Using a public Tor relay as your first Tor relay makes it clear to your local network that you are connecting to Tor, while still keeping your online activity secure and anonymous.
<p>You can learn more about our security assessment of this time synchronization in our [[design documentation about non-Tor traffic|contribute/design/Tor_enforcement#non-tor-traffic]].</p>
If Tails fails to synchronize the clock because you have to sign in to the network using a captive portal, an error screen is displayed that helps you do so.
<p>Tails uses the [[default <i>obfs4</i> bridges from <i>Tor Browser</i>|https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/blob/main/projects/tor-expert-bundle/pt_config.json?ref_type=heads]].</p>
<p>It is impossible to hide to the websites that you visit that you are using Tor, because the <a href="https://metrics.torproject.org/exonerator.html">list of exit nodes of the Tornetwork</a> is public.</p>
Our team is doing its best to help you connect to Tor using the most discreet types of Tor bridges. That is why, when you decide to hide that you are connecting to Tor:
To save the last Tor bridge that connected to Tor successfully, turn on the [[Tor Bridge|persistent_storage/configure#bridge]] feature of the Persistent Storage.
<ul> <li>Allowing you to request a bridge from Tails by solving a CAPTCHA. ([[!tails_ticket 15331]])</li> <li>Supporting <i>Snowflake</i> bridges. ([[!tails_ticket 5494]])</li> </ul>