Re: [Tails-dev] inclusion of xinput in the main build of Tails

2018-10-12 Thread intrigeri
Hi, zero identity: >> And it can't be disabled in the BIOS / firmware setup? Or physically removed? > That's very much dismissing the general issue and requesting users > solve this issue on their own. The inclusion of the package the user > requested would be the ideal solution, I think. At

Re: [Tails-dev] TBB-Firefox sends OS+kernel in update queries to Mozilla

2018-10-12 Thread intrigeri
For the record this is tracked upstream at https://trac.torproject.org/projects/tor/ticket/16931 ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to

Re: [Tails-dev] Randomness blueprint

2018-10-12 Thread intrigeri
Jurre: > Some of us have been working on creating a blueprint discussing certains > questions related to randomness in Tails. FTR it looks like: - The blueprint needs an update to take #15292 into account. - The current status on #11897 is "We still have to discuss this". So I don't think

Re: [Tails-dev] FireFox Hardening

2018-10-12 Thread intrigeri
Hi, Sephula: >     I found this nifty tool for hardening FireFox: > https://github.com/pyllyukko/user.js.  No doubt, you'd need to customize > it to suit TAILS, as it's very restrictive (there is a "light version" > available).  However, I like the concept of simply importing a 'user.js' > file

Re: [Tails-dev] Configure TBB to use Hidden TRR DNS

2018-10-12 Thread intrigeri
Hi, Sephula: >     Recently, Mozilla added Trusted Recursive Resolver capabilities into > Firefox 62, which is the version the current Tor Browser is based on.  FYI current stable Tor Browser is based on Firefox 60 ESR. > Is there any reason why this wouldn't be safe to use with TAILS or >