Connect with us


Tails OS – An Actionable Guide for Regular Folks

Tails OS Guide

When whistleblower Edward Snowden was communicating with Glenn Greenwald back in 2013 about the goings-on at the NSA, one of the tools he used to protect himself was Tails. But that was a long time ago. Does Snowden still like Tails? Here’s what he had to say on the subject in this December 13, 2017 […]

Tails OS – An Actionable Guide for Regular Folks was originally found on Blokt – Privacy, Tech, Bitcoin, Blockchain & Cryptocurrency.



Tails OS Guide
Tails OS Guide

When whistleblower Edward Snowden was communicating with Glenn Greenwald back in 2013 about the goings-on at the NSA, one of the tools he used to protect himself was Tails. But that was a long time ago. Does Snowden still like Tails? Here’s what he had to say on the subject in this December 13, 2017 tweet:

Even if you don’t understand exactly what he’s talking about (yet), this Tails thing is important. Keep reading to learn what it is and why it has become so popular.

What is Tails, and why do privacy fans love it?

Tails is a unique computer operating system. It is designed to help you use the Internet anonymously and get around censorship. Tails is a live system (live operating system) that runs from a USB stick or DVD. It lets you connect to the Internet using virtually any computer while leaving no trace of your activities after you are done.

Even better, Tails is free software that anyone can install and use whenever and wherever privacy and anonymity are important.

What makes Tails safer than other operating systems?

Because Tails was designed from the beginning to provide privacy and anonymity, it differs from other operating systems in several areas:

  • Tails forces all Internet connections to go through the Tor network. Tor is a worldwide distributed network that prevents people from watching your network connection from knowing what websites you visit while keeping those websites from knowing your physical location. For more details on how this works, visit the official About Tor page.
  • Tails connects to the hardware of a computer but doesn’t use the operating system or disk drives. That means there is no permanent record of your activities on that computer. Once you remove the Tails USB Stick or DVD and restart the computer, there will be no way to tell Tails was used there.
  • Tails comes with state of the art encryption technology. From PGP and OTR support for secure communications to the automatic use of HTTPS when visiting websites, to the ability to encrypt the files on your USB stick or DVD, Tails has you covered.

With all these privacy and anonymity features together in a package that you can literally carry in your pocket, it is easy to see why privacy fans love Tails.

This all sounds great, but you may still be wondering, “Is Tails safe to use?” Tails is far safer than the typical operating system, but it is not foolproof. There are various ways bad guys can get around the protections built into Tails. Here is a detailed explanation of Tails’ security limitations.

Watch the following video for a more detailed introduction to Tails:

One of the great things about Tails is that you can create your own Tails USB Stick or DVD and try it for yourself. And since it is free software, all it will cost you is the USB Stick or DVD you install it on.

In the next few sections, we’ll talk about the process of creating and configuring a Tails System using a USB Stick. We won’t walk you through the process step by step, as the details depend on the type of computer you install from and the media you are going to install to.

We do encourage you to create your own Tails System by following the instructions on the Download and Install Tails page that applies to your situation.

Once we’re done, you’ll be able to see for yourself how Tails and its included software work.

We’re going to:

  1. Download and verify Tails
  2. Install Tails on a USB Stick
  3. Configure Tails & Tor

Downloading and Verifying Tails

We used a computer running Linux to create our Tails System. Clicking through the options on the Download and Install Tails page led us here:

Tails Install
Tails Install

Once we were ready, we clicked the big green “Let’s Go” button, which led us to the detailed instructions. From here on out, it was just a process of following the detailed instructions provided by the Tails team.

We downloaded the Tails USB image then verified it using the Tails Verification browser extension. Verifying your download is vitally important. This will tell you if your download is somehow corrupted.

Downloads are sometimes incomplete, or part of the download might not be 100% identical to the original. And sometimes, hackers break through the security on a website and replace the original with a hacked version. Verifying your download will spot any of these problems for you.

Once we had a verified version of the Tails USB image on our computer, we followed the instructions for installing it on the USB stick.

Installing and Running Tails on a USB Stick

Installing Tails might be overstating things a bit here. All that we really need to do is copy the verified Tails USB image onto your USB Stick. The instructions will tell you exactly how to do this for the computer you are using to install Tails.

Running Tails for the first time may actually be harder than downloading and installing it. That’s because most computers are not configured to run from a USB Stick.

We had this problem and had to spend some time figuring out how to get our computer set up properly. The Tails does not start at all troubleshooting guide helped us deal with this.

Configuring Tails

There isn’t a lot of configuring to do with Tails initially. When you start Tails, you see a screen that looks like this one:

Configuring Tails
Configuring Tails

After you press Enter (or several seconds with no input) the Tails Greeter screen appears:

Welcome to Tails
Welcome to Tails

Here you tell Tails the Language you want to use, the Keyboard Layout, and the Formats to use for things like the date and time.

In addition, you can activate a full range of Accessibility options from the Universal Access menu:

Tails Accessibility
Tails Accessibility

NOTE: The Tails team configured Tails to be as safe as possible by default. If you need to deviate from the defaults, the Additional Settings section of the Greeter is where you make those changes. We recommend you avoid making any changes here, if at all possible.

Once you are done setting things up in Greeter, you click the Start Tails button.

A Quick Intro to the Tails Desktop

Tails uses the GNOME graphical user interface. GNOME is used in several versions of Linux and is one of the more popular user interfaces. In Tails, the GNOME desktop looks like this:

Tails Desktop
Tails Desktop

The Top Navigation Bar contains the two main Tails menus, along with a group of icons with various functions. Here is a quick summary of what you’ll find in this navigation bar, from left to right:

  • The Applications menu gives you shortcuts to the software that comes pre-installed on Tails, along with some utilities for configuring the desktop. You’ll find all the basic applications you need to get things done here, along with some specialized stuff related to the privacy and anonymity features of Tails.
  • The Places menu has shortcuts to folders on the system, as well as any storage media like disk drives that might be connected.
  • The Calendar and Notifications appear together in the top center of the window.
  • The OpenPGP Applet comes next. You’ll use this to encrypt and decrypt text for greater privacy.
  • The Tor Status icon looks like an Onion, and you can click it to see the Open Onion Circuits Tails knows about.
  • We talked about the Universal Access icon and menu back in the Configuring Tails section.
  • The System menu contains information on your network connection, the status of the computer’s battery, and other settings.

Connecting Tails to Your Network and the Internet

Tails is of little use unless it is connected to the Internet. But before it can connect to the Internet, Tails needs to connect to your network. You can see the status of your connection to the local network in the System menu:

Tails Networking
Tails Desktop

We had no problem connecting Tails to our local network. Once we did, it automatically connected itself to the Tor network and through that to the Internet.

You can quickly see if you are connected to the Tor network by looking at the Tor Status icon in the top Navigation Bar.

If Tails is connected to the Tor network, the Tor Status icon looks like this:

If Tails is not connected to the Tor network, the Tor Status icon looks like this:

While we had no problems, connecting Tails to the Internet doesn’t always go so smoothly. If you have problems, the Tails documentation has detailed instructions on how to connect to the Internet anonymously.

The Tor Browser

The Tor Browser is based on the popular Firefox browser. But it has been heavily modified, with your privacy and anonymity in mind. The developers stripped out services like JavaScript and cookies that can be used to defeat the anonymity provided by the Tor network. This makes the Tor Browser safer for you to use, but you may find that some websites don’t work right without these services. You can learn more about the differences at the Tor Browser page.

Tails Tools for Privacy

The Tor network and browser provide you with anonymity when using the Internet. But anonymity doesn’t guarantee privacy. Let’s take a quick look at a few of the most useful encryption tools that Tails gives you to boost your privacy.

Why You Need Encryption Too

This can be confusing, so let’s look at an example. Let’s say I want to send a message to my wife, Ruth. I don’t use an encrypted application to create it, so the message starts out in plain text. Before the message leaves my computer, Tor wraps it up in three layers of encryption. That’s an essential part of how Tor works.

As my message passes through the network, Tor strips off layers of encryption. When my message leaves the Tor exit mode and goes to its destination, all the layers of encryption that Tor added are gone. What Tor has done is make it impossible to trace my message back to the computer it came from. This provides anonymity.

But what about the contents of my message? The contents are now in the same state that it went into the Tor network. Since I sent a plain text message into the network, a plain text message comes out of the network.

This might be fine, but it might be disastrous. When in doubt, it is best to be safe and use the encryption tools provided by Tails. That way, your messages, and data can only be read by the people who are supposed to read them. Even if they were somehow able to intercept your messages en route, all any snoop would see would be incomprehensible gibberish.

Keeping Your Communications Secure

Tails gives you several ways to keep your communications secure from prying eyes.

Encrypting, Decrypting, and Verifying Messages with the OpenPGP Applet

If you want maximum privacy, you should use the OpenPGP applet. Encrypting and decrypting messages is riskier if you do it in the web browser. To use the applet, you can compose your message in a text editor, then use the applet to encrypt it. Likewise, you can receive an encrypted message and import it into the applet before decrypting it.

Using OpenPGP can be labor-intensive. If you are sending lots of encrypted messages by email, Thunderbird, an email program that comes pre-installed on Tails, might be a better option than OpenPGP. If you want to go this route, you can find more information at the Thunderbird Help page.

Chatting Securely with the Pidgin Instant Messenger and OTR Encryption

Pidgin Instant Messenger is a chat application that can connect to several different chat systems simultaneously. When combined with OTR (Off-the-Record) messaging, you get encryption and more. If you want to be able to chat securely while using Tails, get all the details at the Chatting with Pidgin page.

Keeping Your Data Secure

Normally Tails only stores data until you shut down. But if you are running Tails on a USB Stick with additional space available, you can create a Persistent Storage area on the USB Stick to retain data long term.

There are pros and cons to creating a Persistent Storage area, and the Tails team advises against doing so in most cases. Still, if you need to store data securely, or add additional applications beyond those that come pre-installed, this is your best option.

The Pros and Cons of Using Persistent Storage with Tails

Pros Cons
Allows you to store encrypted data on the Tails USB Stick The Persistent Volume is visible to anyone who has access to the USB Stick.
You can install additional applications Installing non-default applications can break Tails security
You can change the configuration of applications Changing configurations of default applications can weaken anonymity
You can open the Persistent Storage from other operating systems Accessing Persistent Storage from other operating systems can compromise security

To further minimize the risks of using Persistent Storage, you get to specify exactly which types of files Tails can store there.

Tails Persistent Volume
Tails Persistent Volume

If you still want to go ahead after looking at the pros and cons, you’ll want to head to the Encrypted Persistence page for detailed instructions.

Managing Passwords

One of the best uses for Persistent Storage is to keep track of all your passwords. Using a different, strong password for each website and application that needs one is a must, but keeping track of them all without computerized help is almost impossible.

To address this problem, Tails comes with KeePassX, an open quality password manager. You can use it to keep track of all your passwords while only needing to remember the single password that unlocks this application.

Tails and Cryptocurrencies Make a Great Team

If you are interested in cryptocurrencies and are familiar with crypto exchanges, you definitely want to check out Tails. Its privacy and anonymity make it a safer place to keep your cryptocurrency wallets than a standard computer. Tails includes a Bitcoin wallet in its pre-installed software.

Built-in Bitcoin Support with the Electrum Wallet

The Electrum Bitcoin Wallet comes standard with Tails. With only a little work, you can transfer your Bitcoin keys into Electrum. Once you do, your keys will be safer, and your Bitcoin transactions will gain the anonymity of the Tor network. To learn more about the Electrum Bitcoin Wallet, visit the Electrum Home Page.

What about using Monero with Tails?

Monero is a secure, private, and untraceable cryptocurrency. That makes Tails a natural place to store your Monero. If you want to keep your Monero on Tails, you’ll need to set up Persistent Storage on your Tails USB Stick. That’s because Tails does not have a pre-installed wallet for Monero as it does for Bitcoin.

Here are the instructions for setting up Persistent Storage. Once you have that setup, here are the instructions for installing the Monero wallet on Tails.

If you want the ultimate in security for your Monero, you’ll store it in a cold wallet. Tails is an ideal tool for creating such a wallet. Tails leaves nothing behind on a computer that could help a bad guy get access to your cold wallet or even know it exists. And by using Tails, you’ll be creating your cold wallet on a safer system.

Check out this link if you are interested in creating a Monero cold wallet using Tails.

Is Tails always the best solution for privacy and anonymity?

While Tails is a great privacy operating system, it isn’t the only one available, or even the best for every situation. In particular, people interested in online privacy and anonymity often use Whonix or Qubes.

So which is the best? As usual, the answer is, “it depends.” Let’s see how each one stacks up against Tails.

Is Whonix better than Tails?

Whonix typically runs as two VirtualBox virtual machines. You do your work in one virtual machine(the Workstation). The other (the Gateway) handles all connections between the Workstation and the Internet by passing them through the Tor network.

This design means that any computer that can run VirtualBox should be able to run Whonix. This makes it easy to install Whonix, but there are some big security implications to this design.

When you run Tails from a USB stick or DVD, it is the only operating system running on the computer. To run Whonix, you need to have the host operating system running too. You can easily jump back and forth between the private and anonymous Whonix workstation and the host computer.

While this is convenient, it makes it all too easy to do something in the host when you should be doing it in Whonix and vice versa. Even worse, Whonix can’t force communications between the host and the Internet to go through Tor. If you do slip up and do something in the host that you shouldn’t, you’ve lost your anonymity.

While Whonix has some advantages, we think Tails is a better privacy solution than Whonix.

Is Qubes better than Tails?

In some ways, Qubes is more like Tails than Whonix is. That’s because when you run Qubes, it is the only operating system running on the computer. This is inherently more secure than the Whonix approach since there is no way to accidentally get “outside” the secure Qubes environment.

Qubes contains its own virtual machines with differing levels of trust for running applications. The virtual machines are completely isolated from each other by Qubes. This limits the damage that a bad app (like spyware or a virus) can do by confining that damage to one virtual machine.

Qubes itself doesn’t provide any real anonymity. To address this, people sometimes run Whonix inside of Qubes.

One big drawback of Qubes (with or without Whonix) is that there isn’t a Live USB version of it. This means that when you use Qubes, there will likely be traces of it leftover on the host computer once you end your session.

As with Whonix, while Qubes has some benefits, we think Tails is a better solution overall.

Is Tails right for you?

Whether Tails is the “right” operating system for you depends on what you plan to do with it. You probably don’t want to use it as your main operating system. The features that make it such a good privacy tool can make it clumsy for full-time use. Installing your favorite software can be a hassle and may break the privacy protection that Tails provides. Making all your connections to the Internet go through the Tor network will slow down your browsing.

But there are many situations where Tails is extremely useful for anyone concerned with online privacy and anonymity:

  • Does it bother you that ISPs and websites watch what you do online and sell that information to marketers or hand it over to spy agencies? If so, using Tails can keep them from finding out anything useful about you.
  • Have you ever had your personal data stolen from some poorly protected websites by hackers? Using Tails can minimize the amount of data sites have about you. They can’t lose what they don’t have.
  • Do you need to visit sensitive websites that your government doesn’t want you to see? With Tails, you can anonymously get around the blocks they put up to stop you.
  • Does your government have a system like China, where everything you do online is monitored and used to decide whether you are a good citizen or not? You can use Tails to anonymously do the things the government doesn’t like.
  • Do you want to keep your cryptocurrencies safe? Keeping your cryptocurrency wallets on a Tails USB Stick adds layers of protection to your cryptos.

In short, virtually anyone reading this can think of situations where they could use the privacy and anonymity that Tails can give you. We think it is a great tool, as long as you remember that nothing is 100% safe and secure. Check out the Tails warnings page to be sure you understand the limitations, then give Tails a try.

And in case you were wondering why they call this thing “Tails,” the name is an acronym. It stands for “The Amnesic Incognito Live System.” Now you know.

Blokt is a leading independent privacy resource that maintains the highest possible professional and ethical journalistic standards.



Axie Infinity Records Holders ATH: 420% Year to Date Growth



Popular non-fungible token (NFT) gaming platform Axie Infinity continues to see increased adoption from users, following exponential growth in the number of wallet addresses.

Axie Sees Surge in Address Holders

According to data provided by IntoTheBlock on Tuesday (September 28, 2021), Axie Infinity Shards (AXS) ownership is on the rise, with 17,480 address holders. This figure represents a new all-time high (ATH) and a 420% increase year-to-date (YTD). Meanwhile, this growth is indicative of the rising popularity of Axie Infinity and play-to-earn non-fungible token (NFT) gaming.

