. "For example, there is a bootable CD called Tails, and the idea is you run Linux, and all your traffic routes over Tor, so you do not have something like Adobe Flash trying to update itself, and then the NSA or someone else gets to perform what is called a man in the middle attack." . . .