Parrot OS live vs Tails
Demir last edited by
Is Parrot OS as secure as Tails?
Tails is running from USB, loading to RAM so it means that it doesn't use local computer storage. After each start, Tails starts a new session and doesn't store files you had in previous sessions. It means that you can browse using flash drive where installed Tails on someone's computer, but he won't see anything of it because Tails worked in RAM, it erases each shut down.
Parrot OS is an operating system for pentesting, which has hacking and anonymity tools. You can use it from USB too: install .iso file into flash drive, and start it as "Live CD". After restart data was in that session won't appear.
Can you use Parrot OS live mode instead of Tails, will it be as private, or
Does Tails have another security and privacy features except routing all traffic through Tor?
Parrot is by definition a Penetration Testing oriented OS based on Debian. This basically means that is a distro with a bunch of repos + already installed applications useful for pentesting. On the other hand, we have Tails which is NOT a PT oriented distro, it is instead a privacy/anonymity oriented distro.
With this information, we can see that the main idea of the creators of Parrot was to do a pentesting distro and not a secure one in terms of privacity. therefore I would not recommend you using it if your idea is to preserve privacy. I would use Tails instead.
As another funny example of the security of the penetration testing images was the fact of the old Kali versions which had the root account with default very weak credentials (root:toor). Just because a distro was made to be used on penetration testing it does not mean necessarily that the distro itself is secure.