[tor-bugs] #31283 [UX]: O3.2 - Design the flow of how our users can bypass the scenarios of O3.1.

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu May 28 16:51:43 UTC 2020


#31283: O3.2 - Design the flow of how our users can bypass the scenarios of O3.1.
---------------------+--------------------------------
 Reporter:  gaba     |          Owner:  antonela
     Type:  project  |         Status:  new
 Priority:  Medium   |      Milestone:
Component:  UX       |        Version:
 Severity:  Normal   |     Resolution:
 Keywords:           |  Actual Points:
Parent ID:  #31269   |         Points:
 Reviewer:           |        Sponsor:  Sponsor30-must
---------------------+--------------------------------

Comment (by antonela):

 Some old notes about Tor Launcher
 https://www.notion.so/UX-Tor-Launcher-440a8ea87013480f83ecf1de6b87089b

 Some old notes about Get Tor
 https://www.notion.so/AC-Get-Tor-0f5acdab88704a00a5d8917eb8350b24

 EFF Circumvention guide
 https://ssd.eff.org/en/module/understanding-and-circumventing-network-
 censorship

 Tails ft Tor Launcher
 https://tails.boum.org/blueprint/network_connection/
 https://redmine.tails.boum.org/code/issues/8061#note-33

 OONI Net test
 https://github.com/ooni/spec/blob/master/nettests/ts-023-tor.md

 Connecting to random domains at startup is not crazy, or is it?
 https://www.mikewest.org/2012/02/chrome-connects-to-three-random-domains-
 at-startup/

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31283#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list