Tails OS

Software Screenshot:
Tails OS
Software Details:
Version: 3.7.1 updated
Upload Date: 22 Jun 18
Developer: Incognito Team
Distribution Type: Freeware
Downloads: 270

Rating: 2.0/5 (Total Votes: 1)

Previously known as Incognito Live CD/USB, Tails is a live-only Linux operating system that provides users with a perfect computing environment for surfing the Internet anonymously. It is based on the Debian GNU/Linux and Tor technologies.

Distributed as a 32-bit Live CD

Dubbed “The Amnesic Incognito Live System”, Tails is an open source Linux distribution delivered as a single Live CD ISO image that supports only 32-bit instruction set architectures. It can be deployed to a SD card, USB thumb drive, or CD/DVD discs.

Boot options

The boot medium comes with only two options, to start the live environment with default settings or in failsafe mode (just in case the first option won’t work for you). Pressing Enter on the first option will start the live environment.

Users will be greeted by a welcome message that allows them to login into the live session or change various other options, such as to add a root (system administrator) password, camouflage the system to look like a Windows XP machine, as well as to spoof all MAC addresses.

In addition, you can choose to connect directly to the Tor network (default option), or configure the bridge, firewall, and proxy settings for a censored, filtered and proxified Internet connection.

It encrypts your Internet communications

When using Tails, all your Internet communications will be encrypted and anonymized through the Tor network, leaving no trace on the host computer, unless you instruct it otherwise. It uses state-of-the-art and open source cryptographic software to encrypt your entire network communication, including emails, instant messaging, as well as personal files.

Uses the GNOME desktop environment and popular open-source apps

The live session is powered by a traditional GNOME desktop environment bundled with well known open source applications, such as Apache OpenOffice, Iceweasel web browser, Claws Mail email client, Liferea feed reader, Pidgin instant messenger, GIMP image editor, Inkscape SVG graphics editor, Audacity audio editor, PiTiVi video editor, and Synaptic Package Manager.

Tails was used by the famous whistleblower Edward Snowden.

What is new in this release:

  • Upgrades and changes:
  • Upgrade Tor Browser to 7.5.5.
  • This fixes a critical issue in Firefox announced on June 6.
  • Upgrade Thunderbird to 52.8.0.
  • This partly mitigates the infamous EFAIL attack and fixes importing OpenPGP keys from keyservers with Enigmail.
  • Fixed problems:
  • Fix setting a screen locker password with non-ASCII characters. (#15636)
  • Rename the WhisperBack launcher to "WhisperBack Error Reporting" so that users have a better chance to understand what it does. (#6432)

What is new in version :

  • Upgrades and changes:
  • Update Linux to 4.14.12 which fixes Meltdown, Spectre (only partially) and many other issues. (#14976)
  • Fixed problems:
  • Fix an issue that made Tails start very slowly, in particular on DVD. (#14964)
  • Don't delete downloaded Debian packages after installing them. This is mostly relevant for users of the APT Packages persistence feature. (#10958)
  • Fix an issue that prevented some Debian packages to install properly with the Additional software feature. (#6038)
  • Update uBlock Origin to restore its icon in Tor Browser, and make its settings dashboard work again. (#14993)

What is new in version 3.3:

  • Upgrades and changes:
  • Update Tor to 0.3.1.8 which saves bandwidth when starting.
  • Update Tor Browser to 7.0.10.
  • Update Thunderbird to 52.4.0.
  • Update Linux to 4.13.0.
  • Fixed problems:
  • Fix UEFI support for USB sticks installed using Universal USB Installer. (#8992)
  • Fix errors on file system creation in Tails Installer when the target USB stick is plugged before starting Tails Installer. (#14755).
  • Fix Tails Installer on Debian sid and recent versions of udisks2. (#14809)
  • Fix the screen reader and screen keyboard in Tor Browser and Thunderbird. (#14752, #9260)
  • Make the configuration of the keyboard layout more robust when starting a session. (#12543)

What is new in version 3.1:

  • Upgrades and changes:
  • Update Tor Browser to 7.0.4.
  • Update Linux to 4.9.30-2+deb9u3.
  • Fixed problems:
  • Make sure that Thunderbird erases its temporary directory, containing for example attachments opened in the past.
  • Fix translations of the time synchronization and "Tor is ready" notifications.

What is new in version 3.0.1:

  • Upgrades and changes:
  • Upgrade tor to 0.3.0.9-1~d90.stretch+1.
  • Upgrade Linux to 4.9.30-2+deb9u2.
  • Fixed problems:
  • Fix interaction between SSH and GNOME Keyring.
  • Have Tails Installer stop rejecting valid USB drives, pretending they're not "removable".
  • Make behavior of the power button and lid close actions in the Greeter consistent with the regular GNOME session.

