1 [[!meta title="Tails report for June and July, 2014"]]
6 - Tails 1.1~beta1 was released on May 30.
7 - Tails 1.0.1 was released on June 10.
8 - Tails 1.1 was released on July 22. This marked our migration to Debian
16 - Tails has been started more than 331 862 times in June.
17 This makes 11 062 boots a day in average.
18 - 25 124 downloads of the OpenPGP signature of Tails ISO from our
20 - 71 bug reports were received through WhisperBack.
24 - Tails has been started more than 355 608 times in July.
25 This makes 11 471 boots a day in average.
26 - 35 134 downloads of the OpenPGP signature of Tails ISO from our
28 - 160 bug reports were received through WhisperBack.
29 We discovered in late July than one of our WhisperBack relay was not
30 sending emails anymore since our fixes of the Heartbleed bug. This
31 explains the bump in the number of bug reports.
36 - Fixed device removal before Tails Greeter login ([[!tails_ticket 7333]]).
37 - Disabled the GnuPG functionality of GNOME Keyring ([[!tails_ticket 7330]]).
38 - Removed `dselect` ([[!tails_ticket 7336]]).
39 - Updated Tor browser to 24.6.0 ([[!tails_gitweb_branch
40 feature/torbrowser-24.6.0esr-0+tails1]]).
41 - Installed Linux 3.14 ([[!tails_gitweb_branch
42 feature/linux-3.14-in-squeeze]]).
43 - Fixed links to anchors in Yelp ([[!tails_ticket 7285]]).
44 - Included `syslinux` binaries in the ISO filesystem ([[!tails_gitweb_commit
46 - Prevented `iproute2` from being installed ([[!tails_ticket 7337]]).
47 - Changed local documentation to open in Yelp ([[!tails_gitweb_commit
49 - Set the UID of `tails-persistence-setup` to the same as it was in Squeeze
50 ([[!tails_ticket 7343]]).
51 - Forbidden the desktop user to pass arguments to `tails-upgrade-frontend`
52 ([[!tails_ticket 7410]]).
53 - Fixed many things to have a Windows 8 camouflage ready for Tails 1.1
54 ([[!tails_ticket 6342]], [[!tails_gitweb_branch
55 feature/6342-update-camouflage-for-gnome3]]).
56 - Fixed the migration of NetworkManager persistent settings ([[!tails_ticket
58 - Worked with the people from [Freepto](http://freepto.mx/) on pushing our tool for
59 RAM wiping to Debian, and we made some progress towards [using the
60 `wiperam` Debian package in
61 Tails](https://mailman.boum.org/pipermail/tails-dev/2014-June/006031.html)
62 ([[!tails_gitweb_branch feature/wiperam-deb]]).
63 - Shipped Windows binaries of `syslinux` in Tails ([[!tails_ticket 7425]]).
64 - Fixed the red theme of the Unsafe Browser ([[!tails_ticket 7473]]).
65 - Tightened up the permissions on `/home/amnesia` ([[!tails_ticket 7463]]).
66 - Fixed unsafe permissions on persistent files ([[!tails_ticket 7443]]).
67 - Prepared a solution to be able to "Upgrade from ISO" 1.0.1 to 1.1
68 ([[!tails_ticket 7345]]).
69 - Disabled the `proxy://` protocol handle of FoxyProxy ([[!tails_ticket
71 - Installed Tor 0.2.5.x on a topic branch ([[!tails_gitweb_commit
72 9f18b50]], [[!tails_ticket 7758]]).
73 - Removed the default bookmarks were removed from the Unsafe Browser
74 ([[!tails_ticket 7594]]).
75 - Fixed a bug that broke incremental upgrades for Tails > 1.1 ([[!tails_ticket
77 - Fixed our security check notification that were broken for months
78 ([[!tails_ticket 7657]]).
79 - Migrated our Vagrant basebox to Wheezy ([[!tails_ticket 7133]],
80 [[!tails_ticket 6736]], [[!tails_gitweb_branch
81 feature/vagrant-wheezy-basebox]]).
82 - Started to work on Tails Jessie. It is now possible to build Tails
84 [[!tails_gitweb_branch feature/jessie]] ([[!tails_ticket 6171]]).
85 - Jacob Appelbaum simplified our IPv6 firewall rules ([[!tails_ticket 7668]],
86 [[!tails_gitweb_branch feature/7668-simplify-IPv6-firewall-rules]]).
87 - Disabled TCP timestamps ([[!tails_ticket 6579]], [[!tails_gitweb_branch
88 feature/6579-disable-tcp-timestamps]]).
89 - Installed Linux 3.14-2 ([[!tails_gitweb_branch feature/linux-3.14-2]]).
90 - Prevented dhclient from sending the `amnesia` hostname over the network
91 ([[!tails_ticket 7688]]).
92 - Worked a bit towards towards supporting USB devices exposed as non-removable
93 ([[!tails_gitweb_commit 0a255dc]], [[!tails_ticket 7387]]).
94 - Installed `gnome-user-guide` to fix the Help launcher in the menus
95 ([[!tails_ticket 7618]]).
96 - Fixed the configuration of printers from the GNOME control center
97 ([[!tails_ticket 7636]]).
98 - Worked on installing `rngd` ([[!tails_ticket 5650]]).
99 - Compressed our ISO images more aggressively. They should be back to less
100 than 1 GB ([[!tails_ticket 7706]]).
101 - Started drafting a list of [[kernel modules to
102 blacklist|blueprint/blacklist_modules]].
104 Documentation and website
105 =========================
107 - Explained that OTR is disabled by default ([[!tails_gitweb_branch
109 - Reworked our documentation about working on sensitive documents:
110 - [[Office suite|doc/sensitive_documents/office_suite]]
111 - [[Graphics|doc/sensitive_documents/graphics]]
112 - [[Sound and video|doc/sensitive_documents/sound_and_video]]
113 - Adapted our documentation now that Tails supports UEFI
114 ([[!tails_gitweb_branch feature/uefi]]).
115 - Added a utility script to erase [[auto-generated PO
116 files|contribute/l10n_tricks/#index9h1]].
117 - Improved our documentation on [[building Tails|contribute/build]].
118 - Pointed to the release notes from the [[upgrade
119 instructions|doc/first_steps/upgrade]] ([[!tails_ticket 7665]]).
120 - Added a script to retrieve the [[list of translators on
121 Transifex|contribute/l10n_tricks#index10h1]].
122 - Redirected [[press requests|press]] to <tails-press@boum.org>.
127 The homepage of our website was [briefly
128 defaced](http://thehackernews.com/2014/06/tails-operating-system-website-has-beed.html)
129 on June 29 by rodit. This was later was Git-reverted, ikiwiki misconfiguration
130 was corrected. The underlying vulnerability has not been used for malicious purposes.
132 Translation and internationalization
133 ====================================
135 A new team started to translate our website [into
136 Spanish](https://mailman.boum.org/pipermail/tails-l10n/2014-June/001280.html).
141 - de: 11% (613) strings translated, +36 since May
142 - fr: 48% (2576) strings translated, +19 since May
143 - pt: 36% (1953) strings translated, +704 since May
145 [[Core PO files|contribute/l10n_tricks/core_po_files.txt]]
146 ----------------------------------------------------------
148 - de: 26% (338) strings translated, +31 since May
149 - fr: 95% (1207) strings translated, -5 since May
150 - pt: 99% (1257) strings translated, +488 since May
155 - Our test suite covers 87 scenarios, 3 more that in May.
156 - We now use OpenJDK7 to run our test suite ([[!tails_ticket 7175]]).
157 - We've adapted our infrastructure to the last version of the shared
158 postfix Puppet module.
159 - Our infrastructure was cleaned up from Squeeze-area bits
160 ([[!tails_ticket 7215]]).
161 - lizard's outgoing email setup was fixed ([[!tails_ticket 7485]]).
162 - Pushing to our master Git repository now automatically pushed to
163 the repository that triggers Jenkins builds ([[!tails_ticket 5558]]).
168 - [Tahoe-LAFS persistence](https://mailman.boum.org/pipermail/tails-dev/2014-June/005956.html)
169 - [The future of Vagrant Tails builds](https://mailman.boum.org/pipermail/tails-dev/2014-July/thread.html)
170 - [vpwned](https://mailman.boum.org/pipermail/tails-dev/2014-July/thread.html)
171 - [How the traffic confirmation attack on Tor affects Tails](https://mailman.boum.org/pipermail/tails-dev/2014-July/006518.html)
176 - Sent our final report for the OpenITP grant from fall 2013.
177 - The FPF crowdfunding extended their [crowdfunding
178 campaign](https://pressfreedomfoundation.org/bundle/encryption-tools-journalists).
179 - Signed the agreement with Access for their Innovation Prize we've won.
180 - Started working on two new grant applications to be submitted in August.
181 - Worked on a [web form for
182 donations](https://git-tails.immerda.ch/451f/tails/tree/wiki/src/contribute/how/donate.mdwn?h=web/donation)
183 in fiat currencies ([[!tails_ticket 7156]]).
188 We organized a very successful [[HackFest|news/Tails_HackFest_2014]] attended
189 by more than hundred people. This event was followed by our yearly
190 summit, attended by 15 people.
192 Among the concrete work done during those ten days, here is was can be found
195 - Made plans to fix in the long-term our [[mirror
196 infrastructure|blueprint/HTTP_mirror_pool]].
