Commit 13eaed5e authored by intrigeri's avatar intrigeri
Browse files

Merge remote-tracking branch 'origin/master' into stable

parents 0e2e2663 ff235fe0
RewriteEngine on
RewriteBase /
RewriteRule ^administration_password/?$ doc/first_steps/startup_options/administration_password [R]
RewriteRule ^blueprint/additional_software_packages_offline_mode/?$ blueprint/additional_software_packages/offline_mode [R]
RewriteRule ^bug_reporting/?$ doc/first_steps/bug_reporting [R]
RewriteRule ^build/?$ contribute/build [R]
......
......@@ -238,7 +238,7 @@ msgid ""
"tails-ux@boum.org is the list for matters related to [[user experience and "
"user interface|contribute/how/user_experience]]."
msgstr ""
"tals-ux@boum.org est la liste pour les problèmes liés à [[l'expérience "
"tails-ux@boum.org est la liste pour les problèmes liés à [[l'expérience "
"utilisateur et l'interface utilisateur|contribute/how/user_experience]]."
#. type: Plain text
......
......@@ -26,3 +26,5 @@ Feel free to add any relevant issue to this list.
* [[!gnome_gitlab totem/issues/116 desc="Saving playlist state sometimes hangs totem"]]
* [[!gnome_gitlab yelp/issues/98 desc="Yelp: Clicking a HTML link pointing to an anchor on the page currently viewed opens Nautilus"]]
* [[!gnome_gitlab gdm/issues/251 desc="screensaver doesn't lock with password prompt if password was just set"]]
* [[!gnome_gitlab gtk/issues/1211 desc="Cursor stays in wait status for some seconds after calling `gtk_show_uri_on_window`"]]
* [[!gnome_gitlab seahorse/issues/177 desc="Seahorse: Please support finding remote OpenPGP keys by fingerprint"]]
......@@ -8,7 +8,7 @@ bloat the ISO image.
The current limitations include:
- No user interface. Currently you have to edit a file as root. ([[!tails_ticket 5996 desc="#5996"]])
- No user interface. Currently you have to edit a file as root. ([[!tails_ticket 14568 desc="#14568"]])
- Their Installation locks the opening of the desktop. ([[!tails_ticket 9059 desc="#9059"]])
......
[[!meta title="Explain Tails"]]
Open relationship
-----------------
Tails is not my main operating system: Tails does not make me choose
between itself and other operating systems. With Tails I have an open
relationship. Is not my main operating system, I have other operating
systems for other things.
One in my laptop, one in my school...
Tails is not jealous and does not aim to fulfill all my computer needs:
if I need something Tails cannot give me... I can use another operating
system!
Camping
=======
But I respect our relationship: Tails does not want to be plugged to my
laptop if I am running other operating systems, so I never do that.
And I don't use identities I use on other operating systems from the
same Tails USB stick.
<a id="iff"></a>
Tails as a tent
---------------
From "[Writing good documentation](https://platform.internetfreedomfestival.org/en/IFF2018/public/schedule/custom/426)" at the IFF 2018
---------------------------------------------------------------------------------------------------------------------------------------
### Sheet 1
- [Drawing of an unfolded tent] portable, set up anywhere in the world or your own backyard
- [Drawing of a circus tent]
- [Drawing of a magic hat] make things magically disappear
- [Drawing of two similar tents]
- [Drawing of a tent in a bag] small portable tent fits in backpack, with your belongings.
- [Drawing of a tent city of similar tents]
### Sheet 2
Tents, The everyperson's
### Tents, The everyperson's
- Amnesic
- Empty every time its setup
......@@ -48,18 +26,42 @@ Tents, The everyperson's
- Live
- Can carry around in backpack
- Can set up in backyard (own laptop) or away from home
- Put it away when its finished
### Sheet 3
Leave No Trace
--------------
- clean every time where work (normal is really customized)
- common visual aspect
- decide what keep
- [Drawing of a tent city of similar tents]
"[Leave No Trace](https://lnt.org/)" is an organization and a code of ethics
for outdoor activities.
Open relationship
=================
Tails is not my main operating system: Tails does not make me choose
between itself and other operating systems. With Tails I have an open
relationship. Is not my main operating system, I have other operating
systems for other things.
One in my laptop, one in my school...
Tails is not jealous and does not aim to fulfill all my computer needs:
if I need something Tails cannot give me... I can use another operating
system!
But I respect our relationship: Tails does not want to be plugged to my
laptop if I am running other operating systems, so I never do that.
And I don't use identities I use on other operating systems from the
same Tails USB stick.
<a id="iff"></a>
### Sheet 4
Other output from [IFF 2018](https://platform.internetfreedomfestival.org/en/IFF2018/public/schedule/custom/426)
================================================================================================================
- [Drawing of a circus tent]
- [Drawing of a magic hat] make things magically disappear
- Doesn't leave a trace -- invisibility cloak
- Tent - put it away when its finished
- New wig every morning
- Incognito mode for your computer
- A caravan -- you're the owner, you can move it anywhere
......@@ -70,8 +72,8 @@ Tents, The everyperson's
- Using a bike lock
- Helmet with shades so you're unknown
From the user testing of Additional Software in January 2018 in Berlin
----------------------------------------------------------------------
From the user testing in January 2018 in Berlin
===============================================
- Additional Software P1 talking about how everything we do on the
Internet is tracked: "With Tails I can create that image for myself".
......
......@@ -47,7 +47,7 @@ These will help us for future work like defining a graphical style
guide, defining the tone on our website, the type of visuals to use,
etc.
XXX: Link to resources on brand attributes
- [Mozilla Open Design: Creative Strategy On View](https://blog.mozilla.org/opendesign/creative-strategy-on-view/)
### Deliverable
......@@ -230,6 +230,7 @@ Structured explanation
### Examples
- <https://icloak.me/>
- <https://www.apple.com/apple-watch-series-3/>
- <https://www.tunnelbear.com/>
......
......@@ -11,10 +11,26 @@ Generic
* Minimized applications in the taskbar can't be raised via the
taskbar. They can be raised via the *Activities Overwiew*.
Toshiba Encore 2
----------------
Toshiba Encore 2 WT8-B
----------------------
* Intel Atom CPU Z3735F @ 1.33GHz (Bay Trail)
* can cold-boot from USB: hold down the Vol+ button, then hold down
the Power button, until the boot selection menu appears.
Select the desired boot device and press the Windows key.
feature/jessie + 32-bit UEFI, 20150507:
### Tails pre-3.9 devel branch (Stretch) + feature/15763-linux-4.17
* MAC spoofing fails
* Backlight tuning: GNOME Shell offers the UI, but it has no visible effect.
* Display rotation (probably because we don't install `iio-sensor-proxy`)
* Sound card is detected but no sound output. The kernel complains
about missing `intel/fw_sst_0f28.bin` firmware while it's supposed
to be shipped in [[!debpts firmware-intel-sound]].
<http://www.studioteabag.com/science/dell-venue-pro-linux/#ALSA> has
some configuration tricks that might help.
### feature/jessie + 32-bit UEFI, 20150507
* The Florence virtual keyboard is not very usable:
- its default font size is way too small, but that can be configured
......@@ -35,16 +51,33 @@ feature/jessie + 32-bit UEFI, 20150507:
Works fine
==========
Generic
-------
Toshiba Encore 2
----------------
feature/jessie + 32-bit UEFI, 20150507:
### Tails pre-3.9 devel branch (Stretch) + feature/15763-linux-4.17
* _sometimes_ boots fine after:
- removing `slab_nomerge`, `slub_debug=FZP`, `vsyscall=none`, `page_poison=1`,
`quiet` and `splash` → XXX: which of these changes are are really needed?
- adding `nosplash` → XXX: really needed?
- adding `clocksource=tsc tsc=reliable` → XXX: really needed?
- `intel_idle.max_cstate=1` (<https://bugzilla.kernel.org/show_bug.cgi?id=109051>) → XXX: really needed?
* Battery level monitoring
### feature/jessie + 32-bit UEFI, 20150507
* boots fine with `nomodeset` (otherwise screen blanks at `switching
to inteldrmfb from simplefb`, although the OS continues loading)
* X.Org with KMS
* touchscreen
* USB
Resources
=========
* <https://twitter.com/kapper1224> gave an inspiring talk at DebConf18
([slides](https://www.slideshare.net/kapper1224/hacking-with-x86-windows-tablet-and-mobile-devices-on-debian-debconf18))
about "Hacking with x86 Windows Tablet and mobile devices on
Debian".
* <https://nmilosev.svbtle.com/fedora-on-baytrail-tablets-2017-edition>
* <http://www.studioteabag.com/science/dell-venue-pro-linux/>
......@@ -31,7 +31,7 @@ See [[blueprint/strategic_planning]] for the terminology.
### Gather comments on our draft personas
Chapter 3: [[Riou, the protest organizer|personas#riou]]
Chapter 3: [[Derya, the privacy advocate|personas#derya]]
From the work that we did at the last summit, we drafted skeletons of
personas: a very basic description of what kind of users they are.
......@@ -99,7 +99,7 @@ designate themselves beforehand.
| May 2018 | sajolida | segfault |
| June 2018 | intrigeri | u |
| July 2018 | sajolida | u |
| August 2018 | | |
| August 2018 | sajolida | segfault |
| September 2018 | | intrigeri |
| October 2018 | | |
| November 2018 | intrigeri | |
......
[[!meta title="Tails report for July, 2018"]]
[[!meta date="Tue, 10 Apr 2018 01:23:45 +0000"]] XXX: adjust date
[[!toc]]
Releases
========
* [[Tails VERSION was released on MONTH DAY|news/version_VERSION]] ([major|minor] release).
* Tails VERSION+1 is [[scheduled for MONTH DAY|contribute/calendar]].
The following changes were introduced in Tails VERSION:
XXX: Copy the "Changes" section of the release notes, and compact a bit:
* Remove lines about software upgrade (that's not Tails itself).
* Remove screenshots.
* Remove "New features" and "Upgrades and changes" headlines.
* Remove line about Changelog.
Code
====
XXX: If you feel like it and developers don't do it themselves,
list important code work that is not covered already by the
Release section (for example, the changes being worked on for
the next version).
Documentation and website
=========================
XXX: If you feel like it and technical writers don't do it
themselves, explore the Git history:
git log --patch --since='1 October' --until='1 November' origin/master -- "*.*m*"
User experience
===============
XXX: If you feel like it and the UX team does not do it
themselves, check the archives of tails-ux:
<https://mailman.boum.org/pipermail/tails-ux/>
Hot topics on our help desk
===========================
XXX: Ask tails-bugs@boum.org to list hot topics for the last month.
1.
1.
1.
Infrastructure
==============
XXX: Count the number of tests in /features at the beginning of next month
git checkout `git rev-list -n 1 --before="June 1" origin/devel`
git grep --extended-regexp '^\s*Scenario:' -- features/*.feature | wc -l
XXX: Report only if more scenarios have been written and add the diff from the previous month, for example:
- Our test suite covers SCENARIOS scenarios, DIFF more that in May.
Funding
=======
XXX: The fundraising team should look at the fundraising Git.
git log --patch --since='1 December' --until='1 January' origin/master
XXX: The fundraising and accounting teams should look at the archives of <tails-fundraising@boum.org> and <tails-accounting@boum.org>.
Outreach
========
Past events
-----------
Upcoming events
---------------
On-going discussions
====================
XXX: Link to the thread on <https://mailman.boum.org/pipermail/tails-XXX/>.
Press and testimonials
======================
XXX: Copy content from press/media_appearances_2018.mdwn
This page is continuously updated by tails-press@boum.org, so if
it's empty there might be nothing special to report.
Translation
===========
XXX: Add the output of `contribute/l10n_tricks/language_statistics.sh`
XXX: Add the output of (adjust month!):
git checkout $(git rev-list -n 1 --before="September 1" origin/master) && \
git submodule update --init && \
./wiki/src/contribute/l10n_tricks/language_statistics.sh
Metrics
=======
* Tails has been started more than BOOTS/MONTH times this month. This makes BOOTS/DAY boots a day on average.
* SIGS downloads of the OpenPGP signature of Tails ISO from our website.
* WHISPERBACK bug reports were received through WhisperBack.
[[How do we know this?|support/faq#boot_statistics]]
XXX: Ask <tails@boum.org> for these numbers.
......@@ -83,6 +83,13 @@ Past events
Upcoming events
---------------
- sajolida will be at [Tor meeting in Mexico
City](https://trac.torproject.org/projects/tor/wiki/org/meetings/2018MexicoCity)
from September 29 to October 3 and will present Tails during the open
days on October 2.
- XXX: UNAM colloquium
On-going discussions
====================
......
[[!meta title="Personas"]]
[[!toc levels=3]]
# Big picture
[[!toc levels=2]]
This is about [[!tails_ticket 11162]].
......@@ -24,16 +22,10 @@ This is about [[!tails_ticket 11162]].
- Accessibility and inclusion
- [Designing for the extremes (or why your average user doesn’t exist)](https://sugoru.com/2013/07/14/designing-for-the-extremes/)
- [Personas for Accessible UX](https://www.slideshare.net/whitneyq/personas-for-accessible-ux)
- [Inclusive Design at Microsoft](https://www.microsoft.com/en-us/design/inclusive)
- [Inclusive Design at Microsoft](https://www.microsoft.com/design/inclusive/)
# Data sources
- [*Internews*: Digital Security and Journalists, A SnapShot of
Awareness and Practice in Pakistan](https://www.internews.org/sites/default/files/resources/Internews_PK_Secure_Journalist_2012-08.pdf).
- [*Digital Rights Foundation*: Digital (In)security of Journalists in
Pakistan](https://digitalrightsfoundation.pk/wp-content/uploads/2018/01/Report-Digi-Insecurity-of-Journos.pdf).
- [*Mozilla*: 10 Fascinating Things We Learned When We Asked The World ‘How
Connected Are You?’](https://blog.mozilla.org/blog/2017/11/01/10-fascinating-things-we-learned-when-we-asked-the-world-how-connected-are-you/).
......@@ -54,26 +46,11 @@ This is about [[!tails_ticket 11162]].
different causal beliefs related to computer security, and about the
actions they regularly undertake to protect their computers.
- [*Javier Garza Ramos*, Journalist Security in the Digital
World](http://www.cima.ned.org/wp-content/uploads/2016/03/CIMA-Journalist-Digital-Tools-03-01-15.pdf)
is a survey of 154 journalists worldwide on their digital security
practices.
- [Jennifer R. Henrichsen](https://www.asc.upenn.edu/people/jennifer-r-henrichsen) is
doing a research with journalists and digital security trainers to
shed light on journalists' perceptions toward digital security
technologies, including motivations to adopt and barriers to adoption.
In March 2018, the results of her research were not published yet.
- [EFF: Privacy By Practice, Not Just By Policy: A System Administrator
Advocating for Student Privacy](https://www.eff.org/deeplinks/2017/03/privacy-practice-not-just-policy-system-administrator-advocating-student-privacy)
is an interesting story about the use of Chromebooks in schools and
the internal resistance about its threat to privacy.
# Archive of the process
- [Tails-project: Regarding USB sticks for domestic violence
survivors](https://mailman.boum.org/pipermail/tails-project/2017-March/000757.html)
[[!toggle id="2016-08" text="Collective brainstorming in August 2016"]]
# Collective brainstorming in August 2016
[[!toggleable id="2016-08" text="""
Use cases:
......@@ -148,9 +125,11 @@ Use cases:
- A person without the need for a big storage uses Tails as their main
operating system to have more privacy.
<a id="2017-08"></a>
"""]]
[[!toggle id="2017-08" text="Collective process from August 2017"]]
# Collective process from August 2017
[[!toggleable id="2017-08" text="""
Summary of a 2 hours session we did with 12 core contributors.
......@@ -214,390 +193,545 @@ conception and gestation*.
- All together we summarize these goals by identifying main goals and
subgoals. (10')
- Final goals:
See "User goals for using Tails" below.
"""]]
**A. I want to hide information about myself**
User goals for using Tails
==========================
- I want to keep content & information secret from my government
- I want to keep information secret from my family and close people
- I want to access sensitive information stealthily
- I want to hide my identity
- I want to hide my location and identity
- I want to hide my location
- I don't want to raise suspicion
#### A. I want to hide information about myself
**B. I want to communicate and collaborate securely**
- I want to keep information secret from my government
- I want to keep information secret from my family and close people
- I want to access sensitive information stealthily
- I want to hide my identity
- I want to hide my location
- I don't want to raise suspicion
- I want to communicate securely with known peers
- I want to communicate securely with unknown peers
- I want to communicate with others who are under surveillance
- We want to share and work on documents privately
#### B. I want to communicate and collaborate securely
**C. I want to store information safely**
- I want to communicate securely with known peers
- I want to communicate securely with unknown peers
- I want to communicate with others who are under surveillance
- We want to share and work on documents privately
- I need to safely store my data
- I want to edit or anonymize my data
#### C. I want to store information safely
**D. I want to leave no trace on the computer**
- I need to safely store my data
- I want to edit or anonymize my data
- I need to use a computer that is not mine
#### D. I want to leave no trace on the computer
**E. I want information to be free**
- I need to use a computer that is not mine
- I want to access censored information online
- I want to publish sensitive information
#### E. I want information to be free
**F. I don't want my data to be gathered by corporations and governments**
- I want to access censored information online
- I want to publish sensitive information
- I want to understand people using Tails
- I just want more privacy
#### F. I don't want my data to be gathered by corporations and governments
# Skeletons
- I want to understand people using Tails
- I just want more privacy
After this collective session, the core team working on the personas (3
people) started preparing skeletons, rough descriptions of each persona,
based on the main goals identified earlier. Each persona is primarily
focused on a single main goal but also corresponds to some subgoals of
other categories.
# Personas
On top of demographics, background, and technical skills information,
our framework includes holistic security and threat modeling information
(based on the [Personas Framework for Internet
Freedom](http://internetfreedom.secondmuse.com/framework-elements/developing-personas/)
developed by SecondMuse):
Our framework includes holistic security and threat modeling information based
on the [Personas Framework for Internet Freedom](http://internetfreedom.secondmuse.com/framework-elements/developing-personas/)
developed by SecondMuse:
1. Name (genderneutral)
2. Occupation
3. Background
4. Motivations
5. Challenges and threats
6. Communications
7. Goals
8. Use cases
9. Definition of security
10. Key Technologies used regularly
a. Features used in Tails
b. Features used outside of Tails
11. Threat perception
12. Security precautions
- Name (genderneutral)
- Occupation
- Background
- Motivations
- Challenges and threats
- Communications
- Goals
- Use cases
- Definition of security
- Key Technologies used regularly
- Features used in Tails
- Features used outside of Tails
- Threat perception
- Security precautions
<a id="kim"></a>
## Kim, the surveilled at home
- **Background**
- Kim is a gay youth from Nigeria that has been institutionalized.
- Kim has been abused at home.
- Kim is using a shared a computer.
- **Motivations**
- Kim is searching for help and support groups online and also tries
to find solidarity.
- Kim wants to feel normal.
- Kim wants to avoid surveillance from mentors in the institution they
lives in.
- Kim does not want to leave traces on the shared computer and prefers
to hide their identity by accessing information stealthily.
- **Challenges and threats**:
- The computer room is crowded
- Can't meet with support groups openly and has to do it online
- Surveillance from mentors
- Time is limited
- Fear of previous abusers
- Worried about saving information safely
- Needs to know keyboard shortcuts for switching applications in case
somebody walks behind them
- Needs safe storage for email addresses and nicknames
- Needs access to books online
- Needs to use a pseudonym
- Needs a stealth or dedicated email address
- Needs to store data in the cloud or an encrypted device in case Kim
gets searched
- **Communications**
- Online support groups: forums, websites
- Known peers: chat, email
- Unknown peers: chat, email, forums
- Psychologist online: forums, websites
- **Goals**
A. I want to hide information about myself
- I want to keep content & information secret from my government
- I want to keep information secret from my family and close people
- I want to access sensitive information stealthily
- I want to hide my identity
- I want to hide my location and identity
- I want to hide my location
- I don't want to raise suspicion
B. I want to communicate and collaborate securely
- I want to communicate securely with known peers
- I want to communicate securely with unknown peers
D. I want to leave no trace on the computer
- I need to use a computer that is not mine
E. I want information to be free
- I want to access censored information online
## Kim, the surveilled at home (16-19)
### Background
- Is living in a very religious family in the US.
- Tried to come out as trans to their family in the past but they don't
believe them and think they are just a complicated teenager.