Releases

The following changes were introduced in Tails 2.4:

  • We enabled the automatic account configuration of Icedove which discovers the correct parameters to connect to your email provider based on your email address. We improved it to rely only on secure protocol and we are working on sharing these improvements with Mozilla so that users of Thunderbird outside Tails can benefit from them as well.

  • Remove the preconfigured #tails IRC channel. Join us on XMPP instead!

  • Always display minimize and maximize buttons in titlebars. (#11270)

  • Remove GNOME Tweak Tool and hledger. You can add them back using the Additional software packages persistence feature.

  • Use secure HKPS OpenPGP key server in Enigmail.

  • Harden our firewall by rejecting RELATED packets and restricting Tor to only send NEW TCP syn packets. (#11391)

  • Harden our kernel by:

    • Setting various security-related kernel options: slab_nomerge slub_debug=FZ mce=0 vsyscall=none. (#11143)
    • Removing the .map files of the kernel. (#10951)
  • Update the DRM and Mesa graphical libraries. This should fix recent problems with starting Tails on some hardware. (#11303)

  • Some printers that stopped working in Tails 2.0 should work again. (#10965)

  • Enable Packetization Layer Path MTU Discovery for IPv4. This should make the connections to obfs4 Tor bridges more reliable. (#9268)

  • Remove our custom ciphers and MACs settings for SSH. This should fix connectivity issues with other distributions such as OpenBSD. (#7315)

  • Fix the translations of Tails Upgrader. (#10221)

  • Fix displaying the details of a circuit in Onion Circuits when using Tor bridges. (#11195)

Code

  • segfault sent his 3rd and 4th reports for his GSoC on Tails Server.

  • GoodCrypto sent more patches to convert our custom bash scripts to Python.

User experience

We continued discussing:

Infrastructure

  • Our test suite covers 208 scenarios, 1 more that in May.

Funding

Outreach

Upcoming events

  • El Rancho Electrónico organizes a series of Tails workshops on July 4, 11, and 18 in Ciudad Monstruo, Mexico.

Translation

All the website

  • de: 54% (2856) strings translated, 2% strings fuzzy, 47% words translated
  • fa: 47% (2477) strings translated, 7% strings fuzzy, 54% words translated
  • fr: 71% (3715) strings translated, 3% strings fuzzy, 69% words translated
  • it: 17% (899) strings translated, 2% strings fuzzy, 17% words translated
  • pt: 31% (1644) strings translated, 6% strings fuzzy, 28% words translated

Total original words: 53798

Core pages of the website

  • de: 87% (1581) strings translated, 2% strings fuzzy, 86% words translated
  • fa: 40% (729) strings translated, 9% strings fuzzy, 42% words translated
  • fr: 84% (1527) strings translated, 4% strings fuzzy, 86% words translated
  • it: 49% (885) strings translated, 6% strings fuzzy, 56% words translated
  • pt: 55% (1000) strings translated, 9% strings fuzzy, 55% words translated

Total original words: 16515

Metrics

  • Tails has been started more than 554.690 times this month. This makes 18490 boots a day on average.
  • 8.174 downloads of the OpenPGP signature of Tails ISO from our website.
  • 131 bug reports were received through WhisperBack.
Posted Mon 11 Jul 2016 02:07:22 PM CEST

Code

  • segfault sent his first and second report on his GSoC on Tails Server.

  • We've prepared a patched version of Icedove and Torbirdy for the next Tails release. Icedove users can now use the automatic configuration wizard and by default, requests will be done only over secure protocols. Other Icedove improvements include using a hkps keyserver in Enigmail, default to POP if persistence is enabled, IMAP if not. We've disabled remote email account creation. All our patches are being upstreamed to Thunderbird and Torbirdy.

Documentation and website

User experience

Infrastructure

  • Our channel #tails for user support moved from IRC to XMPP. For further details read our support page.

  • The new mirror pool is now used by Tails Upgrader, by users who download Tails without using our Download And Verification Extension for Firefox (aka. DAVE), for any download that is not supported by DAVE (e.g. release candidates), and for downloads started from a web browser that has JavaScript disabled. So, in summary two of the use cases of this work are covered already, and only the "downloading with DAVE" use case is left to complete. As of May 31st we now have 36 active mirrors.

Funding

  • Mediapart, a French online investigative journal that uses Tails for their work, is the first media organization to answer positively our call to support Tails financially. The terms of our partnership are still being discussed.

  • We submitted a proposal to fund reproducible builds to the Mozilla Open Source Support.

Outreach

Upcoming events

  • jvoisin and fr33tux are going to give a talk on Tails at Nuit du Hack

On-going discussions

Press and testimonials

Translation

  • The documentation is now also available in Italian language. We welcome the Italian translation team, thanks for all of the work done!

Overall translation of the website

  • de: 50% (2648) strings translated, 4% strings fuzzy, 44% words translated
  • fa: 47% (2492) strings translated, 7% strings fuzzy, 54% words translated
  • fr: 64% (3376) strings translated, 4% strings fuzzy, 65% words translated
  • it: 17% (896) strings translated, 2% strings fuzzy, 17% words translated
  • pt: 31% (1660) strings translated, 6% strings fuzzy, 29% words translated

Total original words: 53532

Core pages of the website

  • de: 79% (1432) strings translated, 6% strings fuzzy, 79% words translated
  • fa: 40% (726) strings translated, 9% strings fuzzy, 42% words translated
  • fr: 74% (1341) strings translated, 5% strings fuzzy, 77% words translated
  • it: 49% (886) strings translated, 6% strings fuzzy, 56% words translated
  • pt: 55% (1001) strings translated, 9% strings fuzzy, 55% words translated

Total original words: 16492

Metrics

  • Tails has been started more than 541.950 times this month. This makes 17.482 boots a day on average.
  • 6359 downloads of the OpenPGP signature of Tails ISO from our website.
  • 112 bug reports were received through WhisperBack.
Posted Tue 21 Jun 2016 07:17:59 PM CEST

This release fixes many security issues and users should upgrade as soon as possible.

Changes

New features

  • We enabled the automatic account configuration of Icedove which discovers the correct parameters to connect to your email provider based on your email address. We improved it to rely only on secure protocol and we are working on sharing these improvements with Mozilla so that users of Thunderbird outside Tails can benefit from them as well.

Upgrades and changes

  • Update Tor Browser to 6.0.1, based on Firefox 45.

  • Remove the preconfigured #tails IRC channel. Join us on XMPP instead!

  • Always display minimize and maximize buttons in titlebars. (#11270)

  • Remove GNOME Tweak Tool and hledger. You can add them back using the Additional software packages persistence feature.

  • Use secure HKPS OpenPGP key server in Enigmail.

  • Harden our firewall by rejecting RELATED packets and restricting Tor to only send NEW TCP syn packets. (#11391)

  • Harden our kernel by:

    • Setting various security-related kernel options: slab_nomerge slub_debug=FZ mce=0 vsyscall=none. (#11143)
    • Removing the .map files of the kernel. (#10951)

Fixed problems

  • Update the DRM and Mesa graphical libraries. This should fix recent problems with starting Tails on some hardware. (#11303)

  • Some printers that stopped working in Tails 2.0 should work again. (#10965)

  • Enable Packetization Layer Path MTU Discovery for IPv4. This should make the connections to obfs4 Tor bridges more reliable. (#9268)

  • Remove our custom ciphers and MACs settings for SSH. This should fix connectivity issues with other distributions such as OpenBSD. (#7315)

  • Fix the translations of Tails Upgrader. (#10221)

  • Fix displaying the details of a circuit in Onion Circuits when using Tor bridges. (#11195)

For more details, read our changelog.

Known issues

  • The automatic account configuration of Icedove freezes when connecting to some email providers. (#11486)

  • In some cases sending an email with Icedove results in the error: "The message could not be sent using Outgoing server (SMTP) mail.riseup.net for an unknown reason." When this happens, simply click "Ok" and try again and it should work. (#10933)

  • The update of the Mesa graphical library introduce new problems at least on AMD HD 7770 and nVidia GT 930M.

  • In the PDF Viewer the Download button doesn't work. This can be worked around by right-clicking anywhere in the document and selecting Save Page As.

See the list of long-standing issues.

Get Tails 2.4

What's coming up?

Tails 2.5 is scheduled for August 2.

Have a look at our roadmap to see where we are heading to.

We need your help and there are many ways to contribute to Tails (donating is only one of them). Come talk to us!

Posted Tue 07 Jun 2016 12:34:56 PM CEST Tags:

You can help Tails! The first release candidate for the upcoming version 2.4 is out. Please test it and report any issue. We are in particular interested in feedback and problems relating to:

  • Icedove's automatic configuration wizard. Using it to set up a new account is (most of the time) as easy as entering your email address (and password), and Icedove will configure your account for you.

  • Graphics-related regressions, e.g. if the graphical user interface doesn't seem to start at all (i.e. you cannot reach Tails Greeter).

How to test Tails 2.4~rc1?

Keep in mind that this is a test image. We tested that it is not broken in obvious ways, but it might still contain undiscovered issues.

But test wildly!

If you find anything that is not working as it should, please report to us! Bonus points if you first check if it is a known issue of this release or a longstanding known issue.

Download and install

Tails 2.4~rc1 torrent

Tails 2.4~rc1 ISO image ?OpenPGP signature

To install 2.4~rc1, follow our usual installation instructions, skipping the Download and verify step.

Upgrade from 2.3

  1. Start Tails 2.3 on a USB stick installed using Tails Installer and set an administration password.

  2. Run this command in a Root Terminal to select the "alpha" upgrade channel and start the upgrade:

    echo TAILS_CHANNEL=\"alpha\" >> /etc/os-release && \
         tails-upgrade-frontend-wrapper
    
  3. After the upgrade is installed, restart Tails and choose Applications ▸ Tails ▸ About Tails to verify that you are running Tails 2.4~rc1.

What's new since 2.3?

Changes since Tails 2.3 are:

  • Major new features and changes

    • Upgrade Tor Browser to 6.0 based on Firefox 45.2. (Closes: #11403).
    • Enable Icedove's automatic configuration wizard. We patch the wizard to only use secure protocols when probing, and only accept secure protocols, while keeping the improvements done by TorBirdy in its own non-automatic configuration wizard. (Closes: #6158, #11204)
  • Bugfixes

    • Enable Packetization Layer Path MTU Discovery for IPv4. If any system on the path to the remote host has a MTU smaller than the standard Ethernet one, then Tails will receive an ICMP packet asking it to send smaller packets. Our firewall will drop such ICMP packets to the floor, and then the TCP connection won't work properly. This can happen to any TCP connection, but so far it's been reported as breaking obfs4 for actual users. Thanks to Yawning for the help! (Closes: #9268)
    • Make Tails Upgrader ship other locales than English. (Closes: #10221)
  • Minor improvements

    • Icedove improvements:
      • Stop patching in our default into Torbirdy. We've upstreamed some parts, and the rest we set with pref branch overrides in /etc/xul-ext/torbirdy.js. (Closes: #10905)
      • Use hkps keyserver in Engimail. (Closes: #10906)
      • Default to POP if persistence is enabled, IMAP if not. (Closes: #10574)
      • Disable remote email account creation in Icedove. (Closes: #10464)
    • Firewall hardening (Closes: #11391):
      • Don't accept RELATED packets. This enables quite a lot of code in the kernel that we don't need. Let's reduce the attack surface a bit.
      • Restrict debian-tor user to NEW TCP syn packets. It doesn't need to do more, so let's do a little bit of security in depth.
      • Disable netfilter's nf_conntrack_helper.
      • Fix disabling of automatic conntrack helper assignment.
    • Kernel hardening:
      • Set various kernel boot options: slab_nomerge slub_debug=FZ mce=0 vsyscall=none. (Closes: #11143)
      • Remove the kernel .map files. These are only useful for kernel debugging and slightly make things easier for malware, perhaps and otherwise just occupy disk space. Also stop exposing kernel memory addresses through /proc etc. (Closes: #10951)
    • Drop zenity hacks to "focus" the negative answer. Jessie's zenity introduced the --default-cancel option, finally! (Closes: #11229)
    • Drop useless APT pinning for Linux.
    • Remove gnome-tweak-tool. (Closes: #11237)
    • Install python-dogtail, to enable accessibility technologies in our automated test suite. (Part of: #10721)
    • Install libdrm and mesa from jessie-backports. (Closes: #11303)
    • Remove hledger. (Closes: #11346)
    • Don't pre-configure the #tails chan on the default OFTC account. (Part of: #11306)
    • Install onioncircuits from jessie-backports. (Closes: #11443)
    • Remove nmh. (Closes: #10477)
    • Drop Debian experimental APT source: we don't use it.
    • Use APT codenames (e.g. "stretch") instead of suites, to be compatible with our tagged APT snapshots.
    • Drop module-assistant hook and its cleanup. We've not been using it since 2010.
    • Remove 'Reboot' and 'Power Off' entries from Applications → System Tools. (Closes: #11075)
    • Pin our custom APT repo to the same level as Debian ones, and explicitly pin higher the packages we want to pull from our custom APT repo, when needed.
    • config/chroot_local-hooks/59-libdvd-pkg: verify libdvdcss package installation. (Closes: #11420)
    • Make Tails Upgrader use our new mirror pool design. (Closes: #11123)

For more details, see also our changelog.

Known issues in 2.4~rc1

  • Longstanding known issues

  • The new version of mesa (#11303) improves the situation on some hardware, but introduces regressions at least on:

    • AMD HD 7770
    • nVidia GT 930M
  • Icedove's autoconfig wizard stalls when probing some domains (#11486) but not all.

Posted Thu 26 May 2016 06:00:00 PM CEST Tags:

Releases

Code

Documentation and website

User experience

Infrastructure

  • We moved our contributors chat to an XMPP channel. More info here.
  • We are updating our mirror infrastructure to allow more mirrors as well as to switch all downloads to HTTPS in the future read the blueprint. Nearly all mirror operators have already adopted the new configuration of their server. We have updated our documentation for hosting a mirror. Administrators of the mirror pool now have a dedicated mailing list.
  • In April, 779 ISO images were automatically built by our Jenkins instance.
  • We have continued to try out new "fundamental approaches" in our test suite to deal with robustness issues. This month we have looked closer at the "transient network issues", of which all seem to be related to using the real Tor network. Our solution ended up being to run our own miniature Tor network on the automated test suite host using the Tor project's own tool for running Tor network diagnostic tests, Chutney.
  • Our new monitoring system was deployed to production, and works very well so far. It's aim is to be able to detect within hours failures and malfunction on our services.

More information on our work on infrastructure this month can be found in our SponsorS report for April 2016.

Outreach

Press and testimonials

Translation

Overall translation of the website

  • german: 47% (2567) strings translated, 4% strings fuzzy, 42% words translated
  • farsi: 52% (2843) strings translated, 6% strings fuzzy, 59% words translated
  • french: 62% (3366) strings translated, 5% strings fuzzy, 64% words translated
  • portuguese: 30% (1644) strings translated, 7% strings fuzzy, 29% words translated

Total original words: 56061

Core pages of the website

  • german: 88% (1179) strings translated, 6% strings fuzzy, 91% words translated
  • farsi: 77% (1037) strings translated, 12% strings fuzzy, 72% words translated
  • french: 85% (1139) strings translated, 7% strings fuzzy, 89% words translated
  • portuguese: 70% (940) strings translated, 16% strings fuzzy, 69% words translated

Total original words: 14006

Metrics

  • Tails has been started more than 527.629 times this month. This makes 17.587 boots a day on average.
  • 5.321 downloads of the OpenPGP signature of Tails ISO from our website.
Posted Thu 12 May 2016 12:40:48 PM CEST

This release fixes many security issues and users should upgrade as soon as possible.

Changes

Upgrades and changes

  • You can now copy and paste your GnuPG passphrases into the pinentry dialog, for example from KeePassX or the clipboard.

  • Upgrade Tor Browser to 5.5.5.

  • Upgrade I2P to 0.9.25.

  • Upgrade Electrum from 2.5.4 to 2.6.3.

Fixed problems

  • Clarify that users migrating from Claws Mail to Icedove should delete all their Claws Mail data to remove the warning when starting Icedove. (#11187)

  • Make both panes of Onion Circuits scrollable to fix display issues on smaller screens. (#11192)

For more details, read our changelog.

Known issues

None specific to this release.

See the list of long-standing issues.

Get Tails 2.3

What's coming up?

Tails 2.4 is scheduled for June 7.

Have a look at our roadmap to see where we are heading to.

We need your help and there are many ways to contribute to Tails (donating is only one of them). Come talk to us!

Posted Tue 26 Apr 2016 12:34:56 PM CEST Tags:

Releases

The following changes were introduced in 2.2:

  • Add support for viewing DVDs with DRM protection. (#7674)

  • Replace Vidalia, which has been unmaintained for years, with:

    • a system status icon indicating whether Tails is connected to Tor or not,
    • Onion Circuits to display a list of the current Tor circuits and connections.
  • Automatically save the database of KeePassX after every change to prevent data loss when shutting down. (#11147)

  • Disable the Alt + Shift and Left Shift + Right Shift keyboard shortcuts that used to switch to the next keyboard layout. You can still use Meta + Space to change keyboard layout. (#11042)

  • Fix optional PGP key feature of WhisperBack. (#11033)

  • Fix saving of WhisperBack report to a file when offline. (#11133)

  • Make Git verify the integrity of transferred objects. (#11107)

Code

Documentation and website

  • Many advanced users complained about the lack of a direct download link in our new installation assistant. We are working on adding one back while still protecting people from being lazy and skipping the ISO verification. (#11024)

  • We worked on speeding up the build of the website and almost reached our goal of 30%. (#11151)

  • We created a page that lists all our mailing lists and email addresses, their scope and policy.

  • We improved the instructions for resetting a USB stick and verifying the ISO image in Mac OS X.

  • We explained how to restart GNOME Shell. This is particularly useful when icons and information located on the top right corner of the screen disappear.

User experience

Infrastructure

  • intrigeri and Cyril Brulebois presented their design for our upcoming freezable APT repository. It will allow saving snapshots of all the packages that are used to build a given Tails. It's a necessary step to have reproducible builds and allow distributing better the source code of all the software in Tails.

  • anonym started using Dogtail to identify graphical user interface elements programmatically in our test suite, instead of based on screenshots.

  • bertagaz deployed an Icinga2 monitoring system to monitor our most important services.

  • We decided to drop the requirement for OpenPGP communication with HTTP mirror operators.

  • We clarified what needs to be done to have a proper review and merge process in Weblate.

  • 839 ISO images were automatically built and tested by our continuous integration infrastructure.

Outreach

Past Events

Press and testimonials

Translation

All the website

  • de: 47% (2549) strings translated, 4% strings fuzzy, 42% words translated
  • fa: 52% (2843) strings translated, 6% strings fuzzy, 59% words translated
  • fr: 56% (3064) strings translated, 6% strings fuzzy, 58% words translated
  • pt: 29% (1571) strings translated, 7% strings fuzzy, 28% words translated

Total original words: 56061

Core pages of the website

  • de: 88% (1179) strings translated, 6% strings fuzzy, 91% words translated
  • fa: 77% (1037) strings translated, 12% strings fuzzy, 72% words translated
  • fr: 80% (1069) strings translated, 10% strings fuzzy, 77% words translated
  • pt: 68% (917) strings translated, 17% strings fuzzy, 66% words translated

Total original words: 14006

Metrics

  • Tails has been started more than 568.280 times this month. This makes 18.331 boots a day on average.
  • 11004 downloads of the OpenPGP signature of Tails ISO from our website.
  • 181 bug reports were received through WhisperBack.
Posted Wed 13 Apr 2016 03:16:29 PM CEST

This release fixes numerous security issues. All users must upgrade as soon as possible.

Changes

Upgrades and changes

  • Upgrade Tor Browser to 5.5.4.

Known issues

See the current list of known issues.

Download or upgrade

Go to the install or upgrade page.

If your Tails does not boot after an automatic upgrade, please upgrade your Tails manually.

What's coming up?

The next Tails release is scheduled for April 19.

Have a look at our roadmap to see where we are heading to.

We need your help and there are many ways to contribute to Tails (donating is only one of them). Come talk to us!

Posted Fri 18 Mar 2016 02:02:03 AM CET Tags:

Releases

The following changes were introduced in Tails 2.0.1:

  • Upgrade Tor Browser to 5.5.2.

  • Fix regression breaking boot on 32-bit UEFI platforms. (#11007)

Code

  • We will replace Vidalia (#6841), which has been unmaintained for years, in 2.2 with:

    • the Tor Status GNOME Shell extension, which adds a System Status
    • Onion Circuits, a simple Tor circuit monitoring tool.
  • Hide "Laptop Mode Tools Configuration" menu entry. We don't support configuring l-m-t in Tails, and it doesn't work out of the box. (#11074)

Friendlier build system

For years Tails has offered a build system based on Vagrant, which at times has been maintained and really easy to use, and so a great resource for new contributors that want to test their modifications. Sadly that was a while ago, mostly because all but one Tails developers have been using their own custom build systems. The main reason for that is that Vagrant uses Virtualbox by default, while all of us (and our infrastructure, for example our Jenkins automated builds and tests setup) greatly prefer the QEMU/KVM stack (and libvirt), and it is not possible to mix two hypervisors at the same time.

But this is about to change! Recently there has been quite an effort to migrate to vagrant-libvirt and the QEMU/KVM hypervisor which should allow all of us to converge to the same build system. Besides saving development time since only one system has to be maintained, it also means that this build system will be well-maintained in the future, and so remain easy-to-use for contributors.

There are a few roadblocks still, though, but you can help, especially if you are a Debian developer! Currently we need vagrant-libvirt (and ruby-fog-libvirt) packaged and maintained in Debian, and quite a lot of work has already been done on that front. And to have the build system working on Debian Jessie we need the following packages backported: vagrant, ruby-excon, ruby-fog-core and ruby-fog-xml. If you want to help, please get in touch with us on the tails-dev@boum.org public mailing list!

Shell scripts are evil

Shell scripts are deceptively easy to quickly prototype proof-of-concepts with, but generally result in things with subtle bugs, a high maintenance burden, and difficulties to be extended since it doesn't scale well with complexity. A lot of people (us included) delude themselves with that they know the shell, but it is a complicated mess with really strange "features" and conventions that few truly understand.

Therefore we have started an effort to port our shell scripts to Python (blueprint), and, implicitly, to make it more convenient to start writing new scripts in Python instead of shell.

If you are into Python and want to help Tails, come join us!

Documentation and website

User experience

Infrastructure

  • The ISO build system has been upgraded to Jessie.

  • Our test suite covers 208 scenarios.

  • In February 603 ISO images were automatically built and 597 were automatically tested by our continuous integration infrastructure.

Funding

  • We sent our final report for the Digital Defenders grant we had over 2015.

Outreach

Past events

Upcoming events

On-going discussions

Press and testimonials

Translation

All website PO files

  • de: 43% (2456) strings translated, 4% strings fuzzy, 39% words translated
  • fa: 51% (2933) strings translated, 5% strings fuzzy, 58% words translated
  • fr: 54% (3075) strings translated, 5% strings fuzzy, 57% words translated
  • pt: 28% (1641) strings translated, 7% strings fuzzy, 28% words translated

Total original words: 57704

Core PO files

  • de: 88% (1210) strings translated, 7% strings fuzzy, 87% words translated
  • fa: 80% (1100) strings translated, 11% strings fuzzy, 74% words translated
  • fr: 81% (1116) strings translated, 9% strings fuzzy, 77% words translated
  • pt: 71% (974) strings translated, 16% strings fuzzy, 68% words translated

Total original words: 14624

Metrics

  • Tails has been started more than 547670 times this month. This makes 18885 boots a day on average.
  • 21378 downloads of the OpenPGP signature of Tails ISO from our website.
  • 138 bug reports were received through WhisperBack.
Posted Wed 09 Mar 2016 05:32:00 PM CET

This release fixes many security issues and users should upgrade as soon as possible.

Changes

New features

  • Add support for viewing DVDs with DRM protection. (#7674)

Upgrades and changes

  • Replace Vidalia, which has been unmaintained for years, with:
    • a system status icon indicating whether Tails is connected to Tor or not,
    • Onion Circuits to display a list of the current Tor circuits and connections.

Tor Status extension clicked in the top bar and Onion Circuits window open

  • Automatically save the database of KeePassX after every change to prevent data loss when shutting down. (#11147)

  • Update Tor Browser to 5.5.3.

    • Improve Japanese-style glyph display.
  • Upgrade I2P to 0.9.24.

  • Disable the Alt + Shift and Left Shift + Right Shift keyboard shortcuts that used to switch to the next keyboard layout. You can still use Meta + Space to change keyboard layout. (#11042)

Fixed problems

  • Fix optional PGP key feature of WhisperBack. (#11033)

  • Fix saving of WhisperBack report to a file when offline. (#11133)

  • Make Git verify the integrity of transferred objects. (#11107)

For more details, see also our changelog.

Known issues

  • While there is an automatic upgrade from Tails 2.2~rc1 to 2.2, it will not be detected by default since Tails 2.2~rc1 think it already is 2.2 (see ?the 2.2~rc1 announcement). To fix this, run the following command:

    sudo sed -i 's/^TAILS_VERSION_ID="2.2"$/TAILS_VERSION_ID="2.2~rc1"/' \
        /etc/os-release && \
    tails-upgrade-frontend-wrapper
    
  • See the current list of known issues.

Install or upgrade

To install, follow our installation instructions.

An automatic upgrade is available from 2.0.1 to 2.2.

If it is impossible to automatically upgrade your Tails, read our upgrade instructions.

If your Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

What's coming up?

The next Tails release is scheduled for April 19.

Have a look at our roadmap to see where we are heading to.

We need your help and there are many ways to contribute to Tails (donating is only one of them). Come talk to us!

Posted Tue 08 Mar 2016 12:34:56 PM CET Tags: