Tails, The Amnesic Incognito Live System, version 1.4.1, is out.

This release fixes numerous security issues and all users must upgrade as soon as possible.

Changes

Upgrades and changes

  • Upgrade Tor Browser to 4.5.3, based on Firefox 31.8.0 ESR.

  • Upgrade Tor to 0.2.6.9-1~d70.wheezy+1+tails2.

  • Upgrade Linux to 3.16.7-ckt11-1.

There are numerous other changes that might not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.

Fixed problems

  • Have AppArmor deny Tor Browser access to the list of recently used files.

  • Fix automatic upgrades in Windows Camouflage mode.

Known issues

See the current list of known issues.

Download or upgrade

Go to the download page.

What's coming up?

The next Tails release is scheduled for August 11.

Have a look to our roadmap to see where we are heading to.

Do you want to help? There are many ways you can contribute to Tails. If you want to help, come talk to us!

Posted Fri 03 Jul 2015 12:34:56 PM CEST Tags:

Last month, despite all the blossoming flowers (at least in the northern hemisphere), we still worked on our computers to release 1.4 :)

Let's use this report to mention that we provide many user support options (public email, encrypted mail, IRC) but we don't do user support on Twitter. We also saw that there is an active subReddit dedicated to Tails, but we don't follow it and thus cannot guarantee the quality of answers provided there.

That being said, we're really happy to see the growing community around Tails!

Releases

The following changes were introduced in Tails 1.4.

New features

  • Tor Browser 4.5 now has a security slider that you can use to disable browser features, such as JavaScript, as a trade-off between security and usability. The security slider is set to low by default to provide the same level of security as previous versions and the most usable experience.

    We disabled in Tails the new circuit view of Tor Browser 4.5 for security reasons. You can still use the network map of Vidalia to inspect your circuits.

  • Tails OpenPGP Applet now has a shortcut to the gedit text editor, thanks to Ivan Bliminse.

  • Paperkey lets you print a backup of your OpenPGP secret keys on paper.

Upgrades and changes

  • Tor Browser 4.5 protects better against third-party tracking. Often when visiting a website, many connections are created to transfer both the content of the main website (its page, images, and so on) and third-party content from other websites (advertisements, Like buttons, and so on). In Tor Browser 4.5, all such content, from the main website as well as the third-party websites, goes through the same Tor circuits. And these circuits are not reused when visiting a different website. This prevents third-party websites from correlating your visits to different websites.

  • Tor Browser 4.5 now keeps using the same Tor circuit while you are visiting a website. This prevents the website from suddenly changing language, behavior, or logging you out.

  • Disconnect is the new default search engine. Disconnect provides Google search results to Tor users without captchas or bans.

  • Better support for Vietnamese in LibreOffice through the installation of fonts-linuxlibertine.

  • Disable security warnings when connecting to POP3 and IMAP ports that are mostly used for StartTLS nowadays.

  • Support for more printers through the installation of printer-driver-gutenprint.

  • Upgrade Tor to 0.2.6.7.

  • Upgrade I2P to 0.9.19 that has several fixes and improvements for floodfill performance.

  • Remove the obsolete #i2p-help IRC channel from Pidgin.

  • Remove the command line email client mutt and msmtp.

There are numerous other changes that might not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.

Fixed problems

  • Make the browser theme of the Windows 8 camouflage compatible with the Unsafe Browser and the I2P Browser.

  • Remove the Tor Network Settings... from the Torbutton menu.

  • Better support for Chromebook C720-2800 through the upgrade of syslinux.

  • Fix the localization of Tails Upgrader.

  • Fix the OpenPGP key servers configured in Seahorse.

  • Prevent Tor Browser from crashing when Orca is enabled.

Upcoming code changes

Here are the upcoming changes we have already been working on for the next releases:

  • We fixed cases where the hardware clock was set to the system time on shutdown (ticket #9364).

  • We disabled LAN access in Tor Browser (ticket #7976).

  • We prevented Tails Installer from upgrading devices that has no Tails installed (ticket #5623).

  • We removed /var/cache/man/ from the ISO image (ticket #9417).

  • We installed the Linux kernel from Debian Jessie (ticket #9341).

  • We installed the apparmor-profiles package (ticket #9539).

  • We started porting our ISO build system to Debian Jessie (ticket #9262).

  • We worked with upstream on sandboxing I2P (ticket #7724).

Miscellaneous

  • We continued working on packaging Tails Installer for Debian (ticket #8866).