197 - Had ideas to [[better track our delta with
198 Debian|blueprint/better_track_and_document_our_delta_with_Debian]].
199 - Improved and published the [[future user interface of Tails
200 Greeter|blueprint/tails-greeter:_revamp_UI]].
201 - Drafted plans to [[fix our Vagrant basebox|blueprint/replace_vagrant]], and
202 [[considered Docker|blueprint/evaluate_Docker]] for replacement.
203 - Designed a Firefox extension to download and [[automatically verify a Tails
204 ISO image|blueprint/download_extension]].
205 - Drafted a design document about [[random numbers in
206 Tails|contribute/design/random]].
207 - Decided on a [[roadmap for our UX work|blueprint/UX_roadmap]].
208 - Brainstormed on a future structure for our
209 [[website|blueprint/website_structure]] and
210 [[homepage|blueprint/website_homepage]].
215 * 2014-07-26: [Tails 1.1 is announced](http://linuxfr.org/news/tails-1-1-est-disponible), in French,
216 in an article by pamputt on LinuxFr
217 * 2014-07: I2P bug and zero-days buzz:
218 - 2014-07-21: Exodus Intelligence [tweets about multiple RCE/de-anonymization
219 zero-days](https://twitter.com/ExodusIntel/status/491247299054428160) on the
220 day before Tails 1.1 is released.
221 - Several news websites relay that information before the details of the
222 vulnerability are disclosed:
223 - [Exploit Dealer: Snowden's Favorite OS Tails Has Zero-Day Vulnerabilities
225 Inside](http://www.forbes.com/sites/thomasbrewster/2014/07/21/exploit-dealer-snowdens-favourite-os-tails-has-zero-day-vulnerabilities-lurking-inside/)
226 by Thomas Brewster on Forbes.
227 - [Don't look, Snowden: Security biz chases Tails with zero-day flaws
228 alert](http://www.theregister.co.uk/2014/07/21/security_researchers_chase_tails_with_zeroday_flaw_disclosure/)
229 by Iain Thomson on The Register.
230 - [The world's most secure OS may have a serious
231 problem](http://www.theverge.com/2014/7/22/5927917/the-worlds-most-secure-os-may-have-a-serious-problem)
232 by Russell Brandom on The Verge
233 - 2014-07-23: We made our users [[aware of that
234 process|news/On_0days_exploits_and_disclosure]].
235 - 2014-07-23: Exodus Intelligence publishes [Silver Bullets and Fairy
236 Tails](http://blog.exodusintel.com/2014/07/23/silverbullets_and_fairytails/)
237 to explain the vulnerability.
238 - 2014-07-25: We publish a [[security
239 advisory|security/Security_hole_in_I2P_0.9.13]] explaining the scope of the
240 problem, and temporary solutions.
241 * 2014-07-08: In the [July 8th Keiser Report on RT](http://rt.com/shows/keiser-report/170908-episode-max-keiser-624/).
242 The Tails related part of the Keiser Report starts at 15'40".
243 * 2014-07-03: Tails above the Rest:
244 [Installation](http://www.linuxjournal.com/content/tails-above-rest-installation),
245 [Part II](http://www.linuxjournal.com/content/tails-above-rest-part-ii),
246 [Part III](http://www.linuxjournal.com/content/tails-above-rest-part-iii) by Kyle Rankin in the Linux Journal.
247 * 2014-07-03: Some articles on Tails users being targeted by NSA XKeyscore:
248 - In [NSA targets the privacy-conscious](http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html)
249 by J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge.
250 - In [Von der NSA als Extremist gebrandmarkt](http://www.tagesschau.de/inland/nsa-xkeyscore-100.html)
251 by Lena Kampf, Jacob Appelbaum and John Goetz (in German).
252 - In [If you read Boing Boing, the NSA considers you a target for deep surveillance](http://boingboing.net/2014/07/03/if-you-read-boing-boing-the-n.html)
254 - In [TOR, logiciel-clé de protection de la vie privée, dans le viseur de la NSA](http://www.lemonde.fr/pixels/article/2014/07/03/un-logiciel-cle-de-protection-de-la-vie-privee-dans-le-viseur-de-la-nsa_4450718_4408996.html)
255 by Martin Untersinger on LeMonde.fr (in French).
256 * 2014-06-25: [Dai segreti di Snowden ai social: il raduno italiano degli hacker](http://corrieredibologna.corriere.it/bologna/notizie/cronaca/2014/25-giugno-2014/dai-segreti-snowden-social-raduno-italiano-hacker-223459532934.shtml) by Andrea Rinaldi, in Corriere di Bologna (in Italian).
257 * 2014-06-30: [Tails, il sistema operativo incognito che frega l'NSA](http://www.wired.it/gadget/computer/2014/04/15/tails-sistema-operativo-incognito/) by Carola Frediani, in Wired.it (in Italian).