Tails 0.23

The Amnesic Incognito Live System

Tails è una distribuzione Linux live basata su Debian e Gnome che ha l’obbiettivo di garantire la privacy e l’anonimato in rete. Questo viene raggiunto tramite l’utilizzo di Tor per tutte le connessioni uscenti e i dati non vengono salvati su disco (tranne se abilitato).

Versione 0.23

Questa versione contiene diverse migliorie (qui la descrizione in Inglese):

  • Security fixes
    • Upgrade the web browser to 24.4.0esr-0+tails1~bpo60+1 (Firefox 24.4.0esr + Iceweasel patches + Torbrowser patches).
  • Major new features
  • Bugfixes
    • Additional software: do not crash when persistence is disabled.
    • Upgrade Pidgin to 2.10.9, that fixes some regressions introduced in the 2.10.8 security update.
    • Wait for Tor to have fully bootstrapped, plus a bit more time, before checking for upgrades and unfixed known security issues.
    • Disable the Intel Management Engine Interface driver. We don’t need it in Tails, it might be dangerous, and it causes bugs on various hardware such as systems that reboot when asked to shut down.
    • Add a launcher for the Tails documentation. This makes it available in Windows Camouflage mode.
    • Remove the obsolete wikileaks.de account from Pidgin.
  • Minor improvements
    • Upgrade Tor to 0.2.4.21-1~d60.squeeze+1.
    • Upgrade obfsproxy to 0.2.6-2~~squeeze+1.
    • Upgrade I2P to 0.9.11-1deb6u1.
    • Install 64-bit kernel instead of the 686-pae one. This is a necessary first step towards UEFI boot support.
    • Install Monkeysign (in a not-so-functional shape yet).
    • Disable the autologin text consoles. This was one of the blockers before a screen saver can be installed in a meaningful way.
    • Don’t localize the text consoles anymore: it is broken on Wheezy, the intended users can as well use loadkeys, and we now do not have to trust setupcon to be safe for being run as root by the desktop user.
    • Make it possible to manually start IBus.
    • Reintroduce the possibility to switch identities in the Tor Browser, using a filtering proxy in front of the Tor ControlPort to avoid giving full control over Tor to the desktop user.
    • Incremental upgrades improvements:
      • Drop the Tails Upgrader launcher, to limit users’ confusion.
      • Lock down sudo credentials a bit.
      • Hide debugging information.
      • Include ~/.xsession-errors in WhisperBack bug reports. This captures the Tails Upgrader errors and debugging information.
      • Report more precisely why an incremental upgrade cannot be done.
      • Various user interface and phrasing improvements.
    • Don’t install the Cookie Monster browser extension.
    • Add a browser bookmark pointing to Tor’s Stack Exchange.
    • Remove the preconfigured #tor channel from the Pidgin: apparently, too many Tails users go ask Tails questions there, without making it clear that they are running Tails, hence creating a user-support nightmare.
    • Use (most of) Tor Browser’s mozconfig.
    • Rebase the browser on top of iceweasel 24.3.0esr-1, to get the certificate authorities added by Debian back.
    • Give access to the relevant documentation pages from Tails Greeter.
    • Hide Tails Greeter’s password mismatch warning when entry is changed.
    • Persistent Volume Assistant:
      • Take into account our installer is now called Tails Installer.
      • Optimize window height.
      • Display device paths in a more user-friendly way.

Risorse

La distribuzione è disponibile in:

Il sito web della distribuzione è: https://tails.boum.org

Conclusioni

La prossima versione è schedulata per uscire il 29 Aprile

Lascia un commento

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *

Questo sito usa Akismet per ridurre lo spam. Scopri come i tuoi dati vengono elaborati.