[Tails-dev] Tails report for June and July, 2014

2014-08-08 Thread Tails folks
igned a Firefox extension to download and automatically verify a
Tails ISO image.
  - Drafted a design document about random numbers in Tails.
  - Decided on a roadmap for our UX work.
  - Brainstormed on a future structure for our website and homepage.

Press & Testimonials


* 2014-07-26: Tails 1.1 is announced, in French, in an article by
  pamputt on LinuxFr
  http://linuxfr.org/news/tails-1-1-est-disponible
* 2014-07: I2P bug and zero-days buzz:
  - 2014-07-21: Exodus Intelligence tweets about multiple
RCE/de-anonymization zero-days on the day before Tails 1.1 is released.
https://twitter.com/ExodusIntel/status/491247299054428160
  - Several news websites relay that information before the details of
the vulnerability are disclosed:
- Exploit Dealer: Snowden's Favorite OS Tails Has Zero-Day
  Vulnerabilities Lurking Inside by Thomas Brewster on Forbes.

http://www.forbes.com/sites/thomasbrewster/2014/07/21/exploit-dealer-snowdens-favourite-os-tails-has-zero-day-vulnerabilities-lurking-inside/

- Don't look, Snowden: Security biz chases Tails with zero-day flaws
  alert by Iain Thomson on The Register.

http://www.theregister.co.uk/2014/07/21/security_researchers_chase_tails_with_zeroday_flaw_disclosure/
- The world's most secure OS may have a serious problem by Russell
  Brandom on The Verge

http://www.theverge.com/2014/7/22/5927917/the-worlds-most-secure-os-may-have-a-serious-problem
  - 2014-07-23: We made our users aware of that process.
https://tails.boum.org/news/On_0days_exploits_and_disclosure/
  - 2014-07-23: Exodus Intelligence publishes [Silver Bullets and Fairy
Tails to explain the vulnerability.
http://blog.exodusintel.com/2014/07/23/silverbullets_and_fairytails/
  - 2014-07-25: We publish a security advisory explaining the scope of
the problem, and temporary solutions.
https://tails.boum.org/security/Security_hole_in_I2P_0.9.13/
* 2014-07-08: In the July 8th Keiser Report on RT.
  The Tails related part of the Keiser Report starts at 15'40".
  http://rt.com/shows/keiser-report/170908-episode-max-keiser-624/
* 2014-07-03: Tails above the Rest by Kyle Rankin in the Linux Journal:
  - Installation
http://www.linuxjournal.com/content/tails-above-rest-installation
  - Part II
http://www.linuxjournal.com/content/tails-above-rest-part-ii
  - Part III
http://www.linuxjournal.com/content/tails-above-rest-part-iii
* 2014-07-03: Some articles on Tails users being targeted by NSA XKeyscore:
  - In NSA targets the privacy-conscious by J. Appelbaum, A. Gibson,
J. Goetz, V. Kabisch, L. Kampf, L. Ryge.
http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html
  - In Von der NSA als Extremist gebrandmarkt by  Lena Kampf,
Jacob Appelbaum and John Goetz (in German).
http://www.tagesschau.de/inland/nsa-xkeyscore-100.html
  - In "If you read Boing Boing, the NSA considers you a target for deep
surveillance" by Cory Doctorow.
http://boingboing.net/2014/07/03/if-you-read-boing-boing-the-n.html
  - In TOR, logiciel-clé de protection de la vie privée, dans le viseur
de la NSA by Martin Untersinger on LeMonde.fr (in French).

http://www.lemonde.fr/pixels/article/2014/07/03/un-logiciel-cle-de-protection-de-la-vie-privee-dans-le-viseur-de-la-nsa_4450718_4408996.html
* 2014-06-25: Dai segreti di Snowden ai social: il raduno italiano degli
hacker by Andrea Rinaldi, in Corriere di Bologna (in Italian).
http://corrieredibologna.corriere.it/bologna/notizie/cronaca/2014/25-giugno-2014/dai-segreti-snowden-social-raduno-italiano-hacker-223459532934.shtml
* 2014-06-30: Tails, il sistema operativo incognito che frega l'NSA by
Carola Frediani, in Wired.it (in Italian).
http://www.wired.it/gadget/computer/2014/04/15/tails-sistema-operativo-incognito/

-- 
Tails folks

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] Tails report for May, 2014

2014-06-13 Thread Tails folks
der.com/story/Snowdens-Beloved-Tails-OS-Reaches-v10-Milestone-80386.html

-- 
Tails folks
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] Tails report for April, 2014

2014-05-09 Thread Tails folks
 secure computer you’ll ever own by
  Russell Brandom, in The Verge.

http://www.theverge.com/2014/4/29/5664884/this-is-the-most-secure-computer-you-ll-ever-own

* 2014-04-23: Amaelle Guiton mentions Tails in the article [Chiffrer le
  Net pour retrouver notre vie privée en ligne: une bonne solution qui
  pose des problèmes in Slate (in French).

http://www.slate.fr/monde/86275/cyberespace-cypherspace-crypter-chiffrement-internet

* 2014-04-17: Bruce Schneier writes "Nice article on the Tails
  stateless operating system. I use it." in a blog post.

https://www.schneier.com/blog/archives/2014/04/tails.html

* 2014-04-14: In the press conference
  she held after winning a Polk Award for her reporting on Edward
  Snowden and the NSA, Laura Poitras said "We just published a blog
  about a tool that's called Tails, which is a operating system that
  runs on either USB stick or SD disc, that is a sort of all-in-one
  encryption tool that you can use for PGP and encryption. And it's
  just really secure. [...] So, it's a really important tool for
  journalists."

http://www.democracynow.org/blog/2014/4/11/video_glenn_greenwald_laura_poitras_q

* 2014-04-14: Out in the Open: Inside the Operating System Edward
  Snowden Used to Evade the NSA by Klint Finley, in Wired.

http://www.wired.com/2014/04/tails/

* 2014-04-02: In Help Support the Little-Known Privacy Tool That Has
  Been Critical to Journalists Reporting on the
  NSA by Trevor Timm:

https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa

  - Laura Poitras says: "I've been reluctant to go into details about
the different steps I took to communicate securely with Snowden to
avoid those methods being targeted. Now that Tails gives a green
light, I can say it has been an essential tool for reporting the
NSA story. It is an all-in-one secure digital communication system
(GPG email, OTR chat, Tor web browser, encrypted storage) that is
small enough to swallow. I'm very thankful to the Tails developers
for building this tool."
  - Glenn Greenwald says: "Tails have been vital to my ability to work
securely on the NSA story. The more I've come to learn about
communications security, the more central Tails has become to
my approach."
  - Barton Gellman says: "Privacy and encryption work, but it's too
easy to make a mistake that exposes you. Tails puts the essential
tools in one place, with a design that makes it hard to screw them
    up. I could not have talked to Edward Snowden without this kind of
protection. I wish I'd had it years ago."

