Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Linux News Today: Tails 2.4, Edward Snowden's Favorite Anonymous Live CD, Brings Tor Browser 6.0

Posted on June 7, 2016

The Tails Project released Tails 2.4, a major version of the anonymous Live CD based on Debian GNU/Linux, which was used by ex-CIA employee Edward Snowden to stay hidden online and protect his privacy.

When compared with the previous release, we can notice that Tails 2.4 includes some big changes, among which we can mention the upgrade to Debian GNU/Linux 8.4 “Jessie” and the inclusion of the recently released Tor Browser 6.0 anonymous browser, which is based on the open-source Mozilla Firefox 45.2 web browser.

Another interesting feature is the enablement of the automatic configuration wizard for the Icedove free (libre) email and news suite. The Tails developers managed to patch Icedove to use and accept only secure protocols, but keep the enhancements from the TorBirdy project, a Mozilla Thunderbird add-on for connecting to the Tor network.

Bug fixes and minor improvements

As expected, Tails 2.4 fixes many of the issues that have been reported by users since the previous update to the open-source amnesic incognito live system, such as an important update to the Tails Upgrader tool to offer support for other languages than English, as well as the enablement of the Packetization Layer Path MTU Discovery for the IPv4 network protocol.

“If any system on the path to the remote host has a MTU smaller than the standard Ethernet one, then Tails will receive an ICMP packet asking it to send smaller packets. Our firewall will drop such ICMP packets to the floor, and then the TCP connection won’t work properly. This can happen to any TCP connection, but so far it’s been reported as breaking obfs4 for actual users,” reads the announcement.

Among other improvements, we can mention better firewall and kernel hardening, removal of the APT pinning feature, the GNOME Tweak Tool, the hledger accounting program, the Debian experimental APT source, the module-assistant hook, the “Power Off” and “Reboot” entries from the Applications Menu, the nmh message handling system, and the Zenity hacks (Tails 2.4 uses the up-to-date Zenity packages from Debian GNU/Linux 8 “Jessie”).

Downoad Tails 2.4 right now via our website.

Via Softpedia

Terbaru

  • Apakah Pinjol Kilat Cicil: Legal atau Ilegal? Penipuan atau Tidak?
  • Cara Bikin Aplikasi SaaS Fullstack Sederhana dalam 10 Menit dengan Claude
  • Berapa Lama Verifikasi Dana Premium? Jangan Panik, Ini Penjelasannya!
  • NotebookLM Sekarang Bisa Kustomisasi Slide Presentasi Secara Dinamis
  • Review Lengkap Headset SteelSeries Arctis Nova Elite
  • Cara Cek Bansos Atensi YAPI 2026 dan Jadwal Cairnya!
  • Kenapa 2026 Bakal Jadi Tahun Kejayaan Gaming di Linux? Ini Jawabannya
  • Download Upload DNS dan SPTJM SD-SMP untuk Administrasi TKA 2026
  • Kenapa Disney Matikan Dolby Vision dan HDR10? Ini Penjelasannya
  • Kenapa Bobon Santoso Pensiun Dari Youtube? Ini Alasan Sebenarnya
  • Apakah Bootcamp Hacktiv8 Penipu atau Direkomendasikan?
  • Inilah Estimasi Waktu Pencairan TPG 2026 Sehabis SKTP Muncul di Info GTK
  • Cara Menggunakan openClaw untuk Kebutuhan SEO
  • Apakah Tunjangan Profesi Guru Hangus Karena SKTP Belum Terbit?
  • Cara Tarik Saldo PNM Digi ke Rekening & Daftar: Panduan Lengkap & Terbaru!
  • Apa itu Penipuan Michat Hotel?
  • Yang Baru di Claude 5 Sonnet
  • Tip Jadi Kreator di Pinterest Tahun 2026
  • Cara Jualan Produk Digital Tanpa Harus Capek Promosi Terus-Menerus
  • Rangkuman Strategi Bisnis Baru dari CEO Youtube 2026, Wajib Dibaca Kreator Nih
  • Apa itu Platform WeVerse? Ini Penjelasan Lengkapnya
  • Inilah Cara Mendapatkan 1000 Subscriber Cuma dalam 3 Hari Tanpa Edit Video Sama Sekali
  • Apa itu Shibal Annyeong yang Viral TikTok?
  • Apakah iPhone Inter Aman?
  • Kenapa Gemini AI Bisa Error Saat Membuat Gambar? Ini Penjelasannya!
  • Daftar Akun Moonton via Web Tanpa Aplikasi untuk MLBB
  • Cara Hapus Akun Terabox: Panduan Lengkap dan Aman
  • Khaby Lame’s $957M Digital Identity Deal Explained
  • Cek HP Anak, Apakah Ada Video Viral Cukur Kumis Bawah
  • Jika ATM Terpelanting, Apakah Saldo Aman?
  • How to Recover Deleted Files from VMware Datastore
  • How to Fix Missing Audio Ports in Device Manager
  • Plex vs Jellyfin: Why Plex is Still the Best Self-Hosted Media Server for Most Users
  • KDE Plasma 6.7 Brings AI-Powered Multitasking to Linux with Smart Window List
  • How to Fix Microsoft 365 License Errors 29 & 44 with Simple Steps
  • Inilah Cara Buat Conversation Starter di Claude Project Agar Workflow Kalian Lebih Sat-Set
  • Cara Membuat Knowledge Base Audit untuk Claude Project Agar Dokumen Kalian Nggak Berantakan
  • Cara Ubah Role Definition Menjadi Custom Instructions yang Efektif buat Claude Project
  • Cara Mendefinisikan Role Project Claude Agar Hasilnya Lebih Akurat dan Konsisten
  • Cara Buat AI Asisten Pribadi dengan Teknik RAG
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025
Beli Pemotong Rumput dengan Baterai IRONHOOF 588V Mesin Potong Rumput 88V disini https://s.shopee.co.id/70DBGTHtuJ
Beli Morning Star Kursi Gaming/Kantor disini: https://s.shopee.co.id/805iTUOPRV

©2026 emka.web.id | Design: Newspaperly WordPress Theme