From e87b845f6a301011bea140a1e96bf5ffdf4f4671 Mon Sep 17 00:00:00 2001 From: Tails developers Date: Sat, 30 Aug 2014 18:01:13 +0000 Subject: [PATCH] Add DebConf BoF slides. --- .../promote/slides/DebConf14-20140830/.gitignore | 1 + .../src/promote/slides/DebConf14-20140830/Makefile | 17 ++ .../promote/slides/DebConf14-20140830/Tails.mdwn | 226 ++++++++++++++++ .../slides/DebConf14-20140830/Tails.mdwn.txt | 226 ++++++++++++++++ .../promote/slides/DebConf14-20140830/Tails.shtml | 293 +++++++++++++++++++++ 5 files changed, 763 insertions(+) create mode 100644 wiki/src/promote/slides/DebConf14-20140830/.gitignore create mode 100644 wiki/src/promote/slides/DebConf14-20140830/Makefile create mode 100644 wiki/src/promote/slides/DebConf14-20140830/Tails.mdwn create mode 100644 wiki/src/promote/slides/DebConf14-20140830/Tails.mdwn.txt create mode 100644 wiki/src/promote/slides/DebConf14-20140830/Tails.shtml diff --git a/wiki/src/promote/slides/DebConf14-20140830/.gitignore b/wiki/src/promote/slides/DebConf14-20140830/.gitignore new file mode 100644 index 00000000000..dece125851c --- /dev/null +++ b/wiki/src/promote/slides/DebConf14-20140830/.gitignore @@ -0,0 +1 @@ +reveal.js/ diff --git a/wiki/src/promote/slides/DebConf14-20140830/Makefile b/wiki/src/promote/slides/DebConf14-20140830/Makefile new file mode 100644 index 00000000000..62acd3b49b9 --- /dev/null +++ b/wiki/src/promote/slides/DebConf14-20140830/Makefile @@ -0,0 +1,17 @@ +default: all + +%.shtml: %.mdwn reveal.js/LICENSE + pandoc --self-contained -t revealjs -s $< -o $@ + +%.mdwn.txt: %.mdwn + cp -f $< $@ + +clean: + rm -f *.shtml *.mdwn.txt + +export: Tails.shtml Tails.mdwn.txt + +reveal.js/LICENSE: + git clone https://github.com/hakimel/reveal.js.git reveal.js + +all: export diff --git a/wiki/src/promote/slides/DebConf14-20140830/Tails.mdwn b/wiki/src/promote/slides/DebConf14-20140830/Tails.mdwn new file mode 100644 index 00000000000..aac3a39d0e8 --- /dev/null +++ b/wiki/src/promote/slides/DebConf14-20140830/Tails.mdwn @@ -0,0 +1,226 @@ +% Tails needs Debian + (and the other way around?) +% intrigeri +% August, 2014 + + + +What Tails is +============= + +What's in a name +---------------- + +**T**he **a**mnesic **i**ncognito **l**ive **s**ystem + + + +A Live operating system +----------------------- + +* works on (almost) any x86 computer +* boots off a DVD, a USB stick, or a SD card +* based on Debian ♥ + +Preserving privacy and anonymity #1 +----------------------------------- + +* use the Internet anonymously, circumvent censorship: + all connections to the Internet are forced to go through the Tor network +* leave no trace on the computer you are using unless you ask it + explicitly + +Preserving privacy and anonymity #2 +----------------------------------- + +* desktop cryptographic tools: + encrypt files, email and instant messaging + metadata anonymization () +* media production tools: + sound, video, office publishing, graphics... + +Usability = a security feature +------------------------------ + +> * yes, _you_ may be able to protect yourself +> * but privacy and security = collective matters +> * if only tech-savvy users can use our stuff, +> then the others will use something worse, +> and _collectively_ we've lost. + +Other features +-------------- + +* first release in 2009 +* translated into many languages +* Free Software, public and open development: + Git, Redmine, meetings and roadmap +* specs and design documentation: + +And... it works? +---------------- + +> * According to the NSA, yes: +> _(S//REL) Tails: Complete Bootable OS on CD for anonymity - includes Tor +> (S//REL) Adds Severe CNE misery to equation_ +> (Thanks to a famous Tails user for providing these documents.) +> * Bruce Schneier, December 2013: +> _What do I trust? I trust, I trust Tails, I trust GPG [...]_ +> _I don't use Linux. (Shhh. Don't tell anyone.) +> Although I have started using Tails_ + +## Userbase + +* broad and diverse + +Challenges +========== + +## Cadence + +> - preparing a release takes 6-10 solid days of work +> - new release every 6 weeks + a RC 1-2 weeks before + +## Popularity + +in July: + +- 11.5k boots a day + (doubles every 6-12 months, since years) +- 35k downloads of the OpenPGP signature of Tails ISO +- ⇒ increasing expectations + +## Limited resources and time + +- mostly volunteer work +- 2000 commits, by ~10 persons, on the last 6 months + +## Roadmap + +> * welcome more varied contributions +> * ... from more diverse people +> * make the project more sustainable +> * improve usability +> * better protect users against targeted attacks +> * more? + +Tails and its upstreams +======================= + +## History lesson + +* most distributions in this area have died quickly +* ⇒ focus on maintainability +* ⇒ avoid having a delta that grows too much, or too fast, + wrt. our upstreams + +## Examples: what we did not do internally + +... despite pressure: + +* grsecurity +* compile-time hardening + +## Examples: what we did internally + +... and are in the process of sharing: + +* OpenPGP applet +* erasing memory on shutdown + +## Examples: what we're doing upstream + +* AppArmor +* libvirt +* Seahorse +* various Debian things +* fix OTR downgrade → v1 + +Consequences #1 +--------------- + +* little Tails-specific code: mostly glue work +* social work: + talk to upstreams + spread the word about our needs + find skilled people to do the work at the best place +* slow rhythm, despite backports + +Consequences #2 +--------------- + +And, above all... + +. . . + +*Tails is still alive!* + +Tails needs Debian +================== + +## Keep up the good work! + +Debian is an awesome basis for derivatives. + +Thank you ☺ + +## Many one-shot small tasks + +* backports +* usertagged bugs () + +## Help us help Debian + +* in August: 5 Tails contributors have had stuff uploaded +* more to come! +* already a few mentors and sponsors (thank you), need more + +## Distro-wide improvements + +* AppArmor () +* reproducible builds () +* hardening build flags (PIE on amd64?) + +## Packaging + +* grsecurity kernel (Debian#605090) +* packaging teams: + anonymity tools () + OTR () +* X.Org as non-root, Wayland +* systemd user sessions + +## Infrastructure + +* derivatives patches tracking tools +* continuous integration + +## Where to start? + +* +* usertags on the Debian BTS +* tickets in our Redmine + +Debian needs Tails? +=================== + +## How can Tails be better for Debian? + +You tell me. + +Contact +======= + +## Talk to us + +* I'm here. +* Development: **** +* Translation: **** +* User experience: **** +* Early testing: **** +* Project: **** +* Website: **** diff --git a/wiki/src/promote/slides/DebConf14-20140830/Tails.mdwn.txt b/wiki/src/promote/slides/DebConf14-20140830/Tails.mdwn.txt new file mode 100644 index 00000000000..aac3a39d0e8 --- /dev/null +++ b/wiki/src/promote/slides/DebConf14-20140830/Tails.mdwn.txt @@ -0,0 +1,226 @@ +% Tails needs Debian + (and the other way around?) +% intrigeri +% August, 2014 + + + +What Tails is +============= + +What's in a name +---------------- + +**T**he **a**mnesic **i**ncognito **l**ive **s**ystem + + + +A Live operating system +----------------------- + +* works on (almost) any x86 computer +* boots off a DVD, a USB stick, or a SD card +* based on Debian ♥ + +Preserving privacy and anonymity #1 +----------------------------------- + +* use the Internet anonymously, circumvent censorship: + all connections to the Internet are forced to go through the Tor network +* leave no trace on the computer you are using unless you ask it + explicitly + +Preserving privacy and anonymity #2 +----------------------------------- + +* desktop cryptographic tools: + encrypt files, email and instant messaging + metadata anonymization () +* media production tools: + sound, video, office publishing, graphics... + +Usability = a security feature +------------------------------ + +> * yes, _you_ may be able to protect yourself +> * but privacy and security = collective matters +> * if only tech-savvy users can use our stuff, +> then the others will use something worse, +> and _collectively_ we've lost. + +Other features +-------------- + +* first release in 2009 +* translated into many languages +* Free Software, public and open development: + Git, Redmine, meetings and roadmap +* specs and design documentation: + +And... it works? +---------------- + +> * According to the NSA, yes: +> _(S//REL) Tails: Complete Bootable OS on CD for anonymity - includes Tor +> (S//REL) Adds Severe CNE misery to equation_ +> (Thanks to a famous Tails user for providing these documents.) +> * Bruce Schneier, December 2013: +> _What do I trust? I trust, I trust Tails, I trust GPG [...]_ +> _I don't use Linux. (Shhh. Don't tell anyone.) +> Although I have started using Tails_ + +## Userbase + +* broad and diverse + +Challenges +========== + +## Cadence + +> - preparing a release takes 6-10 solid days of work +> - new release every 6 weeks + a RC 1-2 weeks before + +## Popularity + +in July: + +- 11.5k boots a day + (doubles every 6-12 months, since years) +- 35k downloads of the OpenPGP signature of Tails ISO +- ⇒ increasing expectations + +## Limited resources and time + +- mostly volunteer work +- 2000 commits, by ~10 persons, on the last 6 months + +## Roadmap + +> * welcome more varied contributions +> * ... from more diverse people +> * make the project more sustainable +> * improve usability +> * better protect users against targeted attacks +> * more? + +Tails and its upstreams +======================= + +## History lesson + +* most distributions in this area have died quickly +* ⇒ focus on maintainability +* ⇒ avoid having a delta that grows too much, or too fast, + wrt. our upstreams + +## Examples: what we did not do internally + +... despite pressure: + +* grsecurity +* compile-time hardening + +## Examples: what we did internally + +... and are in the process of sharing: + +* OpenPGP applet +* erasing memory on shutdown + +## Examples: what we're doing upstream + +* AppArmor +* libvirt +* Seahorse +* various Debian things +* fix OTR downgrade → v1 + +Consequences #1 +--------------- + +* little Tails-specific code: mostly glue work +* social work: + talk to upstreams + spread the word about our needs + find skilled people to do the work at the best place +* slow rhythm, despite backports + +Consequences #2 +--------------- + +And, above all... + +. . . + +*Tails is still alive!* + +Tails needs Debian +================== + +## Keep up the good work! + +Debian is an awesome basis for derivatives. + +Thank you ☺ + +## Many one-shot small tasks + +* backports +* usertagged bugs () + +## Help us help Debian + +* in August: 5 Tails contributors have had stuff uploaded +* more to come! +* already a few mentors and sponsors (thank you), need more + +## Distro-wide improvements + +* AppArmor () +* reproducible builds () +* hardening build flags (PIE on amd64?) + +## Packaging + +* grsecurity kernel (Debian#605090) +* packaging teams: + anonymity tools () + OTR () +* X.Org as non-root, Wayland +* systemd user sessions + +## Infrastructure + +* derivatives patches tracking tools +* continuous integration + +## Where to start? + +* +* usertags on the Debian BTS +* tickets in our Redmine + +Debian needs Tails? +=================== + +## How can Tails be better for Debian? + +You tell me. + +Contact +======= + +## Talk to us + +* I'm here. +* Development: **** +* Translation: **** +* User experience: **** +* Early testing: **** +* Project: **** +* Website: **** diff --git a/wiki/src/promote/slides/DebConf14-20140830/Tails.shtml b/wiki/src/promote/slides/DebConf14-20140830/Tails.shtml new file mode 100644 index 00000000000..e569abe19e9 --- /dev/null +++ b/wiki/src/promote/slides/DebConf14-20140830/Tails.shtml @@ -0,0 +1,293 @@ + + + + + + + Tails needs Debian (and the other way around?) + + + + + + + + + + + +
+
+ +
+