What is new in version 3.0:

  • Important security fixes!
  • Upgrade to current Debian 9 (Stretch).
  • Upgrade tor to 0.3.0.7-1.
  • Upgrade Tor Browser to 7.0a4.
  • Migrate from Icedove to Thunderbird (only cosmetic).

What is new in version 2.9.1 / 3.0 Alpha 1:

  • Upgrades and changes:
  • Upgrade Tor to 0.2.8.10.
  • Upgrade Tor Browser to 6.0.8.
  • Upgrade Icedove to 45.5.1.
  • Upgrade obfs4proxy to 0.0.7.
  • Switch to DuckDuckGo as the default search engine in Tor Browser. The previous default search engine, Disconnect.me, has already been redirecting to Duck Duck Go for some time.
  • Fixed problems:
  • Fix Tails not starting in VirtualBox by upgrading the Guest Additions to version 5.1.8. (#11965)
  • Document that I/O APIC is required to start Tails in VirtualBox.
  • Remove the error when starting Videos that appeared in Tails 2.7 by fixing the AppArmor profile of Totem. (#11984)

What is new in version 2.7 / 3.0 Alpha 1:

  • New features:
  • We enabled address space layout randomization in the Linux kernel (kASLR) to improve protection from buffer overflow attacks.
  • We installed rngd to improve the entropy of the random numbers generated on computers that have a hardware random number generator.
  • Upgrades and changes:
  • Upgrade Tor to 0.2.8.7.
  • Upgrade Tor Browser to 6.0.5.
  • Upgrade to Linux 4.6. This should improve the support for newer hardware (graphics, Wi-Fi, etc.)
  • Upgrade Icedove to 45.2.0.
  • Upgrade Tor Birdy to 0.2.0.
  • Upgrade Electrum to 2.6.4.
  • Install firmware for Intel SST sound cards (firmware-intel-sound).
  • Install firmware for Texas Instruments Wi-Fi interfaces (firmware-ti-connectivity).
  • Remove non-free APT repositories. We documented how to configure additional APT repositories using the persistent volume.
  • Use a dedicated page as the homepage of Tor Browser so we can customize it for our users.
  • Set up the trigger for RAM erasure on shutdown earlier in the boot process. This should speed up shutdown and make RAM erasure more robust.
  • Fixed problems:
  • Disable the automatic configuration of Icedove when using OAuth. This should fix the automatic configuration for GMail accounts. (#11536)
  • Make the Disable all networking and Tor bridge mode options of Tails Greeter more robust. (#11593)

What is new in version 2.7:

  • New features:
  • We enabled address space layout randomization in the Linux kernel (kASLR) to improve protection from buffer overflow attacks.
  • We installed rngd to improve the entropy of the random numbers generated on computers that have a hardware random number generator.
  • Upgrades and changes:
  • Upgrade Tor to 0.2.8.7.
  • Upgrade Tor Browser to 6.0.5.
  • Upgrade to Linux 4.6. This should improve the support for newer hardware (graphics, Wi-Fi, etc.)
  • Upgrade Icedove to 45.2.0.
  • Upgrade Tor Birdy to 0.2.0.
  • Upgrade Electrum to 2.6.4.
  • Install firmware for Intel SST sound cards (firmware-intel-sound).
  • Install firmware for Texas Instruments Wi-Fi interfaces (firmware-ti-connectivity).
  • Remove non-free APT repositories. We documented how to configure additional APT repositories using the persistent volume.
  • Use a dedicated page as the homepage of Tor Browser so we can customize it for our users.
  • Set up the trigger for RAM erasure on shutdown earlier in the boot process. This should speed up shutdown and make RAM erasure more robust.
  • Fixed problems:
  • Disable the automatic configuration of Icedove when using OAuth. This should fix the automatic configuration for GMail accounts. (#11536)
  • Make the Disable all networking and Tor bridge mode options of Tails Greeter more robust. (#11593)

What is new in version 2.6:

  • New features:
  • We enabled address space layout randomization in the Linux kernel (kASLR) to improve protection from buffer overflow attacks.
  • We installed rngd to improve the entropy of the random numbers generated on computers that have a hardware random number generator.
  • Upgrades and changes:
  • Upgrade Tor to 0.2.8.7.
  • Upgrade Tor Browser to 6.0.5.
  • Upgrade to Linux 4.6. This should improve the support for newer hardware (graphics, Wi-Fi, etc.)
  • Upgrade Icedove to 45.2.0.
  • Upgrade Tor Birdy to 0.2.0.
  • Upgrade Electrum to 2.6.4.
  • Install firmware for Intel SST sound cards (firmware-intel-sound).
  • Install firmware for Texas Instruments Wi-Fi interfaces (firmware-ti-connectivity).
  • Remove non-free APT repositories. We documented how to configure additional APT repositories using the persistent volume.
  • Use a dedicated page as the homepage of Tor Browser so we can customize it for our users.
  • Set up the trigger for RAM erasure on shutdown earlier in the boot process. This should speed up shutdown and make RAM erasure more robust.
  • Fixed problems:
  • Disable the automatic configuration of Icedove when using OAuth. This should fix the automatic configuration for GMail accounts. (#11536)
  • Make the Disable all networking and Tor bridge mode options of Tails Greeter more robust. (#11593)

What is new in version 2.5 / 2.6 RC1:

  • Major new features and changes:
  • Install Tor 0.2.8.6. (Closes: #11351)
  • Enable kASLR in the Linux kernel. (Closes: #11281)
  • Upgrade Icedove to 1:45.2.0-1~deb8u1+tails1: (Closes: #11714) · Drop auto-fetched configurations using Oauth2. They do not work together with Torbirdy since it disables needed functionality (like JavaScript and cookies) in the embedded browser. This should make auto-configuration work for GMail again, for instance. (Closes: ##11536) · Pin Icedove to be installed from our APT repo. Debian's Icedove packages still do not have our secure Icedove autoconfig wizard patches applied, so installing them would be a serious security regression. (Closes: #11613) · Add missing icedove-l10n-* packages to our custom APT repository (Closes: #11550)
  • Upgrade to Linux 4.6: (Closes: #10298) · Install the 686 kernel flavour instead of the obsolete 586 one. · APT, dpkg: add amd64 architecture. The amd64 kernel flavour is not built anymore for the i386 architecture, so we need to use multiarch now. · Build and install the out-of-tree aufs4 module. (Closes: #10298) · Disable kernel modesetting for QXL: it's not compatible with Jessie's QXL X.Org driver.
  • Security fixes:
  • Hopefully fixed an issue which would sometimes make the Greeter ignore the "disable networking" or "bridge mode" options. (Closes: #11593)
  • Minor improvements:
  • Install firmware-intel-sound and firmware-ti-connectivity. This adds support for some sound cards and Wi-Fi adapters. (Closes: #11502)
  • Install OpenPGP Applet from Debian. (Closes: #10190)
  • Install gnome-sound-recorder (again). (Closes: #10950)
  • Port the "About Tails" dialog to python3.
  • Run our initramfs memory erasure hook earlier (Closes: #10733). The goal here is to: · save a few seconds on shutdown (it might matter especially for the emergency one); · work in a less heavily multitasking / event-driven environment, for more robust operation.
  • Install rngd, and make rng-tools initscript return success when it can't find any hardware RNG device. Most Tails systems around probably have no such device, and we don't want systemd to believe they failed to boot properly. (Closes: #5650)
  • Don't force using the vboxvideo X.Org driver. According to our tests, this forced setting is: · harmful: it breaks X startup when the vboxvideo kernel driver is loaded; · useless: X.Org now autodetects the vboxvideo X.Org driver and uses it when running in VirtualBox and the vboxvideo kernel is not present.
  • Port boot-profile to python3 (Closes: #10083). Thanks to heartsucker heartsucker@autistici.org for the patch!
  • Include /proc/cmdline and the content of persistent APT sources in WhisperBack bug reports. (Closes: #11675, #11635)
  • Disable non-free APT sources at boot time. (Closes: #10130)
  • Have a dedicated page for the homepage of Tor Browser in Tails. (Closes: # 11725)
  • Only build the VirtualBox kernel modules for the 32-bit kernel. It's both hard and useless to build it for 64-bit in the current state of things, as long as we're shipping a 32-bit userspace. Also, install virtualbox-* from jessie-backports, since the version in Jessie is not compatible with Linux 4.x.

What is new in version 2.5:

  • Upgrades and changes:
  • Update Tor Browser to 6.0.3, based on Firefox 45.3.
  • Upgrade Icedove to 45.1.
  • Fixed problems:
  • The automatic account configuration of Icedove used to freeze when connecting to some email providers. (#11486)
  • In some cases sending an email with Icedove used to result in the error: "The message could not be sent using Outgoing server (SMTP) mail.riseup.net for an unknown reason." (#10933)
  • A spurious error message used to sometimes appear when creating an account in Icedove and providing its password. (#11550)
  • Fix some time synchronization problems, by replacing obsolete and unreliable servers, and decreasing a timeout. (#11577)
  • KVM virtual machines with QXL video: vastly improve graphics performance and fix visual artifacts in Tor Browser. (#11500, #11489)

What is new in version 2.4:

  • You can now copy and paste your GnuPG passphrases into the pinentry dialog, for example from KeePassX or the clipboard.
  • Upgrade Tor Browser to 5.5.5.
  • Upgrade I2P to 0.9.25.
  • Upgrade Electrum from 2.5.4 to 2.6.3.
  • Fixed problems:
  • Clarify that users migrating from Claws Mail to Icedove should delete all their Claws Mail data to remove the warning when starting Icedove. (#11187)
  • Make both panes of Onion Circuits scrollable to fix display issues on smaller screens. (#11192)

What is new in version 2.2.1:

  • New features:
  • Add support for viewing DVDs with DRM protection. (#7674)
  • Upgrades and changes:
  • Replace Vidalia, which has been unmaintained for years, with: a system status icon indicating whether Tails is connected to Tor or not, Onion Circuits to display a list of the current Tor circuits and connections.
  • Automatically save the database of KeePassX after every change to prevent data loss when shutting down. (#11147)
  • Update Tor Browser to 5.5.3.
  • Upgrade I2P to 0.9.24.
  • Disable the Alt + Shift and Left Shift + Right Shift keyboard shortcuts that used to switch to the next keyboard layout. You can still use Meta + Space to change keyboard layout. (#11042)
  • Fixed problems:
  • Fix optional PGP key feature of WhisperBack.
  • Fix saving of WhisperBack report to a file when offline.
  • Make Git verify the integrity of transferred objects.

What is new in version 2.2 RC1:

  • Major new features and changes:
  • Replace Vidalia (which has been unmaintained for years) with: (Closes: #6841)
  • the Tor Status GNOME Shell extension, which adds a System Status icon indicating whether Tor is ready or not.
  • Onion Circuits, a simple Tor circuit monitoring tool.
  • Security fixes:
  • Upgrade cpio to 2.11+dfsg-4.1+deb8u1.
  • Upgrade glibc to 2.19-18+deb8u3.
  • Upgrade libgraphite2 to 1.3.5-1~deb8u1.
  • Upgrade libreoffice to 4.3.3-2+deb8u3.
  • Upgrade libssh2 to 1.4.3-4.1+deb8u1.
  • Bugfixes:
  • Hide "Laptop Mode Tools Configuration" menu entry. We don't support configuring l-m-t in Tails, and it doesn't work out of the box. (Closes: #11074)
  • WhisperBack:
  • Actually write a string when saving bug report to disk. (Closes: #11133)
  • Add missing argument to OpenPGP dialog so the optional OpenPGP key can be added again. (Closes: #11033)
  • Minor improvements:
  • Upgrade I2P to 0.9.24-1~deb8u+1.
  • Add support for viewing DRM protected DVD videos using libdvdcss2. Patch series submitted by Austin English austinenglish@gmail.com. (Closes: #7674)
  • Automatically save KeePassX database after every change by default. (Closes: #11147)
  • Implement Tor stream isolation for WhisperBack
  • Delete unused tor-tsocks-mua.conf previously used by Claws Mail. (Closes: #10904)
  • Add set -u to all gettext:ized shell scripts. In gettext-base < 1.8.2, like the one we had in Wheezy, gettext.sh references the environment variable ZSH_VERSION, which we do not set. This has prevented us from doing set -u without various hacks. (Closes: #9371)
  • Also set -e in some shell scripts which lacked it for no good reason.
  • Make Git verify the integrity of transferred objects. (Closes: #11107)

What is new in version 2.0:

  • New features:
  • Tails now uses the GNOME Shell desktop environment, in its Classic mode. GNOME Shell provides a modern, simple, and actively developed desktop environment. The Classic mode keeps the traditional Applications, Places menu, and windows list. Accessibility and non-Latin input sources are also better integrated.
  • To find your way around, read our introduction to GNOME and the Tails desktop.
  • The desktop and Applications menuTails 2.0 desktop with applications menu unfolded
  • The activities overviewTails 2.0 activities overview
  • Upgrades and changes:
  • Debian 8 upgrades most included software, for example:
  • Many core GNOME utilities from 3.4 to 3.14: Files, Disks, Videos, etc.
  • LibreOffice from 3.5 to 4.3
  • PiTiVi from 0.15 to 0.93
  • Git from 1.7.10 to 2.1.4
  • Poedit from 1.5.4 to 1.6.10
  • Liferea from 1.8.6 to 1.10
  • Update Tor Browser to 5.5 (based on Firefox 38.6.0 ESR)
  • Remove the Windows camouflage which is currently broken in GNOME Shell. We started working on adding it back but your help is needed!
  • Change to systemd as init system and use it to:
  • Sandbox many services using Linux namespaces and make them harder to exploit.
  • Make the launching of Tor and the memory wipe on shutdown more robust.
  • Sanitize our code base by replacing many custom scripts.
  • Update most firmware packages which might improve hardware compatibility.
  • Notify the user if Tails is running from a non-free virtualization software.
  • Remove Claws Mail, replaced by Icedove, a rebranded version of Mozilla Thunderbird.
  • Fixed problems:
  • HiDPI displays are better supported.
  • Remove the option to open a download with an external application in Tor Browser as this is usually impossible due to the AppArmor confinement.
  • Close Vidalia before restarting Tor.
  • Allow Videos to access the DVD drive.
  • Allow configuring printers without administration password.

What is new in version 2.0 RC1:

  • New features:
  • Fix the passphrase strength indicator of GNOME Disks.
  • Upgrades and changes:
  • Remove Claws Mail: Icedove is now the default email client.
  • Upgrade Tor Browser to 5.5a6.
  • Install xserver-xorg-video-intel from Jessie Backports (currently: 2.99.917-2~bpo8+1). This adds support for recent chips such as Intel Broadwell's HD Graphics.
  • Fixed problems:
  • Stop offering the option to open downloaded files with external applications in Tor Browser (Closes: #9285). Our AppArmor confinement was blocking most such actions anyway, resulting in poor UX.
  • Fix the performance issue of Tails Upgrader that made automatic upgrades very slow to apply.
  • Fix Electrum by installing the version from Debian testing.
  • Restore default file associations.
  • Repair Dotfiles persistence feature.
  • Fix ability to reconfigure an existing persistent storage.
  • Associate armored OpenPGP public keys named *.key with Seahorse.
  • Update the list of enabled GNOME Shell extensions, which might fix the "GNOME Shell sometimes leaves Classic mode" bug seen in 2.0~beta1:

What is new in version 1.8.2:

  • Upgrade Tor Browser to 5.0.7

What is new in version 2.0 Beta 1:

  • Tails 2.0 will be the first version of Tails based on Debian 8 (Jessie). As such, it upgrades essentially all included software.
  • The most noticeable change is probably the move to GNOME Shell, configured in Classic mode. This desktop environment provides a modern and actively developed replacement for the aging GNOME "Flashback". GNOME Shell also paves the way for better supporting touchscreens in the future.
  • Under the hood, an amazing amount of code was ported to more modern technologies. This, in turn, allowed us to do lots of small changes all around the place, that will make the Tails experience both safer, and more pleasant. For example, all custom system services are harder to exploit thanks to the use of Linux namespaces, set up by systemd. And the way Tails tells the user that "Tor is ready" is now more accurate.

What is new in version 1.8:

  • New features:
  • Icedove a rebranded version of Mozilla Thunderbird is now the official email client in Tails, replacing Claws Mail.
  • Claws Mail will be removed from Tails in version 2.0 (2016-01-26). If you have been using Claws Mail and activated its persistence feature, follow our instructions to migrate your data to Icedove.
  • Upgrades and changes:
  • Electrum from 1.9.8 to 2.5.4. Now Electrum should work again in Tails.
  • Tor Browser to 5.0.5.
  • Tor to 0.2.7.6.
  • I2P to 0.9.23.
  • Icedove from 31.8 to 38.4.
  • Enigmail from 1.7.2 to 1.8.2.

What is new in version 1.7:

  • New features:
  • You can now start Tails in offline mode to disable all networking for additional security. Doing so can be useful when working on sensitive documents.
  • We added Icedove, a rebranded version of the Mozilla Thunderbird email client.
  • Icedove is currently a technology preview. It is safe to use in the context of Tails but it will be better integrated in future versions until we remove Claws Mail. Users of Claws Mail should refer to our instructions to migrate their data from Claws Mail to Icedove.
  • Upgrades and changes:
  • Improve the wording of the first screen of Tails Installer.
  • Restart Tor automatically if connecting to the Tor network takes too long. (#9516)
  • Update several firmware packages which might improve hardware compatibility.
  • Update the Tails signing key which is now valid until 2017.
  • Update Tor Browser to 5.0.4.
  • Update Tor to 0.2.7.4.
  • Fixed problems:
  • Prevent wget from leaking the IP address when using the FTP protocol. (#10364)
  • Prevent symlink attack on ~/.xsession-errors via tails-debugging-info which could be used by the amnesia user to bypass read permissions on any file. (#10333)
  • Force synchronization of data on the USB stick at the end of automatic upgrades. This might fix some reliability bugs in automatic upgrades.
  • Make the "I2P is ready" notification more reliable.

What is new in version 1.6:

  • Upgrade Tor Browser to version 5.0.3 (based on Firefox 38.3.0 ESR).
  • Upgrade I2P to version 0.9.22 and enable its AppArmor profile.
  • Fix several issues related to MAC address spoofing:
  • If MAC address spoofing fails on a network interface and this interface cannot be disabled, then all networking is now completely disabled.
  • A notification is displayed if MAC address spoofing causes network issues, for example if a network only allows connections from a list of authorized MAC addresses.

What is new in version 1.5.1:

  • Install Tor Browser 5.0.2 (based on Firefox ESR 38.2.1).

What is new in version 1.5:

  • Upgrades and changes:
  • Install Tor Browser 5.0 (based on Firefox 38esr).
  • Install a 32-bit GRUB EFI boot loader. Tails should now start on some tablets with Intel Bay Trail processors among others.
  • Let the user know when Tails Installer has rejected a device because it is too small.
  • There are numerous other changes that might not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.
  • Fixed problems:
  • Our AppArmor setup has been audited and improved in various ways which should harden the system.
  • The network should now be properly disabled when MAC address spoofing fails.

What is new in version 1.5 RC1:

  • Major new features:
  • Move LAN web browsing from Tor Browser to the Unsafe Browser, and forbid access to the LAN from the former.
  • Install a 32-bit GRUB EFI boot loader. This at least works on some Intel Baytrail systems.
  • Upgrade Tor Browser to 5.0a4-build3.
  • Security fixes:
  • Fix panic mode on MAC spoofing failure.
  • Deny Tor Browser access to global tmp directories with AppArmor.
  • Tails Installer: don't use a predictable file name for the subprocess error log.
  • Pidgin AppArmor profile: disable the launchpad-integration abstraction.
  • Use aliases so that our AppArmor policy applies to /lib/live/mount/overlay/ and /lib/live/mount/rootfs/*.squashfs/ as well as it applies to /.
  • Upgrade Linux to 3.16.7-ckt11-1+deb8u2.
  • Upgrade bind9-host, dnsutils and friends to 1:9.8.4.dfsg.P1-6+nmu2+deb7u6.
  • Upgrade cups-filters to 1.0.18-2.1+deb7u2.
  • Upgrade ghostscript to 9.05~dfsg-6.3+deb7u2.
  • Upgrade libexpat1 to 2.1.0-1+deb7u2.
  • Upgrade libicu48 to 4.8.1.1-12+deb7u3.
  • Upgrade libwmf0.2-7 to 0.2.8.4-10.3+deb7u1.
  • Upgrade openjdk-7 to 7u79-2.5.6-1~deb7u1.
  • Bugfixes:
  • Upgrade Tor to 0.2.6.10-1~d70.wheezy+1+tails1.
  • Minor improvements:
  • Tails Installer: let the user know when it has rejected a candidate destination device because it is too small.
  • Tails Installer: prevent users from trying to "upgrade" a device that contains no Tails, or that was not installed with Tails Installer.
  • Install libotr5 and pidgin-otr 4.x from wheezy-backports. This adds support for the OTRv3 protocol and for multiple concurrent connections to the same account.
  • Skip warning dialog when starting Tor Browser while being offline, in case it is already running. Thanks to Austin English for the patch!
  • Install the apparmor-profiles package, but don't ship a bunch of AppArmor profiles we don't use, to avoid increasing boot time.
  • Ship a /etc/apparmor.d/tunables/home.d/tails snippet, instead of patching /etc/apparmor.d/tunables/home.
  • live-boot: don't mount tmpfs twice on /live/overlay, so that the one which is actually used as the read-write branch of the root filesystem's union mount, is visible.

What is new in version 1.4:

  • New features:
  • Tor Browser 4.5 now has a security slider that you can use to disable browser features, such as JavaScript, as a trade-off between security and usability. The security slider is set to low by default to provide the same level of security as previous versions and the most usable experience.
  • We disabled in Tails the new circuit view of Tor Browser 4.5 for security reasons. You can still use the network map of Vidalia to inspect your circuits.
  • Tails OpenPGP Applet now has a shortcut to the gedit text editor, thanks to Ivan Bliminse.
  • Paperkey lets you print a backup of your OpenPGP secret keys on paper.
  • Upgrades and changes:
  • Tor Browser 4.5 protects better against third-party tracking. Often when visiting a website, many connections are created to transfer both the content of the main website (its page, images, and so on) and third-party content from other websites (advertisements, Like buttons, and so on). In Tor Browser 4.5, all such content, from the main website as well as the third-party websites, goes through the same Tor circuits. And these circuits are not reused when visiting a different website. This prevents third-party websites from correlating your visits to different websites.
  • Tor Browser 4.5 now keeps using the same Tor circuit while you are visiting a website. This prevents the website from suddenly changing language, behavior, or logging you out.
  • Disconnect is the new default search engine. Disconnect provides Google search results to Tor users without captchas or bans.
  • Better support for Vietnamese in LibreOffice through the installation of fonts-linuxlibertine.
  • Disable security warnings when connecting to POP3 and IMAP ports that are mostly used for StartTLS nowadays.
  • Support for more printers through the installation of printer-driver-gutenprint.
  • Upgrade Tor to 0.2.6.7.
  • Upgrade I2P to 0.9.19 that has several fixes and improvements for floodfill performance.
  • Remove the obsolete #i2p-help IRC channel from Pidgin.
  • Remove the command line email client mutt and msmtp.
  • There are numerous other changes that might not be apparent in the daily operation of a typical user.
  • Fixed problems:
  • Make the browser theme of the Windows 8 camouflage compatible with the Unsafe Browser and the I2P Browser.
  • Remove the Tor Network Settings... from the Torbutton menu.
  • Better support for Chromebook C720-2800 through the upgrade of syslinux.
  • Fix the localization of Tails Upgrader.
  • Fix the OpenPGP key servers configured in Seahorse.
  • Prevent Tor Browser from crashing when Orca is enabled.

What is new in version 1.4 RC1:

  • Major new features:
  • Upgrade Tor Browser to 4.5, which introduces many major new features for usability, security and privacy. Unfortunately its per-tab circuit view did not make it into Tails yet since it requires exposing more Tor state to the user running the Tor Browser than we are currently comfortable with. (Closes: ticket #9031)
  • Upgrade Tor to 0.2.6.7-1~d70.wheezy+1+tails2. Like in the Tor bundled with the Tor Browser, we patch it so that circuits used for SOCKSAuth streams have their lifetime increased indefinitely while in active use. This currently only affects the Tor Browser in Tails, and should improve the experience on certain websites that otherwise would switch language or log you out every ten minutes or so when Tor switches circuit. (Closes: ticket #7934)
  • Security fixes:
  • Upgrade Linux to 3.16.7-ckt9-3.
  • Upgrade curl to 7.26.0-1+wheezy13.
  • Upgrade dpkg to 1.16.16.
  • Upgrade gstreamer0.10-plugins-bad to 0.10.23-7.1+deb7u2.
  • Upgrade libgd2-xpm to 2.0.36~rc1~dfsg-6.1+deb7u1.
  • Upgrade openldap to 2.4.31-2.
  • Upgrade LibreOffice to 1:3.5.4+dfsg2-0+deb7u4.
  • Upgrade libruby1.9.1 to 1.9.3.194-8.1+deb7u5.
  • Upgrade libtasn1-3 to 2.13-2+deb7u2.
  • Upgrade libx11 to 2:1.5.0-1+deb7u2.
  • Upgrade libxml-libxml-perl to 2.0001+dfsg-1+deb7u1.
  • Upgrade libxml2 to 2.8.0+dfsg1-7+wheezy4.
  • Upgrade OpenJDK to 7u79-2.5.5-1~deb7u1.
  • Upgrade ppp to 2.4.5-5.1+deb7u2.
  • Bugfixes:
  • Make the Windows 8 browser theme compatible with the Unsafe and I2P browsers. (Closes: ticket #9138)
  • Hide Torbutton's "Tor Network Settings..." context menu entry. (Closes: ticket #7647)
  • Upgrade the syslinux packages to support booting Tails on Chromebook C720-2800. (Closes: ticket #9044)
  • Enable localization in Tails Upgrader. (Closes: ticket #9190)
  • Make sure the system clock isn't before the build date during early boot. Our live-config hook that imports our signing keys depend on that the system clock isn't before the date when the keys where created. (Closes: ticket #9149)
  • Set GNOME's OpenPGP keys via desktop.gnome.crypto.pgp to prevent us from getting GNOME's default keyserver in addition to our own. (Closes: ticket #9233)
  • Prevent Firefox from crashing when Orca is enabled: grant it access to assistive technologies in its Apparmor profile. (Closes: ticket #9261)
  • Add Jessie APT source. (Closes: ticket #9278)
  • Fix set_simple_config_key(). If the key already existed in the config file before the call, all other lines would be removed due to the sed option -n and p combo. (Closes: ticket #9122)
  • Minor improvements:
  • Upgrade I2P to 0.9.19-3~deb7u+1. (Closes: ticket #9229)
  • Install Tor Browser's bundled Torbutton instead of custom .deb. As of Torbutton 1.9.1.0 everything we need has been upstreamed.
  • Install Tor Browser's bundled Tor Launcher instead of our in-tree version. With Tor 0.2.6.x our custom patches for the ClientTransportPlugin hacks are not needed any more. (Closes: ticket #7283)
  • Don't install msmtp and mutt. (Closes: ticket #8727)
  • Install fonts-linuxlibertine for improved Vietnamese support in LibreOffice. (Closes: ticket #8996)
  • Remove obsoletete #i2p-help IRC channel from the Pidgin configuration (Closes: ticket #9137)
  • Add Gedit shortcut to gpgApplet's context menu. Thanks to Ivan Bliminse for the patch. (Closes: ticket #9069).
  • Install printer-driver-gutenprint to support more printer models. (Closes: ticket #8994).
  • Install paperkey for off-line OpenPGP key backup. (Closes: ticket #8957)
  • Hide the Tor logo in Tor Launcher. (Closes: ticket #8696)
  • Remove useless log() instance in tails-unblock-network. (Closes: ticket #9034)

What is new in version 1.3.2:

  • The Florence virtual keyboard can now be used with touchpads again.
  • Tails Installer does not list devices that are too small to be supported.

What is new in version 1.3.1:

  • Tails has transitioned to a new OpenPGP signing key.
  • Tor Launcher 0.2.7.2 improves usability of Internet connections that are censored, filtered, or proxied.

What is new in version 1.3:

  • New features:
  • Electrum is an easy to use bitcoin wallet. You can use the Bitcoin Client persistence feature to store your Electrum configuration and wallet.
  • The Tor Browser has additional operating system and data security. This security restricts reads and writes to a limited number of folders. Learn how to manipulate files with the new Tor Browser.
  • The obfs4 pluggable transport is now available to connect to Tor bridges. Pluggable transports transform the Tor traffic between the client and the bridge to help disguise Tor traffic from censors.
  • Keyringer lets you manage and share secrets using OpenPGP and Git from the command line.
  • Upgrades and changes:
  • The Mac and Linux manual installation processes no longer require the isohybrid command. Removing the isohybrid command simplifies the installation.
  • The tap-to-click and two-finger scrolling trackpad settings are now enabled by default. This should be more intuitive for Mac users.
  • The Ibus Vietnamese input method is now supported.
  • Improved support for OpenPGP smartcards through the installation of GnuPG 2.

What is new in version 1.3 RC1:

  • Major new features:
  • Distribute a hybrid ISO image again: no need for anyone to manually run isohybrid anymore! (ticket #8510)
  • Confine the Tor Browser using AppArmor to protect against some types of attack. Learn more about how this will affect your usage of Tails. (ticket #5525)
  • Install the Electrum bitcoin client, and allow users to persist their wallet. (ticket #6739)
  • Minor improvements:
  • Support obfs4 Tor bridges (ticket #7980)
  • Touchpad: enable tap-to-click, 2-fingers scrolling, and disable while typing. (ticket #7779)
  • Support Vietnamese input in IBus. (ticket #7999)
  • Improve support for OpenPGP smartcards. (ticket #6241)

What is new in version 1.2.3:

  • Security fixes:
  • Upgrade to Linux 3.16.7-ckt2-1.
  • Upgrade to Tor Browser 4.0.3 (based on Firefox 31.4.0esr) (ticket #8700).
  • Improve MAC spoofing fail-safe mechanisms, which includes preventing one more way the MAC address could be leaked. (ticket #8571).
  • Disable upgrade checking in the Unsafe Browser. Until now the Unsafe Browser has checked for upgrades of the Tor Browser in the clear (ticket #8694).
  • Bugfixes:
  • Fix startup of the Unsafe Browser in some locales (ticket #8693).
  • Repair the desktop screenshot feature (ticket #8087).
  • Do not suspend to RAM when closing the lid on battery power (ticket #8071).
  • Properly update the Tails Installer's status when plugging in a USB drive after it has started (ticket #8353).

Similar Software

slint
slint

28 Sep 15

Maui
Maui

17 Feb 15

Other Software of Developer Incognito Team

Tails
Tails

11 Apr 16

Comments to Tails OS

1 Comments
  • Peter 8 Aug 17
    Dobrý deň,
    chcem sa opýtať, stiahol som nový linux Tails 3.0.1 ale vmware mi to nespusti lebo je 64bit. Používam windows 64 bit. Takže nerozumiem prečo nechce spustiť. Ďakujem
Add Comment
Turn on images!