Back in July, CryptoPotato reported that the value of the AXS token skyrocketed nearly 400% within one month, leading to a market capitalization of over the $1 billion mark. Later in August, AXS was among the assets listed on the major cryptocurrency exchange Coinbase Pro, which also gave it an immediate boost.

Axis Infinity, developed by Sky Mavis and released in 2018, arguably popularised the play-to-earn trend and has recorded a number of impressive milestones in recent times. Data from DappRadar revealed that the project recorded over $2 billion in NFT sales volume, solidifying Axie’s place as the most valuable NFT collection, thereby surpassing major names such as CryptoPunks, Art Blocks, and NBA Top Shot.

The data also showed that more than 600,000 users traded Axis Infinity NFTs, resulting in 4,887,645 transactions. The project currently boasts over 1.5 million daily active users.


According to Jeff Zirlin, co-founder of Axie Infinity, half of the platform’s users got to interact with cryptocurrency and blockchain for the first time through Axie, while 25% of them did not own a bank account.

The Growth of NFT Gaming

The NFT industry is becoming popular with celebrities, major sports leagues, and companies buying digital art in whatever form, or selling them. However, blockchain-based games are seeing a special kind of attention.

A report by DeFiPrime stated that the NFT Gaming market has a total market valuation of nearly $180 billion as of August 2021, with the value estimated to rise to $196 billion. An excerpt from the report reads:

“NFT games may have the potential to become the standard for the gaming market if it sees enough attention and popularity. Already they have made major changes to games and made it much more fun for players. From there, it could be a very major change to the way people play games and could be as major as Doom was to the market or 3D was for environments.”


Binance Futures 50 USDT FREE Voucher: Use this link to register & get 10% off fees and 50 USDT when trading 500 USDT (limited offer).

PrimeXBT Special Offer: Use this link to register & enter POTATO50 code to get 50% free bonus on any deposit up to 1 BTC.

You Might Also Like:

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.

Click here to access.


Continue Reading


Bitcoin, Ethereum will draw their market strength from this key aspect



Bitcoin and Ethereum are currently surviving a bearish scare, with both assets just about holding a position above their immediate supports. For Bitcoin, the $41,000-level is establishing a strong bounceback range while Ethereum has managed to remain above $3000.

On the contrary, some altcoins have recorded strong recoveries, with Solana, Bitcoin Cash, and Uniswap hiking by more than 10% in one 24-hour window.

Now, these altcoins seemed to have the relative edge at press time. However, there are a couple of key metrics which may allow us to evaluate the actual strength of Bitcoin, Ethereum as the market goes forward.

How much importance should be given to utility?

Source: Sanbase

Over the past few years, market stability has been dependent on different aspects. During the bullish rally of 2017, investor sentiment was key and when major traders started to become bearish, the digital assets collapsed.

Then, it was constructive institutional inflows at the beginning of 2019. At the time, it was suggested that institutions can allow tokens such as BTC, ETH to hold higher price positions. The price fell in 2020, irrespective of rising interest.

However, one key idea missed by most speculators might be the utility side of things, which is presently one of the most important functionality. Gone are the days when astute marketing allowed assets such as TRON to climb into the top-10.

Now, according to Santiment, Bitcoin has hit a two-month high in terms of circulation. What’s more, if the chart is closely observed, the average BTC transferred has risen consistently over the month of September.

Source: Sanbase

Similarly, Ethereum hit a similar feat but its 1-day circulation index was at a 3-month high, indicative of high token utility and movement.

Ethereum’s price has dropped sharply over the course of the past few weeks, but circulation has remained high.

Bitcoin, Ethereum spaces have evolved

Now, to be fair, it is important to account for volatility and the fact the circulation isn’t as high as it was during May 2021. However, maintaining a development and transaction-intensive ecosystem, one which allows the price to be built on strong foundations, is eventually advantageous.

Now, with respect to the assets that have grown over the past few days, besides BCH, both Solana and Uniswap are extremely utilized tokens. While one is the native token of a major DEX, another asset is currently responsible for bringing better L2 solutions.

Likewise, for Bitcoin and Ethereum, higher utility and circulation should keep the asset relevant, and progressively exhibit significant recoveries over Q4 of 2021.

Where to Invest?

Subscribe to our newsletter

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.

Click here to access.


Continue Reading

Blockchain Offering Seamless Crypto Swaps With No KYC Process


on Offering Seamless Crypto Swaps With No KYC Process

Advertisement &  & is simplifying how users are converting Bitcoin and other cryptocurrencies by eliminating the current barriers available in the market.

The EU-regulated company is changing how people swap cryptocurrencies for money with its “swap’n’Go” approach. The platform is a user-friendly space that allows anyone around the globe to effort conduct various trading activities. has various unique features. The platform notably offers low commissions and a faster transaction experience to its users compared to many other venues in the market. offers the lowest fees in the industry while at the same time offering the best buying rates. Transactions performed on the employ price execution from top liquidity providers. In turn, this assures that customers get the best price possible for their purchase.

In addition, transactions on the platform take about 3 minutes. This is because there is no Know-Your-Customer (KYC) process and allows transactions to take three minutes to complete. This is a breath of fresh hair since the registration process associated with cryptocurrency exchanges is usually lengthy and cumbersome compared to most. The process has notably caused many people not to engage in cryptocurrency trade. 

Advertisement &  & 

Another notable feature is that coins get to users’ digital wallets within 15 minutes of payment approval. has two currencies available for purchase, including Tether (USDT) and Bitcoin (BTC). Currently, the platform is accepting two payment methods, Visa and MasterCard debit and credit cards. Users can purchase varying amounts of cryptocurrencies up to €1,000 per month.

To merchants and developers, provides a convenient order widget that can be integrated into any webpage with just a few clicks.

In addition to being regulated by the authorities, integrates a full 3-DS V2 for safe and secure transactions. Reportedly, card purchases that use PCI DSS Level 1 certification will be authorized by code and verified by Visa or Mastercard ID Check. is now available to over 160 plus countries and is available 24/7 throughout the year. The platform is owned and operated by Octo Liquidity, based in Tallinn, Estonia.

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.

Click here to access.


Continue Reading
News5 days ago

Axie Infinity: Pagbabago ng SLP at AXS Breeding Requirements

Uncategorized5 days ago

How to identify items in Diablo 2: Resurrected

Blockchain4 days ago

Most expensive NFTs ever sold and the Non-Fungible Token’s expansion of expense.

Blockchain5 days ago

QuadrigaCX Saga to Be Covered By Netflix Documentary

Uncategorized4 days ago

Hashrate beats the S&P 500 or A word on the benefits of hashrate rental.

Uncategorized5 days ago

Why is NFT art valuable? Understand why they are worth millions

Blockchain3 days ago

The Three Kingdoms: Bringing a New Era of Play-to-Earn Games to The Blockchain Industry

Blockchain5 days ago

SEC Chair Gary Gensler Reveals Plans To Clean Up Crypto Space – Stablecoins At Grave Risk?

Uncategorized3 days ago

NBA 2K22 City Spawn Locations: How to Unlock

Blockchain2 days ago

BOOM Esports and NoPing e-sports claim the top spots in BTS Pro Series Season 8 SEA and Americas

Blockchain5 days ago

Cardano Launches dAppStore for Certified DeFi Apps

Blockchain4 days ago

Mars4 NFT Land Tokenomics

Blockchain5 days ago

Netflix Set to Premier Documentary About QuadrigaCX CEO in 2022

Blockchain5 days ago

With BlockFi, Celsius under the radar now, what next for crypto-regulations

News4 days ago

The World’s Top 10 Companies Could Be Interested in Cryptocurrencies

Blockchain5 days ago

Bitcoin’s LN packs a punch, but is it truly far from having security concerns 

Uncategorized3 days ago

Best Stats for the Barbarian in Diablo II: Resurrected

Uncategorized4 days ago

FTX Relocates From Hong Kong to Bitcoin-Friendly Bahamas

Blockchain4 days ago

Top 10 NFT Sales Of This Week: September 19-25

Uncategorized5 days ago

The Andy Milonakis NFT Show, EP. 5 – Sponsorships, Degen’s, And Cheeth