Hello Libtech,
I've released an open source (GPLv3) credential storage app that some of
you may find useful:
https://github.com/wg/keys
keys is the password manager I've always wanted, with a command line UI
instead of a GUI and a client/server design that makes the stored
credentials
Many thanks Yosem, Luis Felipe Greg
On 08/31/13 07:14, Luis Felipe R. Murillo wrote:
On 08/30/2013 01:54 PM, Yosem Companys wrote:
From: Caspar Bowden li...@casparbowden.net
I realize this is an improbable request (I think), but is anyone aware of
any Surveillance Studies research on the
Hi,
I own an Asus UX31A ultrabook, which contains an Adata XM11 SSD. This SSD
uses the Sandforce SF-2281 controller, which encrypts the data using 128
bits AES. It uses a key for this which is (supposedly) unique per
controller, and which the manufacturer does not know. What I am interested
in,
I tried this once [0,1]. My suggestions.
0) There's an app (hdparm) that lets you interact with the drive's AT
security stuff. But obviously this only helps you if it's not your
boot drive.
1) Repost this on the cryptography mailing list, it's more technical
focused that libtech.
2) See if the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 01/09/13 10:00, Caspar Bowden (lists) wrote:
AFAIK Deleuze, Foucault et al. did not say anything specifically
about covert (mass-)surveillance, or analyse how the inherently
secret nature of such organizations might be a causal element in
The University of Pennsylvania's Annenberg School for Communication is
seeking to fill a tenured or tenure track faculty position (open rank) in
digital culture to begin fall semester 2014. Preference will be given to
early and mid-career scholars whose research and teaching contribute to
field,
On 09/01/13 22:49, Michael Rogers wrote:
On 01/09/13 10:00, Caspar Bowden (lists) wrote:
AFAIK Deleuze, Foucault et al. did not say anything specifically
about covert (mass-)surveillance, or analyse how the inherently
secret nature of such organizations might be a causal element in
theories
This isn't quite what you are looking for, but as a jumping off point for
the old-school intelligence/diplomatic studies nexus of culture we are
inheriting, this is not a bad historic orientation or bibliographic
compass set.
It was also made rather clear in June that Silent Circle integrates
licensed libraries into their code. This means unless they planned from
day one to be clean and modular -- which is, hey, what every one of us does
in startup mode under siege from security threats, market pressures,
community
On Sun, 1 Sep 2013, Shava Nerad wrote:
Distrust, but verify. Add it to the variations on the theme.
SN
Distrusting one's own distrust? Yes I do, thanks. Even though it's hard
a bit, because maybe brain is a computer but a poor one when it comes to
rational stuff.
Regards,
Tomasz Rola
--
10 matches
Mail list logo