Re: [Tails-dev] Persistent guard nodes on DVD boot

2013-12-03 Thread Robert Ransom
new 4 word passphrase is generated and recorded by the > user. If three entry guards are used then a 12 word phrase would be output > where each four words would represent a bridge. Nice try, but (a) that doesn't store enough information about each guard, and (b) users will not cooperat

Re: [Tails-dev] Bug#698832: keepassx: icons license and copyright information is missing

2013-01-24 Thread Robert Ransom
the 0.4.3 tarball are in the 2.x repository (as of commit 23c787c4dd3c52f912a7e910db1aab7db423eb7f). Robert Ransom ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev

Re: [Tails-dev] Please review & merge feature/install-password-manager

2013-01-10 Thread Robert Ransom
On 1/10/13, Abel Luck wrote: > Robert Ransom: >> On 1/9/13, intrigeri wrote: >>> Hi, >>> >>> please review & merge feature/install-password-manager. >>> ticket: todo/install_password_manager >>> candidate for 0.17 >> >&g

Re: [Tails-dev] Please review & merge feature/install-password-manager

2013-01-09 Thread Robert Ransom
On 1/9/13, Robert Ransom wrote: > * The icons in share/keepassx/icons/ appear to be from the Oxygen > theme, and appear to be missing both their copyright and license > information (Oxygen is LGPL) and their preferred form for modification > (especially clientic.png). Some of t

Re: [Tails-dev] Please review & merge feature/install-password-manager

2013-01-09 Thread Robert Ransom
fake RNGs. (It encrypts the whole file using a block cipher in CBC mode with a random IV and mediocre integrity protection.) The other password managers you've considered are probably at least as bad as this one. Robert Ransom ___ tails-dev mai

Re: [Tails-dev] bridge mode vs. clock way off

2012-11-26 Thread Robert Ransom
On 11/26/12, anonym wrote: > Note: You can't change anything about "Log" lines in torrc via the > control port. Otherwise that'd be the easy way out. SETCONF Log="info file /var/log/tor/info" Log="noti

Re: [Tails-dev] Please review the documentation of gpgApplet

2012-10-09 Thread Robert Ransom
>> I'm not sure what phrasing could be better, not too complicated, >> while less wrong. > > Yes. That's no good, indeed. I'm changing it to "Encrypt and sign text > using public-key encryption". s/encryption/cryptography/ (Signing

Re: [Tails-dev] Iceweasel backports experiments

2012-09-20 Thread Robert Ransom
to OSX) This patch appears to be required on all OSes. Robert Ransom ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev

Re: [Tails-dev] [tor-talk] Please review Tails stream isolation plans

2012-09-03 Thread Robert Ransom
On 9/3/12, adrelanos wrote: > Nick Mathewson: >> Failing that, torsocks is indeed a way pretty good option. > I don't think so. It's only a hack. Doesn't work on Windows. APT doesn't work on Windows either. Robert Ransom __

Re: [Tails-dev] [tor-talk] Please review Tails stream isolation plans

2012-08-28 Thread Robert Ransom
d by default (but for the web browser)” meant.) Robert Ransom ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev

Re: [Tails-dev] vpwns:

2012-08-22 Thread Robert Ransom
routing to > be an actual hole in Tails. There is not a compelling reason for > allowing all RFC1918 space given our findings. Where does the paper state and/or explain these things? Robert Ransom ___ tails-dev mailing list tails-dev@boum.org htt

Re: [Tails-dev] roadmap and broken windows

2012-08-17 Thread Robert Ransom
re_stable_WhisperBack_SMTP_relay/ : If all else fails, you could consider using Mixminion to try to send a bug report. (This would require some testing to determine whether it is reliable enough to be worth providing the option.) Also, you could consider asking Tor Project, Inc. to

Re: [Tails-dev] Incremental upgrades: first draft to review

2012-05-02 Thread Robert Ransom
big to me compared to the > added complexity. What do you think? It turned out to be under-engineered -- see above. Robert Ransom ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev

Re: [Tails-dev] 0.11 testing

2012-04-24 Thread Robert Ransom
On 2012-04-24, intrigeri wrote: > Robert Ransom wrote (24 Apr 2012 13:56:55 GMT) : >> I have no idea how to detect this event or act on it (other than by >> monitoring klogd's output, which is a yucky flaky hack). > > Does "udevadm monitor" see any event?

Re: [Tails-dev] 0.11 testing

2012-04-24 Thread Robert Ransom
any others. Note that this memory card reader also detects when a memory card is inserted into it. I have no idea how to detect this event or act on it (other than by monitoring klogd's output, which is a yucky flaky hack). It is not detected as the removal of a USB device; only as a change in

Re: [Tails-dev] AppArmor profiles in Debian

2012-02-17 Thread Robert Ransom
have bugs. Sandboxing it is a complete waste of time. Robert Ransom ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev

Re: [Tails-dev] AppArmor profiles in Debian

2012-02-16 Thread Robert Ransom
erifying a signature containing a keyserver URL). The consequences of GPG being compromised are so severe that I don't see a benefit in trying to protect the surrounding system from a compromised GPG process. Robert Ransom ___ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev

Re: [T(A)ILS-dev] [tor-assistants] Another GSoC proposal for the meta-data anonymizing toolkit

2011-04-06 Thread Robert Ransom
vices and/or software configuration and to other previously published files which contain ‘personally identifying information’ or intact metadata.) Robert Ransom signature.asc Description: PGP signature ___ tails-dev mailing list tails-dev@boum.org https://boum.org/mailman/listinfo/tails-dev