Released Tails 2.2, Snowden's operating system

Tails 2.2 has hit the streets. Its main attractions are the tor browser update and its security updates

Tails 2.2 has hit the streets. Its main attractions are the tor browser update and its security updates

A new version of the quintessential anonymous operating system has been released, This is Tails 2.2 the which brings important news with respect to its previous version.

Tails 2.2 surprises, since the final version is quite different from the last candidate version of this version, something that rarely happens almost neverHowever, in the world of anonymous connections you have to always be up to date and take everything to the millimeter.

Among its novelties, it stands out updating the famous Tor browser to version 5.5.3, the I2P update to version 0.9.24 and the update of the so-called Onion circuits with an extension that informs whether or not we are connected to the Tor network.

It should also be noted that you can now watch movies protected by DRM, a password manager that protects your data in the event of a power outage and a improving the integrity of your files(the latter has been done to prevent things like the Linux Mint attack).

Finally, lots of security updates and bug fixes have been made, something that is perhaps the most important thing in this operating system, since new security flaws are discovered every day that allow to know the identity of the users. Tails 2.2 promises absolute anonymity, therefore, they take great care to take care of every last detail in security.

If you did not know Tails, it is a Linux operating system designed to protect your anonymity on the network, which is recommended by Edward Snowden himself to keep you hidden, since it has many security mechanisms that other systems cannot. For example, to access the Tor network and .onion domains (Deep Web), it is much safer to do it through Tails than through another system, since Tails is loaded in Ram memory and does not let anyone see your disk hard (if you use Tor on Windows, more advanced users could steal your Cookies from other browsers and know who you are).

To download it, I advise you follow the wizard from here, since its installation is somewhat more complex than normal. Finally As always, I advise you to take extra precautions to reinforce your anonymity, such as using a Public Network (never use your home router to enter Tor), change the Mac address of the Network card, never activate plugins such as Java Script and renew your identity on the Tor Network every little bit .

The content of the article adheres to our principles of editorial ethics. To report an error click here!.

6 comments, leave yours

Leave a Comment

Your email address will not be published.



  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   dadas said

    What tails does i2p use. Then use freenet and other peer to peer networks :)
    Although newbies and rats will infect i2p and freenet so I don't like the idea that much.
    I'd rather charlatans keep using tor or make it last a little longer
    (Sorry for my othergraphy, I don't have time)

  2.   Ruisu cordova said

    excellent: 3

  3.   Antonio Gutierrez said

    Never use the home network? . The tor network is specially designed so that it is not known which network you are using, that is the grace, that they cannot identify you.

    1.    azpe said

      In theory, but there are quite a few security flaws out there that allow you to be identified. I know one who came to tor from Android and after 10 minutes phone calls began to rain down offering him live organs, so if it were you, I wouldn't play it.

      1.    AllahuAkbar said

        Yes, I confirm it, it has happened to me, the worst of all is that when they send them to you it is only chicken liver, what a scam: /. I paid 400 euros for a put * chicken liver.

  4.   Will said

    Regarding the final sentence "change the Mac address of the Network card", I would like to know how, because these days I try it on a public router with no known defenses and there is no way. Neither with macchanger, nor by hand with ifconfig, nor by editing the connections… it won't let me connect more than with the original Mac (I use Ubuntu 14.04). Do you know if the new routers for fiber optics can carry some software from the operator that insists on knowing the original data? Or if it is a matter of the operator in general, who likes to control and help control so much?