Re: [Tails-dev] Default bridges? [Was: Tails contributors meeting: Wednesday June 03]

2015-06-05 Thread Griffin Boyce

intrigeri wrote:

I suppose that they are chosen to be reliable enough for Tor Browser
users outside of Tails. And Tails users being 1% of Tor users [1] 
maybe

that's no problem.


In practice, I would bet that you're probably right. Note that we lack

Anyway, the meeting minutes don't make it clear, but this alone wasn't
the only reason why we decided to postpone this topic: security
reasons [1] weighted a lot IIRC, combined with the fact that no good
way to warn users (without scaring them needlessly, and without
teaching them to click through warnings) was proposed yet.

All in all, the whole thing seems hard, problems have been identified
3 months ago, and nobody has showed up to work on solutions since
then, so postponing felt the right thing to do (at least to me).


  While this wouldn't solve all concerns, I'd be happy to set up some 
obfs3/obfs4 bridges for the Tails default.


best,
Griffin

--
“Sometimes the questions are complicated and the answers are simple.”
― Dr. Seuss
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] Historical hashes

2014-12-15 Thread Griffin Boyce

Hey all,

  I was just wondering if it's possible to get a gpg-signed list of 
sha256 checksums.  While there are old versions still available on the 
website (back to v1.0), thought I'd ask before downloading 7gb of Tails 
ISOs. :D


  I'm building a feature into Satori that will recognize the checksum 
for many versions of software and identify it.


thanks,
Griffin

[1] https://github.com/glamrock/satori

--
The apparent safety of modern life is just a shallow skin atop
an ocean of blood, guts and bricked devices.
~Pearce Delphin
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] Historical hashes

2014-12-15 Thread Griffin Boyce

intrigeri wrote:

Griffin Boyce wrote (15 Dec 2014 12:47:08 GMT) :
  I was just wondering if it's possible to get a gpg-signed list of 
sha256 checksums.


Here we go, with a (hopefully) proper introduction statement.
Note that most release candidates are missing, since I haven't kept
a full archive thereof (has anyone?).


  Thanks so much!  ^_^  This is really helpful. Not worried about the 
release candidates, honestly.


all the best,
Griffin
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] Windows camouflage for Jessie/GNOME shell

2014-12-06 Thread Griffin Boyce
I work with lots of end-users who actually use the windows camouflage feature, 
so I'd like to press for its inclusion if at all possible.

best,
Griffin


On December 4, 2014 7:27:21 AM EST, sajolida sajol...@pimienta.org wrote:
intrigeri:
 Alan wrote (02 Dec 2014 14:24:35 GMT) :
 Do we still want to provide Windows Camouflage? How much energy do
we
 want to put in it and who wants to participate?
 [...]
 I'm up for participating to the effort if we collectively think it
 makes sense.  However I'm not sure that I want to handle it alone.
 
 My current position is:
 
   * let's focus on everything else that's on our way towards
releasing
 Tails/Jessie
   * let's not consider the possible lack of Windows Camouflage as
 blocking the initial Tails/Jessie release
   * let's specify how Tails/Jessie's Windows Camouflage should look
 like, and put the implementation ideas and pointers we have into
 a blueprint
   * let's make the two first above points clear, e.g. in a blog post
 calling for help and pointing to the blueprint = if volunteers
 show up, then awesome, Alan can give them a hand while focussing
 primarily on other Tails/Jessie -related tasks

Same here. I would try to make this problem more public and see if we
can find people or money to do that externally or only once we sorted
out the rest of Tails Jessie.

-- 
sajolida
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] [review'n'merge:1.2.1] feature/7740-remove-truecrypt

2014-12-05 Thread Griffin Boyce
I hear many good things about Zulucrypt, which can manage TC volumes.

(and yeah, I use Tails partly for TrueCrypt also, as I have encrypted drives 
that are tricky to migrate to something else).

