5 * the [[corresponding design document|contribute/design/incremental_upgrades]];
6 * the tickets with the _Incremental upgrades_ category on [[!tails_redmine "" desc="Redmine"]].
8 # Random ideas for future improvements
10 These are not worth creating tickets yet, as it's not even clear these
11 changes are useful enough to put time in it.
13 ### Packaging could be more self-contained
15 Move `/etc/sudoers.d/zzz_upgrade` and IUK-related user creation from
16 the Tails main Git repository to the `tails-iuk` Debian package, so
17 that it's more self-contained and easier to test.
19 ### Button for aborting upgrade cleanly
21 ### Compute and display ETA
23 ### Multi-step incremental upgrade
25 E.g. 0.11 boots after 0.11.1 and 0.11.2 are out. Tails fetches
26 https://tails.boum.org/upgrade/v1/Tails/0.11/i386/stable/upgrades.yml,
27 that shall contain an incremental upgrade path with two target files:
28 the 0.11 to 0.11.1 IUK, and the 0.11.1 to 0.11.2 IUK. The upgrader
29 would download these two files and install the two IUKs in the
32 ### sharing upgrade material
34 Once the incremental upgrade has been applied, I may be proposed to
35 save a copy of the target files to a location of my choosing.
37 ### allow one to download target files in the clear
39 The downloader program could provide an opt-in way to have the
40 download happen in the clear, that is without going through the Tor
41 network. It looks doable given it's a separate process: we may run it
42 as a dedicated user, and reuse the `clearnet` infrastructure
43 implemented for the Unsafe Browser.
45 [[!tails_ticket 7878]]
47 ### "Retry with new circuit" button
49 Circuit throughput varies wildly, and since this is a large download,
50 it'll quickly wear out users' patience if a bad circuit is picked.
51 Or maybe this can happen behind the scenes, e.g.: Automatically
52 switch circuit every X minutes or Y% progress? That could even make
53 fingerprinting the download on the Tor client <-> Entry Node side of
54 the pipe a bit more difficult, for whatever that's worth.
56 ### Surviving key compromise
58 * https://wiki.ubuntu.com/ImageBasedUpgrades/GPG