Update website PO files.
[tails/pzajda.git] / wiki / src / download.html
blobac0a11f58a462920bc965d9fd0e0814175e7e190
1 [[!meta title="Download, verify and install"]]
3 <strong>Tails is [[Free Software|doc/about/license]], you can download it, use it and
4 share it without restriction.</strong>
6 <div id="page-download">
8 [[!toc levels=1]]
10 <div id="first_time">
12 <h1 class="bullet-number-one">First time user?</h1>
14 <div class="caution">
16 <ul>
17 <li>If you don't know what a metadata or a man-in-the-middle attack
18 is.</li>
19 <li>If you think no-one can eavesdrop on your communications
20 because you are using Tor.</li>
21 <li>If you have no notion of how Tails works.</li>
22 </ul>
24 <p><strong>Then, check first the [[about]] and
25 [[warning|doc/about/warning]] pages to make sure that Tails is the right tool
26 for you and that you understand well its limitations.</strong></p>
28 </div>
30 </div>
32 <div id="download_iso" class="container">
34 <h1 class="bullet-number-two">Download the ISO image</h1>
36 <p>You will download Tails in the form of an <span
37 class="definition">[[!wikipedia ISO_image desc="ISO image"]]</span>: a
38 single file that you will later burn on a DVD or install onto a USB
39 stick or SD card.</p>
41 <div id="http">
43 <h2>Direct download</h2>
45 <h3>Latest release</h3>
47 <p>
48 <a class='download-file' href=[[!inline pages="inc/stable_i386_iso_url" raw="yes"]]>
49 Tails [[!inline pages="inc/stable_i386_version" raw="yes"]] ISO image</a>
50 </p>
52 <h3>Cryptographic signature</h3>
54 [[!inline pages="lib/download_stable_i386_iso_sig" raw="yes"]]
56 <p>If you're not sure what the cryptographic signature is,
57 please read the part on [[verifying the ISO
58 image|download#verify]].</p>
60 <h3>Set up a web mirror</h3>
62 <p>If you're running a web server, you're most welcome to help us spread
63 Tails by [[setting up a web mirror|contribute/how/mirror]].</p>
65 </div> <!-- #http -->
67 <div id="bittorrent">
69 <h2>BitTorrent download</h2>
71 <h3>Latest release</h3>
73 <p>
74 <a class='download-file' href=[[!inline pages="inc/stable_i386_torrent_url" raw="yes"]]>
75 Tails [[!inline pages="inc/stable_i386_version" raw="yes"]] torrent</a>
76 </p>
78 <h3>Cryptographic signature</h3>
80 <p>The cryptographic signature of the ISO image is also included in the Torrent.</p>
82 <p>Additionally, you can verify the <a href=[[!inline
83 pages="inc/stable_i386_torrent_sig_url" raw="yes"]]>signature of
84 the Torrent file</a> itself before downloading it.</p>
86 <h3>Seed back!</h3>
88 <p>Seeding back the image once you have downloaded it is also a nice
89 and easy way of helping spread Tails.</p>
91 </div> <!-- #bittorrent -->
93 </div> <!-- #download_the_image .container -->
95 <div id="verify">
97 <h1 class="bullet-number-three">Verify the ISO image</h1>
99 <p>It is important to check the <span class="definition">[[!wikipedia
100 Data_integrity desc="integrity"]]</span> of the ISO image you downloaded
101 to make sure that the download went well.</p>
103 <div class="caution">
105 <p>Those techniques rely on standard HTTPS and <span
106 class="definition">[[!wikipedia Certificate_authority desc="certificate
107 authorities"]]</span> to make you trust the content of this website.
108 But, [[as explained on our warning
109 page|doc/about/warning#man-in-the-middle]], you
110 could still be victim of a man-in-the-middle attack while using HTTPS.
111 On this website as much as on any other of the Internet.</p>
113 <p>As a consequence, <strong>they don't provide you with a
114 strong way of checking the ISO image <span
115 class="definition">[[!wikipedia Authentication
116 desc="authenticity"]]</span> and making sure you downloaded a genuine
117 Tails.</strong> In a dedicated section, we will propose you some more advanced
118 techniques to <a href="#authenticity-check">check the authenticity of
119 the ISO image</a>.</p>
121 </div>
123 <p><strong>All Tails ISO image are cryptographically signed by our
124 OpenPGP key.</strong>
125 OpenPGP is a standard for data encryption that provides cryptographic
126 privacy and authentication through the use of keys owned by its users.
