questioned, was the only one who actually read and responded to what I
said. On reading his answer, I suggested that he consider GnuPG or PGP,
in lieu of or together with Tor, as a possibly better means of
accomplishing his specific purposes.
George Shaffer
--
Get my GnuPG public key from http
.
If there is anyone who has solved this problem on a similar **Linux**
system, I'd like to know how.
Thank you,
George Shaffer
On Wed, 2007-01-03 at 08:51, Michael Holstein wrote:
It's easy.
Start your first instance of firefox as usual. Start the second one like
this : /path/to/firefox
windows were already open. I'm not
aware any other related boxes, not on the dialog itself, but if there is
one that could be the problem.
George Shaffer
~Mike.
George Shaffer wrote:
It may be easy on your system but not mine. I've read this works on
Windows. My experience is that it does
and I am new at Tor this seems
to be a good place to start and look for extra information.
It is. Since I've been reading this list I've learned a lot about
anonymity and privacy that go beyond pure Tor issues.
George Shaffer
--
Get my GnuPG public key from http://geodsoft.com/about/ or
use
in such a case, than trying to trace Tor's routing.
George Shaffer
--
Get my GnuPG public key from http://geodsoft.com/about/ or
use gpg --keyserver subkeys.pgp.net --recv-key A1A23194
signature.asc
Description: This is a digitally signed message part
/
It is a better text only browser than Lynx. I always use it when
searching things on the web.
Fast (even faster with keyboard), reliable and secure!
/K
---
George Shaffer skrev:
On Mon, 2006-10-30 at 21:46, Tim McCormack wrote:
Chris Willis wrote:
NO browser (cept maybe a text
Sorry, the following was meant to be private. I thought I'd replaced
[EMAIL PROTECTED] with the author's email but realized too late that
I had not.
On Tue, 2006-10-31 at 21:05, George Shaffer wrote:
Learn to read the whole thread before posting. I discussed links and
said it was better than
the first
to [EMAIL PROTECTED] I wonder if it is pure coincidence that two people on
this list got the same phishing emails. Did anyone else get these?
George Shaffer
Fabian, there is no point in any further response to most of what you
are saying. We seem to be going in circles.
On Mon, 2006-10-23 at 08:22, Fabian Keil wrote:
George Shaffer [EMAIL PROTECTED] wrote:
The risks of JavaScript, Flash and friends are mentioned
several times in the docs
On Fri, 2006-10-20 at 09:53, Fabian Keil wrote:
George Shaffer [EMAIL PROTECTED] wrote:
On Wed, 2006-10-18 at 12:47, Fabian Keil wrote:
. . . They aren't attacking Tor, but misconfigured applications
behind the Tor client.
Which they said quite clearly in different words: Clearly
On Sat, 07 Oct 2006 Total Privacy replied to George Shaffer:
As for the DNS leaks, I think more is being made of this than it
Was´nt this solved several months ago, in Torpark (Windows)?
I have no idea, but even if it was, it doesn't mean it's solved in
Tor. If so, their solution may
does not look like a simple task. I'm reluctant to do more of these
scans because they are an unauthorized port scan against the exit node.
If however I see another of the strange pages discussed in this thread I
will try to capture the page and then quickly do a scan.
George Shaffer
, a product like this could increase your total consumed
bandwidth by 2 to 10 times.
Please reconsider using Fasterfox, or any prefetching product, on the
Tor network.
George Shaffer
out
Tor in a year or two when it should be easier to use and more robust. It
looks like a potentially better solution that any of the commercial
privacy services.
George Shaffer
14 matches
Mail list logo