;$@"; do
if [ "$arg" = "-x" ]; then
# If -x is found, use torsocks to execute cURL
exec /usr/bin/torsocks --isolate /usr/bin/curl "$@"
fi
done
# If no -x option is provided, just execute cURL with the ALL_PROXY IPv6
support
exec /usr/bi
Boots in August: 407781
Downloads of the OpenPGP signature in August: 1741
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr
Boots in August: 359761
Downloads of the OpenPGP signature in August: 1859
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr
Hello,
If you know someone who's interested in development, I've been maintaining an
arm64 port of Tails since v6.0 at
https://gitlab.tails.boum.org/noisycoil/tails. The generic implementation
(wip/arm64 branch) is only expected to work on arm64 VMs. Two concrete
implement
ot;If you had one shot or one opportunity
To seize everything you ever wanted in one moment
Would you capture it
Or just let it slip?" - Eminem
Atenciosamente,
Emerson.
Enviado com o e-mail seguro de [Proton Mail](https://proton.me/).___
Tails-dev ma
> On 8/20/24 21:25, David A. Wheeler wrote:
>> Tails currently swaps to "zram". This is a swap device in *RAM*. It works by
>> compressing the memory before swapping it to zram. It's never written to
>> a permanent storage device, so there are no fundamental
This is themes that are sourced for kali undercover-mode and the source
states that it does work on GNOME as well as XFCE. I have yet to test it
on GNOME but if it does work I could assume "camouflage" mode that was
in previous older versions of tails could be reintroduced as featur
On 8/20/24 21:25, David A. Wheeler wrote:
Tails currently swaps to "zram". This is a swap device in *RAM*. It works by
compressing the memory before swapping it to zram. It's never written to
a permanent storage device, so there are no fundamental impacts;
Ok, thanks that i
> On Aug 20, 2024, at 3:53 PM, Kenneth Morris via Tails-dev
> wrote:
>
> Someone mentioned to me that tails now has a page file or swap partition.
> Why does tails include a swap and doesn’t this defeat the purpose of
> anti-forensics?
> I have used tails to edit files
Someone mentioned to me that tails now has a page file or swap partition.
Why does tails include a swap and doesn’t this defeat the purpose of
anti-forensics?
I have used tails to edit files on external drive and don’t remember
anything about worrying about files swapping onto the external
> On Aug 15, 2024, at 6:32 PM, AW wrote:
>
> uptime command could be used by attacker to see how long they were on tails
> for if they gained root. I don't see the need for this command since tails is
> not a server.
I don't see any value in removing this function
> On Aug 12, 2024, at 9:31 PM, sajolida wrote:
>
>> Enviar mais tarde seria algo que poderia ser incluído em versões futuras?
>> É um complemento, mas o código-fonte está online e não parece ser
>> prejudicial, pelo que sei. Tails já vem com origem ublock com naveg
Boots in July: 598388
Downloads of the OpenPGP signature in July: 2668
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr
Boots in July: 180874
Downloads of the OpenPGP signature in July: 924
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.
Dear all,
Congrats on the new release. arm64 builds are in the MEGA directory. Nothing
special this month, I only upgraded the Asahi kernel to v6.9.8 and ported some
recent test changes to arm64.
Cheers,
NoisyCoil
___
Tails-dev mailing list
Tails
ase let me help you with the
Turkish translation___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.
Boots in June: 775377
Downloads of the OpenPGP signature in June: 3670
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr
Dear all,
Congratulations on the new release! As usual, I uploaded the arm64 builds to
MEGA.
The only relevant news this month is Tails Asahi v6.4 comes with Linux v6.8.11,
which means that for the first time Tails is on par with Fedora Asahi in terms
of Apple Silicon hardware support
Hi,
anonym will be the RM for Tails 6.5
The current plan is:
- Monday, July 15th: build images, start testing
- Tuesday, July 16th: releasing
@testers, please let the RM know how much time you'll have for manual QA
from Monday 17:00 to Tuesday 11:00 (Europe/B
Boots in May: 824834
Downloads of the OpenPGP signature in May: 4165
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.
Hey all,
I'm really unsure if this is the right place for this question, but it didn't
fit in any other categories. Feel free to point me in the right direction if
this is the wrong place.
So, I want to sign tails with my own keys since I have enrolled my own secure
boot keys. I si
Hello Hamun,
as a native german and english speaker I noticed, that the tails
website is partly translated incorrectly and partly not translated at
all. I would love to make a contribution to translating the whole page
in german. For free of course. If you are interested in this, don`t
hesitate
Dear all,
Congratulations on the 6.3 release! The arm64 builds are in the usual MEGA
directory; I pushed the 6.3-{arm64,asahi,raspi} tags (6.3/{arm64,asahi,raspi}
branches) to my repository a couple of hours ago.
Tails Asahi v6.3 comes with Linux v6.6. This is the latest version of the
kernel
Health!
I use installation Tails from USB stick "Tails only (for USB sticks)"
I have "Network Connection" type
DSL/PPPoE
DSL Connection
Up to version Tails 5.22 an internet connection could be established using the below method.
-
nmcli
, I'll come back to
RPi in a moment.
Recently, I came across this issue:
https://gitlab.tails.boum.org/tails/tails/-/issues/20347. Starting from v6.6 of
Debian's linux kernel, the kernel modules will be compressed using xz, and as a
result two build-time hooks (plus one initramfs
at the end. The USB installs Tails
partially (you can't use the USB anymore) but can't run it.
Cheers___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empt
om my part
which merit early sharing, I will only upload pre-built images on new Tails
point releases (uploading takes quite some time and a single upload of 2x3
images takes away around half my available space).
In general, only images built on tagged commits are reproducible. In case you
don
: [PATCH] Refresh uBlock-disable-autoUpdate.diff
---
.../usr/share/tails/uBlock-disable-autoUpdate.diff | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/config/chroot_local-includes/usr/share/tails/uBlock-disable-autoUpdate.diff b/config/chroot_local-includes/usr/share/tail
anges to wip/*) until the 6.2
release, at which point I will freeze them.
Best,
NC
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-uns
Hi n9iu7pk,
I can confirm that everything's still alright with DNS redirection. I can
successfully get the build to the point where it installs the debian packages
on 6.1/raspi. The error you see is typical of when you're trying to install the
packages from the original Tails rep
^/[0-9.]+(/?.*) http://deb.debian.org$1;
location ~
^/(debian|debian-security|tails|torproject)/project/trace/(debian|debian-security|tails|torproject)
{
proxy_pass http://204.13.164.63:80;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy
x27;s been
building arm64 releases for years now)
- my fork of Heikki Lindholm's repository:
https://gitlab.com/NoisyCoil/tor-browser-build (very similar to the above
except for minor technical differences; this is the one which I use for the
13.0.x series in the Tails images)
-
se to trust me. What you can do
to trust the images is building them yourself from source after reviewing the
latter. Building the generic arm64 and Raspberry images is fairly easy
(although it will take some time and you will need to hack your own DNS
resolution to redirect from the Tails d
problem by the way.
31 mar 2024, 13:40 da ano...@riseup.net:
> On 29/03/2024 20.53, NoisyCoil via Tails-dev wrote:
>
>> en passing, to whoever caused the 6.1 retagging fuzz, I lost a full day
>> of testing work because of that, I hate you. Kidding <3
>>
>
> Actual
Hi n9iu7pk,
I had no issues rebuilding the Tails packages for arm64 from the source
packages in the Tails debian repository, at least for the very few packages
that are currently there. If I had modified the sources I think I would have
remembered (and I would have published the modified
Dear all,
I rebased the arm64 patches onto v6.1, marking the first build of the Tails for
arm64 developer preview that's aligned with a stable release (you can find the
images in the usual MEGA shared folder). In addition to the rebase, there are a
number of new additions to the patchset
Hi,
Anonym will be the RM for Tails 6.2
The current plan is:
- Monday, April 22nd: build images, start testing
- Tuesday, April 23rd: releasing
@testers, please let the RM know how much time you'll have for manual QA
from Monday 17:00 to Tuesday 11:00 (Europe/Berlin)
Cheers,
gr
*Tails report for February 2024* <https://tails.net/news/report_2024_02/>
Highlights
Despite the bonus day this year, February flew by pretty quickly! Here's
what we were up to:
*
We ended February more resilient and collaborative than when we
started. We have new tool
Hey,
> We have no yet decided who will be the RM for Tails 6.1.
That will be me!
> The current plan is:
> - Monday, 2024-03-25: build images, start testing
> - Tuesday, 2024-03-26: releasing
This is still the plan.
The code freeze starts on Mon Mar 25 06:00:00 UTC 2024, and w
unning the image on a RPi5, then you could as well build it there
(unless you have a good reason not to). This is what I am doing right now, as
natively building Tails on a 8GB RPi5 is MUCH faster than building it on a
16-core 32-threads 64GB AMD machine. I'm talking 1.5hr tops (often less) on
Hello, dear contributors!
You may all be affected by this and may not be notified in other ways,
so I decided to post here:
E-mails from our GitLab are not being delivered correctly
https://gitlab.tails.boum.org/tails/sysadmin/-/issues/18071
Big thanks for your time, efforts and
ld
first focus on if and how to bring Tails on arm64 :-)
NC
_______
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.
> - It would double the size of the image, uselessly or almost so for most users
This is unlikely. The uncompressed `/usr/share` folder in Tails is 1.2 GB this
is architecture independent data.
https://refspecs.linuxfoundation.org/FHS_3.0/fhs/ch04s11.html
The total unsquashed size is 4.1
!)
images. Although I believe literally no distribution in human history has
attempted something like this, I think that, paradoxically, building an
arm64+x86_64 live image of Tails might be easier than building an image that
works properly on two arm64 platforms with conflicting software requirement
> On Feb 18, 2024, at 9:03 AM, NoisyCoil via Tails-dev
> wrote:
> TLDR; All Tails-specific apps now work on arm64 (with two minor "not-my-bug"
> caveats). You can now cross-build Tails for arm64 on an x86_64 machine.
I think it'd be nice to have an ARM version
Dear all,
I have some exciting news.
TLDR; All Tails-specific apps now work on arm64 (with two minor "not-my-bug"
caveats). You can now cross-build Tails for arm64 on an x86_64 machine.
First, as of my last commits, Tails Cloner now works on all my arm64 branches.
This means that
I've already rebuilt them all for arm64! They are inside
config/chroot_local-packages so they will get installed automatically in the
image.
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-d
pointing your DNS resolver to Debian's servers is not enough.
Tails's repository (at least for branches based on devel) is also queried to
fetch the timestamp of the most recent snapshot to be used, so you must
redirect both to Debian AND to Tails depending on the URL. To do so, yo
y
blocking Tutamail). So, if you want an answer, write from a different email
please :-)
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.
Hi there!
TLDR; Not much has changed in the last 7 years probably. I think that thanks to
the Asahi project Tails will be able to run on Apple Silicon on stock Debian
packages in the foreseeable future (and with far better support than x86_64
Apple has received until now). Maintaining a
# [Test Tails 6.0~rc1](https://tails.net/news/test_6.0-rc1/)
We are very excited to present you a release candidate of the upcoming Tails
6.0.
We plan to release Tails 6.0 officially on February 27. You can help us by
testing already a release candidate of Tails 6.0 before February 18.
Tails
# [Tails 5.22](https://tails.net/news/version_5.22/index.en.html)
# New features
* In _Tor Browser_ , you can now save files to more folders: Documents,
Downloads, Music, Pictures, and Videos. You can also upload files from these
folders.
* When your Persistent Storage is broken, Tails
Hey there,
Thank you! I actually maintain my own private fork of Heikki Lindholm's arm64
Tor Browser, but in the arm64 port of Tails I included Lindholm's own builds
because those have been around for years now and are definitely more trusted
than mine. They work perfectly, are well
*** For the casual reader: please do not use this version of Tails. This is
just a developer preview, it won't protect you like official releases do ***
Hey there,
During the last few weeks I've been working on porting Tails to the arm64
architecture, with the aim to ultimately bei
Resending this so it reaches the whole mailing list.
---
*** For the casual reader: please do not use this version of Tails. This is
just a developer preview, it won't protect you like official releases do ***
Hi David,
At https://mega.nz/folder/BrJFGQyR#8rsN06I_pC_YV6spqATeBA you will
*** For the casual reader: please do not use this version of Tails. This is
just a developer preview, it won't protect you like official releases do ***
Hey there,
During the last few weeks I've been working on porting Tails to the arm64
architecture, with the aim to ultimately bei
Tails report for December 2023 <https://tails.net/news/report_2023_12/>
Happy 2024, Tails-y folks! We wish you a year full of nourishing
energies, forceful resistance, and great health ✊🏽
Highlights
*
2023 was an eventful year at Tails. We kicked off the 1st year of
our
Hi,
I guess I don't have write access to the repo, so I can not create a MR...
So I will do as stated on your website:
"
"You can submit small, easy changes as Git patches (prepared with the git
format-patch command) over email to
[tails-dev@boum.org](https://tails.ne
# [Tails 5.21](https://tails.net/news/version_5.21/index.en.html)
# Changes and updates
* Help troubleshoot when resizing the system partition fails the first time
Tails is started.
![Error message: Resizing System Partition Failed - It will be impossible to
create a Persistent Storage or
# [2023 at Tails: a new home, small steps, and giant
leaps](https://tails.net/news/achievements_in_2023/index.en.html)
**Malicious actors upped the ante in 2023.**
So-called artificial intelligence systems soared in popularity, supercharging
political [disinformation](https://www.wired.com/story
Hello, I sent a message ten days ago and never got a response. Is this a good
email to ask about technical issues?___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an
Hello :)
*
Tails report for November 2023 <https://tails.net/news/report_2023_11/>*
Highlights
*
We had asked Radically Open Security
<https://www.radicallyopensecurity.com/> to audit Tails. The results
of the audit <https://tails.net/news/audit_by_ROS/index.en.html
e the second part would have to
be [26ae] then the rest (10) randomized.
[0-9a-f][26ae]:00:00:00:00:00
echo $(/usr/bin/tr -dc a-f0-9 https://proton.me/) secure email._______
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/list
Tor Browser pings tails.net every time the browser is launched.
This could lead to fingerprinting tails users more on a circuit.
Tca from my understanding already sends requests to tails.net every time tails
is booted to check for updates and for feedback to understand how many people
are
Hi, I have tried for some time to find a working answer to this issue - to no
avail.
The issue is that I want to be able to leave tails running various processes
when I close the lid of my laptop, or turn off my monitor, or simply leave it
untouched for a while. There doesn't seem to be
# [Tails 5.19.1](https://tails.boum.org/news/version_5.19.1/index.en.html)
This release is an emergency release to fix an important security
vulnerability in Tor.
# Changes and updates
* Update the _Tor_ client to 0.4.8.9, which fixes the TROVE-2023-006
vulnerability.
The details of TROVE
# [Security audit of Persistent Storage and Tor
integration](https://tails.boum.org/news/audit_by_ROS/index.en.html)
In March 2023, [Radically Open
Security](https://www.radicallyopensecurity.com/) conducted a security audit
on the major improvements that we released in [Tails
5.8](https
Hi there,
Firstly sincere apologies if this is the wrong way to go about this.
I wasn't able to create a Gitlab account anonymously to post a request there.
I have a feature request for Tails 6.0 (or roadmap) I hope merits discussion:
It would be ideal for Tails to replace the "Unlock
# [Tails 5.19](https://tails.boum.org/news/version_5.19/index.en.html)
# New features
## Closing a Tor circuit from _Onion Circuits_
You can now close a given Tor circuit from the _Onion Circuits_ interface.
This can help replace a particularly slow Tor circuit or troubleshoot issues
on the Tor
# [Make the gift of
privacy!](https://tails.boum.org/news/gift_of_privacy/index.en.html)
With malicious actors' intrusions into human rights growing in sophistication
and scale, Tails offers hope for those seeking refuge in a more secure digital
environment. We stand on the precipice of a f
Hello, I'd like to share my interest on joining the Turkish translation team
for the tails project. I've worked on and contributed to many Open source
projects, games and have worked under professional settings.
publickey - EmailAddress(s=efemertkara06@proton.me) - 0x4255D998.asc
D
.___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.
Dear developers,
I cannot check my email accounts in email.cz, yahoo, gmail.com because they
refuse Tor browsers (Robot detected).
For this reason, please add a standard Firefox to Tails to check email accounts.
Sincerely,
Tails user___
Tails-dev
# [Tails 5.16.1](https://tails.boum.org/news/version_5.16.1/index.en.html)
This release is an emergency release to fix a critical vulnerability in the
_Linux_ kernel.
# Changes and updates
* Update the _Linux_ kernel to 6.1.38.
This updates fixes:
* [Downfall](https://downfall.page/) on
dear tails developers,
i'm emailing yaw just to let yaw know that yaw did a really great job on
devevolping tails, it's nice to have it installed on a USB so i can be
able to go online without being harrased by constant ads, i want to thank
yaw for the hard work, because tails is the bes
# [Tails 5.15.1](https://tails.boum.org/news/version_5.15.1/index.en.html)
# Changes and updates
* Update _Tor Browser_ to
[12.5](https://blog.torproject.org/new-release-tor-browser-125).
[Tor Browser 12.5](https://blog.torproject.org/new-release-tor-browser-125)
has a new circuit view and
Hello! Below is an update of the move to tails.net.
"Tails Sysadmins" writes:
> Hello, dear Tails contributors!
>
> Last year we acquired the "tails.net" domain and, since then, we started
> taking incremental steps to implement it throughout the Tails OS and
# [Tails 5.14](https://tails.boum.org/news/version_5.14/index.en.html)
# New features
## Automatic migration to LUKS2 and Argon2id
The cryptographic parameters of LUKS from Tails 5.12 or earlier are weak
against a state-sponsored attacker with physical access to your device.
To use stronger
Hello, dear Tails contributors!
Last year we acquired the "tails.net" domain and, since then, we started
taking incremental steps to implement it throughout the Tails OS and
infra[1][2].
We'd like to announce two big changes on this front:
- Tails 5.14 (just released a few
# [Improving Tails for human rights defenders in Latin
America](https://tails.boum.org/news/improving_in_latam/index.en.html)
Between 2021 and 2023 Tails, [Tor](https://torproject.org/), and the [Guardian
Project](https://guardianproject.info/) partnered to organize training and
usability tests
--
config/chroot_local-includes/usr/share/tails/tca/main.ui.in | 2 +-
po/tails.pot| 2 +-
wiki/src/doc/anonymous_internet/tor.mdwn| 4 ++--
3 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/config/chroot_local-includes/usr/s
# [Tails 5.12 is out](https://tails.boum.org/news/version_5.12/index.en.html)
# New features
## Data deletion when deactivating a feature of the Persistent Storage
After you turn off a feature of the Persistent Storage, you can now click the
**Delete Data** button to delete the data stored for
# [Tails 5.11 is out](https://tails.boum.org/news/version_5.11/index.en.html)
# New features
* Tails now uses the [`zram` Linux kernel
module](https://en.wikipedia.org/wiki/Zram) to extend the capacity of the
computer's memory.
You can run more applications or use your session for l
# [Tails 5.10 is out](https://tails.boum.org/news/version_5.10/index.en.html)
# Changes and updates
* Update _Tor Browser_ to
[12.0.3](https://blog.torproject.org/new-release-tor-browser-1203).
* Ask for confirmation when starting without unlocking the Persistent Storage.
![Do you really
SGX is unsecure
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.
Hi I’m new to tails and am having some trouble? A. It won’t connect to Wi-Fi
with the right password I dk why? Connects to my phone hotspot fine though. B.
I can’t find anything about the clip board icon that’s supposed to be on the
top menu bar for pgp keys, I’ve searched for how to do it but
Hello, I've decided to forward my unanswered query to the public mailing list.
Tails developers and Tails Foundations team, please check this. I welcome
opinion from anyone though.
Thank you in advance.
(I sent this a few days ago, and saw new mail appear
[here](https://lists.autistici.org
Hi there,
If an adversary controls all three hops in a tor circuit. Will my traffic still
be private?
Thank you.
Best regards
Jakob Brannstrom___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To
Dear sirs and ladies!
Please, if I have questions about the tor hops and circuits, whom would you
direct me to?
Thank you.
Best regards
Jakob Brannstrom___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
Hi Tails thank you for your hard work for freedom it's been more then 4 years
we use Tails and donated too. recently in Iran we faced heavy censorship
because we the people of Iran fight for (woman) freedom life in Iran and the
great Dictator decided to ban the internet so we can't
# [Tails 5.8 is out](https://tails.boum.org/news/version_5.8/index.en.html)
Tails 5.8 is the most important release of Tails in years. It includes both
major redesign of existing features, important usability improvements, and
hardened security.
This work has been made possible by donations from
By any change would y'all add [pass](https://www.passwordstore.org/)___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
tails-dev-unsubscr...@boum.org.
Dear Tails Boum.
## Request to update existing KeepassXC to a Later Version.
Issue I'm having is the Version of KeepassXC included in the latest Releases is
just one version too old (it's from *Oct 22, 2020*)
I'd like to natively open Keepass 2 (.KDBX Databases.)
This option
# [Test the new Persistent Storage and Wayland
support](https://tails.boum.org/news/test_5.8-beta1/)
We are extremelly proud to present you a beta of 2 new major features of
Tails: a complete redesign of the Persistent Storage and the migration to
Wayland, which brings a better _Unsafe Browser_
I downloaded the Tails iso in order to run Tails as a virtual machine. What
version of Debian Linux does Tails currently use?
V/R,
Race Jones
702-265-5826
Sent with [Proton Mail](https://proton.me/) secure email.___
Tails-dev mailing list
Tails-dev
# [Tails 5.6 is out](https://tails.boum.org/news/version_5.6/index.en.html)
# Changes and updates
* Update _Tor Browser_ to
[11.5.5](https://blog.torproject.org/new-release-tor-browser-1155).
* Update the _Linux_ kernel to 5.10.149. This should improve the support for
newer hardware
# [Tails 5.5 is out](https://tails.boum.org/news/version_5.5/index.en.html)
# Changes and updates
This section will be updated soon. Sorry for the inconvenience!
# Known issues
Recently, a [serious kernel vulnerability](https://lwn.net/Articles/911062/)
has been discovered in the Linux kernel
g it enabled in Debian by default would indeed by sweet. Do you
have a link to the bug you opened intrigeri?
o/
_______
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an e
Hi, if I connect to VPN first then start Tor browser with javascript enabled to
visit a clearnet website, can javascript see my true IP address? Thanks
Sent with [Proton Mail](https://proton.me/) secure email.___
Tails-dev mailing list
Tails-dev
Hi there
I am writing to find out if tails is a safe platiform to use for political
activists or dissidents? I am not an expert on the Tails system itself but I
did some research and came accross an article that said Tails was compromised
by Facebook by exploiting a vulnerability in the video
1 - 100 of 591 matches
Mail list logo