[Tails-dev] A humble suggestion ...

2014-05-09 Thread Latuf Tak
To the Tails Team:

I'm sincerely grateful for what you've accomplished, in a relatively short
period of time to ensure privacy for the "Joe Citizen".

I was wondering if you've thought about getting Tails out to the general
public ala "Chrome Cast"?  A hardware dongle with a keyboard or remote?

Of course, there are plenty of competitors (Roku, etc.), but there's
nothing out there touting/leveraging/with reputation like your platform on
a Home Entertainment platform (HTPC).  With USB/HDMI integration in most of
the new TVs, this seems like a logical step - and the next frontier.

Indeed, the objective wouldn't be to stream HD material via Tor/Tails (who
knows - maybe a remuneration model to the Tor node providers - if Tor/they
so choose), but rather an interface where a non/semi-techincal person could
browse the Internet with much needed anonymity (whilst enjoying their
Netflix at full speed).  Of course, a hybrid solution - where Tails could
be the privacy provider of all transactions, and the "media" provider
(e.g., Hulu, Netflix, etc.) could simply take care of the
delivery/profits?  Something to ponder.

Let me know your thoughts, as I'd be interested in supporting this
hardware/software solution for the masses (monetarily, that is).

Thank you.
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] [review'n'merge] feature/torbrowser-24.5.0esr-1+tails1

2014-05-09 Thread intrigeri
anonym wrote (09 May 2014 16:09:40 GMT) :
>> If these changes are now good enough for Tails 1.1, all right, I'm
>> happy, but then you'll want to update #7127 :)

> Perhaps we can just forget about that ticket and close it as the TBB
> people apparently thought it ok to ship those changes in the now stable
> 3.6.1? I don't see any reason to treat it much differently than any
> other of their commit any more.

Fine with me, if the user feedback for TBB 3.6.x has not exposed
serious issues on this front. I've seen at least one ticket in passing
that did not look good. Maybe ask the TBB and Tor QA people?

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [review'n'merge:1.1] #6559, #7062, #6275: test/6559-adapt-test-suite-for-Wheezy

2014-05-09 Thread intrigeri
anonym wrote (09 May 2014 15:31:06 GMT) :
> Could you please elaborate on all this just so we don't misunderstand
> each other, possibly by attaching screenshots of both cases to the ticket?

I'll do that later, as we really should fix this properly at some
point. But for now, being able to merge this branch seems
higher-priority.

>> presumably since the move to QXL.

> For the record, I get the exact same results with QXL and cirrus (I took
> screenshots and compared them to be really sure).

> Could you test if the temporary change

> sed -i 's/qxl/cirrus/' features/domains/default.xml

> fixes the issue (or, equivalently, reverting 353fcde)?

This fixes the issue for me.

>> Needless to say, it prevents from running 99% of the test suite
>> without fixing it myself => reassigning to anonym.

> By the way, are you also affected by #7171 (Test suite fails to start
> Xorg with cirrus graphics device on x86_64 arch)?

I am (at least on this branch - 353fcde).

> Even if you are, you could use the cirrus +  workaround from #7171
> to be able to run the full test suite and at least test the other things
> in the branch, which may be more convenient for you depending on you
> availability. For that, just apply the attached patch.

Can't do that:

  Call to virDomainCreateWithFlags failed: unsupported
  configuration: guest and host CPU are not compatible: Host CPU
  does not provide required features: aes (Libvirt::Error)

I think it raises the bar way to high in terms of hardware needed to
run the test suite. I also tried:

  * Westmere: my CPU isn't good enough
  * Nehalem: fails to start X
  *  fails to start X
  * kvm64: seems to work, but likely suboptimal

=> I've started the full test suite run with kvm64, and will report
   back later.

Was the "fails to start X with libvirt from wheezy-backports" bug
reported upstream? If you do report the bug, I'll try to reproduce it
on current sid. Piling up workarounds is fun, but if this could be
fixed properly where it should, we would be very happy in the end :)

Cheers!
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [review'n'merge] feature/torbrowser-24.5.0esr-1+tails1

2014-05-09 Thread anonym
09/05/14 17:49, intrigeri wrote:
> Hi,
> 
> anonym wrote (09 May 2014 15:02:02 GMT) :
>> Please review and merge (both Git and APT suite wise) into devel.
> 
> I'll do this by the end of the week, once I get the clarification I'm
> asking below. Please file a ticket to ensure it's not forgotten.
> 
> Before I start diving into it, I would not mind some clarification,
> since: on the one hand, #7127 ("Evaluate Tor Browser's new JavaScript
> security enhancements"), that you have created, says we should
> evaluate the JS-related profile changes; and OTOH, the proposed branch
> imports these changes, without any update on #7127.
> 
> If these changes are now good enough for Tails 1.1, all right, I'm
> happy, but then you'll want to update #7127 :)

Perhaps we can just forget about that ticket and close it as the TBB
people apparently thought it ok to ship those changes in the now stable
3.6.1? I don't see any reason to treat it much differently than any
other of their commit any more.

I may have overreacted about this change and opening the ticket --
originally the commit message (now rewritten) gave the impression that
it could be quite problematic, but, well, I have little insight and just
took it at face value.

>> I'ts already been merged into experimental.
> 
> I cannot confirm this.

Oh, my push failed due to your work on #7065. Now pushed.

Cheers!

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [review'n'merge] feature/torbrowser-24.5.0esr-1+tails1

2014-05-09 Thread intrigeri
Hi,

anonym wrote (09 May 2014 15:02:02 GMT) :
> Please review and merge (both Git and APT suite wise) into devel.

I'll do this by the end of the week, once I get the clarification I'm
asking below. Please file a ticket to ensure it's not forgotten.

Before I start diving into it, I would not mind some clarification,
since: on the one hand, #7127 ("Evaluate Tor Browser's new JavaScript
security enhancements"), that you have created, says we should
evaluate the JS-related profile changes; and OTOH, the proposed branch
imports these changes, without any update on #7127.

If these changes are now good enough for Tails 1.1, all right, I'm
happy, but then you'll want to update #7127 :)

> I'ts already been merged into experimental.

I cannot confirm this.

Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] Note [was: Re: Tails contributors meeting: Thursday May 8]

2014-05-09 Thread intrigeri
sajol...@pimienta.org wrote (09 May 2014 09:26:18 GMT) :
> Here are the notes:

Thanks! I've published it on the website (the overhead of asking if
frontdesk or you was going to do it seemed not worth it).
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] [review'n'merge:1.1] bugfix/7065-keyboard-localization

2014-05-09 Thread intrigeri
Hi,

bugfix/7065-keyboard-localization fixes issue #7065 for me.
Assigned to the RM (anonym) for review.

The solution I've found to this problem is partly implemented in the
greeter, and partly in the main Git repo, so it'll require two Git
merges + an APT merge (or, ideally, a new tails-greeter release
uploaded to the devel suite).

I have successfully tested an ISO built from this branch with the
French, French (alternative), Italian, English and Chinese
keyboard layouts.

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [review'n'merge:1.1] #6559, #7062, #6275: test/6559-adapt-test-suite-for-Wheezy

2014-05-09 Thread anonym
09/05/14 13:49, intrigeri wrote:
> Hi,
> 
> anonym wrote (08 May 2014 15:52:25 GMT) :
>> Tickets: https://labs.riseup.net/code/issues/6559
>>  https://labs.riseup.net/code/issues/7062
>>  https://labs.riseup.net/code/issues/6275
>> Branch:  test/6559-adapt-test-suite-for-Wheezy
> 
> The "the computer boots Tails" step fails for me: it does not detect
> TailsBootSplash.png. It seems that the syslinux menu is quite smaller
> than before (in --view mode, it takes about 2 thirds of the screen),

Interesting. For as long as I can remember I've got the initial boot
screen to only cover ~2/3 of the full 1024x768 for fresh boots --
fullscreen is used first when Xorg starts. Only after a reboot (e.g. in
memory_erasure.feature) does the boot splash cover all 1024x768 of the
screen, and I thought this was the reason for TailsBootSplash.png vs
TailsBootSplashPostReset.png.

Could you please elaborate on all this just so we don't misunderstand
each other, possibly by attaching screenshots of both cases to the ticket?

> presumably since the move to QXL.

For the record, I get the exact same results with QXL and cirrus (I took
screenshots and compared them to be really sure).

Could you test if the temporary change

sed -i 's/qxl/cirrus/' features/domains/default.xml

fixes the issue (or, equivalently, reverting 353fcde)?

> Needless to say, it prevents from running 99% of the test suite
> without fixing it myself => reassigning to anonym.

By the way, are you also affected by #7171 (Test suite fails to start
Xorg with cirrus graphics device on x86_64 arch)?

Even if you are, you could use the cirrus +  workaround from #7171
to be able to run the full test suite and at least test the other things
in the branch, which may be more convenient for you depending on you
availability. For that, just apply the attached patch.

Cheers!

diff --git a/features/domains/default.xml b/features/domains/default.xml
index f65bbf5..95de247 100644
--- a/features/domains/default.xml
+++ b/features/domains/default.xml
@@ -12,6 +12,10 @@
 
 
   
+  
+SandyBridge
+Intel
+  
   
   destroy
   restart
@@ -53,7 +57,7 @@
   
 
 
-  
+  
   
 
 
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] [review'n'merge] feature/torbrowser-24.5.0esr-1+tails1

2014-05-09 Thread anonym
Hi,

Branch:feature/torbrowser-24.5.0esr-1+tails1
APT suite: feature-torbrowser-24.5.0esr-1-tails1
Ticket:No

Please review and merge (both Git and APT suite wise) into devel. I'ts
already been merged into experimental.

I've run features/torified_browsing.feature in the automated test suite
successfully (from branch test/6559-adapt-test-suite-for-Wheezy) for an
image built from the branch.

Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] #6400: upstreaming our rjb support [Was: Please review'n'merge test/rjb-migration]

2014-05-09 Thread anonym
20/03/14 13:50, intrigeri wrote:
> Hi,
> 
> berta...@ptitcanardnoir.org wrote (29 Dec 2013 17:44:57 GMT) :
>> On Fri, Dec 27, 2013 at 07:36:15PM +0100, intrigeri wrote:
>>> The parent ticket (#5731) is still blocked by #6400, as nobody
>>> commited to either upstream our stuff into the ruby-sikuli Gem, or to
>>> maintain our own adapter on the long term. I'm unsure what conclusion
>>> we should draw of it. Admitedly, the new setup is way less scary than
>>> the previous one, and our adapter is 85 lines long, but still, I'm
>>> concerned we might happily be replacing it with another kind of
>>> technical debt.
> 
> AFAICT, nothing has happened on this front since then.
> 
>> I've had a quick look at a way to implement that upstream. Using the
>> RUBY_ENGINE variable, it seems easy to have the gem selecting the right
>> handler depending on which interpreter is used.
> 
>> Still there are some subtilities in our code that I'm not sure to
>> understand, this is quite low level, and I'm not sure to be able to handle
>> this upstreaming myself alone.
> 
> In the meantime, the sikuli_ruby Gem [1] has been abandonned, and our
> current best option for upstreaming seems to be Rukuli [2], that seems
> quite alive (10 contributors, a few commits every month).
> 
>   [1] https://github.com/chaslemley/sikuli_ruby
>   [2] https://github.com/andreanastacio/Rukuli
> 
> anonym, bertagaz: want to have a(nother) look, and decide if you
> prefer to do the upstreaming work now, or to commit to maintain our
> own sikuli/rjb adapter on the long run?

I have looked several times at what would be necessary for upstreaming
this, and changed my mind about what to do equally many times.

It definitely would be some work. We'd need to add a wrapper that either
uses RJB or JRuby constructs depending on what's available. While that
wouldn't be too hard in principle, it seems RJB handles exceptions in a
way that will be complicated to get to a similar state as in JRuby,
which is what sikuli-ruby/Rukuli expects. Add to this that I'm neither a
Ruby nor (J)Ruby Guru, and all this stuff is pretty low-level and
intricate. I think that even RJB may need to adapted a bit, for the
exception issue.

