This release fixes many security issues and users should upgrade as soon as possible.


Nuevas funcionalidades

  • We enabled address space layout randomization in the Linux kernel (kASLR) to improve protection from buffer overflow attacks.

  • We installed rngd to improve the entropy of the random numbers generated on computers that have a hardware random number generator.

Actualizaciones y cambios

  • Upgrade Tor to

  • Upgrade Tor Browser to 6.0.5.

  • Upgrade to Linux 4.6. This should improve the support for newer hardware (graphics, Wi-Fi, etc.)

  • Upgrade Icedove to 45.2.0.

  • Upgrade Tor Birdy to 0.2.0.

  • Upgrade Electrum to 2.6.4.

  • Install firmware for Intel SST sound cards (firmware-intel-sound).

  • Install firmware for Texas Instruments Wi-Fi interfaces (firmware-ti-connectivity).

  • Remove non-free APT repositories. We documented how to configure additional APT repositories using the persistent volume.

  • Use a dedicated page as the homepage of Tor Browser so we can customize it for our users.

  • Set up the trigger for RAM erasure on shutdown earlier in the boot process. This should speed up shutdown and make RAM erasure more robust.

Problemas arreglados

  • Disable the automatic configuration of Icedove when using OAuth. This should fix the automatic configuration for GMail accounts. (#11536)

  • Make the Disable all networking and Tor bridge mode options of Tails Greeter more robust. (#11593)

Para más detalles, lee nuestro changelog.

Problemas conocidos

  • For some users memory wiping fails more often than in Tails 2.5, and for some users it fails less often. Please report any such changes to #11786.

Mira la lista de problemas duraderos.

Get Tails 2.6

¿Qué novedades hay?

Tails 2.7 is scheduled for November 8.

Echa un vistazo a nuestro roadmap para ver hacia dónde nos dirigimos.

Necesitamos tu ayuda y hay muchas formas de colaborar con Tails (donar es solo una de ellas). Ven y habla con nosotros/as!