Re: [tor-talk] Firefox OS - B2G support ?

2016-09-23 Thread Petrusko
Yeah, exact Mozilla is not working more on FFOS,
but "the community" has now the project (smartphone part) in their hands ;)
Now it's Boot2Gecko (1st name of the project...) and people is working
on this OS everyday, so it will continue to live...

https://developer.mozilla.org/en-US/docs/Mozilla/B2G_OS

So it can be interesting to have another browser like Tor Browser
available for this smartphone OS ;)

> Mozilla has quietly killed the smartphone part of that project.
>
> They are still trying to use FfOS for IoT use cases, but the phone
> project is no more.

-- 
Petrusko
PubKey EBE23AE5
C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5



signature.asc
Description: OpenPGP digital signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor-friendly email provider

2016-09-23 Thread Joe Btfsplk



On 9/22/2016 1:00 PM, Oskar Wendel wrote:


gmx.com doesn't want me to register: "Your registration could not be
processed at the moment. Please try again later."

gmx.net seems to blacklist Tor, too:

Registrierung leider nicht moglich!

Sie haben versucht, sich mit der IP-Adresse 77.247.181.162
bei GMX zu registrieren.

Diese IP-Adresse ist nicht zugelassen.

Whatever it means, but it looks like "you are using Tor, so flick off".

- From the link provided by nusenu:

Sigaint doesn't allow pop3/smtp unless you buy a pro account, which is
quite expensive...

mailbox.org allows only 30 days for free.

riseup.net is the provider I'm using currently, but I'm not happy with
it and that's why I'm looking for another one...

mail.ru is in Russian, too... any way to switch to English?

mail2tor, according to the site, is not very reliable.

bitmessage.ch doesn't seem to allow creating custom addresses.

Doesn't look good, maybe it's time to learn Russian...

I don't think GMX allows using Tor, but they don't offer anything 
special - as to privacy, security.  They're not a lot different than 
most others - anymore.
What is it about Riseup that you don't like?  Just curious.  I've not 
used it, but most people seem to like it.


Unseen.is - located in Iceland is a more privacy conscious provider.  
I've created an acct using TBB in the past.  They don't - or didn't - 
keep logs or store messages after you delete them.
They offer end to end encryption - between Unseen users, using their own 
app loaded on computers.  They'll keep encrypted messages on their 
server, if you want.  It's proprietary encryption, which some don't like 
(can't be independently tested).  They claim they intentionally never 
have the private key, so no LEAs can force them to decrypt or hand over 
messages.


I'm not sure that independent testing of encrypton or software is as 
relevant today, if - - avoiding state players is a main concern. For 
protection against _non-government criminals_ (see what I did there?), 
independent testing is important.  Even the largest universities' or 
security firms' resources are tiny compared to the time, money, talent 
and computing power that nations put towards cracking encryption, paying 
for or coercing back doors, or finding exploitable software bugs.  I'm 
sure governments have made huge advances since Snowden's papers in 2013, 
that we probably will never hear about.


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor 0.2.9.3-alpha is released

2016-09-23 Thread Nick Mathewson
Hi, all!  There is a new alpha release of the Tor source code, with
fixes for several important bugs, and numerous other updates.

(If you are about to reply saying "please take me off this list",
instead please follow these instructions:
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-announce/
.  You will have to enter the actual email address you used to subscribe.)

You can download the source from the usual place on the website.
Packages should be up in a few days.

(There is also a concurrent release of Tor 0.2.8.8; for stable
announcements, please see tor-announce@ or the blog.)


==

Changes in version 0.2.9.3-alpha - 2016-09-23
  Tor 0.2.9.3-alpha adds improved support for entities that want to make
  high-performance services available through the Tor .onion mechanism
  without themselves receiving anonymity as they host those services. It
  also tries harder to ensure that all steps on a circuit are using the
  strongest crypto possible, strengthens some TLS properties, and
  resolves several bugs -- including a pair of crash bugs from the 0.2.8
  series. Anybody running an earlier version of 0.2.9.x should upgrade.

  o Major bugfixes (crash, also in 0.2.8.8):
- Fix a complicated crash bug that could affect Tor clients
  configured to use bridges when replacing a networkstatus consensus
  in which one of their bridges was mentioned. OpenBSD users saw
  more crashes here, but all platforms were potentially affected.
  Fixes bug 20103; bugfix on 0.2.8.2-alpha.

