Security vulnerabilities in JavaScript have been used to [deanonymize TorBrowser in the past](https://arstechnica.com/information-technology/2013/08/attackers-wield-firefox-exploit-to-uncloak-anonymous-tor-users/).
For example, thanks to this confinement, even if an attacker manages to exploit a security vulnerability in *TorBrowser*, they wouldn't be able to access all the content of your Persistent Storage.
<p>To prevent Tails from running out of memory and crashing, download very big files to the <i>Persistent</i> folder. The files that youdownload outside of the Persistent Storage are stored in memory (RAM), which is more limited.</p>
<p>In [[Tails 6.14.1|news/version_6.14.1]] (April 2025), we improved the previous confinement andyou can now safely download to and read from any folder in your <i>Home</i> folder orPersistent Storage.</p>
This confinement relies on 2 security technologies: *[[!debwiki AppArmor]]* and the [XDG Desktop Portals](https://flatpak.github.io/xdg-desktop-portal/) of *Flatpak*.
It is impossible to hide to the websites that you visit that you are using Tor, because the [list of exit nodes of the Tornetworkis public](https://metrics.torproject.org/exonerator.html).