  • We started evaluating Tails on touchscreen devices, and made progress on 32-bit UEFI support.

Documentation and website

User experience

Infrastructure

  • We improved our automated test suite to make it a lot more robust. As a result, some of us are now able to run it entirely without any false positive!

  • We wrote new tests for Electrum, the "Report an error" launcher, etc.

  • We investigated how we can run the Tor Browser's automated test suite as part of our own. We now have a working, though hackish, proof-of-concept.

  • Our test suite covers 182 scenarios, 5 more that in April.

  • The bot that gives information about tickets on IRC now displays links to Redmine.

Funding

Outreach

Upcoming events

  • Cornelius Kölbel will speak about Tails at Tübix on June 13th (in German).

  • Les Chats Cosmiques is organizing a workshop about Tails and Tor at La Cantine Brestoise in Brest, France on June 18.

  • Tchou and Fiodor Tonti will be in Pas Sage en Seine 2015 at NUMA in Paris, France on June 18 to present our UX work and conduct user testing of the future Installation Assistant.

  • Please let us know if you organize an event about Tails, we'll be glad to announce it :)

On-going discussions

Press and testimonials

  • Many online newspapers covered the 1.4 release, see our press page.

Translation

  • We're planning to improve our website's translation platform. If you're knowledgeable about one or if you want to help testing some, please see the ticket #9049 and blueprint!

All website PO files

  • de: 19% (1251) strings translated, 0% strings fuzzy, 17% words translated
  • fr: 46% (3023) strings translated, 2% strings fuzzy, 43% words translated
  • pt: 28% (1861) strings translated, 3% strings fuzzy, 26% words translated

Total original words: 75770

Core PO files

  • de: 60% (791) strings translated, 1% strings fuzzy, 68% words translated
  • fr: 89% (1184) strings translated, 5% strings fuzzy, 90% words translated
  • pt: 84% (1119) strings translated, 8% strings fuzzy, 87% words translated

Total original words: 14259

Metrics

  • Tails has been started more than 421,127 times this month. This makes 13,584 boots a day on average.

  • 24,204 downloads of the OpenPGP signature of Tails ISO from our website.

  • 107 bug reports were received through WhisperBack.

-- Report by BitingBird for Tails folks

Posted Wed 10 Jun 2015 11:00:24 PM CEST

Tails, The Amnesic Incognito Live System, version 1.4, is out.

This release fixes numerous security issues and all users must upgrade as soon as possible.

Changes

New features

  • Tor Browser 4.5 now has a security slider that you can use to disable browser features, such as JavaScript, as a trade-off between security and usability. The security slider is set to low by default to provide the same level of security as previous versions and the most usable experience.

    We disabled in Tails the new circuit view of Tor Browser 4.5 for security reasons. You can still use the network map of Vidalia to inspect your circuits.

  • Tails OpenPGP Applet now has a shortcut to the gedit text editor, thanks to Ivan Bliminse.

  • Paperkey lets you print a backup of your OpenPGP secret keys on paper.

Upgrades and changes

  • Tor Browser 4.5 protects better against third-party tracking. Often when visiting a website, many connections are created to transfer both the content of the main website (its page, images, and so on) and third-party content from other websites (advertisements, Like buttons, and so on). In Tor Browser 4.5, all such content, from the main website as well as the third-party websites, goes through the same Tor circuits. And these circuits are not reused when visiting a different website. This prevents third-party websites from correlating your visits to different websites.

  • Tor Browser 4.5 now keeps using the same Tor circuit while you are visiting a website. This prevents the website from suddenly changing language, behavior, or logging you out.

  • Disconnect is the new default search engine. Disconnect provides Google search results to Tor users without captchas or bans.

  • Better support for Vietnamese in LibreOffice through the installation of fonts-linuxlibertine.

  • Disable security warnings when connecting to POP3 and IMAP ports that are mostly used for StartTLS nowadays.

  • Support for more printers through the installation of printer-driver-gutenprint.

  • Upgrade Tor to 0.2.6.7.

  • Upgrade I2P to 0.9.19 that has several fixes and improvements for floodfill performance.

  • Remove the obsolete #i2p-help IRC channel from Pidgin.

  • Remove the command line email client mutt and msmtp.

There are numerous other changes that might not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.

Fixed problems

  • Make the browser theme of the Windows 8 camouflage compatible with the Unsafe Browser and the I2P Browser.

  • Remove the Tor Network Settings... from the Torbutton menu.

  • Better support for Chromebook C720-2800 through the upgrade of syslinux.

