem?
One thing I would like to emphasize here:
Just using Tails alone does not make you invincible nor invisible:
- Even with TOR, your ISP still can create connection profiles about you (what time did you connect to the internet, and how much traffic did you send and receive)
- Tails does not protect against physical key loggers or any other physical surveillance
- Tails does not protect against certain attack vectors a malicious websites has to offer (yes, if there is a virus, next time you boot it is gone - probably - but not only will it be present until you reboot, but all information you enter on any website will still be sent to said website and stored there, potentially for everyone to see)
Lesson learned: Tails is just one tool in your tool belt to becoming invisible.
And anyway if your bootloader is hacked, bye bye the privacy, even with tails.
And for god sake turn off Java 🤦♂️
@@shinsen26this is a point not often recognized and why you should swap burners and pgp keys often because a Zero day attacking this vector isn’t going to be recognized by almost anyone 🤷🏼♂️
Yeah I agree. The channel made an error when he said that TAILS prevents keyloggers which you're right it doesn't.
@@butmunchass It does protect from keyloggers , when it's a software keylogger on windows for example. So maybe not a lie , but maybe misheard/misunderstood.
Would have liked to see persistent storage demo'ed a bit more like rebooting and checking that data is still there for example.
What for? It just works
As always great vid for beginners like me, thanks a lot Sir
Saw a talk on the HOPE conference from a gentleman named Michael Horowitz. At the time he stated that a Chromebook in guest mode offered anonymity as nothing of the session would be stored at all in the Chromebook. Something that may be worth checking out.
It’s Google though, maybe not on Chromebook, definitely on their servers. 😅
@@mdaxeYea for real. Stored in their servers for sure.
Bro 🤣
That’s I suppose anonymity for that Chromebook’s itself, can’t see history etc..
But online? Not at all, they’ll know your ip address and everything else there is to know 😂😂
Thanks for presenting that info! The Gov doesn’t need MORE of our personal info…. Nor do the pirates!
Good video for privacy. I'm just starting my Sec + and interested in CTF. Please consider an intro to CTF video.
I waited for that, Thanks
Happy to hear that! I hope you enjoy the video!
Duck Duck is no more "privacy-oriented" in practice than anything else. They market privacy and deliver - Google.
i am always happy when i see you notification 🎉
Happy to hear that!
According to INFOSEC, some flash drives, especially SanDisk, are incompatible with TAILS. Which flash drive would you recommend; which flash drive do you use? Thhanks for your tutorials and tips!
David as usual perfect tutorial .Thanks from Brumie
You are such an inspiration sir. Love from India.🫡
Thank you very much!
Great tutorial David!
😄love how you decided to demonstrate some implications with tails using your "own" channel as a reference, hehehe. Clever man ;-)
Thank you Mr Bombal, the tutorial was so simple n so useful
I remember coming across Tails years ago, always thought, good to have and not because of any nefarious reasons, just nice to know you have privacy. I'm just a bit😊 hesitant I'll stuff it up. Not a lot of tech skills, reminds me of sitting thru junior algebra classes, yuk!!!
David,You are "AWESOME"!!!Not just because your one of the greatest pintesters but because "YOUR SMEGIN ENGLISH"!!! Benny Hill was English.❤❤❤
i was just waiting for you to do a video about tails, and you have kill it. i have being inspire by your videos
Cool bios
Asus has the craziest bios ive ever seen. It looks like a fake hacker movie
🎯 Key Takeaways for quick navigation:
00:00 *🖥️ Introduction to Tails Operating System*
- Explanation of Tails OS, recommended by privacy advocates like Edward Snowden and the Electronic Frontier Foundation.
- Tails functions as a portable OS on a USB drive, erasing all data upon shutdown, providing ephemeral browsing.
- Benefits of Tails include anonymity, avoiding online surveillance, and protection against censorship.
01:25 *🔒 Tails Persistent Storage and Encryption*
- Description of Tails' amnesic nature, erasing all activities upon shutdown, with an option for persistent storage.
- Use cases for persistent storage, such as storing documents, Wi-Fi passwords, and browser bookmarks.
- Importance of encryption for persistent storage, ensuring only authorized users can access the stored data.
03:12 *🛠️ Tails Installation Process*
- Requirements for installing Tails, including a USB stick, minimum RAM, and available options for operating systems.
- Step-by-step guide on downloading and verifying the Tails image, using tools like Etcher for installation.
- Precautions to take, such as backing up data on the USB drive before installation, and configuring BIOS settings for booting from the USB drive.
05:55 *🚀 Final Steps and Conclusion*
- Completion of Tails installation and confirmation of successful flashing of the USB drive.
- Optional steps after installation, such as creating persistent storage and configuring Tor connections.
- Demonstration of Tails' functionality, including browsing with Tor, ensuring privacy and security, and shutting down to erase all traces.
Made with HARPA AI
I'm happy to hear about this. It is essential
Great video.
Is a must to use Etcher, or can one use Rufus instead?
One of the things I was told when using tails is not to use persistent storage or not to use tails as a VM.
My thoughts exactly
@@captainofouterspace Is there a book or something for guiding us to implement this
Great works 🎉🎉🎉 my favorite channel ❤❤❤ by fro Venice 🇮🇹🇮🇹🇮🇹👍🏻
my sweet uncle david greetings from turkey
Thank you sir David ❤ from PH
Nice one David!
Thank you for the PDF's file. 🙂👍
You are welcome!
love this!!! thank you!
Good gob david🎉🎉
My thumbnail guys having fun :)
@@davidbombali really in love with what are you doing because you have more secsussfull than any one 🎉🎉❤❤
Tails is good, I'll grant you that, but it depends upon Tor, which is only as good as the last node (and user actions)
Been a while since I tried tor, but every time I have tried it it was so slow it was frustrating. It's like dial-up, but slower.
Even though Snowden uses it or did use it Tails has always had a bad reputation among white hats due to the persistent rumors of a back door forced on them by the NSA. I personally believe this to be true and therefore avoid it. A decent VPN and mac address spoofer will provide the same level of anonymity if your just looking for private browsing.
Where did you hear this from?
@@yd_kingdom From several colleagues who were in a position to know. The encryption was compromised from day one.
@@yd_kingdom The space aliens.
Thank you sir David.❤
Very useful - thanks :D
Getting "Tails" loaded onto a flashdrive was easy. Getting the computer to recognize or "mount" it is the issue. Every time I have tried my pc says that the file is corrupt and will not let me open the file to even view it. But I don't have a cookie-cutter pc either. One of my closest friends helped me build this tower. So, all the software and programming is different than most everyone else's. When trying to boot into BIOS I don't get the same windows that you all get. It goes into something completely different. I have tried several times to get "Tails" to work, but it is going to take someone with far more knowledge than what I have to succeed. Not that that is very hard. I don't know a lot, but I am trying to learn.
I am positive that the "programming" and software capabilities of your PC are not very different at all from most other people if you are using store-bought components and running any popular modern OS. you mentioned getting a different BIOS screen - different motherboards have different BIOS, unless you have the same type of motherboard as the computer in the video it is likely and *normal* for your BIOS to look a little different. you just have to navigate the menus to find the same options in the video. if you use Rufus or balenaEtcher to flash your USB drive, it'll have the bootloader installed - if you're dragging and dropping the .iso onto your USB it won't work. once the USB drive is flashed properly, if you find the boot order option in your BIOS and set it to boot from USB before hard drives, it should work. hope this helps!
also for example, I have an ASUS motherboard, but even still, my BIOS screen is different from his - no worries though. generally all the same options are present on most BIOS that I've seen. hopefully you're able to get your PC booting via USB! :)
To add onto what the other person said, sometimes different f keys (or the delete key) do different things on startup for different motherboard manufacturers. Look for something that says "boot menu" or "bios" on startup and hit that key
great tutorial! Question: Do you enable SECURE BOOT when you are NOT using TAILS?
I have updated recently my tails and I wonder if you could create a video with more details about the usage of it plesae? I love your work keep doing it!
thanks for the explanation it's a really good video but I dont mind ppl checking what Im doing in my lapttop cause I have nothing left to lose anymore 😂
Thank you .
I have nothing to hide.
But my business is my business.
Won't protect you if the pc has a hardware keylogger on it. Also if BIOS is passworded and secure boot enabled then you won't be able to do any of this.
Like they say, it's not magic. You need more than 100 IQ for opsec
Yea, u typically want to use this on your personal system
I’ll install tails on my usb right now!!
