[Tails-dev] Rete TOR non connessa

2016-08-28 Thread yuri di napoli
Salve, ho scaricato e avviato TAILS, ma quando provo a cercare qualcosa su TOR 
mi dice che è impossibile raggiungere il sito, anche se ho impostato la 
connessione che ho casa.
Potreste aiutarmi a trovare una soluzione, grazie in anticipo.
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] [review'n'merge] Remove useless alt in documentation

2016-08-28 Thread intrigeri
sajolida:
> Right, xin and u are right on this one. The alt attribute is mandatory
> but can be empty. I also learned a lot from this article (now in
> /contribute/how/website):

> http://webaim.org/techniques/alttext/

Thanks a lot to u, xin and sajolida for spending time educating me
(and possibly others) on this one. So I'm glad I've asked and did not
merge the branch blindly ;)

Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] [help needed] explaining the way we use Redmine fields

2016-08-28 Thread emmapeel
intrigeri:
> hi,

> Woo! \o/
> 
> Sorry for the delay…
>
Well... I took my time too!
So, I agree with most of what you suggested, and made changes based on
your input. Some doubts/questions below:


>> and would benefit for some more insight on
>
> Regarding "Debian": the current description makes it sound anything
> that has to be done upstream should have Type of work = Debian, which
> is not the case. Some work has to be done upstream _elsewhere_, and
> then we generally use Communicate (e.g. when the action is to report
> a bug upstream), or Code (e.g. when the action is to do the needed
> tech work upstream), or Wait (when we're waiting for upstream to do
> it themselves).
> 
> 
> * Dev Needed: "Choose this when you think a developer will have enough
>   information to start working on this ticket" ← I'm not aware of such
>   usage; do we really use it this way?

How would you define it?

> 
> * Generally: in a few places it's written "code", while the text is
>   valid for any kind of contribution that lives in Git; I would love
>   to see the language be a bit more inclusive wrt. these other kinds
>   of contributions. If you don't feel like working on this yourself,
>   I'll be happy to give it a try once you see the branch as ready
>   for QA.
> 
I understand your reasoning, but I didn't acted much upon that... please
change what you find misleading..

> * "If you create a ticket you become automatically
>   a watcher" ← really?
> 
Yes



signature.asc
Description: OpenPGP digital signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Why Tails partition is non-deterministic?

2016-08-28 Thread segfault
Joanna Rutkowska:
> On Sat, Aug 27, 2016 at 06:54:10PM +, segfault wrote:
> The added value would be ensuring the unused portion of the disk blocks
> (occupied by the Tails partition) are not populated with some random garbage,
> which might be e.g. user's previous (unencrypted) content, such as... family
> pictures ;)

Ok, but data leakage and verification are different problems IMO. In the
tails-verifier I did not try to prevent data leakage or the other
possibility of using unverified parts as a hidden channel (which could
be used by malware), but only focus on modifications which could alter
the behavior of Tails (i.e. changes in boot code or files).
I think preventing data leakage and hidden channels is also desirable,
but because of the behavior of flash drives you mentioned, I think it is
hard to guarantee this.

> Generally, I think the Tails installer should at least ask the user to wipe 
> the
> disk with 'dd if=/dev/zero'. Admittedly, because of wear leveling mechanisms
> this might not be effective, because AFAIU modern flash memories would include
> (X*size) of the actual physical storage in order to expose (size) bytes of
> storage to the host, where X > 1. 

Right, so `dd if=/dev/zero` would not always protect from data leakage.
So I tend to disagree that we should do this in Tails Installer, because
it would make the installation process slower and might give a wrong
feeling of security.

> But perhaps if the wiping were repeated N times, where N = ceiling (X), with
> random content this time (in order to fool any optimizations by the device),
> then it should be fine?

Would this guarantee that every byte was overwritten? Wouldn't it be
possible that the same (size) bytes get overwritten multiple times but
the (X-1)*size other bytes stay the same?

Cheers
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Why Tails partition is non-deterministic?

2016-08-28 Thread Joanna Rutkowska
On Sat, Aug 27, 2016 at 06:54:10PM +, segfault wrote:
> Hi,
> 
> somehow I missed this thread, just noticed it right now.
> 
> intrigeri:
> > Hi,
> >
> > thanks Joanna for raising this topic!
> >
> > I've just thought about it a little bit and I see no technical reason
> > that prevents us from resetting all timestamps in the filesystem to
> > some fixed value that depends only (if at all) on the version of Tails
> > being installed/upgraded, during some late stage of the
> > installation process.
> 
> I think you're right. I did not test if the modification date is indeed
> the only thing that differs, but I think Joanna is right, I don't see
> anything else that should differ. This would also make tails-verifier
> less complex, because we wouldn't have to look at each file but can
> check the whole partition at once, like Joanna suggested (although the
> file verification is not the complex part).
> 

The added value would be ensuring the unused portion of the disk blocks
(occupied by the Tails partition) are not populated with some random garbage,
which might be e.g. user's previous (unencrypted) content, such as... family
pictures ;)

Generally, I think the Tails installer should at least ask the user to wipe the
disk with 'dd if=/dev/zero'. Admittedly, because of wear leveling mechanisms
this might not be effective, because AFAIU modern flash memories would include
(X*size) of the actual physical storage in order to expose (size) bytes of
storage to the host, where X > 1. 

But perhaps if the wiping were repeated N times, where N = ceiling (X), with
random content this time (in order to fool any optimizations by the device),
then it should be fine?

Cheers,
joanna.


signature.asc
Description: PGP signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.