On 09/01/13 21:49, Michael Rogers wrote:
On 01/09/13 10:00, Caspar Bowden (lists) wrote:
AFAIK Deleuze, Foucault et al. did not say anything specifically
about covert (mass-)surveillance, or analyse how the inherently
secret nature of such organizations might be a causal element in
theories of
On 09/01/13 22:21, Guido Witmond wrote:
...
Before the revelations and the subsequent confirmations, many people
would rather believe the old truth (having nothing to hide) than to live
with the new truth that they've been misled.
Truth hurts. That's the reason why so many people claim they
On 09/02/13 08:46, Caspar Bowden (lists) wrote:
On 09/01/13 21:49, Michael Rogers wrote:
...
Wasn't the NSA closer to the panoptic ideal when it was No Such Agency
than now, when we know we're being watched?
Yes, absolutely, but I don't think NSA wanted that, although a grimly
conspiratorial
Caspar Bowden (lists) wrote:
On 09/01/13 21:49, Michael Rogers wrote:
...
Is there anyone who's aware of overt surveillance and who doesn't at
least suspect that some form of covert surveillance also exists? And
isn't that suspicion enough to create a panoptic effect?
to some *unconscious*
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi all,
Does anyone on the list know of any research into the way people
communicate in ad hoc groups? By an ad hoc group I mean a group formed
for the duration of a particular communication, such as the list of
people CCed in an email thread, as
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Washington Post (Aug 30) - U.S. spy agencies mounted 231 offensive
cyber-operations in 2011, documents show by @BartonGellman @nakashimae:
Computer-mediated communication literature has been studying this since the
1980s:
http://en.wikipedia.org/wiki/Computer-mediated_communication
The field has its own journal:
http://onlinelibrary.wiley.com/journal/10./(ISSN)1083-6101
Sociological approaches have studied how the choice to
From: Gemma Galdon Clavell gemma.gal...@gmail.com
The Catalan Government is offering 60 2-year postdoctoral grants for people
who compelted their PhD between 01/01/2007 and 31/12/2011. Gross yearly
salary of 42,500 euros.
I am more than willing to welcome surveillance scholars at my department
On Mon, Sep 2, 2013 at 10:44 AM, Gregory Foster
gfos...@entersection.org wrote:
...
The NSA designs most of its own implants, but it devoted $25.1
million this year to “additional covert purchases of software
vulnerabilities” from private malware vendors, a growing
gray-market industry based
On Sep 2, 2013, at 11:13 PM, coderman coder...@gmail.com wrote:
On Mon, Sep 2, 2013 at 10:44 AM, Gregory Foster
gfos...@entersection.org wrote:
...
The NSA designs most of its own implants, but it devoted $25.1
million this year to “additional covert purchases of software
vulnerabilities”
On Mon, Sep 02, 2013 at 05:44:41PM -0400, Shava Nerad wrote:
Wouldn't there be a licensing issue? It's a hard argument that he has no
right to the commercial exploitation of his likeness on the basis of being
a fugitive whistleblower, and I doubt anyone is authorized as an agent to
grant
No one elected him and he may have volunteered for the spotlight but not in
the same way that some one does when they campaign for office. Even movie
stars have a right to their visages. Where you could say that a sign We
are all Snowden is political speech, citizen Snowden also has rights to
Hi!
Is there some software which would prevent any outgoing networking on
Mac OS X until a VPN to a trusted server is established? So on the
system level? I am wary that between me connecting to an untrusted
WiFi and establishing a VPN tunnel, there is some window where
probably all possible
I actually disagree... his ownership of his likeness is minimal. He is a
public figure and as such anyone who wanted to make a mask would be pretty
free to do so. I am not saying someone should go out and do it, and if you
do and get sued don't come after me... but if I had the resources available
I thought OpenVPN will automatically stop traffic if VPN drops.
--
Liberationtech is a public list whose archives are searchable on Google.
Violations of list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or
Warning - ~I~ haven't tried this but if I was going to suggest
something to try to one of my regular end-users (someone w/o their own
sysadmin skillset) I'd start by trying to combine one of the
following:
Hands Off - http://www.metakine.com/products/handsoff/
Little Snitch -
Unless he's trademarked his likeness, it's doubtful he'd have any recourse.
And if he did, what chance does he have to defend it in Russia?
Slim to none
On Tuesday, September 3, 2013, Travis McCrea wrote:
I actually disagree... his ownership of his likeness is minimal. He is a
public figure
In light of this
http://www.theguardian.com/science/political-science/2013/aug/28/science-policy
That's a hard sell...
On Tuesday, September 3, 2013, Yosem Companys wrote:
From: Gemma Galdon Clavell gemma.gal...@gmail.com javascript:_e({},
'cvml', 'gemma.gal...@gmail.com');
The Catalan
18 matches
Mail list logo