Subscribe to our newsletter to receive the same news by email:

Archive of all news

Tails 6.8.1

This release is an emergency release to fix a critical security vulnerability in Tor Browser.

Changes and updates

  • Update Tor Browser to 13.5.7, which fixes MFSA 2024-51, a major use-after-free vulnerability. Using this vulnerability, an attacker could take control of Tor Browser, but probably not deanonymize you in Tails.

    Mozilla is aware of this attack being used in the wild.

Fixed problems

For more details, read our changelog.

Get Tails 6.8.1

To upgrade your Tails USB stick and keep your Persistent Storage

  • Automatic upgrades are available from Tails 6.0 or later to 6.8.1.

  • If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

To install Tails 6.8.1 on a new USB stick

Follow our installation instructions:

The Persistent Storage on the USB stick will be lost if you install instead of upgrading.

To download only

If you don't need installation or upgrade instructions, you can download Tails 6.8.1 directly:

Tails 6.8

New features

File system repair when unlocking the Persistent Storage

When the file system of the Persistent Storage has errors, Tails now offers you to repair the file system when unlocking from the Welcome Screen.

Because not all file system errors can be safely recovered this way, we wrote comprehensive documentation on how to recover data from the Persistent Storage using complementary techniques.

Changes and updates

  • Update Tor Browser to 13.5.6.

  • Improve the notification when a network interface is disabled because MAC address anonymization failed.

    Wi-Fi Disabled. MAC address anonymization failed for your Wi-Fi interface, so it is temporarily disabled. You might prefer to restart Tails and disable MAC address anonymization. Learn about MAC address anonymization.

Fixed problems

  • Increase the maximum waiting time to 8 minutes when unlocking the Persistent Storage before returning an error. (#20475)

  • Hide shown password while unlocking Persistent Storage. (#20498)

  • Better handle failures in when sending WhisperBack error messages:

    • Fix input fields when Tails is not connected to Tor. (#19731)
    • Fix accessibility of input fields with screen reader. (#19903)

For more details, read our changelog.

Get Tails 6.8

To upgrade your Tails USB stick and keep your Persistent Storage

  • Automatic upgrades are available from Tails 6.0 or later to 6.8.

  • If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

To install Tails 6.8 on a new USB stick

Follow our installation instructions:

The Persistent Storage on the USB stick will be lost if you install instead of upgrading.

To download only

If you don't need installation or upgrade instructions, you can download Tails 6.8 directly:

Migliorare Tails per chi difende i diritti umani in America Latina

[[!meta Error: cannot parse date/time: Mar, 06 giu 2023 14:00:00 +0000]]

Between 2021 and 2023 Tails, Tor, and the Guardian Project partnered to organize training and usability tests in Ecuador, Mexico, and Brazil. Our goals were to:

  • Promote our digital security tools and train human rights defenders in the Global South.

  • Learn from their experiences and needs to help us prioritize future work.

  • Improve the usability of our tools based on their feedback.

Usability tests and improvements

We conducted 4 rounds of in-person moderated usability tests in Mexico, Brazil, and Ecuador to identify usability issues in the features of Tails that are most important to new users:

  • Installation

  • Tor Connection

  • Persistent Storage

The DesignOps tools that we used to organize these usability tests are all publicly available on our website.

The detailed methodology for each of the usability tests is explained in the corresponding GitLab issues, linked below.

Installazione

In December 2021 in Mexico, we learned that the tools for new users to install Tails worked well, but several people got lost while navigating the instructions on the website.

Based on these findings, we restructured our installation pages and fixed 30 usability issues on the website.

We tested these improvements in August 2022 in Brazil and confirmed that the new installation pages were much easier to follow. Only 1 out of 4 participants had trouble installing Tails on their own. All participants could start Tails and connect to the Tor network easily.

Details:

Tor Connection

In July 2021, we released the Tor Connection assistant to completely redesign how to connect Tails to the Tor network. The new assistant is most useful to people who are at high risk of physical surveillance, under heavy network censorship, or on a poor Internet connection.

In August 2022 in Brazil, we tested the usability of Tor Connection when accessing the Tor network is blocked by censorship or by a captive portal.

Despite the many usability issues that we fixed since the first release of Tor Connection, 3 test participants out of 4 failed to connect when access to the Tor network was blocked.

Since then we fixed 14 usability issues affecting Tor Connection: to understand better why connecting to Tor fails, to make it easier to configure a Tor bridge, and to make it easier to sign in to a network using a captive portal.

Archivio Persistente

In March 2023 in Ecuador, we tested the usability of the new Persistent Storage, which was released in Tails in December 2022.

We didn't find any serious usability issues in the new Persistent Storage. The fact that people don't have to restart to create and enable the Persistent Storage and that their data (eg. Wi-Fi password) is stored on creation were huge improvements compared to the old Persistent Storage.

Trainings

Through our combined efforts we reached 47 organizations and trained 433 human rights defenders on our family of tools based on the Tor network. For Tails only, we conducted 8 workshops and trained 84 people on using Tails: journalists, activists, feminists, lawyers, and human rights defenders.

The material used for these Tails workshops is available on our website in English, Spanish, and Portuguese.

Assistants to the workshops were able to start Tails on all their PC computers but had more frequent issues with Mac computers.

From what is already possible to do with Tails, people were most interested in using Tails to:

  • Handle sensitive data, for example, medical data of abortion patients, sensitive documents from political trials, or field studies from human rights violations. That said, not all journalists thought that they were manipulating data that was sensitive enough to require a tool like Tails. Sometimes it was hard to draw the line on when to use Tails and when not.

  • Investigate sensitive topics online, either for journalistic purposes, medical purposes, or when making safe travel plans.

  • Have a secure OS when using other people's computer, either when traveling or when people don't have the means to have their own computer.

From what is not possible yet to do with Tails, people were most interested in:

  • Doing online meetings and using mobile messaging apps like Signal and Telegram from Tails.

  • Using a VPN instead of Tor for speed and access to more websites.

We included both of these objectives in our 3-year product strategy. You can track our progress in the GitLab issues related to #19472.

Uniting for Internet Freedom: Tor Project & Tails Join Forces

Today the Tor Project, a global non-profit developing tools for online privacy and anonymity, and Tails, a portable operating system that uses Tor to protect users from digital surveillance, have joined forces and merged operations. Incorporating Tails into the Tor Project's structure allows for easier collaboration, better sustainability, reduced overhead, and expanded training and outreach programs to counter a larger number of digital threats. In short, coming together will strengthen both organizations' ability to protect people worldwide from surveillance and censorship.

Pooling resources to better serve a global community

Countering the threat of global mass surveillance and censorship to a free Internet, Tor and Tails provide essential tools to help people around the world stay safe online. By joining forces, these two privacy advocates will pool their resources to focus on what matters most: ensuring that activists, journalists, other at-risk and everyday users will have access to improved digital security tools.

In late 2023, Tails approached the Tor Project with the idea of merging operations. Tails had outgrown its existing structure. Rather than expanding Tails’s operational capacity on their own and putting more stress on Tails workers, merging with the Tor Project, with its larger and established operational framework, offered a solution. By joining forces, the Tails team can now focus on their core mission of maintaining and improving Tails OS, exploring more and complementary use cases while benefiting from the larger organizational structure of The Tor Project.

This solution is a natural outcome of the Tor Project and Tails' shared history of collaboration and solidarity. 15 years ago, Tails' first release was announced on a Tor mailing list, Tor and Tails developers have been collaborating closely since 2015, and more recently Tails has been a sub-grantee of Tor. For Tails, it felt obvious that if they were to approach a bigger organization with the possibility of merging, it would be the Tor Project.

"Running Tails as an independent project for 15 years has been a huge effort, but not for the reasons you might expect. The toughest part wasn't the tech–it was handling critical tasks like fundraising, finances, and HR. After trying to manage those in different ways, I’m really relieved that Tails is now under the Tor Project’s wing. In a way, it feels like coming home."

–intrigeri, Team Lead Tails OS, The Tor Project

Welcoming new users and partners into our communities

Whether it’s someone seeking access to the open web or facing surveillance, Tor and Tails offer complementary protections. While Tor Browser anonymizes online activity, Tails secures the entire operating system–from files to browsing sessions. For journalists working in repressive regions or covering sensitive topics, Tor and Tails are often used as a set to protect their communications and safeguard their sources. The merger will lead to more robust treatment of these overlapping threat models and offer a comprehensive solution for those who need both network and system-level security in high-risk environments.

It will also open up broader training and outreach opportunities. Until now, Tor’s educational efforts have primarily focused on its browser. With Tails integrated into these programs, we can address a wider range of privacy needs and security scenarios. Lastly, this merger will lead to increased visibility for Tails. Many users familiar with Tor may not yet know about Tails OS. By bringing Tails within the Tor Project umbrella, we can introduce this powerful tool to more individuals and groups needing to remain anonymous while working in hostile environments.

"Joining Tor means we’ll finally have the capacity to reach more people who need Tails. We've known for a long time that we needed to ramp up our outreach, but we just didn’t have the resources to do so"

–intrigeri

 

"By bringing these two organizations together, we’re not just making things easier for our teams, but ensuring the sustainable development and advancement of these vital tools. Working together allows for faster, more efficient collaboration, enabling the quick integration of new features from one tool to the other. This collaboration strengthens our mission and accelerates our ability to respond to evolving threats."

– Isabela Fernandes, Executive Director, The Tor Project


Your support will go a long way to support this merge. Please consider making a donation to the Tor Project

If you'd like to earmark your donation specifically for Tails activities, you can continue to do so through Tails' donation page until further notice.

To learn more about how we are integrating our donation infrastructures and how your funds will be used, please refer to our updated Donation FAQ.

Tails report for August 2024

Highlights

In August:

  • We continued making it easier for Tails users to recover from the most common failure modes:

    • we released the first iteration of our design to detect a partition table corruption and advise users about it.

    • we worked on implementing detection of the Persistent Storage corruption on a Tails USB stick, reporting it to users, and repairing it.

  • We resumed our work to design a better backup feature for the Persistent Storage. We integrated the valuable feedback received in July on our design proposal for the improved backup feature (mockups on Gitlab).

  • We published instructions for installing Dangerzone in Tails. Dangerzone will help Tails users convert suspicious documents to safe PDFs. This was a significant milestone: this is the first time that we have recommended installing a 3rd party package that is not available in Debian.

Releases

📢 We released Tails 6.6!

In Tails 6.6, we brought:

  • improved hardware support for graphics, WiFi etc.

  • an updated Tor Browser and fixed issues with connecting to the Tor network using default bridges

  • fixes that make the Persisten Storage more robust.

To know more, check out the Tails 6.6 release notes and the changelog.

Metrics

Tails was started more than 767,542 times this month. That's a daily average of over 24,759 boots.

Posted
Tails 6.7

Changes and updates

Fixed problems

  • Keep the firewall on even during shutdown. (#20536)

  • Stop reporting an error when starting an old Tails USB stick with a system partition of 2.5 GB. (#20519)

For more details, read our changelog.

Known issues

Shim SBAT verification error

If you get the following error message when starting your regular Linux operating system, then it means that your Linux operating system is outdated.

Verifying shim SBAT data failed: Security Policy Violation
Something has gone seriously wrong: SBAT self-check failed: Security Policy Violation

  1. Edit your UEFI settings to disable Secure Boot.

    With Secure Boot disabled, your regular Linux operating system should start again.

    To learn how to edit the BIOS or UEFI settings, search for the user manual of the computer on the support website of the manufacturer.

  2. Update your regular Linux operating system.

  3. Try to enable Secure Boot again in your UEFI settings.

    If your regular Linux operating system still doesn't start, then disable Secure Boot again. You can try to enable Secure Boot again in the future.

    It might take several months for your Linux distribution to provide updates before you can enable Secure Boot again.

Get Tails 6.7

To upgrade your Tails USB stick and keep your Persistent Storage

  • Automatic upgrades are available from Tails 6.0 or later to 6.7.

  • If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

To install Tails 6.7 on a new USB stick

Follow our installation instructions:

The Persistent Storage on the USB stick will be lost if you install instead of upgrading.

To download only

If you don't need installation or upgrade instructions, you can download Tails 6.7 directly:

Tails report for July 2024

Highlights

  • On our first month back from vacation, we continued making it easier to recover from common failure modes without requiring technical expertise:

    • we drafted an implementation of our design to detect, report, and repair corruption of the Persistent Storage

    • we finished implementing our plans to improve the detection of and recovery from low-memory situations. Going from prototype to implementation, this work was a great example of the 90-90 rule in action: the first 90% of the work consumed the first 90% of our time, and the remaining 10% accounted for the other 90% of our time

  • Over the past year, we have been close downstream of the Tor Project's design and implementation of Arti. This month, we reached a significant milestone in our collaboration: we prepared a prototype of Tails in which multiple applications use Arti.

  • freiheitsfoo, one of our longest supporters, renewed their sponsorship of Tails! Welcome aboard for another year of resisting censorship and surveillance online!

Releases

📢We released Tails 6.5!

In Tails 6.5, we brought:

  • an updated Tor Browser with cool letterboxing improvements, and the latest Debian (12.6)

  • repairs to first-boot partitioning that many users were facing issues with after Tails 6.4

  • fixes to connecting via mobile broadband, LTE, and PPPoE DS. This has been a persistent issue in the Tails 6 series so far.

To know more, check out the Tails 6.5 release notes and the changelog.

Metrics

Tails was started more than 779,262 times this month. That's a daily average of over 25,946 boots.

Posted
Tails 6.6

Changes and updates

  • Update Tor Browser to 13.5.2.

  • Update Thunderbird to 115.14.0.

  • Update many firmware packages. This improves the support for newer hardware: graphics, Wi-Fi, and so on.

  • Detect new types of errors when resizing the system partition fails (the first time Tails is started) and report the following error message.

    Something went wrong when starting your Tails USB stick for the first time:
    resizing the system partition failed

    It will be impossible to create a Persistent Storage or apply automatic upgrades.

    Affected users can try to install Tails again or use a different USB stick.

Fixed problems

Persistent Storage

  • Increase the maximum waiting time to 4 minutes when unlocking the Persistent Storage before returning an error. (#20475)

  • Made the creation of the Persistent Storage more robust after starting a Tails USB stick for the first time. (#20451)

  • Prevent the Persistent Storage settings from freezing after opening a link to the documentation. (#20438)

  • Prevent Additional Software from crashing when installing virtual packages. (#20477)

Networking

  • Fix connecting to the Tor network using default bridges. (#20467)

  • Allow enabling multiple network interfaces again. (#20128)

Tails Cloner

  • Remove 30 seconds of waiting time when installing by cloning. (#20131)

For more details, read our changelog.

Get Tails 6.6

To upgrade your Tails USB stick and keep your Persistent Storage

  • Automatic upgrades are available from Tails 6.0 or later to 6.6.

  • If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

To install Tails 6.6 on a new USB stick

Follow our installation instructions:

The Persistent Storage on the USB stick will be lost if you install instead of upgrading.

To download only

If you don't need installation or upgrade instructions, you can download Tails 6.6 directly:

Converting dangerous documents to safe PDFs using Dangerzone

Today, we added documentation on our website to install Dangerzone in Tails.

When you receive untrusted documents, for example, email attachments, Dangerzone allows you to convert them into safe PDFs before opening.

Dangerzone is particularly useful for journalists who might receive dangerous documents from anonymous sources or download them from the Internet.

Dangerzone is an essential tool and is built by great people. It was first written by Micah Lee to protect investigative journalists while working at The Intercept. Dangerzone is now maintained by Freedom of the Press Foundation, a non-profit that protects public-interest journalism. Edward Snowden and Laura Poitras are on its Board of Directors.

It's totally the kind of software that aligns with our mission. The only reason why we are not including Dangerzone in Tails by default is because Dangerzone is too big and not available in Debian.

So, we collaborated with Alex Pyrgiotis from Freedom of the Press Foundation to make it as easy as possible to install Dangerzone in Tails as Additional Software. The setup requires using the command line, but, after that, Dangerzone will install automatically every time you start Tails.

Dangerzone will allow more investigative journalists to use the safe environment that Tails provides when manipulating sensitive documents.

It's also the first time that we recommend installing a 3rd party package that is not available in Debian. We know that a lot of software that would be useful for our users is not readily available in Debian. If this first experiment is successful, we might document more such packages.

Tails 6.5

Changes and updates

Fixed problems

  • Fix preparation for first use often breaking legacy BIOS boot and creation of Persistent Storage. (#20451)

  • Fix language of Tor Browser when started from Tor Connection. (#20318)

  • Fix connection via mobile broadband, LTE, and PPPoE DSL. (#20291, #20433)

Per ulteriori dettagli, leggi il nostro changelog.

Known issues

  • It is impossible to connect using the default Tor bridges already included in Tails. (#20467)

    To use a default bridge in Tails 6.5, scan the QR code of one of these bridges:

    If this fails, configure a custom bridge.

Get Tails 6.5

To upgrade your Tails USB stick and keep your Persistent Storage

  • Automatic upgrades are available from Tails 6.0 or later to 6.5.

  • Se non puoi eseguire un aggiornamento automatico o se Tails non si avvia dopo un aggiornamento automatico, ti preghiamo di provare a eseguire un aggiornamento manuale.

To install Tails 6.5 on a new USB stick

Segui le nostre istruzioni d'installazione:

The Persistent Storage on the USB stick will be lost if you install instead of upgrading.

Per scaricare solamente

If you don't need installation or upgrade instructions, you can download Tails 6.5 directly: