Commit 1d068e32 authored by intrigeri's avatar intrigeri
Browse files

More polishing.

parent f3829b15
......@@ -79,12 +79,11 @@ Examples
A small delta, to avoid drowning
------------------
* Often, specialized distributions die quickly.
* At least in this area.
✝ Liberté Linux, Haven, Anonym.OS, ParanoidLinux, onionOS, Phantomix and
many others. RIP.
* Fact: specialized distributions often die quickly.
* At least in this area: ✝ Liberté Linux, Haven, Anonym.OS,
ParanoidLinux, onionOS, Phantomix and many others. RIP.
Why?
Why did they die so quickly?
------------------
* small teams, not organized to grow
......@@ -96,11 +95,12 @@ E.g. what we're doing upstream
------------------
* AppArmor
* Debian: pkg-apparmor, pkg-anonymity-tools, pkg-perl
* Debian: pkg-apparmor-team, pkg-anonymity-tools,
pkg-otr-team
* libvirt
* Seahorse
* MAT
* fix OTR downgrade → v1
* Tor
* Puppet shared modules
Results
---------------
......@@ -124,9 +124,10 @@ PELD
* <https://tails.boum.org/contribute/design>
* Tails currently based on Debian Wheezy.
* ...migrating to Jessie.
* Core software:
* Tor
* Vidalia (migrating to Tor Monitor <https://labs.riseup.net/code/issues/6841>)
* Core software:
Tor
Tor Browser
GNOME
Use the Internet anonymously
-----------------------
......@@ -141,12 +142,12 @@ Tails Installer
* Initially based on Fedora's liveusb-creator
* <https://tails.boum.org/contribute/design/installation/>
* recently converted to Python + GTK3
* will be uploaded to Debian soon :)
* recently converted to Python + GTK3 + udisks2
* will be uploaded to Debian very soon :)
Leave no trace on the computer
-----------------------
* Protect against memory recovery such as cold boot attack
* Protect against memory recovery such as cold boot attacks
* RAM is overwritten when Tails is being shutdown
<https://tails.boum.org/contribute/design/memory_erasure/>
* Actual memory erasure: secure-delete (sdmem)
......@@ -157,33 +158,36 @@ Tails persistence
* Somewhat tricky topic for a live distro
* User keys, some APT packages...
* LUKS-encrypted GPT partition (TailsData)
* dm-crypt
* ext4
* Written in Perl
* dm-crypt, ext4
* backend implemented upstream in `live-boot`
* GUI written in Perl + GTK3
Incremental upgrades
-----------------------
* Only possible in USB stick
* Only possible when installed on USB stick
* Incremental Upgrade Kit (IUK)
Application isolation
-----------------------
* Currently only file system isolation
* AppArmor to isolate applications
* Currently only file access isolation
(missing non-mainlined kernel patches)
* The best supported in Debian
* Hacks to support the Live system
* Web browser in process
* Currently (somewhat) confined: Tor Browser, Tor, Pidgin, Evince,
Totem, Vidalia, etc.
Build and Test
-----------------------
* Git repo → <https://tails.boum.org/contribute/git/#main-repo>
* Git repo
→ <https://tails.boum.org/contribute/git/#main-repo>
* Building Tails using Vagrant
* Goal: automated build and tests
* Automated test suite
* Sikuli, libvirt, cucumber
* Automated builds (done!) and tests (WIP) in Jenkins
* Test suite: Sikuli, libvirt, cucumber
→ live demo next Friday
Challenges
==========
......@@ -192,12 +196,12 @@ Cadence & popularity
--------------------
- new release every 6 weeks
- about 10k boots a day, doubles every 6-9 months
- about 14k boots a day (* 2.8 since 2 years)
Limited resources and time
--------------------------
- small team
- small team compared to scope and pressure
- 3500 commits, by 13+ persons, in the last 6 months
Roadmap
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment