How To: Set Up a Tails Virtual Machine for Private Browsing

by Tracy Knauer •

If you want the privacy advantages of using a secure Linux-based OS like Tails but don’t want to use Linux all the time, an easy (and free) solution is to run Tails inside a virtual machine. Here’s how. These instructions should work for pretty much any Linux-based OS. But we have written them for Tails, since that is one of …

How Does ICLOAK Plug-and-Play Privacy Work?

by Tracy Knauer •

ICLOAK recently launched its plug-and-play online privacy solution, which is based on a custom Linux distribution that boots from a USB stick. We contacted the company to get a better sense of how exactly its privacy features work, including Tor integration, VPN availability and more. This is what ICLOAK founder Eric Delisle said in response to questions about the product’s …

New Tails OS 2.0 Release Updates Privacy Features

by Tracy Knauer •

Tails OS 2.0, the latest version of the privacy-focused Linux-based operating system, is out this week. It features a new interface and many application updates, including version 5.5 of the Tor browser. Tails 2.0 is designed to provide comprehensive, out-of-the-box privacy features. It comes with built-in Tor encryption for all network connections (not just the browser), as well as extra …

How To: Choose a Privacy-Focused Linux OS

by Tracy Knauer •

Using a Linux-based operating system can help you avoid many of the privacy pitfalls of Windows and Mac OS X. Here’s a guide to some of the most popular Linux distributions available, with notes on how they compare regarding ease of use and privacy. If you’ve never used Linux before, you may not understand that there is no single Linux …