Subscribe to our newsletter to receive the same news by email:

Archive of all news

Tails 6.13

New features

Detection of problems with Wi-Fi hardware

Problems with Wi-Fi are unfortunately quite common in Tails and Linux in general.

To help troubleshoot hardware compatibility issues with Wi-Fi interfaces, the Tor Connection assistant now reports when no Wi-Fi hardware is detected.

Warning in Tor Connection: No Wi-Fi hardware detected

Changes and updates

  • Update Tor Browser to 14.0.7.

  • Update the Tor client to 0.4.8.14.

Fixed problems

  • Detect partitioning errors also when Tails is started for the first time. (#20797)

    This solves some failures when creating the Persistent Storage on a new Tails USB stick.

  • Fix the Configure and Show Log buttons in the notification when installing additional software fails. (#20781)

    Notification: The installation of your additional software failed

For more details, read our changelog.

Get Tails 6.13

To upgrade your Tails USB stick and keep your Persistent Storage

  • Automatic upgrades are available from Tails 6.0 or later to 6.13.

  • If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

To install Tails 6.13 on a new USB stick

Follow our installation instructions:

The Persistent Storage on the USB stick will be lost if you install instead of upgrading.

To download only

If you don't need installation or upgrade instructions, you can download Tails 6.13 directly:

Replacing balenaEtcher with Rufus as installer for Windows

We replaced balenaEtcher with Rufus in our installation instructions for Windows to solve privacy concerns with balenaEtcher.

Since January 2019, we had been recommending balenaEtcher to install Tails from Windows and macOS. We loved the simplicity of balenaEtcher, which was really easier to use and worked on macOS as well.

Shortly after, balenaEtcher started displaying ads. Although we didn't like that, we initially didn't view it as a significant privacy risk and had no better alternative at the time.

However, in 2024, the situation changed: balenaEtcher started sharing the file name of the image and the model of the USB stick with the Balena company and possibly with third parties. While we have not experienced or heard of any attacks against Tails users stemming from this change, we believe it introduces potential for abuse. To eliminate that risk altogether, we started looking again for alternatives.

After evaluating 7 other tools, we finally chose Rufus. We had tested Rufus many years ago, even before recommending balenaEtcher, but it was much harder to use and modified the Tails image in ways that were risky.

Congratulations to Akeo Consulting, the company behind Rufus, for really improving the usability and reliability of their tool!

We have not yet replaced balenaEtcher in our installation instructions for macOS because Rufus doesn't work on macOS. Also, as Tails doesn't work on Apple M1 and M2 processors, people who install Tails from macOS represent less than 10% of installations nowadays.

Still, we recommend 2 alternatives for macOS: installing Tails using dd on the command line or using Raspberry Pi Imager.

Migliorare Tails per chi difende i diritti umani in America Latina

[[!meta Error: cannot parse date/time: Mar, 06 giu 2023 14:00:00 +0000]]

Between 2021 and 2023 Tails, Tor, and the Guardian Project partnered to organize training and usability tests in Ecuador, Mexico, and Brazil. Our goals were to:

  • Promote our digital security tools and train human rights defenders in the Global South.

  • Learn from their experiences and needs to help us prioritize future work.

  • Improve the usability of our tools based on their feedback.

Usability tests and improvements

We conducted 4 rounds of in-person moderated usability tests in Mexico, Brazil, and Ecuador to identify usability issues in the features of Tails that are most important to new users:

  • Installation

  • Tor Connection

  • Persistent Storage

The DesignOps tools that we used to organize these usability tests are all publicly available on our website.

The detailed methodology for each of the usability tests is explained in the corresponding GitLab issues, linked below.

Installazione

In December 2021 in Mexico, we learned that the tools for new users to install Tails worked well, but several people got lost while navigating the instructions on the website.

Based on these findings, we restructured our installation pages and fixed 30 usability issues on the website.

We tested these improvements in August 2022 in Brazil and confirmed that the new installation pages were much easier to follow. Only 1 out of 4 participants had trouble installing Tails on their own. All participants could start Tails and connect to the Tor network easily.

Details:

Tor Connection

In July 2021, we released the Tor Connection assistant to completely redesign how to connect Tails to the Tor network. The new assistant is most useful to people who are at high risk of physical surveillance, under heavy network censorship, or on a poor Internet connection.

In August 2022 in Brazil, we tested the usability of Tor Connection when accessing the Tor network is blocked by censorship or by a captive portal.

Despite the many usability issues that we fixed since the first release of Tor Connection, 3 test participants out of 4 failed to connect when access to the Tor network was blocked.

Since then we fixed 14 usability issues affecting Tor Connection: to understand better why connecting to Tor fails, to make it easier to configure a Tor bridge, and to make it easier to sign in to a network using a captive portal.

Archivio Persistente

In March 2023 in Ecuador, we tested the usability of the new Persistent Storage, which was released in Tails in December 2022.

We didn't find any serious usability issues in the new Persistent Storage. The fact that people don't have to restart to create and enable the Persistent Storage and that their data (eg. Wi-Fi password) is stored on creation were huge improvements compared to the old Persistent Storage.

Trainings

Through our combined efforts we reached 47 organizations and trained 433 human rights defenders on our family of tools based on the Tor network. For Tails only, we conducted 8 workshops and trained 84 people on using Tails: journalists, activists, feminists, lawyers, and human rights defenders.

The material used for these Tails workshops is available on our website in English, Spanish, and Portuguese.

Assistants to the workshops were able to start Tails on all their PC computers but had more frequent issues with Mac computers.

From what is already possible to do with Tails, people were most interested in using Tails to:

  • Handle sensitive data, for example, medical data of abortion patients, sensitive documents from political trials, or field studies from human rights violations. That said, not all journalists thought that they were manipulating data that was sensitive enough to require a tool like Tails. Sometimes it was hard to draw the line on when to use Tails and when not.

  • Investigate sensitive topics online, either for journalistic purposes, medical purposes, or when making safe travel plans.

  • Have a secure OS when using other people's computer, either when traveling or when people don't have the means to have their own computer.

From what is not possible yet to do with Tails, people were most interested in:

  • Doing online meetings and using mobile messaging apps like Signal and Telegram from Tails.

  • Using a VPN instead of Tor for speed and access to more websites.

We included both of these objectives in our 3-year product strategy. You can track our progress in the GitLab issues related to #19472.

Tails 6.12

Important security fixes

The vulnerabilities described below were identified during an external security audit by Radically Open Security and disclosed responsibly to our team. We are not aware of these attacks being used against Tails users until now.

These vulnerabilities can only be exploited by a powerful attacker who has already exploited another vulnerability to take control of an application in Tails.

  • Prevent an attacker from monitoring Tor circuits. (#20733 and #20744)

    In Tails 6.11 or earlier, an attacker who has already taken control of an application in Tails could then exploit vulnerabilities in Onion Circuits and our Tor Browser wrapper that might lead to deanonymization.

  • Prevent an attacker from changing the Persistent Storage settings. (#20745)

Changes and updates

  • Add a button to check for upgrades from the About Tails utility.

  • Add the keyboard shortcut Ctrl+Alt+T to open a Terminal.

  • Update Tor Browser to 14.0.5.

  • Update Thunderbird to 128.6.0esr.

Fixed problems

  • Ensure all our Python code keeps running in isolated mode. (#20719)

  • Simplify the troubleshooting instructions when an automatic upgrade fails. (#20466)

  • Avoid freezing the Welcome Screen while activating the Persistent Storage. (#20635)

  • Made time synchronization more reliable when restarting Tor. (#20530)

  • Display an error message when upgrading the encryption of the Persistent Storage to LUKS2 fails. (#20634)

For more details, read our changelog.

Known issues

  • When installing additional software from your Persistent Storage fails, the Configure and Show Log buttons in the notification don't work.

    Notification: The installation of your additional software failed

    • To configure your additional software, choose Applications ▸ Persistent Storage and click on the button of the Additional Software feature.

    • To show the log, execute the following command in a Terminal.

      cat /run/live-additional-software/log

Get Tails 6.12

To upgrade your Tails USB stick and keep your Persistent Storage

  • Automatic upgrades are available from Tails 6.0 or later to 6.12.

