Do not plug in your TailsUSB stick while another operating system is running on the computer.
13
YourThe computer might be compromised if its physical components have been altered.For example, if a keylogger has been physically installed on yourthe computer, your passwords, personal information, and other data typed on yourthe keyboard could be stored and accessed by someone else, even if you are using Tails.
The computer might be compromised if its physical components have been altered.For example, if a keylogger has been physically installed on the computer, your passwords, personal information, and other data typed on the keyboard could be stored and accessed by someone else, even if you are using Tails.
17
Use the [[Sscreen Kkeyboard|doc/encryption_and_privacy/virtual_first_steps/accessibility#keyboard]], if you are using a public computer or worry that the computer might have a keylogger.
Use the [[screen keyboard|doc/first_steps/accessibility#keyboard]], if you are using a public computer or worry that the computer might have a keylogger.
Other hardware alterations are much more complicated and expensive to install. For an example, see <a href="https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/">Ars Technica: Photos of an NSA “upgrade” factory show Cisco router getting implant</a>.