Release of distribution Tails 5.1

formed the release of a specialized distribution Tails 5.1 (The Amnesic Incognito Live System), based on the DEBIAN package base and intended for anonymous exit to the network. An anonymous exit to Tails is provided by the Tor system. All connections, except traffic via the Tor network, are blocked by default by a package filter. For storage of user data in the mode of conservation of user data between the launches, encryption is used. To download, prepared by ISO-image , capable of working in Live mode, 1 GB.

The new issue was not formed on May 31, as planned, but on June 5, due to the delay in the publication of the new version of the browser Tor Browser 11.0.14, including the corrections vulnerabilities in the Firefox engine. Officially new release
Tor Browser also not announced , but the assembly is already available. Other changes:

  • The transition to a new stable branch of Tor 0.4.7 with the implementation of the Overload management protocol.
  • Updated the Linux 5.10.113 nucleus and the mail client Thunderbird 91.9.
  • The capabilities of the connection wizard with Tor (Tor Connection Assistant) are expanded, which makes it possible to connect from censored networks via bridge gateways to circumvent blocking. Before connecting to Tor, an automatic time adjustment on the computer was ensured to simplify bypass censorship systems in some countries. Information about the time is extracted directly (at the stage before installing the connection to Tor) from the service of determining the Captive portals provided by the Fedora project. The time displayed in the upper panel is now displayed taking into account the clock belt selected when adjusting the clock. Information shown after installing the connection to the Tor shown after installing the bridge nodes is used or not.


  • In the Unsafe Browser, used to contact resources in the local network, for example, for authorization on a wireless network with a Captive portal, a new home page shown not through the TOR network and a simplifying connection to a wireless network via Captive Portal.
  • A prevention of a possible loss of these session is ensured by trying to restart when Unsafe Browser.

  • In the file manager, a call to manage certificates is implemented kleopatra , when clicking on OpenPGP files *.GPG now Double click enough). The Kleopatra program is also added to the list of recommended applications.


/Media reports.