This release fixes many security issues and users should upgrade as soon as possible.
We enabled address space layout randomization in the Linux kernel (
kASLR) to improve protection from buffer overflow attacks.
rngdto improve the entropy of the random numbers generated on computers that have a hardware random number generator.
Upgrade Tor to 0.2.8.7.
Upgrade Tor Browser to 6.0.5.
Upgrade to Linux 4.6. This should improve the support for newer hardware (graphics, Wi-Fi, etc.)
Upgrade Icedove to 45.2.0.
Upgrade Tor Birdy to 0.2.0.
Upgrade Electrum to 2.6.4.
Install firmware for Intel SST sound cards (
Install firmware for Texas Instruments Wi-Fi interfaces (
non-freeAPT repositories. We documented how to configure additional APT repositories using the persistent volume.
Use a dedicated page as the homepage of Tor Browser so we can customize it for our users.
Set up the trigger for RAM erasure on shutdown earlier in the boot process. This should speed up shutdown and make RAM erasure more robust.
Make the Disable all networking and Tor bridge mode options of Tails Greeter more robust. (#11593)
For more details, read our changelog.
- For some users memory wiping fails more often than in Tails 2.5, and for some users it fails less often. Please report any such changes to #11786.
See the list of long-standing issues.
To install, follow our installation instructions.
To upgrade, an automatic upgrade is available from 2.5 to 2.6.
If you cannot do an automatic upgrade or if you fail to start after an automatic upgrade, please try to do a manual upgrade.
Tails 2.7 is scheduled for November 8.
Have a look at our roadmap to see where we are heading to.