<ul> <li>You can leave traces of your Tailsactivities in Tailson the hard disks.</li> <li>If Tails is compromised, a malware could install itself on your usual operating system.</li> <li>If an application in Tails is compromised, it could access private data on your disks and use it to de-anonymize you.</li> </ul>
<ul> <li>You can leave traces of your Tails activities on the hard disks.</li> <li>If Tails is compromised, a malware could install itself on your usual operating system.</li> <li>If an application in Tails is compromised, it could access private data on your disks and use it to deanonymize you.</li> </ul>
8
When starting Tails, [[set up an administration password|doc/first_steps/welcome_screen/administration_password/]].
When starting Tails, [[set up an administration password|doc/first_steps/welcome_screen/administration_password]].
17
<p>If your usual operating system is in hibernation, accessing it might corrupt your file system. Only access your disk if your system was shut down properentirely.</p>
<p>If your usual operating system is in hibernation, accessing it might corrupt your file system. Only access your disk if your system was shut down entirely.</p>
19
<p>If you have a GNU/Linux system on your disks, you can only access files owned by the first user (<code>uid=1000</code>with UID 1000) on that system.</p>