How to use VirtualBox and Tails for Safe Browsing

Tails photo
Photo by trishhartmann

Original link: http://www.myproana.com/index.php/topic/531963-deep-web-severe-tw/page-26#entry8172741/

Use of the dark net is easy. There’s far too many idiots out there that make it seem and sound like the most mystical place in the world, but you can safely and securely get online in a matter of minutes ( depending on connection speed ).

Easy steps :

1) download virtualbox – www.virtualbox.org
Virtualbox allows you to run another operating system on top of your existing system. It is free, open source and available for windows, Mac and Linux. Download the free package and install. This allows you to create safe temporary environments which are perfect for dark net use.

2) download tails – https://tails.boum.org/
Tails is a live Linux distribution. This essentially means it is a disk image that someone can boot from usb, cd or other removable media. All data is deleted after use and it incorporates various dark net and privacy based tools. This includes tor – used to access the tor network. Download the 32 or 64 bit live cd image.

3) start virtual box and create new machine
Create a new machine and set it as a 32 or 64 bit Linux device. Go through each step and setup the memory as needed. You do not need to create or add a hard drive image or file, as we should never have to save to disk. After creating the machine right click on the new entity and select settings. Go to the drive setup and set it to boot from cd or dvd ISO image. Point to the previously downloaded tails image.

4) boot the machine
Once the machine has booted you will automatically be connected to tor. All activity and data saved during your session will be deleted when the machine is terminated. To end just close virtualbox and make sure you tell it to fully terminate the vm and not simply put the image to sleep.

The Online Habits That Trigger NSA Spying

nsa-sign

Wor­ried about the Na­tion­al Se­cur­ity Agency mon­it­or­ing you? If you take cer­tain steps to mask your iden­tity on­line, such as us­ing the en­cryp­tion ser­vice TOR, or even in­vest­ig­at­ing an al­tern­at­ive to the buggy Win­dows op­er­at­ing sys­tem, you’re all but ask­ing for “deep” mon­it­or­ing by the NSA.

Source: The Online Habits That Trigger NSA Spying

Tails – Privacy for anyone anywhere

2015-12-09 19_57_01-Tails - Privacy for anyone anywhere

Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card.

  • use the Internet anonymously and circumvent censorship;
    all connections to the Internet are forced to go through the Tor network;
  • leave no trace on the computer you are using unless you ask it explicitly;
  • use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.

Source: Tails – Privacy for anyone anywhere