E' una 1.0 non perche contenga novita' incredibili, ma e' il
riconoscimento che TAILS e' cosi' matura, stabile, professionale
 ed insostituibile da essere ormai mainstream.

La novita' piu' interessante, in mezzo a varie cosette che potete
 leggervi qui sotto, e' secondo me l'autoaggiornamento di Tails
 a runtime ed attraverso Tor stesso. 
Lento, ma funziona perfettamente e salva la partizione criptata.

Enjoy

-------- Forwarded Message --------
From: Tails - News <[email protected]>
Reply-to: [email protected]
To: [email protected]
Subject: [tails-news] Tails 1.0 is out
Date: Tue, 29 Apr 2014 10:00:00 -0000

Tails, The Amnesic Incognito Live System, version 1.0, is out.

All users must 
[upgrade](https://tails.boum.org/news/../doc/first_steps/upgrade/index.en.html) 
as soon as possible: this release fixes [numerous security 
issues](https://tails.boum.org/news/../security/Numerous_security_holes_in_0.23/index.en.html).

# Introduction

We are especially proud to present you Tails 1.0!

Version 1.0 is often an [important 
milestone](https://en.wikipedia.org/wiki/Version%5Fnumber%23Version%5F1%2E0%5Fas%5Fa%5Fmilestone)
 that denotes the maturity of a free software project. The first public version 
of what would become Tails was released on June 23 2009, when it was called 
[Amnesia](https://tails.boum.org/news/./version_0.2/index.en.html). That was 
almost five years ago. Tails 1.0 marks the 36th stable release since then.

## Achievements

We have been working since then on the many features we think are essential 
both in terms of security and usability:

  * [USB 
installer](https://tails.boum.org/news/../doc/first_steps/installation/index.en.html)
  * [automatic 
upgrades](https://tails.boum.org/news/../doc/first_steps/upgrade/index.en.html)
  * 
[persistence](https://tails.boum.org/news/../doc/first_steps/persistence/index.en.html)
  * [support for Tor 
bridges](https://tails.boum.org/news/../doc/first_steps/startup_options/bridge_mode/index.en.html)
 and other [special Tor 
configuration](https://tails.boum.org/news/../doc/first_steps/startup_options/network_configuration/index.en.html)
  * [MAC address 
spoofing](https://tails.boum.org/news/../doc/first_steps/startup_options/mac_spoofing/index.en.html)
  * [extensive and translated 
documentation](https://tails.boum.org/news/../doc/index.en.html)
  * and [many 
more...](https://tails.boum.org/news/../doc/about/features/index.en.html)

But this has been a continuous work over the past years, and you will see that 
1.0 itself does not bring a lot of effective changes for the user. Still, to 
mark the occasion, we integrated our [new 
logo](https://tails.boum.org/news/./and_the_winner_is/index.en.html) on the 
website and the boot menu.

## Thank you

The maturity of Tails is also reflected in:

  * Its wide adoption. In the last 18 months, the approximate number of Tails 
users has been multiplied by 4.
  * All the good things said about Tails by people and organisations that we 
appreciate such as [Freedom of the Press 
Foundation](https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa),
 [Bruce 
Schneier](http://boingboing.net/2013/12/15/bruce-schneier-and-eben-moglen-2.html),
 [Reporters Without 
Borders](https://www.wefightcensorship.org/article/tails-amnesic-incognito-live-systemhtml.html),
 [the 
NSA](http://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity)
 and [many more...](https://tails.boum.org/news/../press/index.en.html)

## Future

Version 1.0 does not mean that we will stop adding new features and improving 
Tails. Briefly, here are our plans for the future:

  * [Tails 1.1](https://labs.riseup.net/code/projects/tails/roadmap#Tails_1.1), 
due in June 2014, will be based on Debian 7 (Wheezy) and will bring many new 
versions of the software included in Tails.

  * [Tails 2.0](https://labs.riseup.net/code/projects/tails/roadmap#Tails_2.0) 
will focus on sustainability and maintainability. Most of that work aims at 
reducing the workload of creating new versions of Tails through infrastructure 
improvements and automated testing. Our objective is to be able to release 
same-day security updates.

  * [Tails 3.0](https://labs.riseup.net/code/projects/tails/roadmap#Tails_3.0) 
will focus on changes in the internals of Tails to make it more secure. That 
includes sandboxing critical applications and software hardening.

And of course, new contributors with all kinds of skills are always welcome. 
There is surely [something **you** can 
do](https://tails.boum.org/news/../contribute/index.en.html) to make Tails 
better.

# Changes

Notable user-visible changes include:

  * Security fixes

    * Upgrade the web browser to 24.5.0esr-0+tails1~bpo60+1 (Firefox 24.5.0esr 
+ Iceweasel patches + Torbrowser patches).
    * Upgrade Tor to 0.2.4.21-1+tails1~d60.squeeze+1: 
      * Based on 0.2.4.21-1~d60.squeeze+1.
      * Backport the fix for [bug #11464 on Tor Project's 
Trac](https://trac.torproject.org/projects/tor/ticket/11464). It adds 
client-side blacklists for all Tor directory authority keys that was vulnerable 
to Heartbleed. This protects clients in case attackers were able to compromise 
a majority of the authority signing and identity keys.
  * Bugfixes

    * Disable inbound I2P connections. Tails already restricts incoming 
connections, but this change tells I2P about it.
    * Fix link to the system requirements documentation page in the Tails 
Upgrader error shown when too little RAM is available.
  * Minor improvements

    * Upgrade I2P to 0.9.12-2~deb6u+1.
    * Import TorBrowser profile. This was forgotten in Tails 0.23 and even 
though we didn't explicitly set those preferences in that release they 
defaulted to the same values. This future-proofs us in case the defaults would 
ever change.
    * Import new custom version of Tor Launcher: 
      * Based on upstream Tor Launcher 0.2.5.3.
      * Improve how Tor Launcher handles incomplete translation. ([bug #11483 
on Tor Project's Trac](https://trac.torproject.org/projects/tor/ticket/11483); 
more future-proof fix for [ticket 
#6885](https://labs.riseup.net/code/issues/6885))
      * Remove the bridge settings prompt. ([bug #11482 on Tor Project's 
Trac](https://trac.torproject.org/projects/tor/ticket/11482); closes [ticket 
#6934](https://labs.riseup.net/code/issues/6934))
      * Always show bridge help button. ([bug #11484 on Tor Project's 
Trac](https://trac.torproject.org/projects/tor/ticket/11484))
    * Integrate the new Tails logo into various places: 
      * The website
      * The boot splash
      * The "About Tails" dialog

See the [online 
Changelog](https://git-tails.immerda.ch/tails/plain/debian/changelog) for 
technical details.

# Known issues

  * 
[Longstanding](https://tails.boum.org/news/../support/known_issues/index.en.html)
 known issues.

# I want to try it or to upgrade!

Go to the [download](https://tails.boum.org/news/../download/index.en.html) 
page.

As no software is ever perfect, we maintain a list of [problems that affects 
the last release of 
Tails](https://tails.boum.org/news/../support/known_issues/index.en.html).

# What's coming up?

The next Tails release is 
[scheduled](https://tails.boum.org/news/../contribute/calendar/) for June 10.

Have a look to our 
[roadmap](https://labs.riseup.net/code/projects/tails/roadmap) to see where we 
are heading to.

Would you want to help? There are many ways [**you** can contribute to 
Tails](https://tails.boum.org/news/../contribute/index.en.html). If you want to 
help, come talk to us!

URL: https://tails.boum.org/news/version_1.0/index.en.html
_______________________________________________
amnesia-news mailing list
[email protected]
https://mailman.boum.org/listinfo/amnesia-news
To unsubscribe from this list, send an empty email to 
[email protected].




________________________________________________________
http://www.sikurezza.org - Italian Security Mailing List

Rispondere a