  • If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

To install Tails 6.12 on a new USB stick

Follow our installation instructions:

The Persistent Storage on the USB stick will be lost if you install instead of upgrading.

To download only

If you don't need installation or upgrade instructions, you can download Tails 6.12 directly:

Tails 6.11

Critical security fixes

The vulnerabilities described below were identified during an external security audit by Radically Open Security and disclosed responsibly to our team. We are not aware of these attacks being used against Tails users until now.

These vulnerabilities can only be exploited by a powerful attacker who has already exploited another vulnerability to take control of an application in Tails.

If you want to be extra careful and used Tails a lot since January 9 without upgrading, we recommend that you do a manual upgrade instead of an automatic upgrade.

  • Prevent an attacker from installing malicious software permanently. (#20701)

    In Tails 6.10 or earlier, an attacker who has already taken control of an application in Tails could then exploit a vulnerability in Tails Upgrader to install a malicious upgrade and permanently take control of your Tails.

    Doing a manual upgrade would erase such malicious software.

  • Prevent an attacker from monitoring online activity. (#20709 and #20702)

    In Tails 6.10 or earlier, an attacker who has already taken control of an application in Tails could then exploit vulnerabilities in other applications that might lead to deanonymization or the monitoring of browsing activity:

    • In Onion Circuits, to get information about Tor circuits and close them.
    • In Unsafe Browser, to connect to the Internet without going through Tor.
    • In Tor Browser, to monitor your browsing activity.
    • In Tor Connection, to reconfigure or block your connection to the Tor network.
  • Prevent an attacker from changing the Persistent Storage settings. (#20710)

New features

Detection of partitioning errors

Sometimes, the partitions on a Tails USB stick get corrupted. This creates errors with the Persistent Storage or during upgrades. Partitions can get corrupted because of broken or counterfeit hardware, software errors, or physically removing the USB stick while Tails is running.

Tails now warns about such partitioning errors earlier. For example, if partitioning errors are detected when there is no Persistent Storage, Tails recommends that you reinstall or use a new USB stick.

Warning in the Welcome Screen: Errors were detected in the partitioning of your Tails USB stick.

Changes and updates

  • Update Tor Browser to 14.0.4.

  • Update Thunderbird to 128.5.0esr.

  • Remove support for hardware wallets in Electrum. Trezor wallets stopped working in Debian 12 (Bookworm), and so in Tails 6.0 or later.

  • Disable GNOME Text Editor from reopening on the last file. (#20704)

  • Add a link to the Tor Connection assistant from the menu of the Tor status icon on the desktop.

  • Make it easier for our team to find useful information in WhisperBack reports.

For more details, read our changelog.

Get Tails 6.11

To upgrade your Tails USB stick and keep your Persistent Storage

  • Automatic upgrades are available from Tails 6.0 or later to 6.11.

  • If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

To install Tails 6.11 on a new USB stick

Follow our installation instructions:

The Persistent Storage on the USB stick will be lost if you install instead of upgrading.

To download only

If you don't need installation or upgrade instructions, you can download Tails 6.11 directly:

Tails 6.10

Changes and updates

  • Update Tor Browser to 14.0.3.

  • Update Thunderbird from 115.16.0 to 128.4.3.

Fixed problems

  • Fix support for Trezor hardware wallets in Electrum. (#20138)

  • Fix an issue that prevented the Tails desktop to open with fewer memory. (#20631)

  • Disable saving telemetry data in Thunderbird. (#20661)

For more details, read our changelog.

Get Tails 6.10

To upgrade your Tails USB stick and keep your Persistent Storage

  • Automatic upgrades are available from Tails 6.0 or later to 6.10.

  • If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

To install Tails 6.10 on a new USB stick

Follow our installation instructions:

The Persistent Storage on the USB stick will be lost if you install instead of upgrading.

To download only

If you don't need installation or upgrade instructions, you can download Tails 6.10 directly:

Shape Tails' future today!

📢 It’s that time of year again when we emerge from our encrypted shells to ask for your support!

2024 has been a life-changing year for Tails. We’ve continued doing what we do best -- developing Tails as an accessible shield for privacy, anonymity, and anti-censorship. And you may have heard: we merged operations with the Tor Project.

✊ This transition couldn’t have come at a more critical time for online and offline freedoms. Civil society is contracting, liberatory struggles are being silenced, and investigative journalists are being surveilled through increasingly sophisticated tools. In this landscape, our merger with the Tor Project isn’t just about operational efficiencies. By joining forces, we are strategically strengthening the infrastructure necessary for responding to these evolving challenges.

\

How you can help

  • Make a donation: Donate through any of the channels listed on our website.

  • Double your impact: Many corporations match employees’ donations to charitable organisations. Ask your employer if they do, and if they don't -- ask why! Search for our fiscal host, Riseup Labs, and specify Tails in your donation.

  • Spread the word: Share this fundraiser with your network! We are on X.

While we’ve joined the Tor Project, all contributions during this campaign will be used for Tails-related activities.

Together, we can ensure that everyone -- regardless of their circumstances -- has access to the tech they need to stay safe, secure, and free.

Donate

Tails 6.9

Changes and updates

  • Update Tor Browser to 14.0.1.

  • Update the Tor client to 0.4.8.13.

  • Update Thunderbird to 115.16.0.

Fixed problems

  • Fix automatic upgrades aborting with the error message "The upgrade could not be downloaded" even after a successful download. (#20593)

For more details, read our changelog.

Get Tails 6.9

To upgrade your Tails USB stick and keep your Persistent Storage

  • Automatic upgrades are available from Tails 6.0 or later to 6.9.

  • If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

To install Tails 6.9 on a new USB stick

Follow our installation instructions:

The Persistent Storage on the USB stick will be lost if you install instead of upgrading.

To download only

If you don't need installation or upgrade instructions, you can download Tails 6.9 directly:

Tails 6.8.1

This release is an emergency release to fix a critical security vulnerability in Tor Browser.

Changes and updates

  • Update Tor Browser to 13.5.7, which fixes MFSA 2024-51, a major use-after-free vulnerability. Using this vulnerability, an attacker could take control of Tor Browser, but probably not deanonymize you in Tails.

    Mozilla is aware of this attack being used in the wild.

Fixed problems

For more details, read our changelog.

Get Tails 6.8.1

To upgrade your Tails USB stick and keep your Persistent Storage

  • Automatic upgrades are available from Tails 6.0 or later to 6.8.1.

  • If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

To install Tails 6.8.1 on a new USB stick

Follow our installation instructions:

The Persistent Storage on the USB stick will be lost if you install instead of upgrading.

To download only

If you don't need installation or upgrade instructions, you can download Tails 6.8.1 directly:

Tails 6.8

New features

File system repair when unlocking the Persistent Storage

When the file system of the Persistent Storage has errors, Tails now offers you to repair the file system when unlocking from the Welcome Screen.

Because not all file system errors can be safely recovered this way, we wrote comprehensive documentation on how to recover data from the Persistent Storage using complementary techniques.

Changes and updates

  • Update Tor Browser to 13.5.6.

  • Improve the notification when a network interface is disabled because MAC address anonymization failed.

    Wi-Fi Disabled. MAC address anonymization failed for your Wi-Fi interface, so it is temporarily disabled. You might prefer to restart Tails and disable MAC address anonymization. Learn about MAC address anonymization.

Fixed problems

  • Increase the maximum waiting time to 8 minutes when unlocking the Persistent Storage before returning an error. (#20475)

  • Hide shown password while unlocking Persistent Storage. (#20498)

  • Better handle failures in when sending WhisperBack error messages:

    • Fix input fields when Tails is not connected to Tor. (#19731)
    • Fix accessibility of input fields with screen reader. (#19903)

For more details, read our changelog.

Get Tails 6.8

To upgrade your Tails USB stick and keep your Persistent Storage

  • Automatic upgrades are available from Tails 6.0 or later to 6.8.

  • If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

To install Tails 6.8 on a new USB stick

Follow our installation instructions:

The Persistent Storage on the USB stick will be lost if you install instead of upgrading.

To download only

If you don't need installation or upgrade instructions, you can download Tails 6.8 directly: