This release fixes many security issues and users should upgrade as soon as possible.


Novos recursos

  • We enabled address space layout randomization in the Linux kernel (kASLR) to improve protection from buffer overflow attacks.

  • We installed rngd to improve the entropy of the random numbers generated on computers that have a hardware random number generator.

Atualizações e mudanças

  • Upgrade Tor to

  • Upgrade Tor Browser to 6.0.5.

  • Upgrade to Linux 4.6. This should improve the support for newer hardware (graphics, Wi-Fi, etc.)

  • Upgrade Icedove to 45.2.0.

  • Upgrade Tor Birdy to 0.2.0.

  • Upgrade Electrum to 2.6.4.

  • Install firmware for Intel SST sound cards (firmware-intel-sound).

  • Install firmware for Texas Instruments Wi-Fi interfaces (firmware-ti-connectivity).

  • Remove non-free APT repositories. We documented how to configure additional APT repositories using the persistent volume.

  • Use a dedicated page as the homepage of Tor Browser so we can customize it for our users.

  • Set up the trigger for RAM erasure on shutdown earlier in the boot process. This should speed up shutdown and make RAM erasure more robust.

Problemas resolvidos

  • Disable the automatic configuration of Icedove when using OAuth. This should fix the automatic configuration for GMail accounts. (#11536)

  • Make the Disable all networking and Tor bridge mode options of Tails Greeter more robust. (#11593)

Para mais detalhes, leia nosso changelog.

Problemas conhecidos

  • For some users memory wiping fails more often than in Tails 2.5, and for some users it fails less often. Please report any such changes to #11786.

Veja a lista de problemas de longa data.

Get Tails 2.6

O que vem por aí?

Tails 2.7 is scheduled for November 8.

Confira o nosso roadmap e veja nossos objetivos futuros.

We need your help and there are many ways to contribute to Tails (donating is only one of them). Come talk to us!