Thus spake M (moeedsa...@gmail.com):
On Sat, Jan 15, 2011 at 7:02 PM, Mike Perry mikepe...@fscked.org wrote:
You could also install an addon to observe the requests your browser
uses in both non-Tor and Tor accesses of this gadget to see if the
requests appear different for some reason. That may help diagnose the
cause:
https://addons.mozilla.org/en-US/firefox/addon/live-http-headers/
https://addons.mozilla.org/en-US/firefox/addon/tamper-data/
On a side note, i had asked the group before about the google gadgets and
whether if there is some security issue with using it wit TOR I receive the
response that it had not really been tested before. Should i understand its
safe now?
Google gadgets that rely on Google browser plugins such as Google
Gears are not safe, because we canot protect against them. However,
Torbutton's normal protections for the web should keep Google gadgets
that use plain AJAX safe, from a privacy point of view. Of course
though, you are probably not private to Google at this point, esp if
you are logged in to a gmail account. But I assume you're aware of
that and what this means in terms of privacy consequences, and are
comfortable with that tradeoff.
We do *not* recommend disabling Torbutton to get your Google gadgets
to work. Then you become signifcantly less private, both to Google and
to the rest of the web.
If we can't get to the bottom of this and it seems likely that
Torbutton is actually the cause, please file a bug report at
https://trac.torproject.org/projects/tor/report/14. But so far it
seems like there is some other issue which we have not yet gotten to
the bottom of.
--
Mike Perry
Mad Computer Scientist
fscked.org evil labs
pgpouQCpY0reB.pgp
Description: PGP signature