Tails (The Amnesic Incognito Live System) является LiveCD дистрибутивом и может запускаться с CD/DVD диска, с USB носителя, с SD карты. С дистрибутивом не поставляется инсталлятор, он предназначен только для «live-использования».В состав дистрибутива входят Web-браузер, Email-клиент, IM-клиент для обмена мгновенными сообщениями, офисный пакет, аудио и видео редакторы, графический редактор и другие. Все приложения сконфигурированы с целью обеспечения безопасного и анонимного использования.Дистрибутив Tails использует Tor-сеть. Tor (The Onion Router) представляет собой распределенную систему proxy-серверов, которые позволяют анонимизировать трафик. Поддерживается шифрование трафика как входящего, так и исходящего. Все приложения выходят в сеть только через Tor. Любые попытки выхода в обход Tor сразу же блокируются.Использование Tails позволяет вам не оставлять «следы». Практически невозможно отследить ваше местонахождение, нельзя узнать какие сайты вы посещаете. Вы можете запускать Tails на любом компьютере (используя LiveCD) и оставаться при этом полностью анонимным. Tails не использует жесткий диск совсем, хотя возможность сохранить личные файлы имеется. А когда система выключается, то оперативная память стирается, чтобы из нее нельзя было извлечь никакие данные.Tails использует рабочее окружение Gnome. При запуске дистрибутива есть интересная опция — «Активировать маскировку под Windows XP». Данная опция позволяет сделать так, чтобы система выглядела очень похожей внешне на Windows XP, чтобы, например, в публичных местах никто не заподозрил вас в использовании «подозрительного» дистрибутива.
Интересный факт. Дистрибутив Tails использовал Эдвард Сноуден, также он призвал некоторых журналистов использовать Tails.
To upgrade, automatic upgrades are available from 3.6, 3.6.1, and3.6.2 to 3.7. If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade. If you are doing a manual upgrade from Tails 3.2, 3.3, 3.4, or 3.5, it is only possible to select an ISO image when running Tails in English. For other languages, the file chooser button remains inactive: To do a manual upgrade from Tails 3.2, 3.3, 3.4, or 3.5, you can either:
Restart Tails in English.
Start Tails Installer inEnglish from the command line: LANG=en_US tails-installer
New features Add support for viewing DVDs with DRM protection. (#7674) Upgrades and changes Replace Vidalia, which has been unmaintained for years, with: a system status icon indicating whether Tails is connected to Tor or not, Onion Circuits to display a list of the current Tor circuits and connections. Tor Status extension clicked in the top bar and Onion Circuits window open
Automatically save the database of KeePassX after every change to prevent data loss when shutting down. (#11147)
Update Tor Browser to 5.5.3.
Improve Japanese-style glyph display. Upgrade I2P to 0.9.24.
Disable the Alt + Shift and Left Shift + Right Shift keyboard shortcuts that used to switch to the next keyboard layout. You can still use Meta + Space to change keyboard layout. (#11042)
Fixed problems Fix optional PGP key feature of WhisperBack. (#11033)
Fix saving of WhisperBack report to a file when offline. (#11133)
Make Git verify the integrity of transferred objects. (#11107)
Debian 8 upgrades most included software, for example: Many core GNOME utilities from 3.4 to 3.14: Files, Disks, Videos, etc. LibreOffice from 3.5 to 4.3 PiTiVi from 0.15 to 0.93 Git from 1.7.10 to 2.1.4 Poedit from 1.5.4 to 1.6.10 Liferea from 1.8.6 to 1.10
Update Tor Browser to 5.5 (based on Firefox 38.6.0 ESR): Add Japanese support.
Remove the Windows camouflage which is currently broken in GNOME Shell. We started working on adding it back but your help is needed!
Change to systemd as init system and use it to: Sandbox many services using Linux namespaces and make them harder to exploit. Make the launching of Tor and the memory wipe on shutdown more robust. Sanitize our code base by replacing many custom scripts.
Update most firmware packages which might improve hardware compatibility.
Notify the user if Tails is running from a non-free virtualization software.
Remove Claws Mail, replaced by Icedove, a rebranded version of Mozilla Thunderbird.
Fixed problems
HiDPI displays are better supported. (#8659)
Remove the option to open a download with an external application in Tor Browser as this is usually impossible due to the AppArmor confinement. (#9285)
Close Vidalia before restarting Tor.
Allow Videos to access the DVD drive. (#10455, #9990)
Allow configuring printers without administration password. (#8443)
Known issues
Tor Browser 5.5 introduces protection against fingerprinting but due to an oversight it is not enabled in Tails 2.0. However, this is not so bad for Tails users since each Tails system has the same fonts installed, and hence will look identical, so this only means that it's easy to distinguish whether a user of Tor Browser 5.5 uses Tails or not. That is already easy given that Tails has the AdBlock Plus extension enabled, unlike the normal Tor Browser.
See the current list of known issues. Installing
We also redesigned completely our download and installation instructions to make it easier to get started with Tails.
For example, you can now verify the ISO image automatically from Firefox using a special add-on.
You can also install or upgrade Tails directly from Debian or Ubuntu using the tails-installer package.
Upgrades and changes Tor Browser to 5.0.6 Fixed problems Fix time synchronization in bridge mode. Known issues Automatic upgrades are much slower to apply than before. Expect the upgrade to take around an hour after the download is finished.
Upgrades and changes Electrum from 1.9.8 to 2.5.4. Now Electrum should work again in Tails.
Tor Browser to 5.0.5.
Tor to 0.2.7.6.
I2P to 0.9.23.
Icedove from 31.8 to 38.4.
Enigmail from 1.7.2 to 1.8.2.
Known issues Incremental upgrades are much slower to apply than before. You can expect it to take around an hour after the upgrade has been downloaded. See 10757 for details.
If your system clock is incorrect, then bridge mode will not work. One way to work around this is to correct the system before connecting to the network, which will require setting an administration password.
You can now start Tails in offline mode to disable all networking for additional security. Doing so can be useful when working on sensitive documents.
We added Icedove, a rebranded version of the Mozilla Thunderbird email client.
Icedove is currently a technology preview. It is safe to use in the context of Tails but it will be better integrated in future versions until we remove ?Claws Mail. Users of Claws Mail should refer to our instructions to migrate their data from Claws Mail to Icedove.
Upgrades and changes
Improve the wording of the first screen of Tails Installer.
Restart Tor automatically if connecting to the Tor network takes too long. (#9516)
Update several firmware packages which might improve hardware compatibility.
Update the Tails signing key which is now valid until 2017.
Update Tor Browser to 5.0.4.
Update Tor to 0.2.7.4.
Fixed problems
Prevent wget from leaking the IP address when using the FTP protocol. (#10364)
Prevent symlink attack on ~/.xsession-errors via tails-debugging-info which could be used by the amnesia user to bypass read permissions on any file. (#10333)
Force synchronization of data on the USB stick at the end of automatic upgrades. This might fix some reliability bugs in automatic upgrades.
Make the "I2P is ready" notification more reliable.
Upgrades and changes Upgrade Tor Browser to version 5.0.3 (based on Firefox 38.3.0 ESR). Upgrade I2P to version 0.9.22 and enable its AppArmor profile. There are numerous other changes that might not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.
Fixed problems Fix several issues related to MAC address spoofing: If MAC address spoofing fails on a network interface and this interface cannot be disabled, then all networking is now completely disabled. A notification is displayed if MAC address spoofing causes network issues, for example if a network only allows connections from a list of authorized MAC addresses.