Using sed/awk/etc. for website transformation sounds very silly. Your
scripts will turn completely unwieldy as soon as you try to do something
non-trivial.
You can do much more, much easier by using your own self-served javascript.
And you don't need to install extra addons like Greasemonkey
> Hi,
>
> Today I got an idea of how to measure "The CloudFlare problem". It turns
> out that every time you visit a website that's behind CloudFlare a
> cookie is set with the name __cfduid
>
> If you use Firefox these cookies end up in a SQLite database which can
> be queried with the SQLite
> Hi,
>
> When I start Tor Browser it displays a message that it is establishing
> a connection to Tor network.
>
> After that I can request "Check for Tor Browser update ..." from
> Torbutton or from menu Help - About Tor Browser display and eventually
> obtain it without "Test Tor Network
> Please see below for a couple of questions. Thanks for your input.
>
>> Sigaint.org is an excellent option. Their onion mailservers peer with
>> some of the other onion mailservers. And they have a clearnet gateway,
>> unlike many of the other other onion mailservers. But users can only
>>
> cyber
> survival
> darkness, darknet, dark web, "hidden in the dark"
> useful analogy for explaining onion services: Alice buys drugs from Bob
> "research": grab a bunch of hidden addresses from ahmia and other indexes
> our "research" shows how onion services are used in practice
>
> The traditional answer, which amazingly nobody has mentioned in this
> thread, is called the PGP web of trust.
This is not just the "traditional" answer, it's the only proper answer.
For the uneducated reducing OpenPGP's WoT to WebPKI: you are lame.
Also worth mentioning: Ian Goldberg's
> [trim]
> It seems that automatic updating is now the default.
Automatic updates have been on by default since 5.0:
https://blog.torproject.org/blog/tor-browser-50-released
> That's a good idea. Consider the Freedom Hosting exploits. I can't say that I
> trust the MAR update protocol as much as
> On 02/08/2016 01:36 AM, Georg Koppen wrote:
>
>> Mirimir:
>>
>>> When automatically updating, does Tor browser check GPG signatures of
>>> downloaded updates before installing them?
>>
>> The update files are not using GPG signatures (see:
>> https://wiki.mozilla.org/Software_Update:MAR for
> I would
> like to know if Tor Browser 5.5.1 is vulnerable. Thanks
Looks like it is:
https://gitweb.torproject.org/builders/tor-browser-bundle.git/commit/?id=7a36dbece35a307675f396a019dccf6e431efb44
That build corresponds to a branch which includes the commit that
supposedly fixed bug 1246093,
> It would be harder for that analysis to succeed against networks
> that filled between all the nodes with fill traffic when unused and
> not needed for user traffic. (And in the sense of Tor, between clients
> and some number of guards). But that's hard to design so that it
> is functional. And
Hi, I like your idea but have some criticism to make regarding what you
consider users of the Tor network.
> That way a normal web client, normally browsing a website, would not be
> impacted from end-user experience, but any automated system (the ones causing
> problems to Cloudflare)
Why can't
Anybody care to make a peer-reviewed guide of how to check the
extensions for leaks, cheats and other dirty tricks?
I would say use the source, Lara.
It's problematic, of course, since it requires an expert not only on
programming, networking, privacy and security but also on Mozilla's
Crappy design and wild adverts seem to be the norm on the Web. So
Firefox Reader comes as a pretty useful app/extension/whatever they
might call it.
But I see it is disabled in TBB5. Can anyone shed some light why?
I'd like to know as well. All I could find in trac was this:
This will upgrade the Linux x64 version from 4.5.3 to 5.0. To apply:
$ cd /path/to/tor-stuff
$ rm -rf outside.old; mv outside outside.old; mkdir outside
$ cp [.mar file] outside/update.mar
$ cd [tor-browser directory]
$ cp updater ../../outside
$ ../../outside/updater ../../outside . .
ncl
mtsio:
If you to Preferences-Applications-Portable Document Format there
is the option 'Preview in Tor Browser' that opens the PDF without
opening an external application. What's the problem with that?
Well, Mozilla announced a secadv for pdf.js recently, so there's that.
Hi guys.
I posted this as a comment in the blog a few days ago, with no answer so
far.
I've been experimenting with manual incremental updates and noticed that
the mar-tools-linux64.zip file in the distribution directory changes
between Tor Browser releases (the executables inside the archive
16 matches
Mail list logo