
Never seen a better time to start using tails
Where is the world heading? Do you think those vipers can ever ban an os like tails?
It feels like I just woke up in a nightmare this morning 😬

Where is the world heading? Do you think those vipers can ever ban an os like tails?
It feels like I just woke up in a nightmare this morning 😬
I am on a very old version & need to update my Tails OS USB to the latest version manually. I do have my Tails USB along with an extra one.
How do I do this without losing my persistent storage, bookmarks, etc?
Edit: I am now stuck with the new Tails version downloaded into my Tor Browser folder in Tails, and will not verify by any means.
“Verification failed”
No matter how many times I try re-downloading
Hey r/penetrationtesting,
I’ve been building TOSS (Tails On Steroids Script) and I want real feedback from people who know what they’re doing.
The Problem:
Tails OS is great for opsec — forced Tor routing, amnesic sessions, MAC spoofing, no disk writes. But it ships with zero offensive tools. Your options were always:
• Use Kali/Parrot and leave a forensic footprint
• Reinstall everything manually every session
• Just not use Tails for offensive work
None of those work well.
What TOSS Does:
One script. Fresh Tails session. 50+ offensive tools installed into RAM across 6 categories:
• Recon – OSINT, DNS enum, web/network recon, social media intel
• Vuln Scanning – Nikto, Nuclei, OpenVAS, ZAP, WPScan
• Exploitation & C2 – Metasploit, Sliver, Merlin, BeEF, SQLMap
• Web Attacks – ffuf, feroxbuster, XSStrike, Dalfox, Hydra
• Network Attacks – Bettercap, Responder, mitmproxy, Ettercap
• Post Exploitation – Impacket, CrackMapExec, LinPEAS, Chisel, pypykatz
Pick what you need through an interactive menu, or hit A to install everything. When you reboot — tools, creds, captures — all gone. No trace.
Why I’m Posting:
I need people to actually run it and tell me:
• What breaks on real Tails sessions
• Tools I’m missing
• Bugs — install failures, broken paths, menu issues
• Whether my opsec assumptions about Tails are correct
• Contributions for unfinished categories (wireless, RE, forensics, password cracking, cloud, mobile)
One Heads Up:
Everything routes through Tor. Installs will be 2–5x slower. That’s intentional — anonymity is the whole point.
For authorized engagements, CTFs, and legal research only.
GitHub: https://github.com/TheShellSanta/TOSS
Ask me anything about design decisions or tool choices. Roast it if something’s wrong — that’s exactly what I need.
Boot. Hack. Reboot. Vanish.
My laptop does not have the updates secure boot on windows and I keep getting the error that tails won’t work on my laptop anymore, it seems the only fix is buying a knew laptop or disabling secure boot. How bad for security and general OPSEC?
I was thinking of using cake wallet to buy it on my phone then send it to my feather wallet but i’m not sure if that follows proper OPSEC.
Hey everyone.
I am operating from a very outdated laptop. The infamous pop up. In the near future I won’t be able to launch tails os on that device anymore.
Do you think this could be a good fit?
With the recent Copy fail error, and tails gitlab currently being down, starting to feel as though there are issues with the safety of the os. Should we stop using it until we hear something concrete from them?
I was tired of WhatsApp and Telegram knowing everything about me. So I built v2v — a zero-knowledge encrypted chat that works like this:
How the crypto actually works: The encryption key is generated client-side and never sent to the server — it lives only in the URL fragment (#key=...), which browsers don't send in HTTP requests. Messages are encrypted with AES-GCM before upload, so even the server sees only ciphertext. The room key never touches my logs.
What's logged server-side: To be transparent — I do keep hashed IP analytics (SHA-256 salted, not reversible) for rate limiting and abuse prevention. No message content, no plaintext nicknames.
Rate limiting: 80 req/min per IP to prevent abuse.
Open to feedback from the privacy/security community:
Source: [github /https://github.com/alsultaneo/v2v\]
hi so i am having this weird problem where tails os no matter how many times i re install the image or re flash it, it 1 makes the usb invisible to windows, 2 makes my old computer freeze in bios and 3 trying it on my laptop returns "os not found" and boots back into windows
Trying to launch tails for the first time and I can get past the boot loader but it keeps getting stuck on this screen.
Anyone know how to fix?
Hey guys,
had this notification for the flrst time today when I tried to boot into Tails
So I've tried to disable Secure boot through the bios settings of my computer, but its still showing off when booting into tails, how come?
Thanks !
Is it possible to generate a new pgp key for someone, with intent to keep and I use my older one I’ve been using for years? Can I have to seperate pgp keys for seperate people on the same platform. Kleopatra!
Is https://tails.net down for anyone else? I haven't been able to access it for the last hour or so from Europe, with and without a proxy.
(Repost, still dealing with this issue as of the 7.7.4 update)
I updated Tails from 6.4 earlier today (wiped my 64gb USB & it’s partitions from diskpart in CMD line) not very fluent in code, but have the sense to navigate command line through instructions.
After reinstalling through Tails official website & Rufus, I started Tails to a screen showing that I have a Partition Error and therefore will not be able to use Persistance. After some research/troubleshooting on the net, I ran this command, which brought up this error.
Note: When downloading through Rufus, the download was in MBR, and unable to change to GPT, not sure if that matters. I am also on a pre-2012 Dell Latitude.
Appreciate anyone with solutions or any input, as this seems to be a new issue with recent versions of Tails from what I could find online.
Emergency Release to fix security vulnerabilities in the Tor Browser.