~Griffin

On December 5, 2014 9:43:27 AM EST, Jacob Appelbaum ja...@appelbaum.net wrote:
On 12/5/14, sajolida sajol...@pimienta.org wrote:
 Jacob Appelbaum:
 On 12/4/14, intrigeri intrig...@boum.org wrote:

 Except creating such volumes, every other thing has been possible,
 documented and advertised to people every time they use TrueCrypt
 since Tails 1.2 (or earlier, I don't remember):
 https://tails.boum.org/doc/encryption_and_privacy/truecrypt/

 Most of your TrueCrypt users are not on the tails-dev list, I guess?

 I think it makes sense to remove TrueCrypt - it may also be that an
 announcement about how to use TrueCrypt and the replacement are also
 important for prominent blog entry or website update before the next
 major release.

 What intrigeri wanted to say is that since 1.2, when starting
TrueCrypt,
 people were warned that it would be removed in 1.2.1 and pointed to
that
 piece of documentation explaining how to open TC volume with
cryptsetup.


OK. That makes sense - though I suspect that many will simply forget
or will not have understood.

 So people actively using TrueCrypt have been pointed to that doc and
 already know how to continue using their existing volumes in 1.2.1.

 I find this more elegant than hammering the blog about the end of a
 feature that that has been deprecated for years.


Many users that I know use Tails specifically for TrueCrypt - even if
it is considered deprecated, it is still one of the safest, easy and
contained ways to use TrueCrypt.

We'll see from support requests what happens, I think.

All the best,
Jacob
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] TCP Sequence Numbers leak System Clock

2014-09-27 Thread Griffin Boyce
Mostly off-topic, but: Tor will also fail to start if it thinks that the system 
time/date are dramatically wrong. I've had to set the system date before for 
tor to be able to create a circuit at all (though it was wrong by days, not 
minutes).  So, do people fetch network time before bootstrapping? That's 
probably a much worse situation to be in than just looking at a calendar or 
asking some bloke what time it is.

But to your point, local system time doesn't/shouldn't impact correlation 
attacks at all. Every network hop between the user and destination has a set 
system time that is far better to determine sequence. Correlation attacks are 
nice on paper, but seem to fall apart quite quickly. Even in a lab environment, 
I can't imagine they are easily replicated.

Imagine that you are a global adversary, and someone downloads 1mb of something 
bad from x:443. There is basically no chance that the person using tor or i2p 
will be found - even less if the tor user changes routes while downloading. 
There's simply too much noise for a global passive adversary to make any kind 
of realistic correlation to find the downloader. And while the risk increases 
with the size of the download, so does the chance that it won't complete during 
that 10-minute window (assuming it doesn't fail outright or wasn't already 
broken into pieces).

There seems like a slightly larger risk if the downloader is already under 
suspicion and assuming they have a monitored connection (no longer passive 
surveillance) and that they aren't generating cover traffic (with normal 
browsing or porn or Netflix) and if the correct sequence of atypical download 
sizes is seen. And even then it might all fall apart if lots of people are 
downloading things of that size from that source. (Episode sequences, for 
example). Or if the sizes are extremely common. Lots of classified documents 
are about 50kb, but that would be virtually impossible to correlate.

Anyway, I don't think correlation attacks in onion routing are much more than 
an interesting research problem. With a sufficient number of hops, it's solved.

best,
Griffin


On September 27, 2014 4:04:32 AM EDT, Patrick Schleizer 
patrick-mailingli...@whonix.org wrote:
Hi,

you might be interested in this:
https://twitter.com/ioerror/status/509159304323416064

Why could it be relevant?

Tor Browser (and other applications?) leak the system clock in default
settings [1]. At the same time, the system clock leaks to ISP level
observers through TCP sequence numbers. This opens up to quite simple
end-to-end correlation attacks, I think.

Cheers,
Patrick

[1] https://trac.torproject.org/projects/tor/ticket/3059
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.

-- 
Hackers are not rockstars. You know who are rockstars? ROCKSTARS.
~Dan Kaminsky___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Metadata Anonymization Toolkit in TAILS

2014-09-06 Thread Griffin Boyce


On September 6, 2014 5:33:30 PM EDT, BitingBird bitingb...@riseup.net wrote:
Carribbean Rob:
 Sorry if this has been covered before but I haven't been able to find
an
 definite answer.
 
