Tails (operating system)
OS family | Unix-like |
---|---|
Working state | Current |
Source model | Open source |
Initial release | June 23, 2009 |
Latest release | 2.7.1 / November 30, 2016[1] |
Latest preview | 3.0 alpha 1 / November 15, 2016[2] |
Repository | |
Marketing target | Personal computers |
Update method | APT |
Package manager | dpkg |
Platforms | IA-32, x86-64[3] |
Kernel type | Monolithic |
Userland | GNU |
Default user interface | GNOME 3 |
License | GNU GPLv3[4] |
Preceded by | Incognito |
Official website | tails |
Tails or The Amnesic Incognito Live System is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity.[5] All its outgoing connections are forced to go through Tor,[6] and non-anonymous connections are blocked. The system is designed to be booted as a live DVD or live USB, and will leave no digital footprint on the machine unless explicitly told to do so. The Tor Project has provided financial support for its development.[7]
History
Tails was first released on 23 June 2009. It is the next iteration of development on Incognito, a Gentoo-based Linux distribution.[8] The Tor Project has provided financial support for its development.[7] Tails has also received funding from the Debian Project, Mozilla, and the Freedom of the Press Foundation.[9]
Laura Poitras, Glenn Greenwald, and Barton Gellman have each said that Tails was an important tool they used in their work with National Security Agency whistleblower Edward Snowden.[10][11][12]
On 3 July 2014, German public television channel Das Erste reported that the NSA's XKeyscore surveillance system contains definitions that match persons who search for Tails using a search engine or visit the Tails website. A comment in XKeyscore's source code calls Tails "a comsec mechanism advocated by extremists on extremist forums".[13][14]
On 28 December 2014, Der Spiegel published slides from an internal NSA presentation dating to June 2012 in which the NSA deemed Tails on its own as a "major threat" to its mission, and when used in conjunction with other privacy tools such as OTR, Cspace, RedPhone, and TrueCrypt was ranked as "catastrophic," leading to a "near-total loss/lack of insight to target communications, presence..."[15][16]
Bundled software
This section needs additional citations for verification. (June 2016) |
- GNOME desktop
Networking
- Tor with: Stream isolation, regular, obfs2, obfs3, obfs4, and ScrambleSuit bridges support, the Vidalia graphical frontend.
- NetworkManager for easy network configuration
- Tor Browser, a web browser based on Mozilla Firefox and modified to protect your anonymity with: Torbutton for anonymity and protection against JavaScript, all cookies are treated as session cookies by default; HTTPS Everywhere transparently enables SSL-encrypted connections to a great number of major websites, NoScript to have even more control over JavaScript, AdBlock Plus to remove advertisements.
- Pidgin preconfigured with OTR for end-to-end encrypted instant messaging
- Icedove (Thunderbird) email client with Enigmail for OpenPGP support
- Liferea feed aggregator
- Gobby for collaborative writing of text
- Aircrack-ng for Wi-Fi networks auditing
- I2P, an anonymizing network
- Electrum, an easy-to-use bitcoin client
Encryption and privacy
- LUKS and GNOME Disks to install and use encrypted storage devices, e.g. for USB sticks
- GnuPG, the GNU implementation of OpenPGP for e-mail and data encryption and signing
- Monkeysign, a tool for OpenPGP key signing and exchange
- PWGen, a strong random password generator
- Shamir's Secret Sharing using gfshare and ssss
- Florence virtual keyboard as a countermeasure against hardware keyloggers
- MAT to anonymize metadata in files
- KeePassX password manager
- GtkHash to calculate checksums
- Keyringer, a command line tool to encrypt secrets shared through Git
- Paperkey a command line tool to back up OpenPGP secret keys on paper
One may choose among a large number of languages when the system is booted.
Release history
Legend: Old version Latest version Future release |
Release history | |||
---|---|---|---|
Version | Release date | Notes | |
[17] | 0.223 June 2009[18] | ||
[19][third-party source needed] | 0.5? |
| |
[18] | 1.029 April 2014[17][failed verification] |
| |
[20] | 1.5? |
| |
[20] | 1.7? | ||
[21] | 2.026 January 2016[22][failed verification] |
| |
[20] | 2.2? | ||
[20] | 2.47 June 2016[20] | ||
[24] | 2.52 August 2016[24] | ||
[25] | 2.620 September 2016[25] | ||
Version | Release date | Notes |
See also
References
- ^ "Tails 2.7.1 is out". November 30, 2016. Retrieved December 1, 2016.
- ^ "Call for testing: 3.0~alpha1". November 15, 2016. Retrieved November 19, 2016.
- ^ Tails - Frequently asked questions - Hardware compatibility
- ^ "Tails 0.11 incognito live system released", The H, April 30, 2012, retrieved August 12, 2012
- ^ Vervloesem, Koen (April 27, 2011), "The Amnesic Incognito Live System: A live CD for anonymity", LWN.net, retrieved August 12, 2012
- ^ "Anonym im Netz", TecChannel (in German), February 6, 2012, retrieved August 12, 2012
{{citation}}
: Unknown parameter|trans_title=
ignored (|trans-title=
suggested) (help) - ^ a b "Finances". Tails. April 4, 2013. Retrieved May 13, 2013.
- ^ Gray, James (September 16, 2011), "The Tails Project's The Amnesic Incognito Live System (Tails)", Linux Journal, retrieved August 12, 2012
- ^ "Tails report for May, 2014". Tails. June 14, 2014.
- ^ Timm, Trevor (April 2, 2014). "Help Support the Little-Known Privacy Tool That Has Been Critical to Journalists Reporting on the NSA". Freedom of the Press Foundation. Retrieved April 18, 2014.
- ^ Finley, Klint (April 14, 2014). "Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA". WIRED. Retrieved April 18, 2014.
- ^ Condliffe, Jamie (April 15, 2014). "Try the Super-Secure USB Drive OS That Edward Snowden Insists on Using". Gizmodo. Retrieved April 15, 2014.
- ^ Jacob Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge (July 3, 2014). "NSA targets the privacy-conscious". DasErste.de.
{{cite web}}
: CS1 maint: multiple names: authors list (link) - ^ Bruce Schneier (July 3, 2014). "NSA Targets Privacy Conscious for Surveillance". Schneier on Security.
- ^ SPIEGEL Staff (December 28, 2014). "Prying Eyes: Inside the NSA's War on Internet Security". Der Spiegel. Retrieved January 23, 2015.
- ^ "Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not" (PDF). Der Spiegel. December 28, 2014. Retrieved January 23, 2015.
{{cite web}}
: Italic or bold markup not allowed in:|publisher=
(help) - ^ a b "Tails 1.0 is out". Tails. n.d. Retrieved June 10, 2016.
- ^ a b c d e Murphy, David (May 1, 2014). "Secure OS Tails Emerges From Beta". PC Magazine. Ziff Davis. Retrieved June 10, 2016.
- ^ a b "version 0.5". Tails. n.d. Archived from the original on June 25, 2013. Retrieved June 10, 2016.
- ^ a b c d e f g h i j k Hoffman, Chris (June 9, 2016). "Tails, the anonymity-focused Linux distribution with deep Tor integration, reaches version 2.4". PCWorld. IDG. Retrieved June 10, 2016.
- ^ a b Paul, Ian (January 27, 2016). "The ultra-secure Tails OS beloved by Edward Snowden gets a major upgrade". PCWorld. IDG. Retrieved June 10, 2016.
- ^ "Tails 2.0 is out". Tails. January 26, 2016. Retrieved January 26, 2016.
- ^ "Tails 2.4 is out". Tails. June 7, 2016. Retrieved June 7, 2016.
- ^ a b "Tails 2.5 is out". August 2, 2016. Retrieved August 3, 2016.
- ^ a b "Tails 2.6 is out". September 21, 2016. Retrieved September 22, 2016.
External links
- Official website
- Tails at Tor project website
- Tails - Known issues
- Tails at DistroWatch