Security Issues with APT
Two recently discovered security issues in APT would allow it to inject manipulated packages, despite active signature verification. We have therefore done a manual verification of the mirror which we use to build the downloadable ISOs on this site, and found no manipulated packages. ISOs built with the build script should be rebuilt on a system with up-to-date APT packages.
On May 28th, 2014, a message was published on the TrueCrypt website claiming that TrueCrypt was "insecure", without giving any further reason. A new version 7.2 is offered for download. Based on our own analysis, which can be read here, and the analysis done by the Open Crypto Audit Project, we came to the conclusion that the versions of TrueCrypt used within UPR are still safe. Nevertheless, we are working on porting our concept of "extended Containers" to LUKS-based storage. We plan to release future Versions of UPR without TrueCrypt.
UPR 12.04r1 released
05/07/14: The UPR Team has published the first stable release of Ubuntu Privacy Remix 12.04r1 (Codename Protected Pangolin). UPR is a live system to protect from spying and data theft. UPR 12.04r1 is designed to boot on newer machines with UEFI + SecureBoot and supports lots of new hardware; but keeps running even on old machines by using the traditional and lightweight GNOME Classic desktop environment. The new release will be presented at LinuxTag 2014 in Berlin (Talk at Thu, May 8th, 9:30pm).
Getting your own UPR CD
Ubuntu Privacy Remix is a free project. Anyone finding it useful can use UPR free of charge and is encouraged to send suggestions, bug reports and criticism to us.
The image of the CD can be downloaded here. The UPR developers can neither guarantee that the download servers never get compromised, nor can we guarantee that downloads are not being redirected to other servers by DNS spoofing or similar. The authenticity of the image can be verified using our GPG-Signature.
For additional control, people wanting to build their own CD from scratch can find the Tutorials for this here.