/liberationtech.
Unsubscribe, change to digest, or change password by emailing moderator at
compa...@stanford.edu.
--
Kyle Maxwell [krmaxw...@gmail.com]
Twitter: @kylemaxwell
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated
.
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password by emailing moderator at
compa...@stanford.edu.
--
Kyle Maxwell
On Fri, Oct 4, 2013 at 11:51 AM, Maxim Kammerer m...@dee.su wrote:
After going over the presentation, it seems as if GCHQ did all the
work. Does NSA actually have good computer scientists working for it
(not including mathematicians / cryptographers)? E.g., I have been to
a workshop in London
I don't think this tells us anything one way or the other. They could
be doing it for show (most likely IMHO), or because they want to
comply with THEIR vision of privacy civil liberties (also
significantly likely), or because they want to do the right thing (so
unlikely that I'd rather buy a
In general, as has been well documented, the telcos and other firms
charge the government for data records. While possibly distasteful
(they're making money off of giving our data to the gov!), it makes
sense from an operational point of view: there are real, concrete
costs associated with
[Comment: This has implications for those of us involved in
CryptoParty as well as other security education efforts.]
http://www.mcclatchydc.com/2013/08/16/199590/seeing-threats-feds-target-instructors.html
Doug Williams, a former Oklahoma City police polygrapher, says he can
teach people how to
, Griffin Boyce griffinbo...@gmail.com wrote:
Kyle Maxwell wrote:
[Comment: This has implications for those of us involved in
CryptoParty as well as other security education efforts.]
The criminal inquiry, which hasn’t been acknowledged publicly, is
aimed at discouraging criminals and spies
On Mon, Aug 19, 2013 at 7:09 PM, Bernard Tyers - ei8fdb
ei8...@ei8fdb.org wrote:
On 15 Aug 2013, at 19:09, Kyle Maxwell ky...@xwell.org wrote:
The State is, in general, very jealous about its monopoly on
things like violence and taxation, and (modulo anarchists, many of
whom I love
In those situations, your likely adversary is not your average
hacker (assuming you mean here hacker in the sense of people doing
bad things using the Internet and not people doing cool things, good
or bad :P ).
Instead, you need to model your adversaries according to their
capabilities and
On Wed, Aug 14, 2013 at 5:18 PM, Bernard Tyers - ei8fdb
ei8...@ei8fdb.org wrote:
My issue is with - Hacking is bad when people do it. It's ok when the
government do it.
To play devil's advocate for a moment: isn't that true for a lot of
things? The State is, in general, very jealous about its
On Wed, Aug 14, 2013 at 11:20 AM, Nathan of Guardian
nat...@guardianproject.info wrote:
On 08/14/2013 12:04 PM, Nadim Kobeissi wrote:
The Dalai Lama's Chinese website has been hacked and is now serving
malware to visitors in China:
To be clear, Tibet.net is the website of the Central Tibetan
Zero Degrees of al Qaeda* *
http://www.foreignpolicy.com/articles/2013/08/14/zero_degrees_of_al_qaeda_twitter
How Twitter is supercharging jihadist recruitment*.* BY J.M. BERGER |
AUGUST 14, 2013* *
There's a new jihadist recruiter on the Internet*.* Based in San Francisco
and backed by a
I didn't know LibTech had become the PassLok development mailing list.
On Mon, Aug 12, 2013 at 6:26 PM, Collin Anderson
col...@averysmallbird.com wrote:
The problem with occasionally looking at Huffington Post is that I'm
subjected to such things...
Matt Damon:
He broke up with me, the
Side note: please don't use LibTech as a marketing tool. Occasional
mentions are good, but I feel like you're flagging it a little too
much and too often. Just a friendly note. :)
On Sun, Aug 11, 2013 at 1:10 PM, Francisco Ruiz r...@iit.edu wrote:
Twice again, privacy has taken a hit across the
http://www.theguardian.com/technology/2013/aug/09/bill-gates-google-project-loon
===
Bill Gates criticises Google's Project Loon initiative
Former Microsoft chief says low-income countries need more than just
internet access
===
Google's Project Loon initiative wants to provide internet
OK, so let's say someone needs to invent a USABLE end to end
encrypted email soon.
On Fri, Aug 9, 2013 at 4:40 PM, Andrew Lewis m...@andrewlew.is wrote:
We have it already. People for some reason don't want to use it. Part
of its usability, part of it is laziness. But it can be done.
On Aug
On Fri, Aug 9, 2013 at 10:13 PM, adrelanos adrela...@riseup.net wrote:
Why not post messages to usenet alt.anonymous.messages? It can provide
great properties for privacy and anonymity. You don't need any servers
or to invent any server software. Just use the existing infrastructure.
