Blogs

Tails 0.15 is out!

Tails, The Amnesic Incognito Live System, version 0.15, is out.

All users must upgrade as soon as possible.

Download it now

Thank you, and congrats, to everyone who helped make this happen!

Changes

Notable user-visible changes include:

  • Tor 0.2.3.25
  • Major new features
  • Minor improvements
    • Add the Hangul (Korean) Input Method Engine for SCIM.
    • Preliminary support for some OpenPGP SmartCard readers.
    • Support printers that need HPIJS PPD and/or the IJS driver.
    • Optimize fonts display for LCD.
    • Update TrueCrypt to version 7.1a.
  • Bugfixes
    • Fix gpgApplet menu display in Windows camouflage mode.
    • Fix Tor reaching an inactive state if it is restarted in "bridge mode",
      e.g. during the time synchronization process.
  • Iceweasel
    • Update iceweasel to 10.0.11esr-1+tails1.
    • Update HTTPS Everywhere to version 3.0.4.
    • Update NoScript to version 2.6.
    • Fix bookmark to I2P router console.
  • Localization
    • The Tails USB installer, tails-persistence-setup and tails-greeter
      are now translated into Bulgarian.
    • Update Chinese translation for tails-greeter.
    • Update Euskadi translation for WhisperBack.

Plus the usual bunch of bug reports and minor improvements.

See the online Changelog for technical details.

Don't hesitate to get in touch with us.

Transparency, openness, and our 2011 financial docs

After our standard audit, our 2011 state and federal tax filings are available. We publish all of our related tax documents because we believe in transparency. All US non-profit organizations are required by law to make their tax filings available to the public on request by US citizens. We want to make them available for all.

Part of our transparency is simply publishing the tax documents for your review. The other part is publishing what we're working on in detail. We hope you'll join us in furthering our mission (a) to develop, improve and distribute free, publicly available tools and programs that promote free speech, free expression, civic engagement and privacy rights online; (b) to conduct scientific research regarding, and to promote the use of and knowledge about, such tools, programs and related issues around the world; (c) to educate the general public around the world about privacy rights and anonymity issues connected to Internet use.

All of this means you can look through all of our source code, including our design documents, and all open tasks, enhancements, and bugs available on our tracking system. Our research reports are available as well. From a technical perspective, all of this free software, documentation, and code allows you and others to assess the safety and trustworthiness of our research and development. On another level, we have a 10 year track record of doing high quality work, saying what we're going to do, and doing what we said.

The world is moving towards new norms for reduced personal privacy and control. This makes anonymity all that more rare and valuable. Please help keep us going through getting involved, donations, or advocating for a free Internet with privacy, anonymity, and keeping control of your identity.

Employers Against Domestic Violence and Technology Panel

I was invited by Employers Against Domestic Violence to give a talk about technology and stalking as part of a larger panel.

On Friday the 16th, I presented Tor and our work with victims of abuse and stalking to around 50 people. Most of my full presentation covered the basics of Tor, a demo of Tails Live System, and then some user stories. Most of the people in the audience were already DV advocates and aware of the way technology is used to harm or manipulate others. The user stories have come from a number of places, between phone calls, email support, and actually being out in the world talking to survivors or advocates who want to help.

I co-presented with Sarah from Abine and Valenda from Greater Boston Legal Services. All three of our presentations can be found on Tor's people server.

Afterwards, a number of people came up to me to ask about getting Tails or Tor Browser, or to simply introduce themselves. I met a cyber-stalking survivor I've only helped via email and phone over the past year or so. I look forward to doing more of these types of events locally.

Scripps J School at Ohio University Trip Report

Ohio University EW Scripps Journalism School Trip Report for 07 to 09 November 2012

Danny O'Brien of Committee to Protect Journalists and I were invited to talk to journalism students at the E.W. Scripps School of Journalism in Ohio University. The topics were around computer security risks and protections from the perspective of journalists. CPJ maintains a great guide for reporters to survive dangerous situations appropriately called the Journalist Security Guide. This covers both offline and online situations. My role was to highlight the experience of Tor, what we've seen, and how we've protected both citizen and professional journalists the world over. I also covered using Tails as one tool in your toolbox to let you do the work of a journalist from anywhere.

