new 4 word passphrase is generated and recorded by the
> user. If three entry guards are used then a 12 word phrase would be output
> where each four words would represent a bridge.
Nice try, but (a) that doesn't store enough information about each
guard, and (b) users will not cooperat
the 0.4.3 tarball are in the 2.x
repository (as of commit 23c787c4dd3c52f912a7e910db1aab7db423eb7f).
Robert Ransom
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
On 1/10/13, Abel Luck wrote:
> Robert Ransom:
>> On 1/9/13, intrigeri wrote:
>>> Hi,
>>>
>>> please review & merge feature/install-password-manager.
>>> ticket: todo/install_password_manager
>>> candidate for 0.17
>>
>&g
On 1/9/13, Robert Ransom wrote:
> * The icons in share/keepassx/icons/ appear to be from the Oxygen
> theme, and appear to be missing both their copyright and license
> information (Oxygen is LGPL) and their preferred form for modification
> (especially clientic.png).
Some of t
fake RNGs. (It encrypts the whole file
using a block cipher in CBC mode with a random IV and mediocre
integrity protection.)
The other password managers you've considered are probably at least as
bad as this one.
Robert Ransom
___
tails-dev mai
On 11/26/12, anonym wrote:
> Note: You can't change anything about "Log" lines in torrc via the
> control port. Otherwise that'd be the easy way out.
SETCONF Log="info file /var/log/tor/info" Log="noti
>> I'm not sure what phrasing could be better, not too complicated,
>> while less wrong.
>
> Yes. That's no good, indeed. I'm changing it to "Encrypt and sign text
> using public-key encryption".
s/encryption/cryptography/
(Signing
to OSX)
This patch appears to be required on all OSes.
Robert Ransom
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
On 9/3/12, adrelanos wrote:
> Nick Mathewson:
>> Failing that, torsocks is indeed a way pretty good option.
> I don't think so. It's only a hack. Doesn't work on Windows.
APT doesn't work on Windows either.
Robert Ransom
__
d by default (but for the web browser)” meant.)
Robert Ransom
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
routing to
> be an actual hole in Tails. There is not a compelling reason for
> allowing all RFC1918 space given our findings.
Where does the paper state and/or explain these things?
Robert Ransom
___
tails-dev mailing list
tails-dev@boum.org
htt
re_stable_WhisperBack_SMTP_relay/ :
If all else fails, you could consider using Mixminion to try to send a
bug report. (This would require some testing to determine whether it
is reliable enough to be worth providing the option.) Also, you could
consider asking Tor Project, Inc. to
big to me compared to the
> added complexity. What do you think?
It turned out to be under-engineered -- see above.
Robert Ransom
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
On 2012-04-24, intrigeri wrote:
> Robert Ransom wrote (24 Apr 2012 13:56:55 GMT) :
>> I have no idea how to detect this event or act on it (other than by
>> monitoring klogd's output, which is a yucky flaky hack).
>
> Does "udevadm monitor" see any event?
any others. Note that this memory card reader also
detects when a memory card is inserted into it.
I have no idea how to detect this event or act on it (other than by
monitoring klogd's output, which is a yucky flaky hack). It is not
detected as the removal of a USB device; only as a change in
have bugs. Sandboxing
it is a complete waste of time.
Robert Ransom
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
erifying a signature containing a
keyserver URL).
The consequences of GPG being compromised are so severe that I don't
see a benefit in trying to protect the surrounding system from a
compromised GPG process.
Robert Ransom
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
vices and/or software configuration and to other
previously published files which contain ‘personally identifying
information’ or intact metadata.)
Robert Ransom
signature.asc
Description: PGP signature
___
tails-dev mailing list
tails-dev@boum.org
https://boum.org/mailman/listinfo/tails-dev
18 matches
Mail list logo