I've no idea about the capacity, but I will say that, in a general
sense, this is a relatively insecure method of using Tor. Recent
events have highlighted this, naturally, but Tor works best as network
infrastructure where split tunnelling (to borrow a term from VPN
architecture) is not allowed.
Must every app data store reinvent the wheel rather than use operating
system functionality?
On Thu, Aug 8, 2013 at 10:42 AM, R. Jason Cronk r...@privacymaverick.com
wrote:
I'll bite. You design your systems for the threats your users face. As many
have mentioned, the threat most users face is
On Thu, Aug 8, 2013 at 11:01 AM, Patrick Mylund Nielsen
cryptogra...@patrickmylund.com wrote:
On Thu, Aug 8, 2013 at 8:56 AM, Kyle Maxwell ky...@xwell.org wrote:
Must every app data store reinvent the wheel rather than use operating
system functionality?
Agree in theory, but do all
I find it unlikely that it's an NSL per se. That would compel Lavabit
to produce existing business records, and shutting down doesn't
provide any defense against that.
But if the FBI (likely the lead agency on this) tried to compel
Lavabit to weaken its implementation so that they could conduct
Although I agree in principle (in the sense of friendly advice to
Nadim), let's all just remember this same advice the next time
Applebaum goes on one of *his* tirades, shall we?
Now returning to your regularly scheduled rants against The Man.
On Wed, Aug 7, 2013 at 8:29 AM, Joseph Lorenzo Hall
Yay casual sexism... okay, everybody's had their say. I agree with
Nadim's point, but he's made it already, and I agree with those who
say it's time for us all to get back to work.
It's a beautiful day here in Texas and I hope for the same for you
all, wherever you are. I'll be getting back to
https://github.com/cryptocat/cryptocat naturally! :D
On Wed, Aug 7, 2013 at 3:09 PM, Anthony Papillion
anth...@cajuntechie.org wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 08/07/2013 12:10 PM, Nadim Kobeissi wrote:
(Moving on from my very, very expensively made point?)
Dear
No, it really is one of those times, at least for me. :D
On Tue, Aug 6, 2013 at 6:44 AM, Griffin Boyce griffinbo...@gmail.com wrote:
I must admit, it can be entertaining at times. (now is not one of
those times). ;3
Griffin
On 8/6/13, Fabio Pietrosanti (naif) li...@infosecurity.ch wrote:
On Thu, Aug 1, 2013 at 11:26 AM, Julian Oliver jul...@julianoliver.com wrote:
It looks very bogus to me precisely because it's so general, like aspects of
some other slides. Perhaps the slide is a where we want to be in 5 years
rather than what we can do now.
Especially since that deck is
On Tue, Aug 6, 2013 at 10:19 PM, Andy Isaacson a...@hexapodia.org wrote:
We have to move past the bug the user again model of security system
deployment.
In the general sense, yes. Silent automatic updates are a truly good
thing in many use cases and environments.
However, in the case where
So Robert Graham, professional security dude and sometimes friendly
troll, posted a blog article[0] about weaknesses in Tor, centered on
likely attacks by the NSA.
The key, obviously, is the primary assertion that the NSA runs lots
of Tor nodes. I've seen this assertion before, and while it's
Was that formatted so my 86-year-old grandfather could read it?
On Mon, Aug 5, 2013 at 6:11 PM, Lea Shanley lashan...@gmail.com wrote:
Hackathons offer an opportunity to achieve innovation-oriented goals with
limited resources, but require careful planning and organizational
commitment to
According to THN[0] and several linked supporting sites from there
(particularly notable are analyses from Kenneth Buckler[1] and Vlad
Tsyrklevich[2]), the payload delivered the MAC address and Windows
hostname to 65.222.202.54[3]. I've read in public sources that that
address is assigned to SAIC
or maybe a virtual one?
Kirby Plessas
President and CEO
Plessas Experts Network, Inc.
202-684-8101
202-403-3528 (fax)
On Wed, Jul 31, 2013 at 10:20 AM, Kyle Maxwell ky...@xwell.org wrote:
Do you have plans for future efforts to include non-DC-located hackers?
On Wed, Jul 31, 2013 at 9:05 AM
Do you have plans for future efforts to include non-DC-located hackers?
On Wed, Jul 31, 2013 at 9:05 AM, Kirby Plessas ki...@plessas.net wrote:
FreedomHack is a hackathon put together by CommunityRED along with Amnesty
International and Cont3nt.com with the aim of building digital tools to aid
Now available at https://blog.twitter.com/2013/working-to-increase-transparency.
Interesting quote:
An important conversation has begun about the extent to which
companies should be allowed to publish information regarding national
security requests. We have joined forces with industry peers and
Props to you for your honesty and humility here, Nadim. Not everybody
would react that way - you set a fine example in your handling of a
difficult situation.
On Tue, Jul 23, 2013 at 11:46 AM, Nadim Kobeissi na...@nadim.cc wrote:
Libtech,
I urge everyone interested in the latest Decryptocat
Keep an eye out for In-Q-Tel investments in home appliance companies...
On Sun, Jul 14, 2013 at 6:19 PM, Yosem Companys compa...@stanford.edu wrote:
http://news.slashdot.org/story/13/07/13/0012230/mastermind-of-911-attacks-designs-a-secret-vacuum-cleaner
AP reports that while confined to the
How are the two concepts related?
On Thu, Jun 6, 2013 at 4:42 PM, michael gurstein gurst...@gmail.com wrote:
Is this kind of event an argument against net neutrality?
M
From: liberationtech-boun...@lists.stanford.edu
[mailto:liberationtech-boun...@lists.stanford.edu] On Behalf Of Andrés
FWIW, Google has issued a similar blanket (and kinda funny) denial.
http://googleblog.blogspot.com/2013/06/what.html
On Fri, Jun 7, 2013 at 2:20 PM, Andy Isaacson a...@hexapodia.org wrote:
Apologies for replying out of thread and the wide CC list.
On Fri, Jun 07, 2013 at 06:41:32PM +0200,
You could do it with leased lines, but (a) given cost pressures on
airlines, they might choose other options, and (b) as noted earlier,
the information was likely filtered through some non-technical folks
and this was their understanding of a slightly different problem
(network is down - Internet
That sounds more likely to be a bog-standard local DNS or network
issue, depending on where you're connecting from.
On Thu, Jun 6, 2013 at 10:48 AM, Albo P. Fossa a...@apfwebs.com wrote:
Whever I use my imagination to create a URL in the browser bar, especially
those with human names (e.g.,
No, it's really not - there are parts of the US gov (and VZ - I work
there and I feel the same way about all this as anyone here) that
oppose this type of blanket surveillance of an entire society. And if
you think everyone in the government is monolithic about foreign
policy, well, then there's a
I'm particularly curious if you've found anything in your research
here relating these phenomena to malware distribution or other social
attacks (e.g. scams or phishing).
On Sat, Jun 1, 2013 at 7:49 AM, Andrea St and...@gmail.com wrote:
Dear friends,
Two weeks ago we presented at Nexa For
Skype isn't transparent about it - you include a link in a chat and it
looks normal and the people who click on it go directly to the URL
provided. But Microsoft later visits it surreptitiously, despite the
claims that nobody can read your content.
Google is transparent about it - you include a
Excellent, thank you very much for sharing this.
On Wed, May 1, 2013 at 5:48 AM, Christopher Wilson
wil...@theengineroom.org wrote:
Hello all,
There has been some discussion about whatever happened to all the
MobileActive content. Readers of the list may like to know that at least the
Safer
Is the blog hosted on Wordpress.com infrastructure, or does it just
use the Wordpress platform on its own server?
On Sun, Mar 17, 2013 at 6:30 PM, Eric S Johnson cra...@oneotaslopes.org wrote:
Seeking direct contact with any authority at WordPress.com (Matt Mullenweg?
Someone else?) to help
I would be interested in helping as well as joining LibTech en español
--krm
On Mar 5, 2013 10:56 AM, Sandra ordonez sandratordo...@gmail.com wrote:
Looking to connect for Spanish-speaking LibTech community members for a
community initiative. Please reach out to sandraordonez [@] openitp [dot]
-are-the-details-of-wp-engine-security-processes/
--
Kyle Maxwell [krmaxw...@gmail.com]
http://www.xwell.org
Twitter: @kylemaxwell
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
https
. only realize recently that the CA PKI is
irretrievably broken, we're way behind.
--
Kyle Maxwell [krmaxw...@gmail.com]
http://www.xwell.org
Twitter: @kylemaxwell
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your
and sends the 'Kill Packet'. Security issues not
addressed in the sketch would be dealt with in turn.
--
Kyle Maxwell [krmaxw...@gmail.com]
http://www.xwell.org
Twitter: @kylemaxwell
--
Unsubscribe, change to digest, or change password at:
https://mailman.stanford.edu/mailman/listinfo
they use digital and
mobile technology, even though the topics they cover make them even more
vulnerable, a new survey by Freedom House and the International Center for
Journalists finds.
http://ijnet.org/stories/mexicos-most-vulnerable-reporters-lack-digital-security-skills
--
Kyle Maxwell
49 matches
Mail list logo