127 Checking this signature is the recommended way of checking the ISO image
128 integrity.</p>
130 <p>If you already know how to use an OpenPGP key you can download it
131 straight away:</p>
133 [[!inline pages="lib/download_tails_signing_key" raw="yes"]]
135 <p>Otherwise, read our instructions to check the ISO image integrity:</p>
136 <ul>
137 <li>
138 [[!toggle id="verify_the_iso_image_using_gnome"
139 text="Using Linux with Gnome: Ubuntu, Debian, Tails, etc."]]
140 </li>
141 <li>
142 [[!toggle id="verify_the_iso_image_using_the_command_line"
143 text="Using Linux with the command line"]]
144 </li>
145 <li>
146 [[!toggle id="verify_the_iso_image_using_other_operating_systems"
147 text="Using other operating systems"]]
148 </li>
149 </ul>
151 [[!toggleable id="verify_the_iso_image_using_gnome" text="""
152 <span class="hide">[[!toggle id="verify_the_iso_image_using_gnome" text=""]]</span>
154 <h2>Using Linux with Gnome: Ubuntu, Debian, Tails, Fedora, etc.</h2>
156 [[!inline pages="doc/get/verify_the_iso_image_using_gnome" raw="yes"]]
158 """]]
160 [[!toggleable id="verify_the_iso_image_using_the_command_line" text="""
161 <span class="hide">[[!toggle id="verify_the_iso_image_using_the_command_line" text=""]]</span>
163 <h2>Using Linux with the command line</h2>
165 [[!inline pages="doc/get/verify_the_iso_image_using_the_command_line" raw="yes"]]
167 """]]
169 [[!toggleable id="verify_the_iso_image_using_other_operating_systems" text="""
170 <span class="hide">[[!toggle id="verify_the_iso_image_using_other_operating_systems" text=""]]</span>
172 <h2>Using other operating systems</h2>
174 [[!inline pages="doc/get/verify_the_iso_image_using_other_operating_systems" raw="yes"]]
176 """]]
178 <h2><a id="authenticity-check"></a>So how can I better check the ISO
179 image authenticity?</h2>
181 <p>The Tails signing key that you downloaded from this website could
182 be a fake one if you were victim of a [[man-in-the-middle
183 attack|doc/about/warning#man-in-the-middle]].</p>
185 <p>Finding a way of trusting better Tails signing key would allow you to
186 authenticate better the ISO image you downloaded. The following page
187 will give you hints on how to increase the trust you can put in the
188 Tails signing key you downloaded:</p>
190 <ul>
191 <li>[[Trusting Tails signing key|doc/get/trusting_tails_signing_key]]</li>
192 </ul>
194 <!-- <h2>FIXME: What to do if the image is bad?</h2> -->
196 </div> <!-- #verify -->
198 <div id="media">
200 <h1 class="bullet-number-four">Install or upgrade Tails</h1>
202 <h2>Upgrading a Tails USB stick or SD card</h2>
204 <p>If you already have a Tails device, USB stick or SD card, installed
205 using <span class="application">Tails Installer</span>, then follow our
206 [[upgrade instructions|doc/first_steps/upgrade]].</p>
208 <h2>Installing Tails</h2>
210 <p>You can either burn Tails onto a DVD or install it onto a USB stick or SD card.</p>
212 <h3>Burning a DVD</h3>
213 <ul>
214 <li>DVDs are read-only so your Tails can't be altered by a virus or an
215 attacker.</li>
216 <li>DVDs are cheap but you will need to burn a new DVD each time you
217 update your version of Tails.</li>
218 <li>You could also use a DVD-RW but those are not read-only.</li>
219 </ul>
221 <p>For detailed instructions on how to burn an ISO image under Linux,
222 Windows or Mac OS X you can consult <a
223 href="https://help.ubuntu.com/community/BurningIsoHowto">the
224 corresponding Ubuntu documentation</a>: just replace the Ubuntu ISO
225 image by the Tails ISO image you downloaded and ignore the part on
226 verifying the data integrity since you've already done that.</p>
228 <h3>Installing onto a USB stick or SD card</h3>
230 <p><strong>The content of the device will be lost in the
231 operation.</strong></p>
233 <ul>
234 <li>An attacker with physical access to your device or through a
235 virus could alter your Tails.</li>
236 <li>USB sticks and SD cards can be upgraded to future versions of Tails.</li>
237 <li>You can use [[persistence|doc/first_steps/persistence]]
238 and store your documents and configuration in an encrypted
239 persistent volume on the same device.</li>
240 <li>USB sticks and SD cards are smaller to fit in your pocket.</li>
241 <li>Some older computers might not be able to start from a USB stick or SD card.</li>
242 <li>Some USB sticks, SD cards, or SD card adapters have a
243 read-only switch that can prevent your Tails from
244 being altered, but be aware that this protection is most probably not
245 ensured by the device itself: do not rely on untrusted computers to
246 respect this feature.</li>
247 </ul>
249 <p>[[See the corresponding
250 documentation.|doc/first_steps/installation]]</p>
252 </div> <!-- #support -->
254 <div id="stay_tuned">
256 <h1 class="bullet-number-five">Stay tuned</h1>
259 <strong>It's very important to keep your version of Tails up-to-date, otherwise
260 your system will be vulnerable to numerous security holes.</strong> The
261 development team is doing its best to release new versions fixing known
262 security holes on a regular basis.
