Hi,
If below info are irrelevant or already discussed or old, then sorry to
post it here.
Are these being already done/added for Torbutton-birdy ?
pref.js file is inside below folder/directory :
PortableApps\ThunderbirdPortable\App\DefaultData\profile\
Before starting Thunderbird-Portable for
On 5/13/2012 11:57 AM, Aaron Whiteman wrote:
Hi,
Further to yesterday's e-mail, here are some detailed logs which explain my
problem.
Is the problem circuit_build_times_set_timeout_worker(): and, if so, how to
deal with it.
The logs below should a non-VPN connection (connection via a VPN
Hi all,
I'd like to announce that the Tor iOS repository is back online!
TL;DR is just a two step solution:
1) If you still have the old repository installed, remove the Sid77's Source
package, otherwise skip to step 2
2) Use Cydia to add a new repository and write or paste this url:
Is there any anonymity / fingerprinting issue(s) w/ extension shipped w/
TBB auto updating during a Tor session?
Default setting in TBB in Addons Extension under drop box, Update
Add-ons Automatically is checked.
Do No Script, HTTPS Everywhere, TorButton automatically update when the
The short answer is Yes, we've looked into it. New Identity removes
evercookies.
The long answer is
https://www.torproject.org/projects/torbrowser/design/#new-identity and
https://www.torproject.org/projects/torbrowser/design/#identifier-linkability
The footnote is Please help us test this shit
OK, this sort of thing has me wondering if the only way to safely use tor is in
a virtual machine. Would this not seem to be the case? Who cares if Hulu or
Youtube gets your IP address if it is a bogus VM IP address rather than your
real one? They get to see either your tor IP or the IP of
We're not aware of any fingerprinting or anonymity issues, so long as
you keep the same set of addons in TBB and do not install extras.
The updates are authenticated over SSL.
However, we want to ween ourselves off of our dependence upon the CA
model for authenticating these updates:
Hi,
/* instead of sending/leaking your local ip-address, add a word like
mailproxy in helo/ehlo field */
user_pref(mail.smtpserver.default.hello_argument, mailproxy);
Done.
/* when portable-thunderbird runs first time, then allow/partially-force
to go via Tor-proxy. The Polipo will be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Is there any anonymity / fingerprinting issue(s) w/ extension
shipped w/ TBB auto updating during a Tor session?
Default setting in TBB in Addons Extension under drop box,
Update Add-ons Automatically is checked.
Do No Script, HTTPS
Hi Joe,
Great questions. I was also wondering how these claims on the New Identity
button works in this case.
If it is the case, which it may be, this seems to or would seem to exceed
my expectations just as it may yours.
On Monday, May 14, 2012, Joe Btfsplk wrote:
On 5/14/2012 1:56 PM,
Let's continue speculating instead of reading any documentation.
That's totally a productive use of everyone's time.
https://www.torproject.org/projects/torbrowser/design/#new-identity
https://www.torproject.org/projects/torbrowser/design/#identifier-linkability
Thus spake Matthew Kaufman
Thus spake Joe Btfsplk (joebtfs...@gmx.com):
How, pray tell, does clicking New Identity remove evercookies from
12 - 15 possible locations? The cache isn't the only place
evercookies can be stored. How does it remove ANY cookies at all?
Does that necessarily clear LSOs, clear different
Thus spake Mike Perry (mikepe...@torproject.org):
Thus spake Joe Btfsplk (joebtfs...@gmx.com):
How, pray tell, does clicking New Identity remove evercookies from
12 - 15 possible locations? The cache isn't the only place
evercookies can be stored. How does it remove ANY cookies at all?
Thus spake Joe Btfsplk (joebtfs...@gmx.com):
On 5/14/2012 1:56 PM, Mike Perry wrote:
The short answer is Yes, we've looked into it. New Identity removes
evercookies
The footnote is Please help us test this shit in new releases. We just
had a race condition on the cache that allowed
On 10 May 2012 02:38, and...@torproject.is wrote:
I thought this was more accessible to the non-technical crowd.
http://www.this-is-maral.com/the-iranian-internet/-info-graphic
A script-free version would be great.
___
tor-talk mailing list
On 30 April 2012 12:11, and...@torproject.is wrote:
On Mon, Apr 30, 2012 at 02:01:36AM +, crowma...@tormail.org wrote 1.8K
bytes in 49 lines about:
: i don't wan't these messages anymore thank you
Then unsubscribe, the link is at the bottom of every single message to the
list.
On 5/14/2012 3:52 PM, Mike Perry wrote:
Let's continue speculating instead of reading any documentation.
That's totally a productive use of everyone's time.
https://www.torproject.org/projects/torbrowser/design/#new-identity
17 matches
Mail list logo