Re: [tor-talk] Pirate Linux 2.0 alpha

2014-04-01 Thread intrigeri
Hi,

AK wrote (01 Apr 2014 01:53:06 GMT) :
 Let me just clarify some points.

 Is the goal to be more secure than a standard Linux distro such as Ubuntu
 or Debian? Yes.

OK. What I'd be delighted to read now is what more secure means.
I'll wait for your next write-up :)

Cheers,
--
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux 2.0 alpha

2014-03-31 Thread AK
OK, I will try to write something up as soon as I can.

Let me just clarify some points.

Is the goal to be more secure than a standard Linux distro such as Ubuntu
or Debian? Yes.

Is the goal to be more secure than a distro such as Tails or Liberte? No.

For example, instead of using a patched version of Firefox as Tails does,
Pirate Linux uses the latest official Firefox ESR together with the
JondoFox profile to create the Tor Browser. So there is less
micromanaging of security issues that should in principle be dealt with by
the upstream providers (Mozilla in this case).

The goals can change, but note that for now I cannot guarantee any level of
security, as this would require more testing and probably hiring
professional security auditors. For now I want to make sure all the
features are working as expected, and then eventually, when I am happy with
the functionality, and I have enough resources, I would like to perform a
full audit of the software. Also, more people working on this would speed
things up (I work full time on other things), so I am currently trying to
find some people who would like to help.



On Sun, Mar 30, 2014 at 8:08 PM, krishna e bera k...@cyblings.on.ca wrote:

 On Sun, Mar 30, 2014 at 4:44 PM, AK aka...@gmail.com wrote:

  Hi
 
  I was expecting you to ask something like that :). Well for now it just
 an
  alpha version, so I would not count on it for robust security. In fact,
  security is not the main focus of this project (unlike Tails and
 Liberte).
  Of course, it should still be reasonably secure, but I am focusing more
 on
  ease of use and privacy, rather than bulletproof security. If there is
  enough interest, I will make a formal document outlining the model,
 since I
  have been asked this before.
 
  Cheers
 


 interest++
 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux 2.0 alpha

2014-03-30 Thread intrigeri
Hi,

AK wrote (30 Mar 2014 20:14:06 GMT) :
 More details are here: https://piratelinux.org/?p=567.

Interesting, thanks!

Where can I read about the threat model this system is meant to address?

Cheers,
--
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux 2.0 alpha

2014-03-30 Thread AK
Hi

I was expecting you to ask something like that :). Well for now it just an
alpha version, so I would not count on it for robust security. In fact,
security is not the main focus of this project (unlike Tails and Liberte).
Of course, it should still be reasonably secure, but I am focusing more on
ease of use and privacy, rather than bulletproof security. If there is
enough interest, I will make a formal document outlining the model, since I
have been asked this before.

Cheers


On Sun, Mar 30, 2014 at 2:33 PM, intrigeri intrig...@boum.org wrote:

 Hi,

 AK wrote (30 Mar 2014 20:14:06 GMT) :
  More details are here: https://piratelinux.org/?p=567.

 Interesting, thanks!

 Where can I read about the threat model this system is meant to address?

 Cheers,
 --
   intrigeri
   | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
   | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux 2.0 alpha

2014-03-30 Thread krishna e bera
On Sun, Mar 30, 2014 at 4:44 PM, AK aka...@gmail.com wrote:

 Hi

 I was expecting you to ask something like that :). Well for now it just an
 alpha version, so I would not count on it for robust security. In fact,
 security is not the main focus of this project (unlike Tails and Liberte).
 Of course, it should still be reasonably secure, but I am focusing more on
 ease of use and privacy, rather than bulletproof security. If there is
 enough interest, I will make a formal document outlining the model, since I
 have been asked this before.

 Cheers



interest++
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux 1.5

2012-06-01 Thread intrigeri
hi,

AK wrote (31 May 2012 15:36:27 GMT) :
 Was it your answer to my question about upgrading Tails?
 [...]
 If someone is using Tails booted from Pirate Linux, they can
 download the ISO from the Tails website, and use the USB installer
 there, it should work as long as they have enough RAM to store
 the ISO.

I'm not sure I understand correctly what you mean,
but the way I understand it won't work at all in the current state of
our tools. (I'd be glad to see our tools improved to support this
usecase, though :)

My point here is that I absolutely do not want to see a new class of
users, locked in a non-upgradable, obsolete and buggy installation,
coming up on our support channels, because someone gave them something
called Tails, that did not really work like the real thing.

So please:

  * Either make sure you give the Pirate Linux users a working and
documented way to upgrade the Tails you are distributing to new
versions we put out. Relying on should work feels inadequate to
me. Best would be to make it so the standard, documented way
somehow works for Pirate Linux users too, I guess, so that you
don't have to fork the Tails documentation, the Tails upgrade
notification system, and possibly more. It may boil down to
contributing the changes you need to Tails, instead of having to
slowly fork it.

  * Or, make it crystal clear to Pirate Linux users the version of
Tails shipped with it is meant to easily allow people to try
Tails, and that it may be obsolete, may contain security issues
fixed in Tails since then, and may be broken in various random
ways. This clearly is the cheapest way to do it. In that case,
perhaps synchronizing somehow with our release dates could be
worth it, to avoid putting a new Pirate Linux out two weeks before
the scheduled release of a Tails major version?
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux 1.5

2012-06-01 Thread Andrew K
On 06/01/2012 06:52 AM, intrigeri wrote:
 hi,

 AK wrote (31 May 2012 15:36:27 GMT) :
 Was it your answer to my question about upgrading Tails?
 [...]
 If someone is using Tails booted from Pirate Linux, they can
 download the ISO from the Tails website, and use the USB installer
 there, it should work as long as they have enough RAM to store
 the ISO.
 I'm not sure I understand correctly what you mean,
 but the way I understand it won't work at all in the current state of
 our tools. (I'd be glad to see our tools improved to support this
 usecase, though :)

 My point here is that I absolutely do not want to see a new class of
 users, locked in a non-upgradable, obsolete and buggy installation,
 coming up on our support channels, because someone gave them something
 called Tails, that did not really work like the real thing.

 So please:

   * Either make sure you give the Pirate Linux users a working and
 documented way to upgrade the Tails you are distributing to new
 versions we put out. Relying on should work feels inadequate to
 me. Best would be to make it so the standard, documented way
 somehow works for Pirate Linux users too, I guess, so that you
 don't have to fork the Tails documentation, the Tails upgrade
 notification system, and possibly more. It may boil down to
 contributing the changes you need to Tails, instead of having to
 slowly fork it.

   * Or, make it crystal clear to Pirate Linux users the version of
 Tails shipped with it is meant to easily allow people to try
 Tails, and that it may be obsolete, may contain security issues
 fixed in Tails since then, and may be broken in various random
 ways. This clearly is the cheapest way to do it. In that case,
 perhaps synchronizing somehow with our release dates could be
 worth it, to avoid putting a new Pirate Linux out two weeks before
 the scheduled release of a Tails major version?
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Alright, I added some more details to the guide. I'm planning to add
better Tails upgrade support for the next release (not sure when).

By the way, criticism is highly encouraged. I like to know whether I'm
doing something wrong!



signature.asc
Description: OpenPGP digital signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Pirate Linux 1.5

2012-05-31 Thread Andrew K
Pirate Linux 1.5 has just been released. The main OS in the ISO is based
off Ubuntu 12.04. You can also just download piratepack, which is a DEB
package which installs essentially the same features and has been tested
on Ubuntu 10+ and Debian 6.

Download page: http://piratelinux.org/?page_id=2

Features page: http://piratelinux.org/?page_id=15

Get started with this Guide: http://piratelinux.org/?page_id=275

Notable Tor features:

- Tor Web Browser that uses your default Firefox. (Contains the addons
Bloody Vikings, HTTPS-Everywhere, NoScript, Torbutton, websocket disabled).

- Tor IRC. (pidgin with OTR connected to Tor with a random username and
some relevant chat rooms added to list)

- Easily create multiple Tor (Vidalia) instances.

- Convenient access from the boot menu to the Tails Amnesic Incognito
Live System (This method of using Tails is not officially supported by
the Tails developers, and some features such as the USB installer may
not work).

Some future plans:

- Only updates get compiled.

- Gentoo package.

- Pirate Linux Server Edition.

But now, until probably October, I'll be too busy to add new features,
so I'll just focus on maintaining bugs and important updates.



signature.asc
Description: OpenPGP digital signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux 1.5

2012-05-31 Thread intrigeri
Hi,

Andrew K wrote (31 May 2012 19:07:54 GMT) :
 - Convenient access from the boot menu to the Tails Amnesic Incognito
 Live System (This method of using Tails is not officially supported
 by the Tails developers, and some features such as the USB installer
 may not work).

It always feels good to see Tails spread around, but given the
non-standard way this one is installed, I feel compelled to ask:

Is any security feature of Tails known to be broken?
How are users supposed to upgrade the Tails provided by Pirate Linux?
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux 1.5

2012-05-31 Thread intrigeri
Hi,

AK wrote (31 May 2012 14:00:17 GMT) :
 From what I tested, no security feature is broken.

Great.

 It's meant to easily allow people to try Tails, an if they like it
 and they want the official version, they can go to the Tails website
 and download the latest ISO.

Was it your answer to my question about upgrading Tails?
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux 1.5

2012-05-31 Thread AK
 Was it your answer to my question about upgrading Tails?

Yes. I'm not sure exactly how the Tails upgrade system works, but I
think it requires one to download a tails ISO and either burn it to
DVD or install it to usb using the USB installer in tails or in
another OS. If someone is using Tails booted from Pirate Linux, they
can download the ISO from the Tails website, and use the USB installer
there, it should work as long as they have enough RAM to store the
ISO. If you have more detailed questions, feel free to ask me on IRC
(akarmn, irc.oftc.net).

On Thu, May 31, 2012 at 8:33 AM, intrigeri intrig...@boum.org wrote:
 Hi,

 AK wrote (31 May 2012 14:00:17 GMT) :
 From what I tested, no security feature is broken.

 Great.

 It's meant to easily allow people to try Tails, an if they like it
 and they want the official version, they can go to the Tails website
 and download the latest ISO.

 Was it your answer to my question about upgrading Tails?
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux 1.5

2012-05-31 Thread Pascal
Looks like the first bug you need to fix is with NTP.  Your clock is not 
even close to right.


-Pascal


On 5/31/2012 2:07 PM, Andrew K wrote:

But now, until probably October, I'll be too busy to add new features,
so I'll just focus on maintaining bugs and important updates.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux 1.5

2012-05-31 Thread AK
The clock is fine on Pirate Linux. I've been writing my emails with
another OS, and now I think I fixed it :)

On Thu, May 31, 2012 at 9:44 AM, Pascal pascal...@users.sourceforge.net wrote:
 Looks like the first bug you need to fix is with NTP.  Your clock is not
 even close to right.

 -Pascal



 On 5/31/2012 2:07 PM, Andrew K wrote:

 But now, until probably October, I'll be too busy to add new features,
 so I'll just focus on maintaining bugs and important updates.

 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux - First Release

2012-01-21 Thread andrew
On Sat, Jan 21, 2012 at 02:33:05AM -0700, aka...@gmail.com wrote 3.0K bytes in 
57 lines about:
: This is a project I have been working on for the Pirate Party of Canada.
: You can see the feature list and download links at http://piratelinux.org.
: The video walk-through is at http://youtu.be/s9kj4pziojQ.

This iso is 2.96GB?  Jeez. I don't see any design document, or something
that details what changes are made to standard ubuntu and why.

-- 
Andrew
http://tpo.is/contact
pgp 0x74ED336B
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux - First Release

2012-01-21 Thread AK
It's not meant to be lightweight. It's meant to be a general purpose system
that one would install on a hard drive, with a balance between privacy and
usability, as well as various options for increasing or decreasing privacy
based on personal needs. I want to eventually target newcomers to Linux.

The 2.96 GB ISO contains:
1) The alternate Ubuntu installer with the standard Ubuntu (64bit) packages
(Alternate installer is needed for full disk encryption).
2) Piratepack (standard  binary) with all dependencies (required 
recommended) not in the default preinstalled Ubuntu packages (so that the
full installation can be made offline).
3) The Ubuntu squashfs live image (64bit) with the binary version of
piratepack plus all its dependencies (required  recommended).
4) Liberte Linux
5) Tails Linux

That's why the ISO is so large. But, this can easily fit on a DVD or 4GB
usb stick, so I don't see how it's a problem. And no I'm not using OpenBSD
for now, since I think Debian/Ubuntu is much more accessible for newcomers.

As for design document, I still didn't write any formal documentation, but
the source code is all out there, and the features list briefly explains
all the modifications done to Ubuntu.

I'm not sure what you mean by download helper, but to download this ISO,
bittorrent is the current method I use.

Thanks for the input

On Sat, Jan 21, 2012 at 2:25 PM, M Robinson mr.m.robin...@gmail.com wrote:

 On 1/21/2012 3:13 PM, and...@torproject.org wrote:
  On Sat, Jan 21, 2012 at 02:33:05AM -0700, aka...@gmail.com wrote 3.0K
 bytes in 57 lines about:
  : This is a project I have been working on for the Pirate Party of
 Canada.
  : You can see the feature list and download links at
 http://piratelinux.org.
  : The video walk-through is at http://youtu.be/s9kj4pziojQ.
 
  This iso is 2.96GB?  Jeez. I don't see any design document, or something
  that details what changes are made to standard ubuntu and why.
 
 I'm a regular OS Stuntman, but this seems like a bloated slipstream—with
 all due respect.

 Which download helper are you using?
 Thanks for the Bloody Vikings, I've never heard of it.

 No one ever uses OpenBSD for live security disks...

 --
 GnuPG is Free Software (meaning that it respects your freedom).

 Extensible, customizable text editor---GNU Emacs; Where's yours?


 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux

2011-08-14 Thread intrigeri
Hi,

AK wrote (05 Aug 2011 01:44:05 GMT) :
 Soon we plan to create an ISO from this that will be based on
 Ubuntu. It will have a Live Boot feature and Full Disk Encryption.
 The Live Boot feature will allow someone to simply reboot their
 system from the Pirate Linux disc and choose to boot a Live Privacy
 Enhanced OS (such as Tails).

Do you mean mutually exclusive Live Boot and Full Disk Encryption modes?

More generally, I'd be happy to learn what makes your usecase / threat
model / specification / implementation decisions different from Tails'
ones [0], and to share as much work as we can.

[0] https://tails.boum.org/contribute/design/

Bye,
--
  intrigeri intrig...@boum.org
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
  | We're dreaming of something else.
  | Something more clandestine, something happier.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux

2011-08-14 Thread AK
We want Pirate Linux to be for day to day use, so a Purely Live CD wouldn't
make sense for that. We also want it to be easy to use for beginners,
especially people who are new to Linux, so that's why we chose Ubuntu. But
we can easily make a Debian version from that. We want the installer to
choose Full Disk Encryption by default. It will also install Piratepack to
perform the customization.

On the boot menu the main options will be:
- Try Ubuntu (Live CD with Piratepack, some video introductions  tutorials
on how to prepare the hard drive for a new OS)
- Install Ubuntu (Install with Full disk encryption)
- Start Liberte (A Live Privacy Enhanced OS like Tails)
- Start Tails (Live mode)

So, you can install the main Ubuntu based OS to your hard drive. And in
times where you need extra privacy, you reboot with the disk and choose
Start Liberte or Start Tails.

All this can easily fit on one DVD, and will basically be a showcase of what
our Party views as freedom.

Of course, this is still in the building/testing phase, so the plans might
change.

Andrew.

On Sun, Aug 14, 2011 at 10:31 AM, intrigeri intrig...@boum.org wrote:

 Hi,

 AK wrote (05 Aug 2011 01:44:05 GMT) :
  Soon we plan to create an ISO from this that will be based on
  Ubuntu. It will have a Live Boot feature and Full Disk Encryption.
  The Live Boot feature will allow someone to simply reboot their
  system from the Pirate Linux disc and choose to boot a Live Privacy
  Enhanced OS (such as Tails).

 Do you mean mutually exclusive Live Boot and Full Disk Encryption modes?

 More generally, I'd be happy to learn what makes your usecase / threat
 model / specification / implementation decisions different from Tails'
 ones [0], and to share as much work as we can.

 [0] https://tails.boum.org/contribute/design/

 Bye,
 --
  intrigeri intrig...@boum.org
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
  | We're dreaming of something else.
  | Something more clandestine, something happier.
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux

2011-08-14 Thread andrew
On Sun, Aug 14, 2011 at 12:31:04PM -0600, aka...@gmail.com wrote 6.2K bytes in 
149 lines about:
: We want Pirate Linux to be for day to day use, so a Purely Live CD wouldn't

Purely livecd's can write to other storage though. I've used tails day
to day when traveling with an encrypted fs on usb storage just fine.
Tails also offers the ability to install to another storage device. 

However, the more choices the better. Tails is a fine solution. Others
may like The Haven Project or Pirate Linux. Good luck.

I encourage you to continue to publish your specifications and threat
models so motivated users can make their own decisions. Peer review will
only make you stronger.

-- 
Andrew
pgp key: 0x74ED336B
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux

2011-08-14 Thread AK
Ya its not just the Live CD aspect of it. But also, people aren't going to
use Tor 24/7. So if all internet traffic goes through Tor, that could turn
away users from using it day to day. But I don't know, I haven't tried Tails
since a few months ago so maybe there are some new features I'm unaware of.
Also, its the first time I hear about Haven. Looks interesting also.