-- 
Tails folks
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] Tails report for March, 2014

2014-04-12 Thread Tails folks
efox

https://mailman.boum.org/pipermail/tails-dev/2014-March/005186.html

- Feedback wanted on planned implementation of Feature #5301 - Clone or
Backup Persistent Volume

https://mailman.boum.org/pipermail/tails-dev/2014-March/005225.html

- Testing EHLO messages: simplification proposal

https://mailman.boum.org/pipermail/tails-dev/2014-March/005227.html

- Perspectives for 0.23..1.1

https://mailman.boum.org/pipermail/tails-dev/2014-March/005234.html

- Upgrading the Linux kernel for 1.0?

https://mailman.boum.org/pipermail/tails-dev/2014-March/005237.html

- Review of https://tails.boum.org/contribute/ about restructuring the
links on the Contribute page

https://mailman.boum.org/pipermail/tails-dev/2014-March/005298.html

- More tails.boum.org HTTP response headers?

https://mailman.boum.org/pipermail/tails-dev/2014-March/005278.html

Funding
===

- We were awarded the Access Innovation Prize.

https://www.accessnow.org/prize
https://twitter.com/accessnow/status/441043400708857856

- We submitted a proposal to the Knight Foundation News Challenge.

https://www.newschallenge.org/challenge/2014/submissions/improve-tails-to-limit-the-impact-of-security-flaws-isolate-critical-applications-and-provide-same-day-security-updates

- The crowdfunding campaign by the Freedom of the Press Foundation was
extended and revived thanks to  some new articles by Trevor Timm.

https://pressfreedomfoundation.org/
https://pressfreedomfoundation.org/blog/2014/02/why-its-vital-public-fund-open-source-encryption-tools
https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa

- We applied to be audited through the OpenITP Peer Review Board.

https://prb.openitp.org

- We are still the process of signing the contract for a grant we were
awarded by OpenITP at the end of 2013.

Outreach


- We organized a logo contest to have a new logo in time for Tails 1.0.
We received 36 proposals Tails contributors started to vote on their
favourite proposals.

https://tails.boum.org/news/logo_contest/index.en.html
https://tails.boum.org/blueprint/logo/

- We scheduled two usability testing sessions together with Silicon
Sentier on May 21 and May 28 in Paris.

http://siliconsentier.org/

- We scheduled a public hackfest. It will take place at IRILL Paris,
France on July 5 and 6.

http://www.irill.org/

- We made progress on the organization of the 2014 edition of the yearly
Tails contributors summit. We could make use of more funding sources.

Press and testimonials
==

* 2014-03-17: In Index Freedom of Expression Awards: Digital activism
nominee Tails, Alice Kirkland interviews the Tails project about our
nomination for the *Censorship’s Freedom of Expression Awards*.

http://www.indexoncensorship.org/2014/03/index-freedom-expression-awards-digital-activism-nominee-tails/

* 2014-03-13: In his Les 7 clés pour protéger ses communications article
(in French) published by the *Tribune de Genève*, Simon Koch recommends
using Tails.

http://www.tdg.ch/high-tech/web/Les-7-cles-pour-proteger-ses-communications/story/25588689

* 2014-03-12: In his [Happy 25th Birthday World Wide Web - Let's Not
Destroy It article published by the Huffington Post, Mike Harris writes
that "Increasing numbers of activists are using high-tech tools such as
Tor or Tails to encrypt their internet browsing and email".

http://www.huffingtonpost.co.uk/mike-harris/world-wide-web_b_4947687.html?utm_hp_ref=uk

* 2014-03-12: In his US and UK Spy Agencies Are "Enemies of the
Internet" article, published in the Motherboard section of the Vice
network, Joseph Cox covers Reporters Without Borders' latest report, and
writes "If you're a journalist working on anything more sensitive than
London Fashion Week or League 2 football, you might want to consider
using the Linux-based 'Tails' operating system too."

http://motherboard.vice.com/read/us-and-uk-spy-agencies-are-enemies-of-the-internet
https://en.rsf.org/enemies-of-the-internet-2014-11-03-2014,45985.html

* 2014-03-08: Reporters Without Borders's Grégoire Pouget blogs about
Tails: FIC 2014 : Comment être réellement anonyme sur Internet (in French).

http://en.rsf.org/
http://blog.barbayellow.com/2014/03/08/fic-2014-comment-etre-reellement-anonyme-sur-internet/

* 2014-03-03: In the March edition of the Linux Journal, that celebrates
20 years of this journal, Kyle demonstrates Tails.

http://www.linuxjournal.com/content/march-2014-issue-linux-journal-20-years-linux-journal

-- 
Tails folks

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] Tails report for February, 2014

2014-03-05 Thread Tails folks
o Fund
Open-Source Encryption Tools Trevor Timm from Freedom of the Press
Foundation explains that Tails « has been vital for most, if not all, of
the NSA journalists. [...] Its prime use case is journalists trying to
communicate or work in environments in which they may normally be at
risk or compromised. The NSA stories have been the biggest story in
journalism in the past decade, yet the tool the reporters rely on is
incredibly underfunded, is maintained by only a handful of developers,
and operates on a shoestring budget. »

<https://pressfreedomfoundation.org/blog/2014/02/why-its-vital-public-fund-open-source-encryption-tools>

* 2014-02-07: In his review of uVirtus, Kheops, from Telecomix concludes
that « Users should prefer Tails and other mature secure live
distributions (such as IprediaOS, Liberté Linux, Privatix and Whonix)
over uVirtus since they provide a real safety improvement to the user.
For any activity that does not entail transferring large quantities of
data (such as video files), there is no strong reason to prefer uVirtus
over any of these. »

<http://uvirtus.org/>

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] Tails contributors meeting: Wednesday, March 5

2014-02-20 Thread Tails folks
Hi,

The next public Tails developers meeting is scheduled for

Wednesday, March 5, on #tails-dev (OFTC) 9pm UTC (10pm CET)

Every one interested in contributing to Tails is welcome.

Redmine tickets we could discuss:

  * #6245: MD5 Reborned Hasher is incompatible with Firefox 20
https://labs.riseup.net/code/issues/6245

  * #6679: Do not auto-connect to the #tor IRC channel
https://labs.riseup.net/code/issues/6679

Usual topics on the agenda are:

  * Volunteers to handle broken windows this month?
https://labs.riseup.net/code/projects/tails/roadmap#Broken%20window

  * Planning a monthly low-hanging fruits or review'n'merge meeting?
Low-hanging fruits meeting: spend a while together on many small
tasks that take less than 2 hours each, and are waiting in our TODO
list for too long.

Feel free to propose and prepare other discussion topics. Please raise
them in this thread so that others can ask details and prepare the
discussion too.

If you want to get involved but don't know how yet, please consider
coming and say hello during the meeting: this work meeting probably
won't be the most adequate time and place to properly introduce
newcomers to the development process, but at least it should be a fine
place to tell us you're interested, and possibly to schedule a better
suited event.

Cheers.
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Tails report for December 2013

2014-01-10 Thread Tails folks
sues/5959
https://labs.riseup.net/code/issues/5465
https://labs.riseup.net/code/issues/6544

- Our automated test suite was partially ported to the
  feature/wheezy branch.

https://git-tails.immerda.ch/tails/log/?h=feature/wheezy

Build system


- Thanks to David Wolinsky and others, our Vagrant setup
  was updated to work with newer Vagrant, and
  the corresponding basebox updated to include up-to-date Debian
  archive keys. While we were at it, a few lurking bugs were fixed.

https://git-tails.immerda.ch/tails/log/?h=bugfix/6221-support-newer-vagrant
https://labs.riseup.net/code/issues/6221

- Thanks to WinterFairy, it is now easy to import translations from
  Transifex into our various Git repositories.

https://git-tails.immerda.ch/winterfairy/tails/log/?h=feature/import-translations-extern

On-going discussions


- Tor Browser branding in Tails?

https://mailman.boum.org/pipermail/tails-dev/2013-December/004362.html

- Risks of enabled/disabled TCP timestamps?

https://mailman.boum.org/pipermail/tails-dev/2013-December/004520.html
https://labs.riseup.net/code/issues/6579

Funding
===

- The Freedom of the Press Foundation launched a campaign to support
  encryption tools for journalists. Tails is among
  the projects this campaign gathers fund for.

https://pressfreedomfoundation.org/

- The proposal we have sent to sponsor Echo was accepted.
- Our grant proposal with sponsor Charlie was rejected.
- We are slowly making progress on our grant proposal with
  sponsor Golf.
- We have almost completed a proposal to be sent to sponsor Lima.
- Our contract with sponsor Bravo is now finished.
- Tails will soon accept donations in currencies other than Bitcoin.
- We are now very likely to create a non-profit organization dedicated
  to Tails.
- We have almost wrapped-up our bounties program. A report will be
  published soonish.

Outreach


Tails participated in the 30th Chaos Communication Congress. It was
a great opportunity to meet, in person, a few existing and new
contributors, as well as many people we are working with.

https://events.ccc.de/congress/2013/wiki/Main_Page

A self-organized event called *Tails needs your help* was organized.
It was a success considering the late notice.

https://tails.boum.org/promote/slides/2013-12-29_-_Tails_needs_your_help.shtml

See you next year, probably with more space and events dedicated
to Tails!

Press and testimonials
==

* 2013-12: Bruce Schneier answered to someone asking him what Linux
  distribution is its favorite: "I don't use Linux. (Shhh. Don't tell
  anyone.) Although I have started using Tails".

http://www.reddit.com/r/IAmA/comments/1r8ibh/iama_security_technologist_and_author_bruce/cdknf7a

* 2013-12-12: In A conversation with Bruce Schneier,
  as part of the "Snowden, the NSA and free software" cycle at
  Columbia Law School NYC, Bruce Schneier says:
  - "I think most of the public domain privacy tools are going to be
safe, yes. I think GPG is going to be safe. I think OTR is going
to be safe. I think that Tails is going to be safe. I do think
that these systems, because they were not -- you know, the NSA has
a big lever when a tool is written closed-source by a for-profit
corporation. There are levers they have that they don't have in
the open source international, altruistic community. And these are
generally written by crypto-paranoids, they're pretty well
designed. We make mistakes, but we find them and we correct them,
and we're getting good at that. I think that if the NSA is going
after these tools, they're going after implementations."
  - "What do I trust? I trust, I trust Tails, I trust GPG [...]"
  - "We can make it harder, we can make it more expensive, we can make
it more risky. And yes, every time we do something to increase one
of those, we're making ourselves safer. [...] There are tools we
are deploying in countries all over the world, that are keeping
people alive. Tor is one of them. I mean, Tor saves lives. [...]
And every time you use Tor [...] provides cover for everyone else
who uses Tor [...]"

http://boingboing.net/2013/12/15/bruce-schneier-and-eben-moglen-2.html

* Jacob Appelbaum stated at the Chaos Communication
  Congress:
  "if you are a journalist and you are not using Tails, you should
  probably be using Tails, unless you *really* know what
  you're doing".

https://events.ccc.de/congress/2013/Fahrplan/events/5713.html


-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for November, 2013

2013-12-11 Thread Tails folks
o get a certificate for `dl.amnesia.boum.org`.

On-going discussions


- 2.0 milestone += supporting USB devices exposed as non-removable?

https://mailman.boum.org/pipermail/tails-dev/2013-November/003999.html

- Tor Launcher extension

https://mailman.boum.org/pipermail/tails-dev/2013-November/004011.html

- WhisperBack launcher should give a hint on its use

https://mailman.boum.org/pipermail/tails-dev/2013-November/004295.html

- Glossary for contributors

https://mailman.boum.org/pipermail/tails-dev/2013-November/004353.html

Funding
===

- ThinkPenguin.com donated hardware for us to investigate on UEFI
support. Many thanks!

- We have been working on a proposal with sponsor Golf.

Outreach


- We submitted a talk for 30C3 but it was rejected.

- 2013-11-28: Helping Human Rights Defenders to Communicate Securely:
  TAILS, National Democratic Institute, USA at the World Forum for
  Democracy

http://www.coe.int/en/web/world-forum-democracy/lab4_

Press and testimonials
==

- 2013-11: The German-speaking ADMIN magazine reviews Tails.

http://www.admin-magazin.de/Das-Heft/2013/11/Tails-0.20

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails contributors meeting: Wednesday, December 5

2013-11-27 Thread Tails folks
Hi,

The next public Tails developers meeting is scheduled for

December 5, on #tails-dev (OFTC) at 8pm UTC (10pm CEST).

Everyone interested in contributing to Tails is welcome.

Topics currently on the agenda are:

  * Volunteers to handle broken windows this month?
https://labs.riseup.net/code/projects/tails/roadmap#Broken%20window

  * Planning a monthly low-hanging fruits or review'n'merge meeting?
Low-hanging fruits meeting: spend a while together on many small 
tasks that take less than 2 hours each, and are waiting in our TODO 
list for too long.

Feel free to propose and prepare other discussion topics. Please raise
them in this thread so that others can ask details and prepare the
discussion too.

If you want to get involved but don't know how yet, please consider
coming and say hello during the meeting: this work meeting probably
won't be the most adequate time and place to properly introduce
newcomers to the development process, but at least it should be a fine
place to tell us you're interested, and possibly to schedule a better
suited event.
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for October, 2013

2013-11-09 Thread Tails folks
Tails report for October, 2013

Releases


Tails 0.21 was released on October 29.


Tails 0.22 is scheduled for December 11.


Metrics
===

- Tails has been started more than 189 979 times in October.
  This makes a boot every 14 seconds on average.
- 15 226 downloads of the OpenPGP signature of Tails ISO.
- 86 reports were received through WhisperBack.

Code


- Andres Gomez Ramirez proposed an
  initial patch to warn when caps-lock in on in the Greeter.
  
  
- We had a low-hanging fruits session on October 12 and malaparte
  couldn't stop in the end :)
  
- Some issues were fixed for the migration to Tails Wheezy.
  
- The branch for SD cards support wired via SDIO was merged.
  
- Some initial work to build Tails with vagrant-libvirt was done
  blueprint.
  
- A branch to use stronger ciphers in GnuPG was prepared
  and merged.
- Kevin C. Krinke is working on a clock applet that
  allows displays local time, while keeping UTC as the
  system timezone.
  
- test/fix-detection-of-used-display branch was merged.
- feature/Debian-proposed-updates branch was merged,
  and reverted after the Squeeze point-release was out.
- Tails now uses the same custom Startpage URL as the TBB.
  

- The ikiwiki setup was simplified.
  
- Some fixes to the persistent printers feature were prepared
  and merged.
- A web browser resizing bug was partially fixed
  
  
- Now installing Linux 3.10.x from Debian testing.
  
- The security/vidalia_in_its_own_user branch to run Vidalia as its own
  user was polished and merged. Too bad nobody detected at RC stage the
  regression it brought, that made its way into Tails 0.21. Did we
  mention you should test our release candidates?
- The branch feature/consistent-peristence-path to have a consistent
  path to the persistent volume mountpoint was polished and merged.
  
- The work towards MAC spoofing went on.
- Various regressions detected in 0.21~rc1 were fixed in time for the
  0.21 final release. Not all, unfortunately.
- Some initial work was done towards the migration to Torbutton 1.6.x 
  and Firefox 24
  
  
- A plan was proposed to fix OTR protocol
  downgrade in Debian Squeeze and Wheezy.
- Some build-dependencies for Tails software were uploaded to Debian,
  and accepted:
  libdist-zilla-plugin-test-notabs-perl,
  libdist-zilla-plugin-test-perl-critic-perl and
  libdist-zilla-plugin-installguide-perl.
- An initscript for Tahoe-LAFS has been written.
- killyourtv volunteered to maintain I2P in Tails.
- Incremental updates were worked on.
- bilibop 0.4.17, 0.4.17~bpo70+1, 0.4.18 and 0.4.19 were
  uploaded to Debian.
- mat 0.4-1 and 0.4.2-1 were uploaded to Debian.
- A few patches for AppArmor profiles were submitted upstream.

Documentation and website
=

- The contribute section was significantly improved.
  More is coming.
  
- The bug reporting workflow was improved.
  
- The first round of cleaning the forum is over!
  .
- The Front Desk role was documented.
  
- Public meetings notes are now online.
  
- Drafts were proposed to:
  * point to newbie-friendly Git documentation
  

- Documentation was added to explain:
  * that (almost any) additional software cannot connect without Tor;
   
  * why Tor is slow
   
   
  * how to make Claws Mail persistence cover email retrieved over POP3;
   
  * that OpenPGP keyring can be made persistent



[Tails-dev] Tails report for September, 2013

2013-10-07 Thread Tails folks
<https://mailman.boum.org/pipermail/tails-dev/2013-September/003540.html>

Funding
===

- We finally signed our short-term contract with sponsor Bravo. That
  will keep us very busy until the end of the year, and will address
  some of the stumbling blocks on the road towards Tails 1.0!

- We paid the first bounty of our bounty program. This one automated the
  migration of our ikiwiki tickets to Redmine.
  <https://labs.riseup.net/code/projects/tails/issues?query_id=108>

Press and testimonials
==

- 2013-09-12: In Inside the Effort to Crowdfund NSA-Proof Email and
  Chat Services. by DJ Pangburn, Riseup birds write (about the TBB)
  "Combined with the TAILS project, which Riseup supports, there is
  nothing better."

<http://motherboard.vice.com/blog/inside-the-effort-to-crowdfund-nsa-proof-email-and-chat-services>

- 2013-09-05: In How to remain secure against NSA
  surveillance, Bruce Schneier wrote: "Since I started working with
  Snowden's documents, I have been using GPG, Silent Circle, Tails, OTR,
  TrueCrypt, BleachBit, and a few other things I'm not going to
  write about."

<http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance>

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for August, 2013

2013-09-06 Thread Tails folks
t;https://mailman.boum.org/pipermail/tails-dev/2013-July/003339.html>
  <https://labs.riseup.net/code/issues/6165>

- Jacob Appelbaum started a discussion about Tahoe-LAFS, Tor and
  Tails. It should now be clear what kind of work is needed to make
  some integration possible.
  <https://mailman.boum.org/pipermail/tails-dev/2013-August/003393.html>

- It was suggested to tweak the GnuPG configuration in various ways.
  <https://mailman.boum.org/pipermail/tails-dev/2013-August/003468.html>

- We discussed how to handle divergence of bundled packages due to
  point-releases.
  <https://mailman.boum.org/pipermail/tails-dev/2013-August/003492.html>

Infrastructure
==

- To make our infrastructure more reliable, we are still organizing to
  get a system that will act as a fail-over for our main server.
  <https://labs.riseup.net/code/issues/6185>

- We better shared access to the round-robin DNS that gathers our HTTP
  mirrors. (Many thanks to those who host the mirrors, by the way!)

- We created a bunch of sysadmin tickets as a step towards being able
  to ask for help in this area first, and towards being able to
  actually share the work with the volunteers that will show up once
  we have sent our call for help. Stay tuned!
  <https://labs.riseup.net/code/projects/tails/issues?query_id=113>

Funding
===

- The short-term funding project we have with sponsor Bravo is still
  slowly going through the paperwork stage.

- The bounties program is moving forward (slower than we may have
  hoped, but still).

- We keep working on a funding proposal to be sent to sponsor Foxtrot.

Cheers,
-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails 2013 summit report

2013-08-09 Thread Tails folks
easel**
on startup.

# At the end is the beginning

As you can guess, this summit was as intense as the previous ones.
Tails is living decisive times, so we expect the next year to be
pretty interesting. *You* can perhaps make the difference, so do not
hesitate joining the dance [12]!

[12] https://tails.boum.org/contribute/

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for June, 2013

2013-07-04 Thread Tails folks
Hi,

here is Tails report for June, 2013.

Releases


Tails 0.19 was released on June 26.
<https://tails.boum.org/news/version_0.19/>

Metrics
===

- 140 517 connections of Tails to the Tor network. This makes a boot
  every 18.5 seconds on average (this is an approximation from the
  requests made to the security announcements feed when Tails is
  connected to Tor).

- 66 non-empty bug reports were received through WhisperBack.

- 110 comments were posted on the forum, with 32 signed by Tails,
  before we closed it.

Code


- Tails was upgraded to Linux 3.9.
  <https://git-tails.immerda.ch/tails/log/?h=feature/linux-3.9>

- The feature/set-wireless-devices-state branch was
  merged, eventually.
  <https://git-tails.immerda.ch/tails/log/?h=feature/set-wireless-devices-state>

- We tried to get in touch with the WiNoN developers. No reply so far.

- Many branches were merged just in time for the 0.19 freeze.

- Two serious bugs ere discovered while testing 0.19~rc1, and fixed
  for 0.19 final. This reinforces our conviction that we should run
  our test suite automatically as soon as possible.
  <https://git-tails.immerda.ch/tails/log/?h=bugfix/no_passwordless_sudo>
  
<https://git-tails.immerda.ch/tails/log/?h=bugfix/buggy_aufs_vs_unsafe-browser_workaround>

- Some solutions to get rid of the JRuby messwere experimented with.
  <https://tails.boum.org/todo/test_suite:_getting_rid_of_the_jruby_mess/>

- Access restriction to ptrace was updated for the upcoming
  Debian kernel.
  <https://git-tails.immerda.ch/tails/log/?h=feature/restrict-access-to-ptrace>

- The Iceweasel warning when leaving HTTPS was disabled. Thanks to
  winterfairy for the initial patch.
  
<https://git-tails.immerda.ch/tails/log/?h=bugfix/dont-warn-when-leaving-https>

- The wrong search engine bug was fixed.
  <https://tails.boum.org/todo/fix_localized_iceweasel_search_engine/>
  
<https://git-tails.immerda.ch/tails/log/?h=bugfix/localized-iceweasel-search-engine>

- Git over HTTPS was fixed.
  <https://git-tails.immerda.ch/tails/log/?h=bugfix/git-https>

- All Pidgin protocols but IRC and Jabber/XMPP were disabled.
  <https://git-tails.immerda.ch/tails/log/?h=feature/less-pidgin-code>

- The WhisperBack help was partly updated.
  <https://git-tails.immerda.ch/tails/log/?h=feature/update_whisperback_help>

- Information about Alsa was added to WhisperBack reports.
  <https://git-tails.immerda.ch/tails/log/?h=feature/alsa-info-in-bug-reports>

- The "remember additional packages" feature was adapted to work with
  newer live-boot.
  <https://git-tails.immerda.ch/tails/log/?h=bugfix/new_persistence_location>

Documentation and Website
=

- We closed the forum.
  <https://tails.boum.org/forum/>

- We decided not to follow Tor to StackExchange yet. We need more time
  to decide what we will do, now that our previously preferred option
  was discarded.

- The release process was automated a bit. So was our custom Iceweasel
  package release process.

Localization and Internationalization
=

- Our POT files were merged first, and then we intltoolize'd our
  translation system. This should help pushing these strings to
  Transifex.
  <https://git-tails.immerda.ch/tails/log/?h=feature/merge-pot-files>
  <https://git-tails.immerda.ch/tails/log/?h=feature/intltoolize>

On-going discussions


- Flashproxy
  <https://mailman.boum.org/pipermail/tails-dev/2013-June/003121.html>

- Accessibility for blind and visually impaired users
  <https://mailman.boum.org/pipermail/tails-dev/2013-June/003135.html>

- Making the boot medium read-only
  <https://mailman.boum.org/pipermail/tails-dev/2013-June/003139.html>

- Wrong MIME type returned for ISO signatures
  <https://mailman.boum.org/pipermail/tails-dev/2013-June/003200.html>

- Download over HTTP by default?
  <https://mailman.boum.org/pipermail/tails-dev/2013-June/003211.html>

- Network fingerprint
  <https://mailman.boum.org/pipermail/tails-dev/2013-June/003216.html>

Infrastructure
==

- Our Git repositories are now allhosted in a central place.
  Thanks a lot to immerda.ch for their continued support!
  <https://git-tails.immerda.ch/>
  <https://tails.boum.org/contribute/git/>

- We worked on improving backups for our infrastructure.

Funding
===

- We kept working on funding with sponsor Foxtrot.

- We are working on short-term funding with sponsor Bravo.

- The way we will contract bounty hunters was rebooted. Stay tuned.

Cheers,
-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for May, 2013

2013-06-07 Thread Tails folks
Hi,

here's the Tails report for May, 2013.

Releases


Tails 0.18 was released on May 18:
https://tails.boum.org/news/version_0.18/

Metrics
===

  - 128 676 connections of Tails to the Tor network. This makes a boot
every 21 seconds on average (this is an approximation from the
requests made to the security announcements feed when Tails is
connected to Tor).

  - 51 non-empty bug reports were received through WhisperBack.

  - 630 comments were posted on the forum, with 143 signed by Tails.

Code


- We had a "low-hanging fruits" session on May 22, that was attended
  by three persons.

  https://mailman.boum.org/pipermail/tails-dev/2013-May/003076.html

- Some important bugs were fixed in tails-greeter, thanks
  to winterfairy!

  http://git.immerda.ch/?p=tails/tails-greeter.git;a=summary

- A branch to install Linux 3.8 was developed and merged. It triggered
  a bug in the Persistent Volume Assistant, that was fixed.

  http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/linux-3.8
  
http://git.immerda.ch/?p=tails/persistence-setup.git;a=commit;h=c94d7432e649ff9b7974559b28b881ddf89f3ed0

- The automatic re-installation of additional software packages
  feature was improved.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/remember_installed_packages

- live-boot 3.x final is now installed, and the old compatibility
  symlinks were removed. Same for live-config 3.x final.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/live-boot_3.0_final
  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/remove_live-boot_compatibility_symlinks
  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/live-config_3.0_final

- A bug that made it a pain to use our OpenPGP applet was
  partially fixed.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/gpgapplet_do_not_erase_clipboard

- More work was done to remove GNOME proxy settings.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/remove_gnome_proxy_settings

- A branch to update virt-what was proposed.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/newer_virt-what

- A branch to use bilibop was proposed.

  http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/bilibop

- Some preliminary work was done to get our nice custom boot splash
  screen back.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/tails-plymouth-theme

- A smtube backport was prepared.

  http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/smtube

- Some post-Wheezy work was done.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/wheezy-security_APT_source
  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/post-wheezy_pinning

- More precise plans were drawn about the future of tails-greeter.

  https://mailman.boum.org/pipermail/tails-dev/2013-May/003099.html

- Various TBB settings were imported.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/torbrowser

Documentation and Website
=

- The end-user documentation about
  `feature/set-wireless-devices-state' was reviewed and improved.

  
http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/set-wireless-devices-state

- The Tails specification and design document received various minor
  updates and improvements, as did the release process documentation.

  https://tails.boum.org/contribute/design/

- Tons of old forum posts were cleaned up, as part of our effort to
  import valuable existing knowledge from there into the upcoming
  Q&A website.

On-going discussions


- We've discussed inclusion of Martus in Tails.

- Deanonymization potential by the desktop user.

  https://mailman.boum.org/pipermail/tails-dev/2013-May/003078.html

- Adding support for keeping entry guards.

  https://mailman.boum.org/pipermail/tails-dev/2013-May/003111.html

- Removing Iceweasel popups that confuse (some) users

  https://mailman.boum.org/pipermail/tails-dev/2013-May/003109.html

Infrastructure
==

Various bits were updated to reflect the fact that Debian Wheezy
was released.

Funding
===

- We went on working on a grant application for more long-term
  funding with sponsor Foxtrot.

- Draft contracts were sent to the bounties candidates. Some have
  started working on their bounty!

Cheers,
-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for April, 2013

2013-05-11 Thread Tails folks
mail/tails-dev/2013-April/002877.html

- "GNOME proxy settings, again", about dropping all GNOME proxy settings

  https://mailman.boum.org/pipermail/tails-dev/2013-April/002853.html


Infrastructure
==

- Tails 0.17.2 was the first release assisted with automated tests!
  - Cucumber is used to describe the tests to perform.
  - 82 tests have been written so far

- Huge progress was made on our automatic building infrastructure, based
  on Jenkins.

  https://mailman.boum.org/pipermail/tails-dev/2013-April/002902.html


Funding
===

- The grant application we did with OpenITP (Sponsor Echo) was rejected.
  But our proposal made it to their finalist set.


http://openitp.org/?q=openitp_first_round_of_2013_project_funding_now_open_for_proposals

- We started to work on another grant application for more long-term
  funding with sponsor Foxtrot.

- The list of bounties that are going to be funded through the Tor
  project program is closed. It will be made public soon.

-- 
Tails folks

___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for March, 2013

2013-04-04 Thread Tails folks
2013-March/002747.html
  https://mailman.boum.org/pipermail/tails-dev/2013-March/002748.html

- A discussion about the process to contribute to the documentation
  clarified why the current process works the way it does, and
  resulted in a good compromise to be found.

  https://mailman.boum.org/pipermail/tails-dev/2013-March/002751.html

- We started discussing with GDM developers if and how they intend to
  support the custom greeter usecase that we depend on.

  https://mailman.boum.org/pipermail/tails-dev/2013-March/002813.html

- We decided not to include a text web browser in Tails.

  https://mailman.boum.org/pipermail/tails-dev/2013-March/002794.html

Infrastructure
==

- Some work was put into foundations we need to set up Jenkins for our
  needs, mainly on the Puppet modules side (e.g. code for safely
  installing Jenkins plugins from the web, an improved Puppet module
  to manage Jenkins).

- A VM to automatically build Tails was created, and the Puppet code
  that describes its initial setup was written.

- We have setup a Debian package builder based on debomatic
  (https://launchpad.net/debomatic). It still has some rough edges,
  but seems to basically do its job.

- The nice folks at immerda (https://www.immerda.ch/) have setup most
  of what's needed to host all our Git repositories in the same place,
  in a way that makes it convenient for us to create new repositories,
  manage access to it, and reintroduce IRC commit notifications.
  Thanks!

Funding
===

- Tails now accepts Bitcoin donations.

  https://tails.boum.org/contribute/how/donate

- We will soon close the budget for our bounties program. Teaser:
  a handful of great programs, that are useful to Tails, will see some
  bonus activity in the next few months!

- We have filed a grant application that answers Sponsor Echo's call
  for proposals.

Cheers,
-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for February, 2013

2013-03-10 Thread Tails folks
l Pidgin accounts by default [27]

22: https://mailman.boum.org/pipermail/tails-dev/2013-February/002610.html
23: https://mailman.boum.org/listinfo/mat-dev
24: https://mailman.boum.org/pipermail/tails-dev/2013-February/002652.html
25: https://mailman.boum.org/pipermail/tails-dev/2013-February/002651.html
26: https://mailman.boum.org/pipermail/tails-dev/2013-February/002653.html
27: https://mailman.boum.org/pipermail/tails-dev/2013-February/002654.html

Infrastructure
==

Quite some work was done on a new dedicated server of ours, called
lizard:

- Various stuff that's customary for a virtualization host, like
  a local APT proxy and a Puppet master, was setup.
- Our APT repository was migrated to lizard [28]. Our primary
  (private) rsync server, too [29].
- We now run a BitTorrent seed on lizard [30].
- We now run another WhisperBack relay on lizard [31].
- We now run bitcoind [32] on lizard.
- Our Puppet modules are now hosted on lizard. Some are already
  publicly available [33], but there's a bit of boring
  work left to publish the others [34]. We're happy to share with nice
  people [35] the development and maintenance of most of the modules we
  use.
- A VM was setup to run Jenkins, that should some day be an important
  part of automated_builds_and_tests [36].

28: https://tails.boum.org/todo/migrate_APT_repository_to_lizard/
29: https://tails.boum.org/todo/migrate_primary_rsync_server_to_lizard/
30: https://tails.boum.org/todo/run_a_BitTorrent_seed_on_lizard/
31: https://tails.boum.org/todo/run_another_WhisperBack_relay_on_lizard/
32: http://packages.debian.org/bitcoind
33: https://tails.boum.org/contribute/git/
34: https://tails.boum.org/todo/publish_our_Puppet_modules/
35: https://labs.riseup.net/code/projects/sharedpuppetmodules
36: https://tails.boum.org/todo/automated_builds_and_tests/

Funding
===

We have been working on starting our bounties program.

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for January, 2013

2013-02-09 Thread Tails folks
faults regarding MAC
address changing:
<https://mailman.boum.org/pipermail/tails-dev/2013-January/002495.html>.

Funding
===

We have filed a grant application with Sponsor Bravo.

Our upcoming bounties program is being organized.

Cheers!
-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for December, 2012

2013-01-09 Thread Tails folks

Releases


Tails 0.16~rc1 was released on December 14th.
<https://tails.boum.org/news/test_0.16~rc1z>

The Tails 0.16 release is scheduled for the first half of January.

People
==

We received 66 reports through Whisperback.

The forum activity has been steadily high:
1128 messages, 177 signed by Tails.

Some of us went to 29c3.
<https://events.ccc.de/congress/2012/>

Code


Many dictionaries for supported languages were installed.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/spell-checker>

A bug concerning memlockd was fixed.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/only-one-memlockd>

The regular GnuPG agent was added.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/regular-gnupg-agent>

The automatic update feature of Iceweasel extensions was disabled.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/disable-iceweasel-extensions-auto-update>

The move to using `live-boot` version 3 was worked on.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/live-boot-3.x>

The Minitube Youtube client was installed.
<http://flavio.tordini.org/minitube>
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/minitube>

The Iceweasel Add-on bar was hidden by default.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/just_hide_iceweasel_add-on_bar>

The work on a better power-off button was completed and merged.
<http://git.immerda.ch/?p=amnesia.git;a=commit;h=0217cf30ad95efe798529aadcde952b49976c839>

A bug concerning the `--media` option of live-persist was fixed.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/strict_live-persist_media>

The `~/Persistent` directory was added to the *Places* menu of *GNOME*
and *GtkFileChooser*.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/persistent-directory-in-places>

The `xul-ext-monkeysphere` extension was removed.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/disable-iceweasel-extensions-auto-update>

The *News* section of the website was configured as the homepage of
Iceweasel.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/news-as-homepage>
<https://tails.boum.org/todo/set_iceweasel_homepage_to_Tails_news>

The Entropy Key daemon `ekeyd` was installed.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/disable-iceweasel-extensions-auto-update>

A new version of the MAT was announced.
<https://mat.boum.org/>
<https://mailman.boum.org/pipermail/tails-dev/2012-December/002355.html>

Documentation and website
=

Guidelines for writing documentation for Tails were written.
<https://tails.boum.org/contribute/how/documentation/guidelines>

The documentation of our release process was improved.
<http://git.immerda.ch/?p=amnesia.git;a=commit;h=ef5f98e69e41794abcd8748529d81965d4aa8274>

-- 
Tails folks

___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for October, 2012

2012-12-10 Thread Tails folks
;h=refs/heads/feature/install-password-manager>

A poedit 1.5 backport that fixes a long-standing annoying bug was
prepared and tested.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/poedit-1.5>

Preliminary steps towards installing the Minitube YouTube client were
walked. Many thanks to Alessandro Grassi for starting this effort, and
going on with it!
<https://tails.boum.org/todo/minitube> and
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/minitube>

The `Persistent` directory is now displayed in the Places menu.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/persistent-directory-in-places>

Work has started to set iceweasel homepage to Tails news.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/news-as-homepage>
and
<https://tails.boum.org/todo/set_iceweasel_homepage_to_Tails_news>

Shutdown messages were fixed to talk of DVD, not of CD.
<http://git.immerda.ch/?p=amnesia.git;a=commit;h=ef5d24c144976d3f0b1c0f64b6533c9d304a9b95>

IPv6 was disabled to workaround a recently discovered leak.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/disable-IPv6>
and
<https://tails.boum.org/todo/really_block_ipv6>

Work towards a better power off button is ongoing.
<https://tails.boum.org/todo/better_power_off_button> and
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/better_power_off_button>

obfsproxy support was added.
<https://tails.boum.org/todo/obfsproxy> and
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/obfsproxy>

A number of candidate branches for 0.15 were merged.
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/devel>

Documentation and website
=

The Tails website now has a Press & media information page.
<https://tails.boum.org/press>

The News can now be translated.
<https://tails.boum.org/todo/news> and
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002136.html>

As planned, the website was locked-down a bit more.
<https://tails.boum.org/todo/locking_down_this_website> and
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002234.html>

On-going discussions


Improve Polipo configuration, switch to Privoxy, or drop it all?
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002008.html> and
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002029.html>

Progress report on the automated test suite triggered some discussion.
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002014.html>

Helping adrelanos to proper copyright and licensing practices when
forking Tails documentation pages.
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002054.html>

