[Tails-dev] Tails report for May, 2014

2014-06-13 Thread Tails folks
-Milestone-80386.html

-- 
Tails folks
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] Tails report for April, 2014

2014-05-09 Thread Tails folks
 Brandom, in The Verge.

http://www.theverge.com/2014/4/29/5664884/this-is-the-most-secure-computer-you-ll-ever-own

* 2014-04-23: Amaelle Guiton mentions Tails in the article [Chiffrer le
  Net pour retrouver notre vie privée en ligne: une bonne solution qui
  pose des problèmes in Slate (in French).

http://www.slate.fr/monde/86275/cyberespace-cypherspace-crypter-chiffrement-internet

* 2014-04-17: Bruce Schneier writes Nice article on the Tails
  stateless operating system. I use it. in a blog post.

https://www.schneier.com/blog/archives/2014/04/tails.html

* 2014-04-14: In the press conference
  she held after winning a Polk Award for her reporting on Edward
  Snowden and the NSA, Laura Poitras said We just published a blog
  about a tool that's called Tails, which is a operating system that
  runs on either USB stick or SD disc, that is a sort of all-in-one
  encryption tool that you can use for PGP and encryption. And it's
  just really secure. [...] So, it's a really important tool for
  journalists.

http://www.democracynow.org/blog/2014/4/11/video_glenn_greenwald_laura_poitras_q

* 2014-04-14: Out in the Open: Inside the Operating System Edward
  Snowden Used to Evade the NSA by Klint Finley, in Wired.

http://www.wired.com/2014/04/tails/

* 2014-04-02: In Help Support the Little-Known Privacy Tool That Has
  Been Critical to Journalists Reporting on the
  NSA by Trevor Timm:

https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa

  - Laura Poitras says: I've been reluctant to go into details about
the different steps I took to communicate securely with Snowden to
avoid those methods being targeted. Now that Tails gives a green
light, I can say it has been an essential tool for reporting the
NSA story. It is an all-in-one secure digital communication system
(GPG email, OTR chat, Tor web browser, encrypted storage) that is
small enough to swallow. I'm very thankful to the Tails developers
for building this tool.
  - Glenn Greenwald says: Tails have been vital to my ability to work
securely on the NSA story. The more I've come to learn about
communications security, the more central Tails has become to
my approach.
  - Barton Gellman says: Privacy and encryption work, but it's too
easy to make a mistake that exposes you. Tails puts the essential
tools in one place, with a design that makes it hard to screw them
up. I could not have talked to Edward Snowden without this kind of
protection. I wish I'd had it years ago.

-- 
Tails folks
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] Tails report for March, 2014

2014-04-12 Thread Tails folks
/tails-dev/2014-March/005186.html

- Feedback wanted on planned implementation of Feature #5301 - Clone or
Backup Persistent Volume

https://mailman.boum.org/pipermail/tails-dev/2014-March/005225.html

- Testing EHLO messages: simplification proposal

https://mailman.boum.org/pipermail/tails-dev/2014-March/005227.html

- Perspectives for 0.23..1.1

https://mailman.boum.org/pipermail/tails-dev/2014-March/005234.html

- Upgrading the Linux kernel for 1.0?

https://mailman.boum.org/pipermail/tails-dev/2014-March/005237.html

- Review of https://tails.boum.org/contribute/ about restructuring the
links on the Contribute page

https://mailman.boum.org/pipermail/tails-dev/2014-March/005298.html

- More tails.boum.org HTTP response headers?

https://mailman.boum.org/pipermail/tails-dev/2014-March/005278.html

Funding
===

- We were awarded the Access Innovation Prize.

https://www.accessnow.org/prize
https://twitter.com/accessnow/status/441043400708857856

- We submitted a proposal to the Knight Foundation News Challenge.

https://www.newschallenge.org/challenge/2014/submissions/improve-tails-to-limit-the-impact-of-security-flaws-isolate-critical-applications-and-provide-same-day-security-updates

- The crowdfunding campaign by the Freedom of the Press Foundation was
extended and revived thanks to  some new articles by Trevor Timm.

https://pressfreedomfoundation.org/
https://pressfreedomfoundation.org/blog/2014/02/why-its-vital-public-fund-open-source-encryption-tools
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa

- We applied to be audited through the OpenITP Peer Review Board.

https://prb.openitp.org

- We are still the process of signing the contract for a grant we were
awarded by OpenITP at the end of 2013.