  • Fix the localization of Tails Upgrader.

  • Fix the OpenPGP key servers configured in Seahorse.

  • Prevent Tor Browser from crashing when Orca is enabled.

Known issues

  • Claws Mail stores plaintext copies of all emails on the remote IMAP server, including those that are meant to be encrypted. If you send OpenPGP encrypted emails using Claws Mail and IMAP, make sure to apply one of the workarounds documented in our security announcement.

  • See the current list of known issues.

Download or upgrade

Go to the download page.

What's coming up?

The next Tails release is scheduled for June 30.

Have a look to our roadmap to see where we are heading to.

Do you want to help? There are many ways you can contribute to Tails. If you want to help, come talk to us!

Posted Tue 12 May 2015 12:34:56 PM CEST Tags:

This report is a bit special: since we release every 6 weeks, there is no release this month. The next one is planned for the 12th of May. Therefore there are no code news, the work being done will be reported when it's released :)

However, like any Free Software project, Tails is not only about the code, so here are the news about the other parts of the project!

Documentation and website

User experience

Infrastructure

Outreach

Upcoming events

On-going discussions

Translation and internationalization

Given all the recent changes in the documentation, the translation statistics went a bit down. The German and French teams are working hard to keep up-to-date. The Portuguese team needs new translators to help :)

All website PO files

  • de: 16% (1025) strings translated, 0% strings fuzzy, 16% words translated
  • fr: 46% (2936) strings translated, 2% strings fuzzy, 44% words translated
  • pt: 29% (1879) strings translated, 3% strings fuzzy, 27% words translated

Total original words: 73541

Core PO files

  • de: 43% (569) strings translated, 1% strings fuzzy, 56% words translated
  • fr: 90% (1177) strings translated, 4% strings fuzzy, 91% words translated
  • pt: 86% (1121) strings translated, 8% strings fuzzy, 89% words translated

Total original words: 14111

Metrics

  • Tails has been started more than 397,162 times this month. This makes 13,238 boots a day on average.
  • 24,088 downloads of the OpenPGP signature of Tails ISO from our website.
  • 62 bug reports were received through WhisperBack.
Posted Thu 07 May 2015 10:47:40 PM CEST

You can help Tails! The first release candidate for the upcoming version 1.4 is out. Please test it and see if it works for you.

How to test Tails 1.4~rc1?

  1. Keep in mind that this is a test image. We have made sure that it is not broken in an obvious way, but it might still contain undiscovered issues.

  2. Either try the automatic upgrade, or download the ISO image and its signature:

    Tails 1.4~rc1 ISO image

    Tails 1.4~rc1 signature

  3. Verify the ISO image.

  4. Have a look at the list of known issues of this release and the list of longstanding known issues.

  5. Test wildly!

If you find anything that is not working as it should, please report to us! Bonus points if you first check if it is a known issue of this release or a longstanding known issue.

How to automatically upgrade from 1.3.2?

These steps allow you to automatically upgrade a device installed with Tails Installer from Tails 1.3.2 to Tails 1.4~rc1.

  1. Start Tails 1.3.2 from a USB stick or SD card (installed by the Tails Installer), and set an administration password.

  2. Run this command in a Root Terminal to select the "alpha" upgrade channel and start the upgrade:

    echo TAILS_CHANNEL=\"alpha\" >> /etc/os-release && \
         tails-upgrade-frontend-wrapper
    
  3. Once the upgrade has been installed, restart Tails and look at Applications ▸ Tails ▸ About Tails to confirm that the running system is Tails 1.4~rc1.

What's new since 1.3.2?

Changes since Tails 1.3.2 are:

  • Major new features

    • Upgrade Tor Browser to 4.5, which introduces many major new features for usability, security and privacy. Unfortunately its per-tab circuit view did not make it into Tails yet since it requires exposing more Tor state to the user running the Tor Browser than we are currently comfortable with. (Closes: ticket #9031)
    • Upgrade Tor to 0.2.6.7-1~d70.wheezy+1+tails2. Like in the Tor bundled with the Tor Browser, we patch it so that circuits used for SOCKSAuth streams have their lifetime increased indefinitely while in active use. This currently only affects the Tor Browser in Tails, and should improve the experience on certain websites that otherwise would switch language or log you out every ten minutes or so when Tor switches circuit. (Closes: ticket #7934)
  • Security fixes

