Otter Browser (Opera 12 reloaded)
-
If you know nothing about the issue, start with some basics
How NSA access was built into WindowsOh, an article from 1999. I almost forgot that one, thanks for the remainder of an example about rumors going wild. Follow the other links in the German version of the article and see what the real experts said about it - the backdoor claim was proofed to be wrong. The keys were built in, but the people who discovered them made wrong assumptions of what can be done with the keys. A long story with many aspects which lead to people no longer updating their systems because they feared that Microsoft/the NSA/the Illuminati were spying on them. :woohoo:
or this
Is Windows 8 a Trojan horse for the NSA? The German Government thinks soNo, the German Government didn't think so. Read linked BSI article if you want to know what the German government really thought.
-
example about rumors going wild. Follow the other links in the German version of the article and see what the real experts said about it - the backdoor claim was proofed to be wrong. The keys were built in, but the people who discovered them made wrong assumptions of what can be done with the keys.
No, the German Government didn't think so.Oh yeah.. you know better what is not included in Windows dll's…lol... And I should believe the genius, who can't even use a firewall..lol...
You quote "experts" who are supposed to tell you: "no, it's safe. Don't worry".. Wow.. What a naive guy...lol.. How did you like Stasi? You obviously didn't have a problem with it at all.. Just "Jawohl!" and go forward...You have no clue what German government thinks. You can have just leaks, which are usually later denied for diplomatic and other reasons. And the useful idiots, like you, are so happy they can defend their beloved government, when govt or its "experts" deny inconvenient truths... Just like Opera Zombie lovers defend the bum browser no matter what.
German govt and other EU governments cooperate with US military spying. On the level of those "experts". Politicians are usually as naive and ignorant as you are.
It's worth noticing that Norwegian government also spied for NSA. So this puts more light on Opera company decisions in recent years.
USA usually approaches foreign companies through their fronts companies like Google and offers them "new financial opportunities", if they go along with the NSA requirements. That's what apparently happened to Opera.A long story with many aspects which lead to people no longer updating their systems because they feared that Microsoft/the NSA/the Illuminati were spying on them.
You are a simpleton with an extremely confused, hysterical mind.. Why did you intermingle Microsoft, NSA and nonexistent entities like "Illuminati"?.. Maybe you will come up with Batman and Winnie the Pooh the next time? Not to mention cosmic aliens..
It's been several times that you exhibited your hysterical emotional "thinking" here.. Don't think like a squaw, think like a man. At least try. And don't talk about delusions of your mind like "Illuminati" or Maya the Bee.Seriously.. How stupid you have to be to deny Microsoft spying for NSA after the Snowden revelations. That's just mind blowing.
Even cryptography was compromised in numerous programs, because of the NSA. NSA even spiked the cryptographic standards. That's how far it went, you naive guy.,..
I don't feel sorry for naive people like that, but it's irritating when they try to convince others to be as stupid and naive as they are.
-
Windows 8 is Trojan horse for the NSA! OMG! My son is going to love this.
-
Complete and utter lunacy. Windows 8 a Trojan horse for the NSA! OMG… Have you ompletely lost your sanity? My son is going to love this.
Yeah.. gradpa. That's lunacy what you are doing.. You don't understand anything and still you try to say something.. Total Looney Tunes.. :dry:
I didn't tell you that "Windows 8" a Trojan horse. Windows is a OS, and trojan horse is a malware living in the OS.. So Windows cannot be a trojan horse. Now read it slowly, so you can grasp the words at least…
The article, I linked, uses a metaphor (some day you might be able to understand what a metaphor is - just maybe). And it's been written by waaaay smarter people than you. So try to learn some basics first.You are a perfect example of an ignorant, senile know-nothing who comes up from time to time to show his presence. A guy with no shame, who knows nothing about virtually nothing, but still tries to barks some nonsense from the distance. Maybe try to talk about a thing you know something about.. If there is such a thing..
Isn't that funny? A serious newspaper quotes German govt officials voicing their concerns that "Trusted Platform Module (TPM) technology built into a growing number of Windows 8 PCs and tablets is creating a gigantic back door for NSA surveillance", but some simpletons come out of the blue and say: "That's no true. I'm the King of the Hill in my village and I know better. They crazy. I'm da genius here.
Just unbelievable.. The insolence the most ignorant is just unbelievable.
The German Government is now deeply suspicious that the Trusted Platform Module (TPM) technology built into a growing number of Windows 8 PCs and tablets is creating a gigantic back door for NSA surveillance, leaked documents have suggested.
Documents from the German Ministry of Economic Affairs obtained by German title Zeit Online uncover the alleged unease of officials at the direction of version 2.0 of the standard being developed under the auspices of the multi-vendor Trusted Computing Group (TCG). German officials, including members of the Federal Office for Information Security (Bundesamt für Sicherheit or BSI) concluded that "the use of trusted Computing technique in this form … is unacceptable for the federal administration and the operators of critical infrastructure," and would represent a “loss of full sovereignty over information technology."
-
The fact that you have done nothing but use abusive language ever since arriving on this site tells me you are simply a troll. I'm reporting you for your insolence and abusive behavior. This is my last communication with you.
-
I remind participants, that they have to show respect for the interlocutor and not use offensive phrases. Otherwise the administration will be compelled to limit access of violators to a forum.
-
Removed by Administrator
Author get the warning
-
The German Government is now deeply suspicious that the Trusted Platform Module (TPM) technology built into a growing number of Windows 8 PCs and tablets is creating a gigantic back door for NSA surveillance, leaked documents have suggested.
Documents from the German Ministry of Economic Affairs obtained by German title Zeit Online uncover the alleged unease of officials at the direction of version 2.0 of the standard being developed under the auspices of the multi-vendor Trusted Computing Group (TCG). German officials, including members of the Federal Office for Information Security (Bundesamt für Sicherheit or BSI) concluded that "the use of trusted Computing technique in this form … is unacceptable for the federal administration and the operators of critical infrastructure," and would represent a “loss of full sovereignty over information technology."
Please don't quote third hand information, i.e. don't quote press that quotes press. Even worse in this case, that quotes press that didn't get it right.
This is what the BSI said:
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.htmlThis is the recommendation for the government:
http://www.bmi.bund.de/SharedDocs/Downloads/DE/Themen/OED_Verwaltung/Informationsgesellschaft/trusted_computing.html (download the PDF)Oh, btw: The NSA was never able to spike the the encryption standard as you claimed. The standards are open source and the source code is very well documented and vetted. Everyone with a little knowledge of programming languages (c++ and others) can read and compare it with the algorithms that define it. There is simply no room for backdoors.
They indeed spiked some implementations but that does not effect the security of the standard at all. Just write your own implementation If you want to be sure that nobody spiked the implementation you use, it is not that difficult. -
How funny… :lol:
Administrator deletes a response ( link) that did not include any offensive word. Only the word "troll", the same that this "JamesD" used…
Why did this happen? :lol:
It actually doesn't matter. I got what I wanted. I gave some info to people who deserve it, and I taught some trolls (is this word allowed?) a lesson, the ones I got irritated by some time ago.
That's all. I don't need to spend any more time here. I got what I wanted. -
… I got what I wanted. ... I taught some trolls (is this word allowed?) a lesson, the ones I got irritated by some time ago.
... I got what I wanted."I got what I wanted." I guess that says it all, doesn't it? :S
-
Does anyone know how can we use QT 5.2 in order to follow the project on Github closely. Actually I installed it but , I am getting strange error when try to open project files. I know problem is reg. with me but I need some clear advise step by step
Thanks. -
Otter version 0.3.01 released
Changelog https://github.com/Emdek/otter/blob/master/CHANGELOG
0.3.01 (01.03.2014):
- added option to set custom User Agent (for single tab or whole application);
- added support for proxy auto-config (PAC);
- added option to decide if JavaScript should be able to show status messages;
- implemented "Reuse Current Tab" option;
- various small fixes.
-
Otter version 0.3.01 released
I updated a few minutes ago, or better: I downloaded and extracted the alpha3-ZIP-File. Then, of course i asked myself: "Where are the bookmarks in alpha1 to import them in alpha3?"
Didn´t found them but if i run alpha3 i was surprised: The bookmarks are there. :huh:Now my question: How does that work? From where alpha3 got the bookmarks?
The two programs, or better directories have no connection or shared files imo? I am a little confused. -
How does that work? From where alpha3 got the bookmarks?
The two programs, or better directories have no connection or shared files imo? I am a little confused.Normally programs use standard locations to store their data and I'd guess the developer knows the paths where his programs store the information and can scan those ..
… in this case:
%localappdata%\Otter\otter\bookmarks.xbelor a corresponding path path doing the same on Linux
-
… in this case:
%localappdata%\Otter\otter\bookmarks.xbelAhh - there it is! :whistle: ♫♪♬thank you♫♪
I searched in the program directory, because i thought it works like an USB installation.
-
@serious:
best file a bug regarding the issue with an attached error log at their github issue tracker. Probably other people (will) have the same problem so worst thing that can happen is that at least people find a link to the issue on google when searching, even if the solution says "do this, do that" instead of "jeah, we fixed it in our code"
Actually I solved problem as some searching, thanks.
-
… in this case:
%localappdata%\Otter\otter\bookmarks.xbelor a corresponding path path doing the same on Linux
on Linux it's .config/otter/bookmarks.xbel
-
Btw I Use this Icon atm: Greenstone Fish Hook
[attachment=130]Greenstone-Fish-Hook-icon.png[/attachment]
Found it quite suitable: A bit Otter, a bit Vivaldi and with a little fantasy there is also an O …
Attachments:
-
Alpha 4 is out. For changelog, download and more see: Alpha 4 release (01-04-2014)
If only it would be possible to disable the status(?) bar on the bottom (that with the Zoom), i would be happy.
On my 10" Netbook the screen is very small and i don´t need it. -
Just tried the latest beta and for me it's basic but promising. At this stage I would compare it to chopera. Give it a year or so to mature and I think opera's presto user will have a new love.