o-maintainer of Metadata Cleaner, please get
in touch at mat-...@boum.org (public mailing list).
Thanks in advance, and many thanks to Romain Vigier for creating
Metadata Cleaner!
--
intrigeri, for the Tails Team
jvoisin, mat2 developer
___
tor-dev
(#32438).
And obfs4proxy is stricter than that, which I should report on Trac.
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
building on arm64) a try so everybody can have an idea of
how much work is required
- look at the work done on Tor Browser for Android, that probably
builds for some kind of ARM platform
:)
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@
Mike Perry:
> 2. Guard fingerprintability is lower with one guard
> An adversary who is watching netflow connection records for an entire
> area is able to track users as they move from internet connection to
> internet connection through the degree of uniqueness of their guard
> choice. There is
port-filter.d
[...]
> 3. tor-browser.yml
> As "tbb.json" above.
FWIW, I think that Tails' control port filter exposes to Tor Browser
only the streams and circuits it has initiated itself. I'll let anonym
comment further on this.
Cheers,
--
intrigeri
___
David Goulet wrote (21 Jun 2016 13:43:13 GMT) :
> I'm releasing a long overdue version of torsocks 2.2.0 release candidate 1.
Thank you! It's now available in Debian experimental (for Debian
testing/unstable users).
Cheers!
--
intrigeri
__
r config option "UseDefaultFallbackDirs 0".
Thanks for the heads up!
(This is now tracked there on Tails side:
https://labs.riseup.net/code/issues/11285)
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org
adly, I don't know what we can do better at the moment than disabling
AppArmor when running in such environments, like:
https://trac.torproject.org/projects/tor/ticket/17754#comment:6
Cheers,
--
intrigeri
___
tor-dev mailing list
tor
bution files that can/should be replaced on
> upgrades.
Right. And even better: using drop-in override files would avoid
having to maintain a local forked copy of the unit file. Look for
".conf" in systemd.unit(5).
Cheers,
--
intrigeri
__
ds a ReadWriteDirectories= directive pointing to the
directory you want.
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
nloading and verifying the integrity of Tor Browser.
You might be interested in the work that's happening there:
https://tails.boum.org/blueprint/bootstrapping/extension/
(I'm not directly involved in this, for more information ask
sajol...@pimienta.org.)
del explicitly doesn't include "Attacker
is able to reconfigure Tor on a client system to use an arbitrary set
of bridges", right?
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
nusenu wrote (02 May 2015 16:04:13 GMT) :
> intrigeri:
>> This is being worked on there: https://bugs.debian.org/761403
>> (which should be a more appropriate forum to discuss this topic.)
> Also for the ubuntu packages?
AFAIK the Ubuntu packages are just the Debian one, rebui
to the systemd bug tracker if they are bugs in systemd itself
Thanks!
> tested with jessie:
> https://github.com/nusenu/ansible-relayor/blob/master/files/debian_tor%40.service
I get a 404 there.
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@l
tion once it's part of a torsocks release (and
then makes its way into wheezy-backports-sloppy).
Thanks for adding it, by the way :)
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
topic as too remote from the Tor Summer of Code's scope -- I'm all
ears :)
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
ve.
[0] https://trac.torproject.org/projects/tor/wiki/org/TorSoP
[1] https://www.torproject.org/getinvolved/volunteer.html.en#Projects
Regards,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
https://git-tails.immerda.ch/tails/tree/features/torified_browsing.feature?h=stable
The script to run it is:
https://git-tails.immerda.ch/tails/tree/run_test_suite?h=stable
The Sikuli glue code lives there:
https://git-tails.immerda.ch/tails/tree/features/support/helpers/sikuli_helper.rb?h=stable
Cheers,
-
Nusenu wrote (17 Mar 2015 12:15:22 GMT) :
> intrigeri:
>> Just for the record, we've discussed this a few months ago with
> Is there a trac entry?
I don't think so.
> I'll prepare a unit file for this and add it to the trac entry.
\o/
> Weasel wrote:
>&g
html
(look for "unit template")
I've no opinion regarding adding such support to the SysV initscript,
except I'm not personally interested in working on it myself (contrary
to the systemd-based solution).
