1 [[!meta title="Tails report for April, 2014"]]
6 Tails 1.0 was released on April 29.
11 - Tails has been started more than 292 595 times in April.
12 This make 9 753 boots a day in average.
13 - 35 029 downloads of the OpenPGP signature of Tails ISO.
14 - 105 reports were received through WhisperBack.
19 * Quite some work was put into adapting Tails to Debian 7 (Wheezy).
20 The result will be released on June 10, as Tails 1.1.
21 - Thanks to the amazing work done in Debian by Ulrike, we are
22 [[!tails_gitweb_branch
23 feature/6608-OpenPGP-signature-verification-in-Nautilus
24 desc="almost there"]] when it comes to adding back support for
25 OpenPGP signature verification in Nautilus ([[!tails_ticket
27 - The Vagrant setup was [[!tails_gitweb_branch
28 bugfix/vagrant-ram-bump-for-wheezy desc="fixed"]] to allow
29 building Tails/Wheezy images in RAM ([[!tails_ticket 7132]]).
30 - Synaptic was made to [[!tails_gitweb_branch
31 bugfix/7055-drop-default-APT-release desc="start again"]] on
32 Wheezy ([[!tails_ticket 7055]]).
33 - The Debian Mozilla team's repository used on the devel branch
34 [[!tails_gitweb_branch bugfix/use-Wheezy-repo-for-debian-mozilla
35 desc="was updated"]] for Wheezy ([[!tails_ticket 7063]]).
36 - The latest version of the MAT [[!tails_gitweb_branch
37 feature/mat-0.5.2 desc="is now installed"]] ([[!tails_ticket
39 - Initial progress [[!tails_gitweb_branch
40 feature/6342-update-camouflage-for-gnome3 desc="was made"]] to
41 update the Windows camouflage.
42 [[!tails_ticket 6342]]
43 * The APT suite being used when building from the stable branch
44 [[!tails_gitweb_branch
45 bugfix/7022-use-stable-APT-suite-when-building-from-stable-branch
46 desc="was corrected"]] ([[!tails_ticket 7022]]).
47 * The new logo [[!tails_gitweb_branch
48 feature/7096-integrate-the-new-logo-in-about-tails desc="was
49 integrated"]] in the *About Tails* dialog ([[!tails_ticket 7096]]).
50 * Some Vagrant compatibility issues [[!tails_gitweb_branch
51 bugfix/fix-vagrant-compatibility-issues desc="were fixed"]]
52 ([[!tails_ticket 7134]]).
53 * The blacklisting of directory authority keys that have been used
54 with versions of OpenSSL affected by Heartbleed
55 [[!tails_gitweb_branch feature/tor-0.2.4.21-1+tails1_d70.wheezy+1
56 desc="was backported"]] into our Tor packages.
57 * Our modified Tor Launcher [[!tails_gitweb_branch
58 feature/tor-launcher-0.2.5.3 desc="was updated"]] to avoid
59 [[!tails_ticket 6934 desc="pretending that we ship a default set of bridges"]].
60 * I2P [[!tails_gitweb_branch bugfix/i2p_incoming desc="was explicitly
61 told"]] that it cannot receive inbound connections ([[!tails_ticket 7070]]).
62 * An attempt at migrating our source tree to live-build 3.x
63 [[!tails_gitweb_branch feature/live-build-3.x desc="was made"]]
64 ([[!tails_ticket 5691]]). It is still entirely unclear whether the
65 cost/benefit ratio is worth it, especially because live-build 4.x
66 has already gone quite further in terms of incompatibilities, and is
67 far from being ready for prime-time yet.
68 * A patch to make the Greeter's help window resolution-aware was
69 [proposed](https://mailman.boum.org/pipermail/tails-dev/2014-April/005451.html)
70 ([[!tails_ticket 7009]]).
71 * Another proposed patch aims at fixing the Tails Installer fonts size
72 on Wheezy ([[!tails_ticket 5673]]).
74 Documentation and website
75 =========================
77 * The [[support/FAQ]] was published.
