++ 22/05/14 00:32 +0200 - Lunar:
Thanks! Have a look at the result at:
https://people.torproject.org/~lunar/tor-and-https/nl/tor-and-https.svg
Less generic, but a lot shorter and probably better. See attachment.
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T
SecTech:
I want to use my Raspberry as a easy and cheap Tor access. But not to
setup Tor is the problem, to setup the browser in a secure way is the
problem. I had a browser setup before I used TBB and thought I could
setup it for myself.
At first I tried to copy the TBB profile to my
Hello,
The [1] page currently does not mention anything about IPv6 at all; after
following the instructions in it, the bridge only listens on IPv4.
If I add an IPv6 ORPort as described in [2], this does make Tor itself listen
on IPv6, but still the obfsproxy only opens an IPv4 port:
May 22
Jon:
One thought as I played around with it would be to replace ... with
a strike-through of the information that is not available based on the
combination of technologies chosen?
That would be a nice idea to try. Unfortunately, the current Tor Browser
rendering engine does not implement
Rejo Zenger:
++ 22/05/14 00:32 +0200 - Lunar:
Thanks! Have a look at the result at:
https://people.torproject.org/~lunar/tor-and-https/nl/tor-and-https.svg
Less generic, but a lot shorter and probably better. See attachment.
Updated, thanks! :)
--
Lunar
Tanks for the link, but I can't programm a single line code.
Or do I only have to compile the sourcecode on an arm processor?
The other question is: To get a secure browser I need the changed
iceweasel programm, the profile and the extensions?
Maybe there is someone out there that can help me
On 5/22/2014 6:07 AM, Lunar wrote:
Jon:
One thought as I played around with it would be to replace ... with
a strike-through of the information that is not available based on the
combination of technologies chosen?
That would be a nice idea to try. Unfortunately, the current Tor Browser
Greetings,
Turkish translation fie is attached.
~Kus
On 5/22/2014 6:07 AM, Lunar wrote:
Jon:
One thought as I played around with it would be to replace ... with
a strike-through of the information that is not available based on the
combination of technologies chosen?
That would be a nice
Kus:
Turkish translation fie is attached.
Merged. Result is visible at:
https://people.torproject.org/~lunar/tor-and-https/tr/tor-and-https.svg
Thanks!
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
--
tor-talk mailing
I'd like to share the packages you need to install obfsproxy on fedora 20.
yum install make automake gcc python-pip python-devel libyaml-devel
After that you can just
pip install obfsproxy
That's it. I'd be awesome if you could add them to:
On Wed, 14 May 2014 16:52:15 -0600
Mirimir miri...@riseup.net wrote:
On 05/14/2014 04:21 PM, Patrick Schleizer wrote:
Zenaan Harkness:
On the humour front:
Dark net
- Light net
Better.
How about BeyondNet? That's from _Fire Upon the Deep_ by Vernor Vinge
(1991). He called it
k...@mailtor.net:
yum install make automake gcc python-pip python-devel libyaml-devel
Thanks! I made a website commit[0] with your instructions. It should be
reflected on the obfsproxy-instructions page within a day or two.
[0]:
Adafruit has a tutorial https://learn.adafruit.com/onion-pi/overview
on how to make a Onion Pi, that was featured in Make Magazine. (It was
actually my first exposure to Tor.) It works by having a Raspberry Pi
run Tor and broadcast a WiFi signal that uses the Tor connection. Then,
laptops can
13 matches
Mail list logo