Releases

Tails 0.21 was released on October 29.

Tails 0.22 is scheduled for December 11.

Metrics

  • Tails has been started more than 189 979 times in October. This makes a boot every 14 seconds on average.
  • 15 226 downloads of the OpenPGP signature of Tails ISO.
  • 86 reports were received through WhisperBack.

Code

  • Andres Gomez Ramirez proposed an initial patch to warn when caps-lock in on in the Greeter (#5917).
  • We had a low-hanging fruits session on October 12, and malaparte couldn't stop in the end :)
  • Some issues were fixed for the migration to Tails Wheezy (#6015).
  • The branch for SD cards support wired via SDIO was merged (#6324).
  • Some initial work to build Tails with vagrant-libvirt was done (blueprint, #6212).
  • A branch to use stronger ciphers in GnuPG was prepared and merged.
  • Kevin C. Krinke is working on a clock applet that allows displays local time, while keeping UTC as the system timezone.
  • test/fix-detection-of-used-display was merged.
  • feature/Debian-proposed-updates was merged, and reverted after the Squeeze point-release was out.
  • Tails now uses the same custom Startpage URL as the TBB.
  • The ikiwiki setup was simplified.
  • Some fixes to the persistent printers feature were prepared and merged.
  • A web browser resizing bug was partially fixed (#6377).
  • Now installing Linux 3.10.x from Debian testing.
  • The branch to run Vidalia as its own user was polished and merged. Too bad nobody detected at RC stage the regression it brought, that made its way into Tails 0.21. Did we mention you should test our release candidates?
  • The branch branch to have a consistent path to the persistent volume mountpoint was polished and merged (#5854).
  • The work towards MAC spoofing went on.
  • Various regressions detected in 0.21~rc1 were fixed in time for the 0.21 final release. Not all, unfortunately.
  • Some initial work was done towards the migration to Torbutton 1.6.x (#6371) and Firefox 24 (#6370).
  • A plan was proposed to fix OTR protocol downgrade in Debian Squeeze and Wheezy.
  • Some build-dependencies for Tails software were uploaded to Debian, and accepted: libdist-zilla-plugin-test-notabs-perl, libdist-zilla-plugin-test-perl-critic-perl and libdist-zilla-plugin-installguide-perl.
  • An initscript for Tahoe-LAFS has been written.
  • killyourtv volunteered to maintain I2P in Tails.
  • Incremental updates were worked on.
  • bilibop 0.4.17, 0.4.17~bpo70+1, 0.4.18 and 0.4.19 were uploaded to Debian.
  • mat 0.4-1 and 0.4.2-1 were uploaded to Debian.
  • A few patches for AppArmor profiles were submitted upstream.

Documentation and website

Infrastructure

  • A pbuilder chroot to build Iceweasel 24 was prepared.
  • A donation of UEFI hardware was proposed by ThinkPenguin.com and should be finalized soon. Thank you!
  • We now have a bot on IRC that displays the description of mentioned tickets. Thank you, weasel!
  • All our tickets were looked at and triaged.

On-going discussions

Outreach

  • A talk about Tails was held in Paris. Thanks to Stefano Zacchiroli for organizing it, and to IRILL for hosting it!

Funding

  • We have sent proposals to sponsors Echo and Hotel.
  • We have been approached for a funding proposal by sponsor Golf.
  • We read a lot and got in touch with various people to gather enough information to decide if we're going to create a dedicated non-profit organization for Tails, or use another existing one as our fiscal sponsor.

Press and testimonials

  • 2013-10-15: CRYPTO-GRAM, October 15, 2013 — Bruce Schneier: "One thing I didn't do, although it's worth considering, is use a stateless operating system like Tails. You can configure Tails with a persistent volume to save your data, but no operating system changes are ever saved. Booting Tails from a read-only DVD -- you can keep your data on an encrypted USB stick -- is even more secure. Of course, this is not foolproof, but it greatly reduces the potential avenues for attack."