[Cyber-rights] [Fwd: [amnesia-news] Tails 0.10 is out]

maxino skizzo at autistici.org
Thu Jan 5 20:59:27 CET 2012


Il 05/01/2012 09:16, Marco Calamari ha scritto:
> E' uscita una nuova versione di TAILS.
> 
> Tail e' una Debian live in cui tutto in traffico di rete
>  viene rediretto attraverso Tor, e che contiene i principali
>  applicativi per la privacy in Rete gia' correttamente
>  installati. E' distribuita come immagine iso ibrida,
>  che puo' essere indifferentemente masterizzata su un
>  cd o copiata su una chiavetta USB non partizionata.
> 
> Enjoy
> 
> -------- Forwarded Message --------
> From: Tails - News <rss at boum.org>
> Reply-to: amnesia at boum.org
> To: amnesia-news at boum.org
> Subject: [amnesia-news] Tails 0.10 is out
> Date: Wed, 04 Jan 2012 00:23:45 -0000
> 
> The Amnesic Incognito Live System, version 0.10, is out.
> 
> All users must upgrade as soon as possible.
> 
> # Changes
> 
> Notable user-visible changes include:
> 
>   * Tor: upgrade to 0.2.2.35-1.
> 
>   * Iceweasel
> 
>     * Install Iceweasel 9.0 from the Debian Mozilla team's APT repository.
>     * Update Torbutton to 1.4.5.1-1.
>     * Support viewing any YouTube video that is available in HTML5 format.
>     * Use Scroogle (any languages) instead of Scroogle (English only) when booted in English. Many users choose English because their own language is not supported yet; let's not hide them search results in their own language.
>     * Install the NoScript Firefox extension; configure it the same way as the TBB does.
>     * Disable third-party cookies. They can be used to track users, which is bad. Besides, this is what TBB has been doing for years.
> 
>   * Do not transparently proxy outgoing Internet connections through Tor. Instead drop all non-Torified Internet traffic. Hence applications has to be explicitly configured to use Tor in order to reach the Internet from now on.
> 
>   * Software
> 
>     * Upgrade Vidalia to 0.2.15-1+tails1. This version will not warn about new Tor versions (this is handled by Tails security check instead).
>     * Upgrade MAT to 0.2.2-1~bpo60+1.
>     * Upgrade VirtualBox guest software to 4.1.6-dfsg-2~bpo60+1, built against the ABI of X.Org backports.
>     * Upgrade I2P to 0.8.11; the start script (which was broken in Tails 0.9) is now fixed.
>     * Install unar (The Unarchiver) instead of the non-free unrar.
>     * [Install Nautilus Wipe][1] instead of custom Nautilus scripts.
> 
>   * Hardware support
> 
>     * Upgrade Linux kernel to 3.1.6-1.
>     * Upgrade to X.Org from squeeze-backports.
>     * Install more, and more recent b43 firmwares.
>     * Upgrade barry to 0.15-1.2~bpo60+1.
> 
>   * Internationalization
> 
>     * Add basic language support for Russian, Farsi and Vietnamese.
>     * Install some Indic fonts.
>     * Install some Russian fonts.
>     * Add Alt+Shift shortcut to switch keyboard layout.
> 
>   * Miscellaneous
> 
>     * Support booting in "[Windows XP-like camouflage mode][2]".
>     * Do not fetch APT translation files. Running apt-get update is heavy enough.
>     * Add MSN support thanks to msn-pecan.
>     * Add custom SSH client configuration: 
> 
>       * Prefer strong ciphers and MACs.
>       * Enable maximum compression level.
>       * Explicitly disable X11 forwarding.
>       * Connect as root by default, to prevent fingerprinting when username was not specified.
> 
>     * Replace flawed FireGPG with a home-made GnuPG encryption applet; install a feature-stripped FireGPG that redirects users to [the documentation][3], and don't run Seahorse applet anymore.
>     * Blank screen when lid is closed, rather than shutting down the system. The shutdown "feature" has caused data losses for too many people, it seems. There are many other ways a Tails system can be shut down in a hurry these days.
>     * Fix bug in the Pidgin nick generation that resulted in the nick "XXX_NICK_XXX" once out of twenty.
>     * Pre-configure the #tor IRC discussion channel in Pidgin.
>     * Reintroduce the htpdate notification, telling users when it's safe to use Tor Hidden Services.
>     * Various htpdate improvements.
> 
> Plus the usual bunch of minor bug reports and improvements.
> 
> See the [online Changelog][4] for technical details.
> 
> # I want to try it / to upgrade!
> 
> See the [Getting started][5] page.
> 
> # Known issue
> 
> The memory erasure on Tails shutdown cannot guarantee that all memory in the 2 GB to 4 GB region is wiped. The improvements made in Tails 0.10 should at least make the situation better than previously.
> 
> # A glimpse towards the future
> 
> Were do we go from here? Have a look to our [roadmap][6] to see where we are heading to.
> 
> Would you want to help? As explained in our ["how to contribute" documentation][7], here are many ways **you** can contribute to Tails: no need to be a hardcore developer.
> 
>    [1]: https://tails.boum.org/news/../doc/encryption_and_privacy/secure_deletion/index.en.html
>    [2]: https://tails.boum.org/news/../doc/first_steps/windows_theme/index.en.html
>    [3]: https://tails.boum.org/news/../doc/encryption_and_privacy/FireGPG_susceptible_to_devastating_attacks/index.en.html
>    [4]: http://git.immerda.ch/?p=amnesia.git;a=blob_plain;f=debian/changelog;hb=refs/tags/0.10
>    [5]: https://tails.boum.org/news/../getting_started/index.en.html
>    [6]: https://tails.boum.org/news/../contribute/roadmap/
>    [7]: https://tails.boum.org/news/../contribute/index.en.html
> 
> URL: https://tails.boum.org/news/version_0.10/
> _______________________________________________
> amnesia-news mailing list
> amnesia-news at boum.org
> https://mailman.boum.org/listinfo/amnesia-news
> 
> 
> 
> 
> 
> _______________________________________________
> Cyber-rights mailing list
> Cyber-rights at lists.ecn.org
> http://lists.ecn.org/mailman/listinfo/cyber-rights


Ciao scusate l'OT ma vorrei sapere, come da mail di un mese fa e più se
sono stato "segnato" per la versione cartacea di Kryptonite (e quindi
come fare per riceverlo)...

Ne approfitto per chiedervi se debian TAILS, che ho provato con
soddisfazione, secondo voi sia buono installarlo (o comunque partendo da
una Debian testing farne una distro simile) oppure è assolutamente da
usare come liveCD.
Scusate se forse faccio confusione ma mi sembra di aver capito che uno
dei motivi per cui questa distro è "buona" per la privacy/no_cntrl sia
data dal fatto che le operazioni sul PC vengono svolte solo dalla
memoria RAM

Tia

-- 
"Dovreste avere dei documenti per provare chi siete", mi ammonì l'agente
di polizia.
Risposi:"Non ho bisogno di documenti. Io so chi sono".
(B. Traven)


More information about the Cyber-rights mailing list