78 * The [[logo|promote/logo]] that [[won|news/and_the_winner_is]] the
79 contest [[!tails_gitweb_branch feature/logo desc="was integrated"]]
80 in the website, and on the boot loader's splash screen
81 ([[!tails_ticket 7090]]).
82 * Some initial steps [were
83 walked](https://git-tails.immerda.ch/451f/tails/log/?h=websitemodernization)
84 to modernize our website's markup and CSS, including moving to HTML5
85 and better responsiveness ([[!tails_ticket 7021]]).
86 Compatibility with older browsers is left to be tested before we can
87 apply these changes to the live website.
88 * Many documentation pages were deeply reworked as part of [[!tails_ticket 5977]]:
89 [[!tails_gitweb_branch doc/why_tor]],
90 [[!tails_gitweb_branch doc/vidalia]],
91 [[!tails_gitweb_branch doc/unsafe_browser]],
92 [[!tails_gitweb_branch doc/network-manager]],
93 and [[!tails_gitweb_branch doc/introduction]].
94 * The [[homepage|index]] now [[!tails_gitweb_branch
95 doc/mention-Debian-on-the-homepage desc="makes it clear"]] that
96 Tails is based on Debian, Tor, and is Free software.
97 * The MAC spoofing documentation [[!tails_gitweb_branch
98 doc/7054-explain-why-not-randomising-oui-part-of-mac desc="now explains"]]
99 why we do not randomize the OUI part of MAC addresses.
100 * The way to update our Tor Launcher is [[!tails_gitweb_branch
101 doc/bridge-mode-design desc="now documented"]].
102 * The I2P documentation [[!tails_gitweb_branch_kytv bugfix/I2P-page
103 desc="was slightly improved"]].
104 * The CSS of the boxed titles was improved ([[!tails_ticket 6323]]).
109 * The German translation team has been making great progress, and we
110 are not considering dropping this language from our website anymore.
111 * The French translation team got a new member.
112 * The Italian translation team has been reviewing strings in
113 Transifex, and working on their internal workflow and processes.
114 There is hope that they start translating the website soon.
115 * A list of glossaries used by translation teams [[!tails_ticket 6968
116 desc="is being compiled"]].
121 * Quite a lot of progress was made to make our automated test suite
122 support Tails based on Debian Wheezy: [[!tails_gitweb_branch
123 test/6559-adapt-test-suite-for-Wheezy]], [[!tails_gitweb_branch
124 test/6559-adapt-test-suite-for-Wheezy-by-anonym]] ([[!tails_ticket
126 * An automated test case [[!tails_gitweb_branch
127 test/6275-boot-device-write-access-via-udisks desc="was written"]]
128 to check write access to the boot device via udisks [[!tails_ticket
130 * Our Jenkins master configuration was migrated to
131 a [[!tails_gitweb_repo puppet-tails desc="published module"]].
132 * We now install debomatic from wheezy-backports, for easier
133 maintenance and a more stable infrastructure.
134 * Thanks to Alster's suggestion, the boum.org administrators could
135 [add a few security-oriented HTTP
136 headers](https://mailman.boum.org/pipermail/tails-dev/2014-April/005392.html)
138 * Jurre van Bergen has requested an audit by OpenITP's Peer Review
139 Board ([[!tails_ticket 6889]]).
140 * For ethical reasons, we have renamed our *Broken Window* Redmine
141 category to *Hole in the Roof*.
147 website](https://mailman.boum.org/pipermail/tails-dev/2014-April/005476.html)
149 * [Making it easy to backup and restore a persistent
150 volume](https://mailman.boum.org/pipermail/tails-dev/2014-April/005388.html)
151 ([[!tails_ticket 5301]]).
152 * Jacob Appelbaum expressed interest in [getting a grsec-patched Linux
153 kernel](https://mailman.boum.org/pipermail/tails-dev/2014-April/005413.html)
154 into Tails. Of course, this requires doing the same in Debian, which
155 is not a trivial mission.
156 * [Installing gimp-ufraw?](https://mailman.boum.org/pipermail/tails-dev/2014-April/005587.html)
157 * [Installing tcplay?](https://mailman.boum.org/pipermail/tails-dev/2014-April/005595.html)
158 * [Tracking Jessie-related tickets](https://mailman.boum.org/pipermail/tails-dev/2014-April/005429.html)
163 - We are still the process of getting the contracts signed both for
164 a grant we were awarded by OpenITP at the end of 2013, and for the
165 Access Innovation Prize.
167 - We have been talking with Mozilla and Tor about supporting the Tails
168 summit and hackfest, scheduled for July.
170 - Our proposal to the Knight Foundation News Challenge was not
171 selected among the finalists. If you know why, please share your
174 - The [crowdfunding campaign](https://pressfreedomfoundation.org/) by
175 the Freedom of the Press Foundation has made great progress. It is
176 still time to donate.
181 * A [[call for testing|news/test_UEFI]] for the upcoming UEFI support
184 Press and testimonials
185 ======================
187 Dozens of [[press articles|press]] about Tails were written in April,
190 * In [TAILS: Snowden's favorite anonymous, secure OS goes
191 1.0](http://boingboing.net/2014/04/30/tails-snowdens-favorite-ano.html), Cory
192 Doctorow writes "Effectively, this is the ParanoidLinux I fictionalized in my
193 novel Little Brother."
194 * [Tails reaches 1.0](https://lwn.net/SubscriberLink/596765/380d4e75b17ea491/) by Nathan
195 Willis in Linux Weekly News.
196 * [Anonymous OS reportedly used by Snowden reaches version 1.0](http://www.cnet.com/news/anonymous-os-reportedly-favored-by-nsa-whistle-blower-edward-snowden-reaches-version-1-0/)
197 by Steven Musil in CNET.
198 * 2014-04-29: [This is the most secure computer you’ll ever
199 own](http://www.theverge.com/2014/4/29/5664884/this-is-the-most-secure-computer-you-ll-ever-own)
200 by Russell Brandom, in The Verge.
201 * 2014-04-23: Amaelle Guiton mentions Tails in the article [Chiffrer le Net pour
202 retrouver notre vie privée en ligne: une bonne solution qui pose des
203 problèmes](http://www.slate.fr/monde/86275/cyberespace-cypherspace-crypter-chiffrement-internet)
204 in Slate (in French).
205 * 2014-04-17: Bruce Schneier writes "Nice article on the Tails
206 stateless operating system. I use it." [in a blog
207 post](https://www.schneier.com/blog/archives/2014/04/tails.html).
208 * 2014-04-14: In the [press
209 conference](http://www.democracynow.org/blog/2014/4/11/video_glenn_greenwald_laura_poitras_q)
210 she held after winning a Polk Award for her reporting on Edward Snowden and
211 the NSA, Laura Poitras said "We just published a blog about a tool that's
212 called Tails, which is a operating system that runs on either USB stick or SD
213 disc, that is a sort of all-in-one encryption tool that you can use for PGP
214 and encryption. And it's just really secure. [...] So, it's a really important
215 tool for journalists."
216 * 2014-04-14: [Out in the Open: Inside the Operating System Edward
217 Snowden Used to Evade the NSA](http://www.wired.com/2014/04/tails/)
218 by Klint Finley, in Wired.
219 * 2014-04-02: In [Help Support the Little-Known Privacy Tool That Has
220 Been Critical to Journalists Reporting on the
221 NSA](https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa)
223 - Laura Poitras says: "I've been reluctant to go into details about
224 the different steps I took to communicate securely with Snowden to
225 avoid those methods being targeted. Now that Tails gives a green
226 light, I can say it has been an essential tool for reporting the
227 NSA story. It is an all-in-one secure digital communication system
228 (GPG email, OTR chat, Tor web browser, encrypted storage) that is
229 small enough to swallow. I'm very thankful to the Tails developers
230 for building this tool."
231 - Glenn Greenwald says: "Tails have been vital to my ability to work
232 securely on the NSA story. The more I've come to learn about
233 communications security, the more central Tails has become to
235 - Barton Gellman says: "Privacy and encryption work, but it's too
236 easy to make a mistake that exposes you. Tails puts the essential
237 tools in one place, with a design that makes it hard to screw them
238 up. I could not have talked to Edward Snowden without this kind of
239 protection. I wish I'd had it years ago."