Good and straight to the point! Questions - is the speed of the USB stick relevant, or does everything just load into RAM? Also, perhaps a comparison between TAILS vs Qubes. I understand how TAILS is used - run from USB. Because both Qubes and TAILS "disappear" when shut down and rebooted - effectively new virtual machines - then both should be quite safe. Are they just different ways of doing things, or are there different scenarios when one is superior over another. Thanks!
Not sure about tails, but lots of experience booting other Linux distros from USB.... The flashing speed and boot speed are definitely affected by speed of usb drive, so I usually use a 3.0 USB (what the SS/blue port on PC is designed for). However, once loaded into ram, I don't believe it makes much difference. I'm only about 60% sure of this though, as I don't own any 2.0 USBs. Hope this helps....
Thank u David for this information
The only inconvenience for me is that Tails may not recognize some wifi adapters, both built-in or external ones, which is very usual for linux system, but you cannot install any drivers here, the system always boots in default state. So your option is either using some wired mobile phone or buying some special linux supported wifi adapter, or always looking for a LAN around you. That’s why I would prefer Whonix and VM. But other than that Tails is a real gem, especially in situations where FBI is knocking at your door and you don’t wanna leave any clues, and you just remove your usb flash drive, you swallow it and you’re done)
remove swallow and done? lmao how did i even get here, lol
Thank you so much David
Naomi will love this video
Best Channel !
Except for exit node attacks and RCE.. Firefox exploits aren't uncommon a new bug for one shows up in JS engine every couple weeks
Thank you Bombal
The GOAT 🫡
Hey David ! I’m new entering the tech world as well as cyber security, what are some books that would be beneficial to my learning ?
Amazing content. What would you suggest for a beginner to get the certification training from in the UK for online courses and classroom learning in London, where can I get trained for cybersecurity?
Ah sweet!!
This may be a stupid noob question but... Can I run Tails with Virtualbox (or similar)? Or this is only made for USB?
NVM... I looked it up. Although possible, they don't recommend it (it's on their website)
I’m not sure about Tor anymore due to the recognition of a significant amount malicious nodes (e.g. kax17). I do like the ephemeralness of tails though.
Rich content with valuable information. Thank you for your wonderful efforts. I hope you will make a video explaining how hacking SMS messages. Sniffe or forwarded to hacking phone.
you could probably use ventoy which supports secure boot.
Ventoy is truly awesome. Having multiple .iso's and other tools all on one USB that you can boot from is brilliant. I turned one of my professors onto it, and he loved it so much he wants to incorporate it into his curriculum.
What's the difference from using live image of an OS. Such as puppy liunx. It removes everything upon restart, it installs itself to the ram. And you can choose to save your data
I’ve been watching this project since it’s inception and I use every chance it can 😎
Great video.. thank you
Ive built a linux persistant usb before. Handy.
always appreciated
Removing the tails usb and going to windows with the same computer with same serial pc components and mac address you can expose your computer signature very easy..
Have to be mentioned the connection too.. Never use the home network and WiFi connection.. Use a dedicated preassembled PC not a laptop, use a new USB key, because the USB memory stick has a serial number.
Black Shark, Dizo, and VingaJoy - GoCartopias evaluations have been my guiding mild for tech brand decisions.
My mouth fell open when I saw that ASUS bios.
Thank you, I haven’t heard about it before. I guess, try partitioning flash to have os and storage. Nice necessity
Thank you, sir.
great video
Thank you!
Awesome!
Great video as always, i’ll be waiting for MacOS dual boot with windows 🫡
The applications in tails remains its biggest weakness, persistence is probably an awful idea to have on tails due to the potential for logging
Any system can be defeated if a keystroke logger is installed without your knowledge. That’s why it’s vital to password protect the primary OS and always log off before leaving.
Absolute privacy is a myth.
i Appreciate all the content you provide us David but Tails doesn't works for M1 and M2 mac's, please kindly provide us a solution for this David, that would realy helps people like me !!
Good video.
Can you perhaps do a video on disk management. Encryption , sanitizing a disk so no data can be recovered. The main one is sanitizing a disk empty space only, say you deleted stuff and now want to clear that space only ,instead of a new installation with software and all that extra trouble
Linux dd
Shred
Brilliant!