Tails usb download
Hi, first time download tails. I dont have option to download it just for USB. Help?
Hi, first time download tails. I dont have option to download it just for USB. Help?
Dark web vendor help
Is there a new update? I’m getting asked to upgrade to 7.8
Any info helps
All info is from the Tails Gitlab. None of this has been officially announced by the Tails team as of yet.
--
The Tails team is working on Project 202, which will allow installation of Flatpak apps in Tails^((1)). They're currently curating a list of apps to harden and confirm proper functionality for, currently including Signal, Telegram, Proton Mail, and various others^((2)). These apps would be able to save data in Persistent Storage^((3)), and we can hopefully soon™ expect an experimental release with this enabled for testing purposes^((4)) ^(&) ^((5)).
--
1. Implement support for Flatpak apps installation over Tor in Tails (P202 1.1)
2. Build a list of most relevant Flatpak apps based on previously completed user research (P202 1.2)
3. Allow users to save their Flatpak apps and data in Persistent Storage (P202 4.1)
4. Release public alpha of Tails with Flatpak and Signal support, along with a call for community testing (P202 6.2) ^([this has been partially contradicted by P202 6.9])
5. Publish an official release of Tails with Flatpak and Signal support (P202 6.9)
My old dell laptop is too slow nowadays for tails and other os daily usage, I want to buy a new one, does samsung galaxy book 2 work well with tails? As it has an i5 or i3 12th gen, or should I go with older specs to work with tails?
Found this problem on my device with Linux mint, strange because I’m doing full disk encryption so perhaps this is a post for Linux mint
I have been booting up Tails on this USB drive for months with no issues, but today I am getting stuck on a screen that says “GNU GRUB version 2.12-9+deb13u1 Minimal BASH-like line”. Is there any way to fix this and keep the persistent storage or do I need to reinstall Tails?
A week or so ago I saw the warning about having to update my secure boot keys or Tails wouldn't boot in the future. Since secure boot has never been enabled on my system, and will never be enabled on my system, I ignored it. Now, when I try to boot from my Tails stick, it prints a message about some boot file not being found and the system powers down. Why is this happening, and what do I do to fix it? I tried a fresh flash of Tails from the latest download and it does the same thing. Surely it shouldn't be configuring itself as if secure boot is enabled when it isn't.
The contacts in the USB are flipped to the uninsulated side??
I have attempted to download telegram in which it has succeeded. However, I have been running into several frustrating issues where ChatGPT and Ai is not properly explaining how to configure it. So, my question is this.
How do you install telegram on tailsOS and permanently store account/session data on your persistent storage where it can be stored permanently and immediately recognized upon boot. I want my account token to be immediately registered upon booting tailsOS as I hate the idea of me logging into my telegram account every single time I have to boot up tailsOS. So, how exactly do I save my session/account data so upon next boot, TailsOS will remember my telegram account.
I want Tails to remember my telegram account session. That’s all I want. And every tutorial and AI dictation is inaccurate and often fills in answers that don’t suffice to what I’m actually asking. If anyone can help me, I’d be much appreciated. I may ask further questions soon. Thanks
Hey r/penetrationtesting,
I’ve been building TOSS (Tails On Steroids Script) and I want real feedback from people who know what they’re doing.
The Problem:
Tails OS is great for opsec — forced Tor routing, amnesic sessions, MAC spoofing, no disk writes. But it ships with zero offensive tools. Your options were always:
• Use Kali/Parrot and leave a forensic footprint
• Reinstall everything manually every session
• Just not use Tails for offensive work
None of those work well.
What TOSS Does:
One script. Fresh Tails session. 50+ offensive tools installed into RAM across 6 categories:
• Recon – OSINT, DNS enum, web/network recon, social media intel
• Vuln Scanning – Nikto, Nuclei, OpenVAS, ZAP, WPScan
• Exploitation & C2 – Metasploit, Sliver, Merlin, BeEF, SQLMap
• Web Attacks – ffuf, feroxbuster, XSStrike, Dalfox, Hydra
• Network Attacks – Bettercap, Responder, mitmproxy, Ettercap
• Post Exploitation – Impacket, CrackMapExec, LinPEAS, Chisel, pypykatz
Pick what you need through an interactive menu, or hit A to install everything. When you reboot — tools, creds, captures — all gone. No trace.
Why I’m Posting:
I need people to actually run it and tell me:
• What breaks on real Tails sessions
• Tools I’m missing
• Bugs — install failures, broken paths, menu issues
• Whether my opsec assumptions about Tails are correct
• Contributions for unfinished categories (wireless, RE, forensics, password cracking, cloud, mobile)
One Heads Up:
Everything routes through Tor. Installs will be 2–5x slower. That’s intentional — anonymity is the whole point.
For authorized engagements, CTFs, and legal research only.
GitHub: https://github.com/TheShellSanta/TOSS
Ask me anything about design decisions or tool choices. Roast it if something’s wrong — that’s exactly what I need.
Boot. Hack. Reboot. Vanish.
I am on a very old version & need to update my Tails OS USB to the latest version manually. I do have my Tails USB along with an extra one.
How do I do this without losing my persistent storage, bookmarks, etc?
Edit: I am now stuck with the new Tails version downloaded into my Tor Browser folder in Tails, and will not verify by any means.
“Verification failed”
No matter how many times I try re-downloading
I was thinking of using cake wallet to buy it on my phone then send it to my feather wallet but i’m not sure if that follows proper OPSEC.