-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Nathan,
> Neat and thanks! Perhaps we can think about building this into
> Orbot, since we already have a very basic VPN.
Can I ask you about your experiences with the Android VPN system vs.
plain iptables?
In my layman's prejudices, the VPN ap
On Fri, Feb 12, 2016 at 1:41 AM, Georg Koppen wrote:
> Cain Ungothep:
> >> I would
> >> like to know if Tor Browser 5.5.1 is vulnerable. Thanks
> >
> > Looks like it is:
> >
> >
> https://gitweb.torproject.org/builders/tor-browser-bundle.git/commit/?id=7a36dbece35a307675f396a019dccf6e431efb44
> >
Hello all,
> I would like to propose the topic of introducing a certain degree of
> verification, in order to obtain certain responsibilities:
On the contrary, I think that this feature could be dangerous.
For some of the adversaries Tor has, it would be actually very simple to
falsify var
Still have not been able to download F-Droid and Orbot. How do I enable
Downloads to keep running and not immediately shut itself off after
being enabled? Without being able to download and install Orbot, the
RCA Tablet is no more than a paperweight. Do any of you know of any
highly qualifi
On 2/7/16 1:25 PM, nusenu wrote:
>
>
> Fabio Pietrosanti (naif) - lists:
- it is *not* a good idea to run exits from your home (limited exit
policies are no guarantee for no troubles)
>> It depends only on how finely we can be capable of precisely defining
>> the destinations to which
Neat and thanks! Perhaps we can think about building this into Orbot,
since we already have a very basic VPN.
On Fri, Feb 12, 2016, at 08:31 AM, Rusty Bird wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Hi,
>
> Maybe someone else will find this useful?
> https://github.com/rusty
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
Maybe someone else will find this useful?
https://github.com/rustybird/orplug
Rusty
orplug, an Android firewall with per-app Tor circuit isolation
Not affiliated with the Tor Project.
Short intro
- - No GUI, please write one ;)
- - D
> On 02/08/2016 01:36 AM, Georg Koppen wrote:
>
>> Mirimir:
>>
>>> When automatically updating, does Tor browser check GPG signatures of
>>> downloaded updates before installing them?
>>
>> The update files are not using GPG signatures (see:
>> https://wiki.mozilla.org/Software_Update:MAR for deta
> I would
> like to know if Tor Browser 5.5.1 is vulnerable. Thanks
Looks like it is:
https://gitweb.torproject.org/builders/tor-browser-bundle.git/commit/?id=7a36dbece35a307675f396a019dccf6e431efb44
That build corresponds to a branch which includes the commit that
supposedly fixed bug 1246093,