<span class="application">[Tor Browser](https://www.torproject.org)</span> is a web browser based on [Mozilla Firefox](https://www.mozilla.org/firefox/) but configured to protect your privacy.
Security vulnerabilities in JavaScript have been used to [deanonymize Tor Browser in the past](https://arstechnica.com/information-technology/2013/08/attackers-wield-firefox-exploit-to-uncloak-anonymous-tor-users/).
For example, thanks to this confinement, even if an attacker manages to exploit a security vulnerability in *Tor Browser*, they wouldn't be able to access all the content of your Persistent Storage.
<p>To prevent Tails from running out of memory and crashing, download very big files to the <i>Persistent/Tor Browser</i> folder. The files that you download outside of the Persistent Storage are stored in memory (RAM), which is more limited.</p>
<p>In [[Tails 6.14.1|news/version_6.14.1]] (April 2025), we improved the previous confinement and you can now safely download to and read from any folder in your <i>Home</i> folder or Persistent Storage.</p>