-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
That is interesting. Presumably by sheer coincidence, the docs.palantir.com
sub-domain is not available, but thanks to Google cache, you can see the two
URLs posted in that article here:
(Quoting myself from something I just sent to NANOG in re the
same question: are the Cxx people at Google and elsewhere telling
the truth?)
*puts on evil hat, adjusts for snug fit*
Targeting the technical people who actually have their hands on the
gear might be the best choice. They don't
zooko:
On Tue, Mar 26, 2013 at 09:24:13AM +0100, Yiorgis Gozadinos wrote:
Assuming there is a point of reference for js code, some published instance
of the code, that can be audited and verified by others that it does not
leak. The point then becomes: Is the js I am running in my
Some information yoy may consider to be interesting:
1. It is possible to buy completely anonymous SIM cards (with data roaming that
works everywhere in Europe including the UK) in Czech Republic. For 1.2 GB
roaming data it costs about 800 Kc (31 €) monthly. I've already activated it
for some of
-Original Message-
From: David Farber [mailto:d...@farber.net]
Sent: Saturday, June 08, 2013 7:30 AM
To: ip
Subject: [IP] Tech Companies Concede to Surveillance Program - NYTimes.com
http://www.nytimes.com/2013/06/08/technology/tech-companies-bristling-conced
On 7 June 2013 18:51, Travis McCrea m...@travismccrea.com wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
http://googleblog.blogspot.com/2013/06/what.html
I do believe them, but I have no proof to back that up. You would assume
they wouldn't make a bold faced lie, they would just not
Hi Liberation Tech!
With the NSA spying scandal in full swing, I've been thinking about what
it would take to truly build a secure mobile network. I'm curious to get
feedback from those who've given more thought to this than me as I see
the problem as primarily twofold:
1. Location issues - they
How are the two concepts related?
On Thu, Jun 6, 2013 at 4:42 PM, michael gurstein gurst...@gmail.com wrote:
Is this kind of event an argument against net neutrality?
M
From: liberationtech-boun...@lists.stanford.edu
[mailto:liberationtech-boun...@lists.stanford.edu] On Behalf Of Andrés
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I have been considering establishing a /r/LiberationTech subreddit, and
then building a bot which would submit new threads on the website for
each new topic that was created here on the mailing list.
Pros:
Gives people who use reddit, don't like
Having an aggregated list, with clear caveats of course, might be helpful
given the recent news about the NSA surveillance programs.
I know of the following wiki that was setup a while ago to aggregate and list
secure voice over IP (VoIP) alternative to skype. Are there others say for
email,
http://www.siliconbeat.com/2013/06/07/want-to-shield-text-photos-from-government-wickr-says-it-has-an-app-for-that/
The U.S. government has acknowledged — with President Obama saying this
morning in San Jose that it’s all in the name of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
This is a post on reddit*, which the author, 161719, has written for
the public domain. Take it as you please, but I feel that it's very
eye-opening:
I live in a country generally assumed to be a dictatorship. One of
the Arab spring countries. I have
From: Yosem Companys compa...@stanford.edu
To: Liberation Technologies liberationtech@lists.stanford.edu
Sent: Saturday, June 8, 2013 2:22 PM
Subject: [liberationtech] Want to shield text, photos from government? Wickr
says it has an app for that |
Nadim Kobeissi na...@nadim.cc wrote:
we're supposed to discuss proprietary software not only as secure, but as
military-grade and government-proof.
It's kind of ironic that so many apps refer to themselves as
military-grade, when the intelligentsia on this list has better security
than
It's not open-source, therefore it not only *can* be discarded without
any further discussion, it MUST be.
---rsk
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
Can we just not? Wickr's PR is pretty adept at taking advantage of
opportunities and Libtech bites every time. http://i.imgur.com/a5KVZzG.png
On Sat, Jun 8, 2013 at 10:27 PM, Rich Kulawiec r...@gsp.org wrote:
It's not open-source, therefore it not only *can* be discarded without
any further
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello again libtech,
First, sorry for replying out of thread again, I have different settings
on this email and it shouldn't happen again.
Late last year, I heard about a data mining system in use by the Russian
authorities called Prizma. Here are
And you know Windows 3.1/NT/2000/XP is used in military for many year!
--
Jerzy Łogiewa -- jerz...@interia.eu
On Jun 8, 2013, at 5:11 PM, Griffin Boyce wrote:
It's kind of ironic that so many apps refer to themselves as
military-grade, when the intelligentsia on this list has better
Jerzy Łogiewa jerz...@interia.eu wrote:
And you know Windows 3.1/NT/2000/XP is used in military for many year!
After my OHM forensics talk was announced, the CIA (or someone using
their IP range) visited my tumblr. They were using XP. This will never
not be funny to me. :D
~Griffin
[1]
Oh man, Glenn Greenwald is my hero and a hero to us all. Everyone on
this list who was looking for 'some evidence' about global surveillance
and previously ignored all other evidence, well, here you go!
Revealed: The NSA's powerful tool for cataloguing data – including
figures on US collection
On 06/08/2013 09:35 PM, Jacob Appelbaum wrote:
This screenshot from the program is very web 2.0:
http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/8/1370715185657/boundless-heatmap-large-001.jpg
Just noticed this Map by Ammap.com in the screenshot
http://www.ammap.com/
amMap is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
While not as big a player in the identity area as others, below is Mozilla's
Identity group response to a question about legal (or otherwise) requests.
Begin forwarded message:
From: Melvin Carvalho melvincarva...@gmail.com
Date: 8 June 2013
I want to encourage all the open source, communication and security software
developers on this list to start talking about metadata.
1. Start raising awareness on what metadata is given to your software and how
it's handled.
2. Don't limit your privacy policy to content but also clarify what's
Nadim Kobeissi na...@nadim.cc wrote:
I want to encourage all the open source, communication and security
software developers on this list to start talking about metadata.
1. Start raising awareness on what metadata is given to your software and
how it's handled.
2. Don't limit your privacy
2013/6/8 Jacob Appelbaum ja...@appelbaum.net
Oh man, Glenn Greenwald is my hero and a hero to us all.
Do you still believe Glenn's reporting that NSA has direct access to
servers of firms including Google, Apple and Facebook? In my view, he
misled the world intentionally (the few prism
From the Washington Post, just published:
Intelligence community sources said that this description, although
inaccurate from a technical perspective, matches the experience of
analysts at the NSA. From their workstations anywhere in the world,
government employees cleared for PRISM access may
I guess the question is still, is it just them using the already existing API's
or do they have colocated sniffing tools?
-Andrew
On Jun 9, 2013, at 3:13 PM, Trevor Timm tre...@eff.org wrote:
From the Washington Post, just published:
Intelligence community sources said that this
27 matches
Mail list logo