1 [[!meta title="Tails report for October, 2013"]]
6 Tails 0.21 [[was released|news/version_0.21]] on October 29.
9 [scheduled](https://mailman.boum.org/pipermail/tails-dev/2013-September/003718.html)
15 - Tails has been started more than 189 979 times in October.
16 This makes a boot every 14 seconds on average.
17 - 15 226 downloads of the OpenPGP signature of Tails ISO.
18 - 86 reports were received through WhisperBack.
23 - Andres Gomez Ramirez proposed an
24 [initial patch](https://mailman.boum.org/pipermail/tails-dev/2013-October/003810.html)
25 to warn when caps-lock in on in the Greeter ([[!tails_ticket 5917]]).
26 - We had a low-hanging fruits session [on October 12](https://mailman.boum.org/pipermail/tails-dev/2013-October/003860.html),
27 and malaparte couldn't stop in the end :)
28 - Some issues were fixed for the migration to [[!tails_gitweb_branch
29 feature/wheezy desc="Tails Wheezy"]] ([[!tails_ticket 6015]]).
30 - The branch for SD cards support wired via [[!tails_gitweb_branch
31 feature/sdio desc="SDIO"]] was merged ([[!tails_ticket 6324]]).
32 - Some [[!tails_gitweb_branch feature/vagrant-libvirt desc="initial
33 work"]] to build Tails with vagrant-libvirt was done
34 ([[blueprint|blueprint/vagrant-libvirt]], [[!tails_ticket 6212]]).
35 - A [[!tails_gitweb_branch feature/stronger-gnupg-cipher
36 desc="branch"]] to use stronger ciphers in GnuPG was prepared
38 - Kevin C. Krinke is [working
39 on](https://git-tails.immerda.ch/kevin/clock/) a clock applet that
40 allows displays local time, while keeping UTC as the
42 - [[!tails_gitweb_branch test/fix-detection-of-used-display]]
44 - [[!tails_gitweb_branch feature/Debian-proposed-updates]] was merged,
45 and reverted after the Squeeze point-release was out.
46 - Tails now uses the [[!tails_gitweb_branch
47 feature/same-startpage-custom-url-as-tbb desc="same custom Startpage
49 - The ikiwiki setup was [[!tails_gitweb_branch
50 feature/simplify_ikiwiki_setup desc="simplified"]].
51 - Some [[!tails_gitweb_branch feature/persistent_printers
52 desc="fixes"]] to the persistent printers feature were prepared
54 - A web browser resizing bug was [partially
55 fixed](https://git-tails.immerda.ch/torbutton/tag/?id=debian/1.5.2-2)
56 ([[!tails_ticket 6377]]).
57 - Now installing Linux 3.10.x [[!tails_gitweb_branch
58 feature/linux-3.10.11 desc="from Debian testing"]].
59 - The [[!tails_gitweb_branch security/vidalia_in_its_own_user
60 desc="branch"]] to run Vidalia as its own user was polished and
61 merged. Too bad nobody detected at RC stage the regression it
62 brought, that made its way into Tails 0.21. Did we mention you
63 should test our release candidates?
64 - The branch [[!tails_gitweb_branch feature/consistent-peristence-path
65 desc="branch"]] to have a consistent path to the persistent volume
66 mountpoint was polished and merged ([[!tails_ticket 5854]]).
67 - The work towards MAC spoofing [[!tails_gitweb_branch
68 feature/spoof-mac desc="went on"]].
69 - Various regressions detected in 0.21~rc1 were fixed in time for the
70 0.21 final release. Not all, unfortunately.
71 - Some [[!tails_gitweb_branch feature/ff24 desc="initial work"]] was
72 done towards the migration to Torbutton 1.6.x ([[!tails_ticket
73 6371]]) and Firefox 24 ([[!tails_ticket 6370]]).
74 - A [[!debbug 725779 desc="plan"]] was proposed to fix OTR protocol
75 downgrade in Debian Squeeze and Wheezy.
76 - Some build-dependencies for Tails software were uploaded to Debian,
78 [[!debpts libdist-zilla-plugin-test-notabs-perl]],
79 [[!debpts libdist-zilla-plugin-test-perl-critic-perl]] and
80 [[!debpts libdist-zilla-plugin-installguide-perl]].
81 - An initscript for Tahoe-LAFS has been [[!debbug 652003 desc="written"]].
82 - killyourtv volunteered to maintain I2P in Tails.
83 - Incremental updates were worked on.
84 - [[!debpts bilibop]] 0.4.17, 0.4.17~bpo70+1, 0.4.18 and 0.4.19 were
86 - [[!debpts mat]] 0.4-1 and 0.4.2-1 were uploaded to Debian.
87 - A few patches for AppArmor profiles were submitted upstream.
89 Documentation and website
90 =========================
92 - The [[contribute]] section was significantly improved.
93 [[!tails_ticket 6165 desc="More"]] is coming.
94 - The bug reporting workflow [[!tails_gitweb_branch
95 doc/improve_bug_reporting_workflow desc="was improved"]].
96 - [The first round of cleaning the forum is over!](https://mailman.boum.org/pipermail/tails-dev/2013-October/003910.html).
97 - The Front Desk role [[was documented|contribute/working_together/roles/front_desk]].
98 - Public meetings notes are [[now online|contribute/meetings]].
99 - Drafts were proposed to:
100 * [point to newbie-friendly Git
101 documentation](https://git-tails.immerda.ch/mercedes508/tails/log/?h=doc/newbie_git_doc_links).
102 - Documentation was added to explain:
103 * [[!tails_gitweb_branch doc/additional_software_and_tor
104 desc="that (almost any) additional software cannot connect without Tor"]];
105 * [[!tails_gitweb_branch doc/explain_why_Tor_is_slow desc="why Tor is slow"]]
106 ([[!tails_ticket 5641]]);
107 * [[!tails_gitweb_branch doc/explain_path_for_claws_mail_persistent desc="how to make Claws Mail persistence cover email retrieved over POP3"]];
108 * [that OpenPGP keyring can be made persistent](https://git-tails.immerda.ch/mercedes508/tails/log/?h=doc/gpgapplet_gnupg_persistence)
109 in the OpenPGP applet documentation ([[!tails_ticket 6332]]);
110 * [[!tails_gitweb_branch doc/using_a_virtual_keyboard desc="how to use a virtual keyboard"]].
111 - Some [[!tails_ticket 5797 desc="logo proposals"]] were sent by
112 Andrew Pilkington from Picasso Fish.
113 - A new team proposed to maintain the [translation in
114 German](https://mailman.boum.org/pipermail/tails-l10n/2013-October/000718.html).
119 - A pbuilder chroot to build Iceweasel 24 was prepared.
120 - A donation of UEFI hardware was proposed by
121 [ThinkPenguin.com](https://www.thinkpenguin.com/) and should be
122 finalized soon. Thank you!
123 - We now have a bot on IRC that displays the description of mentioned
124 tickets. Thank you, weasel!
125 - All our tickets were looked at and triaged.
130 - Adding a [clock](https://mailman.boum.org/pipermail/tails-dev/2013-October/003762.html)
131 [applet](https://mailman.boum.org/pipermail/tails-dev/2013-October/003992.html).
132 - [MAC address spoofing](https://mailman.boum.org/pipermail/tails-dev/2013-October/003835.html)
133 - [Installing caff or monkeysign](https://mailman.boum.org/pipermail/tails-dev/2013-October/003767.html)
134 ([[!tails_ticket 6338]])
135 - [The future of TrueCrypt implementations in Tails](https://mailman.boum.org/pipermail/tails-dev/2013-October/003790.html)
136 ([[!tails_ticket 5373]])
137 - [Bitcoin in Tails](https://mailman.boum.org/pipermail/tails-dev/2013-October/003773.html)
138 - [uVirtus design](https://mailman.boum.org/pipermail/tails-dev/2013-October/003828.html)
139 - [Making the system partition bigger](https://mailman.boum.org/pipermail/tails-dev/2013-October/003857.html)
140 - [Timing of the move to FF24](https://mailman.boum.org/pipermail/tails-dev/2013-October/003885.html)
141 - [Tor Launcher in Tails?](https://mailman.boum.org/pipermail/tails-dev/2013-October/003935.html)
142 - [Using version instead of release in APT preferences?](https://mailman.boum.org/pipermail/tails-dev/2013-October/003972.html)
143 - [Roles description for contribute section](https://mailman.boum.org/pipermail/tails-dev/2013-October/003984.html)
148 - A talk about Tails [was
149 held](http://www.irill.org/events/tails-confidentialite-et-anonymat-pour-tous-et-partout)
150 in Paris. Thanks to Stefano Zacchiroli for organizing it, and to
151 IRILL for hosting it!
156 - We have sent proposals to sponsors Echo and Hotel.
157 - We have been approached for a funding proposal by sponsor Golf.
158 - We read a lot and got in touch with various people to gather enough
159 information to decide if we're going to create a dedicated
160 non-profit organization for Tails, or use another existing one as
163 Press and testimonials
164 ======================
166 * 2013-10-15: [CRYPTO-GRAM, October 15,
167 2013](http://www.schneier.com/crypto-gram-1310.html) —
168 Bruce Schneier: "One thing I didn't do, although it's worth considering, is
169 use a stateless operating system like Tails. You can configure Tails with a
170 persistent volume to save your data, but no operating system changes are ever
171 saved. Booting Tails from a read-only DVD -- you can keep your data on an
172 encrypted USB stick -- is even more secure. Of course, this is not foolproof,
173 but it greatly reduces the potential avenues for attack."