Hello,
The topic of routing pluggable transports through other proxys (SOCKS
and HTTP CONNECT) has come up a few times recent, both as bug reports
from users and as something that probably should be done to round out
the pluggable transport concept since they will be included in the
browser bundle
On Thu, Apr 10, 2014 at 3:48 PM, Virgil Griffith wrote:
> www.hola.org
> First impression it looks they aim to do the same things Tor does.
Not even close. It's closed source, windows/phone only, free/payware,
no whitepapers, etc. If you want to know if someone's eval'd Hola,
ask Hola. If you wan
www.hola.org
First impression it looks they aim to do the same things Tor does.
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Tue, Apr 08, 2014 at 11:29:25PM -0700, David Fifield wrote:
> We talked a while ago about using a browser extension to make HTTPS
> requests on behalf of a pluggable transport, so that the TLS doesn't
> stand out as unusual (#11183). I have that working pretty well and you
> can try it out. Usin
On Wed, Apr 9, 2014 at 12:17 PM, David Fifield wrote:
>> $ iceweasel -no-remote -p testing -chrome http://localhost:
>
> That's an interesting idea. I didn't know about the -chrome option.
> https://developer.mozilla.org/en-US/docs/Mozilla/Command_Line_Options#Chrome
I was looking into drivin
Filename: xxx-kill-named-flag.txt
Title: Stop assigning (and eventually supporting) the Named flag
Authors: Sebastian Hahnn
Created: 10 April 2014
Target: 0.2.5
Status: Draft
1. Intro and motivation
Currently, Tor supports the c