Re: [Tails-dev] uVirtus design

Delete this message

Reply to this message
Author: Dlshad Othman
Date:  
To: intrigeri
CC: The Tails public development discussion list
New-Topics: Re: [Tails-dev] uVirtus design
Subject: Re: [Tails-dev] uVirtus design
Thanks for your reply
It's great point, we'll work on Firefox add-on to show a notification about that.

Best
----- Original Message -----
From: intrigeri <intrigeri@???>
To: Dlshad Othman <dlshad@???>
Cc: The Tails public development discussion list <tails-dev@???>
Sent: Thu, 17 Oct 2013 06:09:24 -0400 (EDT)
Subject: Re: [Tails-dev] uVirtus design

Hi,

Dlshad Othman wrote (16 Oct 2013 20:29:52 GMT) :
> I'll answer each question


Great :)

> intrigeri wrote (08 Oct 2013 10:32:18 GMT) :
>>> On 09/13/2013 11:15 AM, intrigeri wrote:
>>>> What kind of adversary is the anonymity meant to be strong against?


>>>I've eventually found time to test uVirtus 2.0.


>>>As far as I can tell, the default web browser goes out in the clear,
>>>without any anonymity whatsoever (neither VPN nor Tor): I see no route
>>>by the one through my local router, and the firewall's filter and nat
>>>tables are empty. Same for DNS resolution, that goes through the
>>>OpenDNS open resolvers.


>>>Is it on purpose? I'm worried that users may think otherwise, after
>>>reading the webpage, and then put themselves at risk. What do
>>>you think?


> Are you sure? have you tried Sanctuary VPN on the Desktop?


By "the default web browser", I meant the one I get if I simply boot
uVirtus and double-click the "Internet" launcher on the desktop,
without further operation from my part. Once I manually start the VPN,
then yes, web browsing flows through it.

Perhaps the web homepage should make it clear that the announced
security features are held only after some manual steps are taken?

Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc