On 03/01/12 23:03, Chris wrote:
> Even then there could still be ways to fingerprint and connect a
> user. Your ISP, your modem, and other latency or surfing
> particularities. Do you always spell a particular set of words wrong?
> Or do you always spell every word right?
Tor should deal with the
You can only go so far in attempting to blend all the users together
into one indistinguishable group, so the Tor Browser Bundle's job is
to give it the best possible shot. It can't possibly do everything,
catch all cases, or correct your unique fingerprint of spelling
mistakes. However, it still
> On 03/01/12 16:44, Øyvind Sæther wrote:
>> Just ignore the Browser bundle bullshit, that's for stupid Windows
>> users and pointless on *nix systems.
>
> There's a good reason still to use the Tor Browser: it provides a
> "standard" environment which is the same as every* other Tor user's.
> Safe
On 03/01/12 21:14, Maxim Kammerer wrote:
> [A pointless rant masquerading as rhetoric]
I'd offer you some chill pills, but I need all of mine.
If you want to arse about and spend your entire life tweaking settings
that's up to you. You know your own skill set. Most people I know,
including many p
On Tue, Jan 3, 2012 at 20:42, Julian Yon wrote:
> There's a good reason still to use the Tor Browser: it provides a
> "standard" environment which is the same as every* other Tor user's.
> Safety in numbers is never truer than with anonymity; compare with the
> Black Bloc tactic often used at demo
On 03/01/12 16:44, Øyvind Sæther wrote:
> Just ignore the Browser bundle bullshit, that's for stupid Windows
> users and pointless on *nix systems.
There's a good reason still to use the Tor Browser: it provides a
"standard" environment which is the same as every* other Tor user's.
Safety in numbe
> I have tended to find that the packaged tor is virtually always
> behind and so I get notices that there is a new version and I should
> upgrade but with no means of doing so because all that is available
> is the browser bundle.
As already pointed out, these pages:
Debian: https://www.torproje
You have to add the Tor repository to your distributions
/etc/apt/sources.list file and then you will get the latest Tor software.
In fact your system should automatically inform you of these new versions
and ask you to update just like any other software in the main repository
of your distribution
I have tended to find that the packaged tor is virtually always behind and so I
get notices that there is a new version and I should upgrade but with no means
of doing so because all that is available is the browser bundle.
On Monday, January 02, 2012 07:18:04 PM Matthew wrote:
> Use your distri
:14
To:
Reply-To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Real basic questions for linux
I have tended to find that the packaged tor is virtually always behind and so I
get notices that there is a new version and I should upgrade but with no means
of doing so because all that is
Use your distribution's package manager...
Debian: https://www.torproject.org/docs/debian
RHEL derivitaves: https://www.torproject.org/docs/rpms.html.en
...then edit torrc to taste.
On 1/2/12, Praedor wrote:
> As it appears that the only tor app being provided by the tor project these
> days i
As it appears that the only tor app being provided by the tor project these
days is the tor browser bundle, how is one supposed to simply run tor as a
relay or exit or bridge if it is only provided as a browser bundle?
How does one avoid staring multiple tor instances and only start up the brows
12 matches
Mail list logo