    • Upgrade Linux to 3.16.7-ckt9-3.
    • Upgrade curl to 7.26.0-1+wheezy13.
    • Upgrade dpkg to 1.16.16.
    • Upgrade gstreamer0.10-plugins-bad to 0.10.23-7.1+deb7u2.
    • Upgrade libgd2-xpm to 2.0.36~rc1~dfsg-6.1+deb7u1.
    • Upgrade openldap to 2.4.31-2.
    • Upgrade LibreOffice to 1:3.5.4+dfsg2-0+deb7u4.
    • Upgrade libruby1.9.1 to 1.9.3.194-8.1+deb7u5.
    • Upgrade libtasn1-3 to 2.13-2+deb7u2.
    • Upgrade libx11 to 2:1.5.0-1+deb7u2.
    • Upgrade libxml-libxml-perl to 2.0001+dfsg-1+deb7u1.
    • Upgrade libxml2 to 2.8.0+dfsg1-7+wheezy4.
    • Upgrade OpenJDK to 7u79-2.5.5-1~deb7u1.
    • Upgrade ppp to 2.4.5-5.1+deb7u2.
  • Bugfixes

    • Make the Windows 8 browser theme compatible with the Unsafe and I2P browsers. (Closes: ticket #9138)
    • Hide Torbutton's "Tor Network Settings..." context menu entry. (Closes: ticket #7647)
    • Upgrade the syslinux packages to support booting Tails on Chromebook C720-2800. (Closes: ticket #9044)
    • Enable localization in Tails Upgrader. (Closes: ticket #9190)
    • Make sure the system clock isn't before the build date during early boot. Our live-config hook that imports our signing keys depend on that the system clock isn't before the date when the keys where created. (Closes: ticket #9149)
    • Set GNOME's OpenPGP keys via desktop.gnome.crypto.pgp to prevent us from getting GNOME's default keyserver in addition to our own. (Closes: ticket #9233)
    • Prevent Firefox from crashing when Orca is enabled: grant it access to assistive technologies in its Apparmor profile. (Closes: ticket #9261)
    • Add Jessie APT source. (Closes: ticket #9278)
    • Fix set_simple_config_key(). If the key already existed in the config file before the call, all other lines would be removed due to the sed option -n and p combo. (Closes: ticket #9122)
  • Minor improvements

    • Upgrade I2P to 0.9.19-3~deb7u+1. (Closes: ticket #9229)
    • Install Tor Browser's bundled Torbutton instead of custom .deb. As of Torbutton 1.9.1.0 everything we need has been upstreamed.
    • Install Tor Browser's bundled Tor Launcher instead of our in-tree version. With Tor 0.2.6.x our custom patches for the ClientTransportPlugin hacks are not needed any more. (Closes: ticket #7283)
    • Don't install msmtp and mutt. (Closes: ticket #8727)
    • Install fonts-linuxlibertine for improved Vietnamese support in LibreOffice. (Closes: ticket #8996)
    • Remove obsoletete #i2p-help IRC channel from the Pidgin configuration (Closes: ticket #9137)
    • Add Gedit shortcut to gpgApplet's context menu. Thanks to Ivan Bliminse for the patch. (Closes: ticket #9069).
    • Install printer-driver-gutenprint to support more printer models. (Closes: ticket #8994).
    • Install paperkey for off-line OpenPGP key backup. (Closes: ticket #8957)
    • Hide the Tor logo in Tor Launcher. (Closes: ticket #8696)
    • Remove useless log() instance in tails-unblock-network. (Closes: ticket #9034)

Known issues in 1.4~rc1

  • The Windows 8 theme is slightly broken for all browsers: the default Firefox tab bar is used, and the search bar is enabled. (ticket #9326)

  • Tails' Tor Browser still uses Startpage as the default search engine instead of Disconnect.me like upstream Tor Browser, but the Unsafe Browser does use Disconnect.me. (ticket #9309)

  • Longstanding known issues

Posted Sun 03 May 2015 12:00:00 PM CEST

March was full of surprises: first Mozilla changed the release date for Firefox, so the Tor team had to change the release date for the Tor Browser, and we had to change the release date of version 1.3.1. Usually, these updates are a little late... but this time, it has been advanced one week earlier!

But then... a whole bunch of vulnerabilities were discovered in Firefox, so Mozilla did an emergency release. Due to their early release, we released 1.3.1 early as well, so that we could incorporate those security fixes. And the planned 1.3.1 became 1.3.2. So, instead of a release-free month, we had a two-releases month!

Despite the hectic changes of plans, we did some good work. And for starters, a bit of recursivity: in March, we... published the two previous reports ;)

Releases

Code

The two releases of this month fixed security issues, but did not introduce major changes visible to the user. For details, see each release announcement.

