[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] TorBirdy 0.1.1 released - Our second beta release!



Greetings from the Boston 2013 Tor developer hack day!

TorBirdy 0.1.1 is now out; we think it is the the best release so far
and we encourage you to upgrade.

This release is the second in our beta series.

It's still experimental - of course. Use at your own risk and especially
if you're using it with Enigmail and GnuPG without a local[0] HTTP proxy.

We've continued with updating the web page to show some TorBirdy screen
shots:

 https://github.com/ioerror/torbirdy/wiki/Screen-shots

Call for help:

We're looking for assistance with Translations - if you'd like to
translate TorBirdy, we'd gladly accept a patch that prepares TorBirdy
for translation work. We now have an amazing number of translations!
Even if you can't help translate, we'd love to know what languages
matter to you or your friends - please let us know?

We're especially looking for translations of TorBirdy into
Persian - if you'd like to help us translate, please contact us!

Release Highlights:

0.1.1, 20 Mar 2013
  Add a dialog for new users that is shown during the first-run
   (closes #8238)
  Do not confirm before sending an email if Enigmail is enabled; default
    behavior changed from 0.1.0 (user opt-in allowed through the
    preferences)
  Restore all account settings that were changed on uninstall
  Allow the user to use Thunderbird's automatic configuration wizard in
    case they don't want to use our manual account configuration wizard
  Set the SOCKS port to 9150 to reflect the change in the latest TBB
  Add opt-out from TLS-specific settings (closes #8420)
  Allow additional keyservers to be used/changed (closes #8332)
  Add Korean translation (thanks to cwt96)
  Add Norwegian BokmÃl translation (thanks to lateralus)
  Add Galician translation (thanks to tombouzada)

General content anonymity caution note:

TorBirdy has known leaks in the Message-ID and in the Date header, we're
working on merging an upstream patch that will allow these leaks to be
closed. There are no known proxy leaks unless you use additional
extensions that do not respect the proxy settings of Thunderbird. If you
use GnuPG and Enigmail, we encourage you to use it with a local HTTP
proxy due to the issues mentioned[0] regarding GnuPG.

Here's the wiki page for TorBirdy:

  https://trac.torproject.org/projects/tor/wiki/torbirdy

Here's the latest XPI for TorBirdy:

  https://www.torproject.org/dist/torbirdy/torbirdy-0.1.1.xpi

Here is a proper GPG signature for the latest XPI:

  https://www.torproject.org/dist/torbirdy/torbirdy-0.1.1.xpi.asc

Here is the sha1sum of torbirdy-0.1.1.xpi:

  6ccfe90fcc1abc446b2734c41794d7af55eaf58f

The GnuPG signature that signed this email is also the same key that
signs the TorBirdy releases. To learn more about signature verification
of Tor Project related software such as TorBirdy please visit this page:

  https://www.torproject.org/docs/verifying-signatures.html

The plugin on AMO has been preliminarily reviewed and we are still in
the review process. It is again possible (Hooray!) to install TorBirdy
directly from Thunderbird or by downloading the extension in a web
browser from Mozilla's website:

  https://addons.mozilla.org/en-US/thunderbird/addon/torbirdy/

We believe that users who installed previous versions from Mozilla's
addons site should receive this update automatically. It may take some
time before Mozilla approves this update but it should eventually show
up as an available update.

We now upload a full XPI and GnuPG signature for every new release to
the Tor Project's web servers:

  https://www.torproject.org/dist/torbirdy/

All the best,
Jacob

[0] https://trac.torproject.org/projects/tor/ticket/2846

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk