Hi "Randolph",
Do you know these developers?:
http://sourceforge.net/users/mikepery
http://sourceforge.net/users/perrymikey
What funny coincidences...
I'll just leave this here:
http://sourceforge.net/projects/sourceforge/report_inappropriate
___
to
On Fri, Aug 24, 2012, at 05:34 PM, Karsten N. wrote:
> On 08/24/2012 06:03 PM, Randolph D. wrote:
> > the browser update 1.35 has been released to the
> > testers and they have sent no failures back,
>
> Because Dooble v. 1.35 did not run on my Linux64 test system.
> (I have had no problems to get
On 08/24/2012 06:03 PM, Randolph D. wrote:
> the browser update 1.35 has been released to the
> testers and they have sent no failures back,
Because Dooble v. 1.35 did not run on my Linux64 test system.
(I have had no problems to get v. 1.31 running.)
> so dooble is working proper and quite well
okay, so here we go again: the browser update 1.35 has been released to the
testers and they have sent no failures back,
so dooble is working proper and quite well with tor.
thanks for QUOD ERAT DEMONSTRANDUM.
It now can be bundled to Tor as just another package.
Regards
.
2012/8/18 Karsten N.
>
With Weather Eye Open:
> Original Message
>
>> From: Nick Mathewson
>>
>> We release a piece of software called TorBrowser. I don't know
>> how much more simple I can make that, Randolph. We *already* use
>> that name for one of the components of the TBB.
>
> While I hate to
Original Message
> From: Nick Mathewson
>
> We release a piece of software called TorBrowser. I don't know how
> much more simple I can make that, Randolph. We *already* use that
> name for one of the components of the TBB.
While I hate to be the cynic, perhaps it's time to
Hi,
Uploaded. Please remove $HOME/.dooble before using 1.35. Please also verify
that Settings->Security->Display... is disabled.
I tested 1.35 with respect to DNS queries alongside Wireshark (I removed
DNS filters). The results were positive for both HTTP and FTP, that is,
Wireshark didn't detect
On Thu, Aug 16, 2012, at 20:11, A. Megas wrote:
> My turn.
Cool! We're having a contest!
> You're insinuating that some dark conspiracy is at work with Dooble.
> Dooble
This is a Straw Man Fallacy. Check it out on the web, although you might
be using it on purpose. I was not insinuating. I was
On Thu, Aug 16, 2012 at 3:47 PM, Randolph D. wrote:
> TBB =/ Torbrowser
> website redesgined in blue
Though imitation is the highest form of flattery, you should really
just redesign your site. Create your own CSS and maybe try using a
3-column design instead of just 2...provides much more flexib
On Thu, Aug 16, 2012 at 3:47 PM, Randolph D. wrote:
> TBB =/ Torbrowser
We release a piece of software called TorBrowser. I don't know how
much more simple I can make that, Randolph. We *already* use that
name for one of the components of the TBB.
When you install TBB, it puts an icon on your
Do you need help with a brand new design?
I am willing to buy you a custom template so you can have a great
looking site and not look like Tor's official site. :)
Just send me the link to one that you like: http://themeforest.net/
All the best,
SiNA
Randolph D.:
> Hello
> there is preparation d
Hi,
please post a download link for version 1.35 (Linux64)
I will test it again.
On 08/16/2012 08:23 PM, Randolph D. wrote:
> there WAS in version dooble 1.31. QFP used, which leaked the Proxy for DNS
> this problem has been solved:
> https://bugs.webkit.org/show_bug.cgi?id=50622
The bug is not
TBB =/ Torbrowser
website redesgined in blue
disclaimer added twice.
the domain exists since 2 years and no webkit browser ever has bundle.
let´s see what progress can be made.
2012/8/16 Nick Mathewson
>
> I wish rename software, redesign website, and
> actually warn his users that his stuff
I have been actively working with the Tor Project. When I saw the page
on sourceforge I thought oh, Tor has a new site, and I am not your
normal Tor user. I use it religiously.
Randolph, your page does confuse users with Tor's official site.
--SiNA
Nick Mathewson:
> On Wed, Aug 15, 2012 at 5:35
On Thu, Aug 16, 2012 at 2:11 PM, A. Megas wrote:
> My turn.
Alexis, I don't think this "antispam" guy is talking about Dooble the
browser. He's talking about "Randolph"/"Perrymike"/whoever's
so-called "TorBrowser." He's talking about "that package" and a
"Dooble Bundle" to distinguish it from t
well for the cool down some facts:
there WAS in version dooble 1.31. QFP used, which leaked the Proxy for DNS
this problem has been solved:
https://bugs.webkit.org/show_bug.cgi?id=50622
https://sourceforge.net/tracker/?func=detail&atid=1108293&aid=3523760&group_id=238964
someone on this list test
My turn.
You're insinuating that some dark conspiracy is at work with Dooble. Dooble
isn't a scam. It's a Web browser with real users, real feedback, and real
goals. It's one thing when you harass other projects that intend to use or
misuse it (or misrepresent it) and another when you're attacking
Hi antispam
you are an activist for 120 % right?, the mailinglist is not only populated
with developers, but as well with people like you propagating the
apocalypse. We should be on the same direction. I guess you are not a
developer?
Andrew Lewman asked in the developer team what to do and sent a
On Thu, Aug 16, 2012, at 03:21, A. Megas wrote:
> As for leaking IP information, we work with a framework (Qt) that has
> issues and limitations. Every release of Dooble includes detailed
> information covering all of the fixes and improvements.
>
> Thanks.
So the package is unfit. As most people
On Thu, Aug 16, 2012, at 01:50, Matthew Finkel wrote:
> I mostly ignored this thread because I didn't think it was a big deal.
> I figured the name of your new web browser would most likely confuse
> people, but that could easily be changed once enough people convinced
> you of that. But then I act
If you look in the web, there are many many browsers bundled with tor.
the domain we speak about has been established by a russian coder who
overgave the project to be able to use a new browser.
We created this username for Mike Perry, so he can overtake the login and
use the domain for the TBB, as
Mathew, you did not look close and are just stepping into a train,
This project has not yet published any files. The given files are there
since 2010 and use firefox. Didn ´t you realise that?
since 2 years there has been no idea about this and we just changed the
website to an open source template
On Wed, Aug 15, 2012 at 10:26 PM, dumbnewbie wrote:
> I did a brief check but didn't determine the answer - is perrymikey
> (http://sourceforge.net/users/perrymikey) the same as mikeperry
> (https://blog.torproject.org/blogs/mikeperry)?
Absolutely not.
And unless there really is some other guy
On Thu, Aug 16, 2012 at 7:35 AM, Randolph D. wrote:
> As you already can see on the website, it is added (maybe done later than
> you looked first):
>
> "TorBrowser Source code is open source and not affiliated with Tor, but
> simply use Tor. "Tor" and the "Onion Logo" are registered trademarks of
Hi,
Randolph has good intentions, although his approaches require
refinement. I've asked him several times to discontinue promoting Dooble to
the Tor community. I'm responsible for Dooble, but I can't control its
existence beyond Sourceforge. The official site for Dooble and its Wiki
entry (as of
Do you mind testing a beta release of 1.35 with respect to this issue?
Thanks.
On Wed, Aug 15, 2012 at 11:35 PM, Karsten N. wrote:
> On 08/16/2012 01:06 AM, A. Megas wrote:
> > I recorded some raw and extremely verbose tcpdump data while visiting
> > ftp.debian.org using version 1.35 of Dooble.
On Wed, Aug 15, 2012 at 5:35 PM, Randolph D. wrote:
> As you already can see on the website, it is added (maybe done later than
> you looked first):
>
> "TorBrowser Source code is open source and not affiliated with Tor, but
> simply use Tor. "Tor" and the "Onion Logo" are registered trademarks of
On 08/16/2012 01:06 AM, A. Megas wrote:
> I recorded some raw and extremely verbose tcpdump data while visiting
> ftp.debian.org using version 1.35 of Dooble. I'm unable to locate any
> mention of the visit in the log. I also visited ftp.netbsd.org as I may
> have some cached DNS queries. My browsi
onsider the latest release?
