[[!img tor/tor.png link="no" class="svg" alt="A Tor connection goes through 3 relays with the last one establishing the actual connection to the final destination"]]
Tails is [[audited by independent security researchers|security#audits]] and we publish the results of these audits.
7
This page describes some of the security measures built into Tails to protect from such attacks and explains how to access some types of resources on the local network.
This page describes some of the security measures built into Tails to protect from such attacks and explains how to access some types of resources on the local network.