 Has the Metadata Anonymization Toolkit been permanently removed from
 TAILS 1.1+?
 
 If it has, what is the currently recommended way for removing EXIF
data
 from picture files?
 
AFAIK, the MAT is shipped in Tails.

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.

-- 
Sent from my tracking device. Please excuse brevity and cat photos.___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Let's share username, /etc/hostname and /etc/host among all anonymity distributions

2014-08-22 Thread Griffin Boyce
intrigeri wrote:
 As you can see in my comment #6 there, it's unclear to me what's best,
 between sharing fixed values and randomizing it. Each solution has
 pros and cons. What do you think?

  So I think that a better approach is to pick some themes that are
common and create a list to randomly select from rather than generate a
gibberish hostname.

My thoughts are:
  - Randomly-generated hostnames may identify people as users of an
anonymity system by virtue of being random strings.
  - mercurious seems like a person, while ytrjtkhkn looks like a bot.
  - If the pool of created names is shared between anonymity OSs, then
that's all the better to avoid fingerprinting.

  As for what to pick for themes, mythological deities, comic book
characters, and the top first names [1] seem like common choices.  I
frequently reference Jungian psychology in hostnames[2].  The key is to
find themes that are common *enough* that they don't stick out from the
crowd of typical non-anonymous users.

best,
Griffin


[1] http://www.ssa.gov/oact/babynames/decades/century.html
[2] Though my pocket router's access point is Keith Alexander's iPad

-- 
Wherever truth, love and laughter abide, I am there in spirit.
-Bill Hicks
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] Why OnionCat + Mumble - why not just Mumble?

2014-08-04 Thread Griffin Boyce

Patrick Schleizer wrote:

Why OnionCat + Mumble - why not just Mumble?

Mumble has a TCP mode. Why involve OnionCat?


  Mumble's UDP mode is more reliable over all and theoretically has 
better flow/congestion control.  Any performance improvements gained by 
using UDP would probably be nullified by the fact that it's being used 
over Tor in the first place, but on the other hand the voice quality may 
be better using Mumble-UDP with OnionCat than using Mumble-TCP alone.  
We should test this.


~Griffin

(and thus the only time that my gamer knowledge will be useful on 
tails-dev)

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] Firefox extension for downloading Tails

2014-07-08 Thread Griffin Boyce
OpenPGP.js doesn't require the user to have GPG installed on their system. 

Ideally, in this case, the pubkey would be already packaged within the 
extension, with only signed updates being able to overwrite it. However, I 
think to some extent this still relies on a user making an effort to verify the 
key's validity via its web of trust. 

best,
Griffin

On July 8, 2014 6:19:07 PM EDT, sajol...@pimienta.org wrote:
Giorgio Maone wrote:
 Hi everybody.
 
 The blueprint should be enough for me to start hacking a prototype
together.
 
 If nobody has suggestions, I'd propose to call the extension with the
 catchy (!) name of Tails Catcher.
 
 I'd just add that a future version might embed tails developer's key
and
 perform OpenPGP authentication itself.

I didn't put that idea on the blueprint so far, for the following
reasons:

  - OpenPGP for verifying our ISO image is only stronger than SHA256 if
the WoT is used to build strong trust in the signing key. Otherwise,
you
might as well get an HTTPS MitM while receiving the key, as much as
while receiving the hash.
 - Our past experience with Firegpg [1] taught us that doing GPG inside
of a browser is usually a bad idea. The same might not apply to an ISO
verification but I would check this very carefully before going this
way.
 - I don't know how portable it would be to do such GPG operations from
inside the browser. Would the user need to have GPG installed on their
Windows or Mac OS X? Would we ship a GPG ourselves? All those options
sounds scary to me :)

Those are the reasons why I'm not convinced by that idea. We might also
want to further discuss the role of the OpenPGP verification in the
broad installation process with UX people. But anyway, that discussion
shouldn't block in any way the first implementation...

[1]:
https://tails.boum.org/doc/encryption_and_privacy/FireGPG_susceptible_to_devastating_attacks/index.en.html

-- 
sajolida





___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.

-- 
Sent from my tracking device. Please excuse brevity and cat photos.___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Firefox extension for downloading Tails

2014-07-06 Thread Griffin Boyce

sajolida wrote:

Together with Giorgio Maone from NoScript and tchou we designed a crazy
new plan to solve a great deal of ISO verification for the masses.

Here it is:

https://tails.boum.org/blueprint/download_extension/

Please everybody, check the scenario that we are proposing there, so we
all agree on the plan.



  I like this idea a *lot* (and am doing something similar for 
distributing Tor).  Are the repos public?  Would love to take a peek.


  One issue that I see is that this method relies on people having a 
secure connection to the Firefox add-ons site.  This is not always the 
case, and there are lots of MITM anecdotes involving FF extension 
installation/updating.  Also, this extension should allow users to 
select any local file to verify the hash.  I would additionally request 
that there be an option to simply generate a sha256 hash so that users 
can attempt to verify other software as well.


best,
Griffin
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] Firefox sha256sum checker

2014-05-06 Thread Griffin Boyce

sajol...@pimienta.org wrote:

It took a while for your proposal to mature in my head...

Do you think we could replace Firefox and MD5 Reborned Hasher by Chrome
and your app in our documentation?


  That's an interesting question.  Firefox/Iceweasel has a lot going for 
it outside of a possible hash checker.  This seems like something that 
should perhaps be asked of the community rather than myself.  
Chrome/Chromium[1] is an interesting browser, but unless it's in the 
Tails environment, I wouldn't recommend it for use with Tor.  Mike Perry 
would have more information on the security implications of switching 
from Firefox to Chrome.



Can you confirm that the same arguments would work for Chrome too?


  AB, definitely.  Chrome and Chromium[2] use https for download, but 
not sure about pgp authentication.  Wasn't able to find anything on it 
during a quick search, so am assuming not.



Then, I never used Chrome before, but how would I got and use your app
actually? Is that an extension to install or what? :)


  To install manually, get the zip: https://github.com/glamrock/satori

* Go to chrome://extensions/
* ☑ Developer mode
* Click Load unpacked extension
* Choose Satori/chrome directory

  Then go to chrome://apps/ to launch (just like launching any other 
app).  Once development slows slightly, that repository will have a 
gpg-signed zip file to make it easier to install securely outside of 
Google's walled garden[3].  Once you have it open, scroll down to the 
hash generator, and select a file you have downloaded.  Then compare the 
displayed hash with what you are expecting.


  If it were included in Tails, that would certainly affect UI/design.  
Right now, the hash checker is close to the bottom.


best,
Griffin

[1] Chromium is the open-source version of Chrome
[2] https://wiki.debian.org/Chromium
[3] 
https://chrome.google.com/webstore/detail/satori/oncomejlklhkbffpdhpmhldlfambmjlf

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Firefox sha256sum checker

2014-05-06 Thread Griffin Boyce

not sure about pgp authentication.  Wasn't able to find anything on it
during a quick search, so am assuming not.


I stand corrected on this point. Chrome is released with the fingerprint 
listed on [1], in case people need to double-check.


[1] https://www.google.com/linuxrepositories/

~Griffin
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] And the winner is...

2014-04-12 Thread Griffin Boyce
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

That looks really great =)

Congrats, Tchou!

On 04/12/2014 01:36 PM, sajol...@pimienta.org wrote:
 Our logo contest for Tails ended up a few days ago. Since then, 11 
 regular Tails contributors voted on the 36 proposals.
 
 Winner ==
 
 The winning proposal is the one by Tchou.
 
 We commented on the initial version and we already came up with an 
 improved version:
 
 https://tails.boum.org/blueprint/logo/tchou-improved.png 
 https://tails.boum.org/blueprint/logo/tchou-improved.svg
 
 Congratulations!
 
 In the coming days we will keep on fine-tuning it and integrating
 it in time for Tails 1.0. So don't hesitate to comment on it.
 
 Top 7 =
 
 Six other great proposals made it to the top 7:
 
 2nd: tie between Andrew and Joe 4th: tie between Jared and Renato 
 6th: tie between MewChan, hiding cat and Christopher
 
 This PDF shows a graph of how many voters preferred a given
 proposal to another one:
 
 https://tails.boum.org/blueprint/logo/top7.pdf
 
 We reiterate our thanks to the 31 designers who worked for this
 contest to be such a success.
 
 
 
 ___ Tails-dev mailing
 list Tails-dev@boum.org 
 https://mailman.boum.org/listinfo/tails-dev To unsubscribe from
 this list, send an empty email to tails-dev-unsubscr...@boum.org.
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJTSZ7eAAoJEAPPSgqzx5pjrI8H/1/QniFpeBAiHo64DQFLLIWc
GUvyAcuWix1PlTcdrT9WdCqNfRI2vQ0fGNwrD0U9YZ3ysfI1TEPaF8dJVlFrWV2N
D3uIYbfDUzk3sr6FCFegqzWCYeNLsp5iJrtIGF0SXbaMp8HOnHxzV9/T7V8v2FGU
xHTLdYbvV93gaVi8GyUZpQmQvVyM0acWSiVf+xxJHKdsOPQCP8qluRQpkm1mydTa
/jzjGqRCGXGxNCCOdVxIZjUyu82vLIRWaUo7NiJ8bZv+rk8zelIRUrAhVeXaKA1C
SkEoWQlmZ6x8cyWW8SNLz3XM8hzvKs2FiTEfCjXNyi77fHm93J/bEA5n/U5Ju8g=
=El/g
-END PGP SIGNATURE-
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Firefox sha256sum checker

2014-03-25 Thread Griffin Boyce
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

   Arma and intrigeri suggested I shoot y'all an email.  I built a
sha256sum generator into a Chrome app, and the code might be portable
to Firefox.  Arma'd indicated that TAILS needs a replacement hash
generator, since the current one is incompatible with recent ff
versions.  Not sure how useful this is for your project though -- in
my case, I'm distributing bundles, so made sense to include.

Relevant code is in the Satori repo, specifically:
https://github.com/glamrock/Satori/blob/master/chrome/sparkle.js
https://github.com/glamrock/Satori/blob/master/chrome/compiled.js
https://github.com/glamrock/Satori/blob/master/chrome/menu.html

  If this is interesting, I can at least disentangle the code from the
Satori app, add md5/sha1, and make a standalone repo.  It will run as
a local webpage just fine.  I might not have the time to turn it into
a FireFox extension though.

  The issue with the current hasher (MD5 Reborned Hasher) is that it
is basically unmaintained. It hooks into the old download functions,
so when FF 26 changed how it manages downloads, the extension broke
entirely (#6245).

~Griffin

GPG: 879B DA5B F6B2 7B61 2745  0A25 03CF 4A0A B3C7 9A63

[0] TAILS issue #6245: https://labs.riseup.net/code/issues/6245


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJTMdO8AAoJEAPPSgqzx5pjJZMH/AzIWPA1ckUna0uBrtqzn8Ue
yuwbCKslQz2knS2bkK2VYZACAr5EeNhx26AubHyib5GS+gvnxa+pi1Eg42Om01Ep
8p4cHdtWumo4YQMubrEMMpPTx3BtTkip7f8Rj5grfdhH5G/aNVx0KCtP0dmT3P7a
SccyyUsJ4RMYlLeN7P9Es0NtL3BWkvbgTYVuV0AO5Jdz9IjqwFzjqEGF6cU7tFjx
PEkYdLMcPNf8A+pLYoax41QHkxomw4G6F5Ko9Z/a7H+jclmEnzrszy6YmVUuouPj
CT8FFdssWBW7hYJf7GJEi84fCpgTmou+hq0/WAaXNFTcybFDY7UChOmAjhTZJS0=
=SV6p
-END PGP SIGNATURE-
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] SHA256sum replacement or patch

2014-03-11 Thread Griffin Boyce
Heya,

  While I can't promise anything, replacing the current (non-working)
solution for hash-checking seems promising.  This would probably just be
a patch.  If any code results, where should it go?  Attached to the
issue in question?

~Griffin
(aka monchichi on #tor-dev)
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.