Get Started
To use Tails-MVT, download the latest release from Github releases. You may also build the image from source. To build Tails-MVT from source, see Building a Tails image.
1.1 Creating an installation media
After obtaining the image, flash it to a USB drive or SD card in order to create a bootable media. To do so we recommend using balenaEtcher. If flashing from Linux, you can use balenaEtcher, gnome-disk-utility
or dd
as described in Install Tails from Linux. If flashing from Windows or macOS, use can use balenaEtcher as described in Install Tails from Windows and Install Tails from macOS.
1.2 Booting Tails-MVT
Once the image has been flashed to the media, insert it into the laptop from which the analysis shall be conducted. Press f12 during boot (may vary from manufacturer) in order to select the USB media from boot options. You may need to disable secure boot and, or enable legacy mode in the BIOS settings. Once the image has booted, press Start Tails.
⚠️ IMPORTANT ⚠️
Not finding any indications of compromise does NOT mean your device is not infected. It just means that the public indicators of compromise was not matched with data extracted from your phone. The indicators are derived from forensic work and they are publicly available. This means the the spyware authors have access to them as well, and can rule them out of future spyware and infections.