<ul> <li>You can leave traces of your Tails activities in Tailson the hard disks.</li> <li>If Tails is compromised, a malware could install itself on your usual operating system.</li> <li>If an application in Tails is compromised, it could access private data on your disks and use it to de-anonymize you.</li> </ul>
<ul> <li>You can leave traces of your Tails activities on the hard disks.</li> <li>If Tails is compromised, a malware could install itself on your usual operating system.</li> <li>If an application in Tails is compromised, it could access private data on your disks and use it to deanonymize you.</li> </ul>
11
Click on the hard disk of your choice in the lefright pane.
Click on the hard disk of your choice in the right pane.
14
<p>If you have a GNU/Linux system on your disks, you can only access files owned by the first user (<code>uid=1000</code>with UID 1000) on that system.</p>