[[!meta Error: stylesheet not found]]
The Unsafe Browser is not anonymous.
The Unsafe Browser does not use Tor. The websites that you visit can see your real IP address.
This is why we recommend that you:
- Only use the Unsafe Browser to sign in to a network using a captive portal or browse trusted web pages on the local network.
- Close the Unsafe Browser after signing in to the network, to avoid using it by mistake.
The Unsafe Browser can be used to deanonymize you.
An attacker could exploit a security vulnerability in another application in Tails to start an invisible Unsafe Browser and reveal your IP address, even if you are not using the Unsafe Browser.
For example, an attacker could exploit a security vulnerability in Thunderbird by sending you a phishing email that could start an invisible Unsafe Browser and reveal them your IP address.
Such an attack is very unlikely but could be performed by a strong attacker, such as a government or a hacking firm.
This is why we recommend that you:
- Only enable the Unsafe Browser if you need to sign to a network using a captive portal.
- Always upgrade to the latest version of Tails to fix known vulnerabilities as soon as possible.
We have plans to fix the root cause of this problem but it requires important engineering work.
Signing in to a network using a captive portal
Many publicly accessible Internet connections (usually available through a wireless network connection) require users to sign in to the network using a captive portal in order to access the Internet.
A captive portal is a web page that is displayed to the user before the user can access the Internet. Captive portals usually require the user to log in to the network or enter information such as an email address. Captive portals are commonly encountered at Internet cafés, libraries, airports, hotels, and universities.
This is an example of a captive portal (by AlexEng):
Tor cannot start when the Internet connection is initially blocked by a captive portal. That is why Tails includes an Unsafe Browser to sign in to a network using a captive portal before starting Tor.
To sign in to a network using a captive portal:
Try visiting any website using the Unsafe Browser.
Choose a website that is common in your location, for example a search engine or news site.
You should be redirected to the captive portal instead of the website.
After you signed in to the network, Tor should start.
After Tor is ready, close the Unsafe Browser.
You can use Tor Browser and any other application as usual.