bm-2ctjsegdfzqngqwuqjswro6jrwlc9b3...@bitmessage.ch:
>> From these links:
>
> https://anonymous-proxy-servers.net/en/help/net.html
> https://anonymous-proxy-servers.net/en/help/services_tor.html
>
> It appears that with JonDo (similar to tor), it is possible to use
> tor as the initial proxy use
y need to step up to the
> plate in these areas if you want people to take you seriously.
>
I agree with what grarpamp said.
Cheers,
adrelanos
-BEGIN PGP SIGNATURE-
iQJ8BAEBCgBmBQJSu0JyXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ5QjE1NzE1M
ts, knowledge
and opinions change over time and you're free to disagree (that's even
nice). But... What is your latest opinion on that?
Cheers,
adrelanos
[1] http://www.torproject.org/about/corepeople.html.en
[2] https://labs.riseup.net/code/issues/5991
[3]
https://lists.torproject.org/pi
I am not in contact with bitmail in any way, I wouldn't use it myself
because I find the communication about bitmail very poor, namely no
responses to points raised by others. Anyway, I like to comment on a few
things raised here.
Ulex Europae:
> Robert'
> should upload his binaries to Github.
No
ITechGeek:
> Use a local public free hotspot. McDonalds, Starbucks, local library, etc.
This provides no anonymity at all if you don't know about browser
tracking technologies (cookies, flash cookies and a million other
things). And this knowledge isn't very popular.
Using Tor Browser with a wif
Akater:
> I don't even understand who will see
> this message
Everyone signed up on this mailing list, everyone reading the archive
over web and those who find results from this mailing list on search
engines.
> and how to provide a discussion link for outsider.
Go to the mailing list archive a
Lunar:
> For those too lazy to build torsocks manually, I have just uploaded an
> updated package to Debian experimental [1].
Given that David said he plans to discuss a new name for torsocks
soon... And also to keep compatibility with existing scripts...
(torsocks changed a lot, config files are
t...@lists.grepular.com:
> 1) Create a list of tor exit nodes that do not block port 25
> 2) Command the tor daemon to exit those nodes exclusively.
Is this really necessary? Tor will automatically honor any exit relays's
exit policy and use another exit having that port open instead?
--
tor-
difficult.
Cheers,
adrelanos
Manfred Ackermann:
> Hi List.
>
> Sorry to push this up, just wondering if this approach is such stupid that
> it's not even worth leaving a related comment to it ;-) Or is it just of no
> interest?
>
> Any comments apriciated.
>
>
Lunar:
> David Goulet:
>>> Will packages for i386 be build?
>>>
>>> I failed to build them from your source package, but perhaps you're not
>>> yet at this point.
>>
>> There is a patch pending to be merged for i386 support that needs to be
>> tested. The libc syscall values is kind of tricky on Li
ttps://bugs.torproject.org/10007
Hi!
Thank yo for doing this.
Will packages for i386 be build?
I failed to build them from your source package, but perhaps you're not
yet at this point.
Best,
adrelanos
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
adrelanos:
> Hi!
>
> Short version:
>
> Can I redirect Whonix users to Stackexchange Tor Q&A forum?
>
> Long version:
>
> There are many Tor related projects, which are non-official, such as
> Whonix, Liberte Linux, TorChat, etc.
>
> Can non-official pr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Whonix is an operating system focused on anonymity, privacy and
security. It's based on the Tor anonymity network, Debian GNU/Linux
and the principle of security by isolation. DNS leaks are impossible,
and not even malware with root privileges can fi
Eugen Leitl:
> On Mon, Oct 07, 2013 at 11:59:42AM -0700, Blibbet wrote:
>
>> BTW, UEFI-based systems have a full IPv4/IPV6 network stack, with
>> PXE remote boot and WS-Management remote admin/control, and tools
>> like Perl and Telnet baked-in, so make sure your firmware isn't
>> spewing packets
It's Good to be Alive:
> Hi,
> I'm fairly new at Tor, and this is my first time on a mailing list,
> so if there's a better place to ask, let me know. Are there any
> plans, long-term or short, for augmenting Tor with Freenet-style
> resilient, distributed, encrypted hosting in place of the curr
Anthony G. Basile:
> On 10/05/2013 11:21 PM, grarpamp wrote:
>> While everyone runs on about this or that Linux distro,
>> don't forget there are very good Unix'es to be found in
>> both FreeBSD and OpenBSD. Unlike the typical Linux
>> distro, BSD doesn't have layer upon layer of system to
>> user
krishna e bera:
> On 13-10-04 09:01 PM, adrelanos wrote:
>>> * Is Ubuntu a good option as a guest (and maybe use here the TBB from
>>>time to time)? So far is the only Linux distro that I've used
>>
>> Ditch Ubuntu:
>> https://www.eff.org/deeplink
Gerardo:
> * I think Whoinx in a VM could do the work
Or Whonix with physical isolation.
