Tails
-
Tails 6.6 2024-08-13
Changes and updates
Update Tor Browser to 13.5.2.
Update Thunderbird to 115.14.0.
Update many firmware packages. This improves the support for newer hardware: graphics, Wi-Fi, and so on.
Fixed problems Persistent Storage
Increase the maximum waiting time to 4 minutes when unlocking the Persistent Storage before returning an error. (#20475)
Made the creation of the Persistent Storage more robust after starting a Tails USB stick for the first time. (#20451)
Prevent the Persistent Storage settings from freezing after opening a link to the documentation. (#20438)
Prevent Additional Software from crashing when installing virtual packages. (#20477)
Networking
Fix connecting to the Tor network using default bridges. (#20467)
Allow enabling multiple network interfaces again. (#20128)
Tails Cloner
Remove 30 seconds of waiting time when installing by cloning. (#20131)
For more details, read our changelog.
-
Vanguards in TAILS?
blog.torproject.org Announcing the Vanguards Add-On for Onion Services | Tor ProjectFixing the guard discovery problem in Tor itself is an immense project -- primarily because it involves many trade-offs between performance and scalability versus path security, which makes it very hard to pick good defaults for every onion service. Because of this, we have created an add-on that ca...
Has anyone got into root terminal and added Vanguards to their TAILS device? How is the latency? Any trade-offs to be aware of?
-
Has TAILS considered keystroke deanonymization?
www.whonix.org Keystroke DeanonymizationDeanonymization using user keystrokes, keystroke deanonymization, keystroke fingerprinting and defenses.
I have been interested in contrasting TAILS and Qubes system properties and functions for a while now.
There doesn't seem to be keystroke anonymization in TAILS but Whonix WS in Qubes does.
Also, can anyone provide insight into the advantages of Xen virtualization in Qubes as opposed to libvirt and the access control strategy in TAILS?
-
-
Tails 6.1
>Automatic upgrades are available from Tails 6.0 to 6.1.
-
Tails 5.14 is out
blog.torproject.org New Release: Tails 5.14 | Tor ProjectIt's a major version with a new backup feature in Tails Installer, automatic upgrade of the Persistent Storage to LUKS2, and captive portal detection.
Onion link: http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/new-release-tails-514/
Tails website link: https://tails.boum.org/news/version_5.14/index.en.html
New Features:
-
Persistent storage automatic migration to LUKS2 with Argon2id. Previous cryptographic standards used for persistent storage in Tails 5.12 and earlier are weak to state-sponsored attackers with physical device access. It will migrate automatically, butits's advised if you do not have a very strong password to change it.
-
Option in Tails Installer to backup Persistent Storage
-
Captive portal detection during Tor connection to allow signing into network when needed (such as motels)
-
Donate option built into Electrum - Support the Tails team if you can!
-
-
cross-posted from: https://lemmy.ml/post/665480
> Tails 5.8 is the most important release of Tails in years. It includes both major redesign of existing features, important usability improvements, and hardened security.
-
daredevil-tails-hack-0-5.zip -- Flatpak & Signal
This is my first try to add some spirit of adventure to boring TAILS reality. My thanks to all people – known and unknown to me – who provided parts and variants of this solution, guidance, and encouragement. No work is done alone. Attached please find a pack of simple scripts and guidelines how to install #Flatpak and #Signal under Tails. Solution is crude-ish, no integration with Gnome and scripts are spewing some warnings.
So consider it experimental and for fun only!
I plan to add some more apps (Delta Chat and Briar for starters) and also, thanks to your generous feedback, ;-) to improve quality from "daredevil" through "intrepid" and eventually to "boringly routine".
I hope you'll like it.