Hi,
zero identity:
>> And it can't be disabled in the BIOS / firmware setup? Or physically removed?
> That's very much dismissing the general issue and requesting users
> solve this issue on their own. The inclusion of the package the user
> requested would be the ideal solution, I think.
At
For the record this is tracked upstream at
https://trac.torproject.org/projects/tor/ticket/16931
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to
Jurre:
> Some of us have been working on creating a blueprint discussing certains
> questions related to randomness in Tails.
FTR it looks like:
- The blueprint needs an update to take #15292 into account.
- The current status on #11897 is "We still have to discuss this".
So I don't think
Hi,
Sephula:
> I found this nifty tool for hardening FireFox:
> https://github.com/pyllyukko/user.js. No doubt, you'd need to customize
> it to suit TAILS, as it's very restrictive (there is a "light version"
> available). However, I like the concept of simply importing a 'user.js'
> file
Hi,
Sephula:
> Recently, Mozilla added Trusted Recursive Resolver capabilities into
> Firefox 62, which is the version the current Tor Browser is based on.
FYI current stable Tor Browser is based on Firefox 60 ESR.
> Is there any reason why this wouldn't be safe to use with TAILS or
>