Outreach


- We organized a logo contest to have a new logo in time for Tails 1.0.
We received 36 proposals Tails contributors started to vote on their
favourite proposals.

https://tails.boum.org/news/logo_contest/index.en.html
https://tails.boum.org/blueprint/logo/

- We scheduled two usability testing sessions together with Silicon
Sentier on May 21 and May 28 in Paris.

http://siliconsentier.org/

- We scheduled a public hackfest. It will take place at IRILL Paris,
France on July 5 and 6.

http://www.irill.org/

- We made progress on the organization of the 2014 edition of the yearly
Tails contributors summit. We could make use of more funding sources.

Press and testimonials
==

* 2014-03-17: In Index Freedom of Expression Awards: Digital activism
nominee Tails, Alice Kirkland interviews the Tails project about our
nomination for the *Censorship’s Freedom of Expression Awards*.

http://www.indexoncensorship.org/2014/03/index-freedom-expression-awards-digital-activism-nominee-tails/

* 2014-03-13: In his Les 7 clés pour protéger ses communications article
(in French) published by the *Tribune de Genève*, Simon Koch recommends
using Tails.

http://www.tdg.ch/high-tech/web/Les-7-cles-pour-proteger-ses-communications/story/25588689

* 2014-03-12: In his [Happy 25th Birthday World Wide Web - Let's Not
Destroy It article published by the Huffington Post, Mike Harris writes
that Increasing numbers of activists are using high-tech tools such as
Tor or Tails to encrypt their internet browsing and email.

http://www.huffingtonpost.co.uk/mike-harris/world-wide-web_b_4947687.html?utm_hp_ref=uk

* 2014-03-12: In his US and UK Spy Agencies Are Enemies of the
Internet article, published in the Motherboard section of the Vice
network, Joseph Cox covers Reporters Without Borders' latest report, and
writes If you're a journalist working on anything more sensitive than
London Fashion Week or League 2 football, you might want to consider
using the Linux-based 'Tails' operating system too.

http://motherboard.vice.com/read/us-and-uk-spy-agencies-are-enemies-of-the-internet
https://en.rsf.org/enemies-of-the-internet-2014-11-03-2014,45985.html

* 2014-03-08: Reporters Without Borders's Grégoire Pouget blogs about
Tails: FIC 2014 : Comment être réellement anonyme sur Internet (in French).

http://en.rsf.org/
http://blog.barbayellow.com/2014/03/08/fic-2014-comment-etre-reellement-anonyme-sur-internet/

* 2014-03-03: In the March edition of the Linux Journal, that celebrates
20 years of this journal, Kyle demonstrates Tails.

http://www.linuxjournal.com/content/march-2014-issue-linux-journal-20-years-linux-journal

-- 
Tails folks

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] Tails contributors meeting: Wednesday, March 5

2014-02-20 Thread Tails folks
Hi,

The next public Tails developers meeting is scheduled for

Wednesday, March 5, on #tails-dev (OFTC) 9pm UTC (10pm CET)

Every one interested in contributing to Tails is welcome.

Redmine tickets we could discuss:

  * #6245: MD5 Reborned Hasher is incompatible with Firefox 20
https://labs.riseup.net/code/issues/6245

  * #6679: Do not auto-connect to the #tor IRC channel
https://labs.riseup.net/code/issues/6679

Usual topics on the agenda are:

  * Volunteers to handle broken windows this month?
https://labs.riseup.net/code/projects/tails/roadmap#Broken%20window

  * Planning a monthly low-hanging fruits or review'n'merge meeting?
Low-hanging fruits meeting: spend a while together on many small
tasks that take less than 2 hours each, and are waiting in our TODO
list for too long.

Feel free to propose and prepare other discussion topics. Please raise
them in this thread so that others can ask details and prepare the
discussion too.

If you want to get involved but don't know how yet, please consider
coming and say hello during the meeting: this work meeting probably
won't be the most adequate time and place to properly introduce
newcomers to the development process, but at least it should be a fine
place to tell us you're interested, and possibly to schedule a better
suited event.

Cheers.
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Tails report for December 2013

2014-01-10 Thread Tails folks
://labs.riseup.net/code/issues/5465
https://labs.riseup.net/code/issues/6544

- Our automated test suite was partially ported to the
  feature/wheezy branch.

https://git-tails.immerda.ch/tails/log/?h=feature/wheezy

Build system


- Thanks to David Wolinsky and others, our Vagrant setup
  was updated to work with newer Vagrant, and
  the corresponding basebox updated to include up-to-date Debian
  archive keys. While we were at it, a few lurking bugs were fixed.

https://git-tails.immerda.ch/tails/log/?h=bugfix/6221-support-newer-vagrant
https://labs.riseup.net/code/issues/6221

- Thanks to WinterFairy, it is now easy to import translations from
  Transifex into our various Git repositories.

https://git-tails.immerda.ch/winterfairy/tails/log/?h=feature/import-translations-extern

On-going discussions


- Tor Browser branding in Tails?

https://mailman.boum.org/pipermail/tails-dev/2013-December/004362.html

- Risks of enabled/disabled TCP timestamps?

https://mailman.boum.org/pipermail/tails-dev/2013-December/004520.html
https://labs.riseup.net/code/issues/6579

Funding
===

- The Freedom of the Press Foundation launched a campaign to support
  encryption tools for journalists. Tails is among
  the projects this campaign gathers fund for.

https://pressfreedomfoundation.org/

- The proposal we have sent to sponsor Echo was accepted.
- Our grant proposal with sponsor Charlie was rejected.
- We are slowly making progress on our grant proposal with
  sponsor Golf.
- We have almost completed a proposal to be sent to sponsor Lima.
- Our contract with sponsor Bravo is now finished.
- Tails will soon accept donations in currencies other than Bitcoin.
- We are now very likely to create a non-profit organization dedicated
  to Tails.
- We have almost wrapped-up our bounties program. A report will be
  published soonish.

Outreach


Tails participated in the 30th Chaos Communication Congress. It was
a great opportunity to meet, in person, a few existing and new
contributors, as well as many people we are working with.

https://events.ccc.de/congress/2013/wiki/Main_Page

A self-organized event called *Tails needs your help* was organized.
It was a success considering the late notice.

https://tails.boum.org/promote/slides/2013-12-29_-_Tails_needs_your_help.shtml

See you next year, probably with more space and events dedicated
to Tails!

Press and testimonials
==

* 2013-12: Bruce Schneier answered to someone asking him what Linux
  distribution is its favorite: I don't use Linux. (Shhh. Don't tell
  anyone.) Although I have started using Tails.

http://www.reddit.com/r/IAmA/comments/1r8ibh/iama_security_technologist_and_author_bruce/cdknf7a

* 2013-12-12: In A conversation with Bruce Schneier,
  as part of the Snowden, the NSA and free software cycle at
  Columbia Law School NYC, Bruce Schneier says:
  - I think most of the public domain privacy tools are going to be
safe, yes. I think GPG is going to be safe. I think OTR is going
to be safe. I think that Tails is going to be safe. I do think
that these systems, because they were not -- you know, the NSA has
a big lever when a tool is written closed-source by a for-profit
corporation. There are levers they have that they don't have in
the open source international, altruistic community. And these are
generally written by crypto-paranoids, they're pretty well
designed. We make mistakes, but we find them and we correct them,
and we're getting good at that. I think that if the NSA is going
after these tools, they're going after implementations.
  - What do I trust? I trust, I trust Tails, I trust GPG [...]
  - We can make it harder, we can make it more expensive, we can make
it more risky. And yes, every time we do something to increase one
of those, we're making ourselves safer. [...] There are tools we
are deploying in countries all over the world, that are keeping
people alive. Tor is one of them. I mean, Tor saves lives. [...]
And every time you use Tor [...] provides cover for everyone else
who uses Tor [...]

http://boingboing.net/2013/12/15/bruce-schneier-and-eben-moglen-2.html

* Jacob Appelbaum stated at the Chaos Communication
  Congress:
  if you are a journalist and you are not using Tails, you should
  probably be using Tails, unless you *really* know what
  you're doing.

https://events.ccc.de/congress/2013/Fahrplan/events/5713.html


-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for November, 2013

2013-12-11 Thread Tails folks
 a certificate for `dl.amnesia.boum.org`.

On-going discussions


- 2.0 milestone += supporting USB devices exposed as non-removable?

https://mailman.boum.org/pipermail/tails-dev/2013-November/003999.html

- Tor Launcher extension

https://mailman.boum.org/pipermail/tails-dev/2013-November/004011.html

- WhisperBack launcher should give a hint on its use

https://mailman.boum.org/pipermail/tails-dev/2013-November/004295.html

- Glossary for contributors

https://mailman.boum.org/pipermail/tails-dev/2013-November/004353.html

Funding
===

- ThinkPenguin.com donated hardware for us to investigate on UEFI
support. Many thanks!

- We have been working on a proposal with sponsor Golf.

Outreach


- We submitted a talk for 30C3 but it was rejected.

- 2013-11-28: Helping Human Rights Defenders to Communicate Securely:
  TAILS, National Democratic Institute, USA at the World Forum for
  Democracy

http://www.coe.int/en/web/world-forum-democracy/lab4_

Press and testimonials
==

- 2013-11: The German-speaking ADMIN magazine reviews Tails.

http://www.admin-magazin.de/Das-Heft/2013/11/Tails-0.20

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for September, 2013

2013-10-07 Thread Tails folks
!

- We paid the first bounty of our bounty program. This one automated the
  migration of our ikiwiki tickets to Redmine.
  https://labs.riseup.net/code/projects/tails/issues?query_id=108

Press and testimonials
==

- 2013-09-12: In Inside the Effort to Crowdfund NSA-Proof Email and
  Chat Services. by DJ Pangburn, Riseup birds write (about the TBB)
  Combined with the TAILS project, which Riseup supports, there is
  nothing better.

http://motherboard.vice.com/blog/inside-the-effort-to-crowdfund-nsa-proof-email-and-chat-services

- 2013-09-05: In How to remain secure against NSA
  surveillance, Bruce Schneier wrote: Since I started working with
  Snowden's documents, I have been using GPG, Silent Circle, Tails, OTR,
  TrueCrypt, BleachBit, and a few other things I'm not going to
  write about.

http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for August, 2013

2013-09-06 Thread Tails folks
.
  https://mailman.boum.org/pipermail/tails-dev/2013-August/003393.html

- It was suggested to tweak the GnuPG configuration in various ways.
  https://mailman.boum.org/pipermail/tails-dev/2013-August/003468.html

- We discussed how to handle divergence of bundled packages due to
  point-releases.
  https://mailman.boum.org/pipermail/tails-dev/2013-August/003492.html

Infrastructure
==

- To make our infrastructure more reliable, we are still organizing to
  get a system that will act as a fail-over for our main server.
  https://labs.riseup.net/code/issues/6185

- We better shared access to the round-robin DNS that gathers our HTTP
  mirrors. (Many thanks to those who host the mirrors, by the way!)

- We created a bunch of sysadmin tickets as a step towards being able
  to ask for help in this area first, and towards being able to
  actually share the work with the volunteers that will show up once
  we have sent our call for help. Stay tuned!
  https://labs.riseup.net/code/projects/tails/issues?query_id=113

Funding
===

- The short-term funding project we have with sponsor Bravo is still
  slowly going through the paperwork stage.

- The bounties program is moving forward (slower than we may have
  hoped, but still).

- We keep working on a funding proposal to be sent to sponsor Foxtrot.

Cheers,
-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for May, 2013

2013-06-07 Thread Tails folks
Hi,

here's the Tails report for May, 2013.

Releases


Tails 0.18 was released on May 18:
https://tails.boum.org/news/version_0.18/

Metrics
===

  - 128 676 connections of Tails to the Tor network. This makes a boot
every 21 seconds on average (this is an approximation from the
requests made to the security announcements feed when Tails is
connected to Tor).

  - 51 non-empty bug reports were received through WhisperBack.

  - 630 comments were posted on the forum, with 143 signed by Tails.

Code


- We had a low-hanging fruits session on May 22, that was attended
  by three persons.

  https://mailman.boum.org/pipermail/tails-dev/2013-May/003076.html

- Some important bugs were fixed in tails-greeter, thanks
  to winterfairy!

  http://git.immerda.ch/?p=tails/tails-greeter.git;a=summary

- A branch to install Linux 3.8 was developed and merged. It triggered
  a bug in the Persistent Volume Assistant, that was fixed.

  http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/linux-3.8
  
http://git.immerda.ch/?p=tails/persistence-setup.git;a=commit;h=c94d7432e649ff9b7974559b28b881ddf89f3ed0

- The automatic re-installation of additional software packages
  feature was improved.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/remember_installed_packages

- live-boot 3.x final is now installed, and the old compatibility
  symlinks were removed. Same for live-config 3.x final.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/live-boot_3.0_final
  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/remove_live-boot_compatibility_symlinks
  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/live-config_3.0_final

- A bug that made it a pain to use our OpenPGP applet was
  partially fixed.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/gpgapplet_do_not_erase_clipboard

- More work was done to remove GNOME proxy settings.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/remove_gnome_proxy_settings

- A branch to update virt-what was proposed.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/newer_virt-what

- A branch to use bilibop was proposed.

  http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/bilibop

- Some preliminary work was done to get our nice custom boot splash
  screen back.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/tails-plymouth-theme

- A smtube backport was prepared.

  http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/smtube

- Some post-Wheezy work was done.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/wheezy-security_APT_source
  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/post-wheezy_pinning

- More precise plans were drawn about the future of tails-greeter.

  https://mailman.boum.org/pipermail/tails-dev/2013-May/003099.html

- Various TBB settings were imported.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/torbrowser

Documentation and Website
=

- The end-user documentation about
  `feature/set-wireless-devices-state' was reviewed and improved.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/set-wireless-devices-state

- The Tails specification and design document received various minor
  updates and improvements, as did the release process documentation.

  https://tails.boum.org/contribute/design/

- Tons of old forum posts were cleaned up, as part of our effort to
  import valuable existing knowledge from there into the upcoming
  QA website.

On-going discussions


- We've discussed inclusion of Martus in Tails.

- Deanonymization potential by the desktop user.

  https://mailman.boum.org/pipermail/tails-dev/2013-May/003078.html

- Adding support for keeping entry guards.

  https://mailman.boum.org/pipermail/tails-dev/2013-May/003111.html

- Removing Iceweasel popups that confuse (some) users

  https://mailman.boum.org/pipermail/tails-dev/2013-May/003109.html

Infrastructure
==

Various bits were updated to reflect the fact that Debian Wheezy
was released.

Funding
===

- We went on working on a grant application for more long-term
  funding with sponsor Foxtrot.

- Draft contracts were sent to the bounties candidates. Some have
  started working on their bounty!

Cheers,
-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for April, 2013

2013-05-11 Thread Tails folks
 all GNOME proxy settings

  https://mailman.boum.org/pipermail/tails-dev/2013-April/002853.html


Infrastructure
==

- Tails 0.17.2 was the first release assisted with automated tests!
  - Cucumber is used to describe the tests to perform.
  - 82 tests have been written so far

- Huge progress was made on our automatic building infrastructure, based
  on Jenkins.

  https://mailman.boum.org/pipermail/tails-dev/2013-April/002902.html


Funding
===

- The grant application we did with OpenITP (Sponsor Echo) was rejected.
  But our proposal made it to their finalist set.


http://openitp.org/?q=openitp_first_round_of_2013_project_funding_now_open_for_proposals

- We started to work on another grant application for more long-term
  funding with sponsor Foxtrot.

- The list of bounties that are going to be funded through the Tor
  project program is closed. It will be made public soon.

-- 
Tails folks

___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for February, 2013

2013-03-10 Thread Tails folks
 [27]

22: https://mailman.boum.org/pipermail/tails-dev/2013-February/002610.html
23: https://mailman.boum.org/listinfo/mat-dev
24: https://mailman.boum.org/pipermail/tails-dev/2013-February/002652.html
25: https://mailman.boum.org/pipermail/tails-dev/2013-February/002651.html
26: https://mailman.boum.org/pipermail/tails-dev/2013-February/002653.html
27: https://mailman.boum.org/pipermail/tails-dev/2013-February/002654.html

Infrastructure
==

Quite some work was done on a new dedicated server of ours, called
lizard:

- Various stuff that's customary for a virtualization host, like
  a local APT proxy and a Puppet master, was setup.
- Our APT repository was migrated to lizard [28]. Our primary
  (private) rsync server, too [29].
- We now run a BitTorrent seed on lizard [30].
- We now run another WhisperBack relay on lizard [31].
- We now run bitcoind [32] on lizard.
- Our Puppet modules are now hosted on lizard. Some are already
  publicly available [33], but there's a bit of boring
  work left to publish the others [34]. We're happy to share with nice
  people [35] the development and maintenance of most of the modules we
  use.
- A VM was setup to run Jenkins, that should some day be an important
  part of automated_builds_and_tests [36].

28: https://tails.boum.org/todo/migrate_APT_repository_to_lizard/
29: https://tails.boum.org/todo/migrate_primary_rsync_server_to_lizard/
30: https://tails.boum.org/todo/run_a_BitTorrent_seed_on_lizard/
31: https://tails.boum.org/todo/run_another_WhisperBack_relay_on_lizard/
32: http://packages.debian.org/bitcoind
33: https://tails.boum.org/contribute/git/
34: https://tails.boum.org/todo/publish_our_Puppet_modules/
35: https://labs.riseup.net/code/projects/sharedpuppetmodules
36: https://tails.boum.org/todo/automated_builds_and_tests/

Funding
===

We have been working on starting our bounties program.

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for December, 2012

2013-01-09 Thread Tails folks

Releases


Tails 0.16~rc1 was released on December 14th.
https://tails.boum.org/news/test_0.16~rc1z

The Tails 0.16 release is scheduled for the first half of January.

People
==

We received 66 reports through Whisperback.

The forum activity has been steadily high:
1128 messages, 177 signed by Tails.

Some of us went to 29c3.
https://events.ccc.de/congress/2012/

Code


Many dictionaries for supported languages were installed.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/spell-checker

A bug concerning memlockd was fixed.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/only-one-memlockd

The regular GnuPG agent was added.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/regular-gnupg-agent

The automatic update feature of Iceweasel extensions was disabled.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/disable-iceweasel-extensions-auto-update

The move to using `live-boot` version 3 was worked on.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/live-boot-3.x

The Minitube Youtube client was installed.
http://flavio.tordini.org/minitube
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/minitube

The Iceweasel Add-on bar was hidden by default.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/just_hide_iceweasel_add-on_bar

The work on a better power-off button was completed and merged.
http://git.immerda.ch/?p=amnesia.git;a=commit;h=0217cf30ad95efe798529aadcde952b49976c839

A bug concerning the `--media` option of live-persist was fixed.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/strict_live-persist_media

The `~/Persistent` directory was added to the *Places* menu of *GNOME*
and *GtkFileChooser*.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/persistent-directory-in-places

The `xul-ext-monkeysphere` extension was removed.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/disable-iceweasel-extensions-auto-update

The *News* section of the website was configured as the homepage of
Iceweasel.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/news-as-homepage
https://tails.boum.org/todo/set_iceweasel_homepage_to_Tails_news

The Entropy Key daemon `ekeyd` was installed.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/disable-iceweasel-extensions-auto-update

A new version of the MAT was announced.
https://mat.boum.org/
https://mailman.boum.org/pipermail/tails-dev/2012-December/002355.html

Documentation and website
=

Guidelines for writing documentation for Tails were written.
https://tails.boum.org/contribute/how/documentation/guidelines

