If Tails 3.0.1 is working fine for you, please ignore this message!

If you upgraded Tails 3.0 to 3.0.1 with an automatic upgrade you most likely are experiencing problems, one of the most serious being that Tor does not work which makes most Internet activity impossible.

If you are affected you can repair your Tails 3.0.1 by doing a manual upgrade to 3.0.1.

Sorry for the inconvenience!

Tags:

Releases

Tails 3.0 is the first version of Tails based on Debian 9 (Stretch). It brings a completely new startup and shutdown experience, a lot of polishing to the desktop, security improvements in depth, and major upgrades to a lot of the included software. We cannot list all the improvements it brings here (see the announcement), but let's still highlight a few major changes:

  • Tails Greeter, the application to configure Tails at startup, has been completely redesigned for ease of use.
  • The shutdown experience has also been redesigned in order to be more reliable and more discrete.
  • Tails 3.0 works on 64-bit computers only and not on 32-bit computers anymore.

Code

Thanks to multiprocess Firefox, we started working on sandboxing Tor Browser's content renderer processes more strictly with AppArmor. We now have a working draft and are waiting for our pull request to be merged upstream.

We started fixing regressions introduced in Tails 3.0, such as SSH_AUTH_SOCK occasionally not being set in GNOME Terminal and Tails Installer rejects working USB drives, pretending they're not removable. Our Help Desk and Foundation Team met and prioritized the remaining ones from a user-centric point of view.

Reproducible Builds

We are still working on making Tails ISO images build reproducibly. We've seen some images build in such a deterministic manner in March and even during a testing session. However, in some build environments it does not work reliably yet and some new issues have manifested themselves which need to be fixed until we can claim that our ISO images are really reproducible, such as Comment changes in POT files make ISO non reproducible. Besides, we need to draw a line wrt. what kind of build environment variations we want to support.

Furthermore, we are still working on documenting the new release process and verification options for our users (#12616, #12629, #12630).

User experience

  • We discussed strategies to porting our Download and Verify extension for Firefox to Web Extensions, a requirement for the upcoming Firefox 57 (November 14), as this will affect the design of our download instructions.

  • We finished the redesign of Tails Installer to get rid of the initial splash screen. (#8859)

  • We installed a prototype of Piwik, a free web analytics platform, to evaluate how well it would work against our privacy constraints and metrics needs.

  • We agreed on increasing the size of the system partition from 2.5 to 4 GiB minimum starting from Tails 3.2 (October 3) to allow for more automatic upgrades before a manual upgrade is needed. (#12705)

Infrastructure

Improving communication & transparency wrt. our core teams' priorities

We have set up some infrastructure bits so that all contributors have more visibility and power over our core teams's priorities.

HTTPS mirror pool

We've switched our mirror pool to mirrors serving files over HTTPS only (#12837). Our round-robin fallback DNS pool is still serving files over HTTP, and we are currently thinking about how to switch those to HTTPS too (#12833).

Reproducible builds

Remaining issues on our CI infrastructure include:

Sysadmin

We kept our systems up and running, which was not always easy since we've deployed our updated infrastructure for reproducible builds before upgrading our capacity accordingly, not mentioning a kernel regression caused by the initial Stack Clash fix that broke our CI.

We deployed some work done by groente, who is in the process of joining our sysadmin team.

tails-support mailing list

We closed the tails-support@boum.org mailing list.

Funding

Outreach

Past events

Upcoming events

  • Tails contributors will attend DebConf17, the annual conference for Debian contributors and users interested in improving Debian.

  • A Tails contributor proposed a talk about Tails for the BalCCon2k17 (Balkan Computer Congress).

Press and testimonials

The Tails 3.0 release was abundantly covered on the web.

Translation

All programs

  • ar: 47 translated messages, 9 fuzzy translations, 6 untranslated messages.
  • az: 47 translated messages, 9 fuzzy translations, 6 untranslated messages.
  • bg: 62 translated messages.
  • ca: 62 translated messages.
  • cs: 54 translated messages, 6 fuzzy translations, 2 untranslated messages.
  • cy: 44 translated messages, 11 fuzzy translations, 7 untranslated messages.
  • da: 62 translated messages.
  • de: 62 translated messages.
  • el: 62 translated messages.
  • en_GB: 62 translated messages.
  • es: 62 translated messages.
  • es_AR: 62 translated messages.
  • fa: 62 translated messages.
  • fi: 62 translated messages.
  • fr: 62 translated messages.
  • fr_CA: 62 translated messages.
  • he: 54 translated messages, 6 fuzzy translations, 2 untranslated messages.
  • hr_HR: 62 translated messages.
  • hu: 62 translated messages.
  • id: 62 translated messages.
  • is: 62 translated messages.
  • it: 62 translated messages.
  • ja: 62 translated messages.
  • km: 45 translated messages, 11 fuzzy translations, 6 untranslated messages.
  • ko: 62 translated messages.
  • lv: 62 translated messages.
  • nb: 62 translated messages.
  • nl: 62 translated messages.
  • nn: 62 translated messages.
  • pl: 62 translated messages.
  • pt: 62 translated messages.
  • pt_BR: 62 translated messages.
  • ro: 62 translated messages.
  • ru: 62 translated messages.
  • sk: 54 translated messages, 6 fuzzy translations, 2 untranslated messages.
  • sk_SK: 62 translated messages.
  • sl_SI: 47 translated messages, 9 fuzzy translations, 6 untranslated messages.
  • sq: 62 translated messages.
  • sr: 54 translated messages, 6 fuzzy translations, 2 untranslated messages.
  • sv: 62 translated messages.
  • tr: 62 translated messages.
  • uk: 62 translated messages.
  • vi: 62 translated messages.
  • zh: 0 translated messages, 62 untranslated messages.
  • zh_CN: 62 translated messages.
  • zh_HK: 62 translated messages.
  • zh_TW: 62 translated messages.

All the website

  • de: 57% (2863) strings translated, 6% strings fuzzy, 51% words translated
  • fa: 43% (2162) strings translated, 9% strings fuzzy, 46% words translated
  • fr: 89% (4428) strings translated, 1% strings fuzzy, 87% words translated
  • it: 31% (1547) strings translated, 4% strings fuzzy, 27% words translated
  • pt: 26% (1335) strings translated, 8% strings fuzzy, 23% words translated

Total original words: 52933

Core pages of the website

  • de: 78% (1492) strings translated, 10% strings fuzzy, 79% words translated
  • fa: 36% (690) strings translated, 9% strings fuzzy, 38% words translated
  • fr: 98% (1869) strings translated, 1% strings fuzzy, 98% words translated
  • it: 75% (1434) strings translated, 11% strings fuzzy, 76% words translated
  • pt: 46% (886) strings translated, 14% strings fuzzy, 48% words translated

Total original words: 17298

Metrics

  • Tails has been started more than 695 672 times this month. This makes 23 189 boots a day on average.
  • 15 508 downloads of the OpenPGP signature of the Tails ISO from our website.
  • 215 bug reports were received through WhisperBack.

This release fixes many security issues and users should upgrade as soon as possible.

Changes

Upgrades and changes

  • Upgrade tor to 0.3.0.9-1~d90.stretch+1. (#13253)
  • Upgrade Linux to 4.9.30-2+deb9u2.

Fixed problems

  • Fix interaction between SSH and GNOME Keyring. (#12481)
  • Have Tails Installer stop rejecting valid USB drives, pretending they're not "removable". (#12696)
  • Make behavior of the power button and lid close actions in the Greeter consistent with the regular GNOME session. (#13000)

For more details, read our changelog.

Known issues

None specific to this release.

See the list of long-standing issues.

Get Tails 3.0.1

What's coming up?

Tails 3.1 is scheduled for August 8.

Have a look at our roadmap to see where we are heading to.

We need your help and there are many ways to contribute to Tails (donating is only one of them). Come talk to us!

Tags:

We are especially proud to present you Tails 3.0, the first version of Tails based on Debian 9 (Stretch). It brings a completely new startup and shutdown experience, a lot of polishing to the desktop, security improvements in depth, and major upgrades to a lot of the included software.

Debian 9 (Stretch) will be released on June 17. It is the first time that we are releasing a new version of Tails almost at the same time as the version of Debian it is based upon. This was an important objective for us as it is beneficial to both our users and users of Debian in general and strengthens our relationship with upstream:

  • Our users can benefit from the cool changes in Debian earlier.
  • We can detect and fix issues in the new version of Debian while it is still in development so that our work also benefits Debian earlier.

This release also fixes many security issues and users should upgrade as soon as possible.

Changes

New features

New startup and shutdown experience

  • Tails Greeter, the application to configure Tails at startup, has been completely redesigned for ease of use:

    • All options are available from a single window.
    • Language and region settings are displayed first to benefit our international audience.
    • Accessibility features can be enabled from the start.

    This has been a long process, started three years ago with the UX team of NUMA Paris and lead only by volunteers. Join us on tails-ux@boum.org to participate in future designs!

  • The shutdown experience has also been redesigned in order to be:

    • More reliable. It was crashing on various computers with unpredictable results.
    • More discrete. The screen is now totally black to look less suspicious.

    Technically speaking, it is now using the freed memory poisoning feature of the Linux kernel.

Polishing the desktop

  • We switched to the default black theme of GNOME which has a more modern and discrete look:

  • Tails 3.0 benefits from many other small improvements to the GNOME desktop:

    • Files has been redesigned to reduce clutter and make the interface easier to use. Several new features have been added, such as the ability to rename multiple files at the same time and the ability to extract compressed files without needing a separate application.

    • The notification area has been improved to allow easy access to previous notifications. Notification popups have also been repositioned to make them more noticeable.

    • Shortcut windows have been added to help you discover keyboard shortcuts in GNOME applications.

      For example, press Ctrl+F1 in Files to display its shortcut window.

Security improvements in depth

  • Tails 3.0 works on 64-bit computers only and not on 32-bit computers anymore. Dropping hardware support, even for a small portion of our user base, is always a hard decision to make but being 64-bit only has important security and reliability benefits. For example, to protect against some types of security exploits, support for the NX bit is compulsory and most binaries are hardened with PIE which allows ASLR.

    Check if your computer is 64-bit or 32-bit.

  1. Start any Tails version.

  2. To open a terminal choose Applications ▸ Utilities ▸ Terminal.

  3. Execute the following command to display system information:

        uname -m
    
    • If the output is x86_64, your computer is 64-bit and Tails 3.0 should work.

    • If the output is i686, your computer is 32-bit and Tails 3.0 will not work.

  • Update Tor Browser to 7.0.1 (based on Firefox 52 ESR) which is multiprocess and paves the way to content sandboxing. This should make it harder to exploit security vulnerabilities in the browser.

Major upgrades to included software

  • Most included software has been upgraded in Debian 9, for example:
    • KeePassX from 0.4.3 to 2.0.3
      Your password database will be migrated automatically to the new format of KeePassX 2.
    • LibreOffice from 4.3.3 to 5.2.6
    • Inkscape from 0.48.5 to 0.92.1
    • Audacity from 2.0.6 to 2.1.2
    • Enigmail from 1.8.2 to 1.9.6
    • MAT from 0.5.2 to 0.6.1
    • Dasher from 4.11 to 5.0
    • git from 2.1.4 to 2.11.0

Upgrades and changes

  • The Pidgin tray icon was removed from the top navigation bar and replaced by popup notifications.

  • Icedove was renamed as Thunderbird, its original name, inheriting this change from Debian.

  • The search box and the search feature of the address bar of the Unsafe Browser were removed. (#12540)

  • The read-only option of the persistent storage was removed. It was used by very few users, created confusion, and lead to unexpected issues. (#12093)

Fixed problems

  • The new X.Org display server in Tails 3.0 should work on more newer graphical hardware.

  • UEFI boot has been fixed on some machines (ThinkPad X220).

  • MAC spoofing has been fixed on some network interfaces (TP-Link WN725N). (#12362)

For more details, read our changelog.

Known issues

  • Tails Installer erroneously rejects some USB sticks. When this happens, a message that starts with "Skipping non-removable device" is displayed (#12696). To workaround this problem:

    1. Start the operating system you want to use Tails Installer on.
      If you want to use Tails Installer in Tails 3.0, set up an administration password.

    2. Choose Applications ▸ System Tools ▸ Root Terminal to open a terminal with administration rights.

    3. Execute the following command to fix the bug in Tails Installer:

      perl -pi -E 's,media_removable,removable,' /usr/lib/python2.7/dist-packages/tails_installer/creator.py

    4. Tails Installer should not expose this problem again… until you restart Tails, as these changes will be reverted upon restart.

  • Tails fails to start on some computers with Intel graphical hardware.

  • Some users have reported problems during the migration from Icedove to Thunderbird, in particular that Thunderbird doesn't start.

    If this happens to you, please send us a WhisperBack report without restarting Tails.

See the list of long-standing issues.

Get Tails 3.0

What's coming up?

Tails 3.1 is scheduled for August 8.

Have a look at our roadmap to see where we are heading to.

We need your help and there are many ways to contribute to Tails (donating is only one of them). Come talk to us!

Tags:

We decided to close tails-support@boum.org, the public mailing list for user support which was created in 2013 after closing the forum that we had on this website.

The idea behind having a public space for user support was to:

  • Reduce the amount of work for our help desk behind tails-support-private@boum.org (which is encrypted and also receives WhisperBack reports).

    This is not really working as tails-support-private@boum.org still has 12 times more traffic than tails-support@boum.org.

  • Build a community of people doing user support outside of our team.

    This is not really working either as most of the threads are still answered by our help desk or other core contributors.

  • Build a public database to make it easy to consult or reuse previous answers.

    This is not really working either as the archive of the mailing list are hard to search and reuse and it's easier to point people to the documentation, known issues, or FAQ.

Having a public mailing list also makes it:

  • Complicated to make sure that both the list and the sender receive our answers.

  • Sensitive to ask for more technical information about the problem, such as logs, as they are harder for the person reporting the error to share with us and also raises privacy concerns.

  • Duplicate work between tails-support-private@boum.org and tails-support@boum.org as people often write to both.

The major downside of closing tails-support@boum.org is that it was a good place for developers to have some feedback on the recurrent problems faced by users. We want to solve this while working on a request tracker for our help desk.

See you on tails-support-private@boum.org!

Releases

Code

Tails 3.0

We have been focused on the last finishing touches before we deem Tails 3.0 ready for release. Things are looking good so far!

Reproducible builds

Here are some details about our work in April and May on making Tails reproducible. This effort is covered by the Mozilla Open Source Support award (MOSS) that we've received.

Current status

In March we reported that we had finally seen an ISO image build reproducibly on several machines. Since then we kept working on this front.

Our automatic upgrades are now reproducible, however, one remaining issue currently blocks us from claiming that our ISO images are too. We are confident that this issue will be solved within a few weeks.

Reproducible website build

In March we've made great progress to get our website build reproducibly. Later on, we realized that ikiwiki resized some images of our website which sometimes contained timestamped metadata, thus making the ISO image build unreproducibly. We have worked around this on our side (#12566), and will fix the root cause of the problem in ikiwiki upstream (#12625).

The blocker: fontconfig

The cloud which hides the blue skies and the sun in the reproducible builds solar system today, and which is our sole remaining problem to make our ISO image build reproducibly is this: we ship a cache for fonts in Tails. However, this cache is currently not generated in a reproducible manner. In March we tried moving its generation out of the ISO, however, it makes Tails start slower and resulted in too many unreliable test failures. Thus, we decided to move it back into the ISO image and to try and fix the root cause of the problem instead. We filed Debian bug #863427, but we already know that our patch is not yet enough to fix the problem, although it greatly reduces the number of differences from 75 to 5 (#12567); so we'll keep working on it.

ISO image and IUKs

Our automatic upgrades are now reproducible (#12630).

When we generate the ISO image using isohybrid, we pass it an ID. We tried setting this ID to $SOURCE_DATE_EPOCH which resulted in a reproducible, but non-hybrid, ISO. Thus, we decided to pass a fixed ID instead: #12453.

The bright future

Remaining technical issues are tracked on #12608.

We are working on documenting how to modify our release process to ensure the ISO images we publish are reproducible (#12628, #12629).

For those of our users who want to verify their own ISO builds against ours, we'll soon document how to do that (#12630).

Infrastructure

See the Infrastructure section for our work on the infrastructural aspects of this project.

Documentation and website

  • We have published the Tails Social contract.

  • We finished updating all our documentation to Tails 3.0, based on Debian Stretch.

  • We updated our documentation to a new layout of the Universal USB Installer for Windows and scaled its screenshots to fix an issue reported by huertanix.

  • We updated our documentation of the build system, as a result of the work on reproducible builds.

User experience

Infrastructure

  • We upgraded some more of our systems to Debian Stretch.

  • We have continued the efforts to optimize our systems' resources, by playing with different settings of the NUMA balancing (#11179).

  • We have adapted our CI infrastructure to be able to bring back the email notification mechanism for build and test failures, at least for branches which have tickets in a "Ready For QA" state in Redmine (#11355). This will be unleashed in June so that we'll be able to gather statistics about false positives in our CI notifications to developers.

  • Most of our efforts have been focused on upgrading our infrastructure to support reproducible builds, see below.

Reproducible builds

After a long discussion, we decided not to publish any Vagrant basebox at all: the key argument in favour of this major design change was to remove one huge binary blob from the list of trusted inputs needed for building a Tails ISO image. This will substantially increase the value of Tails ISO images building reproducibly. This decision has a few nice side effects, including:

  • the properties of the basebox required to build a given state of our code base are entirely encoded in the corresponding Git commit;
  • changes in the ISO build box definition don't require building and uploading a new basebox.

Then we made enough progress to migrate our Continuous Integration platform to the build system used by developers. This is now running in production, not exactly smoothly yet (as explained below), but well enough to keep supporting our development and quality assurance processes. For details, see #11972, #11979, #11980, #11981, #12017, and #11006.

Then we had to deal with a number of issues that we were not in a position to identify before submitting this brand new system to a real-world workload. Some are fixed already (#12530, #12578, #12565, #12541, #12529, #12575, #12606). Work is still in progress on some other problems: they are our Continuous Integration engineers' top priority, and should be fully resolved in the next couple of months.

Finally, we have set up automated tests for the reproducibility of our ISO image. Obviously, the results of these tests are publicly available.

Funding

Outreach

Past events

  • gagz and geb did a presentation and a workshop of Tails at the CPML yearly meeting.

On-going discussions

Translation

All the website

  • de: 59% (2977) strings translated, 5% strings fuzzy, 52% words translated
  • fa: 43% (2200) strings translated, 9% strings fuzzy, 47% words translated
  • fr: 87% (4357) strings translated, 1% strings fuzzy, 85% words translated
  • it: 31% (1585) strings translated, 4% strings fuzzy, 28% words translated
  • pt: 28% (1443) strings translated, 8% strings fuzzy, 25% words translated

Total original words: 52.798

Core pages of the website

  • de: 82% (1537) strings translated, 10% strings fuzzy, 82% words translated
  • fa: 37% (695) strings translated, 10% strings fuzzy, 39% words translated
  • fr: 98% (1843) strings translated, 1% strings fuzzy, 98% words translated
  • it: 78% (1473) strings translated, 11% strings fuzzy, 78% words translated
  • pt: 48% (910) strings translated, 13% strings fuzzy, 49% words translated

Total original words: 17.079

Metrics

  • Tails has been started more than 694.165 times this month. This makes 22.392 boots a day on average.
  • 13.181 downloads of the OpenPGP signature of Tails ISO from our website.
  • 110 bug reports were received through WhisperBack.

Releases

The following changes were introduced in Tails 2.12:

  • We installed again GNOME Sound Recorder to provide a very simple application for recording sound in addition to the more complex Audacity. Sound clips recorded using GNOME Sound Recorder are saved to the Recordings folder.

  • We removed I2P, an alternative anonymity network, because we unfortunately have failed to find a developer to maintain I2P in Tails. Maintaining software like I2P well-integrated in Tails takes time and effort and our team is too busy with other priorities.

  • Upgrade Linux to 4.9.13. This should improve the support for newer hardware (graphics, Wi-Fi, etc.).

Documentation and website

User experience

  • We collected intercept interviews of users using Tails world-wide to better understand our users, their needs, and what they like or dislike in Tails. We already have seven great story from Western Europe, North America, Latin America, and Africa.

Infrastructure

  • We upgraded some of our systems to Debian 9 (Stretch), in order to help identify remaining issues before it becomes the new Debian stable release.

  • We made good progress towards using our Vagrant build system on our Continuous Integration infrastructure, to make it match what developers use. This is part of our work on Reproducible ISO Builds.

  • We are interviewing a candidate to join our system administration team.

  • The mechanism that we designed for the distribution and activation of the revocation certificate of the Tails signing key is now deployed and 23 people own a share of the revocation certificate. It allows revoking the Tails signing key even if very bad things happens to most of the team while making it hard for isolated and malicious individuals to revoke the signing key when not needed. We still encourage experts to review this mechanism and other projects to adopt similar practices.

Funding

  • We are working towards adding a partners page to our website, and are talking with a couple potential corporate sponsors.

  • We are still in the process of discussing our proposal with OTF, and reworking it accordingly.

  • We were nominated for the MIT Media Lab Disobedience Award.

Translation

All website PO files

  • de: 55% (3182) strings translated, 5% strings fuzzy, 50% words translated
  • fa: 39% (2246) strings translated, 8% strings fuzzy, 43% words translated
  • fr: 82% (4686) strings translated, 1% strings fuzzy, 81% words translated
  • it: 27% (1591) strings translated, 3% strings fuzzy, 25% words translated
  • pt: 26% (1537) strings translated, 8% strings fuzzy, 24% words translated

Total original words: 58888

Core PO files

  • de: 82% (1544) strings translated, 9% strings fuzzy, 83% words translated
  • fa: 37% (701) strings translated, 10% strings fuzzy, 39% words translated
  • fr: 98% (1836) strings translated, 1% strings fuzzy, 98% words translated
  • it: 79% (1479) strings translated, 11% strings fuzzy, 78% words translated
  • pt: 49% (916) strings translated, 13% strings fuzzy, 50% words translated

Total original words: 17063

Metrics

  • Tails has been started more than 672644 times this month. This makes 21698 boots a day on average.
  • 16930 downloads of the OpenPGP signature of Tails ISO from our website.
  • 160 bug reports were received through WhisperBack.

You can help Tails! The first release candidate for the upcoming version 3.0 is out. We are very excited and cannot wait to hear what you think about it :)

What's new in 3.0~rc1?

Tails 3.0 will be the first version of Tails based on Debian 9 (Stretch). As such, it upgrades essentially all included software.

Changes since Tails 3.0~beta4 include:

  • Important security fixes!

  • Upgrade to current Debian 9 (Stretch).

  • Upgrade tor to 0.3.0.7-1.

  • Upgrade Tor Browser to 7.0a4.

  • Migrate from Icedove to Thunderbird (only cosmetic).

Technical details of all the changes are listed in the Changelog.

How to test Tails 3.0~rc1?

We will provide security updates for Tails 3.0~rc1, just like we do for stable versions of Tails.

But keep in mind that this is a test image. We tested that it is not broken in obvious ways, but it might still contain undiscovered issues.

But test wildly!

If you find anything that is not working as it should, please report to us on tails-testers@boum.org.

Bonus points if you first check if it is a known issue of this release or a longstanding known issue.

Get Tails 3.0~rc1

To upgrade, an automatic upgrade is available from 3.0~beta4 to 3.0~rc1.

If you cannot do an automatic upgrade, you can install 3.0~rc1 by following our usual installation instructions, skipping the Download and verify step.

Tails 3.0~rc1 ISO image ?OpenPGP signature
Tails 3.0~rc1 torrent

Known issues in 3.0~rc1

  • The documentation has only been partially updated so far.

  • The graphical interface fails to start on some Intel graphics adapters. If this happens to you:

    1. Add the xorg-driver=intel option in the boot menu.
    2. If this fixes the problem, report to to tails-testers@boum.org the output of the following commands:

      lspci -v
      lspci -mn
      

      … so we get the identifier of your graphics adapter and can have this fix applied automatically in the next Tails 3.0 pre-release.

    3. If this does not fix the problem, try Troubleshooting Mode and report the problem to tails-testers@boum.org. Include the exact model of your Intel graphics adapter.
  • There is no Read-Only feature for the persistent volume anymore; it is not clear yet whether it will be re-introduced in time for Tails 3.0 final (#12093).

  • The persistent Tor Browser bookmarks feature is broken if you enable it for the first time in Tails 3.0~rc1; any persistent bookmarks from before will still work.

    You can workaround this as follows, after you start Tails the first time with Browser bookmarks persistence enabled:

    1. Start Tor Browser and let it load
    2. Close Tor Browser
    3. Run this in a Terminal:

      cp /home/amnesia/.tor-browser/profile.default/places.sqlite \
         /home/amnesia/.mozilla/firefox/bookmarks/places.sqlite
      rm /home/amnesia/.tor-browser/profile.default/places.sqlite*
      ln -s /home/amnesia/.mozilla/firefox/bookmarks/places.sqlite \
            /home/amnesia/.tor-browser/profile.default/places.sqlite
      
  • Thunderbird email client fails to load for some users. You can fix this by creating a file called .migrated in the folder of your Thunderbird profile. To do so, run this command in a Terminal:

    touch /home/amnesia/.thunderbird/profile.default/.migrated
    
  • Open tickets for Tails 3.0~rc1

  • Open tickets for Tails 3.0

  • Longstanding known issues

What's coming up?

We will likely publish the first release candidate for Tails 3.0 around May 19.

Tails 3.0 is scheduled for June 13.

Have a look at our roadmap to see where we are heading to.

We need your help and there are many ways to contribute to Tails (donating is only one of them). Come talk to us!

Tags:

We had written and adopted a Code of Conduct since our first public hackfest in Paris in 2014. This code was and is meant as a guide to make our public spaces welcoming and friendly to every sentient being.

We have since then worked on a Social Contract which we proudly present today!

The Tails Social Contract is a set of commitments that we as contributors to the Tails project stand by. This work is derived from the Debian Social Contract and the Tor Social Contract. If you have any questions or comments, feel free to email: tails-project@boum.org.

This is a promise from our contributors community to the rest of the world, affirming a commitment to our beliefs.

1. By creating Tails we try to provide usable tools for anonymity and privacy

We believe that privacy, the free exchange of ideas, and equal access to information are essential to free and open societies. Through our community standards and the tools we create, we provide means that empower all people to protect and advance these ideals.

2. Tails is and will remain free software

Equal access to information includes the free availability of our code and documentation as well as the transparency of our decision making processes.

All the components of Tails that we create ourselves are, and will be, licensed in a manner consistent with the Debian Free Software Guidelines.

Tails will always be free to use, remix, adapt and distribute. As the only exceptions to this rule, Tails includes:

  • a minor part of non-free firmware in order to work on as much hardware as possible;
  • a few pieces of software whose source code is public but not compatible with the Debian Free Software Guidelines; they are needed to support important use cases.

3. We will give back to the Free Software community

Tails is a privacy-oriented Debian Derivative.

We want usable security and privacy-oriented tools to become a standard for the Free Software community as a whole.

Bug fixes, code improvements, Debian packaging, as well as work on usability issues will be sent upstream whenever possible. This way, our modifications will benefit others and can be improved upon further by a wider audience of people.

4. We encourage participation and transparency

We want to produce Tails in a way that encourages participation, which requires publicly documenting what can be improved. As Tails is created in such a transparent manner, anyone is encouraged to participate, review it and point out problems.

To make our community a welcoming place for everybody we agreed on a Code of Conduct.

5. We will never harm our users intentionally

We will always do our best to create secure and usable tools. We will never willingly include backdoors or malicious software nor will we cooperate with any entity wanting us to harm our users.

Mistakes sometimes happen. We will be honest about them and fix those that affect the safety of Tails users when they are reported to us.

Whenever severe security issues are reported to us in private, we will test them and ensure we promptly fix these issues. We will notify our users whenever such an issue has been reported to us. However, for the security of our users, we might not disclose such a severe issue before releasing a fix.

6. We give users the means to decide how much they can rely on Tails

We encourage users to inform themselves and decide if Tails is suitable for their use case and how much they can trust it. We work diligently to keep our community up-to-date through our various communication channels about the current state of our software and its limitations. We encourage users to read our documentation as well as third-party documentation in order to make an informed decision and engage in a learning process about the tools we ship.

We provide and explain methods of verification so that anyone can ensure that they downloaded a genuine copy of Tails.

Tags:

You can help Tails! The fourth beta for the upcoming version 3.0 is out. We are very excited and cannot wait to hear what you think about it :)

What's new in 3.0~beta4?

Tails 3.0 will be the first version of Tails based on Debian 9 (Stretch). As such, it upgrades essentially all included software.

Other changes since Tails 3.0~beta3 include:

  • Important security fixes!

  • All changes brought by Tails 2.12.

  • Upgrade to current Debian 9 (Stretch).

  • Many bug fixes in Tails Greeter.

  • Fix the ORCA screen reader.

  • Replace Pidgin's "systray" icon with the guifications plugin.

Technical details of all the changes are listed in the Changelog.

How to test Tails 3.0~beta4?

We will provide security updates for Tails 3.0~beta4, just like we do for stable versions of Tails.

But keep in mind that this is a test image. We tested that it is not broken in obvious ways, but it might still contain undiscovered issues.

But test wildly!

If you find anything that is not working as it should, please report to us on tails-testers@boum.org.

Bonus points if you first check if it is a known issue of this release or a longstanding known issue.

Get Tails 3.0~beta4

To upgrade, an automatic upgrade is available from 3.0~beta2 and 3.0~beta3 to 3.0~beta4.

If you cannot do an automatic upgrade, you can install 3.0~beta4 by following our usual installation instructions, skipping the Download and verify step.

Tails 3.0~beta4 ISO image ?OpenPGP signature

Known issues in 3.0~beta4

  • The documentation has only been partially updated so far.

  • The graphical interface fails to start on some Intel graphics adapters. If this happens to you:

    1. Add the xorg-driver=intel option in the boot menu.
    2. If this fixes the problem, report to to tails-testers@boum.org the output of the following commands:

      lspci -v
      lspci -mn
      

      … so we get the identifier of your graphics adapter and can have this fix applied automatically in the next Tails 3.0 pre-release.

    3. If this does not fix the problem, try Troubleshooting Mode and report the problem to tails-testers@boum.org. Include the exact model of your Intel graphics adapter.
  • There is no Read-Only feature for the persistent volume anymore; it is not clear yet whether it will be re-introduced in time for Tails 3.0 final (#12093).

  • Open tickets for Tails 3.0~rc1

  • Open tickets for Tails 3.0

  • Longstanding known issues

What's coming up?

We will likely publish the first release candidate for Tails 3.0 around May 19.

Tails 3.0 is scheduled for June 13.

Have a look at our roadmap to see where we are heading to.

We need your help and there are many ways to contribute to Tails (donating is only one of them). Come talk to us!

Tags: