> There is someone going by the name of perfect-privacy.com who is
> listed in the contact information of roughly 28 relays' descriptors with
> widely varying throughput capacities in the tor directory. These relays'
> descriptors are grouped into quite a few separate Family specifications,
>
> You're right. I was considering addons.mozilla.org as the canonical
> source of the xpi, but still, that can be owned too. In fact, I just
> got a message from them informing me that they modified my torbutton
> 1.2.3 xpi to prevent it from being listed as compatible with FF3.6. So
> they see fit
>> Just as in the Tor repo, I gpg sign the Torbutton git tags. I also gpg
>> sign .xpis, but have been sloppy about posting them publicly.
>
>> For now, I think the right answer is "Fetch it over SSL" or "Check the
>> git/gpg sig".
>
> Could you make a point of publicly posting the .xpi gpg signa
> would it make sense to sign the torbutton xpi's?
Actually, I've always been quite amazed by the fact that TorButton's
.xpi (binary?) files are not signed.
I'd really like to see this implemented in the future.
Thanks,
Paolo
***
Can't reach network-status consensus.
Using tor 0.2.0.32, tork 0.30-1.
--- log sample ---
2008-12-06 05:12:24 NOTICE (1 of 1) I learned some more directory
information, but not enough to build a circuit: We have no
network-status consensus.
2008-12-06 05:13:24 NOTICE (1 of 1) We're missing a c
If I hava a Java program, and I do something like the
following:
Properties systemSettings = System.getProperties();
systemSettings.put("http.proxyHost", "127.0.0.1");
systemSettings.put("http.proxyPort", "8118");
System.setProperties(systemSettings);
I'm not sure if you're actually coding th
Hi!
I submitted my Google Summer of Code application and sent a couple of
mails to [EMAIL PROTECTED], as specified in the wiki page,
but I never heard anything about it since: no comments or feedback.
Just wondering how are things going... :)
Paolo
Let us not be ambigious about the "users" you are talking about. The
specific "users" you are talking about are limited by definition to
only be the ones wanting to modify it to include malware/trojans, or
someone trying to turn it into a commercial application, or an evil
government th
8 matches
Mail list logo