Andy Alexander was our host for the three days. We started off with a great dinner to share information about what both Danny and I have learned over the past few years in working with journalists. Andy has a long career of experience in foreign correspondence and reporting. His experiences covering a few decades highlight the need for journalists to learn how to protect themselves when reporting anywhere in the world.

The next day was a first-year class about journalism in general. Danny and I presented to around 200 students. The computer couldn't read my USB drive, so I couldn't use my presentation, rather I used the website to quickly cover Tor, how it works, and why journalists should care. I then discussed a range of attacks against an individual from fairly basic malware infections through more advanced traffic analysis and content swapping. My PirateBox did work, so anyone could get the presentations and copies of Tor locally if they so desired.

We had a great lunch with Professor Kalyango and then head off to WOUB for a 30 minute podcast/radio interview.

Afterwards, we went off to the main panel event to talk to fourth year and graduate students about online security and the risks for journalists. Once again, the USB drive couldn't be read, but the PirateBox worked fine. The lecture lasted around 90 minutes with a Q&A session. Unlike the freshman class, a number of people had questions or wanted to verify what Danny and I stated.

We were then taken out to dinner by the top students at the J School. It was a great Middle Eastern kabob place to have an hour of discussions with the students.

And thanks to Lindsay for getting up at 06:30 to drive me to the airport and for the great discussion along the way. I look forward to reading her dispatches from East Africa in the near future.

Also published via email at https://lists.torproject.org/pipermail/tor-reports/2012-November/000082....

Tails 0.14 is out!

Tails, The Amnesic Incognito Live System, version 0.14, is out.

All users must upgrade as soon as possible.

Download it now.

Thank you, and congrats, to everyone who helped make this happen!

Changes

Notable user-visible changes include:

  • Tor
  • Iceweasel
    • Upgrade iceweasel to 10.0.10esr-1+tails1, with anonymity enhancing patches from the TorBrowser applied
    • Fix Iceweasel's file associations. No more should you be suggested to open a PDF in the GIMP
  • Hardware support
    • Upgrade Linux to 3.2.32
    • Support more than 4GB of RAM
    • Support more than one CPU core
  • Miscellaneous
    • Mostly fix memory wiping at shutdown
    • gpgApplet can now handle public-key cryptography
    • Add a persistence preset for NetworkManager connections
    • Better support setting up persistence on large USB sticks
    • Make boot faster by fixing a read-ahead bug
    • Make shutdown faster by disabling useless scripts
  • Localization
    • Custom software is now translated in many more languages
    • Add Japanese input system

Plus the usual bunch of bug reports and minor improvements.

See the online
Changelog
for technical details.

Don't hesitate to get in touch with us.

Updated Tor Cloud images

The Tor Cloud images for all the seven regions have been updated to include the latest cloud image for stable Ubuntu release 12.04.1 LTS (Precise Pangolin). These new images are available on the Tor Cloud website. You will not need to start a new instance you are already running a Tor Cloud instance with Ubuntu Precise.

Top changes in Tor since the 2004 design paper (Part 3)

In this third and final installment of Nick Mathewson and Steven Murdoch's blog series (previously part 1 and part 2) we discuss how Tor has made its traffic harder to fingerprint, as well as usability and security improvements to how users interact with Tor. read more »

New Tor Browser Bundles and alpha bundles

All of the Tor Browser Bundles have been updated with the latest Firefox 10.0.10esr release and all of the alpha packages, including the alpha Tor Browser Bundles, have been updated with the latest release of Tor 0.2.3.24-rc.

https://www.torproject.org/download

Further notes about Tor Browser Bundle updates:

Tor Browser Bundle (2.2.39-5)

  • Update Firefox to 10.0.10esr
  • Update NoScript to 2.5.9

Tor Browser Bundle (2.3.24-alpha-1)

  • Update Tor to 0.2.3.24-rc
  • Update Firefox to 10.0.10esr
  • Update NoScript to 2.5.9
  • Update HTTPS Everywhere to 4.0development.2
Syndicate content Syndicate content