Firstly: I agree with you in principle but these tools need to be available to
all.
Technology is not used in a sterile, hygienic environment, it is used on the
streets, by people who can't write, who use it for their purposes, not
necessarily the purpose it was invented for.
Hence I
Bernard Tyers wrote:
Firstly: I agree with you in principle but these tools need to be
available to all.
Technology is not used in a sterile, hygienic environment, it is used on
the streets, by people who can't write, who use it for their purposes,
not necessarily the purpose it was
On Fri, Sep 13, 2013 at 06:39:35PM +1000, Erik de Castro Lopo wrote:
Yes, but Firefox OS and Cryanogenmod only control the user facing part
of the smartphone. Loading eg Cryanogenmod onto a android phone leaves
the software running the radio part of the phone untouched (otherwise
the phone
Il 9/13/13 10:39 AM, Erik de Castro Lopo ha scritto:
Yes, but Firefox OS and Cryanogenmod only control the user facing part
of the smartphone. Loading eg Cryanogenmod onto a android phone leaves
the software running the radio part of the phone untouched (otherwise
the phone would never have
On 13 Sep 2013, at 09:39, Erik de Castro Lopo mle+l...@mega-nerd.com wrote:
Bernard Tyers wrote:
Firstly: I agree with you in principle but these tools need to be
available to all.
Technology is not used in a sterile, hygienic environment, it is used on
the streets, by people who can't
On 13 Sep 2013, at 10:04, Eugen Leitl eu...@leitl.org wrote:
On Fri, Sep 13, 2013 at 06:39:35PM +1000, Erik de Castro Lopo wrote:
Yes, but Firefox OS and Cryanogenmod only control the user facing part
of the smartphone. Loading eg Cryanogenmod onto a android phone leaves
the software
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 13/09/13 10:04, Eugen Leitl wrote:
Baseband processors leave the system wide open to all kind of
attacks. Countermeasure would be running the 2G/3G/4G stack in an
open source SDR radio, or using an open source VoIP device that
connects by WLAN
Eugen Leitl eu...@leitl.org wrote:
On Thu, Sep 12, 2013 at 05:08:10PM -0400, John Love wrote:
I'm researching security, privacy, and anonymity focused live Linux
environments like Liberté Linux, TAILS, JonDoNYM, and Whonix. There's
JonDoNYM is backdoored, and hence not playing in the same
On 12.09.2013 08:54, Brad Beckett wrote:
Use a Live USB distro with LOK-IT encrypted flash drives. All crypto and
authentication is handed on the drive itself...therefor bootable and
works on any OS:
I could not find any refference. Only a lot of marketing talk.
1. Which software is used? Is
On 12.09.2013 18:12, The Doctor wrote:
For folks that have not yet gone poking around inside a copy of TAILS
installed on a USB key, Moon refers to the contents of the file
filesystem.squashfs
Thank for for the detalied description. Very useful. Myself I did not
know all that you have
A global context would be great.
I'll ask around on several country region specific lists that i'm on and
share the details back on this list.
regards
Robert
--
R. Guerra
Phone/Cell: +1 202-905-2081
Twitter: twitter.com/netfreedom
Email: rgue...@privaterra.org
On 2013-09-13, at 12:16 AM,
From a legal perspective, an interesting recent piece is Neil Richards' The
Dangers of Surveillance:
http://www.harvardlawreview.org/issues/126/may13/Symposium_9477.php
On 13 Sep 2013, at 16:09, Robert Guerra
rgue...@privaterra.orgmailto:rgue...@privaterra.org wrote:
A global context would
From: Richard Forno rfo...@infowarrior.org
Here are some of the better timelines that describe (w/links to
sources/articles) of the NSA surveillance programs. Might be helpful, or
at least a decent resource for your students.
Timeline of NSA Domestic Spying
From: Greg Wise greg.w...@asu.edu
John Gilliom and Torin Monahan's book SuperVision is very student friendly,
and a good overview of surveillance issues.
I'm teaching it later this Fall.
Greg
Sent from my iPhone
--
Liberationtech is public archives are searchable on Google. Violations of
On Fri, Sep 13, 2013 at 09:14:27AM +1000, Erik de Castro Lopo wrote:
No such agency and the like are almost certainly able (with the
help of carriers and manufacturers) backdoor and exploit all
the major smartphone brands and models [0].
Smartphones are horrendously complex, rely heavily on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/13/2013 05:56 AM, Michael Rogers wrote:
The Samsung Galaxy Player (Samsung Galaxy S WiFi in some countries)
is essentially an Android phone without a baseband. I believe you
can run CyanogenMod on it.
So is the Nexus 7 (non-GSM/LTE) version
On 09/13/2013 01:19 PM, Matt Johnson wrote:
I would assume the quality of the voice calls would be pretty bad
through this kind of setup. How did that work for you?
The reality is we have gotten used to terrible voice quality with our
GSM and CDMA voice networks. You would be surprised what is
I would assume the quality of the voice calls would be pretty bad
through this kind of setup. How did that work for you?
--
Matt Johnson
On Fri, Sep 13, 2013 at 9:51 AM, Nathan of Guardian
nat...@guardianproject.info wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/13/2013 05:56
On Thursday, September 12, 2013, Joe Szilagyi wrote:
Found online:
http://www.wncinfosec.com/**dropbox-opening-my-docs/http://www.wncinfosec.com/dropbox-opening-my-docs/
--
Joe Szilagyi
Interesting, thanks for sharing that.
Has anyone else tried to reproduce these results? I'm curious
Might I also suggest Ron Deibert's new book - Black Code: Inside the Battle for
Cyberspace.
http://blackcodebook.com
http://www.theglobeandmail.com/arts/books-and-media/book-reviews/how-to-make-cyberspace-safe-for-human-habitation/article11990902/?page=all
On 2013-09-13, at 12:32 PM, Yosem
On Fri, Sep 13, 2013 at 1:20 PM, Ryan Getz ry...@getzmail.com wrote:
On Thursday, September 12, 2013, Joe Szilagyi wrote:
Found online:
http://www.wncinfosec.com/**dropbox-opening-my-docs/http://www.wncinfosec.com/dropbox-opening-my-docs/
--
Joe Szilagyi
Interesting, thanks for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/12/2013 06:06 PM, Stefan wrote:
But... PGP/GPG on a smartphone? Are you sure, that you want that?
There is enough demand for it that Symantec has published some mobile
apps (though they require Symantec's encryption infrastructure
software to
Hi!
Interesting:
http://virostatiq.com/interactive-timeline-of-the-prism-scandal/
Mitar
--
http://mitar.tnode.com/
https://twitter.com/mitar_m
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
This paper outlines simple changes that can be made to insert
vulnerabilities into silicon that are invisible to current
reverse-engineering techniques:
http://people.umass.edu/gbecker/BeckerChes13.pdf
It uses Intel's random number generator as an example, detailing
precisely how it can be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I'm working on a journal article on the legal justifications for the
NSA programs. I've just written a quick overview of the government's
legal arguments from 9/11 until now:
Some of the readings from week 4 (Privacy and Security) and week 6
(Surveillance and Censorship) might be appropriate for your class. Link to
syllabus:
http://www.christopher-parsons.com/Main/wp-content/uploads/2008/11/POLI-456-Syllabus-for-Web.pdf
*
From: Atanu Garai atanu.ga...@gmail.com
Dear All,
** **
In last few years, several donors announced grants for ICT projects to
deliver integrated health services in underserved communities. I am looking
for examples of those projects implemented or in the process of being
implemented to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
OpenMRS.org is a great platform and very vibrant open source community
focused on supporting healthcare delivery, primarily in Africa.
peace,
gunner
On 09/13/2013 11:57 AM, Yosem Companys wrote:
From: *Atanu Garai*atanu.ga...@gmail.com
John Love:
I'm researching security, privacy, and anonymity focused live Linux
environments like Liberté Linux, TAILS, JonDoNYM, and Whonix. There's
obviously a diversity of needs and preferences, and each of these distros
has their own approach and community. Assuming all disrtos are not made
29 matches
Mail list logo