(#32438).
And obfs4proxy is stricter than that, which I should report on Trac.
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
ilding on arm64) a try so everybody can have an idea of
how much work is required
- look at the work done on Tor Browser for Android, that probably
builds for some kind of ARM platform
:)
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists
Mike Perry:
> 2. Guard fingerprintability is lower with one guard
> An adversary who is watching netflow connection records for an entire
> area is able to track users as they move from internet connection to
> internet connection through the degree of uniqueness of their guard
> choice. There is
I don't know what we can do better at the moment than disabling
AppArmor when running in such environments, like:
https://trac.torproject.org/projects/tor/ticket/17754#comment:6
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists
/should be replaced on
upgrades.
Right. And even better: using drop-in override files would avoid
having to maintain a local forked copy of the unit file. Look for
.conf in systemd.unit(5).
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev
want.
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
the integrity of Tor Browser.
You might be interested in the work that's happening there:
https://tails.boum.org/blueprint/bootstrapping/extension/
(I'm not directly involved in this, for more information ask
sajol...@pimienta.org.)
Cheers,
--
intrigeri
nusenu wrote (02 May 2015 16:04:13 GMT) :
intrigeri:
This is being worked on there: https://bugs.debian.org/761403
(which should be a more appropriate forum to discuss this topic.)
Also for the ubuntu packages?
AFAIK the Ubuntu packages are just the Debian one, rebuilt for Ubuntu.
I'm
technical mentor in this area. I've reached out to a few other
people who have the right skills, and so far everyone is busy with
other matters. Also, it might be that the Tor project sees this
topic as too remote from the Tor Summer of Code's scope -- I'm all
ears :)
Cheers,
--
intrigeri
://www.torproject.org/getinvolved/volunteer.html.en#Projects
Regards,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
-tails.immerda.ch/tails/tree/features/torified_browsing.feature?h=stable
The script to run it is:
https://git-tails.immerda.ch/tails/tree/run_test_suite?h=stable
The Sikuli glue code lives there:
https://git-tails.immerda.ch/tails/tree/features/support/helpers/sikuli_helper.rb?h=stable
Cheers,
--
intrigeri
for unit template)
I've no opinion regarding adding such support to the SysV initscript,
except I'm not personally interested in working on it myself (contrary
to the systemd-based solution).
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev
Nusenu wrote (17 Mar 2015 12:15:22 GMT) :
intrigeri:
Just for the record, we've discussed this a few months ago with
Is there a trac entry?
I don't think so.
I'll prepare a unit file for this and add it to the trac entry.
\o/
Weasel wrote:
Tor trac is not the place to discuss Debian
in Debian unstable (while the RCs only went to Debian experimental).
Kudos to Lunar who did most of the work.
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
=
Many thanks to Debian, IRILL, Mozilla and the Tor project for
supporting this event!
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
manual testing of Tails
releases takes, and build our browser later.
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tor-dev mailing
Sukhbir Singh wrote (06 Dec 2013 05:49:26 GMT) :
(If I recall correctly, this issue was discussed before also but I
can't seem to find the thread/ticket.)
IIRC it was discussed recently on libtech.
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
Hi,
David Goulet wrote (02 Nov 2013 15:58:52 GMT) :
For now, it would only be .i2p address support (like .onion). In
torsocks, it's not that difficult to support both addressing.
I guess that people who use both I2P and Tor within Tails would be
very happy with this.
Cheers,
--
intrigeri
or ITP either.
Anyone here with sufficient understanding of both Go and Debian
packaging, and wants to add it to Debian? Or should I file a RFP?
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org
Hi,
Jacob Appelbaum wrote (29 Jan 2013 18:58:10 GMT) :
Thus, I am declaring the following tar.gz to be the final RC for 1.3:
https://people.torproject.org/~ioerror/src/torsocks-1.3.tar.gz
Awesome!
I believe that if no one has any objections and if intrigeri, nickm,
Oscar and/or meejah sign
other confusing
text-mode message most users are not inclined to read)?
Thanks again, cheers!
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
rather not pressure you now, but if you want to come back and work
on Tails server with us at any later time, you are *much* welcome!
Take care,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri
right from the beginning it could
very well become obsoleted by something even greater that will be
maintained by, or with, entirely different people.
Tails server should be able to run APAF applications, right?
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri
://tails.boum.org/todo/server_edition/
I'm sorry I did not read this thread, so this may be totally OT.
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
| Did you exchange
of the pdnsd caching DNS
server, the Tor resolver (for request types it supports) and ttdnsd
(fallback for other requests); details:
https://tails.boum.org/contribute/design/Tor_enforcement/DNS/
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
Hi,
warms0x wrote (07 Jan 2012 06:35:10 GMT) :
Has there ever been plans or discussion about using a conf.d-style
directory to store configuration file fragments?
https://trac.torproject.org/projects/tor/ticket/1922
Regards,
--
intrigeri intrig...@boum.org
| GnuPG key @ https
resolver for requests
it is able to deal with (namely: A requests)?
Bye,
--
intrigeri intrig...@boum.org
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
| So what
adding to
the default TorDNSd configuration?
Bye,
--
intrigeri intrig...@boum.org
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
| Did you exchange a walk on part in the war
| for a lead role
the Vidalia taskbar icon.
Many users sometimes need it to workaround so-called Internet access
with filtered egress, and our upcoming bridges support needs it as
well.
Bye,
--
intrigeri intrig...@boum.org
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR
30 matches
Mail list logo