Tails was first released on 23 June 2009. It is the next iteration of development on Incognito, a Gentoo-based Linux distribution. The Tor Project has provided financial support for its development. Tails has also received funding from the Debian Project, Mozilla, and the Freedom of the Press Foundation.
|Old version, no longer supported: 0.2
||23 June 2009
- First public release.
- The project was called Amnesia.
|Old version, no longer supported: 0.5
- First release since the project was renamed to The Amnesic Incognito Live System.
|Old version, no longer supported: 1.0
||29 April 2014
- 36th stable release.
- Upgraded the web browser to 24.5.0esr-0+tails1~bpo60+1 (Firefox 24.5.0esr + Iceweasel patches + Torbrowser patches).
- Upgraded Tor to 0.2.4.21-1+tails1~d60.squeeze+1
- Disabled inbound I2P connections.
- Fixed link to the system requirements documentation page in the Tails Upgrader, error shown when too little RAM is available.
- Upgrade I2P to 0.9.12-2~deb6u+1.
- Imported TorBrowser profile.
- Imported new custom version of Tor Launcher (based on upstream Tor Launcher 0.2.5.3).
- Improved how Tor Launcher handles incomplete translation.
- Remove the bridge settings prompt.
- Always show bridge help button.
- Integrate the new Tails logo into various places (The website, boot splash, and the "About Trails" dialog.
|Old version, no longer supported: 1.0.1
||10 June 2014
- Upgraded the web browser to 24.6.0esr-0+tails1~bpo60+1 (Firefox 24.6.0esr + Iceweasel patches + Torbrowser patches).
- Installed Linux 3.14 from Debian unstable.
- Installed openssl from Squeeze LTS.
- Installed GnuTLS from Squeeze LTS.
- Upgraded Tor to 0.2.4.22-1~d60.squeeze+1.
- Upgraded I2P to 0.9.13-1~deb6u+1.
|Old version, no longer supported: 1.1
||22 July 2014
- This release was based on Debian 7.0 'Wheezy'.
- Upgraded thousands of packages.
- Migrated to GNOME 3 'fallback' mode.
- Installed LibreOffice instead of OpenOffice.org.
- Added UEFI boot support, which made it possible to boot Tails on modern hardware and Apple computers.
- Replaced the Windows XP camouflage with a Windows 8 camouflage.
- Brought back VirtualBox guest modules, installed from Wheezy backports, full functionality was only available when using the 32-bit kernel.
- Security fixes, bug fixes, and minor improvements to Debian.
|Old version, no longer supported: 1.1.1
||2 September 2014
- Upgraded the web browser to 24.8.0esr-0+tails1~bpo70+1 (Firefox 24.8.0esr + Iceweasel patches + Torbrowser patches).
- Added an I2P boot parameter.
- I2P was upgraded to 0.9.14.1-1~deb7u+1, and stricter firewall rules are applied to it, among other security enhancements.
- Upgraded Tor to 0.2.4.23-2~d70.wheezy+1.
- Prevent dhclient from sending the hostname over the network.
- Override the hostname provided by the DHCP server.
- Don't ship OpenJDK 6: I2P prefers v7, and we don't need both.
- Prevent Tails Installer from updating the system partition properties on MBR partitions.
- Upgraded Torbutton to 188.8.131.52.
- Installed gnome-user-guide.
- Installed cups-pk-helper.
- Updated the SquashFS sort file, which should speed up boot from DVD
- Compress the SquashFS more aggressively, which should make the Tails ISO image smaller.
|Old version, no longer supported: 1.1.2
- Upgraded the web browser to 24.8.0esr-0+tails3~bpo70+1.
- Installed Linux 3.16-1
- Numerous other software upgrades that fix security issues: GnuPG, APT, DBus, Bash, and packages built from the bind9 and libav source packages
|Old version, no longer supported: 1.2
||16 October 2014
- Installed (most of) the Tor Browser, replacing the previous Iceweasel-based browser. The version installed was from TBB 4.0 and was based on Firefox 31.2.0esr. This fixed the POODLE vulnerability.
- Upgraded Tor to 0.2.5.8-rc.
- Confined several important applications with AppArmor.
- Installed Linux 3.16-3 (version 3.16.5-1).
- Upgraded I2P to 0.9.15, and isolated I2P traffic from the Tor Browser by adding a dedicated I2P Browser. Also, started I2P automatically upon network connection, when the i2p boot option was added.
- Made it clear that TrueCrypt would be removed in Tails 1.2.1, and documented how to open TrueCrypt volumes with cryptsetup.
- Enabled VirtualBox guest additions by default. In particular this enabled VirtualBox's display management service.
- Made the OTR status in Pidgin clearer thanks to the formatting toolbar.
- Upgraded syslinux to 6.03-pre20, which fixed UEFI boot on some hardware.
|Old version, no longer supported: 1.2.1
||15 December 2014
- Upgraded Linux to 3.16.7-1.
- Installed Tor Browser 4.0.2 (based on Firefox 31.3.0esr).
- Restored mouse scrolling in KVM/Spice.
- Suppressed excessive (and leaky!) Torbutton logging.
- Don't break the Unsafe and I2P Browsers after installing incremental upgrades.
- External links in various applications should open properly in the Tor Browser.
- Fixed clearsigning of text including non-ASCII characters in gpgApplet
- Upgraded I2P to 0.9.17-1~deb7u+1.
- Maked GnuPG configuration closer to the best practices.
- Removed TrueCrypt support and document how to open TrueCrypt volumes using cryptsetup.
|Old version, no longer supported: 1.2.2
||15 December 2014
- Changed the SSL certificate authority expected by Tails Upgrader when checking for new Tails versions on https://tails.boum.org/.
|Old version, no longer supported: 1.2.3
||15 January 2015
- Upgraded Linux to 3.16.7-ckt2-1.
- Upgraded Tor Browser to 4.0.3 (based on Firefox 31.4.0esr).
- Improved MAC spoofing fail-safe mechanisms, which includes preventing one more way the MAC address could be leaked.
- Disabled upgrade checking in the Unsafe Browser.
- Fixed startup of the Unsafe Browser in some locales.
- Repaired the desktop screenshot feature.
- Do not suspend to RAM when closing the lid on battery power.
- Properly update the Tails Installer's status when plugging in a USB drive after it has started.
|Old version, no longer supported: 1.3
||24 February 2015
- Installed bitcoin wallet Electrum.
- Added additional operating system and data security to The Tor Browser.
- Made the obfs4 pluggable transport available to connect to Tor bridges.
- Installed Keyringer (manage and share secrets using OpenPGP and Git).
- The Mac and Linux manual installation processes no longer require the isohybrid command.
- Made the tap-to-click and two-finger scrolling trackpad settings enabled by default.
- Added support for the Ibus Vietnamese input method.
- Improved support for OpenPGP smartcards.
|Old version, no longer supported: 1.3.1
||23 March 2015
- Tails had transitioned to a new OpenPGP signing key.
- Tor Launcher 0.2.7.2 improved usability of Internet connections that are censored, filtered, or proxied.
|Old version, no longer supported: 1.3.2
||31 March 2015
- The Florence virtual keyboard could be used with touchpads again.
- Tails Installer did not list devices that were too small to be supported.
|Old version, no longer supported: 1.4
||12 May 2015
- OpenPGP Applet now has a shortcut to the gedit text editor.
- Installed Paperkey (print a backup of your OpenPGP secret keys on paper).
- In Tor Browser 4.5, all content, from the main website as well as the third-party websites, goes through the same Tor circuits. And these circuits are not reused when visiting a different website.
- Disconnect.me is the new default search engine.
- Installed fonts-linuxlibertine (better support for Vietnamese in LibreOffice).
- Disable security warnings when connecting to POP3 and IMAP ports that are mostly used for StartTLS nowadays.
- Installated printer-driver-gutenprint (support for more printers)
- Upgraded Tor to 0.2.6.7.
- Upgraded I2P to 0.9.19 that has several fixes and improvements for floodfill performance.
- Removed the obsolete #i2p-help IRC channel from Pidgin.
- Removed the command line email client mutt and msmtp.
- Fixed making the browser theme of the Windows 8 camouflage compatible with the Unsafe Browser and the I2P Browser.
- Fixed removing the Tor Network Settings... from the Torbutton menu.
- Better support for Chromebook C720-2800 through the upgrade of syslinux.
- Fixed the localization of Tails Upgrader.
- Fixed the OpenPGP key servers configured in Seahorse.
- Prevented Tor Browser from crashing when Orca is enabled.
|Current stable version: 1.5
||11 Aug 2015
- New Feature: Disable access to the local network in the Tor Browser. You should now use the Unsafe Browser to access the local network.
- Install Tor Browser 5.0 (based on Firefox 38esr).
- Install a 32-bit GRUB EFI boot loader. Tails should now start on some tablets with Intel Bay Trail processors among others.
- Let the user know when Tails Installer has rejected a device because it is too small.
- Our AppArmor setup has been audited and improved in various ways which should harden the system.
- The network should now be properly disabled when MAC address spoofing fails.
|Future release: 2.0
- Will focus on sustainability and maintainability. Most of the work put into this release will aim at reducing the workload of creating new versions of Tails through infrastructure improvements and automated testing. The developers' objective is to be able to release same-day security updates.
|Future release: 3.0
- Will focus on changes in the internals of Tails to make it more secure. That includes sandboxing critical applications and software hardening.