I think of how people actually use a product, which is usually not with all
recommendations applied. There's good reason for using Tor even with an
ordinary OS and Tor Project supports use with Windows and MacOS as well as
Linux and Android, with Linux not limited to Tails
(https://www.torproje
> This is the use case for Tails. . . . [T]here are no writes to storage,
> unless users configure [otherwise] . . . .
One need not use Tails to use Tor (I used to sometimes use Tor and never used
Tails), so, while Tails may be a good idea, the question remains for Tor and
its security architec
This replies to a September 26 post with the same title.
Thank you; I was unaware of the division. No, in the past I was using Tor as if
it is a browser, so I was using the browser it comes with. I did not try to use
it with any other browser.
I did not know if Tor's browser uses Firefox's secur
On Tuesday, September 25, 2018, 2:01:04 AM EDT, Joe wrote:
> * * * * *> Is the claim that Firefox (vs. TorBrowser, based on Firefox esr
version) stores visited URLs in places.sqlite regardless of settings under >
Privacy & Security? > The subject of this message is confusing. Is it asking
the
I understand Tor is based on Firefox. I haven't had Tor recently, but that was
my impression when I did use it. If it is and if you don't read all of the
Firefox Bugzilla bugs implicating security, please look at
https://bugzilla.mozilla.org/show_bug.cgi?id=1476152 and consider weighing in
as a
A request has to be by a "person", not necessarily a national or citizen of the
U.S., as far as I see in the statute. This came up as an issue during the
Reagan Presidency because the Cold War-era U.S.S.R. reportedly made FOIA
requests and I think they resolved it by the U.S. Attorney General of
Forgot to say: The URLs are for U.S. Code, title 5, section 552, as it stood
sometime in 2014; anyone interested should get the latest or check Statutes at
Large for tables of possible updates. Relevant government agencies generally
have regulations on the subject, some published in Code of Fede
In U.S. Federal law, the statute is at 5 U.S.C. 552 (choose from 2 URLs:
https://www.gpo.gov/fdsys/browse/collectionUScode.action?collectionCode=USCODE&searchPath=Title+5%2FPart+I%2FChapter+5%2FSUBCHAPTER+II&oldPath=Title+5%2FPart+I%2FCHAPTER+5&isCollapsed=true&selectedYearFrom=2014&ycord=969
or
Speculation: If evidence of Tor usage is in a header visible with full headers
(a Yahoo display option), perhaps Yahoo uses that to waylay the email into a
spam folder. The evidence might simply be an IP address associated with Tor
usage. Maybe Gmail doesn't do the same thing.
--
tor-talk maili
Law enforcement agencies exaggerate and lie publicly in order to mislead
people, such as unidentified suspects or to weed out claimants to notorious
crimes who didn't really do it (there are quite a few), but the recent news
report appeared, as I recall, to be based on a court or other official
The FBI reportedly cracked Tor's security to crack a child porn case with over
100 arrests of Tor users. I don't know how the FBI did it, and that's a good
type of case for which to do it, but, considering that legitimate users need to
evade high-end intelligence agencies that may be as skilled
11 matches
Mail list logo