1 [[!meta date="Fri Nov 11 01:23:45 2011"]]
2 [[!meta title="Tails 0.9 is out"]]
5 The Amnesic Incognito Live System, version 0.9, is out.
7 All users must upgrade as soon as possible.
13 Notable user-visible changes include:
16 - Upgrade to 0.2.2.34. This fixes CVE-2011-2768 and CVE-2011-2769
17 which prompted for manual updates for users of Tails 0.8.1.
18 - Suppress Tor's warning about applications doing their own DNS
19 lookups. Some users have reported concerns about these warnings,
20 but it should be noted that they are completely harmless inside
21 Tails as its system DNS resolver is Torified.
23 * Linux 3.0.0-6, which fixed a great number of bugs and security issues.
26 - Upgrade to 3.5.16-11 ((fixes CVE-2011-3647, CVE-2011-3648,
28 - Torbutton: upgrade to 1.4.4.1-1, including support for the
29 in-browser "New identity" feature.
30 - FireGPG: upgrade to 0.8-1+tails2. Users are notified that the
31 FireGPG Text Editor is the only safe place for performing
32 cryptographic operations, and these operations has been disabled
33 in other places. Performing them outside of the editor opens up
34 several severe attacks through JavaScript (e.g. leaking plaintext
35 when decrypting, signing messages written by the attacker).
36 - Replace CS Lite with Cookie Monster for cookie management. Cookie
37 Monster has an arguably nicer interface, is being actively
38 maintained and is packaged in Debian.
41 - Install [MAT](https://mat.boum.org/), the Metadata Anonymisation
42 Toolkit. Its goal is to remove file metadata which otherwise
43 could leak information about you in the documents and media files
44 you publish. This is the result of a Tails developer's suggestion
45 for GSoC 2011, although it ended up being mentored by The Tor
47 - Upgrade WhisperBack to 1.5~rc1. Users are guided how to send their
48 bug reports through alternative channels upon errors sending
49 them. This will make bug reporting easier when there's no network
51 - Upgrade TrueCrypt to 7.1.
54 - The date and time setting system was completely reworked. This
55 should prevent time syncing issues that may prevent Tor from
56 working properly, which some users have reported. The new system
57 will not leave a fingerprintable network signature, like the old
58 system did. Previously that signature could be used to identify
59 who is using Tails (but *not* deanonymize them).
60 - Erase memory at shutdown: run many instances of the memory
61 wiper. Due to architectural limitations of i386 a process cannot
62 access all memory at the same time, and hence a single memory wipe
63 instance cannot clear all memory.
64 - Saner keyboard layouts for Arabic and Russian.
65 - Use Plymouth text-only splash screen at boot time.
67 Plus the usual bunch of minor bug reports and improvements.
70 Changelog](http://git.immerda.ch/?p=amnesia.git;a=blob_plain;f=debian/changelog;hb=refs/tags/0.9)
71 for technical details.
73 # I want to try it / to upgrade!
75 See the [[Getting started]] page.
79 The memory erasure on Tails shutdown cannot guarantee that all memory
80 in the 2 GB to 4 GB region is wiped. The improvements made in Tails
81 0.9 should at least make the situation better than previously.
83 # A glimpse towards the future
85 Were do we go from here? Have a look to our [[!tails_roadmap]] to
86 see where we are heading to.
88 Would you want to help? As explained in our [["how to contribute"
89 documentation|contribute]], here are many ways **you** can contribute
90 to Tails: no need to be a hardcore developer.