Recent comments on posts in the blog:
The Tor Browser Bundle is the current recommended way to browse the web through Tor. Even without knowning the client's IP address, web browsers are highly fingerprintable. The Tor Browser contains several modifications to Firefox that will help with fingerprinting issues.
I know it's not packaged in Debian but releases are signed by Erinn's key which is in the Debian keyring and getting the Tor Browser Bundle running is about unpacking a tarball and running a shell script.
Also the new torsocks, currently in experimental, have several protections against application leaks and works fine with several RSS readers or GnuPG.
The Tor/Privacy option of Pidgin was added in order to prevent DNS leaks and should be
used. The proxy host should be set to
127.0.0.1 and not
Using Tor to login to services that identify you defeats the purpose of Tor.
It does not defend the purpose of Tor. It might be a problem in your threat model but not in the one of others. One of Tor properties is that it hides the client's network location. Even if I login to my bank, why should they incidentally learn about my travels? Where I currently am is none of their business.
Please use parcimonie for OpenPGP keyring refreshes since that is much more fire-and-forget and also results in less correlation between the different keys you are fetching.
Hi, First of all thanks for this info. This is very helpful to start gerrit setup. I completed my gerrit setup based on this, but I wonder how to create GerritSiteHeader.html and GerritSiteFooter.html files. Do you have any sample format for these files so that I can just change color/logo/names etc.