 All right, so we're going to do an introduction here to the tails system and it is a live distribution For tour basically, it's a way to boot this up off of USB have your computer Without leaking any information on there now I am going to set an admin password so we can try admin functions if we want to in this demo here So we're going to double-click that we have to set a password And nothing on this is persistent The other thing we're going to do here is we'll leave the network connection is default it by default Wants to do max spoofing, but because I'm doing this demo in virtual box to make it easier for me to record I do turn it off as far as I know most modern hardware on laptops desktop supports max spoofing and that's spoofing your Mac address, which is a uniquely assigned so to speak serial number of your network interface They spoof it so it makes it harder to track when you connect it to watch networks But as a virtual box seems to have a problem with it So we're going to head and turn that off and like I said, it's just for the demonstration purposes Not you don't really have to do that Also the admin password can technically kind of make you less safe because if you don't set an admin password There's no admin functions available So nothing can run it when you set an admin factor you can run some of the admin functions But you don't need to to get started with tails. So we're going to go ahead and kick it off and start it here Now it purposely doesn't save anything on the hard drive So this is a as I said a live distro that you run and I'm just running it off the a so Which you can run this off of a USB set up a boot of USB plug it into the computer And it creates basically a clean environment for you to surf the web and it directly connects to Tor You're gonna see a warning that'll pop up that'll tell me I'm in a virtual box Because it does like to warn you that virtual boxes can be compromised so by running in a virtual box You could be losing some of your anonymity basically they're saying the host OS could have some Security holes in it now Tor is ready and can access the internet and At the top here you can see The onion circuits that are built and that it's connecting. It's going through here It's gonna takes a second start building the circuits And then you can see visibility into the detail of the circuit you're on Now it comes pre-packaged with the Tor browser, of course We're gonna open that up and it defaults to the tails page on there Now they also have you block and solve by default to your standard Onion it tells you the different IP addresses you're using and when you're using them The script blocking is turned on on turned on there and I like the way they call it It's the amnesia Incognito live system and amnesia pretty much means That it is for complete anonymity as in this system forgets everything it wipes everything So if I download save files to any of that It's going to be wiped now your standard Tor system is still here where you can rebuild different identities and rebuild the circuits on there And it's running a flavor of Debian So it's pretty pretty cut down pretty generic. They took out a lot of the extraneous stuff. They do have a few things in here Bit Bitcoin wallet a onion share obviously an insurance browser They do have and it'll give you a warning if you try to open this up the unsafe browser Which will bypass the proxy, but everything on here by default has been redirected to work through the boxy So you have under the system tools power stats a Figuring a persistent volume What the tails installer does will not it will not install to a hard drive But it will do is clone itself to another Encrypted USB so it'll wipe out and build you another USB stick This also can be used for creating they have an option to create a persistent volume And I believe it creates one little folder so you can pull files back and forth and kind of a persistent state But it doesn't save all the settings in there for it Comes with a inkscape GNU emulation program. So it's got gimp in here Libre office draw scrubs scanning your standard Libre office stack Some programming math Kind of just real basic stuff here. I was kind of cool that they did include here under video Pit TV pit Evie, I'm sure you see it But it's the video editing software which was included on here, which is kind of cool So it's got basic video editing on here and audacity for audio editing and track editing with a couple other tools like traversal So basically it's pretty straightforward as soon as you're online It's nice because there's not wondering is this browser anonymous or am I hiding something it right away is so as soon as we start To open up something duck It you we don't have to think about going okay Is this the anonymous browser or not because everything on here is anonymous, you know If you open up the reader if you open up ice stuff for a newsreader Picked an instant messenger any of these that you connect to right away are already all routed through the proxy So instead of having to think about whether or not something you're opening up is routed through the proxy They all are now. I like to take a look at what information is actually coming out of here. So I'm going to drag this over So that 198 is the IP address And you can see the connections. It's invisible, you know, we're surfing the web on this Let's pull up a couple websites. We're actually some more data So I have a couple websites open here. I opened up Google news through open reddit here And quickly just through something in duck. Go and now we're going to look at the data analysis from my router And nothing the only thing we see is the one connection over here to tour So you can see the SSL traffic the unknown traffic it did, you know request a DHCP But there's really not much going on here. It's really hiding everything. Everything. This is going to sq.iac.io and that's it So it's doing a good job of not leaking data is one of the problems you have sometimes is DNS leaking with DNS leaking does is It is your System making DNS queries that kind of de-anonymize you because they can track your IP address track your MAC address and go K I see all these DNS queries and you're using tour with this You're seeing nothing but tour because from the get-go as soon as it starts up. It doesn't do anything online It just goes right in and starts going to tour so it hides all of your data It encapsulates everything on there and without worry about any leaks now I imagine I can de-anonymize this mail do at the end I'll try it with opening up the insecure browser which bypasses the proxy and you'll see how much data starts flowing through here But as of right now you can see there's just there's nothing to see I mean obviously we do know that this particular sessions using tour, but that's it So if far as functionality goes it works like any other Live OS, it's Reasonably fast, you know from when you're reading off of a thumb drive in this case I'm reading off an ISO on virtual box. I tried it off a thumb drive. Like I said, it's just hard to record it there Is I got there's not really any recording facility built into it for me to do that It also doesn't make it easy to install software Purposely they lock this down pretty good for your own protection all the other tools some of the other ones that are in here is Like the onion chair, which I think this is kind of cool so if you have a file you can literally drag files here and it will create a Circuit just for that so you can download out of the tour browser. I'll show you how that works real quick All right, we just quickly create a file called test.txt Over here and we put it in the documents folder. We drag it to here and We hit start sharing what's gonna do is Create a tour onion service running on this session so I can share this file and as I understand This is how some of the whistleblowers. We're sharing some of the data is using some of the internal services like this This is how you can get files to people over tour anonymously and securely Without leaking what you're doing now, of course the tricky part is you have to get the files onto the computer From here and perhaps like doing some encrypted volumes Because it does have encryption built in on this. I believe it has a standard your standard LVM encryption stack I'll double check and look that up. All right. So right here. We can copy the URL Paste the URL and it's you know completely randomly generated. It's gonna take a second and This is what someone you can share that file and it'll let them download it tells you what the what the contents of the file on there It does automatically zip it for you So you can download the file And it lets you know that there's downloads Now once it downloads you notice that the sharing stopped once someone has that file it drops it You have to start up the sharing again So I'll pull this back over again one more time And still nothing so we can see the duration to see the connection, but there's still no visibility So they need that's a nice thing about running it completely off a live cd There's no worries about you accidentally clicking the wrong thing and opening it up everything gets routed through this anonymously But as far as tails goes It's really straightforward and simple being that it's a standard live cd. They have an error reporting system in here The documentation is included It's your standard laborer office. I don't need to go into details on that I've tried this on a couple computers. They all started up fine. I mean, this is the beta version But I haven't had any crashes on it But the tails os is a is a pretty neat project Not hard. I mean it's literally like any other live cd iso Download and run go ahead and close that And it looks like this may have locked up again. It's the only program I found that's uh been a little bit unstable I think it just pauses a little bit too much. It's uh, the windows won't refresh and sometimes it locked up Locks up. I mean when it's doing this But it's also right now pulling a lot of data through all the news feeds At that slow tour speed But not so far like I said, I really haven't found any problems with it. Uh, It's works great. I actually find surfing with this on the same computer that I have Just running a tour browser bundle quite a bit faster Uh, it seems to build the circuits really fast. Yeah, this has decided to quit again. It's a force quit Uh, it seems to surf the web reasonably fast for being on the tour browser Uh, the connections build really quick. The boot up time is really, you know reasonable And it's uh, it's nice if you want to stay anonymous and be using tour I mean this really gets you up and running uh quite quickly. You still have all the same mornings Well, you know attempt to distract an html kind of this metadata. So It still warns you about any of the other settings like these standard tour browser bundle does Um, and nice thing is too having the ublock origin installed means right away ad blocking So that's handy. So I don't have to deal with a lot of crap on there But it's uh, it's works fine. I really, you know, it's built on the standard Debian like I said, so there's not much there. You got all of your standard network settings wired settings It does support wi-fi. So if you if you're connecting to a wi-fi it does that and it's most hard We're by default it wants to spoof your mac address and leave the admin turned off You also can get like I said root terminal They do have power stats if it's running on a laptop so you can be energy efficient with it And the nice thing is you don't really have to worry about wiping any browser history Or anything at the end because one is shuts down. I'll show you At the end it shuts down and wipes the memory. So Real quick here. I'm going to try and de-anonymize it. So we're going to hand close all the tabs on this And I'll see what happens when you start the insecure browser So if we start an unsafe browser session Makes us sure do you want to start a network to activity when the unsafe is not anonymous? So it's going to give my normal ip address starting browser And I like the way they do this too. They keep everything in red and the first flash screen is warning the browser You're currently using is not anonymous Like I said, they've gone through a lot of trouble. So you can open up any of the other network utilities Anything you're doing is kept through the tour network and kept anonymous with tails So everything's anonymous by default and only through This can you force it to be not anonymous? So let's open up google.com facebook.com twitter.com And we'll go back to opening up reddit.com So now that we've done this i'm going to drag over the network analysis and now We can see that this is going to be full of data. So we went from this computer being anonymous online This kind of shows a difference to It being we'll see all the different sites I connected to in just that few seconds. So it's uh, it does a good job I didn't see any dns leaks. It does what it says it does it starts up Only connects to tour networks and in routes all traffic through tour from top to bottom And like I said, I detected no leaks. I see nothing on my network when I was watching this But this minute, of course, you open up the non anonymous browser. This just goes nuts It's just like everything else. It's amazing how many different websites just by connecting to those Look at how many websites that are now visible Just from those couple connections, you know, I open up just uh google facebook and that and There's a plethora of data that is now being tracked on this But you know it keeps it red. So you know, you're doing it. You know, you're uh, so now It's not we're gonna shut it down when I close all tabs and you'll watch it'll wipe the memory clean on shutdown And that's it. Just quick overview of tails 3.0 beta. It seems pretty stable. I've surfed the web for a little while Pretty slick system. It's nice. Like no dns leaks, uh, or any type of leakage detected It just connects you right to the tour network so you can get surfing and keep yourself anonymous Thanks for watching. If you like to content here like and subscribe. Thanks