-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 [new thread]
I'm glad you like it. I see your point. I exported it as html but it probably contains lots of metadata, which would take some time for clean up. I suppose it is less of an effort to open the pdf in a VM appropriate for untrusted files. ...however if an html version is for some reasons very important for you I'll reconsider it and add it to my todo list. I do think that most SMTP servers / MLs include the entire SMTP path and therefore it is very easy to separate Tor users based on their source IP anyway. [I agree that it would be nice to have a more common fingerprint but I do not think it is feasible without sacrificing a lot on other aspects.] And after all this is only relevant if you choose to trust your mail provider - which is considered an adversary in my threat model. (btw: anyway I finally filed #5997) I think that such an approach that requires the user to actively select its language for every message is error prone. As soon as the sender forgets to select the correct language or fails to choose the correct language he is screwed. I prefer something that doesn't depend on user interaction. thank you for your feedback. -----BEGIN PGP SIGNATURE----- iF4EAREKAAYFAk/FU0IACgkQyM26BSNOM7ai+AD9GtMzTqE8apPPk3nkT18MbtTj vz1TT4yvM5de8CkeIX0BAKtif93dVOa7S9E60E3O+AR0fwmDaurfEZo/jzTTLDUt =rI6B -----END PGP SIGNATURE----- _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
