[Tails-dev] Tails report for May, 2014
-Milestone-80386.html -- Tails folks ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to tails-dev-unsubscr...@boum.org.
[Tails-dev] Tails report for April, 2014
Brandom, in The Verge. http://www.theverge.com/2014/4/29/5664884/this-is-the-most-secure-computer-you-ll-ever-own * 2014-04-23: Amaelle Guiton mentions Tails in the article [Chiffrer le Net pour retrouver notre vie privée en ligne: une bonne solution qui pose des problèmes in Slate (in French). http://www.slate.fr/monde/86275/cyberespace-cypherspace-crypter-chiffrement-internet * 2014-04-17: Bruce Schneier writes Nice article on the Tails stateless operating system. I use it. in a blog post. https://www.schneier.com/blog/archives/2014/04/tails.html * 2014-04-14: In the press conference she held after winning a Polk Award for her reporting on Edward Snowden and the NSA, Laura Poitras said We just published a blog about a tool that's called Tails, which is a operating system that runs on either USB stick or SD disc, that is a sort of all-in-one encryption tool that you can use for PGP and encryption. And it's just really secure. [...] So, it's a really important tool for journalists. http://www.democracynow.org/blog/2014/4/11/video_glenn_greenwald_laura_poitras_q * 2014-04-14: Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA by Klint Finley, in Wired. http://www.wired.com/2014/04/tails/ * 2014-04-02: In Help Support the Little-Known Privacy Tool That Has Been Critical to Journalists Reporting on the NSA by Trevor Timm: https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa - Laura Poitras says: I've been reluctant to go into details about the different steps I took to communicate securely with Snowden to avoid those methods being targeted. Now that Tails gives a green light, I can say it has been an essential tool for reporting the NSA story. It is an all-in-one secure digital communication system (GPG email, OTR chat, Tor web browser, encrypted storage) that is small enough to swallow. I'm very thankful to the Tails developers for building this tool. - Glenn Greenwald says: Tails have been vital to my ability to work securely on the NSA story. The more I've come to learn about communications security, the more central Tails has become to my approach. - Barton Gellman says: Privacy and encryption work, but it's too easy to make a mistake that exposes you. Tails puts the essential tools in one place, with a design that makes it hard to screw them up. I could not have talked to Edward Snowden without this kind of protection. I wish I'd had it years ago. -- Tails folks ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to tails-dev-unsubscr...@boum.org.
[Tails-dev] Tails report for March, 2014
/tails-dev/2014-March/005186.html - Feedback wanted on planned implementation of Feature #5301 - Clone or Backup Persistent Volume https://mailman.boum.org/pipermail/tails-dev/2014-March/005225.html - Testing EHLO messages: simplification proposal https://mailman.boum.org/pipermail/tails-dev/2014-March/005227.html - Perspectives for 0.23..1.1 https://mailman.boum.org/pipermail/tails-dev/2014-March/005234.html - Upgrading the Linux kernel for 1.0? https://mailman.boum.org/pipermail/tails-dev/2014-March/005237.html - Review of https://tails.boum.org/contribute/ about restructuring the links on the Contribute page https://mailman.boum.org/pipermail/tails-dev/2014-March/005298.html - More tails.boum.org HTTP response headers? https://mailman.boum.org/pipermail/tails-dev/2014-March/005278.html Funding === - We were awarded the Access Innovation Prize. https://www.accessnow.org/prize https://twitter.com/accessnow/status/441043400708857856 - We submitted a proposal to the Knight Foundation News Challenge. https://www.newschallenge.org/challenge/2014/submissions/improve-tails-to-limit-the-impact-of-security-flaws-isolate-critical-applications-and-provide-same-day-security-updates - The crowdfunding campaign by the Freedom of the Press Foundation was extended and revived thanks to some new articles by Trevor Timm. https://pressfreedomfoundation.org/ https://pressfreedomfoundation.org/blog/2014/02/why-its-vital-public-fund-open-source-encryption-tools https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa - We applied to be audited through the OpenITP Peer Review Board. https://prb.openitp.org - We are still the process of signing the contract for a grant we were awarded by OpenITP at the end of 2013. Outreach - We organized a logo contest to have a new logo in time for Tails 1.0. We received 36 proposals Tails contributors started to vote on their favourite proposals. https://tails.boum.org/news/logo_contest/index.en.html https://tails.boum.org/blueprint/logo/ - We scheduled two usability testing sessions together with Silicon Sentier on May 21 and May 28 in Paris. http://siliconsentier.org/ - We scheduled a public hackfest. It will take place at IRILL Paris, France on July 5 and 6. http://www.irill.org/ - We made progress on the organization of the 2014 edition of the yearly Tails contributors summit. We could make use of more funding sources. Press and testimonials == * 2014-03-17: In Index Freedom of Expression Awards: Digital activism nominee Tails, Alice Kirkland interviews the Tails project about our nomination for the *Censorship’s Freedom of Expression Awards*. http://www.indexoncensorship.org/2014/03/index-freedom-expression-awards-digital-activism-nominee-tails/ * 2014-03-13: In his Les 7 clés pour protéger ses communications article (in French) published by the *Tribune de Genève*, Simon Koch recommends using Tails. http://www.tdg.ch/high-tech/web/Les-7-cles-pour-proteger-ses-communications/story/25588689 * 2014-03-12: In his [Happy 25th Birthday World Wide Web - Let's Not Destroy It article published by the Huffington Post, Mike Harris writes that Increasing numbers of activists are using high-tech tools such as Tor or Tails to encrypt their internet browsing and email. http://www.huffingtonpost.co.uk/mike-harris/world-wide-web_b_4947687.html?utm_hp_ref=uk * 2014-03-12: In his US and UK Spy Agencies Are Enemies of the Internet article, published in the Motherboard section of the Vice network, Joseph Cox covers Reporters Without Borders' latest report, and writes If you're a journalist working on anything more sensitive than London Fashion Week or League 2 football, you might want to consider using the Linux-based 'Tails' operating system too. http://motherboard.vice.com/read/us-and-uk-spy-agencies-are-enemies-of-the-internet https://en.rsf.org/enemies-of-the-internet-2014-11-03-2014,45985.html * 2014-03-08: Reporters Without Borders's Grégoire Pouget blogs about Tails: FIC 2014 : Comment être réellement anonyme sur Internet (in French). http://en.rsf.org/ http://blog.barbayellow.com/2014/03/08/fic-2014-comment-etre-reellement-anonyme-sur-internet/ * 2014-03-03: In the March edition of the Linux Journal, that celebrates 20 years of this journal, Kyle demonstrates Tails. http://www.linuxjournal.com/content/march-2014-issue-linux-journal-20-years-linux-journal -- Tails folks ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to tails-dev-unsubscr...@boum.org.
[Tails-dev] Tails contributors meeting: Wednesday, March 5
Hi, The next public Tails developers meeting is scheduled for Wednesday, March 5, on #tails-dev (OFTC) 9pm UTC (10pm CET) Every one interested in contributing to Tails is welcome. Redmine tickets we could discuss: * #6245: MD5 Reborned Hasher is incompatible with Firefox 20 https://labs.riseup.net/code/issues/6245 * #6679: Do not auto-connect to the #tor IRC channel https://labs.riseup.net/code/issues/6679 Usual topics on the agenda are: * Volunteers to handle broken windows this month? https://labs.riseup.net/code/projects/tails/roadmap#Broken%20window * Planning a monthly low-hanging fruits or review'n'merge meeting? Low-hanging fruits meeting: spend a while together on many small tasks that take less than 2 hours each, and are waiting in our TODO list for too long. Feel free to propose and prepare other discussion topics. Please raise them in this thread so that others can ask details and prepare the discussion too. If you want to get involved but don't know how yet, please consider coming and say hello during the meeting: this work meeting probably won't be the most adequate time and place to properly introduce newcomers to the development process, but at least it should be a fine place to tell us you're interested, and possibly to schedule a better suited event. Cheers. ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to tails-dev-unsubscr...@boum.org.
[Tails-dev] Tails report for December 2013
://labs.riseup.net/code/issues/5465 https://labs.riseup.net/code/issues/6544 - Our automated test suite was partially ported to the feature/wheezy branch. https://git-tails.immerda.ch/tails/log/?h=feature/wheezy Build system - Thanks to David Wolinsky and others, our Vagrant setup was updated to work with newer Vagrant, and the corresponding basebox updated to include up-to-date Debian archive keys. While we were at it, a few lurking bugs were fixed. https://git-tails.immerda.ch/tails/log/?h=bugfix/6221-support-newer-vagrant https://labs.riseup.net/code/issues/6221 - Thanks to WinterFairy, it is now easy to import translations from Transifex into our various Git repositories. https://git-tails.immerda.ch/winterfairy/tails/log/?h=feature/import-translations-extern On-going discussions - Tor Browser branding in Tails? https://mailman.boum.org/pipermail/tails-dev/2013-December/004362.html - Risks of enabled/disabled TCP timestamps? https://mailman.boum.org/pipermail/tails-dev/2013-December/004520.html https://labs.riseup.net/code/issues/6579 Funding === - The Freedom of the Press Foundation launched a campaign to support encryption tools for journalists. Tails is among the projects this campaign gathers fund for. https://pressfreedomfoundation.org/ - The proposal we have sent to sponsor Echo was accepted. - Our grant proposal with sponsor Charlie was rejected. - We are slowly making progress on our grant proposal with sponsor Golf. - We have almost completed a proposal to be sent to sponsor Lima. - Our contract with sponsor Bravo is now finished. - Tails will soon accept donations in currencies other than Bitcoin. - We are now very likely to create a non-profit organization dedicated to Tails. - We have almost wrapped-up our bounties program. A report will be published soonish. Outreach Tails participated in the 30th Chaos Communication Congress. It was a great opportunity to meet, in person, a few existing and new contributors, as well as many people we are working with. https://events.ccc.de/congress/2013/wiki/Main_Page A self-organized event called *Tails needs your help* was organized. It was a success considering the late notice. https://tails.boum.org/promote/slides/2013-12-29_-_Tails_needs_your_help.shtml See you next year, probably with more space and events dedicated to Tails! Press and testimonials == * 2013-12: Bruce Schneier answered to someone asking him what Linux distribution is its favorite: I don't use Linux. (Shhh. Don't tell anyone.) Although I have started using Tails. http://www.reddit.com/r/IAmA/comments/1r8ibh/iama_security_technologist_and_author_bruce/cdknf7a * 2013-12-12: In A conversation with Bruce Schneier, as part of the Snowden, the NSA and free software cycle at Columbia Law School NYC, Bruce Schneier says: - I think most of the public domain privacy tools are going to be safe, yes. I think GPG is going to be safe. I think OTR is going to be safe. I think that Tails is going to be safe. I do think that these systems, because they were not -- you know, the NSA has a big lever when a tool is written closed-source by a for-profit corporation. There are levers they have that they don't have in the open source international, altruistic community. And these are generally written by crypto-paranoids, they're pretty well designed. We make mistakes, but we find them and we correct them, and we're getting good at that. I think that if the NSA is going after these tools, they're going after implementations. - What do I trust? I trust, I trust Tails, I trust GPG [...] - We can make it harder, we can make it more expensive, we can make it more risky. And yes, every time we do something to increase one of those, we're making ourselves safer. [...] There are tools we are deploying in countries all over the world, that are keeping people alive. Tor is one of them. I mean, Tor saves lives. [...] And every time you use Tor [...] provides cover for everyone else who uses Tor [...] http://boingboing.net/2013/12/15/bruce-schneier-and-eben-moglen-2.html * Jacob Appelbaum stated at the Chaos Communication Congress: if you are a journalist and you are not using Tails, you should probably be using Tails, unless you *really* know what you're doing. https://events.ccc.de/congress/2013/Fahrplan/events/5713.html -- Tails folks ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev
[Tails-dev] Tails report for November, 2013
a certificate for `dl.amnesia.boum.org`. On-going discussions - 2.0 milestone += supporting USB devices exposed as non-removable? https://mailman.boum.org/pipermail/tails-dev/2013-November/003999.html - Tor Launcher extension https://mailman.boum.org/pipermail/tails-dev/2013-November/004011.html - WhisperBack launcher should give a hint on its use https://mailman.boum.org/pipermail/tails-dev/2013-November/004295.html - Glossary for contributors https://mailman.boum.org/pipermail/tails-dev/2013-November/004353.html Funding === - ThinkPenguin.com donated hardware for us to investigate on UEFI support. Many thanks! - We have been working on a proposal with sponsor Golf. Outreach - We submitted a talk for 30C3 but it was rejected. - 2013-11-28: Helping Human Rights Defenders to Communicate Securely: TAILS, National Democratic Institute, USA at the World Forum for Democracy http://www.coe.int/en/web/world-forum-democracy/lab4_ Press and testimonials == - 2013-11: The German-speaking ADMIN magazine reviews Tails. http://www.admin-magazin.de/Das-Heft/2013/11/Tails-0.20 -- Tails folks ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev
[Tails-dev] Tails report for September, 2013
! - We paid the first bounty of our bounty program. This one automated the migration of our ikiwiki tickets to Redmine. https://labs.riseup.net/code/projects/tails/issues?query_id=108 Press and testimonials == - 2013-09-12: In Inside the Effort to Crowdfund NSA-Proof Email and Chat Services. by DJ Pangburn, Riseup birds write (about the TBB) Combined with the TAILS project, which Riseup supports, there is nothing better. http://motherboard.vice.com/blog/inside-the-effort-to-crowdfund-nsa-proof-email-and-chat-services - 2013-09-05: In How to remain secure against NSA surveillance, Bruce Schneier wrote: Since I started working with Snowden's documents, I have been using GPG, Silent Circle, Tails, OTR, TrueCrypt, BleachBit, and a few other things I'm not going to write about. http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance -- Tails folks ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev
[Tails-dev] Tails report for August, 2013
. https://mailman.boum.org/pipermail/tails-dev/2013-August/003393.html - It was suggested to tweak the GnuPG configuration in various ways. https://mailman.boum.org/pipermail/tails-dev/2013-August/003468.html - We discussed how to handle divergence of bundled packages due to point-releases. https://mailman.boum.org/pipermail/tails-dev/2013-August/003492.html Infrastructure == - To make our infrastructure more reliable, we are still organizing to get a system that will act as a fail-over for our main server. https://labs.riseup.net/code/issues/6185 - We better shared access to the round-robin DNS that gathers our HTTP mirrors. (Many thanks to those who host the mirrors, by the way!) - We created a bunch of sysadmin tickets as a step towards being able to ask for help in this area first, and towards being able to actually share the work with the volunteers that will show up once we have sent our call for help. Stay tuned! https://labs.riseup.net/code/projects/tails/issues?query_id=113 Funding === - The short-term funding project we have with sponsor Bravo is still slowly going through the paperwork stage. - The bounties program is moving forward (slower than we may have hoped, but still). - We keep working on a funding proposal to be sent to sponsor Foxtrot. Cheers, -- Tails folks ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev
[Tails-dev] Tails report for May, 2013
Hi, here's the Tails report for May, 2013. Releases Tails 0.18 was released on May 18: https://tails.boum.org/news/version_0.18/ Metrics === - 128 676 connections of Tails to the Tor network. This makes a boot every 21 seconds on average (this is an approximation from the requests made to the security announcements feed when Tails is connected to Tor). - 51 non-empty bug reports were received through WhisperBack. - 630 comments were posted on the forum, with 143 signed by Tails. Code - We had a low-hanging fruits session on May 22, that was attended by three persons. https://mailman.boum.org/pipermail/tails-dev/2013-May/003076.html - Some important bugs were fixed in tails-greeter, thanks to winterfairy! http://git.immerda.ch/?p=tails/tails-greeter.git;a=summary - A branch to install Linux 3.8 was developed and merged. It triggered a bug in the Persistent Volume Assistant, that was fixed. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/linux-3.8 http://git.immerda.ch/?p=tails/persistence-setup.git;a=commit;h=c94d7432e649ff9b7974559b28b881ddf89f3ed0 - The automatic re-installation of additional software packages feature was improved. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/remember_installed_packages - live-boot 3.x final is now installed, and the old compatibility symlinks were removed. Same for live-config 3.x final. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/live-boot_3.0_final http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/remove_live-boot_compatibility_symlinks http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/live-config_3.0_final - A bug that made it a pain to use our OpenPGP applet was partially fixed. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/gpgapplet_do_not_erase_clipboard - More work was done to remove GNOME proxy settings. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/remove_gnome_proxy_settings - A branch to update virt-what was proposed. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/newer_virt-what - A branch to use bilibop was proposed. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/bilibop - Some preliminary work was done to get our nice custom boot splash screen back. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/tails-plymouth-theme - A smtube backport was prepared. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/smtube - Some post-Wheezy work was done. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/wheezy-security_APT_source http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/post-wheezy_pinning - More precise plans were drawn about the future of tails-greeter. https://mailman.boum.org/pipermail/tails-dev/2013-May/003099.html - Various TBB settings were imported. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/torbrowser Documentation and Website = - The end-user documentation about `feature/set-wireless-devices-state' was reviewed and improved. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/set-wireless-devices-state - The Tails specification and design document received various minor updates and improvements, as did the release process documentation. https://tails.boum.org/contribute/design/ - Tons of old forum posts were cleaned up, as part of our effort to import valuable existing knowledge from there into the upcoming QA website. On-going discussions - We've discussed inclusion of Martus in Tails. - Deanonymization potential by the desktop user. https://mailman.boum.org/pipermail/tails-dev/2013-May/003078.html - Adding support for keeping entry guards. https://mailman.boum.org/pipermail/tails-dev/2013-May/003111.html - Removing Iceweasel popups that confuse (some) users https://mailman.boum.org/pipermail/tails-dev/2013-May/003109.html Infrastructure == Various bits were updated to reflect the fact that Debian Wheezy was released. Funding === - We went on working on a grant application for more long-term funding with sponsor Foxtrot. - Draft contracts were sent to the bounties candidates. Some have started working on their bounty! Cheers, -- Tails folks ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev
[Tails-dev] Tails report for April, 2013
all GNOME proxy settings https://mailman.boum.org/pipermail/tails-dev/2013-April/002853.html Infrastructure == - Tails 0.17.2 was the first release assisted with automated tests! - Cucumber is used to describe the tests to perform. - 82 tests have been written so far - Huge progress was made on our automatic building infrastructure, based on Jenkins. https://mailman.boum.org/pipermail/tails-dev/2013-April/002902.html Funding === - The grant application we did with OpenITP (Sponsor Echo) was rejected. But our proposal made it to their finalist set. http://openitp.org/?q=openitp_first_round_of_2013_project_funding_now_open_for_proposals - We started to work on another grant application for more long-term funding with sponsor Foxtrot. - The list of bounties that are going to be funded through the Tor project program is closed. It will be made public soon. -- Tails folks ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev
[Tails-dev] Tails report for February, 2013
[27] 22: https://mailman.boum.org/pipermail/tails-dev/2013-February/002610.html 23: https://mailman.boum.org/listinfo/mat-dev 24: https://mailman.boum.org/pipermail/tails-dev/2013-February/002652.html 25: https://mailman.boum.org/pipermail/tails-dev/2013-February/002651.html 26: https://mailman.boum.org/pipermail/tails-dev/2013-February/002653.html 27: https://mailman.boum.org/pipermail/tails-dev/2013-February/002654.html Infrastructure == Quite some work was done on a new dedicated server of ours, called lizard: - Various stuff that's customary for a virtualization host, like a local APT proxy and a Puppet master, was setup. - Our APT repository was migrated to lizard [28]. Our primary (private) rsync server, too [29]. - We now run a BitTorrent seed on lizard [30]. - We now run another WhisperBack relay on lizard [31]. - We now run bitcoind [32] on lizard. - Our Puppet modules are now hosted on lizard. Some are already publicly available [33], but there's a bit of boring work left to publish the others [34]. We're happy to share with nice people [35] the development and maintenance of most of the modules we use. - A VM was setup to run Jenkins, that should some day be an important part of automated_builds_and_tests [36]. 28: https://tails.boum.org/todo/migrate_APT_repository_to_lizard/ 29: https://tails.boum.org/todo/migrate_primary_rsync_server_to_lizard/ 30: https://tails.boum.org/todo/run_a_BitTorrent_seed_on_lizard/ 31: https://tails.boum.org/todo/run_another_WhisperBack_relay_on_lizard/ 32: http://packages.debian.org/bitcoind 33: https://tails.boum.org/contribute/git/ 34: https://tails.boum.org/todo/publish_our_Puppet_modules/ 35: https://labs.riseup.net/code/projects/sharedpuppetmodules 36: https://tails.boum.org/todo/automated_builds_and_tests/ Funding === We have been working on starting our bounties program. -- Tails folks ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev
[Tails-dev] Tails report for December, 2012
Releases Tails 0.16~rc1 was released on December 14th. https://tails.boum.org/news/test_0.16~rc1z The Tails 0.16 release is scheduled for the first half of January. People == We received 66 reports through Whisperback. The forum activity has been steadily high: 1128 messages, 177 signed by Tails. Some of us went to 29c3. https://events.ccc.de/congress/2012/ Code Many dictionaries for supported languages were installed. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/spell-checker A bug concerning memlockd was fixed. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/only-one-memlockd The regular GnuPG agent was added. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/regular-gnupg-agent The automatic update feature of Iceweasel extensions was disabled. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/disable-iceweasel-extensions-auto-update The move to using `live-boot` version 3 was worked on. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/live-boot-3.x The Minitube Youtube client was installed. http://flavio.tordini.org/minitube http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/minitube The Iceweasel Add-on bar was hidden by default. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/just_hide_iceweasel_add-on_bar The work on a better power-off button was completed and merged. http://git.immerda.ch/?p=amnesia.git;a=commit;h=0217cf30ad95efe798529aadcde952b49976c839 A bug concerning the `--media` option of live-persist was fixed. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/strict_live-persist_media The `~/Persistent` directory was added to the *Places* menu of *GNOME* and *GtkFileChooser*. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/persistent-directory-in-places The `xul-ext-monkeysphere` extension was removed. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/disable-iceweasel-extensions-auto-update The *News* section of the website was configured as the homepage of Iceweasel. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/news-as-homepage https://tails.boum.org/todo/set_iceweasel_homepage_to_Tails_news The Entropy Key daemon `ekeyd` was installed. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/disable-iceweasel-extensions-auto-update A new version of the MAT was announced. https://mat.boum.org/ https://mailman.boum.org/pipermail/tails-dev/2012-December/002355.html Documentation and website = Guidelines for writing documentation for Tails were written. https://tails.boum.org/contribute/how/documentation/guidelines The documentation of our release process was improved. http://git.immerda.ch/?p=amnesia.git;a=commit;h=ef5f98e69e41794abcd8748529d81965d4aa8274 -- Tails folks ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev
[Tails-dev] Tails report for October, 2012
steps towards installing the Minitube YouTube client were walked. Many thanks to Alessandro Grassi for starting this effort, and going on with it! https://tails.boum.org/todo/minitube and http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/minitube The `Persistent` directory is now displayed in the Places menu. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/persistent-directory-in-places Work has started to set iceweasel homepage to Tails news. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/news-as-homepage and https://tails.boum.org/todo/set_iceweasel_homepage_to_Tails_news Shutdown messages were fixed to talk of DVD, not of CD. http://git.immerda.ch/?p=amnesia.git;a=commit;h=ef5d24c144976d3f0b1c0f64b6533c9d304a9b95 IPv6 was disabled to workaround a recently discovered leak. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/bugfix/disable-IPv6 and https://tails.boum.org/todo/really_block_ipv6 Work towards a better power off button is ongoing. https://tails.boum.org/todo/better_power_off_button and http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/better_power_off_button obfsproxy support was added. https://tails.boum.org/todo/obfsproxy and http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/obfsproxy A number of candidate branches for 0.15 were merged. http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/devel Documentation and website = The Tails website now has a Press media information page. https://tails.boum.org/press The News can now be translated. https://tails.boum.org/todo/news and https://mailman.boum.org/pipermail/tails-dev/2012-November/002136.html As planned, the website was locked-down a bit more. https://tails.boum.org/todo/locking_down_this_website and https://mailman.boum.org/pipermail/tails-dev/2012-November/002234.html On-going discussions Improve Polipo configuration, switch to Privoxy, or drop it all? https://mailman.boum.org/pipermail/tails-dev/2012-November/002008.html and https://mailman.boum.org/pipermail/tails-dev/2012-November/002029.html Progress report on the automated test suite triggered some discussion. https://mailman.boum.org/pipermail/tails-dev/2012-November/002014.html Helping adrelanos to proper copyright and licensing practices when forking Tails documentation pages. https://mailman.boum.org/pipermail/tails-dev/2012-November/002054.html Testing incremental updates and tails-create-iuk. https://mailman.boum.org/pipermail/tails-dev/2012-November/002108.html and https://mailman.boum.org/pipermail/tails-dev/2012-November/002128.html Benchmarking Redmine. https://mailman.boum.org/pipermail/tails-dev/2012-November/002157.html How to implement remembering installed packages? https://mailman.boum.org/pipermail/tails-dev/2012-November/002160.html Supporting EntropyKey. https://mailman.boum.org/pipermail/tails-dev/2012-November/002195.html Promoting Persistence features. https://mailman.boum.org/pipermail/tails-dev/2012-November/002197.html What to do with Liferea Cookies? https://mailman.boum.org/pipermail/tails-dev/2012-November/002209.html If/How to ship the Minitube native YouTube client? https://mailman.boum.org/pipermail/tails-dev/2012-November/002257.html What's the safest value to set the time from Tor consensus? https://mailman.boum.org/pipermail/tails-dev/2012-November/002228.html Stop shipping bugs/* and todo/* in ISO? https://mailman.boum.org/pipermail/tails-dev/2012-November/002235.html -- Tails folks ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev
[Tails-dev] Tails report for October, 2012
. https://tails.boum.org/todo/automated_builds_and_tests/cucumber/ http://git.immerda.ch/?p=amnesia.git;a=shortlog;h=refs/heads/feature/automated_tests/cucumber Documentation and website = Document the upcoming Network Manager persistence. Document the new support for public key encryption in the OpenPGP applet, and generally improve this part of the documentation along the way. Fix links to the Universal USB Installer. Consistently use long GnuPG key ID format in our examples. Many improvements to French and Portuguese translations. Documented more of Tails current development process. https://tails.boum.org/contribute/working_together/ and https://tails.boum.org/contribute/release_schedule/ Infrastructure == Our own APT repository `deb.tails.boum.org` has gone live on the 24th. This already enables us to use big custom packages (Iceweasel). In the mid-term, we will be able to remove binary packages from our main Git repository. And on the long run, this will enable more control over our freezes, as well as proper source distribution. In order to get commit announcements back on IRC, we have setup an instance of GitBot on `#tails-dev`. Unfortunately, this did not work as expected, and `repo.or.cz` admins explained us that they do not support commit notifications for mirror projects. Next steps are left to be determined. https://tails.boum.org/todo/find_another_irc_commit_bot/ On-going discussions Is there any advantage in faking user agent in tordate? https://mailman.boum.org/pipermail/tails-dev/2012-October/001732.html How about authenticated NTP? https://mailman.boum.org/pipermail/tails-dev/2012-October/001743.html Mockups for a revamped Tails Greeter, resulting in several comments. https://mailman.boum.org/pipermail/tails-dev/2012-October/001781.html Alan should be taking over maintainance of the Metadata Anonymization Toolkit. https://mailman.boum.org/pipermail/tails-dev/2012-October/001789.html Is Tails interested in some boot scripts from Whonix? https://mailman.boum.org/pipermail/tails-dev/2012-October/001803.html Tails website license? https://mailman.boum.org/pipermail/tails-dev/2012-October/001805.html Which Pidgin protocols should be considered safe? https://mailman.boum.org/pipermail/tails-dev/2012-October/001830.html Dependencies between persistence options. https://mailman.boum.org/pipermail/tails-dev/2012-October/001887.html Block/unblock wireless devices at boot time? https://mailman.boum.org/pipermail/tails-dev/2012-October/001753.html Disable FireWire et al. at boot time? https://mailman.boum.org/pipermail/tails-dev/2012-October/001847.html Tests of two-layered virtualized systems. https://mailman.boum.org/pipermail/tails-dev/2012-October/001950.html Funding === Unfortunately, sponsor Bravo is not able to fund as much as promised earlier. There might still be funds for some hardware. We'll see how it goes. -- Tails folks ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev
[Tails-dev] Tails report for September, 2012
/pipermail/tails-dev/2012-September/001671.html What should be the default web browser homepage? https://mailman.boum.org/pipermail/tails-dev/2012-September/001672.html Documentation and website = The documentation has received several small improvements in the following areas: * List what can be done when Tails does not start. * Better phrasing of the disclaimer about TrueCrypt. * Adjust TrueCrypt documentation for the current boot menu. * Specify what happens to the persistent volume when using the clone option of the installer. * Be more explicit of what should be done after installing Tails. * Link more appropriately the Torrent OpenPGP signature. An important amount of (still invisible) work has been done to replace the forum with a QA-style (like StackOverflow) web application that would suit our needs (and possibly the Tor project's ones -- we'll see). Translations The French translations has received a sturdy stream of updates. The website is currently at: * FR: 79% translated, 1% fuzzy * PT: 50% translated, 1% fuzzy * ES: 28% translated, 3% fuzzy * DE: 13% translated, 1% fuzzy Infrastructure == The `tails::whisperback::relay` Puppet class was brought into working state. This allowed us to setup additional WhisperBack relays: fail-over should now ensure bug reporting is possible most of the time. See Git repository at: git://webmasters.boum.org/tails-puppet-module-tails The server that will be dedicated to Tails development needs was delivered and plugged in the SeaCCP colocation. Many thanks to our friends at Riseup, who helped a lot through the whole process, and to the Tor project, who supports us once again by funding the server hosting! Debian Wheezy was installed. A Redmine install was setup at Riseup Labs to allow us to evaluate it. Thanks a lot, again! Funding === The discussions with sponsor Bravo are going well. It's likely that around 20 days of work for two developers will be funded by the end of November. -- Tails folks ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev