On 10/12/15, sh-expires-12-2...@quantentunnel.de
wrote:
> ...
> Thats what you fail to grasp, imho.
i appreciate education in all forms :)
> I am not sure, what "rogue remote execution" is, please elaborate.
> Sounds like an assassin sniper to me. ;)
i should have been more clear.
specifical
On Thu, Oct 08, 2015 at 07:53:02PM -0700, coderman wrote:
> "security vs. usability", as ever...
Thats not what the discussion is about any longer, the
discussion is about security and convenience.
Thats what you fail to grasp, imho.
> consider the Tor Browser PDF exploit that accessed $HOME for
On 10/8/15, sh-expires-12-2...@quantentunnel.de
wrote:
>
> One of the major problems is the design of Pidign, which tries
> to build a convenient IM client before it takes security into
> consideration
"security vs. usability", as ever...
> Still, it is possible to a achieve a high degree
On Mon, Oct 05, 2015 at 04:00:36PM -0700, coderman wrote:
> the primary problem with Pidgin is libpurple [
> https://pidgin.im/news/security/ ] and a more appropriate mitigation
> would be Qubes isolation, perhaps Whonix-Qubes on new 3.0. :)
One of the major problems is the design of Pidign, which
Malte wrote:
> On Monday 28 September 2015 21:51 mtsio wrote:
>> Hello everyone,
>>
>> Is it safe to use pidgin over tor?
>
> As an alternative there is https://dist.torproject.org/tormessenger/0.1.0b1/
>
> I could not find a release annoncement for the beta but the "don't use it
> except for te
On Monday 28 September 2015 21:51 mtsio wrote:
> Hello everyone,
>
> Is it safe to use pidgin over tor?
As an alternative there is https://dist.torproject.org/tormessenger/0.1.0b1/
I could not find a release annoncement for the beta but the "don't use it
except for testing purposes" disclaimer
On 9/29/15, Tempest wrote:
> ...
> another option to consider is whonix. https://whonix.org. it's a good
> mitigation platform against potentially leaky aps.
the primary problem with Pidgin is libpurple [
https://pidgin.im/news/security/ ] and a more appropriate mitigation
would be Qubes isolatio
k...@jondos.de:
> You have to compile Pidgin by self without "libjingle", because the
> Interactive Connectivity Establishment (ICE) of "libjingle" will breakout
> the proxy in case of a audio or video call.
>
> A small tutorial to compile a Tor-save Pidgin for Linux (only in German):
> https://
On Mon, Sep 28, 2015 at 09:51:30PM +, mtsio wrote:
> Is it safe to use pidgin over tor?
It depends on which protocols you use, since pidgin
is a mulitprotocol instant messaging client and behaves
quite different depending on protocols used/involved.
With Tor, TLS[1], XMPP[2] and OTR[3] it get
Pidgin on Windows by default isn't compiled with libjingle support.
k...@jondos.de wrote:
> Hi,
>
>> Is it safe to use pidgin over tor?
>
> You have to compile Pidgin by self without "libjingle", because the
> Interactive Connectivity Establishment (ICE) of "libjingle" will breakout
> the proxy
Hi,
> Is it safe to use pidgin over tor?
You have to compile Pidgin by self without "libjingle", because the
Interactive Connectivity Establishment (ICE) of "libjingle" will breakout
the proxy in case of a audio or video call.
A small tutorial to compile a Tor-save Pidgin for Linux (only in Ger
mtsio:
> Is it safe to use pidgin over tor?
Some people are concerned about the quality of the Pidgin code base but
we've been using Pidgin in Tails for ages as we don't yet have a better
alternative.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings
Hello everyone,
Is it safe to use pidgin over tor?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
13 matches
Mail list logo