First Setup Flow Chart

First Setup Flow Chart

Yes

No

Start: Practical Session Begins

Controlled Physical Environment

Device Isolation Check

Peripheral Awareness

Camera & Mic Exposure Mitigation

Trusted USB Media Identified

Tails OS Image Acquired

Image Authenticity & Integrity Verified

Bootable Media Creation

Boot Media Validation

Target System Power-On

Firmware / Boot Menu Access

Tails OS Boot Selected

Tails Welcome Screen

Language & Keyboard Context

Network Mode Awareness

Unsafe Defaults Recognition

Hardware Detection Phase

Internal Wi-Fi Evaluation

External Wi-Fi Adapter Attached

Wireless Network Environment Assessment

Public vs Private Network Context

Captive Portal Detection

Router Visibility Awareness

Network Connection Attempt

Tor Service Initialization

Tor Bootstrap Process

Directory Authorities Contacted

Circuit Material Retrieved

Tor Circuit Construction

Entry Guard Assigned

Relay Path Established

Tor Network Connected

Tails Desktop Loaded

System Status Verification

Tor Status Confirmation

Persistent Storage Decision

Persistent Volume Created

Persistence Features Selected

Volatile Session Continues

Cryptographic Context Awareness

GPG Presence Observed

Wallet Environment Considered

Tor Browser Launched

Tor Connectivity Verified

Security Level Awareness

Initial Identity Context Established

First Onion Navigation

Clear-Net vs Onion Distinction

Unsafe URL Recognition

Darknet Search Engine Access

Search Query Entered

Search Results Evaluated

Dead Links Identified

Clone / Scam Patterns Observed

First Practical Search Completed

Session Awareness Maintained

Safe Session Termination

End: First Hands-On Practical Complete

docs