> * Is Ubuntu a good option as a guest (and maybe use here the TBB from
>time to time)? So far is the only Linux distro that I've used
Ditch Ubuntu:
https://www.eff.org/deeplinks/2012/10/privacy-ubuntu
mirimir:
> On 10/04/2013 06:41 PM, Tempest wrote:
>
>> Juan Garofalo:
>>> So that the company can be blacklisted as clowns who cooperate with
>>> the US government, unlike a few principled individuals out there?
>>
>> if you trust a vpn, what does that say about you? outting vpns for being
>>
Does NSA attack as much Tor users as they can or "only" targeted attacks?
Are there statements/evidence for the former?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
grarpamp:
> Lots of identical banners... Tails/Whonix are you shipping some defaults?
> ie:
Speaking as a maintainer of Whonix, we currently do not ship any
webserver by default. In theory, we could also ship just a
pre-configured config file with different defaults. We're not doing that
either, b
Hi,
I've compiled a page with a bunch of information:
https://www.whonix.org/wiki/Money
Cheers,
adrelanos
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Mike Perry:
> [...]
> While I dislike the Web of Trust for a number of reasons*,
> [...]
> * Ensuing flamewars about the Web of Trust should reply only to tor-talk.
> [...]
I am not interested in a flamewars, just in hearing opinions.
What's the big deal with the Web of Trust?
It's a geeky thin
How long will it take until the private beta begins? It keeps saying
"soon" for a few days already.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Rock:
I've attached my key.
Looks like the mailing list software scrubbed it.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Graham Todd:
>> However, I think a good case can be made for pseudonymous contributors
>> (I don't know, we may have them now). It supports the philosophy of
>> the project, and allows contributions from those who may not have the
>> safety and freedom to contribute to a project like this publical
Runa A. Sandvik:
> On Tue, Sep 17, 2013 at 1:13 AM, adrelanos wrote:
>> Runa A. Sandvik:
>>> Hi everyone,
>>>
>>> A couple of months ago, we created a proposal for a Tor Q&A page on
>>> Stack Exchange. The proposal moved into the commitment-phase
amp;A site for Tor, please visit our proposal page
> and click the "Commit!"-button:
> http://area51.stackexchange.com/proposals/56447/tor
>
> Thanks!
>
Hi Runa,
can you post this please in The Tor Blog as well?
Cheers,
adrelanos
--
tor-talk mailing list - tor-talk@l
ackages containing binary code yet [they are fetched from Debian]
and, because that could look fishy and because it add maintenance
burden, since I would have to keep up with torproject's releases.
None of these options looks good. Any recommendations?
Cheers,
adrelanos
[1]
http://deb.torproj
ghost:
> Hi tor-talk,
> I set up a tor middlebox and a VM that (hopefully) routes all traffic
> through tor. This way:
> http://www.howtoforge.com/how-to-set-up-a-tor-middlebox-routing-all-virtualbox-virtual-machine-traffic-over-the-tor-network
>
> So am I right that I can use this vm as completel
Nathan Suchy:
> The only secure thing is Tor Tails booted from USB.
Not against the threat model the original poster is concerned about.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/to
Speaking as a maintainer of Whonix...
Before answering this, there is some prerequisite knowledge. There is a
difference between:
- Free Software and free software
- Open Source and open source
When I am using capitalized Open Source, I am referring to OSI approved
[1] licenses (by the Open Sourc
shadowOps07:
> Truecrypt is a open source software therefore NSA doesn't have back
> door access to this particular software.
