john doe:
> On 11/21/2018 3:27 PM, Patrick Schleizer wrote:
>>> Whonix: A High Security Method of Surfing the Internet
>>>
>>> Whonix is a desktop operating system designed for advanced security and
>>> privacy. Whonix mitigates the threat of common attack v
> Whonix: A High Security Method of Surfing the Internet
>
> Whonix is a desktop operating system designed for advanced security and
> privacy. Whonix mitigates the threat of common attack vectors while
> maintaining usability. Online anonymity is realized via fail-safe, automatic,
> and
Hi,
is it possible to derive an hidden service onion v3 private key from a
mnemonic seed [1]?
Cheers,
Patrick
[1] https://en.bitcoin.it/wiki/Seed_phrase
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
After more than two years of development, the Whonix Project is proud
to announce the release of Whonix 14.
Whonix 14 is based on the Debian stretch (Debian 9) distribution which
was released in June 2017. This means users have access to many new
TLDR:
1) How can one easily hack TBB to use clearnet? [1] (idea [2])
2) How can one enable cookies to persist in TBB?
3) How can one re-enable the Firefox password manager in TBB so one can
store passwords?
To archive that I've disabled private browser and tinkered with lots of
torbutton
A ticket was created just recently by me for that.
Tor TransparentProxy documentation: add IPv6 support / port to nftables
https://trac.torproject.org/projects/tor/ticket/21397
Can you edit
https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy
please or if you are shy create a new
Slashdotdash:
> Hi folks, I'm working on a transparent proxy app for Gnome and I'm
> trying to get a Torbrowser instance running that launches without
> Vidalia. It's currently using the TOR_SKIP_LAUNCH=1 and
> TOR_TRANSPROXY=1 flags, which works except that it then modifies some
> key settings in
Patrick Schleizer:
> A number of advanced deanonymization attacks. These do not just apply to
> Whonix, but any anonymity system. Some are also general security issues.
>
> Rather than exploiting bugs in the hypervisor to break out, some of
> these attacks rely on the design of
A number of advanced deanonymization attacks. These do not just apply to
Whonix, but any anonymity system. Some are also general security issues.
Rather than exploiting bugs in the hypervisor to break out, some of
these attacks rely on the design of the underlying hardware to bypass
privilege
CVE-2016-5696 and its effects on Tor
https://blog.patternsinthevoid.net/cve-2016-5696-and-its-effects-on-tor.html
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
/doc/TorPlusVPN
#
Related:
- [tor-talk] Tor routing algorithm questions
https://lists.torproject.org/pipermail/tor-talk/2016-July/041753.html
Cheers,
Patrick
Roger Dingledine:
> On Thu, Jul 07, 2016 at 10:57:00PM +, Patrick Schleizer wrote:
>> scenario A)
>>
>> Let'
Hi!
scenario A)
Let's assume someone's Tor client picked an entry guard on IP
AAA.BBB.CCC.EEE. And then [without knowing and/or by chance] tried to
make a torified connection to [1] IP AAA.BBB.CCC.EEE.
- Would Tor use that entry guard to establish the connection?
- If so, wouldn't that open up
Network Manager etc.
3) Now, Tails would remember FreeWifi358235892435 and assign entry guard B.
intrigeri:
> Hi,
>
> Patrick Schleizer wrote (09 Feb 2016 23:42:22 GMT) :
>> intrigeri:
>>> [can you please decide what mailing-list this discussion should happen
>>>
[quoting you in full since this mail was eaten by the whonix-devel list
for some reason even though I manually allowed it]
intrigeri:
> Hi,
>
> [can you please decide what mailing-list this discussion should happen
> on, and then we can stop cross-posting over 4 mailing-list?]
Comment (by yawning):
Is there an IRC network that won't start blocking Tor connections when
the usual suspects get unhappy and decide to spam/DoS the IRC
channels/servers?
https://trac.torproject.org/projects/tor/ticket/18002#comment:1
--
tor-talk mailing list - tor-talk@lists.torproject.org
sajolida:
> Patrick Schleizer:
>> Please suggest Tor-friendly IRC networks.
>>
>> Ideally ones, that would welcome the Tor community and actively
>> ensure/prioritize keeping it functional for Tor users.
>
> In Tails, we're moving our meetings to xmpp://conf
Flipchan:
> andr...@fastmail.fm skrev: (6 januari 2016 15:56:42 CET)
>> Is TorChat the usual program used for IRC?
No. TorChat is unrelated to IRC.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
Please suggest Tor-friendly IRC networks.
Ideally ones, that would welcome the Tor community and actively
ensure/prioritize keeping it functional for Tor users.
Cheers,
Patrick
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
Created a ticket for this.
move away from OFTC to new functional, Tor-friendly IRC network
https://trac.torproject.org/projects/tor/ticket/18002
Cheers,
Patrick
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
What are your experiences with OFTC and Tor blocking recently?
Cheers,
Patrick
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
sajolida:
> https://tails.boum.org/blueprint/persistent_Tor_state/
Persistent Tor state would be a good improvement. Could be the first
iteration. It would make Tails less fingerprintable and more secure for
people staying in the same location and/or not carding about
AdvGoalTracking.
But
Hi!
Is it possible to derive and/or estimate the system clock by observing
TCP sequence numbers?
Jacob Appelbaum [1]:
In the Linux kernel, TCP Sequence numbers embed the system clock and
then hash it. Yet another way to leak the system clock to the network.
As I understand the paper 'An
Hi Roger!
Roger Dingledine:
The first problem you're going to have here is that hidden services
don't work unless your time is approximately correct. So you will have a
chicken-and-egg problem using them to get an accurate time if you don't
already have one.
Indeed. This is something I am
TLDR:
What web servers do you consider trustworthy, to take great care of
their visitors' privacy, that are stable and that get great amounts of
traffic, and most important, are reachable over .onion as a Tor Hidden
Service?
Please post them here.
--
Long:
Background... For
meejah:
Certainly not great amouts of traffic,
Indeed. That is too much of a requirement.
but the hidden-service which
serves txtorcon docs and releases is stable:
http://timaq4ygg2iegci7.onion/
Good one.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or
Griffin Boyce:
The services that I trust the most are the ones I operate myself, and
for myself.
Forgot to say, they need to be for public use.
Aside from those, the duckduckgo hidden service has been
really useful and has good uptime as well.
Good one.
--
tor-talk mailing list -
Hello, I a developer of an anonymity-centric distribution. Called
Whonix, it's similar to TAILS but optimized for virtual machines.
We need to use a source to calibrate our system clock. For obvious and
non-obvious reasons, that source can't be NTP. The way we do it at the
moment is to fetch HTTP
AntiTree:
It appears the repo has moved or been deleted? https://github.com/rustybird/
corridor
Is this on purpose while addressing the issue that Gavin brings up?
I don't think so. Looks like rustybird [Or someone else? Unlikely?]
deleted the whole account. See https://github.com/rustybird
l.m:
Patrick Schleizer wrote:
To rephrase this proposal in an alternative way... At the moment, when
you download the TBB package, your only chance to use
tor-launcher/Tor/pluggable transports is to also start Tor Browser. No
way to do that without starting Tor Browser. What is being
Gavin Wahl:
I think the topic Bridge Firewall is also related here:
https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/BridgeFirewall
(The topic didn't move there yet, but it's all very similar ideas
we're discussing here.)
Isn't corridor exactly what that article is
See also:
https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
.
Patrick Schleizer (project leader)
adrelanos at riseup dot net
fortasse (webmaster)
fortasse at riseup dot net
Sponsorship contract possible with Patrick Schleizer if desired.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https
l.m:
Patrick Schleizer wrote:
Being able to use the components, tor-launcher, Tor and pluggable
transports that come with the TBB tarball for system use on Debian.
For
use without or with the Tor Browser. Being able to use these
components,
without being forced to run Tor Browser.
Your
Libertas:
On 01/24/2015 11:51 PM, Patrick Schleizer wrote:
This feature wouldn't make anything worse for regular TBB users. Just
those who would like to use it as system Tor would be free to do so.
Remember that every TB user that is identifiable because they don't go
with the flow is one
carlo von lynX:
I like Patrick's initiative.
Thanks! :)
Please, make it possible
to have Tor solutions that are more timely than debian
but less intrusive than TAILS (I hate when I can't have
my own unix configuration with all of my preferred apps).
Tails has the same issue. They're also
Libertas:
On 01/24/2015 11:07 AM, Patrick Schleizer wrote:
We would like to use TBB as system Tor. Using TBB not just as
integrated browser bundle, but as as Tor, Vidalia (Tor GUI), pluggable
transports replacement on the system level. For any application. Not
just the browser.
I'm
Hi!
TLDR
We would like to use TBB as system Tor. Using TBB not just as
integrated browser bundle, but as as Tor, Vidalia (Tor GUI), pluggable
transports replacement on the system level. For any application. Not
just the browser.
Long
Why?
- Most, latest technology for
Michael O Holstein:
Although he doesn't say it directly (this time)
Did he say so directly some other time?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hi!
Could you please explain how to interpret Jacob Appelbaum's talk at
31c3? [1]
See also. [2] [3]
Is (almost) all traffic that is protected by the usual SSL CA's browser
encryption being monitored by NSA and friends?
Cheers,
Patrick
[1]
Hi,
since updates downloaded by Tor Browser's Internal Updater [1] [2] are
unverified [3] we at Whonix project [4] are wondering [5] how to disable it.
Especially since updates are downloaded over Tor in case of Whonix.
Ideally, is there some way to disable it without recompiling / forking TBB?
Roger Dingledine wrote:
I'm pretty sure by now if you say onion service people will know what
you mean, so that might be another vote in its favor.
onion service looks nice. Not all onion services are location hidden
servers. Some use it as an alternative domain.
--
tor-talk mailing list -
Whonix is an operating system focused on anonymity, privacy and
security. It's based on the Tor anonymity network, Debian GNU/Linux and
security by isolation. DNS leaks are impossible, and not even malware
with root privileges can find out the user's real IP.
Whonix consists of two parts: One
I'd also appreciate if users could choose at first start of TBB rather
than at download time.
Sebastian G. bastik.tor:
Upsides:
+ would also make multi language support easier for Whonix.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
Cypher:
On 08/24/2014 09:43 PM, Michael Wolf wrote:
The article was very interesting - except the part about 'here's how you
might want to fix this'. I certainly hope that the Tor project /is not/
accepting patches submitted by NSA or GCHQ! Sure, I realize those
agencies could very easily
Hi isis!
Thank you a lot for your detailed answer!
isis:
for second in `seq 1 15` ; do
sleep 1
if `kill -0 $pid 21 /dev/null ` ; then
wait $pid
exitcode=$?
printf Tor Browser exited suddenly! Exit code: %s\n $exitcode
exit $exitcode
else
isis:
This should be fixed (for Linux) in an upcoming Tor Browser 4.0 release. I've
added these things to the `start-tor-browser` script. There are:
- Instructions for use, including additional Firefox preferences that
you'll need to set (to tell Tor Button where your ControlPort
RD:
Hello Tor,
Despite my check-marking 'Make Tor Browser the Default browser', wherever
I click on a link from an email regular Firefox opens up.
How do I make Tor Browser always be the default?
thanks
Hi,
if this about Linux or Windows?
If it is about Linux...
We're using Tor
shm...@riseup.net:
in 3.6.3 TBB linux amd-64 i changed the port to 9050
my local install of Tor is on the jessie alpha channel
when i close restart TBB i get:
Something Went Wrong!
Tor is not working in this browser.
This happens because of missing Tor ControlPort access.
There are
mick:
On Tue, 29 Jul 2014 15:54:10 +0100
mick m...@rlogin.net allegedly wrote:
I have just checked on my tails mirror and I get the slightly
depressing results below:
cat tails.log.1 | grep tails-i386-1.1.iso | grep -v .sig | sort -t. +0
-3 -u | wc -l
1774
cat tails.log.1 | grep
Patrick Schleizer:
Артур Истомин:
On Mon, Jul 14, 2014 at 12:17:14PM +, Patrick Schleizer wrote:
Nice graphic. Looks similar for any country! Exponential growth of
debts. But not because mainly more and more money is wasted, it is the
money system itself that is broken. One of the biggest
Cypher:
With the recent discussion about what your ISP can see when you use Tor,
I ended up on the Tor Bridges page. On that page is the following statement:
I need an alternative way of getting bridges!
Another way to get bridges is to send an email to
brid...@torproject.org. Please note
ideas buenas:
I don't trust Gmail nor Yahoo.
Okay.
Roger, found another way.
You probably mean Roger, find another way! - which I would find offensive.
No excuses, please.
This is offensive.
Nevertheless, on topic...
Go for private bridges. You must set it up. Someone else should do it
Артур Истомин:
On Mon, Jul 14, 2014 at 12:17:14PM +, Patrick Schleizer wrote:
Nice graphic. Looks similar for any country! Exponential growth of
debts. But not because mainly more and more money is wasted, it is the
money system itself that is broken. One of the biggest frauds ever. Who
Mark McCarron:
With the US military it is a case of take your pick, from hypersonic
delivery systems and satellite laser shields, to brain scanning and
strong AIs, I suppose any one or all of them could qualify.
Take a look at the US federal debt, even though the wars have been
winding
Hi!
Nusenu:
I'm running Torbrowser on a system that is transparently routed
through Tor. Is it OK to disable the TorLauncher Addon within
Torbrowser in such a setup or has that any negative
consequences?
Using TOR_SKIP_LAUNCH is tested by more people. See:
Tor disabled, no ETA [1]
Looks like this could take a while.
Isn't this enough reason to switch to a network that is explicitly
Tor-friendly?
[1] #oftc on irc.oftc.net topic
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
BlueStar88:
On Wed, 02 Jul 2014 09:15:47 +
Patrick Schleizer adrela...@riseup.net wrote:
BlueStar88:
37lnq2veifl4kar7.onion:6697 is up and running fine.
Who runs that server? Inoffical one?
I was more looking for a scalable, robust solution rather than
individual quick fix
Nusenu:
I'm running Torbrowser on a system that is transparently routed through
Tor. Is it OK to disable the TorLauncher Addon within Torbrowser in such
a setup or has that any negative consequences?
Using TOR_SKIP_LAUNCH is tested by more people. See:
Luther Blissett:
On Wed, 14 May 2014 16:52:15 -0600 Mirimir miri...@riseup.net
wrote:
On 05/14/2014 04:21 PM, Patrick Schleizer wrote:
Zenaan Harkness:
On the humour front:
Dark net - Light net
Better.
How about BeyondNet? That's from _Fire Upon the Deep_ by Vernor
Vinge (1991
The discussion Tor needs a forum is old.
I see two problems on that topic.
1) Tor has no competition
(In the NSA's Tor Stinks presentation, they call Tor the king of
high-secure [sic] low-latency Internet anonymity with no contenders
for the throne in waiting [you find that quote on search
Akater:
How to use Tor as proxy? How are average users supposed to find that out?
They are not. As I understand, The Tor Project moved along from being a
proxy to shipping application bundles. Because they learned a thing over
years, that just setting proxy setting doesn't make it.
Best there
Cypher:
Hey Everyone,
I have a an account on an anonymous mail service that I created via
Tor. I'd like to access this account via POP3/SMTP using Thunderbird.
According to the docs[1], Thunderbird is not safe to use with Tor.
This advice was from 2012. Have things changed? Is Thunderbird
Michael Wolf:
And vice versa, should .onion addresses send a HTTP header
`X-Clearnet-Address`?
I don't see any advantage to doing this.
When the .clearnet domain authenticates/advertises the .onion domain, I
think also the .onion domain should authenticate/advertise the .clearnet
domain.
Mike Cardwell:
* on the Tue, May 13, 2014 at 08:51:28PM -0400, Michael Wolf wrote:
darkweb-everywhere
HTTPS Everywhere rulesets for hidden services and eepsites.
https://github.com/chris-barry/darkweb-everywhere
I had an idea recently that might be an improvement (or might not?) on
the
Michael Wolf:
On 5/14/2014 4:23 AM, Mike Cardwell wrote:
* on the Tue, May 13, 2014 at 08:51:28PM -0400, Michael Wolf wrote:
I had an idea recently that might be an improvement (or might not?) on
the darkweb-everywhere concept. What if we introduced an HTTP header
similar to HSTS --
Nicolas Vigier:
On Tue, 13 May 2014, Patrick Schleizer wrote:
darkweb-everywhere
HTTPS Everywhere rulesets for hidden services and eepsites.
https://github.com/chris-barry/darkweb-everywhere
Just sharing it, because I thought it's an interesting follow up to
our previous discussion Using
Zenaan Harkness:
On the humour front:
Dark net
- Light net
Better.
- Illuminet
- so we are the Illuminetti ? :)
Please not. Iluminati is another negatively perceived term surrounded by
conspiracy theories.
On a new brand:
How about the Free Speech Network ?
Okay.
The term libre
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
darkweb-everywhere
HTTPS Everywhere rulesets for hidden services and eepsites.
https://github.com/chris-barry/darkweb-everywhere
Just sharing it, because I thought it's an interesting follow up to
our previous discussion Using HTTPS Everywhere to
Michael Wolf:
On 5/13/2014 7:24 PM, Patrick Schleizer wrote:
darkweb-everywhere
HTTPS Everywhere rulesets for hidden services and eepsites.
https://github.com/chris-barry/darkweb-everywhere
I had an idea recently that might be an improvement (or might not?) on
the darkweb-everywhere
Gregory Maxwell:
On Sun, May 4, 2014 at 5:14 PM, Griffin Boyce grif...@cryptolab.net wrote:
Hey all,
So Satori is this app for Google Chrome that distributes circumvention
software in a difficult-to-block way and makes it easy for users to check if
it's been tampered with in-transit.
Hi Griffin,
terrific project! Especially the integrated hash verification is a big
security gain!
Is a port to firefox planned?
Do you take project suggestions?
I'd be interested to see Whonix added.
Cheers,
Patrick
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or
Griffin Boyce:
Patrick Schleizer wrote:
terrific project! Especially the integrated hash verification is a big
security gain!
Is a port to firefox planned?
Do you take project suggestions?
I'd be interested to see Whonix added.
[...]
Large projects like Whonix and Tails won't
Bernard Tyers:
Hi there,
Genuine question from someone today:
- they use a VPN service (I think Witopio?)
- they want to use Tor browser to surf safely
They asked can they safely use Tor through their VPN service. When
questioned they meant will Tor give me enough protection to browse
Gareth Owen:
Does tor do any form of time synchronisation?
No. See also:
https://trac.torproject.org/projects/tor/ticket/8170
Cheers,
Patrick
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
Has this bug been reported upstream against the Linux kernel on kernel.org?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Mike Perry:
At this point, you will see a FIN ACK or RST ACK packet appear in your
tcpdump window. That packet has leaked past the iptables firewall rules,
and past the transproxy rules. It went straight to Google.
Can you post an example log please how it's the tcpdump output is
looking when
Soul Plane:
I have an Ubuntu middlebox to torify. It uses TransListenAddress,
TransPort. One interface accepts incoming traffic that will be torified.
The connections to the tor network go out on the other interface which can
access the internet unrestricted. I can't find the original
Nima Fatemi:
Jeff:
Hi... can you tell me why my download speeds are so slow ?
I've reduced the upload speed to minimum but lately the download speed has
been 2-3kbps when downloading movies. It has been 1mbps at times, but its
mostly the lower figure. Regards, Jeff
ps: please
TLDR:
Future Directions - Where Whonix wants to be in 2 or 5 years?
Do we want Whonix to be for average users or just for those with unix
knowledge?
Whonix is a useful tool for some already, got many fans. How can we make
Whonix really user friendly to allow mass adaption by regular people who
The Whonix project has currently two job offers:
- https://www.whonix.org/blog/project-coordinator/
- https://www.whonix.org/blog/job-offer-developer/
We don't have founding for these yet, but hopefully soon.
Cheers,
Patrick
--
tor-talk mailing list - tor-talk@lists.torproject.org
To
Roger Dingledine:
That said, the question in my mind is how to move this from if you're
very smart, you can write your own https-everywhere rule for yourself
to ordinary TBB users get this benefit. I don't really want to get
into the business of writing an /etc/hosts file for public website -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Whonix is an operating system focused on anonymity, privacy and
security. It's based on the Tor anonymity network, Debian GNU/Linux and
security by isolation. DNS leaks are impossible, and not even malware
with root privileges can find out the
I've added corridor to the comparison of Whonix, Tails, Tor Browser and
Qubes OS TorVM.
https://www.whonix.org/wiki/Comparison_with_Others
Hopefully this makes the differences a bit clearer. Please feel free to
hit the edit button if anything looks wrong or tell me.
--
tor-talk mailing list -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Rusty Bird:
Patrick Schleizer:
The problem is, any Whonix-Workstation behind Whonix-Gateway -
once compromised - can claim to be another Whonix-Workstation,
thus not being stream isolated anymore.
This could be solved, when
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I think the topic Bridge Firewall is also related here:
https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/BridgeFirewall
(The topic didn't move there yet, but it's all very similar ideas
we're discussing here.)
What's the threat model
Moritz Bartl:
On 02/12/2014 02:30 AM, Soul Plane wrote:
Ok thanks. I checked the blog today and saw that 3.5.2 was released. I
didn't get any announcement. Why not announce the releases through
tor-announce? I'm subscribed to that but I didn't get any notice. Is there
a list or RSS feed where
TheMindwareGroup:
Programs can automatically add themselves to the windows firewall
found some code that does it here:-
http://msdn.microsoft.com/en-us/library/windows/desktop/aa366421%28v=vs.85%29.aspx
Making useless against attacks from the inside.
It has already been said, that
TheMindwareGroup:
Windows firewall is useless.
Citation required.
I guess Windows firewall does what it promises. You can have some
services reachable on lan, but not on wan. Which is the original purpose
of a firewall. You're probably looking for filtering outgoing traffic?
That is flawed
is:
pub 4096R/0x8D66066A2EEACCDA 2014-01-16 [expires: 2015-01-16]
Key fingerprint = 916B 8D99 C38E AF5E 8ADC 7A2A 8D66 066A 2EEA CCDA
uid [ unknown] Patrick Schleizer adrela...@riseup.net
sub 4096R/0x3B1E6942CE998547 2014-01-16 [expires: 2015-01-16]
sub 4096R
You may have noticed that I, previously known only known under the
pseudonym adrelanos, decided to give up my pseudonymity. It was an
interesting experience to pseudonymously maintain a Linux distribution
(Whonix). I've learned a lot during these ~ 2 years.
I didn't have too bad luck in the
and...@torproject.is:
Cc
Bcc:
Subject: Re: [tor-talk] giving up pseudonymity after collecting experiences
with pseudonymous project development
Reply-To:
In-Reply-To: 52da7d13.4010...@riseup.net
X-PhaseofMoon: The Moon is Waning Gibbous (95% of Full)
On Sat, Jan 18, 2014 at 01:09:39PM
91 matches
Mail list logo