Testing incremental updates and tails-create-iuk.
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002108.html> and
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002128.html>

Benchmarking Redmine.
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002157.html>

How to implement remembering installed packages?
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002160.html>

Supporting EntropyKey.
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002195.html>

Promoting Persistence features.
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002197.html>

What to do with Liferea Cookies?
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002209.html>

If/How to ship the Minitube native YouTube client?
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002257.html>

What's the safest value to set the time from Tor consensus?
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002228.html>

Stop shipping bugs/* and todo/* in ISO?
<https://mailman.boum.org/pipermail/tails-dev/2012-November/002235.html>

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for October, 2012

2012-11-02 Thread Tails folks
g/todo/replace_or_drop_pdnsd__63__/> and
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/remove-pdnsd>

New progress has been made on Tails automated test suite.
<https://tails.boum.org/todo/automated_builds_and_tests/cucumber/>
<http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/automated_tests/cucumber>

Documentation and website
=

Document the upcoming Network Manager persistence.

Document the new support for public key encryption in the OpenPGP
applet, and generally improve this part of the documentation along the
way.

Fix links to the Universal USB Installer.

Consistently use long GnuPG key ID format in our examples.

Many improvements to French and Portuguese translations.

Documented more of Tails current development process.
<https://tails.boum.org/contribute/working_together/> and
<https://tails.boum.org/contribute/release_schedule/>

Infrastructure
==

Our own APT repository `deb.tails.boum.org` has gone live on the 24th.
This already enables us to use big custom packages (Iceweasel). In the
mid-term, we will be able to remove binary packages from our main Git
repository. And on the long run, this will enable more control over our
freezes, as well as proper source distribution.

In order to get commit announcements back on IRC, we have setup an
instance of GitBot on `#tails-dev`. Unfortunately, this did not work as
expected, and `repo.or.cz` admins explained us that they do not support
commit notifications for mirror projects. Next steps are left to be
determined.
<https://tails.boum.org/todo/find_another_irc_commit_bot/>

On-going discussions


Is there any advantage in faking user agent in tordate?
<https://mailman.boum.org/pipermail/tails-dev/2012-October/001732.html>

How about authenticated NTP?
<https://mailman.boum.org/pipermail/tails-dev/2012-October/001743.html>

Mockups for a revamped Tails Greeter, resulting in several comments.
<https://mailman.boum.org/pipermail/tails-dev/2012-October/001781.html>

Alan should be taking over maintainance of the Metadata Anonymization
Toolkit.
<https://mailman.boum.org/pipermail/tails-dev/2012-October/001789.html>

Is Tails interested in some boot scripts from Whonix?
<https://mailman.boum.org/pipermail/tails-dev/2012-October/001803.html>

Tails website license?
<https://mailman.boum.org/pipermail/tails-dev/2012-October/001805.html>

Which Pidgin protocols should be considered "safe"?
<https://mailman.boum.org/pipermail/tails-dev/2012-October/001830.html>

Dependencies between persistence options.
<https://mailman.boum.org/pipermail/tails-dev/2012-October/001887.html>

Block/unblock wireless devices at boot time?
<https://mailman.boum.org/pipermail/tails-dev/2012-October/001753.html>

Disable FireWire et al. at boot time?
<https://mailman.boum.org/pipermail/tails-dev/2012-October/001847.html>

Tests of two-layered virtualized systems.
<https://mailman.boum.org/pipermail/tails-dev/2012-October/001950.html>

Funding
===

Unfortunately, sponsor Bravo is not able to fund as much as promised
earlier. There might still be funds for some hardware. We'll see how it
goes.

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for September, 2012

2012-10-05 Thread Tails folks
ilman.boum.org/pipermail/tails-dev/2012-September/001644.html>

Should Tails ship a "download manager"?
<https://mailman.boum.org/pipermail/tails-dev/2012-September/001670.html>

Should PCMCIA / ExpressCard / Firewall be deactivated?
<https://mailman.boum.org/pipermail/tails-dev/2012-September/001671.html>

What should be the default web browser homepage?
<https://mailman.boum.org/pipermail/tails-dev/2012-September/001672.html>

Documentation and website
=

The documentation has received several small improvements in the
following areas:

 * List what can be done when Tails does not start.
 * Better phrasing of the disclaimer about TrueCrypt.
 * Adjust TrueCrypt documentation for the current boot menu.
 * Specify what happens to the persistent volume when using
   the clone option of the installer.
 * Be more explicit of what should be done after installing
   Tails.
 * Link more appropriately the Torrent OpenPGP signature.

An important amount of (still invisible) work has been done to replace
the forum with a Q&A-style (like StackOverflow) web application that
would suit our needs (and possibly the Tor project's ones -- we'll see).

Translations


The French translations has received a sturdy stream of updates.

The website is currently at:

 * FR: 79% translated, 1% fuzzy
 * PT: 50% translated, 1% fuzzy
 * ES: 28% translated, 3% fuzzy
 * DE: 13% translated, 1% fuzzy

Infrastructure
==

The `tails::whisperback::relay` Puppet class was brought into working
state. This allowed us to setup additional WhisperBack relays:
fail-over should now ensure bug reporting is possible most of
the time. See Git repository at:


The server that will be dedicated to Tails development needs was
delivered and plugged in the SeaCCP colocation. Many thanks to our
friends at Riseup, who helped a lot through the whole process, and to
the Tor project, who supports us once again by funding the
server hosting! Debian Wheezy was installed.

A Redmine install was setup at Riseup Labs to allow us to evaluate it.
Thanks a lot, again!

Funding
===

The discussions with sponsor Bravo are going well. It's likely that
around 20 days of work for two developers will be funded by
the end of November.

--
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] Tails report for August, 2012

2012-09-06 Thread Tails folks
rs:
<https://tails.boum.org/contribute/how/translate/>

Clarify some steps in the release process. Document better how to
release Tails custom packages:
<https://tails.boum.org/contribute/release_process/>

Update the roadmap page:
<https://tails.boum.org/contribute/roadmap/>

Translations


Some important work was done to translate more of our website to
Portuguese, 16% more of its strings got translated during this month.

We also received many patches for our custom programs in Russian,
Arabic, and Farsi.

Funding
===

We sent a proposal to sponsor Bravo about funding developers for October
and November to work on our user support channels, documentation and
hardware support.

-- 
Tails folks
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev