> https://www.mozilla.org/en-US/security/advisories/mfsa2015-78/
>
> This one seems specially nasty in the context of Tor. Notice the
> following sentence:
>
>> Mozilla has received reports that an exploit based on this
>> vulnerability *has been found in the wild*.
https://blog.mozilla.org/secu
MaQ writes:
> Hello,
>
> I'm curious, I'm developing an app whereas sharing/collaboration
> can be done by localhost through tor and .onion address between pairs or
> multiples. When I use standard http there seems to not be any problems
> connecting different computers, different IPs, etc.
Hello,
I'm curious, I'm developing an app whereas sharing/collaboration
can be done by localhost through tor and .onion address between pairs or
multiples. When I use standard http there seems to not be any problems
connecting different computers, different IPs, etc. and interacting, but
when
On 7/15/15, Apple Apple wrote:
> ...
> I think coderman was saying something about a conversion tool as well but I
> didn't really understand it...
you could call that rube goldberg a "conversion tool", but really it
was an object lesson. ;)
speaking of PDFs,
"The vulnerability comes from th
If you used Mixmaster can you explain if:
* sending attachments is possible or are they blocked by most remailer
relays?
* nymservers allow sending/receiving attachments?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torpro
ncl
> mtsio:
>> If you to Preferences->Applications->Portable Document Format there
>> is the option 'Preview in Tor Browser' that opens the PDF without
>> opening an external application. What's the problem with that?
>
> Well, Mozilla announced a secadv for pdf.js recently, so there's that.
>
>