Without deterministic builds, and TrueCrypt isn't deterministically
build, [1] Open Source does not prevent backdoors, unless you compile
from source code. The ones who com
Jimmy Olson:
> Hi I am following the instructions on this page except it was wrong and the
> comment here fixes the problem
>
> http://www.howtoforge.com/how-to-set-up-a-tor-middlebox-routing-all-virtualbox-virtual-machine-traffic-over-the-tor-network#comment-34269
>
> I would like a VM to use t
krishna e bera:
> On 13-09-05 03:58 PM, mirimir wrote:
>> On 09/05/2013 03:05 PM, Robert G wrote:
>>> Could there be an initial, one time, human test for for access? Unique
>>> tokens could be granted after a CAPTCHA, or something similar, and
>>> exchanged for initial handshakes between routers a
Are there cases, where a censor prevents access to the public Tor
network, but does not block access to VPN services?
If yes, is it advisable in such cases to use a VPN for easy circumvention?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
mirimir:
> On 09/03/2013 03:35 PM, adrelanos wrote:
>
>> New hypothesis:
>> This is an attempt to shut down the Tor network once and forever.
>>
>> Might this be an attack on the Tor network with the goal to make it that
>> slow for everyone, that no one wil
New hypothesis:
This is an attempt to shut down the Tor network once and forever.
Might this be an attack on the Tor network with the goal to make it that
slow for everyone, that no one will use it anymore? (DDOS)
Doing this using a botnet and only taking up a portion of their
individual botnet m
Graham Todd:
> First of, I'll admit to not being as technically as savvy as most of
> you, but I've recently seen a copy of Liberte Linux 2012.3 and this
> claims that ALL connections a torrified and this is what I'm after in
> an anonymity set of software.
You may be interested in Whonix (self-ad
Roger Dingledine:
> And we really should raise the guard rotation period. If you
> do their compromise graphs again with guards rotated every nine months,
> they look way different."
TBB releases are more frequent than every nine months. With each TBB
release, people are getting new entry guards.
The Doctor:
> On 08/30/2013 06:19 AM, mick wrote:
>
>> unhelpful. When the abuse is aimed at refuting what could be
>> seen as conspiracy theory, I think you may be in danger of adding
>> fuel.
>
> The problem with conspiracy theories is that any response at all,
> or nor response at all are cons
adrelanos:
> Jerzy Łogiewa:
>> Hello!
>>
>> It looks that The Pirate Bay will enter secure browser market,
>> http://torrentfreak.com/pirate-bay-releases-pirate-browser-to-thwart-censorship-130810/
>> & http://piratebrowser.com/
>>
>> I do not un
Roman Mamedov:
> On Thu, 15 Aug 2013 15:25:41 +0300
> George Kadianakis wrote:
>
>> Currently, (we want to believe that) the Tor network is run by a bunch
>> of cypherpunks that are contributing bandwidth because they believe in
>> the Cause.
>>
>> If relay operators start getting money for their
Overall I like the idea, since it forces no one to participate. Nodes
not interested in getting bitcoin donations, just don't get any.
What about bridges? Any way to reward them as well?
George Kadianakis:
> As a simplified example, if the Tor network has 4 relays with
> bandwidth contribution 0.
I mean no offense, but must say, that Bry8 Star is confused. Use
anything he says with great care. I don't think he acts in bad faith,
but is really confused.
Examples of him telling what others ought to do:
- "All Tor binary software signing GPG (full and public-side) code must
be published/share
This is documented here (*nix specific, not Windows, sorry):
https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers#UseTorBrowserwithalocallyinstalledTorVidaliaNIXONLY
Its a bit difficult for TBB stable, with easier with TBB alpha 3. When
TBB alpha 3 gets stable, these instruct
Andrew Lewman:
> On Tue, 13 Aug 2013 00:13:10 +
> adrelanos wrote:
>
>> It would be more effective if The Tor Project contacted sourceforge
>> and complained.
>
> For the record, we have at least twice. We've now engaged lawyers.
Thank you Andrew, I didn
Peter Tonoli:
> On 8/13/13, 1:41 AM, Ω ✭ wrote:
>>
>> On 2013-08-10, at 11:42 AM, Roger Dingledine wrote:
>>
>>> Randolph, please stop calling your thing "torbrowser". I hope no users
>>> are stupid enough to think they should get their Tor Browser Bundle from
>>> you, but your choice of name make
Matthew Finkel:
> However, I do think it is worth it to look at what
> magic they use in Iran and North Korea. Is it more than using Tor and a
> hidden service?
I would be surprised if they recommended or implemented something else
than bridges.
--
tor-talk mailing list - tor-talk@lists.torprojec
thomas.hluch...@netcologne.de:> Am Donnerstag 08 August 2013 schrieb
adrelanos:
>> > Thomas Hluechnik:
>>> > > My opinion: to be honest we all assume under normal
circumstances that a piece
>>> > > of software is trustworthy until it is proofed that
Jerzy Łogiewa:
> Hello!
>
> It looks that The Pirate Bay will enter secure browser market,
> http://torrentfreak.com/pirate-bay-releases-pirate-browser-to-thwart-censorship-130810/
> & http://piratebrowser.com/
>
> I do not understand why they do the same as TBB. Anyone know?
With the limited i
Thomas Hluechnik:
> My opinion: to be honest we all assume under normal circumstances that a piece
> of software is trustworthy until it is proofed that it contains a weakness or
> backdoor.
>
> With regard of security the opposite is true: we have to assume a piece of
> software to be broken unti
scarp:
> It is inappropriate for a web browser to not be automatically updated.
Generally a good idea... Once concern.
What about the claim, if The Tor Project had an auto updater, they could
get gag ordered to ship a backdoor (to specific users). Is there any
legal base for that or is that only
Nima:
> Why not helping the official forum[0] grow instead of creating new ones?
I am not involved in this forum, but one reason could be the
half-hearted attempt by The Tor Project to get the stackexchange forum up.
They could already have enough users to start it, if they advertised the
forum i
andrfew:
> Adrelanos,
> Would the exploit have worked with Whonix?
For a discussion of this, please have a look at our forum:
https://whonix.org/wiki/Special:AWCforum/st/id50/Latest_javascript_exploit_againshtml
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscr
Crypto:
> On 8/5/2013 1:29 PM, Andrew F wrote:
>> Is Tor still Valid now that we know the nsa is actively
>> exploiting holes in technology anonymity tools? We know that Tor
>> and hidden services has issues, not to mention the whole
>> fingerprinting problems.
>>
>> Is Tor too vulnerable to trus
To make clear why I am asking... I am wondering why the "Tor is risky in
my country" use case didn't make it into the new tor-launcher firefox
addon in TBB 3.0alpha2.
Quote Mike Perry [1]:
"Users will inevitably download the wrong bundle and still put
themselves in danger."
"We are literally ris
Hi,
I've seen lines along "using Tor is dangerous" a lot.
Are there any stories on news pages that I could read on the topic?
Cheers,
adrelanos
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/
Martin Kepplinger:
> hi
>
> Is there a list of what of the patches you maintain on top of firefox
> are user-configurable in about:config for example (like probably not
> leaking dns over socks proxy)? Or to phrase it differntly:
> How to make a systemwide firefox installation as similar to
>
Werner Koch:
> On Wed, 31 Jul 2013 19:30, adrela...@riseup.net said:
>
>> verification is the least secure method, to the download page?
>> (You can see the design here: [3])
>>
>> A: 1 in ~11 users.
>
> Actually [3] is the same URL as [1].
Sorry about that.
[1]: www.webcitation.org/6IWk5h4E9
error message.
You can get some more information and more detailed statistics here: [5] [6]
This is also a follow up to: "[liberationtech] secure download tool -
doesn't exist?!?" [4]
Cheers,
adrelanos
Footnotes:
[1] http://www.webcitation.org/6IWk5h4E9
[2] Please ignore the &quo
intrigeri:
> Hi adrelanos,
>
> adrelanos wrote (31 Jul 2013 00:14:58 GMT) :
>>> adrelanos:
>>>> Debian's answer is "get patches merged upstream" […]
> [...]
>> Neil Williams:
>>> Then create a new upstream which can take the patches
intrigeri:
> Hi,
>
> adrelanos wrote (29 Jul 2013 10:51:10 GMT) :
>> intrigeri:
>>> which easily explains why nobody
>>> ever asked the Iceweasel maintainers to apply them.
>
>> I understand, that the Iceweasel maintainers are not interested to add t
Lunar:
> adrelanos:
>> TBB can't become a Debian package. Debian's answer is "get patches
>> merged upstream" […]
>
> I don't know where you got that.
I don't find a web link. It was on debian-derivatives mailing list.
Subject: "Debian se
intrigeri:
> which easily explains why nobody
> ever asked the Iceweasel maintainers to apply them.
I understand, that the Iceweasel maintainers are not interested to add them.
[1]: "On the Debian side, Mike Hommey said he did not want to be
accountable for issues related to the TorBrowser patche
random.numb...@gmx.com:
> Dear list,
>
> can we put some effort into this?
> I'm talking about this ticket:
> https://trac.torproject.org/projects/tor/ticket/9131
>
> It seems the Mozilla people are not interested in applying Sukhbir's
> patches:
> https://bugzilla.mozilla.org/show_bug.cgi?id=776
Blibbet:
> I hope Tor project helps with WinDivert/TorWall.
I think, that is quite unlikely.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Jerzy Łogiewa:
> Tor is free and VPN is usually not. Young person in UK with no money who
> wants porn will use Tor. Funny but I think law will force Tor to grow and
> grow.
Are you sure you won't have to opt-in for using Tor or VPNs when they
get this shiny new filter list in place?
If they pr
Gregory Maxwell:
> On Fri, Jul 19, 2013 at 9:45 AM, adrelanos wrote:
>> Seems like high latency mix networks failed already in practice. [1]
>>
>> Can't we somehow get confidence even against a global active adversary
>> for low latency networks? Someone start a
Gregory Maxwell:
> On Fri, Jul 19, 2013 at 8:35 AM, Jens Lechtenboerger
> wrote:
>> [For those who are confused about the context of this: I started the
>> original thread. A write-up for my motivation is available at [0].] I
>> Links to my code and a README.txt clarifying necessary prerequisit
Andrew F:
> I thought Mumble data packets were encrypted to the server and back out to
> the other participants.
> If so, they would have to decrypt the packets first to get your voice for
> matching.
Yes.
> Are the mumble data packets not encrypted?
They are encrypted from and to the server. Th
Nathan Freitas:
> On 07/14/2013 10:40 PM, adrelanos wrote:
>> There is no such thing such as OTR for voice, video or files.
>
> If you are on the otr-dev list, you might have seen some discussion on
> improvised support for a data channel in OTR v3, to use with the ability
>
Bruno Cartusia:
>> In conclusion, I think the only safe use cases for Voip or Tor are
>> location hiding while not being anonymous; hiding who is talking to
>> whom; and talking to people you trust while hiding that you are
>> talking to them and your locations from outside observers.
>> __
Nathan Freitas:
> On 07/14/2013 10:40 PM, adrelanos wrote:
>> There is no such thing such as OTR for voice, video or files.
>
> If you are on the otr-dev list, you might have seen some discussion on
> improvised support for a data channel in OTR v3, to use with the ability
>
David Huerta:
> Hey all,
>
> I've put together a guide on how to use Mumble (TCP only!) with Tor if
> anyone would find that sort of thing handy:
> http://huertanix.tumblr.com/post/55261352264/location-anonymous-voice-communication-a-step-by-step.
Thanks for doing that. Seems you're good at writi
anonymous coward:
> I do not know Mumble very well, does the data traffic go through the
> Mumble server or is the server only needed to bring the clients together?
The server mixes the voices, so the server can log all voices, if
wanted. - If one owns the server and its only two people communicat
Katya Titov:
> adrelanos:
>
>> Hi Katya,
>>
>> thanks for looking into these solutions.
>>
>> Katya Titov:
>>> If anyone else knows of some other good plugins or approaches then
>>> I'm also looking for more options.
>>
>>
sphere/?src=search
Cheers,
adrelanos
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
anonymous coward:
> adrelanos:
>
>> Without Tor servers
>> in the US and a few other countries with a noticeable amount of Tor
>> servers, there is usable Tor network anymore.
>
> Is there no way to run "hidden Tor servers"?
No. In a world where publi
mirimir:
> On 07/04/2013 09:54 PM, anonymous coward wrote:
>
>> adrelanos:
>>
>>> Without Tor servers
>>> in the US and a few other countries with a noticeable amount of Tor
>>> servers, there is usable Tor network anymore.
>>
>> Is th
anonymous coward:
> I am confident, Tor will still be available in 10 years, because we
> need it. Many governments want to ban anonymity including western
> governments. But it is hard technically to ban anonymizers. Look
> at China what effort they take to prohibit free access to the net
> and t
Lunar:
> This issue of Tor Weekly News has been assembled by Lunar, dope457,
> moskvax, Mike Perry, Nick Mathewson, mttp, and luttigdev.
Thanks! This is most interesting, you certainly have me as a reader.
___
tor-talk mailing list
tor-talk@lists.torproj
What happens if JonDo certified mixes do things forbidden by certification?
Jimmy Chen:
> If you want your exit nodes to be certified, it's probably best at this
> time, to use JAP instead of TOR.
Or combine both, tunnel JonDo through Tor (user -> Tor -> JonDo). (Not
saying it's necessarily a goo
t it.
If it was up to the community, I'd feel part of that community and felt
compelled to to put a line above all Whonix pages, asking Whonix users
to support that forum. Since the essence of Nick's answer was "lets see
how things develop and revisit that question later again"
Lunar:
> Nick Mathewson:
>> So, we chatted about it a little, and we're not 100% actually sure
>> what the right answer should be there.
>
> For what it's worth, my answer was listed in the missing features for
> AskBot [1]:
>
> * Add a subsite feature:
> - a single login should allow to po
Does this offer a bridge behind a usual customer NAT device with zero
configuration?
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
nt to use this, and it's only
> going to work out if it has a happy, engaged community. That means
> IMO we should avoid making and avoid looking for Big Policy
> Pronouncements, and lean towards decisions of the form "let's try X
> for now
krishna e bera:
> Why dont we encourage the fellow who is doing a serious usability study
> on Tor software to apply his expertise to this topic since it affects
> Tor users?
Good idea. Can you write a friendly mail please and add cc here?
___
tor-talk m
Cat S:
> I don't want to re-hash _years_ old debates, please read the bug
> report links and other links I posted to old tor-talk threads. That
> will explain why I and many others feel there should be an official
> Tor forum.
>
> TL;DR: Newbs won't use mailing-lists; mailing-lists are a entry
> b
Kostas Jakeliunas:
> Totally out of the blue, but if there were a forum which also had a simple
> way of subscribing to threads and sub-forums so that one could receive
> emails and *respond* by replying to the special email address used for
> relaying them the message, would that be something wort
Warren Michelsen:
> On Jun 17, 2013, at 5:14 PM, Cat S wrote:
>
>> This mailing-list is a stupid fucking joke, well, at least for
>> those of us who aren't techies. Really, this is stupid, you're not
>> allowing a lot of people to community by using this Ivory tower
>> mailing-list crap.
>
> Per
out that these
projects are non-official and unsupported.
Cheers,
adrelanos
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Lunar:
>
You are raising good points. I am proposing the following roadmap.
1) post feature request against http://bugs.askbot.org/
2) have a wiki page which links to all the feature requests you need
from askbot
3) call for help (blog post)
4) Next time someone says “I would really like to h
Abel Luck:
> Is using the TorBrowser with a transparent tor router no longer
> supported in this version?
>
> I couldn't find an such option in the startup wizard.
Set the TOR_SKIP_LAUNCH variable [1] to 1.
export TOR_SKIP_LAUNCH=1
This will result in skipping the startup wizard.
[1] https
e...@tormail.org:
>> e...@tormail.org:
>>> I am worried about this. It's why I don't want to rely on obfuscated
>>> bridges to hide my Tor usage, as they're not private and one day I could
>>> get flagged as using Tor if the ISP/military/police is monitoring
>>> connections to the bridge that I'm u
e...@tormail.org:
> I am worried about this. It's why I don't want to rely on obfuscated
> bridges to hide my Tor usage, as they're not private and one day I could
> get flagged as using Tor if the ISP/military/police is monitoring
> connections to the bridge that I'm using at the time.
> VPN seems
u have sponsoring for the forum?
Do you want to ditch askbot.torproject.org and use this stackexchange
instead? If thats the case, I am a bit disappointed. Well, I guess
having any non-ideal Q/A forum is better than forever having no Q/A forum.
Cheers,
adrelanos
[1] http://discuss.area51.stackexc
!
Tor is not working in this browser.
As soon I deactivate or remove tor-launcher in firefox addon settings,
it works. So it would be great if you could fix TOR_SKIP_LAUNCH, I think
it doesn't totally disable that addon.
Cheers,
adrelanos
[1] https://trac.torproject.org/projects/tor/ticket
included the architectures i686 and x86_64.
Is this a bug or did you drop the architectures from RecommendedTBBVersions?
Cheers,
adrelanos
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Are there some screenshots or live demos?
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
1 - 100 of 354 matches
Mail list logo