1 What self-test checks does Tails perform to ensure it's not been modified ( for spying purposes for example ) after , let's say an adversary has taken physical possession of the media Tails is installed on, let's , again, say during crossing a government checkpoint ( or
2 a secret invasion of a building Tails USB is in ,by the adversary...or whatever other way or method they use ) ?