263 </p>
265 <p>New versions are announced on our <a
266 href='https://mailman.boum.org/listinfo/amnesia-news'>news
267 mailing-list</a>. Drop your email address into this box, then hit the
268 button to subscribe:
270 <form method="POST" action="https://mailman.boum.org/subscribe/amnesia-news">
271 <input class="text" name="email" value=""/>
272 <input class="button" type="submit" value="Subscribe"/>
273 to the news mailing-list.
274 </form>
275 </p>
277 <p>There also are <a href='/torrents/rss/index.rss'>RSS</a> and
278 <a href='/torrents/rss/index.atom'>Atom</a> feeds that announce new
279 available BitTorrent files.</p>
281 <p>Refer to our [[security announcements|/security]] feed for more
282 detailed information about the security holes affecting Tails.
283 Furthermore you will be automatically notified of the security holes
284 affecting the version you are using at the startup of a new Tails
285 session.</p>
287 <p>Since Tails is based on Debian, it takes advantage of all the
288 work done by the Debian security team. As quoted from <a
289 href="http://security.debian.org/">(http://security.debian.org/)</a>:</p>
291 <blockquote>Debian takes security very seriously. We handle all
292 security problems brought to our attention and ensure that they are
293 corrected within a reasonable timeframe. Many advisories are coordinated
294 with other free software vendors and are published the same day a
295 vulnerability is made public and we also have a Security Audit team that
296 reviews the archive looking for new or unfixed security bugs.
297 </blockquote>
299 <blockquote>Experience has shown that "security through obscurity" does
300 not work. Public disclosure allows for more rapid and better solutions
301 to security problems. In that vein, this page addresses Debian's status
302 with respect to various known security holes, which could potentially
303 affect Debian.</blockquote>
305 </div> <!-- #stay_tuned-->
307 <div id="start">
309 <h1 class="bullet-number-six">Start Tails!</h1>
311 <p>Now that you have a Tails device you can shutdown your
312 computer and start using Tails without altering your existing operating
313 system.</p>
315 <p><strong>If you are using a DVD:</strong> Put the Tails DVD into the
316 CD/DVD-drive and restart the computer. You should see a welcome screen
317 prompting you to choose your language.</p>
319 <p>If you don't get this menu, you can consult the Ubuntu documentation
320 about <a href="https://help.ubuntu.com/community/BootFromCD">booting
321 from the CD</a> for more information, especially the part on the <a
322 href="https://help.ubuntu.com/community/BootFromCD#BIOS%20is%20not%20set%20to%20boot%20from%20CD%20or%20DVD%20drive">
323 BIOS settings</a>.</p>
325 <p><strong>If you are using a USB stick or SD card:</strong> Shutdown the computer,
326 plug your device and start the computer. You should see a welcome
327 screen prompting you to choose your language.</p>
329 <p>If your computer does not automatically do so, you might need to edit
330 the BIOS settings. Restart your computer, and watch for a message
331 telling you which key to press to enter the BIOS setup. It will usually
332 be one of F1, F2, DEL, ESC or F10. Press this key while your computer is
333 booting to edit your BIOS settings. You need to edit the Boot Order.
334 Depending on your computer you should see an entry for 'removable drive'
335 or 'USB media'. Move this to the top of the list to force the computer
336 to attempt to start from your device before starting from the internal hard disk. Save your
337 changes and continue.</p>
339 <p>For more detailed instruction on how to boot from USB you can read <a
340 href="http://pcsupport.about.com/od/tipstricks/ht/bootusbflash.htm">About.com:
341 How To Boot your Computer from a Bootable USB Device</a></p>
343 <p>If you have problems accessing the BIOS, try to read <a
344 href="http://www.pendrivelinux.com/how-to-access-bios/">pendrivelinux.com:
345 How to Access BIOS</a></p>
347 </div><!-- #boot" -->
348 </div> <!-- #download -->