..on Tue, Jun 25, 2013 at 10:57:57AM -0400, Mrs. Y. wrote:
I'm in a position to recommend/suggest an encryption solution for email.
The audience is *very* sensitive to privacy, but not very technical. IBE
seems to solve this, but there are concerns with the PKG (private key
generator) being
Nick:
Quoth Mike Perry:
Hidden service circuits require ~4X as many Tor router traversals
as normal Tor exit circuits to set up, and unlike normal Tor exit
circuits, they are often *not* prebuilt. Once they are set up, they
still require 2X as many Tor router traversals end-to-end
On 06/25/2013 05:00 PM, Laurent Giacobino wrote:
Hi list
Does anyone know where to find a repository of the safermobile /
mobileactive manuals?
tactical tech's guide was updated and is available in many languages,
too. it has a lot on mobiles:
https://securityinabox.org/
-oli
--
Too many
- Forwarded message from s...@wwcandt.com -
Date: Tue, 25 Jun 2013 19:34:17 -0400 (EDT)
From: s...@wwcandt.com
To: sur...@mauigateway.com
Cc: na...@nanog.org
Subject: Re: Security over SONET/SDH
User-Agent: SquirrelMail/1.4.8-21.el5.centos
Reply-To: s...@wwcandt.com
The sticky problem
- Forwarded message from Leo Bicknell bickn...@ufp.org -
Date: Tue, 25 Jun 2013 19:56:24 -0500
From: Leo Bicknell bickn...@ufp.org
To: s...@wwcandt.com
Cc: na...@nanog.org
Subject: Re: Security over SONET/SDH
X-Mailer: Apple Mail (2.1508)
On Jun 25, 2013, at 6:34 PM, s...@wwcandt.com
Mike Perry:
Nick:
Quoth Mike Perry:
Hidden service circuits require ~4X as many Tor router traversals
as normal Tor exit circuits to set up, and unlike normal Tor exit
circuits, they are often *not* prebuilt. Once they are set up, they
still require 2X as many Tor router traversals
Quoth Mike Perry:
If you're talking about attacks as strong as end-to-end correlation,
then it turns out hidden services have similar weaknesses on that order.
There are a number of points where the adversary can inject themselves
either to observe or manipulate hidden service circuit
Quoth Mike Perry:
I find StartPage/Google immensely superior to Duckduckgo/Bing when
searching the long tail of technical material (which I do frequently).
In that case I agree StartPage probably makes sense. Search engines
are mainly useful for long tail things; for other stuff I generally
Greetings,This may interest members of the list and I see it as an
opportunity to challenge some of the prevalent thinking and approaches
regarding the topics.
Best,
Michael
This is a SECOND call for papers for the *9th International Conference
on**Cyber Warfare and Security (ICCWS)
* which
On 06/26/2013 12:18, groente wrote:
Is this the pitch of left unity at any cost? Because no, actually,
it turns out that unity isn't the best thing ever. Do you want a big
tent that means nothing? Do you think that the OHM orga is united in
fighting for the destruction of the power
*From: *Bob Frankston bob19-0...@bobf.frankston.com
The current implementation of the Internet is hierarchical in that we get
IP addresses from provides and then use a DNS that is rooted. We go even
further in requiring that we conform to conditions on our intent (AKA our
use) of connectivity in
Yay, Dutchy pileup. Joining the fray.
WARNING : the following lecture contains the word penis.
(But it does not have the word fuck. (Can I say fuck on libtech ?))
On 06/26/2013 12:55 PM, Lex van Roon wrote:
On 06/26/2013 12:18, groente wrote:
Is this the pitch of left unity at any cost?
On Wed, Jun 26, 2013 at 09:03:43AM -0700, Yosem Companys wrote:
Where is the effort honor the Internet paradigm and move away from the
presumption of hierarchy to a distributed approach that doesn’t assume that
we must declare our intent merely to exchange bits? At very least we should
move
Yay, Dutchy pileup. Joining the fray.
