Delivery-Date: Mon, 15 Feb 2016 09:10:24 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 305B11E0AB8;
	Mon, 15 Feb 2016 09:10:23 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 6BF9A38FA1;
	Mon, 15 Feb 2016 14:10:18 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id B004A38E61
 for <tor-talk@lists.torproject.org>; Mon, 15 Feb 2016 14:10:15 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id drQRdqrZJ5_G for <tor-talk@lists.torproject.org>;
 Mon, 15 Feb 2016 14:10:15 +0000 (UTC)
Received: from contumacia.investici.org (contumacia.investici.org
 [IPv6:2002:b2ff:9023::1])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "smtp.autistici.org",
 Issuer "Autistici/Inventati Certification Authority" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 8094F38C2B
 for <tor-talk@lists.torproject.org>; Mon, 15 Feb 2016 14:10:15 +0000 (UTC)
Received: from [178.255.144.35] (contumacia [178.255.144.35]) (Authenticated
 sender: rizzo@cryptolab.net) by localhost (Postfix) with ESMTPSA id
 0598F200B17
 for <tor-talk@lists.torproject.org>; Mon, 15 Feb 2016 14:10:04 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cryptolab.net;
 s=stigmate; t=1455545410;
 bh=T880/aQbdwVpL8JeJNkQZ0Yr4ZuLCw6wRJyr/Gu7FwQ=;
 h=Subject:To:References:From:Date:In-Reply-To;
 b=E/j3Hno5GXdffTvlfURV3tN6YKejXt7JXr5nIafUBaUVtUd/U0F60BnlQZ6PtPHnp
 BR6A6dN94akEXlV3/1akqsynRfz68o5b6J/MtdSD8vJrqKhW5oXZuEcdnFfBWrlSAE
 Vwda4KGrttGjg93vRCraaW5j9Nm51I8aZ/NH2ToY=
To: tor-talk@lists.torproject.org
References: <56C19B6D.7020401@cryptolab.net>
 <d6a5128af9f790a3fa6bfd2a85d0c54e@cryptolab.net>
From: rizzo <rizzo@cryptolab.net>
X-Enigmail-Draft-Status: N1110
Message-ID: <56C1DC2C.7050903@cryptolab.net>
Date: Mon, 15 Feb 2016 14:09:48 +0000
MIME-Version: 1.0
In-Reply-To: <d6a5128af9f790a3fa6bfd2a85d0c54e@cryptolab.net>
Subject: Re: [tor-talk] Easier download via email?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Hi Griffin,

Thanks for the info on Satori and confirming that GetTor is still
relying on Dropbox. Satori is a great idea, though many Android
devices in China, for example, don't come with Google Play anymore,
because so many Google services are blocked anyway. Maybe additionally
put it on F-Droid? I think the concept is great and useful in a range
of cases, especially if Bittorrent is an option. I think Amazon S3
often works in China, though not always.

To detect which way of connecting to the Tor networks works best from
a certain location, we could run Tor on virtual machines in censored
countries, and these installations could report back which method
works best. Volunteer reporters would be another option, but automatic
it would be nice.

Other ideas?

Though the installation of Tor has come a long way and is much easier
with the TorBrowser bundle, I think in heavily censored environments
that require manually choosing a connection method, we still loose a
good share of people who are overwhelmed with these very technical
options.

- -- 
rizzo
-----BEGIN PGP SIGNATURE-----
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=5uUi
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

