Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Thursday April 20 2017, @09:04PM   Printer-friendly
from the choose-your-headphones-wisely dept.

The Tails project announced the release of version 2.12 of the operating system which focuses on "privacy and anonymity."

The new version includes Gnome Sound Recorder, removes I2P, runs on version 4.9.13 of the Linux kernel, and as per usual remedies "numerous security holes" in the previous release. Distro Watch has additional coverage.

Related story:
TAILS 2.11: The Last Release to Support the I2P Anonymizing Network


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by butthurt on Friday April 21 2017, @12:29AM (1 child)

    by butthurt (6141) on Friday April 21 2017, @12:29AM (#497140) Journal

    > [...] two separate projects [...] got shot down [...]

    Where may we can read more about this?

    > [...] a new darknet 'tails-like' distro [...]

    A good starting point may be Whonix running within Qubes OS. You'd need to integrate I2P.

    https://www.qubes-os.org/doc/whonix/ [qubes-os.org]

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by Scruffy Beard 2 on Friday April 21 2017, @05:37AM

    by Scruffy Beard 2 (6030) on Friday April 21 2017, @05:37AM (#497255)

    Found an e-mail thread saying the was concern about undiscovered 0-days in the I2p software. Not entirely clear why I2P would get singled out though.

    [Tails-dev] What to do about I2P in Tails? [boum.org]

    So, the main goals I have in mind are:

      1. making it harder, for an attacker who compromises I2P running in
            Tails, to upgrade their attack to anything non-I2P;

      2. making it harder, for someone attacking a Tails user's web
            browsing over Tor, to take advantage of bugs in the I2P router
            console;

      3. protecting the Tails users who don't intend to use I2P at all,
            from vulnerabilities in I2P, by making it harder, for an attacker,
            to start I2P in Tails, or to trick a user into doing it.