Tails, The Amnesic Incognito Live System, version 1.5.1, is out.

This is an emergency release, triggered by an unscheduled Firefox release meant to fix critical security issues.

It fixes numerous security issues and all users must upgrade as soon as possible.

Changes

Upgrades and changes

  • Install Tor Browser 5.0.2 (based on Firefox ESR 38.2.1).

Known issues

  • Tails Greeter is not translated for Vietnamese and Russian (ticket #9992).

See the current list of known issues.

Download or upgrade

Go to the download page.

What's coming up?

The next Tails release is scheduled for September 22.

Have a look to our roadmap to see where we are heading to.

Do you want to help? There are many ways you can contribute to Tails. If you want to help, come talk to us!

Posted Fri 28 Aug 2015 12:34:56 PM CEST Tags:

July started frenetically, with the postponed release on the 3rd. Then we had a Tails contributors meeting, and it was lots of fun and hard work. We decided broad directions for the incoming years, that you'll see in our draft roadmap for 2016-2017. We also reevaluated our processes and tools, and had a dance party. Tails contributors are ready to go on doing amazing work :)

Releases

Code

Upgrades and changes

  • Upgrade Tor Browser to 4.5.3, based on Firefox 31.8.0 ESR.

  • Upgrade Tor to 0.2.6.9-1~d70.wheezy+1+tails2.

  • Upgrade Linux to 3.16.7-ckt11-1.

Fixed problems

  • Have AppArmor deny Tor Browser access to the list of recently used files.

  • Fix automatic upgrades in Windows Camouflage mode.

Documentation and website

User experience

  • We rediscussed the terminology around installation media and decided to only advertise SD cards as a corner case.

  • Clarified the thread model of the automatic ISO verification extension regarding attacks inside the browser.

  • There was some work on the Greeter

Infrastructure

  • Our test suite covers 185 scenarios, 3 more that in April.

  • All active development branches are now built automatically with Jenkins. This is the first stage towards integrating our automated test suite at the core of our software development process, and to run it continuously on our development versions while they are being developed.

  • We started a discussion about having a CRM to handle our user support requests.

  • We made progess on the automated tests specification, and started working on the corresponding underlying infrastructure, starting with extending the storage capacity on our main server and creating a bunch of new virtual machines.

  • We are almost done porting our ISO build system to Debian Jessie.

Outreach

Upcoming events

On-going discussions

Press and testimonials

Translation

All website PO files

  • de: 19% (1274) strings translated, 0% strings fuzzy, 17% words translated
  • fr: 46% (3120) strings translated, 2% strings fuzzy, 43% words translated
  • pt: 27% (1863) strings translated, 3% strings fuzzy, 26% words translated

Total original words: 76959

Core PO files

  • de: 60% (803) strings translated, 0% strings fuzzy, 68% words translated
  • fr: 92% (1214) strings translated, 3% strings fuzzy, 92% words translated
  • pt: 84% (1119) strings translated, 8% strings fuzzy, 87% words translated

Total original words: 14258

Metrics

  • Tails has been started more than 429.889 times this month. This makes 13.867 boots a day on average.

  • 24.256 downloads of the OpenPGP signature of Tails ISO from our website.

  • 89 bug reports were received through WhisperBack.

-- Report by BitingBird for Tails folks

Posted Tue 11 Aug 2015 04:35:42 PM CEST

Tails, The Amnesic Incognito Live System, version 1.5, is out.

This release fixes numerous security issues and all users must upgrade as soon as possible.

Changes

New features

  • Disable access to the local network in the Tor Browser. You should now use the Unsafe Browser to access the local network.

Upgrades and changes

  • Install Tor Browser 5.0 (based on Firefox 38esr).
  • Install a 32-bit GRUB EFI boot loader. Tails should now start on some tablets with Intel Bay Trail processors among others.
  • Let the user know when Tails Installer has rejected a device because it is too small.

There are numerous other changes that might not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.

Fixed problems

  • Our AppArmor setup has been audited and improved in various ways which should harden the system.
  • The network should now be properly disabled when MAC address spoofing fails.

Known issues

See the current list of known issues.