We see a lot of users still confused with how to save files from the Tor Browser, so here's the link if you have the same problem :)

Documentation and website

User experience

Infrastructure

  • Our test suite now covers 162 scenarios, 9 more than in February (but the numbers in February report were wrong). Thanks to some welcome refactoring, we turned 14 tests into one :)

  • As announced recently, Tails ships a new signing key in 1.3.

  • We have enabled core developers to remotely run the Tails automated test suite on our infrastructure.

  • We did quite some work to prepare our infrastructure for the upcoming release of Debian 8 (Jessie). Not only we have started upgrading some of our systems, but for example, we have adapted our automated test suite to run in a Jessie environment, which led us to discover a bug in python-xmpp, that we then fixed directly in Debian. Similarly, we have also helped validating the fix for a regression we have suffered from in the version of Puppet that is shipped in Jessie.

  • Lots of thought and discussion was put into revamping how we handle our APT repository.

Funding

Outreach

Upcoming events

Please let us know if you organize an event about Tails :)

On-going discussions

Press & Testimonials

Translation and internationalization

All website PO files

  • de: 16% (1012) strings translated, 0% strings fuzzy, 16% words translated
  • fr: 47% (2970) strings translated, 2% strings fuzzy, 45% words translated
  • pt: 30% (1913) strings translated, 2% strings fuzzy, 28% words translated

Core PO files

  • de: 44% (568) strings translated, 1% strings fuzzy, 57% words translated
  • fr: 93% (1204) strings translated, 2% strings fuzzy, 94% words translated
  • pt: 89% (1149) strings translated, 6% strings fuzzy, 92% words translated

Metrics

  • Tails has been started more than 411,474 times in March. This makes 13,273 boots a day on average.
  • 27,787 downloads of the OpenPGP signature of Tails ISO from our website.
  • 106 bug reports were received through WhisperBack.

-- Report by BitingBird for Tails folks

Posted Thu 09 Apr 2015 10:03:10 AM CEST

Tails, The Amnesic Incognito Live System, version 1.3.2, is out.

This release fixes numerous security issues and all users must upgrade as soon as possible.

Changes

Upgrades and changes

  • The Florence virtual keyboard can now be used with touchpads again.

  • Tails Installer does not list devices that are too small to be supported.

There are numerous other changes that may not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.

Known issues

See the current list of known issues.

Download or upgrade

Go to the download page.

What's coming up?

The next Tails release is scheduled for May 12.

Have a look to our roadmap to see where we are heading to.

Do you want to help? There are many ways you can contribute to Tails. If you want to help, come talk to us!

Posted Tue 31 Mar 2015 12:34:56 PM CEST Tags:

Tails, The Amnesic Incognito Live System, version 1.3.1, is out.

This is an emergency release, triggered by an unscheduled Firefox release meant to fix critical security issues.

It fixes numerous security issues and all users must upgrade as soon as possible.

Changes

Upgrades and changes

There are numerous other changes that may not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.

Known issues

See the current list of known issues.

Download or upgrade

Go to the download page.

What's coming up?

The next Tails release is scheduled for March 31.

Have a look to our roadmap to see where we are heading to.

Do you want to help? There are many ways you can contribute to Tails. If you want to help, come talk to us!

Posted Mon 23 Mar 2015 12:34:56 PM CET Tags:

Tails is transitioning to a new OpenPGP signing key.

The signing key is the key that we use to:

  • Sign our official ISO images.
  • Certify the other OpenPGP keys used by the project.

The previous signing key is safe and, to the best of our knowledge, it has not been compromised.

We are doing this change to improve our security practices when manipulating such a critical piece of data.

  • The old key can still be used to verify Tails 1.3 ISO images.
  • The new key will be used to sign ISO images starting from Tails 1.3.1.

Import and verify the new signing key

Click on the following button to download and import the new signing key:

new Tails signing key

The new signing key is itself signed by the old signing key. So you can transitively trust this new key if you had trusted the old signing key.

To verify that the new key is correctly signed by the old key, you can execute the following command:

gpg --check-sigs A490D0F4D311A4153E2BB7CADBB802B258ACD84F

The output should include a signature of the new key by the old key such as:

sig!         0x1202821CBE2CD9C1 2015-01-19  Tails developers (signing key) <tails@boum.org>

In this output, the status of the verification is indicated by a flag directly following the "sig" tag. A "!" indicates that the signature has been successfully verified.

Security policy for the new signing key

Here is the full description of the new signing key:

    pub   4096R/0xDBB802B258ACD84F 2015-01-18 [expires: 2016-01-11]
          Key fingerprint = A490 D0F4 D311 A415 3E2B  B7CA DBB8 02B2 58AC D84F
    uid                 [ unknown] Tails developers (offline long-term identity key) 
    sub   4096R/0x98FEC6BC752A3DB6 2015-01-18 [expires: 2016-01-11]
    sub   4096R/0x3C83DCB52F699C56 2015-01-18 [expires: 2016-01-11]

You can see that it has:

  • A primary key (marked as pub) with ID 0xDBB802B258ACD84F. This primary key:

    • Is not owned in a usable format by any single individual. It is split cryptographically using gfshare.
    • Is only used offline, in an air-gapped Tails.
    • Expires in less than one year. We will extend its validity as many times as we find reasonable.
  • Two subkeys (marked as sub) with IDs 0x98FEC6BC752A3DB6 and 0x3C83DCB52F699C56 which are stored on OpenPGP smartcards and owned by our release managers. Smartcards ensure that the cryptographic operations are done on the smartcard itself and that the secret cryptographic material is not directly available to the operating system using it.

Web-of-Trust with the Debian keyring

This new signing key has already been signed by various Debian developers, namely:

So you can use the technique described in our documentation to further verify the Tails signing key against the Debian keyring using any of those three keys.

Posted Mon 16 Mar 2015 12:34:56 PM CET Tags:

Welcome to the new Tails report! This edition is more complete than last time. We have some good news to share and you can also see that we did some good work. If you have suggestions about what to include next time, please write to tails-project@boum.org about it :)

Releases

Code

The complete list of improvements is in the release announcements. Some major points are:

  • Distribute a hybrid ISO image again: no need for anyone to manually run isohybrid anymore!
  • Tails now ships the Electrum Bitcoin client.
  • Support obfs4 Tor bridges.

Documentation and website

User experience

Infrastructure

  • Our test suite covers 172 scenarios, 85 (!) more than in July 2014. That's a huge improvement because each release can be automatically tested to avoid regressions instead of having to manually perform the same tests each time. There is still some way to go, but someday releasing will be fast, safe, and easy :)

  • Tails ships a new certificate in 1.2.3, and a new signing key in 1.3.

  • We rewrote the history of our main Git repository to make it four times smaller. This should make the new contributors' experience much nicer.

  • We upgraded the hardware of our main server so that it can handle the short and mid-term plans we have for it: automatically building ISO images from all active branches, and then running our automated test suite on these ISO images.

Funding

Outreach

On-going discussions

Press & Testimonials

  • Four major French-speaking medias (Le Monde, La Libre Belgique, Le Soir de Bruxelles and RTBF - radio-télévision belge) have launched Source Sûre, a whistleblowing platform, in French, that uses Tails.

  • Many people seemed excited to hear about the Bitcoin wallet in Tails and wrote about it. Welcome, Bitcoin community :)

Translation and internationalization

  • Some new translators joined the German translation team within the last months. It's now the biggest translation team and they're seriously working to have all the core pages of the website translated. Nearly halfway there, keep up :)

  • The French translation team manages to keep the core pages up-to-date, but the rest of the web site could use more attention.

  • The Portuguese translation team has not been very active lately, so the Portuguese translations slowly becomes obsolete.

  • The Spanish and Italian translation teams are still at the organizing stages so their translations have not started yet.

  • For all those languages (and other ones!), new translators are really welcome!

All website PO files

  • de: 16% (979) strings translated, 0% strings fuzzy
  • fr: 50% (3,004) strings translated, 1% strings fuzzy
  • pt: 32% (1,947) strings translated, 2% strings fuzzy

Core PO files

  • de: 44% (571) strings translated, 0% strings fuzzy
  • fr: 96% (1,223) strings translated, 1% strings fuzzy
  • pt: 92% (1,173) strings translated, 4% strings fuzzy

Metrics

In January:

  • Tails has been started more than 356,292 times in January. This makes 11,493 boots a day on average.
  • 27,617 downloads of the OpenPGP signature of Tails ISO from our website.
  • 108 bug reports were received through WhisperBack.

In February:

  • Tails has been started more than 344,664 times in February. This makes 12,309 boots a day on average.
  • 25,530 downloads of the OpenPGP signature of Tails ISO from our website.
  • 89 bug reports were received through WhisperBack.
Posted Mon 09 Mar 2015 01:25:05 AM CET