1 [[!meta title="Tails report for December, 2013"]]
6 Tails 0.22 was released on December 11.
8 Tails 0.22.1 is scheduled for January 21. The schedule for the next
9 releases is on our [[contribute/calendar]].
14 - Tails has been started more than 218 512 times in December.
15 This make 7 049 boots a day in average.
16 - 17 791 downloads of the OpenPGP signature of Tails ISO.
17 - 103 reports were received through WhisperBack.
24 - Huge progress was made on the [[!tails_gitweb_branch
25 feature/spoof-mac desc="MAC spoofing feature"]], that [[can now be
26 tested|news/spoof-mac]] ([[!tails_ticket 5421]]).
27 - Experimental UEFI support was completed and is been tested. A bit
28 more work [[!tails_ticket 5739 desc="is needed"]], though.
29 - The last mile was basically [[!tails_gitweb_branch
30 feature/incremental-upgrades-integration desc="completed"]]
31 regarding incremental upgrades, that will be enabled by default
32 starting with Tails 0.22.1 ([[!tails_ticket 6014]]).
36 - David Wolinsky has [started
37 porting](https://mailman.boum.org/pipermail/tails-dev/2013-December/004517.html)
38 the WiNoN design to Tails: multiple, independent VMs connected to
39 independent paths through the Tor network in order to wear multiple
40 hats. Also, as David put it: "There are other benefits of using VMs
41 as the Whonix folks have recognized" ([[!tails_ticket 5748]]).
42 - We have struggled against a [[!tails_ticket 6460 desc="memory wipe
43 regression"]] on some hardware with recent Linux kernels. No success
45 - Some progress was made towards the [[!tails_gitweb_branch
46 feature/wheezy desc="migration to Wheezy"]] (Tails 1.1).
48 [Monkeysign](http://web.monkeysphere.info/monkeysign/) was
49 [[!tails_gitweb_branch feature/monkeysign desc="merged"]]
50 ([[!tails_ticket 6455]]), but [[!tails_ticket 6515 desc="more work
53 Bug and regression fixes:
55 - [[!tails_gitweb_branch bugfix/6468-disable-webrtc desc="Disable
56 WebRTC"]] ([[!tails_ticket 6468]]).
57 - [[!tails_gitweb_branch bugfix/6478 desc="Fix keyboard shortcuts"]]
58 ([[!tails_ticket 6478).
59 - [[!tails_gitweb_branch bugfix/6477-htpdate-user-agent desc="Use the
60 same User-Agent in htpdate as in the Tor Browser"]] ([[!tails_ticket
62 - [[!tails_gitweb_branch bugfix/unsafe-browser-vs.-FF24 desc="Fix the
63 Unsafe Browser configuration"]] ([[!tails_ticket 6479]]).
64 - [[!tails_gitweb_branch
65 bugfix/6536-IE-icon-in-Windows-camouflage-mode desc="Set the browser
66 icon to IE's one in Windows camouflage mode"]].
68 Branches pending review:
70 - [[!tails_gitweb_branch feature/amd64-kernel desc="Install a 64-bit
72 - [[!tails_gitweb_branch feature/poedit-from-backports desc="Install
73 poedit from official backports"]] was proposed ([[!tails_ticket
75 - [[!tails_gitweb_branch 5588-no-autologin-consoles desc="Do not
76 create auto-login text consoles"]] ([[!tails_ticket 5588]]).
80 - [[!tails_gitweb_branch bugfix/tor-0.2.4-is-stable desc="Tor 0.2.4 is
82 - The Persistent Volume Assistant now [[!tails_ticket 5311
83 desc="displays nicer paths"]]. Thanks to Andres Gomez!
84 - Torbutton was [[!tails_gitweb_branch feature/torbutton-1.6.5.3
85 desc="upgraded"]] to 1.6.5.3 ([[!tails_ticket 6566]]).
86 - Our Tor Browser build and runtime dependencies
87 [[!tails_gitweb_branch feature/torbrowser-24.2.0esr-1+tails1
88 desc="were updated"]].
89 - We have fixed various NSS security issues in squeeze-backports
90 ([[!tails_ticket 6497]]).
92 Documentation and website
93 =========================
95 - A branch to [[!tails_gitweb_branch feature/cleanup-ikiwiki-setup
96 "clean up our ikiwiki configuration"]] was started.
97 - The [[Mac installation
98 instructions|doc/first_steps/installation/manual/mac]] were made
100 - The links to files and branches in cgit were fixed.
101 - The tails-support mailing-list is now mentioned on [[Help other
102 Tails users|contribute/how/help]].
103 - The documentation for incremental upgrades was written.
104 - The documentation for MAC spoofing was drafted.
105 - The [[draft FAQ|blueprint/faq]] has now more content.
113 - The Tails automated test suite [[!tails_gitweb_branch
114 test/rjb-migration desc="can now be run"]] on pure Debian Wheezy
115 with backports ([[!tails_ticket 6399]]). This allowed us to update
116 the test suite to match current code, fix many bugs in it, and
117 improve style a bit. Most of this was merged, but a few more
118 branches are pending review: [[!tails_ticket 5959]], [[!tails_ticket
119 5465]], and [[!tails_ticket 6544]].
120 - Our automated test suite was [[!tails_gitweb_branch feature/wheezy
121 desc="partially ported to the feature/wheezy branch"]].
126 - Thanks to David Wolinsky and others, our Vagrant setup
127 [[!tails_gitweb_branch bugfix/6221-support-newer-vagrant desc="was
128 updated"]] to work with newer Vagrant ([[!tails_ticket 6221]]), and
129 the corresponding basebox updated to include up-to-date Debian
130 archive keys. While we were at it, a few lurking bugs were fixed.
131 - Thanks to WinterFairy, [it is now
132 easy](https://git-tails.immerda.ch/winterfairy/tails/log/?h=feature/import-translations-extern)
133 to import translations from Transifex into our various
139 - [Tor Browser branding in Tails?](https://mailman.boum.org/pipermail/tails-dev/2013-December/004362.html)
140 - [Risks of enabled/disabled TCP
141 timestamps?](https://mailman.boum.org/pipermail/tails-dev/2013-December/004520.html)
142 ([[!tails_ticket 6579]])
147 - The Freedom of the Press Foundation launched a [campaign to support
149 journalists](https://pressfreedomfoundation.org/). Tails is among
150 the projects this campaign gathers fund for.
151 - The proposal we have sent to sponsor Echo was accepted.
152 - Our grant proposal with sponsor Charlie was rejected.
153 - We are slowly making progress on our grant proposal with
155 - We have almost completed a proposal to be sent to sponsor Lima.
156 - Our contract with sponsor Bravo is now finished.
157 - Tails will soon accept donations in currencies other than Bitcoin.
158 - We are now very likely to create a non-profit organization dedicated
160 - We have almost wrapped-up our bounties program. A report will be
166 Tails participated in the [30th Chaos Communication
167 Congress](https://events.ccc.de/congress/2013/wiki/Main_Page). It was
168 a great opportunity to meet, in person, a few existing and new
169 contributors, as well as many people we are working with.
171 A self-organized event called *Tails needs your help* was organized
172 ([slides](https://tails.boum.org/promote/slides/2013-12-29_-_Tails_needs_your_help.shtml)).
173 It was a success considering the late notice.
175 See you next year, probably with more space and events dedicated
178 Press and testimonials
179 ======================
181 * 2013-12: Bruce Schneier
182 [answered](http://www.reddit.com/r/IAmA/comments/1r8ibh/iama_security_technologist_and_author_bruce/cdknf7a)
183 to someone asking him what Linux distribution is its favorite: "I don't
184 use Linux. (Shhh. Don't tell anyone.) Although I have started using Tails".
185 * 2013-12-12: In [A conversation with Bruce
186 Schneier](http://boingboing.net/2013/12/15/bruce-schneier-and-eben-moglen-2.html),
187 as part of the "Snowden, the NSA and free software" cycle at
188 Columbia Law School NYC, Bruce Schneier says:
189 - "I think most of the public domain privacy tools are going to be
190 safe, yes. I think GPG is going to be safe. I think OTR is going
191 to be safe. I think that Tails is going to be safe. I do think
192 that these systems, because they were not -- you know, the NSA has
193 a big lever when a tool is written closed-source by a for-profit
194 corporation. There are levers they have that they don't have in
195 the open source international, altruistic community. And these are
196 generally written by crypto-paranoids, they're pretty well
197 designed. We make mistakes, but we find them and we correct them,
198 and we're getting good at that. I think that if the NSA is going
199 after these tools, they're going after implementations."
200 - "What do I trust? I trust, I trust Tails, I trust GPG [...]"
201 - "We can make it harder, we can make it more expensive, we can make
202 it more risky. And yes, every time we do something to increase one
203 of those, we're making ourselves safer. [...] There are tools we
204 are deploying in countries all over the world, that are keeping
205 people alive. Tor is one of them. I mean, Tor saves lives. [...]
206 And every time you use Tor [...] provides cover for everyone else
208 * Jacob Appelbaum stated at the [Chaos Communication
209 Congress](https://events.ccc.de/congress/2013/Fahrplan/events/5713.html):
210 "if you are a journalist and you are not using Tails, you should
211 probably be using Tails, unless you *really* know what