Download or upgrade

Go to the download page.

What's coming up?

The next Tails release is scheduled for September 22.

Have a look to our roadmap to see where we are heading to.

Do you want to help? There are many ways you can contribute to Tails, for example by donating. If you want to help, come talk to us!

Posted Tue 11 Aug 2015 12:34:56 PM CEST Tags:

You can help Tails! The first release candidate for the upcoming version 1.5 is out. Please test it and see if it works for you.

How to test Tails 1.5~rc1?

A critical security hole affects the version of Tor Browser included in Tails 1.5~rc1. See the list of known issues of this release for more information.
  1. Keep in mind that this is a test image. We have made sure that it is not broken in an obvious way, but it might still contain undiscovered issues.

  2. Either try the automatic upgrade, or download the ISO image and its signature:

    Tails 1.5~rc1 ISO image

    Tails 1.5~rc1 signature

  3. Verify the ISO image.

  4. Have a look at the list of known issues of this release and the list of longstanding known issues.

  5. Test wildly!

If you find anything that is not working as it should, please report to us! Bonus points if you first check if it is a known issue of this release or a longstanding known issue.

How to automatically upgrade from 1.4.1?

These steps allow you to automatically upgrade a device installed with Tails Installer from Tails 1.4.1 to Tails 1.5~rc1.

  1. Start Tails 1.4.1 from a USB stick or SD card (installed by the Tails Installer), and set an administration password.

  2. Run this command in a Root Terminal to select the "alpha" upgrade channel and start the upgrade:

    echo TAILS_CHANNEL=\"alpha\" >> /etc/os-release && \
         tails-upgrade-frontend-wrapper
    
  3. Once the upgrade has been installed, restart Tails and look at Applications ▸ Tails ▸ About Tails to confirm that the running system is Tails 1.5~rc1.

What's new since 1.4.1?

Changes since Tails 1.4.1 are:

  • Major new features

    • Move LAN web browsing from Tor Browser to the Unsafe Browser, and forbid access to the LAN from the former.
    • Install a 32-bit GRUB EFI boot loader. This at least works on some Intel Baytrail systems.
    • Upgrade Tor Browser to 5.0a4-build3.
  • Security fixes

    • Fix panic mode on MAC spoofing failure.
    • Deny Tor Browser access to global tmp directories with AppArmor.
    • Tails Installer: don't use a predictable file name for the subprocess error log.
    • Pidgin AppArmor profile: disable the launchpad-integration abstraction.
    • Use aliases so that our AppArmor policy applies to /lib/live/mount/overlay/ and /lib/live/mount/rootfs/*.squashfs/ as well as it applies to /.
    • Upgrade Linux to 3.16.7-ckt11-1+deb8u2.
    • Upgrade bind9-host, dnsutils and friends to 1:9.8.4.dfsg.P1-6+nmu2+deb7u6.
    • Upgrade cups-filters to 1.0.18-2.1+deb7u2.
    • Upgrade ghostscript to 9.05~dfsg-6.3+deb7u2.
    • Upgrade libexpat1 to 2.1.0-1+deb7u2.
    • Upgrade libicu48 to 4.8.1.1-12+deb7u3.
    • Upgrade libwmf0.2-7 to 0.2.8.4-10.3+deb7u1.
    • Upgrade openjdk-7 to 7u79-2.5.6-1~deb7u1.
  • Bugfixes

    • Upgrade Tor to 0.2.6.10-1~d70.wheezy+1+tails1.
  • Minor improvements

    • Tails Installer: let the user know when it has rejected a candidate destination device because it is too small.
    • Tails Installer: prevent users from trying to "upgrade" a device that contains no Tails, or that was not installed with Tails Installer.
    • Install libotr5 and pidgin-otr 4.x from wheezy-backports. This adds support for the OTRv3 protocol and for multiple concurrent connections to the same account.
    • Skip warning dialog when starting Tor Browser while being offline, in case it is already running. Thanks to Austin English for the patch!
    • Install the apparmor-profiles package, but don't ship a bunch of AppArmor profiles we don't use, to avoid increasing boot time.
    • Ship a /etc/apparmor.d/tunables/home.d/tails snippet, instead of patching /etc/apparmor.d/tunables/home.
    • live-boot: don't mount tmpfs twice on /live/overlay, so that the one which is actually used as the read-write branch of the root filesystem's union mount, is visible.

There are numerous other changes that might not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.

Known issues in 1.5~rc1

  • A critical security hole affects the version of Tor Browser included in Tails 1.5~rc1.
    To workaround this problem:

    1. Type about:config in the Tor Browser address bar
    2. Search for the pdfjs.disabled entry
    3. Set the pdfjs.disabled entry to True
    4. Repeat steps 1 to 3 for each other web browser you want to use in Tails 1.5~rc1: Unsafe Browser, I2P Browser.

    • This workaround is not persistent: you have to apply it again every time you start Tails 1.5~rc1.
    • The version of Tor Browser included in Tails 1.4.1 is not affected.
    • This security hole will be corrected in the final Tails 1.5 release.
    • For technical details, see Mozilla Foundation Security Advisory 2015-78.
  • At least 2 GB of RAM is now needed for Tails to work smoothly.

  • Longstanding known issues

Posted Thu 06 Aug 2015 12:00:00 PM CEST

The release date for Tails 1.4.1 had been postponed because Mozilla changed their release schedule. It was released in the beginning of July. Once again, this report consists of non-code news :)

Releases

Documentation and website

User experience

Infrastructure

  • Our test suite covers 182 scenarios, just as in May. We removed outdated scenarios again, so there are actually new tests :) New tests add coverage for the Tor Browser's New Identity feature and confirm that the hardware clock is not updated by Tails. Additionally, a huge amount of work was put into making our test suite more robust.

  • We decided to publicly archive the tails-support mailing list, since external websites were archiving it anyway.

  • Great progress was made towards automatically building all active branches with Jenkins. Live deployment is now a matter of days.

  • We have specified the requirements for our upcoming monitoring system.

Funding

  • If you want to help us develop and maintain Tails, please donate :)

  • We sent our final report for the Access Innovation Prize received in March 2014.

  • We submitted our second quarterly report to the Digital Defenders Partnership.

Outreach

Upcoming events

  • A talk about Tails will take place during DebConf15 in August in Heidelberg, Germany.

  • Please let us know if you organize an event about Tails, we'll be glad to announce it :)

On-going discussions

Press and testimonials

Translation

All website PO files

  • de: 18% (1256) strings translated, 0% strings fuzzy, 17% words translated
  • fr: 45% (3046) strings translated, 2% strings fuzzy, 43% words translated
  • pt: 28% (1861) strings translated, 3% strings fuzzy, 26% words translated

Total original words: 76665

Core PO files

  • de: 60% (791) strings translated, 1% strings fuzzy, 68% words translated
  • fr: 91% (1205) strings translated, 4% strings fuzzy, 92% words translated
  • pt: 84% (1119) strings translated, 8% strings fuzzy, 87% words translated

Total original words: 14258

Metrics

  • Tails has been started more than 391,084 times this month. This makes 13,036 boots a day on average.

  • 19,284 downloads of the OpenPGP signature of Tails ISO from our website.

  • 57 bug reports were received through WhisperBack.

-- Report by BitingBird for Tails folks

Posted Tue 04 Aug 2015 01:38:38 PM CEST

Tails, The Amnesic Incognito Live System, version 1.4.1, is out.

This release fixes numerous security issues and all users must upgrade as soon as possible.

Changes

Upgrades and changes

  • Upgrade Tor Browser to 4.5.3, based on Firefox 31.8.0 ESR.

  • Upgrade Tor to 0.2.6.9-1~d70.wheezy+1+tails2.

  • Upgrade Linux to 3.16.7-ckt11-1.

There are numerous other changes that might not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.

Fixed problems

  • Have AppArmor deny Tor Browser access to the list of recently used files.

  • Fix automatic upgrades in Windows Camouflage mode.

Known issues

See the current list of known issues.

Download or upgrade

Go to the download page.

What's coming up?

The next Tails release is scheduled for August 11.

Have a look to our roadmap to see where we are heading to.