The documentation of our release process was improved.
http://git.immerda.ch/?p=amnesia.git;a=commit;h=ef5f98e69e41794abcd8748529d81965d4aa8274

-- 
Tails folks

___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for October, 2012

2012-12-10 Thread Tails folks
 steps towards installing the Minitube YouTube client were
walked. Many thanks to Alessandro Grassi for starting this effort, and
going on with it!
https://tails.boum.org/todo/minitube and
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/minitube

The `Persistent` directory is now displayed in the Places menu.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/persistent-directory-in-places

Work has started to set iceweasel homepage to Tails news.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/news-as-homepage
and
https://tails.boum.org/todo/set_iceweasel_homepage_to_Tails_news

Shutdown messages were fixed to talk of DVD, not of CD.
http://git.immerda.ch/?p=amnesia.git;a=commit;h=ef5d24c144976d3f0b1c0f64b6533c9d304a9b95

IPv6 was disabled to workaround a recently discovered leak.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/disable-IPv6
and
https://tails.boum.org/todo/really_block_ipv6

Work towards a better power off button is ongoing.
https://tails.boum.org/todo/better_power_off_button and
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/better_power_off_button

obfsproxy support was added.
https://tails.boum.org/todo/obfsproxy and
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/obfsproxy

A number of candidate branches for 0.15 were merged.
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/devel

Documentation and website
=

The Tails website now has a Press  media information page.
https://tails.boum.org/press

The News can now be translated.
https://tails.boum.org/todo/news and
https://mailman.boum.org/pipermail/tails-dev/2012-November/002136.html

As planned, the website was locked-down a bit more.
https://tails.boum.org/todo/locking_down_this_website and
https://mailman.boum.org/pipermail/tails-dev/2012-November/002234.html

On-going discussions


Improve Polipo configuration, switch to Privoxy, or drop it all?
https://mailman.boum.org/pipermail/tails-dev/2012-November/002008.html and
https://mailman.boum.org/pipermail/tails-dev/2012-November/002029.html

Progress report on the automated test suite triggered some discussion.
https://mailman.boum.org/pipermail/tails-dev/2012-November/002014.html

Helping adrelanos to proper copyright and licensing practices when
forking Tails documentation pages.
https://mailman.boum.org/pipermail/tails-dev/2012-November/002054.html

Testing incremental updates and tails-create-iuk.
https://mailman.boum.org/pipermail/tails-dev/2012-November/002108.html and
https://mailman.boum.org/pipermail/tails-dev/2012-November/002128.html

Benchmarking Redmine.
https://mailman.boum.org/pipermail/tails-dev/2012-November/002157.html

How to implement remembering installed packages?
https://mailman.boum.org/pipermail/tails-dev/2012-November/002160.html

Supporting EntropyKey.
https://mailman.boum.org/pipermail/tails-dev/2012-November/002195.html

Promoting Persistence features.
https://mailman.boum.org/pipermail/tails-dev/2012-November/002197.html

What to do with Liferea Cookies?
https://mailman.boum.org/pipermail/tails-dev/2012-November/002209.html

If/How to ship the Minitube native YouTube client?
https://mailman.boum.org/pipermail/tails-dev/2012-November/002257.html

What's the safest value to set the time from Tor consensus?
https://mailman.boum.org/pipermail/tails-dev/2012-November/002228.html

Stop shipping bugs/* and todo/* in ISO?
https://mailman.boum.org/pipermail/tails-dev/2012-November/002235.html

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for October, 2012

2012-11-02 Thread Tails folks
.
https://tails.boum.org/todo/automated_builds_and_tests/cucumber/
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/automated_tests/cucumber

Documentation and website
=

Document the upcoming Network Manager persistence.

Document the new support for public key encryption in the OpenPGP
applet, and generally improve this part of the documentation along the
way.

Fix links to the Universal USB Installer.

Consistently use long GnuPG key ID format in our examples.

Many improvements to French and Portuguese translations.

Documented more of Tails current development process.
https://tails.boum.org/contribute/working_together/ and
https://tails.boum.org/contribute/release_schedule/

Infrastructure
==

Our own APT repository `deb.tails.boum.org` has gone live on the 24th.
This already enables us to use big custom packages (Iceweasel). In the
mid-term, we will be able to remove binary packages from our main Git
repository. And on the long run, this will enable more control over our
freezes, as well as proper source distribution.

In order to get commit announcements back on IRC, we have setup an
instance of GitBot on `#tails-dev`. Unfortunately, this did not work as
expected, and `repo.or.cz` admins explained us that they do not support
commit notifications for mirror projects. Next steps are left to be
determined.
https://tails.boum.org/todo/find_another_irc_commit_bot/

On-going discussions


Is there any advantage in faking user agent in tordate?
https://mailman.boum.org/pipermail/tails-dev/2012-October/001732.html

How about authenticated NTP?
https://mailman.boum.org/pipermail/tails-dev/2012-October/001743.html

Mockups for a revamped Tails Greeter, resulting in several comments.
https://mailman.boum.org/pipermail/tails-dev/2012-October/001781.html

Alan should be taking over maintainance of the Metadata Anonymization
Toolkit.
https://mailman.boum.org/pipermail/tails-dev/2012-October/001789.html

Is Tails interested in some boot scripts from Whonix?
https://mailman.boum.org/pipermail/tails-dev/2012-October/001803.html

Tails website license?
https://mailman.boum.org/pipermail/tails-dev/2012-October/001805.html

Which Pidgin protocols should be considered safe?
https://mailman.boum.org/pipermail/tails-dev/2012-October/001830.html

Dependencies between persistence options.
https://mailman.boum.org/pipermail/tails-dev/2012-October/001887.html

Block/unblock wireless devices at boot time?
https://mailman.boum.org/pipermail/tails-dev/2012-October/001753.html

Disable FireWire et al. at boot time?
https://mailman.boum.org/pipermail/tails-dev/2012-October/001847.html

Tests of two-layered virtualized systems.
https://mailman.boum.org/pipermail/tails-dev/2012-October/001950.html

Funding
===

Unfortunately, sponsor Bravo is not able to fund as much as promised
earlier. There might still be funds for some hardware. We'll see how it
goes.

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for September, 2012

2012-10-05 Thread Tails folks
/pipermail/tails-dev/2012-September/001671.html

What should be the default web browser homepage?
https://mailman.boum.org/pipermail/tails-dev/2012-September/001672.html

Documentation and website
=

The documentation has received several small improvements in the
following areas:

 * List what can be done when Tails does not start.
 * Better phrasing of the disclaimer about TrueCrypt.
 * Adjust TrueCrypt documentation for the current boot menu.
 * Specify what happens to the persistent volume when using
   the clone option of the installer.
 * Be more explicit of what should be done after installing
   Tails.
 * Link more appropriately the Torrent OpenPGP signature.

An important amount of (still invisible) work has been done to replace
the forum with a QA-style (like StackOverflow) web application that
would suit our needs (and possibly the Tor project's ones -- we'll see).

Translations


The French translations has received a sturdy stream of updates.

The website is currently at:

 * FR: 79% translated, 1% fuzzy
 * PT: 50% translated, 1% fuzzy
 * ES: 28% translated, 3% fuzzy
 * DE: 13% translated, 1% fuzzy

Infrastructure
==

The `tails::whisperback::relay` Puppet class was brought into working
state. This allowed us to setup additional WhisperBack relays:
fail-over should now ensure bug reporting is possible most of
the time. See Git repository at:
git://webmasters.boum.org/tails-puppet-module-tails

The server that will be dedicated to Tails development needs was
delivered and plugged in the SeaCCP colocation. Many thanks to our
friends at Riseup, who helped a lot through the whole process, and to
the Tor project, who supports us once again by funding the
server hosting! Debian Wheezy was installed.

A Redmine install was setup at Riseup Labs to allow us to evaluate it.
Thanks a lot, again!

Funding
===

The discussions with sponsor Bravo are going well. It's likely that
around 20 days of work for two developers will be funded by
the end of November.

--
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev