[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #31283 [UX]: O3.2 - Design the flow of how our users can bypass the scenarios of O3.1.
#31283: O3.2 - Design the flow of how our users can bypass the scenarios of O3.1.
---------------------+--------------------------------
Reporter: gaba | Owner: antonela
Type: project | Status: new
Priority: Medium | Milestone:
Component: UX | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: #31269 | Points:
Reviewer: | Sponsor: Sponsor30-must
---------------------+--------------------------------
Comment (by antonela):
Some old notes about Tor Launcher
https://www.notion.so/UX-Tor-Launcher-440a8ea87013480f83ecf1de6b87089b
Some old notes about Get Tor
https://www.notion.so/AC-Get-Tor-0f5acdab88704a00a5d8917eb8350b24
EFF Circumvention guide
https://ssd.eff.org/en/module/understanding-and-circumventing-network-
censorship
Tails ft Tor Launcher
https://tails.boum.org/blueprint/network_connection/
https://redmine.tails.boum.org/code/issues/8061#note-33
OONI Net test
https://github.com/ooni/spec/blob/master/nettests/ts-023-tor.md
Connecting to random domains at startup is not crazy, or is it?
https://www.mikewest.org/2012/02/chrome-connects-to-three-random-domains-
at-startup/
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31283#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs