Privacy & Security

Tails OS and Amnesic Computing: How to Leave No Trace

May 12, 2026 8 min read Haven Team

Tails OS boots from a USB stick, routes all traffic through Tor, and forgets every session the moment you power off. For journalists, activists, and anyone operating in an environment where their device could be seized, this model of computation changes what an adversary can learn from your hardware.


Most operating systems accumulate evidence of what you've done. Browser history, recently opened files, swap partitions, shell history, temporary files from applications — it builds up over months and years, largely invisibly. A seized laptop running Windows or macOS is a treasure chest for forensic investigators even if the disk is not encrypted.

Amnesic computing inverts this assumption. The working principle: the operating system lives entirely on a read-only medium, runs in RAM during the session, and leaves nothing writable on the host machine. When you shut it down, the session is gone. The host laptop's internal drive is never touched.

Tails (The Amnesic Incognito Live System) is the most mature implementation of this model. It's a Debian-based Linux distribution maintained by a small team of security-focused developers and used by journalists, lawyers, dissidents, and security researchers worldwide. The Tor Project, Freedom of the Press Foundation, and the Electronic Frontier Foundation have all recommended it for high-risk users.

How Tails Actually Works

You write Tails to a USB drive — typically 8 GB or larger. When you boot from that drive on any x86 machine, Tails loads entirely into RAM. The host machine's internal storage is never mounted. Network traffic is forced through the Tor anonymity network by design; there is no configuration option that routes traffic directly to the internet. Applications that try to connect outside of Tor are blocked at the firewall level.

The desktop environment is GNOME, running on top of a stripped-down Debian base. Tails ships with a curated set of privacy tools: the Tor Browser, Thunderbird with Enigmail for encrypted email, KeePassXC for password management, OnionShare for anonymous file transfer, and a suite of document sanitization tools. The selection is intentional — every included application has been evaluated for how it behaves in the Tails environment.

What "Amnesic" Means

By default, Tails writes nothing to the host machine's disk and keeps no state between sessions. Every boot is a clean slate. The MAC address of your network card is randomized on each boot. Tails does not create swap space on the host disk. On shutdown, it attempts to overwrite RAM to prevent cold-boot recovery of session data.

Persistent Storage: The Opt-In Exception

The pure amnesic model is not always practical. You may need to carry your PGP private key, Thunderbird account configuration, or a password database across sessions. Tails solves this with an optional encrypted persistent volume — a LUKS-encrypted partition on the same USB stick, unlocked at boot with a passphrase you set.

Critically, persistent storage is opt-in and compartmentalized. You choose exactly which data persists: application settings, specific files, browser bookmarks. The kernel, system libraries, and application binaries are never stored in the persistent volume — those always come from the read-only portion of the Tails image. This limits the blast radius of any compromise to the data you explicitly chose to retain.

The persistent volume uses LUKS2 encryption with AES-256 in XTS mode. The passphrase is the only protection for this data; Tails does not use TPM or any hardware key. This means the passphrase choice matters significantly — a weak passphrase on a seized Tails USB is crackable.

Tails vs Whonix: Different Threat Models

Tails is not the only privacy-focused live operating system. Whonix takes a different architectural approach worth understanding.

Property Tails Whonix
Deployment model Bootable USB, bare metal Two VMs (Gateway + Workstation), runs inside a host OS
Amnesic by default Yes No — state persists in VM images
Network isolation All traffic via Tor (firewall enforced) All traffic via Tor (routed through Gateway VM)
Host OS isolation Complete — host disk untouched Partial — VM files live on the host disk
Primary use case Portable, amnesic sessions on untrusted hardware Persistent secure workstation on a trusted machine

If your threat is physical seizure of a device you carry, Tails is the stronger choice — there's nothing to seize on the host machine. If your threat is network surveillance and you want a persistent working environment with strong network isolation, Whonix's VM architecture offers more flexibility.

What Tails Cannot Protect Against

Tails is a powerful tool with real limits. Understanding those limits matters more than the tool itself.

BIOS and firmware persistence. Tails runs above the firmware layer. Sophisticated adversaries with physical access to a machine can implant malicious firmware (BIOS, UEFI, network card firmware) that survives OS changes. The NSA's ANT catalog, documented by Der Spiegel in 2013, included tools specifically designed to persist below the OS level. Against this threat class, no software-only solution is complete.

Your behavior at the keyboard. Tails cannot protect against what you type into it. Credentials you enter, files you download, communications you initiate — all of these can be surveilled at the other end of the connection (your email provider, the website you're visiting). Tor protects your network location, not the content of your communications.

Hardware keyloggers. A USB or inline hardware keylogger records everything typed before Tails ever sees it. Physical access to the machine before your session is a real attack vector in high-risk environments.

The USB drive itself is evidence. Tails on a USB stick is itself identifiable as a privacy tool. In some jurisdictions, possession of Tails has been cited in legal proceedings as evidence of intent to conceal. Operational security around where you keep the drive and who knows you use it is part of the threat model.

Security tools shift the attack. They don't eliminate it. Tails raises the cost of passive surveillance dramatically. It does not prevent targeted, physical, or legal attacks against a known individual. — A useful framing from the Tails documentation

Who Should Use Tails

Tails is appropriate for users whose threat model includes device seizure or forensic examination. This includes:

For most users, the operational overhead of Tails — booting from USB, losing session state, working within Tor's network constraints — is not justified by their actual threat model. If you're primarily concerned about corporate data collection or ad tracking, a privacy-respecting browser and a good password manager are proportionate tools. Tails is for people who need to account for the possibility that their hardware will be examined.

Getting Started Without Making Mistakes

The Tails documentation is unusually good. The installation instructions walk through creating a verified USB image, the common pitfalls of UEFI secure boot, and how to configure persistent storage safely. A few additional operational notes:

Tails is not a magic shield. It's a well-engineered tool that solves a specific set of problems — primarily, leaving minimal forensic evidence on the hardware you use. For users with that specific threat, it's one of the most mature privacy tools available.

For secure communications in Tails sessions, encrypted messaging tools like end-to-end encrypted apps provide the content protection that Tor's network routing does not. The two layers are complementary: Tor hides who you're talking to from your ISP and network observers; end-to-end encryption hides what you're saying from the service itself. You want both.

Encrypted email and chat — built for people who need privacy

Haven supports journalists, activists, and anyone who takes secure communication seriously. End-to-end encrypted, open protocols, no ads.

Get Started →