[Tails-dev] Cryptostorm Integration For TAILS?

2015-07-03 Thread Dr. Killswitch, D.V.M.
Hello, This message is a companion to ones that were posted for Qubes and Whonix as well as TAILS. A recent study has revealed 14 of the top VPN providers are vulnerable to leaks via IPv6 as well as DNS. http://www.engadget.com/2015/06/30/vpns-leak-your-information/ Cryptostorm has been resea

[Tails-dev] monthly meeting

2015-07-03 Thread BitingBird
oftc was not cooperating tonight, so we didn't have the meeting. Let's have it monday 6th evening, if that's ok with others ? Cheers ! BitingBird ___ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe f

Re: [Tails-dev] ISO verification [Was: [RFC] UX for ISO verification + Tails Installer + full upgrades]

2015-07-03 Thread sajolida
intrigeri: > sajolida wrote (04 Mar 2015 17:43:01 GMT) : >> intrigeri: Allow users who are downloading using BitTorrent to do the same level of verification as people downloading through their browser. >>> >>> IMO that could be demoted to a "bonus" goal, if time resources become >>> scarc

Re: [Tails-dev] RFC: persistent Tor state

2015-07-03 Thread sajolida
intrigeri: > anonym wrote (16 Jun 2015 13:11:44 GMT) : >> On 05/21/2015 05:38 PM, sajolida wrote: >>> So would it then make sense to hash: >>> >>> hash(Tails device secret, N bits of gateway MAC, SSID) >>> >>> Of course, I'm simplifying here to Wi-Fi only as there is no notion of >>> SSID with wire