hi,
I suspect this might be useful to clean up a bit the scary scripts we
have for the alternate web browsers (I2P, Unsafe).
--- Begin Message ---
Hello List,
for Bug #10399: Tor Browser should be visually distinguished from Firefox to
prevent user error. (e.g. accidentally entering deanonymizi
Hi,
bugfix/8186-pidgin-http-links tweaks the AppArmor profile for Pidgin
to allow it to run Tor Browser (and hence, open links). Tested on top
of current stable branch. Please review'n'merge into stable and
devel.
Starting points for the reviewer:
http://wiki.apparmor.net/index.php/QuickProfil
anonym wrote (30 Oct 2014 16:42:19 GMT) :
> Now commit f18a23a is pushed and also merged into experimental, so this
> branch should truly be ready for review.
Tested the branch once merged into stable, works fine for opening
links from Pidgin (once bugfix/8186-pidgin-http-links is merged on
top),
Hi,
anonym wrote (21 Oct 2014 13:26:46 GMT) :
> This branch fixes bugs #8152 and #8158 and is based on a patch
> contributed by sanic (Thanks again!). Since I had to re-write the patch
> a bit I suppose it should be review'n'merged by someone else, so please
> review'n'merge into stable and devel!
30/10/14 16:50, intrigeri wrote:
> anonym wrote (22 Oct 2014 12:10:59 GMT) :
>> Next up, the preliminary release schedule for the 1.2.1 release
>> candidate, *if* we feel we need one:
>
>> 2014-11-05 Feature freeze
>> 2014-11-12 Tag 1.2.1~rc1 in Git
>>Build and upload 1.2.1
30/10/14 16:34, intrigeri wrote:
> Hi,
>
> intrigeri wrote (30 Oct 2014 13:01:58 GMT) :
>> anonym wrote (30 Oct 2014 11:56:45 GMT) :
>>> See the ticket [1] for details. Please review'n'merge into stable and devel.
>>> [1] https://labs.riseup.net/code/issues/8153
>
>> The ticket reads "This has be
hi,
it seems that the pull request for #8160 ("Torbutton logs browsing
history in ~/.xsession-errors") wasn't sent to this list. I've tested
it, and merged it into stable and devel.
cheers,
--
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
htt
Hi,
anonym wrote (22 Oct 2014 12:10:59 GMT) :
> So, Tails contributors, please let me know which of you are available
> for testing the final image on 2014-11-25 (early CEST)!
I might be able to do a couple hours of testing (early CET) that day,
but no promise.
> Next up, the preliminary release
Hi,
intrigeri wrote (30 Oct 2014 13:01:58 GMT) :
> anonym wrote (30 Oct 2014 11:56:45 GMT) :
>> See the ticket [1] for details. Please review'n'merge into stable and devel.
>> [1] https://labs.riseup.net/code/issues/8153
> The ticket reads "This has been reported to our help desk as affecting
> C
Hi,
anonym wrote (30 Oct 2014 11:56:45 GMT) :
> See the ticket [1] for details. Please review'n'merge into stable and devel.
> [1] https://labs.riseup.net/code/issues/8153
The ticket reads "This has been reported to our help desk as affecting
Claws Mail, and KeePassX amongst others." -- was the f
Hi,
See the ticket [1] for details. Please review'n'merge into stable and devel.
Cheers!
[1] https://labs.riseup.net/code/issues/8153
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this li
cartoon reality wrote:
> wget prior to 1.16 allows for a web server to write arbitrary files on the
> client side.
>
> A Metasploit module is available for testing:
>
> https://github.com/rapid7/metasploit-framework/pull/4088
"when used in recursive (-r) mode with a FTP server as a destination"
12 matches
Mail list logo