I couldn’t agree more! Integrating those relatively independent modules together seems not to be a low-coupling design. (Btw, Tor-launcher is also a victim of high-coupling design.)
The following is the archives of your and my replies to this problem:
Very relaxed posting policy. Just post some random screenshots (existing ones are fine). Some random info, snippets, work done, future work, link to discussions, call for contributions, engaging with users, and whatnot. And/or also other non-anon-connection-wizard, general Whonix/anonymity/security related content.
Very relaxed posting policy. Just post some random screenshots (existing ones are fine). Some random info, snippets, work done, future work, link to discussions, call for contributions, engaging with users, and whatnot.
Yes! The post I wrote on Whonix blog seems satisfied several requirement
here. I will try to do some adjustment on it and post them on twitter
and Facebook.
I am not sure but maybe sending an encrypted email will be the best way
to pass me the confidential?
And/or also other non-anon-connection-wizard, general Whonix/anonymity/security related content.
Sure! As long as I am confident enough to inform the public these
contents without misleading or obscuring them, I will be more than happy
to do so.
It seems that the post is not showing up anywhere on the Whonix blog (not on homepage or recent post or certain category). It can be accessed from the direct URL to that post though.
I tried to search the problem online but it seems there is not much I can do. Is there anything I did wrong?
It seems that the post is not showing up anywhere on the Whonix blog (not on homepage or recent post or certain category). It can be accessed from the direct URL to that post though.
I tried to search the problem online but it seems there is not much I can do. Is there anything I did wrong?
Very relaxed posting policy. Just post some random screenshots (existing ones are fine). Some random info, snippets, work done, future work, link to discussions, call for contributions, engaging with users, and whatnot.
Yes! The post I wrote on Whonix blog seems satisfied several requirement
here. I will try to do some adjustment on it and post them on twitter
and Facebook.
I am not sure but maybe sending an encrypted email will be the best way
to pass me the confidential?
And/or also other non-anon-connection-wizard, general Whonix/anonymity/security related content.
Sure! As long as I am confident enough to inform the public these
contents without misleading or obscuring them, I will be more than happy
to do so.
Credentials sent by encrypted e-mail just now. Also upgraded your
wordpress account so you can post without prior confirmation.
As for postings, don’t worry too much. We better have non-perfect
activity rather than perfect non-activity.
We don’t have tickets for it yet. But since anon-connection-wizard is working good enough… Could you create tickets please? Like for whonix-setup-wizard integreation? And help with these please? I guess throw out all connection-wizard code from whonix-setup-wizard and then just start anon-connection-wizard from whonix-setup-wizard?
From next year, we can abolish the Whonix first time setup disclaimer. And we’ll enable Whonix’s repository by default for Whonix download version. From then, we’ll only autostart anon-connection-wizard on Whonix-Gateway.
So depending on how long the release of Whonix 14 takes, we might not need whonix-setup-wizard changes.
A suggestion, not a strict rule at all:
This forum post will be the place to discuss new-features/plans/announcement and so on and T504 will be place to discuss code and implementation.
How to install anon-connection-wizard in a clean /Debian8 or Debian9:
install all the dependencies: sudo apt-get install git python3-pyqt5 python3-yalm python3-stem tor
anon-connection-wizard is using torrc.d feature which is firstly implemented in 0.3.1.1-alpha. Use tor --version to check if your Tor version is below that. Currently, you need to upgrade to an unstable version of Tor to use it, see this page for better instructions on how to upgrade Tor.