Hi,
I think the extra unsecured user would be able to fix the problem I suppose.
I must confess that I didn't do an effort to understand the rest of the
page. Maybe some sort of automated login would be possible using the whispr
protocol (
http://en.wikipedia.org/wiki/WISPr ) whenever Tor can't connect
to the network itself.
Should you need beta testers I'll happily volunteer. I have access to the
FON network from home and I can test on KPN hotspots here in the Netherlands
for free too.
Regards,
San Bergmans
On 7 May 2011 12:19, intrigeri <intrigeri@???> wrote:
> Hi,
>
> San Bergmans wrote (04 May 2011 21:56:54 GMT) :
> > I'm not sure if this is a new feature request,
>
> Already in our roadmap:
> https://tails.boum.org/todo/add_support_for_free_wifi_hotspots/
>
> > So I would propose that in such cases a less secure connection to
> > the internet is allowed until a Tor connection can be established
> > (including a warning of the insecure nature of this). Then, once
> > logged in to the hotspot portal, Tor can continue securing the
> > connection.
>
> Would the last implementation possibility listed on the abovementioned
> todo page (non-Torified browser running under a specially designated
> user) suit your needs?
>
> Bye,
> --
> intrigeri <intrigeri@???>
> | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
> | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
> | We're dreaming of something else.
> | Something more clandestine, something happier.
>