On Sun, May 06, 2012 at 05:07:26AM -0400, eliaz wrote:
> Of what use is a bridge working off an IP address of a provider located
> in, say, the US, to a client in, say, Syria? Sorry for the elementary
> question. - eli
The client in Syria can connect through the bridge in the US to reach
the Tor n
>> DNS and other connections leak during account creation (when Thunderbird
>> is trying to work out how to connect), but after that I can receive
>> (IMAP w/STARTTLS, IMAPS) and send (Submission w/STARTTLS, SMTPS) without
>> seeing any leaks, including no DNS leaks. I can also see the connections
Hi,
> I didn't see the Message ID as harmful, but I'm more than happy to be
> educated on this front. I do see the timezone leakage as a problem.
The Message-ID used by Thunderbird consists of two parts: the Unix
timestamp in hexadecimal format (which matches the time in the 'Date'
header) and a
Sukhbir Singh wrote:
>> I didn't see the Message ID as harmful, but I'm more than happy to be
>> educated on this front. I do see the timezone leakage as a problem.
>
> The Message-ID used by Thunderbird consists of two parts: the Unix
> timestamp in hexadecimal format (which matches the time in t
On 5/7/2012 2:20 AM, Roger Dingledine wrote:
> On Sun, May 06, 2012 at 05:07:26AM -0400, eliaz wrote:
>> Of what use is a bridge working off an IP address of a provider located
>> in, say, the US, to a client in, say, Syria? Sorry for the elementary
>> question. - eli
>
> The client in Syria can c
05/06/2012 03:57 PM, Jacob Appelbaum:
>> A few Tor hackers (Sukhbir, tagnar, myself, etc) are working on a
>> plugin for Thunderbird that attempts to Torify it properly. The
>> codename for now is 'torbutton-birdy' and it is based largely on
>> the seminal analysis[-1] by tagnaq. Two core goals
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi mix.tb,
I'm curious whether you did write the following line - especially the
word 'wrote' yourself or not?
> Jacob Appelbaum wrote:
The word 'wrote' shouldn't be there - at least not auto generated by
TB after installing the extension (languag
05/07/2012 05:33 PM, anonym:
> (Since the repo is huge (and there's no gitweb AFAIK) I also attached
> the commits as git patches. This were written for Thunderbird 8, but I
> know they apply cleanly to TB 10 as well.)
Hm. I can see that the patches were attached in my outgoing email, but
that the
On 05/07/2012 05:02 AM, Mix+TB Test wrote:
>>> DNS and other connections leak during account creation (when Thunderbird
>>> is trying to work out how to connect), but after that I can receive
>>> (IMAP w/STARTTLS, IMAPS) and send (Submission w/STARTTLS, SMTPS) without
>>> seeing any leaks, includin
On 05/07/2012 11:33 AM, anonym wrote:
> 05/06/2012 03:57 PM, Jacob Appelbaum:
>>> A few Tor hackers (Sukhbir, tagnar, myself, etc) are working on a
>>> plugin for Thunderbird that attempts to Torify it properly. The
>>> codename for now is 'torbutton-birdy' and it is based largely on
>>> the sem
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
> [1] https://tails.boum.org/todo/Return_of_Icedove__63__/
"Trying to hide we use Icedove seem unrealistic and/or impractical a
goal, at least to start with. Therefore, we'll ignore tagnaq's
suggestions whose single aim is that one."
Why do you th
On 05/07/2012 03:43 PM, anonym wrote:
> 05/07/2012 05:33 PM, anonym:
>> (Since the repo is huge (and there's no gitweb AFAIK) I also attached
>> the commits as git patches. This were written for Thunderbird 8, but I
>> know they apply cleanly to TB 10 as well.)
>
...
> Hm. I can see that the pat
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> Thanks for the reassurance about the process. While I accept the
> free-speech basis of Tor (that "bad" as well as "good" guys can use
> it) and the assumption that the network is overall doing more good
> than bad, I've been concerned at the high u
If Orbot can transparently proxy traffic from an Android phone--browser, chat,
email--why can't Tor do it for a laptop or desktop? Incorrect premise?
~~Newbie here.
--
Rhona Mahony
rmah...@stanford.edu
Try http://googlesharing.net
or https://startpage.com to
search Google but keep your
privacy
> If Orbot can transparently proxy traffic from an Android phone--browser,
> chat, email--why can't Tor do it for a laptop or desktop? Incorrect
> premise?
Orbot is built on top of the Tor network. Perhaps the closest thing for
the desktop would be Vidalia combined with the Tor Browser Bundle?
15 matches
Mail list logo