The rapid development cycle of Ubuntu would be too fast for Tails.
18
Ubuntu adds features in ways that we find dangerous for privacy. For anexampleUbuntu One ([partly discontinued](http://blog.canonical.com/2014/04/02/shutting-down-ubuntu-one-file-services/))and the [, see [EFF: Privacy in Ubuntu 12.10,Amazon aAds and dData lLeaks](https://www.eff.org/deeplinks/2012/10/privacy-ubuntu-1210-amazon-ads-and-data-leaks).
Ubuntu adds features in ways that we find dangerous for privacy. For an example, see [EFF: Privacy in Ubuntu 12.10, Amazon Ads and Data Leaks](https://www.eff.org/deeplinks/2012/10/privacy-ubuntu-1210-amazon-ads-and-data-leaks).
42
<h2 id="permanent-installunetbootin">Can I install Tails permanently onto my hard diskwith UNetbootin, YUMI, Ventoy, or another tool?</h2>
<h2 id="upgrade">Should I updateTails using <code>apt upgrade</code>or<i>Synaptic</i>?</h2>
55
It is notimpossible to verify the integrity of a Tails device when running Tails from this same device. ThisUSB stick or DVD while running Tails from it. It would be like asking tosomeone whether she is a liar; the answer ofthey are lying: a true liar would always be "no"pretend to tell the truth.
It is impossible to verify the integrity of a TailsUSB stickor DVD while running Tails from it. It would be like asking someone whether they are lying: a true liar would always pretend to tell the truth.
62
<h2 id="javascript">Why is JavaScript enabled by default in <span class="application"i>Tor Browser</spani>?</h2>
4. They can break your anonymity by making your browsing behaviour distinguishable from other Tails users.
74
Unless proven otherwise, no add-on, apart from the ones already included in Tails, haves been seriously audited and should be considered safe to use in this context.
Unless proven otherwise, no add-on, apart from the ones already included in Tails, has been seriously audited and should be considered safe to use in this context.
75
<div class="next"> <ul> <li>[[Warnings about persistence|doc/first_steps/persistence/warnings#index3h1]]</li> <li>[[Browsing the web with Iceweasel<i>Tor Browser</i>|doc/anonymous_internet/Tor_browser]]</li> <li>[[Can I hide the fact that I am using Tails?|doc/about/fingerprint/]]</li> </ul> </div>
Updating add-ons in *TorBrowser* might break the security built into Tails.
82
As explained in our documentation about [[thefingerprinting|doc/about/of *Tor Browser* in Tails|doc/anonymous_internet/Tor_Browser#fingerprint]], Tails provides anonymity on the webby making it difficult to distinguish a particular user amongst all the users of Tails and the Tor Browser Bundle (TBByou from other users of *Tor Browser* (either in Tails or on other operating systems).
As explained in our documentation about [[the fingerprint of *TorBrowser* in Tails|doc/anonymous_internet/Tor_Browser#fingerprint]], Tails provides anonymity by making it difficult to distinguish you from other users of *TorBrowser* (either in Tailsor on other operating systems).
83
So, the information retrieved by such fingerprinting websites is not harmful for anonymity in itself, as long as it is the same for all Tor usersusers of *Tor Browser*.
So, the information retrieved by such fingerprinting websitesis not harmful for anonymity in itself, as long as it is the same for all users of *TorBrowser*.
104
<h2 id="htp">Why does Tails automatically connect to severalwebsites when starting?</h2>