Tails needs Debian
(and the other way around?)

+

intrigeri

+

August, 2014

+
+ +
+ + + +
+

What Tails is

+

What's in a name

+

The amnesic incognito live system

+

https://tails.boum.org/

+
+

A Live operating system

+
    +
  • works on (almost) any x86 computer
  • +
  • boots off a DVD, a USB stick, or a SD card
  • +
  • based on Debian ♥
  • +
+
+

Preserving privacy and anonymity #1

+
    +
  • use the Internet anonymously, circumvent censorship:
    all connections to the Internet are forced to go through the Tor network
  • +
  • leave no trace on the computer you are using unless you ask it explicitly
  • +
+
+

Preserving privacy and anonymity #2

+
    +
  • desktop cryptographic tools:
    encrypt files, email and instant messaging
    metadata anonymization (https://packages.d.o/mat)
  • +
  • media production tools:
    sound, video, office publishing, graphics...
  • +
+
+

Usability = a security feature

+
    +
  • yes, you may be able to protect yourself
  • +
  • but privacy and security = collective matters
  • +
  • if only tech-savvy users can use our stuff,
    then the others will use something worse,
    and collectively we've lost.
  • +
+
+

Other features

+
    +
  • first release in 2009
  • +
  • translated into many languages
  • +
  • Free Software, public and open development:
    Git, Redmine, meetings and roadmap
  • +
  • specs and design documentation: https://tails.boum.org/contribute/design/
  • +
+
+

And... it works?

+
    +
  • According to the NSA, yes:
    (S//REL) Tails: Complete Bootable OS on CD for anonymity - includes Tor
    (S//REL) Adds Severe CNE misery to equation

    (Thanks to a famous Tails user for providing these documents.)
  • +
  • Bruce Schneier, December 2013:
    What do I trust? I trust, I trust Tails, I trust GPG [...]
    I don't use Linux. (Shhh. Don't tell anyone.)
    Although I have started using Tails
  • +
+
+

Userbase

+
    +
  • broad and diverse
  • +
+
+

Challenges

+

Cadence

+
    +
  • preparing a release takes 6-10 solid days of work
  • +
  • new release every 6 weeks + a RC 1-2 weeks before
  • +
+
+

Popularity

+

in July:

+
    +
  • 11.5k boots a day
    (doubles every 6-12 months, since years)
  • +
  • 35k downloads of the OpenPGP signature of Tails ISO
  • +
  • ⇒ increasing expectations
  • +
+
+

Limited resources and time

+
    +
  • mostly volunteer work
  • +
  • 2000 commits, by ~10 persons, on the last 6 months
  • +
+
+

Roadmap

+ +
+

Tails and its upstreams

+

History lesson

+
    +
  • most distributions in this area have died quickly
  • +
  • ⇒ focus on maintainability
  • +
  • ⇒ avoid having a delta that grows too much, or too fast,
    wrt. our upstreams
  • +
+
+

Examples: what we did not do internally

+

... despite pressure:

+
    +
  • grsecurity
  • +
  • compile-time hardening
  • +
+
+

Examples: what we did internally

+

... and are in the process of sharing:

+
    +
  • OpenPGP applet
  • +
  • erasing memory on shutdown
  • +
+
+

Examples: what we're doing upstream

+
    +
  • AppArmor
  • +
  • libvirt
  • +
  • Seahorse
  • +
  • various Debian things
  • +
  • fix OTR downgrade → v1
  • +
+
+

Consequences #1

+
    +
  • little Tails-specific code: mostly glue work
  • +
  • social work:
    talk to upstreams
    spread the word about our needs
    find skilled people to do the work at the best place
  • +
  • slow rhythm, despite backports
  • +
+
+

Consequences #2

+

And, above all...

+
+

Tails is still alive!

+
+
+

Tails needs Debian

+

Keep up the good work!

+

Debian is an awesome basis for derivatives.

+

Thank you ☺

+
+

Many one-shot small tasks

+
    +
  • backports
  • +
  • usertagged bugs ()
  • +
+
+

Help us help Debian

+
    +
  • in August: 5 Tails contributors have had stuff uploaded
  • +
  • more to come!
  • +
  • already a few mentors and sponsors (thank you), need more
  • +
+
+

Distro-wide improvements

+ +
+

Packaging

+ +
+

Infrastructure

+
    +
  • derivatives patches tracking tools
  • +
  • continuous integration
  • +
+
+

Where to start?

+ +
+

Debian needs Tails?

+

How can Tails be better for Debian?

+

You tell me.

+
+

Contact

+

Talk to us

+
    +
  • I'm here.
  • +
  • Development:
  • +
  • Translation:
  • +
  • User experience:
  • +
  • Early testing:
  • +
  • Project:
  • +
  • Website: https://tails.boum.org/
  • +
+
+
+
+ + + + + + + + -- 2.11.4.GIT