On 8/15/12, Andreas Krey wrote:
> Hi all,
>
> I noted a small problem with the TBB rc (Tor 0.2.3.20-rc; Vidalia 0.2.20);
> in the network view of vidalia, the uptime of all nodes is currently
> reported as 15567 days 22 hours. Seems to be borken (resp. like using
> zero (1/1/1970) as each node's s
If you look in the web, there are many many browsers bundled with tor.
the domain we speak about has been established by a russian coder who
overgave the project to be able to use a new browser.
We created this username for Mike Perry, so he can overtake the login and
use the domain for the TBB, as
Mathew, you did not look close and are just stepping into a train,
This project has not yet published any files. The given files are there
since 2010 and use firefox. Didn ´t you realise that?
since 2 years there has been no idea about this and we just changed the
website to an open source template
On Wed, Aug 15, 2012 at 10:26 PM, dumbnewbie wrote:
> I did a brief check but didn't determine the answer - is perrymikey
> (http://sourceforge.net/users/perrymikey) the same as mikeperry
> (https://blog.torproject.org/blogs/mikeperry)?
Absolutely not.
And unless there really is some other guy
On Thu, Aug 16, 2012 at 7:35 AM, Randolph D. wrote:
> As you already can see on the website, it is added (maybe done later than
> you looked first):
>
> "TorBrowser Source code is open source and not affiliated with Tor, but
> simply use Tor. "Tor" and the "Onion Logo" are registered trademarks of
Hi,
Randolph has good intentions, although his approaches require
refinement. I've asked him several times to discontinue promoting Dooble to
the Tor community. I'm responsible for Dooble, but I can't control its
existence beyond Sourceforge. The official site for Dooble and its Wiki
entry (as of
Do you mind testing a beta release of 1.35 with respect to this issue?
Thanks.
On Wed, Aug 15, 2012 at 11:35 PM, Karsten N. wrote:
> On 08/16/2012 01:06 AM, A. Megas wrote:
> > I recorded some raw and extremely verbose tcpdump data while visiting
> > ftp.debian.org using version 1.35 of Dooble.
On Wed, Aug 15, 2012 at 5:35 PM, Randolph D. wrote:
> As you already can see on the website, it is added (maybe done later than
> you looked first):
>
> "TorBrowser Source code is open source and not affiliated with Tor, but
> simply use Tor. "Tor" and the "Onion Logo" are registered trademarks of
On 08/16/2012 01:06 AM, A. Megas wrote:
> I recorded some raw and extremely verbose tcpdump data while visiting
> ftp.debian.org using version 1.35 of Dooble. I'm unable to locate any
> mention of the visit in the log. I also visited ftp.netbsd.org as I may
> have some cached DNS queries. My browsi
Hi again,
I recorded some raw and extremely verbose tcpdump data while visiting
ftp.debian.org using version 1.35 of Dooble. I'm unable to locate any
mention of the visit in the log. I also visited ftp.netbsd.org as I may
have some cached DNS queries. My browsing FTP settings are:
219.111.10.220:8
Hi all,
I noted a small problem with the TBB rc (Tor 0.2.3.20-rc; Vidalia 0.2.20);
in the network view of vidalia, the uptime of all nodes is currently
reported as 15567 days 22 hours. Seems to be borken (resp. like using
zero (1/1/1970) as each node's start time).
(I'm running on MacOS 10.5.8, e
On Wed, Aug 15, 2012 at 5:35 PM, Randolph D. wrote:
> As you already can see on the website, it is added (maybe done later than
> you looked first):
>
> "TorBrowser Source code is open source and not affiliated with Tor, but
> simply use Tor. "Tor" and the "Onion Logo" are registered trademarks of
I like this idea. But I don't think it's something the core Tor devs should be
working on. Too many ethical questions and too many 'gotchas' if things go
wrong. Perhaps it's something an independent dev might want to take on but I'd
keep it completely separate from Tor at all costs.
Anthony
>
What do you consider the latest release?
>
> -- Forwarded message --
> From: Karsten N.
> Date: 2012/8/15
> Subject: Re: [tor-talk] http://torbrowser.sourceforge.net/
> To: tor-talk@lists.torproject.org
>
>
> Hi,
>
> I tested the latest Dooble release with SOCKS5 proxy (with Tor)
Hi Karsten
thanks for the test, I remember that there is as well a bug url already in
webkit to address this issue.
that´s why development is needed, maybe as well from the tor project to
provide a patch! Each third user is affected.
Render Engine Total Avg
Trident 50.19%
Web Kit 29.49%
Gecko 19.9
As you already can see on the website, it is added (maybe done later than
you looked first):
"TorBrowser Source code is open source and not affiliated with Tor, but
simply use Tor. "Tor" and the "Onion Logo" are registered trademarks of the
Tor Project, Inc. Content on this site is licensed under
Hi,
I tested the latest Dooble release with SOCKS5 proxy (with Tor) and HTTP
proxy (with JonDo) and the preconfigured I2P proxy for eepsites.
It leaks DNS queries and FTP requests in all cases. Yes - it leaks DNS
queries with the preconfigured I2P proxy too. At first the system DNS
resolver (defi
On Tue, 14 Aug 2012 22:09:03 +0200
"Randolph D." wrote:
> the domain exists for years, it has been acquired for the Qt update,
> see the given 2010 release with still firefox.
From what I can tell, it didn't look like this since 2010.
> As there it TBB, Tor Browser Bundle, the TorBrowser shoul
https://www.torproject.org/projects/torbrowser/design/#security
1. Dooble uses Qt's proxy implementations. QFtp is not used. IP address
retrieval (feature to show the IP of the website, shown in the title of the
website) does not yet use proxies. The mechanism may be disabled by the
user and so sh
Hi Georg,
the browser has improved a lot and what you mention, is webkit related, if
I remember right.
So does Tor inform all users for all the Webkit Browser?
Let´s research on that more to find a risk analysis.
Regards
2012/8/15 Georg Koppen
> > there is preparation draft work done to get the v
On 2012-08-14 22:17, Roger Dingledine wrote:
> So if you have less than 32KB/s of bandwidthrate, you won't get
> the Fast flag, and basically all the clients will ignore you.
So there was a change in this mechanism?
I'll see if I can adapt the config to that...
Kind regards,
Udo
On Wed, 15 Aug 2012 01:43:27 +0200
Philipp Winter:
> ethio tor wrote:
>> What if there is a tor "virus" (pardon for the choice of word) that
>> can infect such pc and make a relay, bridge, or what ever on the
>> background undetected.
>
> Sounds like a "human rights worm". Some people thought abou
> Could be. Or could be that connection resolution is broken (tor made a
> change that broke quite a few things including the proc contents I
> use). Does the connection panel give you any information besides the
> circuits? If not, or you have a log message informing you that
> connection resoluti
> there is preparation draft work done to get the vidalia Qt plugin out for
> the TorBrowser based on Dooble Web Browser 1.35 with lots of security
> improvments.
> Is there something to change on the drafted website?
Yes, you should inform your users that Dooble (and thus your TorBrowser
clone) h
24 matches
Mail list logo