Total online anonymity is impossible, but if used correctly, the or network, or dark net, comes pretty close. This is the thinking T behind Tails (The Amnesic Incognito Live System), a Debian-based security-focused Linux distro. Since 2009, the good people of the Tails Project have hitched their star to Tor’s wagon by making sure that whenever you use the OS, all internet connections are routed through the dark net.
If you’re new to the dark net and want to familiarise yourself with how Tor is configured to conceal your identity, it’s now time to stop. Head on over to www. torproject.org and return here when you’re done.
If, on the other hand, you’re happy the dark net can provide the online safety you need, you can do far worse than use Tails. Instead of offering a standalone browser, you have an entire OS geared towards keeping you safe online. Connections outside Tor are blocked (with one exception, as you’ll learn) and the system can be run in amnesiac mode. In other words, it can load into your device’s RAM, then erase critical data on shutdown. This makes it almost impossible to recover your data using current digital forensics.
Tails also supports a persistent mode, whereby you can create an encrypted partition on a USB stick to store vital settings, like browser bookmarks and Wi-Fi passwords. In this guide, you’ll learn how to set up and configure this, as well as the pros and cons of doing so.
What about the Tor Browser?
First, let’s address the elephant in the room. The Tor Project does indeed offer the which by