[Tails-dev] alertas bursatiles potentes, 86.5% efectivas, gratis via sms

2016-06-17 Thread Estefania
24option 

Si no puede ver este correo o está usando un dispositivo móvil, por favor, 

haga clic aquí ( Link -> http://option.go2jump.org/SH1BefZ ) .

( Link -> http://option.go2jump.org/SH1BefZ ) 

¡Alertas bursátiles potentes dondequiera esté!

Cuando aparezcan oportunidades en el mercado, usted recibirá un SMS con las 
mejores alertas profesionales del sector:

Fácil de utilizar Algoritmos

avanzados Recomendado

por los mejores

analistas del mercado 

; 

¡Mejore sus operaciones con nuestro servicio SMS de alertas bursátiles 
profesionales! ( Link -> http://option.go2jump.org/SH1BefZ ) 

* Se aplican términos y condiciones 

Advertencia general de riesgo: Operar con opciones binarias conlleva un alto 
nivel de riesgo y puede dar como resultado la pérdida de toda su inversión. 
Como tal, las opciones binarias podrían no ser apropiadas para todos los 
inversores. No debe invertir capital que no pueda permitirse perder. Antes de 
decidirse a operar, debe ser consciente de todos los riesgos asociados a las 
operaciones con opciones binarias, y buscar el consejo de un asesor financiero 
fiable e independiente. Bajo ninguna circunstancia tendremos resposabilidad 
sobre ninguna persona o entidad de (a)las pérdidas o daños al completo o en 
parte causados por, como resultado de, o relacionados con cualquier transacción 
relacionada con las opciones binarias o (b) cualquier daño directo, indirecto, 
especial, a consecuencia de o casual de ninguna clase. Aplicación de términos & 
condiciones, 

consulte la página web completa para obtener más información ( Link -> 
http://option.go2jump.org/SH1BefZ ) . 

24option­.com es una firma perteneciente y operada por Rodeler Limited, una 
compañía de servicios financieros registrada en Chipre (HE312820) y autorizada 
y regulada por la Cyprus Securities Exchange Commission bajo la licencia número 
207/13. Rodeler Limited tiene su sede en 39 Kolonakiou Street, FREMA PLAZA, 
First Floor, 4103 Ayios Athanasios, Limassol Cyprus. 

Si quiere cancelar la suscripción a este correo, por favor, 

haga clic aquí ( Link -> http://option.go2jump.org/SH1BefZ ) 

Agréganos a tu lista de contactos 

Información de Contacto ( Link -> 
http://82754.track.tstes.net/track/click?u=vcard=38323735343a383a343a303a303a30=12957=be409637da1b9c3167ec9a1b5c659e11
 ) 

Para desuscribirse de nuestra lista haga 

( Link -> 
http://82754.track.tstes.net/track/click?u=unsubscribe=38323735343a383a343a303a303a30=12957=be409637da1b9c3167ec9a1b5c659e11
 )
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] [GSoC] Tails Server - status report 3

2016-06-17 Thread segfault
Hi everyone,

this is the third status report on the Tails Server GSoC project.

I had to omit the previous report because personal difficulties were
getting in the way.

So here is what I achieved in the last four weeks:

* Revamp the GUI
  * Replace the status panel with a config panel
  * Add a loading window

* Implement the persistence feature

* Refactor the code

* Many more changes in the code, you can look at my commit messages if
you want more details

* Keep discussing the design of the GUI on the Tails-UX mailing list

The prototype is actually working now. The persistence feature works
without dirty hacks now, because anonym kindly implemented a new feature
in  Tails' persistence (regular files can be bind-mounted now). Because
Tails Server now relies on this feature, it will only work properly in
this patched Tails version. I will integrate Tails Server in this branch
and send a link to a nightly ISO image on tor-dev and tails-dev in the
next few days, so you can test it.

Next up is some more polishing of the GUI and writing a short
documentation to be able to do some initial user tests. And then there
are still a lot of features to implement, like autostarting the
services, onion address regeneration, client authentication (not
necessarily in scope of the GSoC, but I want it anyway), and many more.
And I will have to refactor the code some more.

Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Persistent torrc [Was: Tails Server: updated plan and GSoC!]

2016-06-17 Thread anonym
segfault:
> I just noticed that actually I do not parse the config files every time
> I need an option value. I only read the value the first time I need it
> and then store it in a variable. I do write to the config files
> everytime the value is set though.
> I can test later how much the performance impact of parsing the config
> files every time.

I'd be surprised if it was noticeable. For the record, I'd be willing to
pay even a 1 second delay to get the nice property of never having state
out of sync and thus avoid a whole class of subtle bugs. :)

Cheers!

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Persistent torrc [Was: Tails Server: updated plan and GSoC!]

2016-06-17 Thread segfault
anonym:
[...]
>> Just to clarify things: Currently Tails Server does have a configuration
>> file for each service (which is made persistent if the service is
>> persistent). Those are currently in /usr/share/tails-server/options/,
>> e.g. /usr/share/tails-server/options/mumble. But I only store options in
>> there which are not part of some other configuration file, in order to
>> prevent redundancy and inconsistent states. So everytime Tails Server
>> needs the value of an user option, the corresponding configuration file
>> (e.g. /etc/mumble-server.ini for the server password) is parsed.
>> (But the persistent option is not stored anywhere else, so it is stored
>> in this internal options file.)
>>
>> Please tell me if you see any problems with this approach.
> 
> Yes, this is exactly what we had very good reason to agree to do before,
> so it's awesome! 

I just noticed that actually I do not parse the config files every time
I need an option value. I only read the value the first time I need it
and then store it in a variable. I do write to the config files
everytime the value is set though.
I can test later how much the performance impact of parsing the config
files every time.
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Persistent torrc [Was: Tails Server: updated plan and GSoC!]

2016-06-17 Thread anonym
segfault:
> anonym:
>> segfault:
>>> anonym:
 segfault:
> anonym:
 [...]
 However, if possible, let's try an approach that doesn't rely on this,
 ok? But I still guess you'd like to have this for the persistent
 configuration/date for services (i.e. the non-Tails Server bits, e.g.
 mumble-server's database and similar) as we've discussed before?
>>>
>>> ACK. I agree that the other options are better than making the torrc
>>> persistent. But I still need to make single configuration files
>>> persistent (e.g. /etc/mumble-server.ini).
>>
>> Ok, I created #11533 [0] to track this and pushed a branch with a first
>> attempt at patching live-boot. I haven't tested it, so please do! If it
>> doesn't work, perhaps the patch gives you enough context to fix it
>> yourself (it should be confined to `activate_custom_mounts()`)? :) But
>> please don't waste time on it -- this code is my own baby Frankenstein.
>>
>> [0] https://labs.riseup.net/code/issues/11533
> 
> I tested it and it works! Thanks so much for implementing this :)

Wow, cool! Next step is to properly upstream it, then.

[...]
>> # add_onion
>>
>> By using stem to communicate with Tor over the control port/socket to
>> add the hidden services, just like onionshare does (which would be a
>> good source for inspiration, code-wise), you don't need any torrc
>> persistence just like in the previous approach. This is probably the
>> most "proper" solution of these three (and requires implementing less
>> logic on our side), and it might even be the easiest after you've
>> familiarized yourself with the API. This seems like the best option to 
>> me.
>
> Right. I didn't see this option either, but I think this would work too.
> I will try this :)

 It's ~new, which might explain it. Any way, I really hope this approach
 works out since it looks the cleanest of those presented so far!
>>>
>>> I'm positive that this will work. But I think I will use the old
>>> create_hidden_service() [1] instead of the new
>>> create_ephemeral_hidden_service() [2], because the latter does not
>>> create a hidden service directory, which I need to make the service
>>> persistent. Also, only create_hidden_service() supports client
>>> authentication, which I want to support.
>>
>> Sounds great!
> 
> Unfortunately, it seems like the create_hidden_service() won't work with
> the sandboxed Tor we use, because the sandbox prevents Tor to access the
> hidden service directory, which create_hidden_service() needs to access.
> Micah Lee ran into the same problem with OnionShare [1] (He fixed it by
> using create_ephemeral_hidden_service(), but I need the hidden service
> directory for persistence, so I think this is no option for me).
> 
> [1] https://github.com/micahflee/onionshare/issues/179

That's unfortunate. :/ I was gonna suggest to try SETCONF (via whatever
interface stem has for it) instead, but I guess it's affected by the
same issue. Otherwise, maintaining it with SETCONF and RESETCONF (and
SAVECONF so restarting tor during the same session doesn't drop the
HSes) might be easier and prettier than the regex soup I imagine for...

> For now I'm back to the "# Maintain HiddenService{Dir,Port} lines in
> /etc/tor/torrc" option, which is working fine.

... this approach. Still, it's good enough, so I think you should just
stick with this. Just try to abstract these parts in the code so that it
will be easy to change implementation to add_onion in the future.

Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.