Releases

Tails 0.22.1 was released on February 4.

Metrics

  • Tails has been started more than 222 134 times in February. This make 7 933 boots a day in average.
  • 453 082 downloads of the OpenPGP signature of Tails ISO. Weird.
  • 92 reports were received through WhisperBack.

Code

New features:

Software updates:

Bug and regression fixes:

Towards Tails based on Debian Wheezy:

  • I2P packages compatible with Debian Wheezy were prepared, and are now installed in the feature/wheezy branch.
  • Application launchers were added to the GNOME panel.
  • A launcher to start the documentation viewer was added to the applications menu.
  • A more standard icon is used for the shutdown button.

Documentation, website and localization

  • Icons for the different roles on the Contribute section were finalized and deployed live.
  • The ?FAQ was greatly expanded, and is now almost ready for prime-time.
  • We have made good progress on specifying how the Tails logo should look like (ticket #5797).
  • It was documented how to improve Tails by working on Debian. We have received positive feedback from Debian contributors about it.
  • Many small improvements to the documentation and its translations were done, including:
    • quite a few clarifications in the documentation for new contributors;
    • updated system requirements documentation;
    • documented how to change the passphrase for the persistent volume (ticket #5621).
  • Links to the I2P website were updated.
  • Documentation for the new MAC address spoofing feature was drafted.
  • Work is in progress on documentation about contributing to Tails in the infrastructure (systems administration, automation) area.

Infrastructure

  • Our Puppet modules were published. This was a first blocker before we can welcome contributions to our infrastructure.
  • The system that hosts our Redmine was re-installed from scratch on a new machine, upgraded to Debian Wheezy and to Redmine 1.4.4.
  • Some improvements to our automated test suite were merged: test/fix-persistence-checks, test/keep-volumes-tag, and test/5959-antitest-memory-erasure. Thanks to this and the robustness improvements brought by the move to RJB, we were finally able to remove two of the most painful sets of tests from our manual test suite.
  • A mailing-list for early testers was created and is being set up.

On-going discussions

Funding

  • We have discussed with GNOME how they could use the money they have raised for privacy and anonymity improvements.

Outreach

  • We have been working with people who want to build bridges between the graphics designers and usability experts community on the one hand, and Free Software developers on the other hand. Thanks to this collaboration, it is likely that Tails will go through a usability study in a few months, followed by a hackfest that will put at work designers and usability experts for finding solutions to (some of) the identified issues. The Tails sprint in July might host this hackfest.
  • One of us attended FOSDEM, and got a chance to talk with many interesting people in person there.
  • We got in touch with the people behind Freepto, and are looking how our two projects could collaborate more.
  • We are participating in two new Debian teams: the Debian OTR Team and the Debian AppArmor Profiles Team.

Press and testimonials

  • 2014-02-27: In his article "Why It’s Vital For Users to Fund Open-Source Encryption Tools" Trevor Timm from Freedom of the Press Foundation explains that Tails « has been vital for most, if not all, of the NSA journalists. [...] Its prime use case is journalists trying to communicate or work in environments in which they may normally be at risk or compromised. The NSA stories have been the biggest story in journalism in the past decade, yet the tool the reporters rely on is incredibly underfunded, is maintained by only a handful of developers, and operates on a shoestring budget. »
  • 2014-02-07: In his review of uVirtus, Kheops, from Telecomix concludes that « Users should prefer Tails and other mature secure live distributions (such as IprediaOS, Liberté Linux, Privatix and Whonix) over uVirtus since they provide a real safety improvement to the user. For any activity that does not entail transferring large quantities of data (such as video files), there is no strong reason to prefer uVirtus over any of these. »