On July 3, 2014, German public television channel Das Erste reported that the NSA's XKeyscore surveillance system contains definitions that match persons who search for Tails using a search engine or visit the Tails website. A comment in XKeyscore's source code calls Tails "a comsec mechanism advocated by extremists on extremist forums".
On December 28, 2014, Der Spiegel published slides from an internal NSA presentation dating to June 2012 in which the NSA deemed Tails on its own as a "major threat" to its mission, and when used in conjunction with other privacy tools such as OTR, Cspace, RedPhone, and TrueCrypt was ranked as "catastrophic," leading to a "near-total loss/lack of insight to target communications, presence..."
Tor with: Stream isolation, regular and obfsproxy bridges support, the Vidalia graphical frontend.
Added additional operating system and data security to The Tor Browser.
Made the obfs4 pluggable transport available to connect to Tor bridges.
Installed Keyringer (manage and share secrets using OpenPGP and Git).
The Mac and Linux manual installation processes no longer require the isohybrid command.
Made the tap-to-click and two-finger scrolling trackpad settings enabled by default.
Added support for the Ibus Vietnamese input method.
Improved support for OpenPGP smartcards.
Future release: 2.0
Will focus on sustainability and maintainability. Most of the work put into this release will aim at reducing the workload of creating new versions of Tails through infrastructure improvements and automated testing. The developers' objective is to be able to release same-day security updates.
Future release: 3.0
Will focus on changes in the internals of Tails to make it more secure. That includes sandboxing critical applications and software hardening.