1
00:00:00,320 --> 00:00:04,250
in this video, we finally want to talk about why you would use tails.

2
00:00:04,250 --> 00:00:06,330
we understand what tails is.

3
00:00:06,330 --> 00:00:12,870
we know it's an operating system that's lightweight, built on linux, comes with security tools, and by default has amnesia.

4
00:00:12,870 --> 00:00:15,480
and those are all facts about the operating system.

5
00:00:15,580 --> 00:00:18,490
but the question is, why would you need to use something like that?

6
00:00:18,490 --> 00:00:22,640
and there are a lot of legitimate reasons beyond just being a good security tool.

7
00:00:22,860 --> 00:00:26,730
you might want to use it if you need to use different computers anonymously.

8
00:00:26,730 --> 00:00:38,560
maybe you travel a lot and using it like a library computer or something like that, you want to boot it up with something you're familiar with and something that you know isn't going to have potential monitoring software on it, especially if you need to do something sensitive.

9
00:00:38,780 --> 00:00:44,000
so sensitive activities that need to be done privately are really well done with tails.

10
00:00:44,260 --> 00:00:50,230
beyond that, you have a ready- to- use security toolbox at your fingertips by launching tails, and it's free and easy to use.

11
00:00:50,230 --> 00:00:52,600
so it's definitely worthwhile to leverage it.

12
00:00:52,820 --> 00:00:57,530
tails generally isn't going to be a daily driver unless you have a specific reason for it to be.

13
00:00:57,530 --> 00:01:04,360
when it comes to more sensitive activities or things you need done anonymously, that is where you would leverage the tails os.

14
00:01:04,660 --> 00:01:08,190
and i think the tails website illustrates some of these points really well.

15
00:01:08,190 --> 00:01:18,880
they highlight that you can avoid censorship, surveillance, advertising, viruses, you can secure a computer anywhere you have that toolbox with you and it comes prepackaged with a lot of free software.

16
00:01:19,060 --> 00:01:28,840
they talk about who can use tales like activists, journalists, domestic violence survivors, or even just you and the other recommendations of people who have used tales in the past.

17
00:01:29,140 --> 00:01:31,830
so some of this might be useful to you, some of it not.

18
00:01:31,830 --> 00:01:41,990
maybe you don't have a need for all of this, but sometimes it's also good just to utilize these security tools to understand how they work to make you a better, more well- rounded security and it practitioner.

19
00:01:41,990 --> 00:01:45,010
so if you have any questions on any of this, of course, let me know.

20
00:01:45,010 --> 00:01:46,600
otherwise, i'll see you in the next one.