As for specifications  documentation, I plan to write that up once I have a
more complete package up and running. Probably in a few weeks...But for now
feel free to test out piratepack, as its a pretty complete package right
now.

On Sun, Aug 14, 2011 at 1:52 PM, and...@torproject.org wrote:

 On Sun, Aug 14, 2011 at 12:31:04PM -0600, aka...@gmail.com wrote 6.2K
 bytes in 149 lines about:
 : We want Pirate Linux to be for day to day use, so a Purely Live CD
 wouldn't

 Purely livecd's can write to other storage though. I've used tails day
 to day when traveling with an encrypted fs on usb storage just fine.
 Tails also offers the ability to install to another storage device.

 However, the more choices the better. Tails is a fine solution. Others
 may like The Haven Project or Pirate Linux. Good luck.

 I encourage you to continue to publish your specifications and threat
 models so motivated users can make their own decisions. Peer review will
 only make you stronger.

 --
 Andrew
 pgp key: 0x74ED336B
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux

2011-08-14 Thread andrew
On Sun, Aug 14, 2011 at 02:38:37PM -0600, aka...@gmail.com wrote 4.4K bytes in 
107 lines about:
: Ya its not just the Live CD aspect of it. But also, people aren't going to
: use Tor 24/7. So if all internet traffic goes through Tor, that could turn

That's just your assumption. I use tor 24/7 when I travel; or said
another way, I only use tails when I travel because I don't trust the
networks at hotels, conferences, and places I visit. I also use
hidden services heavily to do mundane things like login to servers,
check mail, git, etc even when not traveling.

I may also be an outlier from the general population.

-- 
Andrew
pgp key: 0x74ED336B
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux

2011-08-14 Thread AK
Ya but people also like to stream movies, download torrents, video chat. So
I'm not sure if Tor performs well enough for doing those things.

On Sun, Aug 14, 2011 at 3:53 PM, and...@torproject.org wrote:

 On Sun, Aug 14, 2011 at 02:38:37PM -0600, aka...@gmail.com wrote 4.4K
 bytes in 107 lines about:
 : Ya its not just the Live CD aspect of it. But also, people aren't going
 to
 : use Tor 24/7. So if all internet traffic goes through Tor, that could
 turn

 That's just your assumption. I use tor 24/7 when I travel; or said
 another way, I only use tails when I travel because I don't trust the
 networks at hotels, conferences, and places I visit. I also use
 hidden services heavily to do mundane things like login to servers,
 check mail, git, etc even when not traveling.

 I may also be an outlier from the general population.

 --
 Andrew
 pgp key: 0x74ED336B
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux

2011-08-04 Thread Jack Waugh

Does this have something to do with Pastafarianism?  Heh, heh.

Your neighbor from the south
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux

2011-08-04 Thread Scott Elcomb
On Thu, Aug 4, 2011 at 9:53 PM, Jack Waugh zqrfvbh...@snkmail.com wrote:
 Does this have something to do with Pastafarianism?  Heh, heh.

Pirates eat pasta. :P

-- 
  Scott Elcomb
  @psema4 on Twitter / Identi.ca

  Atomic OS: Self Contained Microsystems
  http://code.google.com/p/atomos/

  Member of the Pirate Party of Canada
  http://www.pirateparty.ca/
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pirate Linux

2011-08-04 Thread AK
Sorry forgot to answer your first question.

The sources are mostly taken from already quite trusted sources and can be
verified by PGP signatures. You can also read the sources and since they get
compiled on your computer, you know that what you read is what you get.
Also, other people can read the sources and give reviews and you will know
that those reviews actually correspond to what is running on your system.

On Thu, Aug 4, 2011 at 10:18 PM, AK aka...@gmail.com wrote:

 I know, you still have to trust the standard Ubuntu programs such as gcc 
 firefox. But, you already made the decision to trust those when you
 installed Ubuntu. The piratepack doesn't force you to trust any new
 repositories.

 On Thu, Aug 4, 2011 at 9:54 PM, Ted Smith ted...@gmail.com wrote:

 On Thu, 2011-08-04 at 19:44 -0600, AK wrote:
  - No need to trust nonstandard binary executables. Polipo, tor, vidalia,
  piratepack binaries are automatically compiled from source on
 installation.

 How do I know that the sources are trustworthy? Or that the programs
 used to compile (or verify their trustworthyness) are trustworthy?

 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk



___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk