[[!pagetemplate template="topbar.tmpl"]] [[!meta title="Home"]] [[!meta stylesheet="bootstrap.min" rel="stylesheet" title=""]] [[!meta stylesheet="staging/home" rel="stylesheet" title=""]] [[!meta robots="noindex"]]
Tails uses the Tor network to protect your privacy online and help you avoid censorship. Enjoy the Internet like it should be.
Shut down the computer and start on your Tails USB stick instead of starting on Windows, macOS, or Linux. Tails leaves no trace on the computer when shut down.
Tails includes a selection of applications to work on sensitive documents and communicate securely. Everything in Tails is ready-to-use and has safe defaults.
You can download Tails for free and independent security researchers can verify our work. Tails is based on Debian GNU/Linux.
[[!img riou-small.jpg link="no" alt=""]]
Activists use Tails to hide their identities, avoid censorship, and communicate securely.
[[!img cris-small.jpg link="no" alt=""]]
Journalists
and their sources use Tails to publish sensitive information
and access the Internet from unsafe places.
[[!img kim-small.jpg link="no" alt=""]]
Domestic violence survivors use Tails to escape surveillance at home.
[[!img you-small.jpg link="no" alt=""]]
You whenever you need extra privacy in this digital world.
[[!img snowden.png size="200x200" link="no" alt="Edward Snowden"]]
If you look at the way post-2013 whistleblowers have been caught, it is clear the absolute most important thing you can do to maintain your anonymity is reduce the number of places in your operational activity where you can make mistakes. Tor and Tails still do precisely that.
— Edward Snowden
One of the most robust ways of using the Tor network is through a dedicated operating system that enforces strong privacy- and security-protective defaults. That operating system is Tails.
— Electronic Frontier Foundation
[[!img tor.png size="200x" link="no" alt="Tor"]]
[[!img riseup.png size="200x" link="no" alt="Riseup"]]
[[!img accessnow.png size="200x" link="no" alt="AccessNow"]]