On Mon, May 2, 2011 at 3:05 AM, Kraktus <krak...@googlemail.com> wrote:
> On 1 May 2011 12:35, Charles Blair <c-bl...@illinois.edu> wrote:
>> B B Is the absence of a graphical browser from the base system
>> a statement that any attempt to do such things as look at
>> stuff on youtube is inherently unsafe?
>
> Not speaking officially, but, as I understand it, the general idea is
> that any unnecessary software is also an unnecessary security risk.
> Therefore, you should only run necessary software, which results in
> necessary security risks. What is necessary varies from one person to
> another, so OpenBSD ships with very little enabled by default ("secure
> be default") and you have to go install and enable the things that are
> necessary to you personally.
>
> I find it very empowering. Rather than being handed an insecure but
> feature-rich operating system and having to try to lock down the
> features I don't want, and ultimately fail because a) I'm not a good
> enough security expert and b) it's not even possible to lock down most
> operating systems as well as OpenBSD short of some major code
> revisions and audits... I get to choose which security risks are worth
> taking. Horray!
>
> I doubt there are any graphical browsers under the BSD license, which
> wouldn't help either. Things which are under a more restrictive
> license than that are generally segregated to ports and packages and
> not included in the main system.

xxxterm works excellent with youtube html5

>
>> B B Is tor considered a safe way to do anonymous browsing, or
>> does openbsd recommend an alternative?
>
> I don't think the OpenBSD project offers any recommendations on that.
> Anonymity is a different type of security than the type OpenBSD is
> offering. (Of course, running OpenBSD will certainly foil many
> attempts to break your anonymizing proxy by installing some kind of
> spyware or something.)
>
> I believe the three major ones are Tor, JonDo, and i2p. The last is
> really only useful for accessing their own internal i2p network.
> (There's also Mixminion, although I think it's more academic than
> useful at this point.) However, they are all reputable open source
> projects, each with different strengths and weaknesses. Each needs the
> browser or other application to be configured properly for optimum
> anonymity. However, a detailed discussion on all that is really
> outside the scope of this mailing lists, especially given that those
> projects have their own mailing lists and forums.
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> https://anonymous-proxy-servers.net/forum/viewforum.php?f=8
> http://forum.i2p2.de/

Reply via email to