Use a Secure (and FREE) Computer for Banking and all other Finances

Have you ever wondered how secure your computer is? Well – believe it or not, hackers may be watching your computer and recording your every click! Any electronic device with on-line access can be vulnerable. Most hackers steal information from your computer’s usage history. That is, a hacker can log into your computer today and find passwords and other personal information you entered days or even weeks ago.

Another problems is the security “holes” in your computer’s operating system and especially in the web browser you use. Internet Explorer on Windows has the worst security history of any web browser but none of the others are perfect.

Finally, usage of an insecure Internet connection can be tapped by hackers. Using an SSL (Secure Sockets Layer) connection is good but using a Tor connection is even better. Some people prefer to use I2P encrypted networking, another highly secure option. (Information about SSL encrypted connections may be found at while information about Tor network may be found at and information about I2P may be found at

There are easy (and cheap!) solutions to keep your movements from being tracked. The recommendations may sound complex and expensive but I can tell you how to implement very high security at no cost or, if you don’t want to do any techie work at all, at very low cost. You can get “another computer” without buying any hardware. My recommendations are:

1. Never use Windows. Even Macintosh is not perfect. Instead, use a more secure operating system, such as Linux.

2. Never use Internet Explorer as the web browser.

3. Always use Tor networking or I2P networking for a very secure and encrypted connection to other web sites.

4. Only use your high-security computer when absolutely necessary, such as when connecting to your bank account or to an online stock brokerage account. At all other times, shut that computer down and leave it off. Hackers cannot access a computer that is powered off!

Yes, you can have a “second computer” at little or no cost. Only use the second computer when reading or making financial transactions. Leave it powered off at all other times so that no one can access and read stored information on that second computer. Even better, use a “second computer” that doesn’t store anything!

Here’s the solution: the TAILS Operating System

Tails is a Linux live operating system that you can start on almost any computer from a DVD, USB stick, or SD card. If you have a Windows or Macintosh computer, you can use a Tails CD, flashdrive, SecureDigital card, or an external USB hard drive. Install the Tails operating system onto that external device and then boot from that device. If you don’t want to install Tails itself or if you do not possess the technical knowledge to install Tails by yourself, you can even purchase a flashdrive or DVD with the Tails operating system already installed.

Tails stands for “The Amnesiac Incognito Live System.” It is “amnesiac” because it remembers nothing. It does not remember your web browsing history, your passwords, or even your name. Using Tails means your computer will:

  • use the Internet anonymously and circumvent censorship;
  • all connections to the Internet are forced to go through the Tor network or (optionally) the I2P network;
  • leave no trace on the computer you are using unless you ask it explicitly;
  • use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.

Once you have the Tails flashdrive or CD or whatever media you choose, insert the device into your computer and reboot. Make sure your computer is configured to boot from the flashdrive, CD, SecureDigital Card or external disk drive. If not, you may need to change your BIOS setting as described at and at

Your computer will then boot from Tails and not use your current Windows or Macintosh operating system at all. In essence, your Tails device creates a new, second computer that contains no history from your first (Windows or Macintosh) computer.

Yes, you might have only one physical computer, but it becomes two separate computers when you use two different operating systems. In addition, Tails is so highly secure that it is unlikely that any hacker will ever be able to access your “second computer” that is using Tails. However, if a very sophisticated hacker ever finds a way to do to access a computer running Tails (which is highly unlikely), he or she still will not be able to read any information stored on your computer’s internal Windows or Macintosh hard drive as those drives are inaccessible from Tails unless you, the local user, take specific steps to make them available.

When finished with your online financial instructions, boot down the Tails operating system and remove the flashdrive/CD/SecureDigital card or external hard drive. Your “second computer” is now shut down. No hacker can ever access a computer that is not running. You may then turn the computer back on and boot back into Windows or Macintosh operating system normally. No trace of your information from the Tails “second computer” will be left on your computer’s internal hard drive.

Yes, you will now have a second logical computer that does not read or write any information from your normal (“first computer”) hard drive. Creating a bootable Tails disc is a simple process and a great use for one of those USB drives you have laying around doing nothing. Since you can use Tails on almost any public computer you run into, it’s a great way to keep your browsing and usage hidden from the world. It’s even beneficial on your home computer since you don’t have to alter your system in any way.

Of course, nothing is ever perfect. With Tails or with any other computer operating system, there is no magic or perfect solution to security. You always need to be aware of any operating system’s limitations. For Tails, those limitations are well documented at Even with those limitations, Tails probably is the most secure operating system available today. It was even used by Eric Snowden to evade the NSA and he has since recommended Tails to everyone in various interviews. See for details.

More information about Tails may be fond on the Tails web site at:

The cost?

Either free or very low cost, depending upon which method you use to obtain a flashdrive, CD, SecureDigital card or external hard drive with the Tails operating system installed.

If you have a spare flash drive or an external hard drive that is not being used for some other purpose, use that. Tails requires very little space on the flash drive or other media so you probably already have whatever you need. Instructions for installing Tails on a flashdrive or CD may be found on the Tails web site, starting at Installation on a Macintosh is described at

If you are not comfortable with downloading and installing ISO images, you can purchase a ready-made Tails flash drive or DVD for a few dollars from a number of different sources. Of course, that leaves you at the mercy of the person(s) who created the flashdrive or CD or DVD. It is theoretically possible, although doubtful, that the person who created the Tails bootable device could have installed some “extra software” to spy on you. I would suggest the risk is small but still is not a zero risk. In any case, using Tails from any source is always a much, much lower risk than running Windows!

You can purchase Tails already installed on a DVD disk or on a flashdrive from, a well-known and trusted provider, at Prices vary from $5.95 for a DVD disk to $49.95 for a high-capacity flash drive. Since Tails doesn’t require much storage space on the flashdrive, I would recommend the 8-gigabyte flashdrive that sells for $14.95. (NOTE: These will boot on a Windows computer but not on a Macintosh.)

Tails is also available from a number of vendors on although the reliability of most of the eBay vendors is not known.

More information about Tails may be found at

Who is watching your online transactions today?

6 thoughts on “Use a Secure (and FREE) Computer for Banking and all other Finances

  1. Rather than go through all that booting down and up, why not just use an older computer I recently replaced. I have an old laptop with Windows Vista collecting dust in the closet. Could I use that, turning it on only when I need to do my online banking?


    • —> Could I use that, turning it on only when I need to do my online banking?

      Yes, but I would never do that because:

      1. It runs Windows, an inherently insecure operating system. Even worse, it runs a rather old version of Windows which does not have the latest security updates.

      2. It probably is not running the Tor network or I2P secure network. However, you certainly could add one of those.

      3. Windows always leaves private information behind on the computer’s hard drive that a hacker might access, unless you install Tor networking and use the Tor browser.

      4. Finally, Windows Vista does not have state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.

      Still, the older computer does have some great security available if you use Tails on it. I’d suggest creating a Tails CD or flashdrive and then inserting it into the older Windows system. Boot up with Tails and you will have all the security items that are not present in Windows.

      Liked by 1 person

      • Your last advice is what I had in mind. I hate Vista and have thought of installing a linux (or similar) OS on it but never got around to that. Thanks


      • Perfect.

        I’d suggest you first boot from a flashdrive or CD or DVD. It it turns out you like the Tails operating system, you then might think about reformatting the entire hard drive (which will erase Windows) and installing Tails on it. The result will be a Tails computer that runs faster than running the same operating system from a flashdrive or a CD or DVD.

        Liked by 1 person

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.