>
>
>>
>> -- Forwarded message --
>> From: Karsten N.
>> Date: 2012/8/15
>> Subject: Re: [tor-talk] http://torbrowser.sourceforge.net/
>> To: tor-talk@lists.torproject.org
>>
>>
>> Hi,
>>
>> I te
On Wed, Aug 15, 2012 at 5:35 PM, Randolph D. wrote:
> As you already can see on the website, it is added (maybe done later than
> you looked first):
>
> "TorBrowser Source code is open source and not affiliated with Tor, but
> simply use Tor. "Tor" and the "Onion Logo" are registered trademarks of
What do you consider the latest release?
>
> -- Forwarded message --
> From: Karsten N.
> Date: 2012/8/15
> Subject: Re: [tor-talk] http://torbrowser.sourceforge.net/
> To: tor-talk@lists.torproject.org
>
>
> Hi,
>
> I tested the latest Dooble re
Hi Karsten
thanks for the test, I remember that there is as well a bug url already in
webkit to address this issue.
that´s why development is needed, maybe as well from the tor project to
provide a patch! Each third user is affected.
Render Engine Total Avg
Trident 50.19%
Web Kit 29.49%
Gecko 19.9
As you already can see on the website, it is added (maybe done later than
you looked first):
"TorBrowser Source code is open source and not affiliated with Tor, but
simply use Tor. "Tor" and the "Onion Logo" are registered trademarks of the
Tor Project, Inc. Content on this site is licensed under
Hi,
I tested the latest Dooble release with SOCKS5 proxy (with Tor) and HTTP
proxy (with JonDo) and the preconfigured I2P proxy for eepsites.
It leaks DNS queries and FTP requests in all cases. Yes - it leaks DNS
queries with the preconfigured I2P proxy too. At first the system DNS
resolver (defi
On Tue, 14 Aug 2012 22:09:03 +0200
"Randolph D." wrote:
> the domain exists for years, it has been acquired for the Qt update,
> see the given 2010 release with still firefox.
From what I can tell, it didn't look like this since 2010.
> As there it TBB, Tor Browser Bundle, the TorBrowser shoul
https://www.torproject.org/projects/torbrowser/design/#security
1. Dooble uses Qt's proxy implementations. QFtp is not used. IP address
retrieval (feature to show the IP of the website, shown in the title of the
website) does not yet use proxies. The mechanism may be disabled by the
user and so sh
Hi Georg,
the browser has improved a lot and what you mention, is webkit related, if
I remember right.
So does Tor inform all users for all the Webkit Browser?
Let´s research on that more to find a risk analysis.
Regards
2012/8/15 Georg Koppen
> > there is preparation draft work done to get the v
> there is preparation draft work done to get the vidalia Qt plugin out for
> the TorBrowser based on Dooble Web Browser 1.35 with lots of security
> improvments.
> Is there something to change on the drafted website?
Yes, you should inform your users that Dooble (and thus your TorBrowser
clone) h
On Tue, Aug 14, 2012, at 22:09, Randolph D. wrote:
> the domain exists for years, it has been acquired for the Qt update, see
> the given 2010 release with still firefox.
> As there it TBB, Tor Browser Bundle, the TorBrowser should not affect
> this.
Than why do you advertise it here if pushing th
the domain exists for years, it has been acquired for the Qt update, see
the given 2010 release with still firefox.
As there it TBB, Tor Browser Bundle, the TorBrowser should not affect this.
It has been there for years, why should the domain be now a spot to look
at? there could be a link to the c
On Tue, 14 Aug 2012 20:38:13 +0200
"Randolph D." wrote:
> Hello
> there is preparation draft work done to get the vidalia Qt plugin out
> for the TorBrowser based on Dooble Web Browser 1.35 with lots of
> security improvments.
> Is there something to change on the drafted website?
>
> http://tor
Hello
there is preparation draft work done to get the vidalia Qt plugin out for
the TorBrowser based on Dooble Web Browser 1.35 with lots of security
improvments.
Is there something to change on the drafted website?
http://torbrowser.sourceforge.net/
Can the Tor Onion be shown in the First Featur
42 matches
Mail list logo