Tails – Live System To Preserve Your Privacy & Anonymity

The Tails team is happy to publish Tails 4.5, the first version of Tails to support Secure Boot. This release also fixes many security vulnerabilities. You should upgrade as soon as possible.

New Features

  • Secure Boot
    • Tails now starts on computers with Secure Boot enabled.
    • If your Mac displays the following error:
    • Security settings do not allow this Mac to use an external startup disk.
    • Then you have to change the settings of the Startup Security Utility of your Mac to authorize starting from Tails.

Changes & Updates

  • Update Tor Browser to 9.0.9.
  • This update fixes several vulnerabilities in Firefox, including some critical ones.
  • Mozilla is aware of targeted attacks in the wild abusing these vulnerabilities.

Known Issues

Get Tails 4.5

  • To upgrade your Tails USB stick and keep your persistent storage
    • Automatic upgrades are available from Tails 4.2 or later to 4.5.
    • If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

Installation

Follow our installation instructions:

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

2 weeks ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

2 weeks ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

2 weeks ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

2 weeks ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

2 weeks ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

2 weeks ago