Do you want to help? There are many ways you can contribute to Tails, for example by donating. If you want to help, come talk to us!

Posted Fri 03 Jul 2015 12:34:56 PM CEST Tags:

Last month, despite all the blossoming flowers (at least in the northern hemisphere), we still worked on our computers to release 1.4 :)

Let's use this report to mention that we provide many user support options (public email, encrypted mail, IRC) but we don't do user support on Twitter. We also saw that there is an active subReddit dedicated to Tails, but we don't follow it and thus cannot guarantee the quality of answers provided there.

That being said, we're really happy to see the growing community around Tails!

Releases

The following changes were introduced in Tails 1.4.

New features

  • Tor Browser 4.5 now has a security slider that you can use to disable browser features, such as JavaScript, as a trade-off between security and usability. The security slider is set to low by default to provide the same level of security as previous versions and the most usable experience.

    We disabled in Tails the new circuit view of Tor Browser 4.5 for security reasons. You can still use the network map of Vidalia to inspect your circuits.

  • Tails OpenPGP Applet now has a shortcut to the gedit text editor, thanks to Ivan Bliminse.

  • Paperkey lets you print a backup of your OpenPGP secret keys on paper.

Upgrades and changes

  • Tor Browser 4.5 protects better against third-party tracking. Often when visiting a website, many connections are created to transfer both the content of the main website (its page, images, and so on) and third-party content from other websites (advertisements, Like buttons, and so on). In Tor Browser 4.5, all such content, from the main website as well as the third-party websites, goes through the same Tor circuits. And these circuits are not reused when visiting a different website. This prevents third-party websites from correlating your visits to different websites.

  • Tor Browser 4.5 now keeps using the same Tor circuit while you are visiting a website. This prevents the website from suddenly changing language, behavior, or logging you out.

  • Disconnect is the new default search engine. Disconnect provides Google search results to Tor users without captchas or bans.

  • Better support for Vietnamese in LibreOffice through the installation of fonts-linuxlibertine.

  • Disable security warnings when connecting to POP3 and IMAP ports that are mostly used for StartTLS nowadays.

  • Support for more printers through the installation of printer-driver-gutenprint.

  • Upgrade Tor to 0.2.6.7.

  • Upgrade I2P to 0.9.19 that has several fixes and improvements for floodfill performance.

  • Remove the obsolete #i2p-help IRC channel from Pidgin.

  • Remove the command line email client mutt and msmtp.

There are numerous other changes that might not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.

Fixed problems

  • Make the browser theme of the Windows 8 camouflage compatible with the Unsafe Browser and the I2P Browser.

  • Remove the Tor Network Settings... from the Torbutton menu.

  • Better support for Chromebook C720-2800 through the upgrade of syslinux.

  • Fix the localization of Tails Upgrader.

  • Fix the OpenPGP key servers configured in Seahorse.

  • Prevent Tor Browser from crashing when Orca is enabled.

Upcoming code changes

Here are the upcoming changes we have already been working on for the next releases:

  • We fixed cases where the hardware clock was set to the system time on shutdown (ticket #9364).

  • We disabled LAN access in Tor Browser (ticket #7976).

  • We prevented Tails Installer from upgrading devices that has no Tails installed (ticket #5623).

  • We removed /var/cache/man/ from the ISO image (ticket #9417).

  • We installed the Linux kernel from Debian Jessie (ticket #9341).

  • We installed the apparmor-profiles package (ticket #9539).

  • We started porting our ISO build system to Debian Jessie (ticket #9262).

  • We worked with upstream on sandboxing I2P (ticket #7724).

Miscellaneous

  • We continued working on packaging Tails Installer for Debian (ticket #8866).

  • We started evaluating Tails on touchscreen devices, and made progress on 32-bit UEFI support.

Documentation and website

User experience

Infrastructure

  • We improved our automated test suite to make it a lot more robust. As a result, some of us are now able to run it entirely without any false positive!

  • We wrote new tests for Electrum, the "Report an error" launcher, etc.

  • We investigated how we can run the Tor Browser's automated test suite as part of our own. We now have a working, though hackish, proof-of-concept.

  • Our test suite covers 182 scenarios, 5 more that in April.

  • The bot that gives information about tickets on IRC now displays links to Redmine.

Funding

Outreach

Upcoming events

  • Cornelius Kölbel will speak about Tails at Tübix on June 13th (in German).

  • Les Chats Cosmiques is organizing a workshop about Tails and Tor at La Cantine Brestoise in Brest, France on June 18.

  • Tchou and Fiodor Tonti will be in Pas Sage en Seine 2015 at NUMA in Paris, France on June 18 to present our UX work and conduct user testing of the future Installation Assistant.

  • Please let us know if you organize an event about Tails, we'll be glad to announce it :)

On-going discussions

Press and testimonials

  • Many online newspapers covered the 1.4 release, see our press page.

Translation

  • We're planning to improve our website's translation platform. If you're knowledgeable about one or if you want to help testing some, please see the ticket #9049 and blueprint!

All website PO files

  • de: 19% (1251) strings translated, 0% strings fuzzy, 17% words translated
  • fr: 46% (3023) strings translated, 2% strings fuzzy, 43% words translated
  • pt: 28% (1861) strings translated, 3% strings fuzzy, 26% words translated

Total original words: 75770

Core PO files

  • de: 60% (791) strings translated, 1% strings fuzzy, 68% words translated
  • fr: 89% (1184) strings translated, 5% strings fuzzy, 90% words translated
  • pt: 84% (1119) strings translated, 8% strings fuzzy, 87% words translated

Total original words: 14259

Metrics

  • Tails has been started more than 421,127 times this month. This makes 13,584 boots a day on average.

  • 24,204 downloads of the OpenPGP signature of Tails ISO from our website.

  • 107 bug reports were received through WhisperBack.

-- Report by BitingBird for Tails folks

Posted Wed 10 Jun 2015 11:00:24 PM CEST

Tails, The Amnesic Incognito Live System, version 1.4, is out.

This release fixes numerous security issues and all users must upgrade as soon as possible.

Changes

New features

  • Tor Browser 4.5 now has a security slider that you can use to disable browser features, such as JavaScript, as a trade-off between security and usability. The security slider is set to low by default to provide the same level of security as previous versions and the most usable experience.

    We disabled in Tails the new circuit view of Tor Browser 4.5 for security reasons. You can still use the network map of Vidalia to inspect your circuits.

  • Tails OpenPGP Applet now has a shortcut to the gedit text editor, thanks to Ivan Bliminse.

  • Paperkey lets you print a backup of your OpenPGP secret keys on paper.

Upgrades and changes

  • Tor Browser 4.5 protects better against third-party tracking. Often when visiting a website, many connections are created to transfer both the content of the main website (its page, images, and so on) and third-party content from other websites (advertisements, Like buttons, and so on). In Tor Browser 4.5, all such content, from the main website as well as the third-party websites, goes through the same Tor circuits. And these circuits are not reused when visiting a different website. This prevents third-party websites from correlating your visits to different websites.

  • Tor Browser 4.5 now keeps using the same Tor circuit while you are visiting a website. This prevents the website from suddenly changing language, behavior, or logging you out.

  • Disconnect is the new default search engine. Disconnect provides Google search results to Tor users without captchas or bans.

  • Better support for Vietnamese in LibreOffice through the installation of fonts-linuxlibertine.

  • Disable security warnings when connecting to POP3 and IMAP ports that are mostly used for StartTLS nowadays.

  • Support for more printers through the installation of printer-driver-gutenprint.

  • Upgrade Tor to 0.2.6.7.

  • Upgrade I2P to 0.9.19 that has several fixes and improvements for floodfill performance.

  • Remove the obsolete #i2p-help IRC channel from Pidgin.

  • Remove the command line email client mutt and msmtp.

There are numerous other changes that might not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.

Fixed problems

  • Make the browser theme of the Windows 8 camouflage compatible with the Unsafe Browser and the I2P Browser.

  • Remove the Tor Network Settings... from the Torbutton menu.

  • Better support for Chromebook C720-2800 through the upgrade of syslinux.

  • Fix the localization of Tails Upgrader.

  • Fix the OpenPGP key servers configured in Seahorse.

  • Prevent Tor Browser from crashing when Orca is enabled.

Known issues

  • Claws Mail stores plaintext copies of all emails on the remote IMAP server, including those that are meant to be encrypted. If you send OpenPGP encrypted emails using Claws Mail and IMAP, make sure to apply one of the workarounds documented in our security announcement.

  • See the current list of known issues.

Download or upgrade

Go to the download page.

What's coming up?

The next Tails release is scheduled for June 30.

Have a look to our roadmap to see where we are heading to.

Do you want to help? There are many ways you can contribute to Tails. If you want to help, come talk to us!

Posted Tue 12 May 2015 12:34:56 PM CEST Tags:

This report is a bit special: since we release every 6 weeks, there is no release this month. The next one is planned for the 12th of May. Therefore there are no code news, the work being done will be reported when it's released :)

However, like any Free Software project, Tails is not only about the code, so here are the news about the other parts of the project!

Documentation and website

User experience

Infrastructure

Outreach

Upcoming events

On-going discussions

Translation and internationalization

Given all the recent changes in the documentation, the translation statistics went a bit down. The German and French teams are working hard to keep up-to-date. The Portuguese team needs new translators to help :)

All website PO files

  • de: 16% (1025) strings translated, 0% strings fuzzy, 16% words translated
  • fr: 46% (2936) strings translated, 2% strings fuzzy, 44% words translated
  • pt: 29% (1879) strings translated, 3% strings fuzzy, 27% words translated

Total original words: 73541

Core PO files

  • de: 43% (569) strings translated, 1% strings fuzzy, 56% words translated
  • fr: 90% (1177) strings translated, 4% strings fuzzy, 91% words translated
  • pt: 86% (1121) strings translated, 8% strings fuzzy, 89% words translated

Total original words: 14111

Metrics

  • Tails has been started more than 397,162 times this month. This makes 13,238 boots a day on average.
  • 24,088 downloads of the OpenPGP signature of Tails ISO from our website.
  • 62 bug reports were received through WhisperBack.
Posted Thu 07 May 2015 10:47:40 PM CEST

You can help Tails! The first release candidate for the upcoming version 1.4 is out. Please test it and see if it works for you.

How to test Tails 1.4~rc1?

  1. Keep in mind that this is a test image. We have made sure that it is not broken in an obvious way, but it might still contain undiscovered issues.

  2. Either try the automatic upgrade, or download the ISO image and its signature:

    Tails 1.4~rc1 ISO image

    Tails 1.4~rc1 signature

  3. Verify the ISO image.

  4. Have a look at the list of known issues of this release and the list of longstanding known issues.

  5. Test wildly!

If you find anything that is not working as it should, please report to us! Bonus points if you first check if it is a known issue of this release or a longstanding known issue.

How to automatically upgrade from 1.3.2?

These steps allow you to automatically upgrade a device installed with Tails Installer from Tails 1.3.2 to Tails 1.4~rc1.

  1. Start Tails 1.3.2 from a USB stick or SD card (installed by the Tails Installer), and set an administration password.

  2. Run this command in a Root Terminal to select the "alpha" upgrade channel and start the upgrade:

    echo TAILS_CHANNEL=\"alpha\" >> /etc/os-release && \
         tails-upgrade-frontend-wrapper
    
  3. Once the upgrade has been installed, restart Tails and look at Applications ▸ Tails ▸ About Tails to confirm that the running system is Tails 1.4~rc1.

What's new since 1.3.2?

Changes since Tails 1.3.2 are:

  • Major new features

    • Upgrade Tor Browser to 4.5, which introduces many major new features for usability, security and privacy. Unfortunately its per-tab circuit view did not make it into Tails yet since it requires exposing more Tor state to the user running the Tor Browser than we are currently comfortable with. (Closes: ticket #9031)
    • Upgrade Tor to 0.2.6.7-1~d70.wheezy+1+tails2. Like in the Tor bundled with the Tor Browser, we patch it so that circuits used for SOCKSAuth streams have their lifetime increased indefinitely while in active use. This currently only affects the Tor Browser in Tails, and should improve the experience on certain websites that otherwise would switch language or log you out every ten minutes or so when Tor switches circuit. (Closes: ticket #7934)
  • Security fixes

    • Upgrade Linux to 3.16.7-ckt9-3.
    • Upgrade curl to 7.26.0-1+wheezy13.
    • Upgrade dpkg to 1.16.16.
    • Upgrade gstreamer0.10-plugins-bad to 0.10.23-7.1+deb7u2.
    • Upgrade libgd2-xpm to 2.0.36~rc1~dfsg-6.1+deb7u1.
    • Upgrade openldap to 2.4.31-2.
    • Upgrade LibreOffice to 1:3.5.4+dfsg2-0+deb7u4.
    • Upgrade libruby1.9.1 to 1.9.3.194-8.1+deb7u5.
    • Upgrade libtasn1-3 to 2.13-2+deb7u2.
    • Upgrade libx11 to 2:1.5.0-1+deb7u2.
    • Upgrade libxml-libxml-perl to 2.0001+dfsg-1+deb7u1.
    • Upgrade libxml2 to 2.8.0+dfsg1-7+wheezy4.
    • Upgrade OpenJDK to 7u79-2.5.5-1~deb7u1.
    • Upgrade ppp to 2.4.5-5.1+deb7u2.
  • Bugfixes

    • Make the Windows 8 browser theme compatible with the Unsafe and I2P browsers. (Closes: ticket #9138)
    • Hide Torbutton's "Tor Network Settings..." context menu entry. (Closes: ticket #7647)
    • Upgrade the syslinux packages to support booting Tails on Chromebook C720-2800. (Closes: ticket #9044)
    • Enable localization in Tails Upgrader. (Closes: ticket #9190)
    • Make sure the system clock isn't before the build date during early boot. Our live-config hook that imports our signing keys depend on that the system clock isn't before the date when the keys where created. (Closes: ticket #9149)
    • Set GNOME's OpenPGP keys via desktop.gnome.crypto.pgp to prevent us from getting GNOME's default keyserver in addition to our own. (Closes: ticket #9233)
    • Prevent Firefox from crashing when Orca is enabled: grant it access to assistive technologies in its Apparmor profile. (Closes: ticket #9261)
    • Add Jessie APT source. (Closes: ticket #9278)
    • Fix set_simple_config_key(). If the key already existed in the config file before the call, all other lines would be removed due to the sed option -n and p combo. (Closes: ticket #9122)
  • Minor improvements

    • Upgrade I2P to 0.9.19-3~deb7u+1. (Closes: ticket #9229)
    • Install Tor Browser's bundled Torbutton instead of custom .deb. As of Torbutton 1.9.1.0 everything we need has been upstreamed.
    • Install Tor Browser's bundled Tor Launcher instead of our in-tree version. With Tor 0.2.6.x our custom patches for the ClientTransportPlugin hacks are not needed any more. (Closes: ticket #7283)
    • Don't install msmtp and mutt. (Closes: ticket #8727)
    • Install fonts-linuxlibertine for improved Vietnamese support in LibreOffice. (Closes: ticket #8996)
    • Remove obsoletete #i2p-help IRC channel from the Pidgin configuration (Closes: ticket #9137)
    • Add Gedit shortcut to gpgApplet's context menu. Thanks to Ivan Bliminse for the patch. (Closes: ticket #9069).
    • Install printer-driver-gutenprint to support more printer models. (Closes: ticket #8994).
    • Install paperkey for off-line OpenPGP key backup. (Closes: ticket #8957)
    • Hide the Tor logo in Tor Launcher. (Closes: ticket #8696)
    • Remove useless log() instance in tails-unblock-network. (Closes: ticket #9034)

Known issues in 1.4~rc1

  • The Windows 8 theme is slightly broken for all browsers: the default Firefox tab bar is used, and the search bar is enabled. (ticket #9326)

  • Tails' Tor Browser still uses Startpage as the default search engine instead of Disconnect.me like upstream Tor Browser, but the Unsafe Browser does use Disconnect.me. (ticket #9309)

  • Longstanding known issues

Posted Sun 03 May 2015 12:00:00 PM CEST