His subj. said java script, but in the message he said Java. Not many,
if any web mails REQUIRE java. But many sites, incl. many web mails
need js - at least to login. You might be able to get around w/o js,
once logged in.
There's no way around not using js, on some sites, if you want it to
Java or JavaScript?
Do not use email service that requires plugins such as Java.
On Jan 14, 2013 7:26 PM, wrote:
> In trying to access an email, web based, the service said that java has
> to be enabled.
>
> What's the best course of action here?
>
> Will enabling java create an IP leak or in so
In trying to access an email, web based, the service said that java has
to be enabled.
What's the best course of action here?
Will enabling java create an IP leak or in some way defeat the purpose
of using Tor to access the mail?
Does Tor browser bundle even have the ability to use java?
.
--
On Tue, Jan 15, 2013 at 12:41 AM, Roger Dingledine wrote:
> See
> https://trac.torproject.org/projects/tor/wiki/doc/Torouter
> http://freedomboxfoundation.org/
As usual, one guy who knows what he is doing does something better and
faster, without funding, than yet another endless “collaborative”
Tor 0.2.4.8-alpha introduces directory guards to reduce user enumeration
risks, adds a new stronger and faster circuit handshake, and offers
stronger and faster link encryption when both sides support it.
https://www.torproject.org/download
Changes in version 0.2.4.8-alpha - 2013-01-14
o Major
There are a number of ways to make a public key with no corresponding
private key which is verifiable. For instance, you could hash the lastest
block in the blockchain to deterministically generate a verifiable random
string. However, the sending coins to an irretrievable address has already
been d
On Mon, Jan 14, 2013 at 11:23:17PM +0100, Morgan Andreasson wrote:
> *The TorBox*
First thought: we try not to mash the word 'Tor' together with generic
other words:
https://www.torproject.org/docs/trademark-faq#combining
See e.g. a previous TorBOX:
http://sourceforge.net/projects/torbox/
> *What
It's true that you don't really need a nym authority of the normal kind
(like a certificate authority). All the nym authority really needs to do is
accept payment and then redistribute the payments randomly and in a
dispersed fashion, for instance to miners as you prefer. The record in the
bitcoin
> With sacrifices, you are giving up those funds forever. You can't
> get them back and put them towards a new nym when you decide
> it's time to expire the old one.
That's rather the point - you have to impose some cost to getting blacklisted.
> There is I think no such thing.
Good luck finding
There may be some undesirables to solve here...
With sacrifices, you are giving up those funds forever. You can't
get them back and put them towards a new nym when you decide
it's time to expire the old one. You are in effect paying for an account,
just not necessarily to the account provider. A p
> I like the idea of using transaction fees as proof of sacrifice because
> they are randomly assigned to miners. The nym authority could just watch
> the transactions and would have no economic stake.
I don't think you even need a nym authority. All the proof of
sacrifice you need can be represen
I'm not going to do things on an individual account level, sorry. I can't
even do what you're asking short of editing the source code, which
obviously isn't going to happen.
Re: are users who never click ads worth it. Well, there's a non-trivial
number of Google users who have never clicked an ad
>> we should regard bitcoin as no
>> different from the traditional banking system in terms of transaction
>> privacy for the *average* user.
Yes, it's very difficult to use it safely anonymously.
I tried to grasp it. Here is my summary (a tiny bit Whonix specific but I
guess replacing the terms
Hi!
Mike Hearn, in meanwhile could you please manually verify account names,
which can provide proof for spam free behavior under a pseudonym?
I hereby apply for a Google account (without any phone verification). This
pseudonym is dedicated to Whonix (http://whonix.sf.net/) development and
no spa
I like where you're going with this, Mike Hearn. I've been working on a
similar scheme in which instead of providing a proof of work you provide a
proof of sacrifice of monetary value. My simplest plan is that give a nym
authority a payment in exchange for a new nym. However, this requires
trusting
Feel free to CC me on such discussions, if you like. Google isn't
against Tor. We just wrestle with the same abuse issues every other
provider does.
As Mike Perry notes, targeted advertising doesn't actually know or
care about your real identity. It just wants to know that user 1234 is
more likely
16 matches
Mail list logo