Re: [Tails-dev] [tails-dev] [PATCH] Add minimodem package

2023-05-16 Thread segfault
Hi, Roman Zeyde: Adding `minimodem` [1] would allow air-gapped communication between Tails and other machines. That sounds like a very special use case to me. But you can install minimodem via the Additional Software: https://tails.boum.org/doc/persistent_storage/additional_software/index.e

Re: [Tails-dev] Tor Browser 12.0.6 Candidate Builds Available

2023-05-11 Thread segfault
[sending again because I replied to the tails-dev list only] Hi, Richard Pospesel: Tor Browser 12.0.7 release candidate builds are now available for testing: - https://tb-build-05.torproject.org/~ma1/builds/release/unsigned/12.0.6-build1/ Thanks for letting us know! There is currently no

Re: [Tails-dev] Tor Browser 12.0.6 Candidate Builds Available

2023-05-11 Thread segfault
Hi, Richard Pospesel: Tor Browser 12.0.7 release candidate builds are now available for testing: - https://tb-build-05.torproject.org/~ma1/builds/release/unsigned/12.0.6-build1/ Thanks for letting us know! There is currently no detached signature for sha256sums-unsigned-build.txt in that

Re: [Tails-dev] Results from usability tests of the new Persistent Storage in Ecuador

2023-05-10 Thread segfault
Hi, sajolida: In March, emmapeel traveled to Ecuador and conducted moderated in-person usability tests of the new Persistent Storage. https://gitlab.tails.boum.org/tails/tails/-/issues/18648 She recruited 4 women from feminist groups who had an interest in privacy technologies but never used T

Re: [Tails-dev] Proposal: Add support for curl (does ALL_PROXY fix it?)

2023-02-05 Thread segfault
David A. Wheeler: You might want to try `torsocks --isolate curl` (I didn't test it but that's often enough to make any program use Tor). Currently torsocks is never mentioned in the Tails user documentation, so a typical Tails user has a good chance of not knowing about it. (yes, torsocks *i

Re: [Tails-dev] Proposal: Add support for curl (does ALL_PROXY fix it?)

2023-02-05 Thread segfault
ght want to try `torsocks --isolate curl` (I didn't test it but that's often enough to make any program use Tor). You can also make Tails install curl automatically via the Additional Software feature. Cheers segfault ___ Tails-dev mailin

Re: [Tails-dev] Rewrite live-persist as part of Persistent Storage settings rewrite

2021-01-12 Thread segfault
Topi Toosi: Hi, As a user I would be slightly worried if a user level script would be able to silently activate and start using persistence features I specifically have not enabled. Currently there is some assurance that data related to one Tails session will not be written to the persiste

[Tails-dev] Rewrite live-persist as part of Persistent Storage settings rewrite

2021-01-07 Thread segfault
Hey, as part of the rewrite of the Persistent Storage settings (#17803), I also want to solve #11529 "Save data to Persistence when it is created (no need to restart)". The only way I see to solve this while providing a nice UX is to rewrite part of live-persist (and the live-boot functions us

Re: [Tails-dev] overwriting with random data

2020-08-15 Thread segfault
Hi, kirg...@riseup.net: > Why does Tails default to overwriting with random data (instead of ones > and zeros) ? When erasing files. I'm not sure, but what issue do you see with the current behavior? Cheers ___ Tails-dev mailing list Tails-dev@boum.org

Re: [Tails-dev] [review'n'merge] another typo

2020-01-15 Thread segfault
emma peel: > ey there, a user reported this typo, please merge if you fancy: > > https://git-tails.immerda.ch/emmapeel/tails/commit/?h=another_typo&id=60829a0ad8a5c1f597b0f99255191dcde08c1736 > > thanks, and thanks to the user that reported. Merged, thanks! __

Re: [Tails-dev] [Tails-project] Do you read the changelog?

2019-12-13 Thread segfault
anonym: > As release managers, one of the things we produce is the changelog (i.e. debian/changelog; we are *not* talking about the release notes). We have the following questions for you, potential users of this file: > > - Do you read the changelog at all? To be honest, no, I don't remember eve

Re: [Tails-dev] Reddit Account

2019-11-25 Thread segfault
thenerdyanarchist--- via Tails-dev: > I had asked in the XMPP chat, but just figured I'd send a message here to > cover all bases. Did anyone from the team create an account named > Tails_OS on Reddit yesterday at around 18:00 UTC? > > Since I haven't found any evidence that it's anyone from the

Re: [Tails-dev] Bugfix permission request

2019-09-30 Thread segfault
x27;re done with the >> implementation and tested that it works, set the ticket fields according >> to the merge policy (Status -> Needs Validation, Assignee -> empty). > > Since then, touss created themselves a Redmine account, and I give > them "Contributor" s

Re: [Tails-dev] Bugfix permission request

2019-09-29 Thread segfault
Hi, > I've been meaning to contribute to Tais since i went to the 2017 Cryptorave > at Sao Paulo, and finally now i had some time to start. I  implemented a > bugfix to bug  15102  wich can be found at my branch at Salsa: > https://salsa.debian.org/touss-guest/persistence-setup/tree/bugfix/15102

Re: [Tails-dev] [Tails-ux] Working group to define the "core Tails system" (#16531)

2019-08-13 Thread segfault
u: >>> 2. Gather initial input from everyone (not just members of the >>>working group) >> >>>→ Feel free to send me, by the end of July, a list of statements >>>such as "I think feature X / application Y should be part of the >>>core Tails system because $REASONS" or the opposite.

Re: [Tails-dev] [Tails-ux] Working group to define the "core Tails system" (#16531)

2019-08-13 Thread segfault
u: >>> 2. Gather initial input from everyone (not just members of the >>>working group) >> >>>→ Feel free to send me, by the end of July, a list of statements >>>such as "I think feature X / application Y should be part of the >>>core Tails system because $REASONS" or the opposite.

Re: [Tails-dev] [review'n'merge] typo on unlock_veracrypt_volumes

2019-05-04 Thread segfault
x27;s plate [...] » >> >> It definitely is part of our job. segfault asked me for guidance >> a couple weeks ago wrt. how to handle this and I replies. I suspect >> this fell through the cracks since. segfault, are you still on it? Yes, it fell through the cracks, and yes

Re: [Tails-dev] Proposal: Redmine workflow change

2019-04-12 Thread segfault
Hi, intrigeri: > anonym: >> intrigeri: >>> Given we now have "mentions" (@nickname) on our Redmine, for the >>> majority of cases, when the requested info can presumably be provided >>> cheaply and quickly, I think we should use mentions and not reassign >>> the ticket. And when I'm mentioned, if

Re: [Tails-dev] TAILS amd64 3.13 boot issue

2019-04-02 Thread segfault
Hi, Ron HulduNet - GM: > amd64 3.13 > > Lenovo Thinkpad X200 Tablet > > Sandisk 16GB > > > Starts booting then stops at > BusyBox <...> > > (initramfs) Unable to find a medium containing a live file system how did you install Tails? Did you use the .iso or the .img? And did Tails fail to boo

Re: [Tails-dev] Security implications: moving code from Verification Extension to our website

2019-03-28 Thread segfault
sajolida: > u: >> We know from Javascript statistics of our download page that roughly >> ~20% of the downloads of Tails images are verified by users using the >> verification extension. The optional OpenPGP verification accounts for >> 9% of downloads (computed using the number of downloads of the

Re: [Tails-dev] Tails vs Electrum

2019-03-22 Thread segfault
Hi, s7r: > Or, if there are any downsides that prevent us from using the AppImage, > (I hope there won't be any as it seams our easiest move here), There is at least one downside: the Electrum AppImage is 86 MiB, whereas the Electrum Debian package and it's dependencies which we could remove fro

Re: [Tails-dev] Tails vs Electrum

2019-03-19 Thread segfault
Hi, sajolida: > Summary of the situation > > [...] Thanks a lot for the comprehensive summary! This sounds like a serious issue. I share your concern regarding losing users (and good donors). So I think we should avoid removing Electrum without at least documenting a wor

Re: [Tails-dev] Buggy boot

2019-03-11 Thread segfault
Hi, thanks for the report. bradley--- via Tails-dev: > Hey, > > Thanks for all the work you put into Tails. It is an amazing system and I > find it very useful. > > I would like to report one issue however. Every second time I boot Tails, > it fails. It either displays some errors in the comman

Re: [Tails-dev] Reusing the VeraCrypt icon for a custom mounter in Tails

2018-08-05 Thread segfault
Hi! VeraCrypt Team: > We have no problem with you reusing VeraCrypt logo in Tails. The logo > itself is licensed under Apache License 2.0. I don't know if this can > help integrate it into Tails. In case of problem, we can make > exceptions for you. That's great! But after some more discussions,

Re: [Tails-dev] installing a package with double click

2018-07-28 Thread segfault
hi, emma peel: > as now we are having so many possibilities with the new Additional Software > feature coming, with some friends we are working on some apps that can be > used in Tails. > > We have a nice .deb package for newbie users to be able to install a small > catalogue of tools, but we

[Tails-dev] VeraCrypt support in GNOME

2018-07-25 Thread segfault
Hi, first a quick status update: the project to add VeraCrypt support to GNOME made good progress in the last months. Our work on Disks, glib, GVfs, and partly GTK+, was merged already: https://gitlab.gnome.org/GNOME/gnome-disk-utility/issues/84 https://gitlab.gnome.org/GNOME/glib/merge_reque

Re: [Tails-dev] DeepOnion project

2018-07-17 Thread segfault
Hi, Vaas !: > We are glad to let your Team know that we were working on the Debian > Repository in the last months with our Development Team and we did a lot of > progress on it. We took your words about doing something first as a way to > earn the trust from your members and who that we want to h

Re: [Tails-dev] How to use a non-standard persistent volume?

2018-06-11 Thread segfault
gaff-tails: > Is there a way I can create and mount a persistent volume that isn't on a USB stick? I understand that this comes with security risks - My main aim here is develop and test tails features using virtual box or similar. For testing purposes, you can also use this tool to create a disk

Re: [Tails-dev] VeraCrypt/TrueCrypt support in GNOME Disks

2018-02-20 Thread segfault
Hi, segfault: > We are currently working on the patches for the unlock dialog in Disks. > This will probably be finished soon. The resulting UI is much more > complex than in the LUKS case, but this simply reflects the more complex > needs of VeraCrypt users. the Disks patches a

Re: [Tails-dev] VeraCrypt/TrueCrypt support in GNOME Disks

2018-02-11 Thread segfault
Hi, segfault: > Hi, > > we at Tails (tails.boum.org) currently work on integrating support for > unlocking VeraCrypt (and probably also TrueCrypt) volumes in Tails via > udisks2 and GNOME Disks (and maybe also GNOME Files and the GVfs > monitor). We internally track the status

Re: [Tails-dev] Tails Server docker support

2017-12-12 Thread segfault
forgottenbeast: > >> 1. The size of the docker images. The debian base image is > 100MB. >> Downloading this would increase both the service installation time and >> the requirements on the system's RAM. > > This problem can easily be circumvented by using alpine based images: > the alpine base i

Re: [Tails-dev] Tails Server docker support

2017-12-10 Thread segfault
Hi, forgottenbeast: > Greetings, > I've been following the announcements about tails server and I would > like to know if there are any plans regarding the support of docker > containers? > > The use case I am thinking about would be the ability to pull a docker > image and run it as a hidden ser

Re: [Tails-dev] Release schedule for 2018

2017-11-20 Thread segfault
Hi, intrigeri: > Hi, > > intrigeri: >> FYI Mozilla has changed their 2018 release schedule. I'll update our >> own calendar + Redmine, and will come back to this thread later. > > Here we go (sorry for the noise, I didn't think I would do it > immediately): > > * 2018-01-23: Release 3.4? (Fir

Re: [Tails-dev] VeraCrypt/TrueCrypt support in GNOME Disks

2017-11-15 Thread segfault
.. ink ..: > On Tue, Nov 14, 2017 at 10:02 PM, segfault wrote: > > >> We do not plan to support creating new TC/VC containers, and I didn't >> even know that zulucrypt can do this (thanks for the hint!). I find the >> idea tempting, maybe I will work on that at

Re: [Tails-dev] VeraCrypt/TrueCrypt support in GNOME Disks

2017-11-14 Thread segfault
Vratislav Podzimek: > On Tue, 2017-11-14 at 17:36 +0900, Kai Lüke wrote: > [...] >> * GNOME Disks and GIO/GVFs need to make use of the keyfiles parameter in >> UDisks (currently lacking for LUKS as well) and a way to select a >> keyfile from GNOME Shell is needed. One could also decide to explicitl

Re: [Tails-dev] VeraCrypt/TrueCrypt support in GNOME Disks

2017-11-14 Thread segfault
Vratislav Podzimek: > On Mon, 2017-11-13 at 17:36 +0100, segfault wrote: > [...] >> I forgot to add: Assuming that you would like to have this in upstream, >> some heads up for when it would be ideal for us if an upstream >> maintainer was available for reviewing: >>

Re: [Tails-dev] VeraCrypt/TrueCrypt support in GNOME Disks

2017-11-14 Thread segfault
Hi, thanks for the quick reply! I re-add the tails-dev mailinglist to Cc. Kai Lüke: > Seems I misunderstood while reading, so you already have code. Correct. Sorry if I didn't make that clear enough. I will still answer your previous email below. In case you already want to have a look at the cu

Re: [Tails-dev] VeraCrypt/TrueCrypt support in GNOME Disks

2017-11-13 Thread segfault
Hey, thanks for the quick response! Bastien Nocera: > [...] > What UI differences would be needed to handle those different types of > encryption? I'm guessing none for handling encrypted disks, because the > UI should be pretty much the same as for the existing LVM based > encryption support. D

Re: [Tails-dev] VeraCrypt/TrueCrypt support in GNOME Disks

2017-11-13 Thread segfault
segfault: > Hi, > > we at Tails (tails.boum.org) currently work on integrating support for > unlocking VeraCrypt (and probably also TrueCrypt) volumes in Tails via > udisks2 and GNOME Disks (and maybe also GNOME Files and the GVfs > monitor). We internally track the status of th

[Tails-dev] VeraCrypt/TrueCrypt support in GNOME Disks

2017-11-13 Thread segfault
Hi, we at Tails (tails.boum.org) currently work on integrating support for unlocking VeraCrypt (and probably also TrueCrypt) volumes in Tails via udisks2 and GNOME Disks (and maybe also GNOME Files and the GVfs monitor). We internally track the status of this work in [1] and [2]. Currently we are

[Tails-dev] Logo broken on tails.boum.org/install

2017-10-15 Thread segfault
I just noticed that the logo looks broken on every page under tails.boum.org/install/ (see attached screenshot). I suspect that this has something to do with the "Removing the subtitle in our logo" threat, maybe a test version was accidentally pushed to master? Cheers! ___

Re: [Tails-dev] TrueCrypt/VeraCrypt volumes undetectable

2017-10-05 Thread segfault
sajolida: > Testing VeraCrypt right now I see that on the main window there is an > option to "Mount" (which requires first selecting a file or device) but > also an option to "Auto-Mount Devices" (which autodetects my VeraCrypt > partition). segfault, I think you

Re: [Tails-dev] Release schedule for 2018

2017-10-05 Thread segfault
Hi, so I finally read this thread, after having already learned via XMPP that the release schedule was changed and that my plans will not work out the way I thought they would. I too somehow thought that this thread would not be relevant to me. I thought that the releases for the first half of 201

Re: [Tails-dev] October meeting notes

2017-10-05 Thread segfault
intrigeri: > Could you please attach the logs in a pure-text format without > control chars instead? Here is an updated patch. Cheers! >From 13b587c8167f8b019804c9b32919f98c4c13e412 Mon Sep 17 00:00:00 2001 From: segfault Date: Tue, 3 Oct 2017 20:36:48 +0200 Subject: [PATCH] Add Octobe

Re: [Tails-dev] TrueCrypt/VeraCrypt volumes undetectable

2017-10-05 Thread segfault
anonym: > segfault: >> Hi, >> >> so I started working on the project a few days ago and now I realize >> that we might have a problem, because TC/VC volumes are undetectable. >> Unlike LUKS encrypted volumes, TC/VC encrypted volumes don't have a >> cl

[Tails-dev] October meeting notes

2017-10-03 Thread segfault
Here are the October meeting notes. Cheers! From 3509c2f0689b0a48096abbec24ad692549fb7ee6 Mon Sep 17 00:00:00 2001 From: segfault Date: Tue, 3 Oct 2017 20:36:48 +0200 Subject: [PATCH] Add October meeting notes --- wiki/src/contribute/meetings/201710.mdwn | 39 wiki/src/contribute

Re: [Tails-dev] Debian 9: Build fails consistently, name resolution fails sooner or later

2017-03-10 Thread segfault
Arnaud: > The failure doesn't always happen at the same point of the build. At > first, I thought it was related to `apt`, but I also experienced in > failure on a `curl` command (when downloading Tor Browser, in > `config/chroot_local-hooks/10-tbb`). I don't have the log anymore, but > it was also

Re: [Tails-dev] [review'n'merge] March contributors meeting notes

2017-03-08 Thread segfault
intrigeri: > segfault: >> Hi, here are the notes of today's meeting. Please review and merge. > > applied, thanks! > > will you update the tickets accordingly in Redmine? Done! ___ Tails-dev mailing list Tails-dev@boum.or

[Tails-dev] [review'n'merge] March contributors meeting notes

2017-03-03 Thread segfault
Hi, here are the notes of today's meeting. Please review and merge. Cheers! >From 835a9183ed777d727db35afaaa2489a796466a12 Mon Sep 17 00:00:00 2001 From: segfault Date: Fri, 3 Mar 2017 22:35:00 + Subject: [PATCH 1/1] March contributos meeting notes --- wiki/src/contribute/meeting

Re: [Tails-dev] Why Tails partition is non-deterministic?

2016-08-28 Thread segfault
Joanna Rutkowska: > On Sat, Aug 27, 2016 at 06:54:10PM +0000, segfault wrote: > The added value would be ensuring the unused portion of the disk blocks > (occupied by the Tails partition) are not populated with some random garbage, > which might be e.g. user's previous (unencrypt

Re: [Tails-dev] Why Tails partition is non-deterministic?

2016-08-27 Thread segfault
Hi, somehow I missed this thread, just noticed it right now. intrigeri: > Hi, > > thanks Joanna for raising this topic! > > I've just thought about it a little bit and I see no technical reason > that prevents us from resetting all timestamps in the filesystem to > some fixed value that depends o

[Tails-dev] [GSoC] Tails Server - Final status report

2016-08-23 Thread segfault
Hi everone, the GSoC ends this week. My goal was to implement the basis of the Tails Server, which should include a GUI and a CLI to install, configure and start onion services in Tails. I implemented a prototype which meets this goal. There are nightly images [1] of Tails including this prototype

Re: [Tails-dev] [GSoC] Tails Server - status report 5

2016-07-19 Thread segfault
sajolida: > segfault: [...] >> - Write documentation > > Where can I see this? Currently I only have this documentation for the Mumble server: https://gitlab.com/segfault_/tails/blob/feature/5688-tails-server/wiki/src/doc/tails_server/mumble.mdwn >> - Make the applicatio

[Tails-dev] [GSoC] Tails Server - status report 5

2016-07-17 Thread segfault
Hi everyone, this is the fifth status report on the Tails Server GSoC project. I did two batches of user tests in the last two weeks, with five participants each. The results were mixed, more skilled users had a better user experience than less skilled users. I will try to solve the problems disc

Re: [Tails-dev] [tor-dev] [GSoC] Tails Server - status report 4

2016-07-05 Thread segfault
Hi, George Kadianakis: > segfault writes: > >> [ text/plain ] >> Hi everyone, >> >> this is the fourth status report on the Tails Server GSoC project. >> >> First off: There are nightly images of Tails with integrated Tails >> Server available for

Re: [Tails-dev] [GSoC] Tails Server - status report 4

2016-07-02 Thread segfault
sajolida: > segfault: >> [1]: >> http://nightly.tails.boum.org/build_Tails_ISO_feature-5688-tails-server/builds/ > > That's super cool! I'm downloading one now (and I hope I'll get to test > it before long) > >> * Implement three different ap

[Tails-dev] [GSoC] Tails Server - status report 4

2016-07-01 Thread segfault
Hi everyone, this is the fourth status report on the Tails Server GSoC project. First off: There are nightly images of Tails with integrated Tails Server available for download [1]. Some notes if you want to test it: - Installation of the first service will take several minutes, because the APT p

[Tails-dev] [GSoC] Tails Server - status report 3

2016-06-17 Thread segfault
Hi everyone, this is the third status report on the Tails Server GSoC project. I had to omit the previous report because personal difficulties were getting in the way. So here is what I achieved in the last four weeks: * Revamp the GUI * Replace the status panel with a config panel * Add a

Re: [Tails-dev] Persistent torrc [Was: Tails Server: updated plan and GSoC!]

2016-06-17 Thread segfault
anonym: [...] >> Just to clarify things: Currently Tails Server does have a configuration >> file for each service (which is made persistent if the service is >> persistent). Those are currently in /usr/share/tails-server/options/, >> e.g. /usr/share/tails-server/options/mumble. But I only store op

Re: [Tails-dev] Persistent torrc [Was: Tails Server: updated plan and GSoC!]

2016-06-16 Thread segfault
anonym: > segfault: >> anonym: >>> segfault: >>>> anonym: >>>>> segfault: >>> [...] >>>>>> I wrote some code to make single files persistent by creating a new >>>>>> directory in TailsData_unlocked, moving th

Re: [Tails-dev] Persistent torrc [Was: Tails Server: updated plan and GSoC!]

2016-06-15 Thread segfault
anonym: > segfault: >> anonym: >>> segfault: > [...] >>>> I wrote some code to make single files persistent by creating a new >>>> directory in TailsData_unlocked, moving the file into it and adding the >>>> directory to the persisten

Re: [Tails-dev] Persistent torrc [Was: Tails Server: updated plan and GSoC!]

2016-06-15 Thread segfault
sajolida: > anonym: >> # add_onion >> >> By using stem to communicate with Tor over the control port/socket to >> add the hidden services, just like onionshare does (which would be a >> good source for inspiration, code-wise), you don't need any torrc >> persistence just like in the previous approa

Re: [Tails-dev] Persistent torrc [Was: Tails Server: updated plan and GSoC!]

2016-06-15 Thread segfault
anonym: > segfault: >> anonym: >>> [...] >>> One thing to note about the mumble-server script is the "little >>> bind-mount trick" used to workaround Tor's AppArmor confinement. We >>> won't have that problem, I think. I did that so

Re: [Tails-dev] Persistent torrc [Was: Tails Server: updated plan and GSoC!]

2016-06-14 Thread segfault
anonym: > [...] > One thing to note about the mumble-server script is the "little > bind-mount trick" used to workaround Tor's AppArmor confinement. We > won't have that problem, I think. I did that so that all things we want > to make persistent for mumble-server lives in the same directory on the

[Tails-dev] [GSoC] Tails Server - status report 2

2016-05-20 Thread segfault
Hi everyone, this is the second status report on the Tails Server GSoC project. In the last two weeks I worked on these things: * Discussing the design of the GUI on the Tails-UX mailing list. I sent the last prototype of the GUI two weeks ago and we have been discussing it since. * Write a spe

Re: [Tails-dev] [tor-dev] [GSoC] Tails Server - status report

2016-05-18 Thread segfault
sajolida: > segfault: >> I sent my first GSoC report only to tor-dev and forgot to send it to >> tails-dev too. I quote it in full at the end of this mail. > > I'll answer on tails-dev only and add George in explicit copy to avoid > crossposting across mailing list.

Re: [Tails-dev] An update to zuluCrypt status in debian

2016-05-18 Thread segfault
intrigeri: > Is anyone here excited in working on this topic? I am, but I have a lot of other things to do :/ Maybe in late summer I will have time for this. > > Personally, I'd much rather see work towards having TrueCrypt volumes > supported in udisks2 and GNOME Disks, than adding a second GU

Re: [Tails-dev] [tor-dev] [GSoC] Tails Server - status report

2016-05-16 Thread segfault
I sent my first GSoC report only to tor-dev and forgot to send it to tails-dev too. I quote it in full at the end of this mail. sajolida: > segfault: >> this is the first status report on the Tails Server GSoC project. I >> officially began working on it on April 25th, althoug

Re: [Tails-dev] Tails Server: updated plan and GSoC!

2016-03-22 Thread segfault
Hi, > At 32C3 we got quite inspired by the Tor presentation about onion > services and started reviewing the plan we had on the Tails Server > blueprint [0] with segfault. > > [0]: https://tails.boum.org/blueprint/server_edition/ > > The Tails Server project has been on hol

Re: [Tails-dev] [review'n'merge] meeting notes

2016-03-09 Thread segfault
t suite https://labs.riseup.net/code/issues/7729 +- ticketbot: Tails ☺ Feature #10721: Improve automated GUI testing robustness using "GUI aware" technologies https://labs.riseup.net/code/issues/10721 +- segfault: I will have more time in the next month than in february. I still want to work on

Re: [Tails-dev] Hacking Team looking at Tails

2016-02-18 Thread segfault
> I'm not sure how the user could detect / verify that > (realistically, you probably can't..). Running a rootkit checker from > another *nix OS may be helpful, but of unknown effectiveness. That's work in progress: https://labs.riseup.net/code/issues/7496 I implemented a prototype that's currentl