Merge branch 'bugfix/git-https' into experimental
[tails-test.git] / wiki / src / download.html
blobf2f2d0e637e6d74569bdbd4b86624da12b702785
1 [[!meta title="Download, verify and install"]]
3 <strong>Tails is [[Free Software|doc/about/license]], you can download it, use it and
4 share it without restriction.</strong>
6 <div id="page-download">
8 [[!toc levels=1]]
10 <div id="first_time">
12 <h1 class="bullet-number-one">First time user?</h1>
14 <div class="caution">
15 <ul>
16 <li>If you don't know what a metadata or a man-in-the-middle attack
17 is.</li>
18 <li>If you think no-one can eavesdrop on your communications
19 because you are using Tor.</li>
20 <li>If you have no notion on how Tails works.</li>
21 </ul>
23 <p><strong>Then, check first the [[about]] and
24 [[warning|doc/about/warning]] pages to make sure that Tails is the right tool
25 for you and that you understand well its limitations.</strong></p>
26 </div>
28 </div>
30 <div id="download_iso" class="container">
32 <h1 class="bullet-number-two">Download the ISO image</h1>
34 <p>You will download Tails in the form of an <span
35 class="definition">[[!wikipedia ISO_image desc="ISO image"]]</span>: a
36 single file that you will later burn on a DVD or installed onto a USB
37 stick.</p>
39 <div id="http">
41 <h2>Direct download</h2>
43 <h3>Latest release</h3>
45 <p>
46 <a class='download-file' href=[[!inline pages="inc/stable_i386_iso_url" raw="yes"]]>
47 Tails [[!inline pages="inc/stable_i386_version" raw="yes"]] ISO image</a>
48 </p>
50 <h3>Cryptographic signature</h3>
52 [[!inline pages="lib/download_stable_i386_iso_sig" raw="yes"]]
54 <p>If you're not sure what the cryptographic signature is,
55 please read the part on [[verifying the ISO
56 image|download#verify]].</p>
58 <h3>Set up a web mirror</h3>
60 <p>If you're running a web server, you're most welcome to help us spread
61 Tails by [[setting up a web mirror|contribute/how/mirror]].</p>
63 </div> <!-- #http -->
65 <div id="bittorrent">
67 <h2>BitTorrent download</h2>
69 <h3>Latest release</h3>
71 <p>
72 <a class='download-file' href=[[!inline pages="inc/stable_i386_torrent_url" raw="yes"]]>
73 Tails [[!inline pages="inc/stable_i386_version" raw="yes"]] torrent</a>
74 </p>
76 <h3>Cryptographic signature</h3>
78 <p>The cryptographic signature of the ISO image is also included in the Torrent.</p>
80 <p>Additionally, you can verify the <a href=[[!inline
81 pages="inc/stable_i386_torrent_sig_url" raw="yes"]]>signature of
82 the Torrent file</a> itself before downloading it.</p>
84 <h3>Seed back!</h3>
86 <p>Seeding back the image once you downloaded it is also a nice
87 and easy way of helping spread Tails.</p>
89 </div> <!-- #bittorrent -->
91 </div> <!-- #download_the_image .container -->
93 <div id="verify">
95 <h1 class="bullet-number-three">Verify the ISO image</h1>
97 <p>It is important to check the <span class="definition">[[!wikipedia
98 Data_integrity desc="integrity"]]</span> of the ISO image you downloaded
99 to make sure that the download went well.</p>
101 <div class="caution">
102 <p>Those techniques rely on standard HTTPS and <span
103 class="definition">[[!wikipedia Certificate_authority desc="certificate
104 authorities"]]</span> to make you trust the content of this website.
105 But, [[as explained on our warning
106 page|doc/about/warning#man-in-the-middle]], you
107 could still be victim of a man-in-the-middle attack while using HTTPS.
108 On this website as much as on any other of the Internet.</p>
110 <p>As a consequence, <strong>they don't provide you with a
111 strong way of checking the ISO image <span
112 class="definition">[[!wikipedia Authentication
113 desc="authenticity"]]</span> and making sure you downloaded a genuine
114 Tails.</strong> In a dedicated section, we will propose you some more advanced
115 techniques to <a href="#authenticity-check">check the authenticity of
116 the ISO image</a>.</p>
117 </div>
119 <p><strong>All Tails ISO image are cryptographically signed by our
120 OpenPGP key.</strong>
121 OpenPGP is a standard for data encryption that provides cryptographic
122 privacy and authentication through the use of keys owned by its users.
123 Checking this signature is the recommended way of checking the ISO image
124 integrity.</p>
126 <p>If you already know how to use an OpenPGP key you can download it
127 straight away:</p>
129 [[!inline pages="lib/download_tails_signing_key" raw="yes"]]
131 <p>Otherwise, read our instructions to check the ISO image integrity:</p>
132 <ul>
133 <li>
134 [[!toggle id="verify_the_iso_image_using_gnome"
135 text="Using Linux with Gnome: Ubuntu, Debian, Tails, etc."]]
136 </li>
137 <li>
138 [[!toggle id="verify_the_iso_image_using_the_command_line"
139 text="Using Linux with the command line"]]
140 </li>
141 <li>
142 [[!toggle id="verify_the_iso_image_using_other_operating_systems"
143 text="Using other operating systems"]]
144 </li>
145 </ul>
147 [[!toggleable id="verify_the_iso_image_using_gnome" text="""
148 <span class="hide">[[!toggle id="verify_the_iso_image_using_gnome" text=""]]</span>
150 <h2>Using Linux with Gnome: Ubuntu, Debian, Tails, Fedora, etc.</h2>
152 [[!inline pages="doc/get/verify_the_iso_image_using_gnome" raw="yes"]]
154 """]]
156 [[!toggleable id="verify_the_iso_image_using_the_command_line" text="""
157 <span class="hide">[[!toggle id="verify_the_iso_image_using_the_command_line" text=""]]</span>
159 <h2>Using Linux with the command line</h2>
161 [[!inline pages="doc/get/verify_the_iso_image_using_the_command_line" raw="yes"]]
163 """]]
165 [[!toggleable id="verify_the_iso_image_using_other_operating_systems" text="""
166 <span class="hide">[[!toggle id="verify_the_iso_image_using_other_operating_systems" text=""]]</span>
168 <h2>Using other operating systems</h2>
170 [[!inline pages="doc/get/verify_the_iso_image_using_other_operating_systems" raw="yes"]]
172 """]]
174 <h2><a name="authenticity-check"></a>So how can I check better the ISO
175 image authenticity?</h2>
177 <p>But the Tails signing key that you downloaded from this website could
178 be a fake one if you were victim of a [[man-in-the-middle
179 attack|doc/about/warning#man-in-the-middle]].</p>
181 <p>Finding a way of trusting better Tails signing key would allow you to
182 authenticate better the ISO image you downloaded. The following page
183 will give you hints on how to increase the trust you can put in the
184 Tails signing key you downloaded:</p>
186 <ul>
187 <li>[[Trusting Tails signing key|doc/get/trusting_tails_signing_key]]</li>
188 </ul>
190 <!-- <h2>FIXME: What to do if the image is bad?</h2> -->
192 </div> <!-- #verify -->
194 <div id="media">
196 <h1 class="bullet-number-four">Burn a DVD or install onto a USB stick</h1>
198 <h2>Burning a DVD</h2>
199 <ul>
200 <li>DVDs are read-only so your Tails can't be altered by a virus or an
201 attacker.</li>
202 <li>DVDs are cheap but you will need to burn a new DVD each time you
203 will update your version of Tails.</li>
204 <li>You could also use a DVD-RW but those are not read-only.</li>
205 </ul>
207 <p>For detailed instructions on how to burn an ISO image under Linux,
208 Windows or Mac OS X you can consult <a
209 href="https://help.ubuntu.com/community/BurningIsoHowto">the
210 corresponding Ubuntu documentation</a>: just replace the Ubuntu ISO
211 image by the Tails ISO image you downloaded and ignore the part on
212 verifying the data integrity since you've already done that.</p>
214 <h2>Installing onto a USB stick</h2>
216 <p><strong>The content of the USB stick will be lost in the
217 operation.</strong></p>
219 <ul>
220 <li>An attacker with physical access to your USB stick or through a
221 virus could alter your Tails.</li>
222 <li>USB sticks can be reused across different versions of Tails.</li>
223 <li>You can store documents in the space left on the USB stick and
224 use persistence.</li>
225 <li>USB sticks are smaller to fit in your pocket.</li>
226 <li>Older computers might not be able to start from a USB stick.</li>
227 <li>This technique also works for <span
228 class="definition">[[!wikipedia SD_card desc="SD cards"]]</span>. Some
229 SD cards have a read-only switch that can prevent your Tails from
230 being altered. But be aware that this protection is most probably not
231 ensured by the SD card itself: do not rely on untrusted computers to
232 respect this feature.</li>
233 </ul>
235 <p>[[See the corresponding
236 documentation.|doc/first_steps/usb_installation]]</p>
238 </div> <!-- #support -->
240 <div id="stay_tuned">
242 <h1 class="bullet-number-five">Stay tuned</h1>
245 <strong>It's very important to keep your version of Tails up-to-date, otherwise
246 your system will be vulnerable to numerous security holes.</strong> The
247 development team is doing its best to release new versions fixing known
248 security holes on a regular basis.
249 </p>
251 <p>New versions are announced on our <a
252 href='https://mailman.boum.org/listinfo/amnesia-news'>news
253 mailing-list</a>. Drop your email address into this box, then hit the
254 button to subscribe:
256 <form method="POST" action="https://mailman.boum.org/subscribe/amnesia-news">
257 <input class="text" name="email" value=""/>
258 <input class="button" type="submit" value="Subscribe"/>
259 to the news mailing-list.
260 </form>
261 </p>
263 <p>There also are <a href='/torrents/rss/index.rss'>RSS</a> and
264 <a href='/torrents/rss/index.atom'>Atom</a> feeds that announce new
265 available BitTorrent files.</p>
267 <p>Refer to our [[security announcements|/security]] feed for more
268 detailed information about the security holes affecting Tails.
269 Furthermore you will be automatically notified of the security holes
270 affecting the version you are using at the startup of a new Tails
271 session.</p>
273 <p>Since Tails is based on Debian, it takes advantage of all the
274 work done by the Debian security team. As quoted from <a
275 href="http://security.debian.org/">(http://security.debian.org/)</a>:</p>
277 <blockquote>Debian takes security very seriously. We handle all
278 security problems brought to our attention and ensure that they are
279 corrected within a reasonable timeframe. Many advisories are coordinated
280 with other free software vendors and are published the same day a
281 vulnerability is made public and we also have a Security Audit team that
282 reviews the archive looking for new or unfixed security bugs.
283 </blockquote>
285 <blockquote>Experience has shown that "security through obscurity" does
286 not work. Public disclosure allows for more rapid and better solutions
287 to security problems. In that vein, this page addresses Debian's status
288 with respect to various known security holes, which could potentially
289 affect Debian.</blockquote>
291 </div> <!-- #stay_tuned-->
293 <div id="start">
295 <h1 class="bullet-number-six">Start Tails!</h1>
297 <p>Now that you have a Tails DVD or USB stick you can shutdown your
298 computer and start using Tails without altering your existing operating
299 system.</p>
301 <p><strong>If you're using a DVD:</strong> Put the Tails DVD into the
302 CD/DVD-drive and restart the computer. You should see a welcome screen
303 prompting you to choose your language.</p>
305 <p>If you don't get this menu, you can consult the Ubuntu documentation
306 about <a href="https://help.ubuntu.com/community/BootFromCD">booting
307 from the CD</a> for more information, especially the part on the <a
308 href="https://help.ubuntu.com/community/BootFromCD#BIOS%20is%20not%20set%20to%20boot%20from%20CD%20or%20DVD%20drive">
309 BIOS settings</a>.</p>
311 <p><strong>If you're using a USB stick:</strong> Shutdown the computer,
312 plug your USB stick and start the computer. You should see a welcome
313 screen prompting you to choose your language.</p>
315 <p>If your computer does not automatically do so, you might need to edit
316 the BIOS settings. Restart your computer, and watch for a message
317 telling you which key to press to enter the BIOS setup. It will usually
318 be one of F1, F2, DEL, ESC or F10. Press this key while your computer is
319 booting to edit your BIOS settings. You need to edit the Boot Order.
320 Depending on your computer you should see an entry for 'removable drive'
321 or 'USB media'. Move this to the top of the list to force the computer
322 to attempt to boot from USB before booting from the hard disk. Save your
323 changes and continue.</p>
325 <p>For more detailed instruction on how to boot from USB you can read <a
326 href="http://pcsupport.about.com/od/tipstricks/ht/bootusbflash.htm">About.com:
327 How To Boot your Computer from a Bootable USB Device</a></p>
329 <p>If you have problems accessing the BIOS, try to read <a
330 href="http://www.pendrivelinux.com/how-to-access-bios/">pendrivelinux.com:
331 How to Access BIOS</a></p>
333 </div><!-- #boot" -->
334 </div> <!-- #download -->