[bisq-network/bisq] Bump netlayer to use tor binary from tor browser v10.0 (#4604)

Florian Reimair notifications at github.com
Wed Oct 7 13:09:13 UTC 2020


the tor browser version is of no interest at all to bisq or the netlayer or the tor-binary project. The only reason to use the tor browser binaries in the first place was that the tor guys released signed versions of these binaries - hence, we have a trusted source of tor binaries. There has not been any other source of plain tor binaries. This is also why we do not have tor for ARM in there yet, despite https://github.com/JesusMcCloud/tor-binary/pull/3.

That being said, @cd2357 can we trust you that you verified every and all signatures prior to injecting the sha256 sums? did anyone check if cd2357 did?



-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/bisq-network/bisq/pull/4604#issuecomment-704923962
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.bisq.network/pipermail/bisq-github/attachments/20201007/4f202234/attachment.html>


More information about the bisq-github mailing list