Hi guys.
I posted this as a comment in the blog a few days ago, with no answer so
far.
I've been experimenting with manual incremental updates and noticed that
the "mar-tools-linux64.zip" file in the distribution directory changes
between Tor Browser releases (the executables inside the archive a
ncl
> mtsio:
>> If you to Preferences->Applications->Portable Document Format there
>> is the option 'Preview in Tor Browser' that opens the PDF without
>> opening an external application. What's the problem with that?
>
> Well, Mozilla announced a secadv for pdf.js recently, so there's that.
>
>
> Crappy design and wild adverts seem to be the norm on the Web. So
> Firefox Reader comes as a pretty useful app/extension/whatever they
> might call it.
>
> But I see it is disabled in TBB5. Can anyone shed some light why?
I'd like to know as well. All I could find in trac was this:
https:/
> This will upgrade the Linux x64 version from 4.5.3 to 5.0. To apply:
>
> $ cd /path/to/tor-stuff
> $ rm -rf outside.old; mv outside outside.old; mkdir outside
> $ cp [.mar file] outside/update.mar
> $ cd [tor-browser directory]
> $ cp updater ../../outside
> $ ../../outside/updater ../../outside
> Anybody care to make a peer-reviewed guide of how to check the
> extensions for leaks, cheats and other dirty tricks?
I would say use the source, Lara.
It's problematic, of course, since it requires an expert not only on
programming, networking, privacy and security but also on Mozilla's
extens
Hi, I like your idea but have some criticism to make regarding what you
consider users of the Tor network.
> That way a normal web client, normally browsing a website, would not be
> impacted from end-user experience, but any automated system (the ones causing
> problems to Cloudflare)
Why can't
> It would be harder for that analysis to succeed against networks
> that filled between all the nodes with fill traffic when unused and
> not needed for user traffic. (And in the sense of Tor, between clients
> and some number of guards). But that's hard to design so that it
> is functional. And n
> I would
> like to know if Tor Browser 5.5.1 is vulnerable. Thanks
Looks like it is:
https://gitweb.torproject.org/builders/tor-browser-bundle.git/commit/?id=7a36dbece35a307675f396a019dccf6e431efb44
That build corresponds to a branch which includes the commit that
supposedly fixed bug 1246093,
> On 02/08/2016 01:36 AM, Georg Koppen wrote:
>
>> Mirimir:
>>
>>> When automatically updating, does Tor browser check GPG signatures of
>>> downloaded updates before installing them?
>>
>> The update files are not using GPG signatures (see:
>> https://wiki.mozilla.org/Software_Update:MAR for deta
>>> For those who wish to update manually, is it sufficient to toggle
>>> app.update.auto in about:config to false?
>>
>> Seems so. You will still be prompted to update through the MAR system,
>> but it won't happen automatically.
>
> Today I discovered that TBB 5.5.2 automatically downloaded. That
> [trim]
> It seems that automatic updating is now the default.
Automatic updates have been on by default since 5.0:
https://blog.torproject.org/blog/tor-browser-50-released
> That's a good idea. Consider the Freedom Hosting exploits. I can't say that I
> trust the MAR update protocol as much as
> The traditional answer, which amazingly nobody has mentioned in this
> thread, is called the PGP web of trust.
This is not just the "traditional" answer, it's the only proper answer.
For the uneducated reducing OpenPGP's WoT to WebPKI: you are lame.
Also worth mentioning: Ian Goldberg's shadow
> cyber
> survival
> darkness, darknet, dark web, "hidden in the dark"
> useful analogy for explaining onion services: Alice buys drugs from Bob
> "research": grab a bunch of hidden addresses from ahmia and other indexes
> our "research" shows how onion services are used in practice
> manuall
> Please see below for a couple of questions. Thanks for your input.
>
>> Sigaint.org is an excellent option. Their onion mailservers peer with
>> some of the other onion mailservers. And they have a clearnet gateway,
>> unlike many of the other other onion mailservers. But users can only
>> access
> Hi,
>
> When I start Tor Browser it displays a message that it is establishing
> a connection to Tor network.
>
> After that I can request "Check for Tor Browser update ..." from
> Torbutton or from menu Help - About Tor Browser display and eventually
> obtain it without "Test Tor Network Setting
> Hi,
>
> Today I got an idea of how to measure "The CloudFlare problem". It turns
> out that every time you visit a website that's behind CloudFlare a
> cookie is set with the name __cfduid
>
> If you use Firefox these cookies end up in a SQLite database which can
> be queried with the SQLite Mana
Using sed/awk/etc. for website transformation sounds very silly. Your
scripts will turn completely unwieldy as soon as you try to do something
non-trivial.
You can do much more, much easier by using your own self-served javascript.
And you don't need to install extra addons like Greasemonkey for
17 matches
Mail list logo