Re: [tor-talk] Please fix Orbot.

2020-03-06 Thread Nathan Freitas
Actually, this is the best place for quick response:
https://github.com/guardianproject/orbot or email to
sup...@guardianproject.info

That said, we will need more details. The beauty of Android is also the
pain - the insane diversity of OS versions, community ROMs, hardware
types, unexpected task killing background services, and more.

For the vast majority of Orbot users, it is working, but Hack3rcon at
Yahoo, we do want to help you, too!


On 3/5/20 12:21 PM, james wrote:
> You may have more luck raising a ticket on the Tor bug 
> tracker:https://trac.torproject.org/projects/tor/newticket
>  Original message From: hack3r...@yahoo.com Date: 05/03/2020  
> 09:43  (GMT+00:00) To: tor-talk@lists.torproject.org Subject: [tor-talk] 
> Please fix Orbot. Hello Tor team,Please fix Orbot. The new version can't 
> working properly.Thank you.-- tor-talk mailing list - 
> tor-talk@lists.torproject.orgTo unsubscribe or change other settings go 
> tohttps://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk



signature.asc
Description: OpenPGP digital signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Mozilla's DNS over HTTPS does not complement Tor

2020-03-06 Thread Nathaniel Suchy
Even if that option is enabled it is my understanding that a network 
administrator can still override your decision during a man in the middle 
attack well you can imagine how this is problematic. I run a local DNS resolver 
over Tor for my non-Tor traffic as I don’t trust Mozilla’s implementation.

Cordially,
Nathaniel Suchy (they/them)

Sent from ProtonMail Mobile

On Fri, Mar 6, 2020 at 2:07 AM,  wrote:

> You can use network.trr.mode to enforce the use of DoT. IIRC 3 is to
> enforce it and not using other DNS. When using network.trr.mode Firefox
> should not do any other DNS than DoH. This should adress your concerns.
>
> The best way is to use DoT and to have it directly implemented into your
> router or locally on your machine. I don´t think the Mozilla approach is
> useless. It´s a better than nothing approach. Last, but not least you
> can use different DoH servers in FF. You are not tied to the default.
> Though the average Joe may not have the ability to use a custom DoH
> server in their Firefox.
>
> BTW, what router manufacturer already has DoT implemented?
>
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Please fix Orbot.

2020-03-06 Thread james
You may have more luck raising a ticket on the Tor bug 
tracker:https://trac.torproject.org/projects/tor/newticket
 Original message From: hack3r...@yahoo.com Date: 05/03/2020  
09:43  (GMT+00:00) To: tor-talk@lists.torproject.org Subject: [tor-talk] Please 
fix Orbot. Hello Tor team,Please fix Orbot. The new version can't working 
properly.Thank you.-- tor-talk mailing list - tor-talk@lists.torproject.orgTo 
unsubscribe or change other settings go 
tohttps://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Revisiting youtube blocking TBB, virtually all 1st attempts to load YT

2020-03-06 Thread bo0od
yes invidious = invidio.us that what i was referring. It has onion v3/v2 
and https with many instances running it.


joebtfs...@gmx.com:

@ bo0od, not sure I follow.  Invidious means likely to cause unhappiness
or be unpleasant.
Does that have any relationship to invidio.us or similar sites?

Yes, you can D/L the videos, but you first have to get the URL.  I guess
if you saw a link on another site, your suggestion might make sense.  Or
if you use a proxy or VPN with regular Firefox - if YT worked with them.

On 3/4/20 2:55 PM, Matthew Finkel wrote:

On Tue, Mar 03, 2020 at 04:49:16PM -0600, joebtfs...@gmx.com wrote:
[snip]

I assume this means you are running Tor Browser in non-private browser
mode? Otherwise clearing the cache before restarting shouldn't have any
effect.

Yes, I don't consider YT an adversary or even a site to keep health
information secret, etc.
I'm usually looking for how to "fix something" that I had nothing to do
with breaking. :)

I'm assuming that unless I suddenly started getting an out of proportion
percent of what YT considers bad or suspicious exits, something that
stores in (memory) cache, causes them to continue rejecting new exits,
until I clear the cache.

I haven't tried clearing it manually, then recording how often new
circuits vs. identities are successful.

To see the percent of success that clearing the cache has with a new
circuit or new identity (don't set cookies on YT).
I went a couple of yrs at least, with very few access problems - not
just on YT, but most technical sites I visit.  For me, it's not a huge %
increase of sites now blocking TBB, but a noticeable up tick.



[snip]

YT / Google could also have changed their policy - again - how they were
going to treat TBB or changed their definition of "abuse," so now there
are many more sites meeting their criteria of abusive.


This is our current assumption, but we don't have any more information
than what you described and our personal experiences.



--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB update mechanism

2020-03-06 Thread hansvader

On 2020-03-02 07:58, Georg Koppen wrote:

Hans Vader:

Dear TOR people,

I have a question regarding the updating mechanism of tor browser from
within the browser.
These updates are signed I stronly suppose. I would like to know, does
checking these signatures depend on external programs like gpg? Is the
signature verification application for updates part of the browser
bundle itself?


For updates we essentially use the Firefox updater and, yes, we are
signing the update files.



Thanks for explaining.
Have there ever been serious flaws in that signature verification 
mechanism?
Would you regard it safe enough for the paranoid among us or would you 
advise to better download the full package and do the standard pgp 
verification? I read from some people who only do the latter and don´t 
use the builtin updater.


Thanls
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Mozilla's DNS over HTTPS does not complement Tor

2020-03-06 Thread hansvader
You can use network.trr.mode to enforce the use of DoT. IIRC 3 is to 
enforce it and not using other DNS. When using network.trr.mode Firefox 
should not do any other DNS than DoH. This should adress your concerns.


The best way is to use DoT and to have it directly implemented into your 
router or locally on your machine. I don´t think the Mozilla approach is 
useless. It´s a better than nothing approach. Last, but not least you 
can use different DoH servers in FF. You are not tied to the default. 
Though the average Joe may not have the ability to use a custom DoH 
server in their Firefox.



BTW, what router manufacturer already has DoT implemented?


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Invitation to try experimental Snowflake Tor Browser packages

2020-03-06 Thread David Fifield
On Tue, Mar 03, 2020 at 10:38:06AM +0100, john doe wrote:
> What range of UDP port do I need to open for snowflake to work properly
> alternatively how can I restrict the UDP port used by snowflake?

You will need to open at least UDP port 19302 for communication with the
STUN server, but even after that there is a peer-to-peer WebRTC
connection that I believe just uses random ephemeral UDP ports.

There's no way to restrict to port selection. Snowflake isn't meant to
work in an environment where UDP is blocked by default; that would
require a different set of design tradeoffs. So don't feel obliged to
try to make it work with your local firewall. Thanks for giving it a
try.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk