***[GIMP](https://www.gimp.org/)*** is an advanced picture editor.You can use it*GIMP* to edit, enhance, and retouch photos and scans, createdrawings, and make your own images.
If you are running Tails [[!inline pages="inc/stable_amd64_version" raw="yes" sort="age"]], continue with the next step.
7
a.If you are notrunning Tails[[!inline pages="inc/stable_amd64_version" raw="yes" sort="age"]]then you can continue with the next step. , click **Check for Upgrades**.
<p>If there is no option to connect to a Wi-Fi network, your Wi-Fi interface is not working in Tails. See our documentation on [[t<b>Wi-Fi</b> menu, your Wi-Fi interface might not be compatible with Tails. See [[Troubleshooting Wi-Fi notworking|no-wifi]].</p>
a. If there is an **Erase** tab in the right pane, click on it and then click on the <span class="bold"> Erase</span>**Erase** button on the bottom right
b. If there is an **Erase** button on the top middle, click on it.
17
[Tor](https://torproject.org/) is the best anonymity network available. TorTor has partnered with leading research institutions and has been subjected tointensive academic research. Tor has received awards from institutionssuch as the [EFF](https://www.eff.org/awards/pioneer/2012) and the [FreeSoftwareFoundation](https://www.fsf.org/news/2010-free-software-awards-announced).Even the NSA qualified Tor as "[the King of high secure, low latency InternetAnonymity](https://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity)."
Tor has partnered with leading research institutions and has been subjected to intensive academic research. Tor has received awards from institutions such as the [EFF](https://www.eff.org/awards/pioneer/2012) and the [Free Software Foundation](https://www.fsf.org/news/2010-free-software-awards-announced). Even the NSA qualified Tor as "[the King of high secure, low latency Internet Anonymity](https://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity)."
18
- **Encryption**<br /> No one else can read your instant messages. - **Authentication**<br /> You are assured the correspondent is who you think it is. - **Deniability**<br /> The messages you send do not have digital signatures that are checkable by a third party. Anyone can forge messages after a conversation to make them look like they came from you. However, during a conversation, your correspondent is assured the messages are authentic and unmodified. - **Perfect forward secrecy**<br /> If you lose control of your private keys, no previous conversation is compromised.
The messages you send do not have digital signatures that are checkable by a third party. Anyone can forge messages after a conversation to make them look like they came from you. However, during a conversation, your correspondent is assured the messages are authentic and unmodified.
Take note of the *device name* of your USB stick.In this example, the USB stick is 8.0 GB and its device name is <span class="codemmand-placeholder">/dev/disk1</span>.Yours might be different.
The <span class="pc-clone mac-clone">installation</span><span class="upgrade">upgrade</span> takes a few minutes.
29
The After the <span class="pc-clone mac-clone">installation</span> <span class="upgrade">upgrade</span> takes a few minutes. finishes, close <i>Tails Cloner</i>