Hullo (',')
In light of some fairly recent postings about making it easier to verify
signatures on new Tor downloads,
I was wondering if anyone has any knowledge of a percentage (if there is at
all) of new downloads that are, indeed,
or have been, compromised Tor Browser Bundles?
And
On Mar 19, 2012, at 7:11 PM, clarissabryant wrote:
On Mon, 19 Mar 2012 14:51:17 -, m...@tormail.net wrote:
Wow, Anonymous! Wow, what an amazing, bug.
Drama. Clearly exposing your own browsing on your own file system on your own
computer is a conspiracy of epic proportions. If the
On 20/03/12 06:28, Number Six wrote:
LBE Privacy Guard doesn't have a lot of info about it or any source
code available, and for some reason requests Phone State and Identity
permissions. It could be recording who you call and using it for ad
targeting..
Of course either DroidWall or LBE
On 3/19/2012 1:11 PM, clarissabryant wrote:
On Mon, 19 Mar 2012 14:51:17 -, m...@tormail.net wrote:
Wow, Anonymous! Wow, what an amazing, bug.
Drama. Clearly exposing your own browsing on your own file system on
your own computer is a conspiracy of epic proportions. If the
existence of
On Tue, 20 Mar 2012 06:54:34 +, Joe Btfsplk wrote:
...
clarissab, I can't tell what you meant by Drama.
Could you expand some on the HUGE conspiracy? How would it be
possible for Tor, Firefox Vidalia NOT to talk over localhost? Why is
this a conspiracy?
He thinks doing communication
Here's the app on the google market:
[...etc...]
For someone who isn't affiliated with this piece of closed-source
software (thus, questionable credentials as far as people's privacy is
concerned) you seem pretty determined to shove it down everyone's throat
quite intensely!
Achter Lieber, 20.03.2012 07:46:
I have to use internet cafe computers and cannot install GPG on them to help
me even learn how to verify the sigs,
so all I have available is getting the new version onto a USB and running it
from there with my fingers crossed.
There's GnuPT Portable. It
Hi
Let me apologise at the outset for ignoring the TBB. I plan on doing
so later, but as this is my first experiment with Tor, I would like to
try and educate myself and that means doing things the hard way.
Sadly, the hard way isn't working.
I'm running Ubuntu Maverick with a 2.6.35-32 kernel