e this out of my talk.
Is there other advice I can give to web developers and sysadmins who
run websites for activists to make them easier for Tor users to use
securely?
- --
Micah Lee
Web Developer - Electronic Frontier Foundation
mi...@eff.org - https://www.eff.org/
Join the EFF - https://suppo
s on. And unlike in the 90s, it's genuinely
useful now, not just for adding bling to your site. Rather than be down
on javascript, I think it's more production to figure out ways to make
javascript more secure, like:
https://developer.mozilla.org/en-US/docs/Security/CSP/Introducing
he problem is that you somehow disabled javascript in the browser
settings, you can click Edit -> Preferences, go to the Content tab, and
make sure "Enable JavaScript" is checked.
--
Micah Lee
https://twitter.com/micahflee
signature.asc
Description: OpenPGP digital signature
efactoring:
> - Get rid of a couple of harmless clang warnings, where we compared
> enums to ints. These warnings are newly introduced in clang 3.2.
> - Split the onion.c file into separate modules for the onion queue
> and the different handshakes it supp
ed a "Tor Browser" application launcher that
uses the TBB icon. Thoughts?
On 01/15/2013 05:56 PM, Roger Dingledine wrote:
> On Tue, Jan 15, 2013 at 07:28:34PM -0500, Micah Lee wrote:
>> Are there plans to release the Tor Browser Bundle as a package in Tor's
>> official repos
contain any
embedded code copy. So simply shipping the result of TorBrowserBundle
build is not an option."
--
Micah Lee
https://twitter.com/micahflee
signature.asc
Description: OpenPGP digital signature
___
tor-talk mailing list
tor-talk@lists.to
d this awesome, but I wonder why there was not a single reply from
> anyone.
>
> It's been said, that Linux integration of TBB could be better and now
> someone is here to help but totally ignored.
>
> Everyone busy with other stuff?
>
> Micah Lee:
>> I posted abou
On 01/29/2013 05:40 PM, Raynardine wrote:
> If I cannot post here via Tormail, I'm excluded from the list completely.
>
> I really hope the admins can fix this.
Do you remember what you had to say about this TBB deb packaging solution?
--
Micah Lee
https://twitter
at least update with the package manager is a great
improvement.
However, I was thinking about how to deal with this. I think it
shouldn't be too much work to extract the tarball to
/usr/lib/torbrowser, but move the Data directory (which includes the
Firefox profile) to ~/.torbrowser.
o not worry about this edge case for packaging TBB.
People who want to do that can of course still do it manually.
--
Micah Lee
https://twitter.com/micahflee
signature.asc
Description: OpenPGP digital signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
I'm moving my discussion about this bug to trac. I just posted a new
comment about further progress:
https://trac.torproject.org/projects/tor/ticket/5236#comment:16
--
Micah Lee
https://twitter.com/micahflee
signature.asc
Description: OpenPGP digital sign
a first release, so
try it out and post any bugs you might find to github!
https://micahflee.com/2013/04/sudo-apt-get-install-torbrowser/
https://github.com/micahflee/torbrowser-launcher
--
Micah Lee
https://twitter.com/micahflee
signature.asc
Description
t;
>
> I plan to be at OHM, and would be up for marshmallow roasting =)
>
> ~Griffin
I'm hoping to be there too.
--
Micah Lee
https://twitter.com/micahflee
signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@
On 04/18/2013 08:32 AM, Andrew Lewman wrote:
> On Wed, 17 Apr 2013 23:59:45 -0400
> grarpamp wrote:
>
>> Noticed a recent surge of sites using CloudFlare.
>
> Actually, I've talked to cloudflare in the recent past. They don't
> block Tor per se, they rate limit connections/request per IP address
ows the IP of the upload server and it's in
their jurisdiction, they could potentially raid the data center and
seize the server.
I agree, most of the time leak sites don't need as much anonymity from
hidden services.
--
Micah Lee
@micahflee
signature.asc
Description: OpenPGP digital
> Please try these out, test them, and give us feedback! The plan is to
> post them on the blog by Monday, unless something goes horribly wrong.
>
> https://people.torproject.org/~mikeperry/tbb-3.0alpha1-builds/official/
>
>
>
>
>
>
>
> ___
> tor-ta
e's an
associated tarball available for download in a predictable place so that
we don't get into a situation where there's an updated version but TBL
can't find it?
And 3.0 looks great btw!
On 06/14/2013 11:07 PM, Mike Perry wrote:
> Should be fixed. Good luck!
>
> M
get told they are out
> of date.
>
Doesn't TorButton regularly check RecommendedTBBVersions for updates and
if it sees there's a newer version, then prompts to update? If you just
upload the tarballs but don't update RecommendedTBBVersions, won't
TorButton not realize there's a
he instructions in the readme.
It works great on Ubuntu, and it keeps your Tor Browser updated, and
even verifies PGP signatures of the downloads.
I haven't had time to work on it in some time, but I would like to one
day make it available for Windows and OS X too. If anyone wants to
VirtualBox with persistent storage as long as you're
booting the VM off of a real physical USB stick.)
SecureDrop also depends on hidden services. To see a good overview of
how the hidden services and Tails end up working in practice, see:
https://github.com/freedomofpress/securedrop/blob/master
sdcard or something for persistence anyway. I
hope someone documents this :).
--
Micah Lee
@micahflee
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-
21 matches
Mail list logo