  o Major bugfixes (relay, OOM handler, also in 0.2.8.8):
- Fix a timing-dependent assertion failure that could occur when we
  tried to flush from a circuit after having freed its cells because
  of an out-of-memory condition. Fixes bug 20203; bugfix on
  0.2.8.1-alpha. Thanks to "cypherpunks" for help diagnosing
  this one.

  o Major features (circuit building, security):
- Authorities, relays and clients now require ntor keys in all
  descriptors, for all hops (except for rare hidden service protocol
  cases), for all circuits, and for all other roles. Part of
  ticket 19163.
- Tor authorities, relays, and clients only use ntor, except for
  rare cases in the hidden service protocol. Part of ticket 19163.

  o Major features (single-hop "hidden" services):
- Add experimental HiddenServiceSingleHopMode and
  HiddenServiceNonAnonymousMode options. When both are set to 1,
  every hidden service on a Tor instance becomes a non-anonymous
  Single Onion Service. Single Onions make one-hop (direct)
  connections to their introduction and renzedvous points. One-hop
  circuits make Single Onion servers easily locatable, but clients
  remain location-anonymous. This is compatible with the existing
  hidden service implementation, and works on the current tor
  network without any changes to older relays or clients. Implements
  proposal 260, completes ticket 17178. Patch by teor and asn.

  o Major features (resource management):
- Tor can now notice it is about to run out of sockets, and
  preemptively close connections of lower priority. (This feature is
  off by default for now, since the current prioritizing method is
  yet not mature enough. You can enable it by setting
  "DisableOOSCheck 0", but watch out: it might close some sockets
  you would rather have it keep.) Closes ticket 18640.

  o Major bugfixes (circuit building):
- Hidden service client-to-intro-point and service-to-rendezvous-
  point cicruits use the TAP key supplied by the protocol, to avoid
  epistemic attacks. Fixes bug 19163; bugfix on 0.2.4.18-rc.

  o Major bugfixes (compilation, OpenBSD):
- Fix a Libevent-detection bug in our autoconf script that would
  prevent Tor from linking successfully on OpenBSD. Patch from
  rubiate. Fixes bug 19902; bugfix on 0.2.9.1-alpha.

  o Major bugfixes (hidden services):
- Clients now require hidden services to include the TAP keys for
  their intro points in the hidden service descriptor. This prevents
  an inadvertent upgrade to ntor, which a malicious hidden service
  could use to distinguish clients by consensus version. Fixes bug
  20012; bugfix on 0.2.4.8-alpha. Patch by teor.

  o Minor features (security, TLS):
- Servers no longer support clients that without AES ciphersuites.
  (3DES is no longer considered an acceptable cipher.) We believe
  that no such Tor clients currently exist, since Tor has required
  OpenSSL 0.9.7 or later since 2009. Closes ticket 19998.

  o Minor feature (fallback directories):
- Remove broken entries from the hard-coded fallback directory list.
  Closes ticket 20190; patch by teor.

  o Minor features (geoip, also in 0.2.8.8):
- Update geoip and geoip6 to the September 6 2016 Maxmind GeoLite2
  Country database.

  o Minor feature (port flags):
- Add new flags to the *Port 

[tor-talk] Help

2016-09-23 Thread tortalk
Hello David Bodnaraszek,

there was a similar issue 11 months ago:
https://trac.torproject.org/projects/tor/ticket/17453
" #17453 closed defect (fixed)
Crashing on Windows 10 
[...]
Fault Module Name: d2d1.dll
Fault Module Version: 6.1.7601.17514
[...]
https://trac.torproject.org/projects/tor/ticket/17453#comment:7
So the workaround for users who don't want to wait for the next release is to 
create the file Messenger/TorMessenger/Data/Browser/profile.default/prefs.js 
with the following two lines:
user_pref("gfx.direct2d.disabled", true);
user_pref("layers.acceleration.disabled", true);"


Your version seems up to date:
"Nom du module défaillant : d2d1.dll, version : 10.0.10586.589,"

Either your version is défectueuse and you just save the old and replace it 
with same version. 
Or maybe you will downgrade the dll version until a more advanced version is 
released (if you didn't got the issue with Tor before).
Please visit a site of your trust to get the version you need of d2d1.dll and 
save your old for a backup before replacing it. 
https://www.dll-files.com/d2d1.dll.html#
"d2d1.dll, File description: Microsoft D2D Library"
"10.0.10586.0"?

Aloha,
Toruser

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk