1 # SOME DESCRIPTIVE TITLE
2 # Copyright (C) YEAR Free Software Foundation, Inc.
3 # This file is distributed under the same license as the PACKAGE package.
4 # FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
8 "Project-Id-Version: PACKAGE VERSION\n"
9 "Report-Msgid-Bugs-To: tails-l10n@boum.org\n"
10 "POT-Creation-Date: 2018-10-01 16:14+0000\n"
11 "PO-Revision-Date: 2018-10-25 10:21+0000\n"
12 "Last-Translator: emmapeel <emma.peel@riseup.net>\n"
13 "Language-Team: LANGUAGE <LL@li.org>\n"
16 "Content-Type: text/plain; charset=UTF-8\n"
17 "Content-Transfer-Encoding: 8bit\n"
18 "Plural-Forms: nplurals=1; plural=0;\n"
19 "X-Generator: Weblate 2.19.1\n"
23 msgid "[[!meta title=\"On 0days, exploits and disclosure\"]]\n"
28 msgid "[[!meta date=\"Tue, 22 Jul 2014 21:40:00 +0000\"]]\n"
33 msgid "[[!pagetemplate template=\"news.tmpl\"]]\n"
34 msgstr "[[!pagetemplate template=\"news.tmpl\"]]\n"
38 "A [recent tweet](https://twitter.com/ExodusIntel/status/491247299054428160) "
39 "from Exodus Intel (a company based in Austin, Texas) generated quite some "
40 "noise on the Internet:"
46 "> \"We're happy to see that TAILS 1.1 is being released tomorrow.\n"
47 "> Our multiple RCE/de-anonymization zero-days are still effective. #tails #tor\"\n"
52 "Tails ships a lot of software, from the Linux kernel to a fully functional "
53 "desktop, including a web browser and a lot of other programs. Tails also "
54 "adds a bit of custom software on top of this."
59 "Security issues are discovered every month in a few of these programs. Some "
60 "people report such vulnerabilities, and then they get fixed: This is the "
61 "power of free and open source software. Others don't disclose them, but run "
62 "lucrative businesses by weaponizing and selling them instead. This is not "
63 "new and [comes as no surprise](https://www.eff.org/deeplinks/2012/03/zero-"
64 "day-exploit-sales-should-be-key-point-cybersecurity-debate)."
69 "We were not contacted by Exodus Intel prior to their tweet. In fact, a more "
70 "irritated version of this text was ready when we finally received an email "
71 "from them. They informed us that they would provide us with a report within "
72 "a week. We're told they won't disclose these vulnerabilities publicly before "
73 "we have corrected it, and Tails users have had a chance to upgrade. We think "
74 "that this is the right process to responsibly disclose vulnerabilities, and "
75 "we're really looking forward to read this report."
80 "Being fully aware of this kind of threat, we're continously working on "
81 "improving Tails' security in depth. Among other tasks, we're working on a "
82 "[tight integration](https://labs.riseup.net/code/projects/tails/search?"
83 "q=apparmor) of AppArmor in Tails, [[!tails_ticket desc=\"kernel\" 7639]] "
84 "and [[!tails_ticket desc=\"web browser hardening\" 5802]] as well as [[!"
85 "tails_ticket desc=\"sandboxing\" 6081]], just to name a few examples."
90 "We are happy about every contribution which protects our users further from "
91 "de-anonymization and helps them to protect their private data, "
92 "investigations, and their lives. If you are a security researcher, please "
93 "audit Tails, Debian, Tor or any other piece of software we ship. To report "
94 "or discuss vulnerabilities you discover, please get in touch with us by "
95 "sending email to <tails@boum.org>."
100 "Anybody wanting to contribute to Tails to help defend privacy, [[please join "