Re: [tor-talk] Pirate Linux 2.0 alpha
Hi, AK wrote (01 Apr 2014 01:53:06 GMT) : Let me just clarify some points. Is the goal to be more secure than a standard Linux distro such as Ubuntu or Debian? Yes. OK. What I'd be delighted to read now is what more secure means. I'll wait for your next write-up :) Cheers, -- intrigeri | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 2.0 alpha
OK, I will try to write something up as soon as I can. Let me just clarify some points. Is the goal to be more secure than a standard Linux distro such as Ubuntu or Debian? Yes. Is the goal to be more secure than a distro such as Tails or Liberte? No. For example, instead of using a patched version of Firefox as Tails does, Pirate Linux uses the latest official Firefox ESR together with the JondoFox profile to create the Tor Browser. So there is less micromanaging of security issues that should in principle be dealt with by the upstream providers (Mozilla in this case). The goals can change, but note that for now I cannot guarantee any level of security, as this would require more testing and probably hiring professional security auditors. For now I want to make sure all the features are working as expected, and then eventually, when I am happy with the functionality, and I have enough resources, I would like to perform a full audit of the software. Also, more people working on this would speed things up (I work full time on other things), so I am currently trying to find some people who would like to help. On Sun, Mar 30, 2014 at 8:08 PM, krishna e bera k...@cyblings.on.ca wrote: On Sun, Mar 30, 2014 at 4:44 PM, AK aka...@gmail.com wrote: Hi I was expecting you to ask something like that :). Well for now it just an alpha version, so I would not count on it for robust security. In fact, security is not the main focus of this project (unlike Tails and Liberte). Of course, it should still be reasonably secure, but I am focusing more on ease of use and privacy, rather than bulletproof security. If there is enough interest, I will make a formal document outlining the model, since I have been asked this before. Cheers interest++ -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 2.0 alpha
Hi, AK wrote (30 Mar 2014 20:14:06 GMT) : More details are here: https://piratelinux.org/?p=567. Interesting, thanks! Where can I read about the threat model this system is meant to address? Cheers, -- intrigeri | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 2.0 alpha
Hi I was expecting you to ask something like that :). Well for now it just an alpha version, so I would not count on it for robust security. In fact, security is not the main focus of this project (unlike Tails and Liberte). Of course, it should still be reasonably secure, but I am focusing more on ease of use and privacy, rather than bulletproof security. If there is enough interest, I will make a formal document outlining the model, since I have been asked this before. Cheers On Sun, Mar 30, 2014 at 2:33 PM, intrigeri intrig...@boum.org wrote: Hi, AK wrote (30 Mar 2014 20:14:06 GMT) : More details are here: https://piratelinux.org/?p=567. Interesting, thanks! Where can I read about the threat model this system is meant to address? Cheers, -- intrigeri | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 2.0 alpha
On Sun, Mar 30, 2014 at 4:44 PM, AK aka...@gmail.com wrote: Hi I was expecting you to ask something like that :). Well for now it just an alpha version, so I would not count on it for robust security. In fact, security is not the main focus of this project (unlike Tails and Liberte). Of course, it should still be reasonably secure, but I am focusing more on ease of use and privacy, rather than bulletproof security. If there is enough interest, I will make a formal document outlining the model, since I have been asked this before. Cheers interest++ -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 1.5
hi, AK wrote (31 May 2012 15:36:27 GMT) : Was it your answer to my question about upgrading Tails? [...] If someone is using Tails booted from Pirate Linux, they can download the ISO from the Tails website, and use the USB installer there, it should work as long as they have enough RAM to store the ISO. I'm not sure I understand correctly what you mean, but the way I understand it won't work at all in the current state of our tools. (I'd be glad to see our tools improved to support this usecase, though :) My point here is that I absolutely do not want to see a new class of users, locked in a non-upgradable, obsolete and buggy installation, coming up on our support channels, because someone gave them something called Tails, that did not really work like the real thing. So please: * Either make sure you give the Pirate Linux users a working and documented way to upgrade the Tails you are distributing to new versions we put out. Relying on should work feels inadequate to me. Best would be to make it so the standard, documented way somehow works for Pirate Linux users too, I guess, so that you don't have to fork the Tails documentation, the Tails upgrade notification system, and possibly more. It may boil down to contributing the changes you need to Tails, instead of having to slowly fork it. * Or, make it crystal clear to Pirate Linux users the version of Tails shipped with it is meant to easily allow people to try Tails, and that it may be obsolete, may contain security issues fixed in Tails since then, and may be broken in various random ways. This clearly is the cheapest way to do it. In that case, perhaps synchronizing somehow with our release dates could be worth it, to avoid putting a new Pirate Linux out two weeks before the scheduled release of a Tails major version? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 1.5
On 06/01/2012 06:52 AM, intrigeri wrote: hi, AK wrote (31 May 2012 15:36:27 GMT) : Was it your answer to my question about upgrading Tails? [...] If someone is using Tails booted from Pirate Linux, they can download the ISO from the Tails website, and use the USB installer there, it should work as long as they have enough RAM to store the ISO. I'm not sure I understand correctly what you mean, but the way I understand it won't work at all in the current state of our tools. (I'd be glad to see our tools improved to support this usecase, though :) My point here is that I absolutely do not want to see a new class of users, locked in a non-upgradable, obsolete and buggy installation, coming up on our support channels, because someone gave them something called Tails, that did not really work like the real thing. So please: * Either make sure you give the Pirate Linux users a working and documented way to upgrade the Tails you are distributing to new versions we put out. Relying on should work feels inadequate to me. Best would be to make it so the standard, documented way somehow works for Pirate Linux users too, I guess, so that you don't have to fork the Tails documentation, the Tails upgrade notification system, and possibly more. It may boil down to contributing the changes you need to Tails, instead of having to slowly fork it. * Or, make it crystal clear to Pirate Linux users the version of Tails shipped with it is meant to easily allow people to try Tails, and that it may be obsolete, may contain security issues fixed in Tails since then, and may be broken in various random ways. This clearly is the cheapest way to do it. In that case, perhaps synchronizing somehow with our release dates could be worth it, to avoid putting a new Pirate Linux out two weeks before the scheduled release of a Tails major version? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk Alright, I added some more details to the guide. I'm planning to add better Tails upgrade support for the next release (not sure when). By the way, criticism is highly encouraged. I like to know whether I'm doing something wrong! signature.asc Description: OpenPGP digital signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Pirate Linux 1.5
Pirate Linux 1.5 has just been released. The main OS in the ISO is based off Ubuntu 12.04. You can also just download piratepack, which is a DEB package which installs essentially the same features and has been tested on Ubuntu 10+ and Debian 6. Download page: http://piratelinux.org/?page_id=2 Features page: http://piratelinux.org/?page_id=15 Get started with this Guide: http://piratelinux.org/?page_id=275 Notable Tor features: - Tor Web Browser that uses your default Firefox. (Contains the addons Bloody Vikings, HTTPS-Everywhere, NoScript, Torbutton, websocket disabled). - Tor IRC. (pidgin with OTR connected to Tor with a random username and some relevant chat rooms added to list) - Easily create multiple Tor (Vidalia) instances. - Convenient access from the boot menu to the Tails Amnesic Incognito Live System (This method of using Tails is not officially supported by the Tails developers, and some features such as the USB installer may not work). Some future plans: - Only updates get compiled. - Gentoo package. - Pirate Linux Server Edition. But now, until probably October, I'll be too busy to add new features, so I'll just focus on maintaining bugs and important updates. signature.asc Description: OpenPGP digital signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 1.5
Hi, Andrew K wrote (31 May 2012 19:07:54 GMT) : - Convenient access from the boot menu to the Tails Amnesic Incognito Live System (This method of using Tails is not officially supported by the Tails developers, and some features such as the USB installer may not work). It always feels good to see Tails spread around, but given the non-standard way this one is installed, I feel compelled to ask: Is any security feature of Tails known to be broken? How are users supposed to upgrade the Tails provided by Pirate Linux? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 1.5
Hi, AK wrote (31 May 2012 14:00:17 GMT) : From what I tested, no security feature is broken. Great. It's meant to easily allow people to try Tails, an if they like it and they want the official version, they can go to the Tails website and download the latest ISO. Was it your answer to my question about upgrading Tails? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 1.5
Was it your answer to my question about upgrading Tails? Yes. I'm not sure exactly how the Tails upgrade system works, but I think it requires one to download a tails ISO and either burn it to DVD or install it to usb using the USB installer in tails or in another OS. If someone is using Tails booted from Pirate Linux, they can download the ISO from the Tails website, and use the USB installer there, it should work as long as they have enough RAM to store the ISO. If you have more detailed questions, feel free to ask me on IRC (akarmn, irc.oftc.net). On Thu, May 31, 2012 at 8:33 AM, intrigeri intrig...@boum.org wrote: Hi, AK wrote (31 May 2012 14:00:17 GMT) : From what I tested, no security feature is broken. Great. It's meant to easily allow people to try Tails, an if they like it and they want the official version, they can go to the Tails website and download the latest ISO. Was it your answer to my question about upgrading Tails? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 1.5
Looks like the first bug you need to fix is with NTP. Your clock is not even close to right. -Pascal On 5/31/2012 2:07 PM, Andrew K wrote: But now, until probably October, I'll be too busy to add new features, so I'll just focus on maintaining bugs and important updates. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 1.5
The clock is fine on Pirate Linux. I've been writing my emails with another OS, and now I think I fixed it :) On Thu, May 31, 2012 at 9:44 AM, Pascal pascal...@users.sourceforge.net wrote: Looks like the first bug you need to fix is with NTP. Your clock is not even close to right. -Pascal On 5/31/2012 2:07 PM, Andrew K wrote: But now, until probably October, I'll be too busy to add new features, so I'll just focus on maintaining bugs and important updates. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux - First Release
On Sat, Jan 21, 2012 at 02:33:05AM -0700, aka...@gmail.com wrote 3.0K bytes in 57 lines about: : This is a project I have been working on for the Pirate Party of Canada. : You can see the feature list and download links at http://piratelinux.org. : The video walk-through is at http://youtu.be/s9kj4pziojQ. This iso is 2.96GB? Jeez. I don't see any design document, or something that details what changes are made to standard ubuntu and why. -- Andrew http://tpo.is/contact pgp 0x74ED336B ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux - First Release
It's not meant to be lightweight. It's meant to be a general purpose system that one would install on a hard drive, with a balance between privacy and usability, as well as various options for increasing or decreasing privacy based on personal needs. I want to eventually target newcomers to Linux. The 2.96 GB ISO contains: 1) The alternate Ubuntu installer with the standard Ubuntu (64bit) packages (Alternate installer is needed for full disk encryption). 2) Piratepack (standard binary) with all dependencies (required recommended) not in the default preinstalled Ubuntu packages (so that the full installation can be made offline). 3) The Ubuntu squashfs live image (64bit) with the binary version of piratepack plus all its dependencies (required recommended). 4) Liberte Linux 5) Tails Linux That's why the ISO is so large. But, this can easily fit on a DVD or 4GB usb stick, so I don't see how it's a problem. And no I'm not using OpenBSD for now, since I think Debian/Ubuntu is much more accessible for newcomers. As for design document, I still didn't write any formal documentation, but the source code is all out there, and the features list briefly explains all the modifications done to Ubuntu. I'm not sure what you mean by download helper, but to download this ISO, bittorrent is the current method I use. Thanks for the input On Sat, Jan 21, 2012 at 2:25 PM, M Robinson mr.m.robin...@gmail.com wrote: On 1/21/2012 3:13 PM, and...@torproject.org wrote: On Sat, Jan 21, 2012 at 02:33:05AM -0700, aka...@gmail.com wrote 3.0K bytes in 57 lines about: : This is a project I have been working on for the Pirate Party of Canada. : You can see the feature list and download links at http://piratelinux.org. : The video walk-through is at http://youtu.be/s9kj4pziojQ. This iso is 2.96GB? Jeez. I don't see any design document, or something that details what changes are made to standard ubuntu and why. I'm a regular OS Stuntman, but this seems like a bloated slipstream—with all due respect. Which download helper are you using? Thanks for the Bloody Vikings, I've never heard of it. No one ever uses OpenBSD for live security disks... -- GnuPG is Free Software (meaning that it respects your freedom). Extensible, customizable text editor---GNU Emacs; Where's yours? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux
Hi, AK wrote (05 Aug 2011 01:44:05 GMT) : Soon we plan to create an ISO from this that will be based on Ubuntu. It will have a Live Boot feature and Full Disk Encryption. The Live Boot feature will allow someone to simply reboot their system from the Pirate Linux disc and choose to boot a Live Privacy Enhanced OS (such as Tails). Do you mean mutually exclusive Live Boot and Full Disk Encryption modes? More generally, I'd be happy to learn what makes your usecase / threat model / specification / implementation decisions different from Tails' ones [0], and to share as much work as we can. [0] https://tails.boum.org/contribute/design/ Bye, -- intrigeri intrig...@boum.org | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc | We're dreaming of something else. | Something more clandestine, something happier. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux
We want Pirate Linux to be for day to day use, so a Purely Live CD wouldn't make sense for that. We also want it to be easy to use for beginners, especially people who are new to Linux, so that's why we chose Ubuntu. But we can easily make a Debian version from that. We want the installer to choose Full Disk Encryption by default. It will also install Piratepack to perform the customization. On the boot menu the main options will be: - Try Ubuntu (Live CD with Piratepack, some video introductions tutorials on how to prepare the hard drive for a new OS) - Install Ubuntu (Install with Full disk encryption) - Start Liberte (A Live Privacy Enhanced OS like Tails) - Start Tails (Live mode) So, you can install the main Ubuntu based OS to your hard drive. And in times where you need extra privacy, you reboot with the disk and choose Start Liberte or Start Tails. All this can easily fit on one DVD, and will basically be a showcase of what our Party views as freedom. Of course, this is still in the building/testing phase, so the plans might change. Andrew. On Sun, Aug 14, 2011 at 10:31 AM, intrigeri intrig...@boum.org wrote: Hi, AK wrote (05 Aug 2011 01:44:05 GMT) : Soon we plan to create an ISO from this that will be based on Ubuntu. It will have a Live Boot feature and Full Disk Encryption. The Live Boot feature will allow someone to simply reboot their system from the Pirate Linux disc and choose to boot a Live Privacy Enhanced OS (such as Tails). Do you mean mutually exclusive Live Boot and Full Disk Encryption modes? More generally, I'd be happy to learn what makes your usecase / threat model / specification / implementation decisions different from Tails' ones [0], and to share as much work as we can. [0] https://tails.boum.org/contribute/design/ Bye, -- intrigeri intrig...@boum.org | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc | We're dreaming of something else. | Something more clandestine, something happier. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux
On Sun, Aug 14, 2011 at 12:31:04PM -0600, aka...@gmail.com wrote 6.2K bytes in 149 lines about: : We want Pirate Linux to be for day to day use, so a Purely Live CD wouldn't Purely livecd's can write to other storage though. I've used tails day to day when traveling with an encrypted fs on usb storage just fine. Tails also offers the ability to install to another storage device. However, the more choices the better. Tails is a fine solution. Others may like The Haven Project or Pirate Linux. Good luck. I encourage you to continue to publish your specifications and threat models so motivated users can make their own decisions. Peer review will only make you stronger. -- Andrew pgp key: 0x74ED336B ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux
Ya its not just the Live CD aspect of it. But also, people aren't going to use Tor 24/7. So if all internet traffic goes through Tor, that could turn away users from using it day to day. But I don't know, I haven't tried Tails since a few months ago so maybe there are some new features I'm unaware of. Also, its the first time I hear about Haven. Looks interesting also. As for specifications documentation, I plan to write that up once I have a more complete package up and running. Probably in a few weeks...But for now feel free to test out piratepack, as its a pretty complete package right now. On Sun, Aug 14, 2011 at 1:52 PM, and...@torproject.org wrote: On Sun, Aug 14, 2011 at 12:31:04PM -0600, aka...@gmail.com wrote 6.2K bytes in 149 lines about: : We want Pirate Linux to be for day to day use, so a Purely Live CD wouldn't Purely livecd's can write to other storage though. I've used tails day to day when traveling with an encrypted fs on usb storage just fine. Tails also offers the ability to install to another storage device. However, the more choices the better. Tails is a fine solution. Others may like The Haven Project or Pirate Linux. Good luck. I encourage you to continue to publish your specifications and threat models so motivated users can make their own decisions. Peer review will only make you stronger. -- Andrew pgp key: 0x74ED336B ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux
On Sun, Aug 14, 2011 at 02:38:37PM -0600, aka...@gmail.com wrote 4.4K bytes in 107 lines about: : Ya its not just the Live CD aspect of it. But also, people aren't going to : use Tor 24/7. So if all internet traffic goes through Tor, that could turn That's just your assumption. I use tor 24/7 when I travel; or said another way, I only use tails when I travel because I don't trust the networks at hotels, conferences, and places I visit. I also use hidden services heavily to do mundane things like login to servers, check mail, git, etc even when not traveling. I may also be an outlier from the general population. -- Andrew pgp key: 0x74ED336B ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux
Ya but people also like to stream movies, download torrents, video chat. So I'm not sure if Tor performs well enough for doing those things. On Sun, Aug 14, 2011 at 3:53 PM, and...@torproject.org wrote: On Sun, Aug 14, 2011 at 02:38:37PM -0600, aka...@gmail.com wrote 4.4K bytes in 107 lines about: : Ya its not just the Live CD aspect of it. But also, people aren't going to : use Tor 24/7. So if all internet traffic goes through Tor, that could turn That's just your assumption. I use tor 24/7 when I travel; or said another way, I only use tails when I travel because I don't trust the networks at hotels, conferences, and places I visit. I also use hidden services heavily to do mundane things like login to servers, check mail, git, etc even when not traveling. I may also be an outlier from the general population. -- Andrew pgp key: 0x74ED336B ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux
Does this have something to do with Pastafarianism? Heh, heh. Your neighbor from the south ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux
On Thu, Aug 4, 2011 at 9:53 PM, Jack Waugh zqrfvbh...@snkmail.com wrote: Does this have something to do with Pastafarianism? Heh, heh. Pirates eat pasta. :P -- Scott Elcomb @psema4 on Twitter / Identi.ca Atomic OS: Self Contained Microsystems http://code.google.com/p/atomos/ Member of the Pirate Party of Canada http://www.pirateparty.ca/ ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux
Sorry forgot to answer your first question. The sources are mostly taken from already quite trusted sources and can be verified by PGP signatures. You can also read the sources and since they get compiled on your computer, you know that what you read is what you get. Also, other people can read the sources and give reviews and you will know that those reviews actually correspond to what is running on your system. On Thu, Aug 4, 2011 at 10:18 PM, AK aka...@gmail.com wrote: I know, you still have to trust the standard Ubuntu programs such as gcc firefox. But, you already made the decision to trust those when you installed Ubuntu. The piratepack doesn't force you to trust any new repositories. On Thu, Aug 4, 2011 at 9:54 PM, Ted Smith ted...@gmail.com wrote: On Thu, 2011-08-04 at 19:44 -0600, AK wrote: - No need to trust nonstandard binary executables. Polipo, tor, vidalia, piratepack binaries are automatically compiled from source on installation. How do I know that the sources are trustworthy? Or that the programs used to compile (or verify their trustworthyness) are trustworthy? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk