1 [[!meta date="Wed Apr 29 12:00:00 2014"]]
2 [[!meta title="Tails 1.0 is out"]]
5 Tails, The Amnesic Incognito Live System, version 1.0, is out.
7 All users must [[upgrade|doc/first_steps/upgrade]] as soon as possible: this release fixes
8 [[numerous security issues|security/Numerous_security_holes_in_0.23]].
14 We are especially proud to present you Tails 1.0!
16 Version 1.0 is often an [[!wikipedia Version_number#Version_1.0_as_a_milestone
17 desc="important milestone"]] that denotes the maturity of a free software
18 project. The first public version of what would become Tails was released on
19 June 23 2009, when it was called [[Amnesia|version_0.2]]. That was almost five
20 years ago. Tails 1.0 marks the 36th stable release since then.
24 We have been working since then on the many features we think
25 are essential both in terms of security and usability:
27 - [[USB installer|doc/first_steps/installation]]
28 - [[automatic upgrades|doc/first_steps/upgrade]]
29 - [[persistence|doc/first_steps/persistence]]
30 - [[support for Tor bridges|doc/first_steps/startup_options/bridge_mode]] and
32 configuration|doc/first_steps/startup_options/network_configuration]]
33 - [[MAC address spoofing|doc/first_steps/startup_options/mac_spoofing]]
34 - [[extensive and translated documentation|doc]]
35 - and [[many more...|doc/about/features]]
37 But this has been a continuous work over the past years, and you will see that
38 1.0 itself does not bring a lot of effective changes for the user. Still, to mark
39 the occasion, we integrated our [[new logo|news/and_the_winner_is]] on the
40 website and the boot menu.
44 The maturity of Tails is also reflected in:
46 - Its wide adoption. In the last 18 months, the approximate number of Tails
47 users has been multiplied by 4.
48 - All the good things said about Tails by reputed people and organisations
49 such as [Freedom of the Press
50 Foundation](https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa),
52 Schneier](http://boingboing.net/2013/12/15/bruce-schneier-and-eben-moglen-2.html),
54 Borders](https://www.wefightcensorship.org/article/tails-amnesic-incognito-live-systemhtml.html),
55 [the NSA](http://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity),
56 and [[many more...|press]]
60 Version 1.0 does not mean that we will stop adding new features and improving
61 Tails. Briefly, here are our plans for the future:
63 - [Tails 1.1](https://labs.riseup.net/code/projects/tails/roadmap#Tails_1.1),
64 due in June 2014, will be based on Debian 7 (Wheezy) and will bring many new
65 versions of the software included in Tails.
67 - [Tails 2.0](https://labs.riseup.net/code/projects/tails/roadmap#Tails_2.0)
68 will focus on sustainability and maintainability. Most of that work aims at
69 reducing the workload of creating new versions of Tails through infrastructure
70 improvements and automated testing. Our objective is to be able to release
71 same-day security updates.
73 - [Tails 3.0](https://labs.riseup.net/code/projects/tails/roadmap#Tails_3.0)
74 will focus on changes in the internals of Tails to make it more secure. That
75 includes sandboxing critical applications and software hardening.
77 And of course, new contributors with all kinds of skills are always welcome.
78 There is surely [[something **you** can do|contribute]] to make Tails better.
82 Notable user-visible changes include:
85 - Upgrade the web browser to 24.5.0esr-0+tails1~bpo60+1
86 (Firefox 24.5.0esr + Iceweasel patches + Torbrowser patches).
87 - Upgrade Tor to 0.2.4.21-1+tails1~d60.squeeze+1:
88 * Based on 0.2.4.21-1~d60.squeeze+1.
89 * Backport the fix for [[!tor_bug 11464]]. It adds client-side
90 blacklists for all Tor directory authority keys that was
91 vulnerable to Heartbleed. This protects clients in case
92 attackers were able to compromise a majority of the authority
93 signing and identity keys.
96 - Disable inbound I2P connections. Tails already restricts incoming
97 connections, but this change tells I2P about it.
98 - Fix link to the system requirements documentation page in the Tails
99 Upgrader error shown when too little RAM is available.
102 - Upgrade I2P to 0.9.12-2~deb6u+1.
103 - Import TorBrowser profile. This was forgotten in Tails 0.23 and even
104 though we didn't explicitly set those preferences in that release
105 they defaulted to the same values. This future-proofs us in case the
106 defaults would ever change.
107 - Import new custom version of Tor Launcher:
108 * Based on upstream Tor Launcher 0.2.5.3.
109 * Improve how Tor Launcher handles incomplete translation.
110 ([[!tor_bug 11483]]; more future-proof fix for
111 [[!tails_ticket 6885]])
112 * Remove the bridge settings prompt. ([[!tor_bug 11482]]; closes
113 [[!tails_ticket 6934]])
114 * Always show bridge help button. ([[!tor_bug 11484]])
115 - Integrate the new Tails logo into various places:
118 * The "About Tails" dialog
121 Changelog](https://git-tails.immerda.ch/tails/plain/debian/changelog)
122 for technical details.
126 * [[Longstanding|support/known_issues]] known issues.
128 # I want to try it or to upgrade!
130 Go to the [[download]] page.
132 As no software is ever perfect, we maintain a list of [[problems
133 that affects the last release of Tails|support/known_issues]].
137 The next Tails release is [[scheduled|contribute/calendar]] for
140 Have a look to our [[!tails_roadmap]] to see where we are heading to.
142 Would you want to help? There are many ways [[**you** can
143 contribute to Tails|contribute]]. If you want to help, come talk