Tails 5.1 comes with a fix for a serious JavaScript security vulnerability

The Tails Project has announced the release of Tails 5.1. It comes with improvements to the Tor Login Wizard, Insecure Browser and Captive Portals, and most importantly, a fix for a serious vulnerability that was present in the Tor Browser in Tails 5.0. On May 24, the project warned people not to use Tails because of this vulnerability.

As for the Tor Connection wizard, Tails 5.1 fixes the clock computer for those who choose to automatically connect to Tor. The project said it makes it easier for people in Asia to connect online. To do this, Tails uses Fedora’s captive portal detection service – which is present on many Linux distributions. One downside is that this connection does not use the Tor network. You can read the project evaluation on using this software in the FAQ.

Another interesting change that has been made to the Tor Connection wizard is the last screen that clarifies whether you connected to Tor using bridges. This should help with the general usability of the Tails operating system.

As for the insecure browser, the team behind Tails says they have created a new homepage for this browser when you are not yet connected to Tor. The home page better explains to users how to connect to the Wi-Fi network using a captive portal. If you didn’t choose to enable the insecure browser on the welcome screen, Tails now presents a confirmation before restarting the system so you don’t accidentally lose your work.

If you have already configured a Tails USB, you can start it and connect to the network, which should trigger a pop-up offering you the new version. It will be securely uploaded to Tor and installed there. If you want to download Tails for the first time, see the Get Tails page.

Comments are closed.