@@ -235,9 +235,9 @@ The most recent [Tails audit](https://tails.net/news/audit_by_ROS/index.en.html)
In 2017, the FBI and Facebook worked together to develop a malicious video file [that deanonymized a Tails user](https://www.vice.com/en/article/v7gd9b/facebook-helped-fbi-hack-child-predator-buster-hernandez) after he opened it while using his home Wi-Fi.
For untrusted attachments, you would ideally **sanitize all files sent to you before opening them** with a program like [Dangerzone](https://dangerzone.rocks/), which takes potentially dangerous PDFs, office documents, or images and converts them into safe PDFs. Unfortunately, Dangerzone is [not yet readily available in Tails](https://gitlab.tails.boum.org/tails/tails/-/issues/18135). Until Dangerzone is made available in Tails, there is no program to sanitize untrusted files into trusted files.
For untrusted attachments, you would ideally use [Dangerzone](https://dangerzone.rocks/) to **sanitize all files sent to you before opening them**. Dangerzone takes untrusted PDFs, office documents, or images and turns them into trusted PDFs. See the [documentation](https://tails.net/doc/persistent_storage/additional_software/dangerzone/index.en.html) for how to install Dangerzone on Tails — unfortunately, it currently requires using the [command line](/glossary/#command-line-interface-cli).
**It is best to open untrusted files in a dedicated ['offline mode'](https://tails.net/doc/first_steps/welcome_screen/index.en.html#index3h2) Tails session**. This will prevent code execution from establishing a remote connection to the adversary, which is usually needed to further the attack. Shutting the session down immediately afterward will minimize the chance of malware persisting. However, the files will remain untrusted.
If you are not using Dangerzone, **it is best to open untrusted files in a dedicated ['offline mode'](https://tails.net/doc/first_steps/welcome_screen/index.en.html#index3h2) Tails session**. This will prevent code execution from establishing a remote connection to the adversary, which is usually needed to further the attack. Shutting the session down immediately afterward will minimize the chance of malware persisting. However, unless you use Dangerzone to sanitize the files, they will remain untrusted.