Tails (operating system)
Tails OS | |
OS family | Unix-like |
---|---|
Working state | Current |
Source model | Open source |
Initial release | June 23, 2009 |
Latest release | 2.4 / June 7, 2016[1] |
Latest preview | 2.4 release candidate 1 / May 26, 2016[2] |
Repository | |
Marketing target | Personal computers |
Platforms | IA-32 |
Kernel type | Monolithic (Linux) |
Userland | GNU |
Default user interface | GNOME 3 |
License | GPLv3+[3] |
Preceded by | Incognito |
Official website | tails |
Tails or The Amnesic Incognito Live System is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity.[4] All its outgoing connections are forced to go through Tor,[5] and non-anonymous connections are blocked. The system is designed to be booted as a live DVD or live USB, and will leave no digital footprint on the machine unless explicitly told to do so. The Tor Project has provided financial support for its development.[6]
History
Tails was first released on 23 June 2009. It is the next iteration of development on Incognito, a Gentoo-based Linux distribution.[7] The Tor Project has provided financial support for its development.[6] Tails has also received funding from the Debian Project, Mozilla, and the Freedom of the Press Foundation.[8]
Laura Poitras, Glenn Greenwald, and Barton Gellman have each said that Tails was an important tool they used in their work with National Security Agency whistleblower Edward Snowden.[9][10][11]
On 3 July 2014, German public television channel Das Erste reported that the NSA's XKeyscore surveillance system contains definitions that match persons who search for Tails using a search engine or visit the Tails website. A comment in XKeyscore's source code calls Tails "a comsec mechanism advocated by extremists on extremist forums".[12][13]
On 28 December 2014, Der Spiegel published slides from an internal NSA presentation dating to June 2012 in which the NSA deemed Tails on its own as a "major threat" to its mission, and when used in conjunction with other privacy tools such as OTR, Cspace, RedPhone, and TrueCrypt was ranked as "catastrophic," leading to a "near-total loss/lack of insight to target communications, presence..."[14][15]
Bundled software
- GNOME desktop
Networking
- Tor with: Stream isolation, regular, obfs2, obfs3, obfs4, and ScrambleSuit bridges support, the Vidalia graphical frontend.
- NetworkManager for easy network configuration
- Tor Browser, a web browser based on Mozilla Firefox and modified to protect your anonymity with: Torbutton for anonymity and protection against JavaScript, all cookies are treated as session cookies by default; HTTPS Everywhere transparently enables SSL-encrypted connections to a great number of major websites, NoScript to have even more control over JavaScript, AdBlock Plus to remove advertisements.
- Pidgin preconfigured with OTR for end-to-end encrypted instant messaging
- Icedove (Thunderbird) email client with Enigmail for OpenPGP support
- Liferea feed aggregator
- Gobby for collaborative writing of text
- Aircrack-ng for Wi-Fi networks auditing
- I2P, an anonymizing network
- Electrum, an easy-to-use bitcoin client
Encryption and privacy
- LUKS and GNOME Disks to install and use encrypted storage devices, e.g. for USB sticks
- GnuPG, the GNU implementation of OpenPGP for e-mail and data encryption and signing
- Monkeysign, a tool for OpenPGP key signing and exchange
- PWGen, a strong random password generator
- Shamir's Secret Sharing using gfshare and ssss
- Florence virtual keyboard as a countermeasure against hardware keyloggers
- MAT to anonymize metadata in files
- KeePassX password manager
- GtkHash to calculate checksums
- Keyringer, a command line tool to encrypt secrets shared through Git
- Paperkey a command line tool to back up OpenPGP secret keys on paper
One may choose among a large number of languages when the system is booted.
Release history
Legend: Old version Latest version Future release |
Release history | |||
---|---|---|---|
Version | Release date | Notes | |
[16] | 0.223 June 2009 |
| |
[17] | 0.5? |
| |
[16] | 1.029 April 2014 |
| |
[18] | 2.026 January 2016 |
| |
[1] | 2.46 June 2016 |
| |
2.5 |
|
| |
3.0 |
|
| |
Version | Release date | Notes |
See also
References
- ^ a b c "Tails 2.4 is out". Tails. June 7, 2016. Retrieved June 7, 2016.
- ^ "Call for testing: 2.4~rc1". May 26, 2016. Retrieved May 31, 2016.
- ^ "Tails 0.11 incognito live system released", The H, April 30, 2012, retrieved August 12, 2012
- ^ Vervloesem, Koen (April 27, 2011), "The Amnesic Incognito Live System: A live CD for anonymity", LWN.net, retrieved August 12, 2012
- ^ "Anonym im Netz", TecChannel (in German), February 6, 2012, retrieved August 12, 2012
{{citation}}
: Unknown parameter|trans_title=
ignored (|trans-title=
suggested) (help) - ^ a b "Finances". Tails. April 4, 2013. Retrieved May 13, 2013.
- ^ Gray, James (September 16, 2011), "The Tails Project's The Amnesic Incognito Live System (Tails)", Linux Journal, retrieved August 12, 2012
- ^ "Tails report for May, 2014". Tails. June 14, 2014.
- ^ Timm, Trevor (April 2, 2014). "Help Support the Little-Known Privacy Tool That Has Been Critical to Journalists Reporting on the NSA". Freedom of the Press Foundation. Retrieved April 18, 2014.
- ^ Finley, Klint (April 14, 2014). "Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA". WIRED. Retrieved April 18, 2014.
- ^ Condliffe, Jamie (April 15, 2014). "Try the Super-Secure USB Drive OS That Edward Snowden Insists on Using". Gizmodo. Retrieved April 15, 2014.
- ^ Jacob Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge (July 3, 2014). "NSA targets the privacy-conscious". DasErste.de.
{{cite web}}
: CS1 maint: multiple names: authors list (link) - ^ Bruce Schneier (July 3, 2014). "NSA Targets Privacy Conscious for Surveillance". Schneier on Security.
- ^ SPIEGEL Staff (December 28, 2014). "Prying Eyes: Inside the NSA's War on Internet Security". Der Spiegel. Retrieved January 23, 2015.
- ^ "Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not" (PDF). Der Spiegel. December 28, 2014. Retrieved January 23, 2015.
{{cite web}}
: Italic or bold markup not allowed in:|publisher=
(help) - ^ a b c "Tails 1.0 is out". Tails. May 1, 2014. Retrieved May 13, 2015.
- ^ "version 0.5". Tails. Retrieved December 17, 2014.
- ^ a b "Tails 2.0 is out". Tails. January 26, 2016. Retrieved January 26, 2016.
- ^ "Roadmap for new releases", labs.riseup.net, June 10, 2016, retrieved June 10, 2016
External links
- Official website
- Tails at Tor project website
- Tails - Known issues
- Tails at DistroWatch