1 # SOME DESCRIPTIVE TITLE
2 # Copyright (C) YEAR Free Software Foundation, Inc.
3 # This file is distributed under the same license as the PACKAGE package.
4 # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
9 "Project-Id-Version: PACKAGE VERSION\n"
10 "POT-Creation-Date: 2013-10-24 02:30+0300\n"
11 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
12 "Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
13 "Language-Team: LANGUAGE <LL@li.org>\n"
16 "Content-Type: text/plain; charset=UTF-8\n"
17 "Content-Transfer-Encoding: 8bit\n"
21 msgid "[[!meta date=\"2011-03-02 00:46:14 +0100\"]]\n"
26 msgid "[[!meta title=\"Bimonthly report: January and February 2011\"]]\n"
31 msgid "[[!tag announce]]\n"
35 msgid "We are pleased to present you the first Tails bimonthly report ever."
40 "This is a first try that may, or may not, be followed by others depending on "
41 "the feedback we get: if you like reading such news about Tails, don't "
42 "hesitate [[telling us|support/talk]]!"
47 "This report sums up the work that was done on Tails in January and February "
53 msgid "[[!toc levels=2]]\n"
58 msgid "Helping third-parties do security analyses of Tails"
63 "We finished writing and published the [[Tails design document|contribute/"
64 "design]] that presents a specification of a *Privacy Enhancing Live "
65 "Distribution* (PELD) as well as the Tails actual implementation."
70 "By writing this document we intend to help third-parties do security "
71 "analyses of any given PELD and specifically of Tails. We also wish to help "
72 "establish best practices in the field of PELD design and implementation, and "
73 "thus raise the baseline for all similar projects out there."
77 msgid "Reviews of this document and audits of Tails are most welcome."
82 msgid "Preparing next release"
87 "The next Tails release, which will be called 0.7, is based on the newly "
88 "released Debian Squeeze. It has been feature freezed recently and is now "
89 "being tested in a wild, unsuspecting world; if it survives, we can bet it "
90 "will be the best Tails release ever... until 0.8 is out of course."
95 msgid "Protecting against memory recovery\n"
100 "A new, safer way to wipe memory on shutdown was implemented. It is now also "
101 "used when the boot media is physically removed: in an emergency situation, "
102 "one can grab her Tails Live USB stick or Live CD and leave while the system "
103 "will quickly erase her traces from the computer's memory and shut it down."
108 msgid "Making Tails easier to use\n"
113 "We enhanced the onBoard virtual keyboard; patches were obviously submitted "
119 "The Tails user interface was improved in several other ways: hiding some "
120 "useless GNOME preference menu items, using a background that does not "
121 "overlap with the bootloader menu, adding a shutdown button to the right of "
122 "the top GNOME panel (nice idea stolen from Ubuntu)."
127 msgid "Other noteworthy enhancements\n"
132 "A fix for a virtual keyboard critical bug was prepared, amongst the ton of "
133 "usual release preparation work."
138 "TrueCrypt can be optionally installed at boot time; we may not want to "
139 "include TrueCrypt forever, but we at the very least we want to provide a "
140 "migration path from TrueCrypt volumes created by good old Incognito to other "
146 "The [HTTPS Everywhere](https://www.eff.org/https-everywhere) Iceweasel "
147 "extension is now installed."
152 "Queries to DNS resolvers on the LAN are [[now forbidden|todo/"
153 "forbid_lan_dns_queries]]."
158 "Writing our [[design document|contribute/design]] made us think more "
159 "thoroughly various parts of the Tails configuration and enhance many parts "
160 "of it. Moreover, we compared it with the [Tor Browser Bundle](https://www."
161 "torproject.org/projects/torbrowser.html.en) configuration, picked many nice "
162 "ideas from there, and generally made Tails configuration more similar to the "
163 "TBB's one, which shall ease peer review and enlarge the anonymity set Tails "
164 "users are part of. A notable example is the enabling of US English browser "
165 "spoofing in Iceweasel."
170 "The HTP time synchronization system is now more robust wrt. network failures."
175 "GNOME automatic media mounting and opening was disabled to protect against a "
176 "class of attacks that was recently put under the spotlights."
185 msgid "Tails was added to a couple spots on the Tor website:"
190 "- https://www.torproject.org/projects/projects.html.en - https://www."
191 "torproject.org/getinvolved/volunteer.html.en#Projects"
196 "We discussed various funding and sponsoring opportunities; we have [prepared "
197 "three projects](https://www.torproject.org/getinvolved/volunteer."
198 "html#project-tails) that shall be submitted under the Tor Project umbrella "
199 "for the Google Summer of Code and other summer intership programs. [One of "
200 "those](https://www.torproject.org/getinvolved/volunteer."
201 "html#tailsDebianLive)."
206 "We have participated in the Debian Derivatives Census initiative ([[!debwiki "
207 "Derivatives/Census]]): Tails now has a dedicated page ([[!debwiki "
208 "Derivatives/Census/TAILS]]) on the Debian Wiki; in order to better cooperate "
209 "with Debian, we have followed their guidelines for Debian Derivatives ([[!"
210 "debwiki Derivatives/Guidelines]]); e.g. we have published a statement about "
211 "our [[contribute/relationship_with_upstream]]."
216 "Website design: a few visible enhancements have been pushed online, but stay "
217 "tuned, some more is being worked on under the hood! Rumor says our CSS "
218 "gnomes are preparing something pretty slick."
223 msgid "A glimpse towards the future"
228 "Bridges support: we now have a working prototype; it might not make its way "
229 "into the upcoming 0.7 release though."
234 "Accessibility tools for visually impaired people have been selected and are "
235 "installed in our development Git branch."
240 "We updated our survey of existing tools for easy install and upgrade of "
241 "Tails onto USB sticks, with support for an encrypted persistent volume in "
247 "More and more upcoming Tails features (including [[todo/persistence]], "
248 "[[todo/macchanger]], [[todo/bridge support]]) need ways to ask the user for "
249 "input at boot time. We have [[researched various ways|todo/boot_menu]] we "
250 "could implement this."
255 "We have researched how we could harden a bit Tails resistance against "
256 "exploitation of security issues in bundled software ([[todo/"
257 "Mandatory_Access_Control]], [[todo/nx_bit]], kernel hardening, compiler "
258 "hardening options) in a way that would not be a maintenance burden... while "
259 "being efficient enough to protect against some classes of attacks. We have "
260 "started efforts to push such hardening features in Debian."
265 "A general plan was thought through to reorganize the Tails user "
266 "documentation. Once this is done, several entry points will be available to "
267 "better fit a given user's available time and energy. In the meantime, we now "
268 "at least have a [[nice documentation|doc/first_steps/manual_usb_installation/"
269 "linux]] that explains how to install Tails onto a USB stick."