WARNING : the following lecture contains the word penis.
(But it does not have the word fuck. (Can I say fuck on libtech ?))
On 06/26/2013 12:55 PM, Lex van Roon wrote:
On 06/26/2013 12:18, groente wrote:
Is this the pitch of left unity at any cost?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/24/2013 09:16 PM, Daniel Sieradski wrote:
Has there ever been any effort to create an open source search
engine that is entirely transparent in both its software and
practices? (dmoz.org
doesn't count!)
...YaCY?
http://yacy.de/
- --
The
Just as an historical footnote, at #cfp2013 today, I verified with Binney
that his statement re: Snowden's transition from whistleblower to traitor
was in fact a risk assessment of his positioning. (We're listening to him
speak over lunch right now.) He is spending all his time evangelizing for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello Bob,
I agree with you on the whole but I'm going to argue some of your points.
On 26 Jun 2013, at 17:03, Yosem Companys wrote:
From: Bob Frankston bob19-0...@bobf.frankston.com
The current implementation of the Internet is hierarchical in
I realize it's very hard to give up on the idea of networks but they are no
more necessary for communicating than railroads are for travels. Nice options
but not the only ones.
As you note the idea of rent-seeking is at the heart of the matter. Being
around when the fathers and mothers of the
Bob, can you give examples alternatives to pipes owned by service providers?
On Wed, Jun 26, 2013 at 12:39 PM, Bob Frankston
bob19-0...@bobf.frankston.com wrote:
I realize it's very hard to give up on the idea of networks but they are no
more necessary for communicating than railroads are for
Jacob Appelbaum:
Mike Perry:
In terms of data confidentiality and integrity though, I think it is
probably true that the Tor hidden service trust root is much stronger
than the browser CA trust root, even given the 80bit name hash and
RSA-1024 sized keys (which probably are roughly
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Ecuador won a huge credibility bump in hackerdom when it offered
political asylum to Julian Assange. That is confirmed with Edward
Snowden jumping from HK to Ecuador via the Red Block to evade the
Angry Murder of U.S. crows. There is a pattern
The Doctor:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/24/2013 09:16 PM, Daniel Sieradski wrote:
Has there ever been any effort to create an open source search
engine that is entirely transparent in both its software and
practices? (dmoz.org
doesn't count!)
...YaCY?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 2013.06.26 18.26, hellekin wrote:
Ecuador won a huge credibility bump in hackerdom when it offered
political asylum to Julian Assange. That is confirmed with Edward
Snowden jumping from HK to Ecuador via the Red Block to evade the
Angry
I was though didn't see the message until just now.
Jason
On 6/25/2013 2:28 PM, Shava Nerad wrote:
I am. *purr*
Shava Nerad
shav...@gmail.com mailto:shav...@gmail.com
On Jun 25, 2013 11:58 AM, Bill Woodcock wo...@pch.net
mailto:wo...@pch.net wrote:
...today? Apropos
On 27/06/13 01:02, Mike Perry wrote:
The Doctor:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/24/2013 09:16 PM, Daniel Sieradski wrote:
Has there ever been any effort to create an open source search
engine that is entirely transparent in both its software and
practices? (dmoz.org
The recently re-drafted Ecuadorean Constitution is the only one in the
world, I believe, that gives legal rights to Nature, and its current
President has done a lot for wealth redistribution and social justice, in
my opinion. Much more than the US Presidents of late.
On Jun 26, 2013 6:14 PM,
http://www.knightfoundation.org/blogs/knightblog/2013/6/25/introducing-crosscloud-project-get-your-data-out-silos/
When Tim Berners-Lee invented the World Wide Web, he imagined it being a better
way for people around the world to share knowledge and work together to solve
humanity's greatest
Resurrecting an old thread here to make a point about the question, To
what extent are US GOV foreign policy decision-makers monolithic or
fractured?
Sometimes history offers a good window into thinking about these things.
For example, JFK losing control over Vietnam policy, just as he was
almost
28 matches
Mail list logo