Releases
========
Tails 0.22.1 was released on February 4.
Metrics
=======
- Tails has been started more than 222 134 times in February.
This make 7 933 boots a day in average.
- 453 082 downloads of the OpenPGP signature of Tails ISO.
- 92 reports were received through WhisperBack.
Code
====
New features
------------
- Great progress was made towards better integrated, and more usable,
support for using Tor bridges (ticket #5479). This implied working
with the TBB team to improve Tor Launcher, so that we can start it as
a standalone XUL application, instead of as a browser add-on.
<
https://git-tails.immerda.ch/tails/log/?h=feature/bridge-mode>
<
https://labs.riseup.net/code/issues/5479>
- MAC spoofing support was completed and merged (ticket #5421).
<
https://tails.boum.org/contribute/design/MAC_address/>
<
https://git-tails.immerda.ch/tails/log/?h=feature/spoof-mac>
<
https://labs.riseup.net/code/issues/5421>
- Phase four of incremental upgrades was completed (ticket #6508).
<
https://git-tails.immerda.ch/tails/log/?h=feature/6508-incremental-upgrades-phase-four>
<
https://labs.riseup.net/code/issues/6508>
- One may now start IBus manually in locales environment where it is
disabled by default (ticket #6656).
<
https://git-tails.immerda.ch/winterfairy/tails/log/?h=bugfix/allow-ibus-start>
<
https://labs.riseup.net/code/issues/6656>
- Ship a 64-bit kernel in replacement for the 686-pae one
(ticket #5456).
<
https://git-tails.immerda.ch/tails/log/?h=feature/amd64-kernel>
<
https://labs.riseup.net/code/issues/5456>
- The branch to stop creating auto-login text consoles was merged
(ticket #5588).
<
https://git-tails.immerda.ch/tails/log/?h=5588-no-autologin-consoles>
<
https://labs.riseup.net/code/issues/5588>
- Support for persistence of I2P state was drafted (ticket #5544).
<
http://repo.or.cz/w/tails/kytv.git/shortlog/refs/heads/feature/i2p-persistence>
<
https://labs.riseup.net/code/issues/5544>
- The website lock down was merged and deployed.
<
https://git-tails.immerda.ch/tails/log/?h=feature/cleanup-ikiwiki-setup>
- A branch to stop installing Cookie Monster was prepared
(ticket #6790).
<
https://git-tails.immerda.ch/tails/log/?h=feature/6790-remove-cookie-monster>
<
https://labs.riseup.net/code/issues/6790>
- Some initial work to improve the Greeter's administration password
interface was done (ticket #5594).
Software updates
----------------
- I2P has been updated to 0.9.11 (ticket #6696).
<
https://labs.riseup.net/code/issues/6696>
- We have uploaded Pidgin 2.10.9 to squeeze-backports, and we now
install it from there (ticket #6661).
<
https://labs.riseup.net/code/issues/6661>
- Install Poedit from squeeze-backports-sloppy, where we have
uploaded it some time ago (ticket #6456).
<
https://git-tails.immerda.ch/tails/log/?h=feature/poedit-from-backports>
<
https://labs.riseup.net/code/issues/6456>
- The fact that Linux 3.12 is not in Debian unstable anymore was taken
into account.
<
https://git-tails.immerda.ch/tails/log/?h=bugfix/linux-kbuild-3.12-from-testing>
- The branch that installs Linux 3.13 was updated.
<
https://git-tails.immerda.ch/tails/log/?h=feature/linux-3.13>
Bug and regression fixes
------------------------
- The Intel Management Engine Interface driver was disabled. This fixes
memory wiping at shutdown (ticket #6460) on some, if not all, hardware.
<
https://git-tails.immerda.ch/tails/log/?h=feature/disable-mei>
<
https://labs.riseup.net/code/issues/6460>
- The possibility to switch identities in the Tor Browser was added
back (ticket #6383).
<
https://git-tails.immerda.ch/winterfairy/tails/log/?h=bugfix/torbutton-new-identity>
<
https://labs.riseup.net/code/issues/6383>
- An issue that lead to releasing needlessly big ISO images was
resolved (ticket #6390).
<
https://git-tails.immerda.ch/tails/log/?h=bugfix/6390-dont-include-APT-lists-and-cache-in-the-ISO>
<
https://labs.riseup.net/code/issues/6390>
- feature/create-additional-software-config was merged.
<
https://git-tails.immerda.ch/tails/log/?h=feature/create-additional-software-config>
Towards Tails based on Debian Wheezy
------------------------------------
- I2P packages compatible with Debian Wheezy were prepared, and are
now installed in the feature/wheezy branch.
<
https://git-tails.immerda.ch/tails/log/?h=feature/wheezy>
- Application launchers were added to the GNOME panel.
- A launcher to start the documentation viewer was added to the
applications menu.
- A more standard icon is used for the shutdown button.
Documentation, website and localization
=======================================
- Icons for the different roles on the Contribute section were
finalized and deployed live.
<
https://tails.boum.org/contribute/>
- The blueprint/FAQ was greatly expanded, and is now almost ready
for prime-time.
<
https://tails.boum.org/blueprint/faq/>
- We have made good progress on specifying how the Tails logo should
look like (ticket #5797).
<
https://labs.riseup.net/code/issues/5797>
- It was documented how to improve Tails by working on
Debian. We have received positive feedback
from Debian contributors about it.
<
https://tails.boum.org/contribute/how/debian/>
- Many small improvements to the documentation and its translations
were done, including:
* quite a few clarifications in the documentation for new
contributors;
* updated system requirements documentation;
<
https://git-tails.immerda.ch/tails/log/?h=doc/system_requirements_improvements>
* documented how to change the passphrase for the
persistent volume (ticket #5621).
<
https://git-tails.immerda.ch/tails/log/?h=doc/change_persistence_passphrase>
<
https://labs.riseup.net/code/issues/5621>
- Links to the I2P website were updated.
<
http://repo.or.cz/w/tails/kytv.git/shortlog/refs/heads/bugfix/new-i2p-site>
- Documentation for the new MAC address spoofing feature was drafted.
- Work is in progress on documentation about contributing to Tails in
the infrastructure (systems administration, automation) area.
Infrastructure
==============
- Our Puppet modules were published. This was a first blocker before we
can welcome contributions to our infrastructure.
<
https://git-tails.immerda.ch/>
- The system that hosts our Redmine was re-installed from scratch on a
new machine, upgraded to Debian Wheezy and to Redmine 1.4.4.
<
https://labs.riseup.net/code/projects/tails/issues?query_id=108>
- Some improvements to our automated test suite were merged:
test/fix-persistence-checks, test/keep-volumes-tag, and
test/5959-antitest-memory-erasure.
Thanks to this and the robustness improvements brought by the move
to RJB, we were finally able to remove two of the most painful sets
of tests from our manual test suite.
<
https://git-tails.immerda.ch/tails/log/?h=test/fix-persistence-checks>
<
https://git-tails.immerda.ch/tails/log/?h=test/keep-volumes-tag>
<
https://git-tails.immerda.ch/tails/log/?h=test/5959-antitest-memory-erasure>
- A mailing-list for early testers was created and is being set up.
On-going discussions
====================
- Usecases for the Cookie Monster browser extension?
<
https://mailman.boum.org/pipermail/tails-dev/2014-February/004804.html>
- Tails logo
<
https://mailman.boum.org/pipermail/tails-dev/2014-February/004841.html>
- How to remove identifying information in bug reports?
<
https://mailman.boum.org/pipermail/tails-dev/2014-February/004984.html>
- Numlock on by default?
<
https://mailman.boum.org/pipermail/tails-dev/2014-February/004986.html>
- Various issues with Vagrant
<
https://mailman.boum.org/pipermail/tails-dev/2014-February/004923.html>
<
https://mailman.boum.org/pipermail/tails-dev/2014-February/005042.html>
- Interactions between Tails and TBB developers
<
https://mailman.boum.org/pipermail/tails-dev/2014-February/004885.html>
- Adding BitMessage and Bitcoin-QT to Tails
<
https://mailman.boum.org/pipermail/tails-dev/2014-February/004850.html>
- MAC address 'spoofing' and randomization
<
https://mailman.boum.org/pipermail/tails-dev/2014-February/004842.html>
- Adapting Tor Launcher for Tails
<
https://mailman.boum.org/pipermail/tails-dev/2014-February/004819.html>
- We were contacted by a few people who want to use Tails as
a flexible framework, and build customized derivatives on top of it.
- We are discussing who we will invite to the 2014 Tails contributors
summit, that should be a bit more crowded than usual.
Funding
=======
- We have discussed with GNOME how they could use the money they have
raised for privacy and anonymity improvements.
Outreach
========
- We have been working with people who want to build bridges between
the graphics designers and usability experts community on the one
hand, and Free Software developers on the other hand. Thanks to this
collaboration, it is likely that Tails will go through a usability
study in a few months, followed by a hackfest that will put at work
designers and usability experts for finding solutions to (some of)
the identified issues. The Tails sprint in July might host
this hackfest.
- One of us attended FOSDEM, and got a chance to talk with many
interesting people in person there.
- We got in touch with the people behind Freepto, and are looking how
our two projects could collaborate more.
<
https://www.freepto.mx/>
- We are participating in two new Debian teams: the Debian OTR Team and
the Debian AppArmor Profiles Team.
<
https://wiki.debian.org/Teams/OTR>
<
https://wiki.debian.org/AppArmor/Contribute>
Press and testimonials
======================
* 2014-02-27: In his article "Why It’s Vital For Users to Fund
Open-Source Encryption Tools Trevor Timm from Freedom of the Press
Foundation explains that Tails « has been vital for most, if not all, of
the NSA journalists. [...] Its prime use case is journalists trying to
communicate or work in environments in which they may normally be at
risk or compromised. The NSA stories have been the biggest story in
journalism in the past decade, yet the tool the reporters rely on is
incredibly underfunded, is maintained by only a handful of developers,
and operates on a shoestring budget. »
<
https://pressfreedomfoundation.org/blog/2014/02/why-its-vital-public-fund-open-source-encryption-tools>
* 2014-02-07: In his review of uVirtus, Kheops, from Telecomix concludes
that « Users should prefer Tails and other mature secure live
distributions (such as IprediaOS, Liberté Linux, Privatix and Whonix)
over uVirtus since they provide a real safety improvement to the user.
For any activity that does not entail transferring large quantities of
data (such as video files), there is no strong reason to prefer uVirtus
over any of these. »
<
http://uvirtus.org/>
--
Tails folks