![]() ![]() Tor Browser 12.5a7 is now available from the Tor Browser download page and also from our distribution directory. ![]() New Alpha Release: Tor Browser 12.5a7 (Android, Windows, macOS, Linux) It's a major version with a new backup feature in Tails Installer, automatic upgrade of the Persistent Storage to LUKS2, and captive portal detection. Octo– OctoInternet Governance Forum (IGF) 2023 Recent Updates New Release: Tails 5.14 Septem– SeptemThe Global Gathering by Team Community I must have missed it in all of the documentation that I have read, but how do you uninstall the Tor Browser Bundle? Upcoming Events This is asked mostly out of curiosity - this is not a tremendously important issue to me, although I did previously like seeing when my torrc exit node directives were _not_ honored. Settings are "error", "warning", "notice" on "info" and "debug" off, which to my best recall are unchanged through several previous version installations. Having written that, I must ask if there have been any issues reported with the Message Log function as of this version? It seems as if I get a different level of detail (or possibly truncation of reported events at a different point) every time I fire up Tor. Yes, I realize that it is impossible to distinguish from the user side performance improvements resulting from changes to the client from those resulting from network enhancements, but there was a very palpable improvement as soon as I began using the new bundle. It is the most apparently stable and consistent that I have yet used. Overall this version has been very good in my experience. Or any secure generic easy to install and use overlay tunnel for all your traffic to then flow through. SO can You protect the UKs Massive Virgin Media cable userbase traffic being effectively inspected even though OC we cant stop them actually interecpting them If a secure TOR tunnel could be used then many TOR users could potentially benefit from this mass of new VM users upload pipes coming on line, for lots of other TOR and related purposes. ![]() Given many Virgin media users are now on 20/Mbit down, 50Mbit down, and several on the new trials of 50Mbit down, 10Mbit UPload rates it seems that a direct Encrypted tunnel from sime Virgin Media users PC Lans to a selection of dedicated server side web and other servers around the world would be a very good thing to use for Anti Deep Packet interception IF YOU were to be able to protect us from that DPI kit actually looking at and inderstanding and decompiling the packets. Over the past 24 hours I have read a lot of the comments people are posting around the web on this issue and everyone seems to be saying “We will just switch to encryption” and whereas I think that is a good idea and endorse it (this web site has been served over SSL since it was launched), I think more needs to be done. I am not going to get into any of the political or legal stuff in this blog post – I did all that yesterday in preparing the press release issued by Privacy International I just wanted to take a few moments to try and inspire direct action. So yesterday I spent the entire day working on this problem of Virgin Media announcing that they are commencing with a trial of Detica’s Deep Packet Inspection product called CView.īasically, CView will look at the ISP dataflows, detect when p2p technology is being used and then look at the contents of the packets and check them against a database given to them by the RIAA to find out if the data is infringing on copyright. Given that Virgin Media are now in bed with Detica Can YOU protect us from Virgin Media/Detica Deep Packet Interception? and are you already doing so ? ![]()
0 Comments
Leave a Reply. |