On 9/5/13 12:32 PM, Richard Brooks wrote:
Latest articles:
http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?emc=edit_na_20130905_r=0pagewanted=print
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
I find most of this (if not
On 2/5/2013 11:11 AM, Jacob Appelbaum wrote:
Brian Conley:
Apparently Silent Circle is also proposing such a feature now.
Such a feature makes sense when we consider the pervasive world of
targeted attacks. If you compromise say, my email client today, you may
get years of email. If you
On 1/3/13 5:25 PM, Steve Weis wrote:
I noticed a Stanford project for setting up browser-based, ephemeral
Tor proxies. In their words, the purpose of this project is to
create many, generally ephemeral bridge IP addresses, with the goal
of outpacing a censor's ability to block them.
I'm
Hi, Kara.
Thanks for taking the time to explain your product and goals. (And for
not repeating the mistakes of a certain previous project.)
On 6/28/12 8:30 PM, Kara Coppa wrote:
I'm a Wickr co-founder and I heard there was some discussion today
about our technology. As you've probably heard