intrigeri:
Yay!
Here are a few initial comments to keep the ball rolling:
Hello:
Thanks for the suggestions. The branch has been updated. Any other
suggestions?
BitingBird, sajolida?
Cheers
signature.asc
Description: OpenPGP digital signature
intrigeri wrote:
I suppose that they are chosen to be reliable enough for Tor Browser
users outside of Tails. And Tails users being 1% of Tor users [1]
maybe
that's no problem.
In practice, I would bet that you're probably right. Note that we lack
Anyway, the meeting minutes don't make it
Hi,
sajolida wrote (04 Jun 2015 12:55:41 GMT) :
« Provide default bridges
---
It was agreed that in the context of Tails, until we have Tor config
persistence (#5461), too many users may use default bridges because
it's too painful to input bridges addresses
Hi,
some of the people who run labs.riseup.net have scheduled some Redmine
maintenance on June 13-14. More specifically, the software that adds
integration with Gitolite (and in turn, all the Git-related niceties
we've enabled a few months ago in our Redmine project) will
be upgraded [1].
We
On 05/15/2015 11:28 AM, intrigeri wrote:
Hi,
the proposed branch fixes build failures in Jenkins, that are caused
by our build system refreshing the wiki (uh, twice) *before* merging
the base branch.
Please review'n'merge into stable and devel (the earlier it's done,
the less Jenkins
Hi,
Tails Installer logs error from subprocesses to
/tmp/liveusb-creator.log. That's a well-known name in a world-writable
location, so leaves room for some kinds of attacks e.g.
arbitrary file modification. The proposed branch fixes that.
Note that I did not build a Debian package, but tested
intrigeri:
I'll personally be mostly offline during that week-end [...]
Same for me most likely.
--
sajolida
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email
Hi,
this branch should fix #9364, that is we may be currently modifying
the hardware clock on shutdown. I've tried (not very hard) for a week
to test this on bare metal but failed to find appropriate hardware.
It should be easy for the reviewer, thanks to the details on the
ticket, to test if the
Hi,
Tor Browser 4.5.2-build1 is up at for testing:
https://people.torproject.org/~gk/builds/4.5.2-build1/
This release provides a fix for the Logjam attack (https://weakdh.org/)
and updates a number of Tor Browser components: Tor to version 0.2.6.8,
Torbutton to version 1.9.2.6, NoScript to
On Fri 2015-06-05 10:58:55 -0400, sajolida wrote:
intrigeri:
the Tor Browser dev team is preparing a 4.5.2 release to fix Logjam.
GeKo tells me that the fix for ESR landed last week but mozilla does
not deem that important enough to make a chemspill and so we
basically cherry-picked the
See https://jenkins.tails.boum.org/job/build_Tails_ISO_feature-jessie/516/
--
[...truncated 12305 lines...]
ERROR: ld.so: object '/usr/lib/libeatmydata/libeatmydata.so' from LD_PRELOAD
cannot be preloaded (cannot open shared object file): ignored.
ERROR:
intrigeri:
the Tor Browser dev team is preparing a 4.5.2 release to fix Logjam.
GeKo tells me that the fix for ESR landed last week but mozilla does
not deem that important enough to make a chemspill and so we
basically cherry-picked the patches only.
So Mozilla didn't bother to fix it as an
12 matches
Mail list logo