Furthermore the sikuli-ruby API (inherited to Rukuli) isn't a
particularly good fit for us, and has some design issues:

* It doesn't expose some functionality we need. When we used it (and
  JRuby) we had to monkeypatch it from the get go -- it still feels
  like it's very incomplete, a beta or whatever.
* It has completely screwed up by mixing Key:s with KeyModifier:s,
  which effectively makes it impossible to use the KeyModifiers in
  combination with a Key, e.g. "Ctrl+C" or whatever.
* Other stuff I cannot remember.

Add to this that we do not know for how long Rukuli will stay maintained.

Lastly I'm personally quite happy with using the proxied Java objects
exposed by RJB directly as it allows me to consult Sikuli rather
extensive docs, and use any tricks I find used in the (Java-oriented)
Sikuli community.

Because of all this I've finally concluded that I would prefer to keep
on maintaining our "sikuli/rjb adapter" for the time being, and possibly
return to this upstreaming process if Rukuli shows promise to at least
stay maintained for the foreseeable future.

Cheers!

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Fwd: Re: Secure android headset integration

2014-05-09 Thread Chamelephon


 Original Message 
Subject: Re: [Tails-dev] Secure android headset integration
Date: Thu, 08 May 2014 19:45:37 +0300
From: Chamelephon 
To: intrigeri 

On Thu, 08 May 2014 17:22:31 +0200, intrigeri  wrote:
> Hi,
> 
> Chamelephon wrote (06 May 2014 13:52:33 GMT) :
>> We are releasing soon our version 1 retail product and the idea
>> occured to me have it shipped by default  with a separate tails
>> installation on the internal storage or an external sd-card. I did my
>> testing and it works nicely, so a user can boot into it by just
>> connecting
>> the phone via USB cable and selecting it from the boot options. 
> 
> Do you mean booting Tails on the phone itself, or using the phone as
> a USB mass storage device for booting Tails on another computer?
> 

Booting from the USB Mass storage off the phone. 

>> I am writing in the mailing list just because i couldn't find contacts
>> for
>> a led maintainer here.
> 
> There is not such thing as a lead Tails maintainer, and this is the
> right place to talk to us :)
So glad to receive an answer then :)


> 
>> My idea is to ask the customers whether they would
>> like tails installed on their device by default and pay an extra fee to
>> cover SD card costs and donate the rest straight to you guys.
> 
> Good news, we will soon accept donations in fiat currencies (while we
> currently only accept Bitcoin).

Well, good news indeed. We can convert to bitcoin once some amount has been
collected though :)

> 
>> The other thing that hit me in the face is to have a PXE boot app
written
>> for android that lets the users boot from the nework or tethering
network
>> and boot tails from there without burning dvds or using usb storage.
> 
> I don't know PXE much, and am unsure if the way it handles network
> connections can be secured in a way that satisfies Tails design goals
> and threat models. But if you research this any further, I would
> personally be curious to read about your results :)

I didn't have time the last days for this, but isn't the boot media
supposed to be irrelevant with TAILS? I mean no matter what the boot method
is, it still loads a ramdisk from the supposed media.
If we are talking about persistent storage, that's another story. But i'm
looking forward more to a "livecd" amnesiac experience.
What is the odd-ball in this quest is actually implementing the PXE server
on a non-rooted device, thus making it more installable.

> 
> Cheers,

-- 
The affordable secure handset
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] [review'n'merge:1.1] #6559, #7062, #6275: test/6559-adapt-test-suite-for-Wheezy

2014-05-09 Thread intrigeri
Hi,

anonym wrote (08 May 2014 15:52:25 GMT) :
> Tickets: https://labs.riseup.net/code/issues/6559
>  https://labs.riseup.net/code/issues/7062
>  https://labs.riseup.net/code/issues/6275
> Branch:  test/6559-adapt-test-suite-for-Wheezy

The "the computer boots Tails" step fails for me: it does not detect
TailsBootSplash.png. It seems that the syslinux menu is quite smaller
than before (in --view mode, it takes about 2 thirds of the screen),
presumably since the move to QXL.

Needless to say, it prevents from running 99% of the test suite
without fixing it myself => reassigning to anonym.

Cheers!
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] status of the experimental branch

2014-05-09 Thread anonym
01/05/14 12:20, intrigeri wrote:
> hi,
> 
> anonym: our experimental APT suite has e.g. an oldish tails-perl5lib
> compared to the devel and stable ones. I suspect something went wrong
> with this part of the release process.

Woah, I had completely missed this email. I've now (AFAICT) fixed the
state of experimental's APT suite.

Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Release schedule for Tails 1.1

2014-05-09 Thread anonym
Hi,

I'll be release manager for the Tails 1.1 release. Here's the
preliminary release schedule:

  2014-05-28   Feature freeze.
   Tag 1.1-rc1 in Git.
   Build and upload 1.1-rc1 ISO/IUKs.
  2014-05-29   Test 1.1-rc1.
  2014-05-30   Officially release 1.1-rc1.

  2014-06-08   Firefox 24.6.0 ESR sources are available.
   Package and upload Firefox 24.6.0 ESR.
   Tag 1.1 in Git.
   Start building and uploading 1.1 ISO/IUKs...
  2014-06-09   Finish building  by 12:00 (CEST)
   Start testing Tails 1.1 at 12:00 (CEST)...
  2014-06-10   ... and finish it by 12:00 (CEST) on the 10th.
   Officially release Tails 1.1.

The dates in June are pretty much set in stone as far as I'm concerned,
but the freeze and RC dates may be moved a couple days (so this time the
release schedule is indeed very "preliminary") since I have other
commitments that may collide. More precisely, the May dates may be moved
back (i.e. closer to us) up to three days.

Tails developers and contributors, are you available for testing the
respective releases on:

* RC testing on 2014-05-29 (preliminary)

* Final testing on 2014-06-09 afternoon and early 2014-06-09, CEST

Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Note [was: Re: Tails contributors meeting: Thursday May 8]

2014-05-09 Thread sajolida
sajol...@pimienta.org:
> Sorry for the short notice, but the next public Tails developers meeting
> is scheduled for
> 
> Thursday May 8, on #tails-dev (OFTC) 8pm UTC (10pm CEST)
> 
> Every one interested in contributing to Tails is welcome.
> 
> Feel free to propose and prepare discussion topics. Please raise them in
> this thread so that others can ask details and prepare the discussion too.
> 
> If you want to get involved but don't know how yet, please consider
> coming and say hello during the meeting: this work meeting probably
> won't be the most adequate time and place to properly introduce
> newcomers to the development process, but at least it should be a fine
> place to tell us you're interested, and possibly to schedule a better
> suited event.

Here are the notes:

#7146: Add a more prominent "Donate" button?


- Rationale: make our income sources more diverse, and hopefully more
  steady — even if smaller — that one-shot grants that are usually paid
  late.
- Adding that to the sidebar to have it appear on all pages.
- Adding a "Consider donating or contributing" step to the download
  page, after step 5, Installation to not break the flow of the download
  page, and to suggest people can donate if they used it and liked it.

- In the future, think about ways of targeting "satisfied return
  customers" for crowd-funding. That's
  https://labs.riseup.net/code/issues/7176.

- The FPF extended their crowd-funding campaign 3 weeks extra:
  https://pressfreedomfoundation.org/. We could tell our users about it
  again.
  - Create the Donate button of #7146 and point to the campaign. We can
disable that button once the campaign is over.
  - Tweet about it.
  - Write a new blog post about it.

#6992: Put it more clearly that most bug reports without an email
address are useless?
=

The paragraph in the documentation should be improved to say something
like:

"Giving us an email address allows us to contact you in order to clarify
the problem. This is needed for the vast majority of the reports we
receive as most reports without any contact information are useless. On
the other hand it also provides an opportunity for eavesdroppers, like
your email or Internet provider, to confirm that you are using Tails."

The same sentence should be used in WhisperBack.

In the course of this discussion another proposal arose to remove the
right pane of WhisperBack:

https://labs.riseup.net/code/issues/7180

#7078: Make it clear in MAC spoofing documentation that only the
non-vendor bits are randomized?


- The MAC spoofing user doc page is already *extremely* long and
  difficult.  Adding more information about something as technical won't
  help, and it's probably enough to have it in the design doc.
- We already have a FAQ about MAC, but let's keep the FAQ for, well,
  questions that are asked frequently.
- So, let's do nothing for the moment and add a link to the design doc
  if we feel the need for that again in the future.

#7139: Rework /doc/about/anonymity/
===

- This page it off-topic given the current scope of Tails documentation.
- We usually say that our doc is not the place for general security
  training, etc. It is not yet another online security guide.
- So, let' remove it.

#7165: NetworkManager autoconnects to persistent wireless networks in Wheezy
=

- A proposal was to do nothing, and remove the 3 lines about that from
  the Known issues.
- But that makes it harder to work totally offline.
- MAC spoofing does nothing for the edge case where the persistent
  wireless network has WPA Enterprise with unique user credentials
- To work offline people can disconnect before starting any application,
  so the attack surface is "only" the kernel + whatever runs by default.
  We can probably live with that.
- We decided that was not a blocker for 1.1.
- The question remains open whether this would be a desirable behaviour
  to have back in Tails.
- We could have a look at the NetworkManager parameter to not
  autoconnect and see if it can be made "off" by default.

How do we work on the website restructuring, modernizing, and more?
===

- Having a meeting about that would make the dynamics easier.
- Interested or interesting people could be: u and esperal, who already
  worked on some improvement on the website, tchou, who already
  expressed interest, BitingBird, as someone doing user support, and
  knowing what many people have a hard time finding on the website, and
  sajolida.
- But right now the core team is pretty busy working on 1.1, so the
  proposal was to wait until the summit in July to meet face-to-face.
- Still, it would be cool to prepare the ground before 

[Tails-dev] Tails report for April, 2014

2014-05-09 Thread Tails folks
Releases


Tails 1.0 was released on April 29.

Metrics
===

- Tails has been started more than 292 595 times in April.
  This make 9 753 boots a day in average.
- 35 029 downloads of the OpenPGP signature of Tails ISO.
- 105 reports were received through WhisperBack.

Code


* Quite some work was put into adapting Tails to Debian 7 (Wheezy).
  The result will be released on June 10, as Tails 1.1.

  - Thanks to the amazing work done in Debian by Ulrike, we are
almost there when it comes to adding back support for
OpenPGP signature verification in Nautilus (#6608).

https://git-tails.immerda.ch/tails/log/?h=feature/6608-OpenPGP-signature-verification-in-Nautilus
https://labs.riseup.net/code/issues/6608

  - The Vagrant setup was fixed to allow building Tails/Wheezy images
in RAM (#7132).

https://git-tails.immerda.ch/tails/log/?h=bugfix/vagrant-ram-bump-for-wheezy
https://labs.riseup.net/code/issues/7132

  - Synaptic was made to start again on Wheezy (#7055).

https://git-tails.immerda.ch/tails/log/?h=bugfix/7055-drop-default-APT-release
https://labs.riseup.net/code/issues/7055

  - The Debian Mozilla team's repository used on the devel branch
was updated for Wheezy (#7063).

https://git-tails.immerda.ch/tails/log/?h=bugfix/use-Wheezy-repo-for-debian-mozilla

  - The latest version of the MAT is now installed (#5792).

https://git-tails.immerda.ch/tails/log/?h=feature/mat-0.5.2
https://labs.riseup.net/code/issues/5792

  - Initial progress was made to update the Windows camouflage.

https://git-tails.immerda.ch/tails/log/?h=feature/6342-update-camouflage-for-gnome3
https://labs.riseup.net/code/issues/6342

* The APT suite being used when building from the stable branch
  was corrected. (#7022).

https://git-tails.immerda.ch/tails/log/?h=bugfix/7022-use-stable-APT-suite-when-building-from-stable-branch
https://labs.riseup.net/code/issues/7022

* The new logo was integrated in the *About Tails* dialog (#7096).

https://git-tails.immerda.ch/tails/log/?h=feature/7096-integrate-the-new-logo-in-about-tails
https://labs.riseup.net/code/issues/7096

* Some Vagrant compatibility issues were fixed (#7134).

https://git-tails.immerda.ch/tails/log/?h=bugfix/fix-vagrant-compatibility-issues
https://labs.riseup.net/code/issues/7134

* The blacklisting of directory authority keys that have been used
  with versions of OpenSSL affected by Heartbleed
  was backported into our Tor packages.

https://git-tails.immerda.ch/tails/log/?h=feature/tor-0.2.4.21-1+tails1_d70.wheezy+1

* Our modified Tor Launcher was updated to avoid
  pretending that we ship a default set of bridges.

https://git-tails.immerda.ch/tails/log/?h=feature/tor-launcher-0.2.5.3
https://labs.riseup.net/code/issues/6934

* I2P was explicitly told that it cannot receive inbound connections
  (#7070).

https://git-tails.immerda.ch/tails/log/?h=bugfix/i2p_incoming
https://labs.riseup.net/code/issues/7070

* An attempt at migrating our source tree to live-build 3.x
  was made (#5691). It is still entirely unclear whether the
  cost/benefit ratio is worth it, especially because live-build 4.x
  has already gone quite further in terms of incompatibilities, and is
  far from being ready for prime-time yet.

https://git-tails.immerda.ch/tails/log/?h=feature/live-build-3.x
https://labs.riseup.net/code/issues/5691

* A patch to make the Greeter's help window resolution-aware was
  proposed (#7009).

https://mailman.boum.org/pipermail/tails-dev/2014-April/005451.html
https://labs.riseup.net/code/issues/7009

* Another proposed patch aims at fixing the Tails Installer fonts size
  on Wheezy (#5673).

https://labs.riseup.net/code/issues/5673

Documentation and website
=

* The FAQ was published.

https://tails.boum.org/support/faq/index.en.html

* The logo that won the
  contest was integrated
  in the website, and on the boot loader's splash screen
  (#7090).

https://tails.boum.org/promote/logo/
https://tails.boum.org/news/and_the_winner_is/index.en.html
https://git-tails.immerda.ch/tails/log/?h=feature/logo
https://labs.riseup.net/code/issues/7090

* Some initial steps were walked to modernize our website's markup and
  CSS, including moving to HTML5 and better responsiveness (#7021).
  Compatibility with older browsers is left to be tested before we can
  apply these changes to the live website.

https://git-tails.immerda.ch/451f/tails/log/?h=websitemodernization
https://labs.riseup.net/code/issues/7021

* Many documentation pages were deeply reworked as part of #5977:
  doc/why_tor, doc/vidalia, doc/unsafe_browser, doc/network-manager,
  doc/introduction.

https://labs.riseup.net/code/issues/5977
https://git-tails.immerda.ch/tails/log/?h=doc/why_tor
https://git-tails.immerda.ch/tails/log/?h=doc/vidalia
https://git-tails.immerda.ch/tails/log/?h=doc/unsafe_browser
https://git-tails.immerda.ch/tails/log/?h=doc/network-manager
https://git-tails.immerda.ch/tails/log/?h=doc/introduction

* The homepage now makes it 

Re: [Tails-dev] [review'n'merge] #7166: bugfix/7166-vagrant-memory-checks

2014-05-09 Thread intrigeri
Kill Your TV wrote (08 May 2014 21:34:49 GMT) :
> I updated the ticket with pretty much the same text as here.

Great. Do you want to take care of the code review too?

(I don't mind merging it eventually, but given my Vagrant-fu is pretty
low, likely you would be better than me at reviewing this branch.)

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.