Source Priority Failing checks
[[!meta title="Warnings about the Persistent Storage"]]
Medium
[[!toc levels=1]]
Medium
<a id="sensitive_documents"></a>
Medium
Storing sensitive documents
Medium
The Persistent Storage is not hidden. An attacker in possession of your USB stick can know that there is a Persistent Storage on it. Take into consideration that you can be forced or tricked to give out its passphrase.
Medium
Read also our instructions to [[securely delete the Persistent Storage|delete]].
Medium
<a id="overwriting_configurations"></a>
Medium
Overwriting configurations
Medium
You can weaken your security or break some programs if you use the Persistent Storage to overwrite their settings. The programs included in Tails are carefully configured with security in mind. Be especially careful when using the [[Dotfiles|persistence/configure#dotfiles]] feature.
Medium
The anonymity of Tor and Tails relies on making it harder to distinguish one Tails user from another. In some cases, changing the default settings can break your anonymity.
Medium
<a id="minimum"></a>
Medium
Use to the minimum
Medium
Use the Persistent Storage only when necessary and to the minimum:
Medium
Only unlock the Persistent Storage when you need it.
Medium
Only turn on the features of the Persistent Storage that you need.
Medium
Only the files and folders that you specify are saved in the Persistent Storage.
Medium
<a id="open_other_systems"></a>
Medium
Opening the persistent volume from other operating systems
Medium
You can compromise your security if you open the Persistent Storage from another operating system.
Medium
For example, another operating system might create thumbnails of images or index the contents of files in the Persistent Storage.
Medium