Cheers,
--
intrigeri
__
model, it's unclear to me what the
actual potential problem is for the usecase you're working on.)
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
torsocks
in Debian unstable (while the RCs only went to Debian experimental).
Kudos to Lunar who did most of the work.
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
this feature in arm?
Cheers,
--
intrigeri
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
Many thanks to Debian, IRILL, Mozilla and the Tor project for
supporting this event!
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrige
Hi,
David Goulet wrote (04 Apr 2014 22:40:43 GMT) :
> This is the release candidate 7 for torsocks 2.x.
Congrats!
Uploaded to Debian experimental. I'll wait for Lunar to be back from
vacation before potentially re-uploading to sid.
Cheers,
--
intrigeri
| GnuPG key
ngs, so that we can reduce the time manual testing of Tails
releases takes, and build our browser later.
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
Sukhbir Singh wrote (06 Dec 2013 05:49:26 GMT) :
> (If I recall correctly, this issue was discussed before also but I
> can't seem to find the thread/ticket.)
IIRC it was discussed recently on libtech.
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.or
Hi,
David Goulet wrote (02 Nov 2013 15:58:52 GMT) :
> For now, it would only be .i2p address support (like .onion). In
> torsocks, it's not that difficult to support both addressing.
I guess that people who use both I2P and Tor within Tails would be
very happy with this.
Cheers,
--
or about the pros & cons of the new
Grand Unified Software Repository™ (Github). Don't feed the troll :)
Cheers!
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
__
I've found no RFP or ITP either.
Anyone here with sufficient understanding of both Go and Debian
packaging, and wants to add it to Debian? Or should I file a RFP?
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR
Hi,
Jacob Appelbaum wrote (29 Jan 2013 18:58:10 GMT) :
> Thus, I am declaring the following tar.gz to be the final RC for 1.3:
> https://people.torproject.org/~ioerror/src/torsocks-1.3.tar.gz
Awesome!
> I believe that if no one has any objections and if intrigeri, nickm,
> Oscar a
Hi,
Jacob Appelbaum wrote (27 Jan 2013 04:16:30 GMT) :
> I think this also includes all of the pending Debian fixes
I confirm.
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrig
g in a usability study, whose
scale would get much bigger, though.)
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
__
This is unfortunate, but I'm not sure we can do much better than a big
red button for first time users. Hopefully users who care (or should
care) about RAM forensics eventually notice that button, or
learn documentation...
> After rebooting, i showed them all they could just pull the
e to ask.
I'd rather not pressure you now, but if you want to come back and work
on Tails server with us at any later time, you are *much* welcome!
Take care,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanar
p the FreedomBox to actually exist some day. Sometimes, it's great
to start a project while knowing right from the beginning it could
very well become obsoleted by something even greater that will be
maintained by, or with, entirely different people.
Tails server should be able to run APA
Server
https://tails.boum.org/todo/server_edition/
I'm sorry I did not read this thread, so this may be totally OT.
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
| Did y
d.
For the record, Tails uses a combination of the pdnsd caching DNS
server, the Tor resolver (for request types it supports) and ttdnsd
(fallback for other requests); details:
https://tails.boum.org/contribute/design/Tor_enforcement/DNS/
Cheers,
--
intrigeri
| GnuPG key @ https://gaf
Hi,
warms0x wrote (07 Jan 2012 06:35:10 GMT) :
> Has there ever been plans or discussion about using a conf.d-style
> directory to store configuration file fragments?
https://trac.torproject.org/projects/tor/ticket/1922
Regards,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardno
rs would you consider worth adding to
the default TorDNSd configuration?
Bye,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
| Did you exchange a walk on part in the war
| for a
he Tor resolver for requests
it is able to deal with (namely: A requests)?
Bye,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
| So what?
_
ings the Torouter user would want to customize?
Bye,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
| Did you exchange a walk on part in the
e get by right-clicking the Vidalia taskbar icon.
Many users sometimes need it to workaround so-called Internet access
with filtered egress, and our upcoming bridges support needs it as
well.
Bye,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR finge
43 matches
Mail list logo