this post was submitted on 07 Dec 2025
40 points (97.6% liked)

Ask Lemmy

35925 readers
1302 users here now

A Fediverse community for open-ended, thought provoking questions


Rules: (interactive)


1) Be nice and; have funDoxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them


2) All posts must end with a '?'This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?


3) No spamPlease do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.


4) NSFW is okay, within reasonJust remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either !asklemmyafterdark@lemmy.world or !asklemmynsfw@lemmynsfw.com. NSFW comments should be restricted to posts tagged [NSFW].


5) This is not a support community.
It is not a place for 'how do I?', type questions. If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email info@lemmy.world. For other questions check our partnered communities list, or use the search function.


6) No US Politics.
Please don't post about current US Politics. If you need to do this, try !politicaldiscussion@lemmy.world or !askusa@discuss.online


Reminder: The terms of service apply here too.

Partnered Communities:

Tech Support

No Stupid Questions

You Should Know

Reddit

Jokes

Ask Ouija


Logo design credit goes to: tubbadu


founded 2 years ago
MODERATORS
top 18 comments
sorted by: hot top controversial new old
[–] yesman@lemmy.world 23 points 1 day ago (1 children)

If you use it correctly, it's just about as private as you can get.

There are limits to keep in mind. The internet itself is an American military technology (as is TOR). So if you're hiding something more delicate than porn history I would get educated.

[–] CanadaPlus@lemmy.sdf.org 1 points 11 hours ago* (last edited 11 hours ago)

Yeah, but it's open source, so so what? When people say this it seems like either cope to justify doing nothing, or some kind of ritual purity thing.

[–] potatopotato@sh.itjust.works 22 points 1 day ago

Depends on your goals and your threat model. Tails is kinda 80% "I think a TLA will kick down my door or take my computer at the border physically" or you want to use untrusted hardware and 20% "I want to avoid online tracking". If you're worried about online tracking only it might not be the place to start out.

[–] sefra1@lemmy.zip 11 points 1 day ago (1 children)

Very anonymous, it routes all traffic though the tor network and blocks all direct connections except for the unsafe browser.

Of course tor cannot protect you from bad opsec, the user installing malware on it or a powerful enough opponent that can analyse both entry and exit nodes (or just owns 0 day exploits). But for most common people it's pretty damn anonymous I would say.

[–] drkt@scribe.disroot.org 2 points 1 day ago (1 children)

can analyse both entry and exit nodes

has this ever been demonstrated in practice?

[–] CanadaPlus@lemmy.sdf.org 1 points 11 hours ago* (last edited 11 hours ago)

IIRC only for a tiny, non-selective subset of users unlucky enough to pick your two bad nodes. Otherwise Tor would basically be dead.

[–] AmericanEconomicThinkTank@lemmy.world 8 points 1 day ago (1 children)

If you use it as non-persistence thumb drive, it's pretty good. There are still ways you can start to fingerprint it's use but in general as long as you do everything right it's solid.

[–] acockworkorange@mander.xyz 1 points 1 day ago (1 children)

Could the same be achieved by running it in a VM?

[–] AmericanEconomicThinkTank@lemmy.world 7 points 1 day ago (1 children)

Yes and no.

It's point is to limit identifiable information for any operations done on the os. Using it within a VM only sets it within a box, any use of the OS to connect to the outside world, or create some file with longer term persistence will finger print you as that main OS is the pass-through between the VM and the outside world.

Giving an example of how I might use it would help:

If I'm speaking with an international activist, early career reporter, or high-risk private sector worker, I have a custom tails that I can flash and offer them to use.

For a private sector worker it has a doc on some basic information on requesting whistle-blower protection from a given government, agency contact points, etc.

For a reporter or activist it might have a doc on how to ensure they have a social safety net for informing others of their movements, basic tools for performing field work if local computers might be being monitored, and of course how to connect to the internet in areas where traffic monitoring is routine.

I can have that information persistent on the drive only useful for reference, while the rest of the OS can be used as intended without being easily fingerprinted as intended, but only if that drive is the ONLY thing that's acting as any form of operation on a computer. If it's on a VM, installed onto an onboard drive, it looses some of it's ability to act as a real tool.

[–] acockworkorange@mander.xyz 1 points 1 day ago (1 children)

So the risk is more about what breadcrumbs I leave on the host OS?

[–] AmericanEconomicThinkTank@lemmy.world 4 points 1 day ago (1 children)

It's more the inverse, the host OS running a VM will fingerprint any information you are sending out.

If your plan is to just run it offline through a VM, then it's unlikely to leave much persistent information.

Tails is meant as a secure non-persistent tool for communication at it's base, and that's what it is best for. I might recommend looking at running a properly containerized environment on your VM for getting similar effects if you're working on software and OS testing, it's how I go. Think rolling vs production environments.

[–] acockworkorange@mander.xyz 2 points 1 day ago

Got it, thanks!

[–] AmidFuror@fedia.io 7 points 1 day ago

I'm not sure how anonymous it is, but it's really handy for seeing the last n lines of a file.

[–] kinther@lemmy.world 3 points 1 day ago

Only if you learn how to use it correctly

[–] CanadaPlus@lemmy.sdf.org 2 points 11 hours ago* (last edited 11 hours ago)

Tor isn't on postquantum encryption yet, which is less than great.

Besides that, about as good as it gets, and at the cost of being less usable.

[–] pastermil@sh.itjust.works 2 points 20 hours ago (1 children)

Follow-up question: is the use case for Tails still relevant? The main premise is that public computers might be bugged, and so you can plug this in and be less worried about it. However, public computers aren't really a thing anymore, and the ones that are left might have secure boot or other BIOS security that might prevent booting from USB.

Also, I am puzzled as to why they picked GNOME, which is a resource hogger. Don't these public computers have little RAM? I'd assume that 4 GB is already generous.

[–] CanadaPlus@lemmy.sdf.org 1 points 11 hours ago* (last edited 11 hours ago) (1 children)

Was XFCE a thing when the project started?

If you don't trust your own hardware or are worried about a session being compromised it also offers some protection - especially if you have a physical read-only switch on your media.

[–] pastermil@sh.itjust.works 1 points 21 minutes ago

Thought XFCE has been a thing for a long time. Even if it wasn't, neither was resource hogging sugar coated unconfigurable GNOME as we know today.