The Tails staff has simply introduced the newest model of their ultra-private Linux-based working system, Tails 6.11. Every level launch usually brings with it a brand new function or two, and this time is not any totally different. With this replace, you get higher detection of partition errors, which may help you save your persistent information earlier than it is too late.
Here’s what the discharge notes should say about this new function:
Typically, the partitions on a Tails USB stick get corrupted. This creates errors with the Persistent Storage or throughout upgrades. Partitions can get corrupted due to damaged or counterfeit {hardware}, software program errors, or bodily eradicating the USB stick whereas Tails is working.
Tails now warns about such partitioning errors earlier. For instance, if partitioning errors are detected when there is no such thing as a Persistent Storage, Tails recommends that you just reinstall or use a brand new USB stick.
This is a listing of different smaller adjustments and updates that have been made on this launch:
- Replace Tor Browser to 14.0.4.
- Replace Thunderbird to 128.5.0esr.
- Take away help for {hardware} wallets in Electrum. Trezor wallets stopped working in Debian 12 (Bookworm), and so in Tails 6.0 or later.
- Disable GNOME Textual content Editor from reopening on the final file. (#20704)
- Add a hyperlink to the Tor Connection assistant from the menu of the Tor standing icon on the desktop.
- Make it simpler for our staff to seek out helpful data in WhisperBack stories.
Along with all this, the Tails staff says its working system was lately audited by Radically Open Safety. Three flaws have been discovered however are usually not believed to have been exploited within the wild, although, the main points are actually recognized, so if you happen to’re upgrading after January 9 and have used Tails so much, a guide improve is really useful by the Tails staff.
Listed below are the failings uncovered by the audit:
- Stop an attacker from putting in malicious software program completely. (#20701)
In Tails 6.10 or earlier, an attacker who has already taken management of an software in Tails may then exploit a vulnerability in Tails Upgrader to put in a malicious improve and completely take management of your Tails.
Doing a guide improve would erase such malicious software program.
In Tails 6.10 or earlier, an attacker who has already taken management of an software in Tails may then exploit vulnerabilities in different purposes that may result in deanonymization or the monitoring of shopping exercise:
In Onion Circuits, to get details about Tor circuits and shut them.
In Unsafe Browser, to hook up with the Web with out going via Tor.
In Tor Browser, to watch your shopping exercise.
In Tor Connection, to reconfigure or block your connection to the Tor community.
- Stop an attacker from altering the Persistent Storage settings. (#20710)
If you happen to’re working Tails 6.0 or above, now you can do an automated improve to six.11, this can protect any persistent storage you might have. Alternatively, you are able to do a guide improve or carry out a new set up.
No Comment! Be the first one.