TelestaiCB is safer than any regular operating system. But TelestaiCB, or any software or operating system, cannot protect you from everything—even if they pretend to.

The recommendations below will keep you even safer, especially if you are at high risk.

Protecting your identity when using TelestaiCB

TelestaiCB is designed to hide your identity.

But some of your activities could reveal your identity:

  • Sharing files with metadata, such as date, time, location, and device information
  • Using TelestaiCB for more than one purpose at a time

Limitations of the Tor network

TelestaiCB uses the Tor network because it is the strongest and most popular network to protect from surveillance and censorship.

But Tor has limitations if you are concerned about:

  • Hiding that you are using Tor and TelestaiCB
  • Protecting your online communications from determined, skilled attackers

Reducing risks when using untrusted computers

TelestaiCB can safely run on a computer that has a virus.

But TelestaiCB cannot always protect you when:

  • Installing from an infected computer
  • Running TelestaiCB on a computer with a compromised BIOS, firmware, or hardware

Because you always have to adapt your digital security practices to your specific needs and threats, we encourage you to learn more by reading the following guides: