[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #26761 [Applications/TorBirdy]: Do not use this page! It's heavily outdated. No offense to the author(s). This article was probable written decades ago, where browser fingerprinting wasn't well researched and frequently discussed. You shouldn't add any optimization to the Tor Browser Bundle, because it will let you stand out from the other Tor Browser users. Resulting in being more pseudonymous than anonymous. The page has not been deleted, because wiping knowledge is almost ever a bad idea. It's useful to document the history and perhaps one or another optimization might be proposed for the Tor Browser Bundle. Are you up to it? Hacking Firefox for Maximum Performance with Tor Introduction Tor is known for being secure but slow. If you want to improve browsing speed a bit, please follow the following simple instructions for tweaking the Firefox web browser's settings: Procedure 1 First, open Firefox's advanced settings menu by running about:config from the address bar. Upon entering this address, you will see a long list of internal settings. Modify the following ones and set them to the suggested values shown here for maximum performance: network.http.keep-alive.timeout:600 (300ms default is OK usually, but 600 is better.) network.http.max-persistent-connections-per-proxy:16 (Default is 4) network.http.pipelining:true (Default- false. Some old HTTP/1.0 servers can't handle it.) network.http.pipelining.maxrequests:8 (No default) network.http.proxy.keep-alive:true (Defaul
- To: undisclosed-recipients: ;
- Subject: [tor-bugs] #26761 [Applications/TorBirdy]: Do not use this page! It's heavily outdated. No offense to the author(s). This article was probable written decades ago, where browser fingerprinting wasn't well researched and frequently discussed. You shouldn't add any optimization to the Tor Browser Bundle, because it will let you stand out from the other Tor Browser users. Resulting in being more pseudonymous than anonymous. The page has not been deleted, because wiping knowledge is almost ever a bad idea. It's useful to document the history and perhaps one or another optimization might be proposed for the Tor Browser Bundle. Are you up to it? Hacking Firefox for Maximum Performance with Tor Introduction Tor is known for being secure but slow. If you want to improve browsing speed a bit, please follow the following simple instructions for tweaking the Firefox web browser's settings: Procedure 1 First, open Firefox's advanced settings menu by running about:config from the address bar. Upon entering this address, you will see a long list of internal settings. Modify the following ones and set them to the suggested values shown here for maximum performance: network.http.keep-alive.timeout:600 (300ms default is OK usually, but 600 is better.) network.http.max-persistent-connections-per-proxy:16 (Default is 4) network.http.pipelining:true (Default- false. Some old HTTP/1.0 servers can't handle it.) network.http.pipelining.maxrequests:8 (No default) network.http.proxy.keep-alive:true (Defaul
- From: "Tor Bug Tracker & Wiki" <blackhole@xxxxxxxxxxxxxx>
- Date: Wed, 11 Jul 2018 03:25:14 -0000
- Auto-submitted: auto-generated
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Tue, 10 Jul 2018 23:34:02 -0400
- List-archive: <http://lists.torproject.org/pipermail/tor-bugs/>
- List-help: <mailto:tor-bugs-request@lists.torproject.org?subject=help>
- List-id: "auto: Tor bug tracker status mails" <tor-bugs.lists.torproject.org>
- List-post: <mailto:tor-bugs@lists.torproject.org>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs>, <mailto:tor-bugs-request@lists.torproject.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-bugs>, <mailto:tor-bugs-request@lists.torproject.org?subject=unsubscribe>
- Reply-to: no-reply@xxxxxxxxxxxxxx, tor-assistants@xxxxxxxxxxxxxx
- Sender: "tor-bugs" <tor-bugs-bounces@xxxxxxxxxxxxxxxxxxxx>
#26761: Do not use this page! It's heavily outdated. No offense to the author(s).
This article was probable written decades ago, where browser fingerprinting
wasn't well researched and frequently discussed. You shouldn't add any
optimization to the Tor Browser Bundle, because it will let you stand out
from the other Tor Browser users. Resulting in being more pseudonymous than
anonymous. The page has not been deleted, because wiping knowledge is
almost ever a bad idea. It's useful to document the history and perhaps one
or another optimization might be proposed for the Tor Browser Bundle. Are
you up to it? Hacking Firefox for Maximum Performance with Tor
Introduction Tor is known for being secure but slow. If you want to
improve browsing speed a bit, please follow the following simple
instructions for tweaking the Firefox web browser's settings: Procedure 1
First, open Firefox's advanced settings menu by running about:config from
the address bar. Upon entering this address, you will see a long list of
internal settings. Modify the following ones and set them to the suggested
values shown here for maximum performance: network.http.keep-
alive.timeout:600 (300ms default is OK usually, but 600 is better.)
network.http.max-persistent-connections-per-proxy:16 (Default is 4)
network.http.pipelining:true (Default- false. Some old HTTP/1.0 servers
can't handle it.) network.http.pipelining.maxrequests:8 (No default)
network.http.proxy.keep-alive:true (Defaul
---------------------------------------+---------------------
Reporter: cypherpunks | Owner: sukhbir
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/TorBirdy | Version:
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
---------------------------------------+---------------------
Do not use this page! It's heavily outdated.
No offense to the author(s). This article was probable written decades
ago, where browser fingerprinting wasn't well researched and frequently
discussed. You shouldn't add any optimization to the Tor Browser Bundle,
because it will let you stand out from the other Tor Browser users.
Resulting in being more pseudonymous than anonymous. The page has not been
deleted, because wiping knowledge is almost ever a bad idea. It's useful
to document the history and perhaps one or another optimization might be
proposed for the Tor Browser Bundle. Are you up to it?
Hacking Firefox for Maximum Performance with Tor
Introduction
Tor is known for being secure but slow. If you want to improve browsing
speed a bit, please follow the following simple instructions for tweaking
the Firefox web browser's settings:
Procedure 1
First, open Firefox's advanced settings menu by running about:config from
the address bar. Upon entering this address, you will see a long list of
internal settings. Modify the following ones and set them to the suggested
values shown here for maximum performance:
network.http.keep-alive.timeout:600 (300ms default is OK usually, but 600
is better.)
network.http.max-persistent-connections-per-proxy:16 (Default is 4)
network.http.pipelining:true (Default- false. Some old HTTP/1.0 servers
can't handle it.)
network.http.pipelining.maxrequests:8 (No default)
network.http.proxy.keep-alive:true (Defaul
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26761>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs
- Prev by Author:
Re: [tor-bugs] #26792 [Core Tor/Tor]: tor-0.3.4.5-rc: fails to build when configured with `./configure --disable-unittests`
- Next by Author:
Re: [tor-bugs] #26353 [Applications/Tor Browser]: First request after copying and pasting an URL in URL bar seems to go over the catch-all circuit
- Previous by thread:
[tor-bugs] #26757 [- Select a component]: Liberté Linux, Gentoo-based, lightweight, USB or SD, focus on stealth communication Live CD Best Practices, for users and devs alike Roll your own with Debian Live!, by torrclemeelmo Privatix LiveCD/USB, Debian +
- Next by thread:
[tor-bugs] #26758 [- Select a component]: 12:47 AM Ticket #21044 (ORPort self reachability test happens also when it shouldn't) updated by teor Parent ID changed We should try to fix this issue when we rewrite this subsystem in #24403. 12:47 AM Ticket #10519 (tor uses default IP for dirport instead of the one defined in DirPort) updated by teor Parent ID changed We should try to fix this issue when we rewrite this subsystem in #24403. 12:03 AM Ticket #26641 (problema con l'apertura di siti onion) updated by Dbryrtfbcbhgf Ciao, chiudi TorBrowser ed elimina la cartella TorBrowser-Data e … Jul 4, 2018: 11:59 PM Ticket #26641 (problema con l'apertura di siti onion) updated by Dbryrtfbcbhgf Owner, Priority, Component changed 11:17 PM Ticket #26646 (add support for multiple OutboundBindAddressExit IP(ranges)) created by nusenu tor has support for dedicated outbound IP addresses for on exit relays … 11:03 PM Ticket #26627 (HSv3 throws many "Tried connecting to router at [IP:port], but RSA ...) updated by teor Replying to mahrud: > First, here's some general stats: > … 10:02 PM Ticket #26642 (Give meejah commit access to dirauth-conf git repository) updated by dgoulet Owner, Component changed 8:24 PM Ticket #26146 (Setting `general.useragent.override` does not spoof the platform part ...) updated by cypherpunks By the way let's smash this type of thinking once and for all, "X can … 7:16 PM Ticket #24153 (Make DescriptorCollector resume previously aborted downloads) updated by karsten Status changed 7:16 PM Ticket #24153 (Make DescriptorCollector resume previously aborted downloads) updated by karsten Owner, Status changed I wrote a tiny patch in … 7:13 PM Ticket #26445 (Firefox still crashes like a trash) updated by cypherpunks Replying to cypherpunks: > … 7:11 PM Ticket #26645 (right click does not work on 'insecure connection' web pages) created by mwolfe Some (many?) web pages give the 'insecure connection' message … 6:47 PM org/meetings/2018MexicoCity edited by ln5 (diff) 6:09 PM Ticket #26146 (Setting `general.useragent.override` does not spoof the platform part ...) updated by cypherpunks Replying to cypherpunks: WTF are you doing? Replying to … 5:01 PM Ticket #26615 (Backport uplifted NativeStack.cpp patch) closed by gk fixed: Sounds good. I did the backport actually a bit differently as this … 4:41 PM Ticket #26401 (Rebase Orfox patches onto Tor
- Index(es):