Another joke, but it's not a bad suggestion:
https://twitter.com/dcuthbert/status/877469739538407424
More on diceware passwords: https://en.wikipedia.org/wiki/Diceware
--
Rick Valenzuela
Videojournalist
Shanghai, China
--
Liberationtech is public & archives are searchable on Google. Violations
On Sun, Feb 19, 2017 at 04:36:02PM -0500, Thomas Delrue wrote:
On 02/19/2017 04:25 PM, Rick Valenzuela wrote:
and maybe the URL for the article linked within the tweet.
Please consider santizing this (i.e. remove the redirection that first
hits twatter) so that they doesn't see that you click
ha! So much for opsec. Should've looked at the CC line.
--
Rick Valenzuela
Videojournalist
Shanghai, China
+86 185 0177 0138
r...@rickv.com
GnuPG ID: 0xD5644029
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
Hello,
at Hermes Center we got a good set of experience in deploying and
customizing GlobaLeaks for Public Agencies and AntiCorruption NGOs (even
if we're mostly known for uses in media-activism and investigative
journalists).
Since we've started cooperating with TI's national chapters and other
Hi all,
does anyone knows of an email provider enabling enforced SMTP/TLS for
inbound MX-received emails?
Assume that i want my provide to refuse email destinated to me, at
inbound Mail Exchanger level, if they are not coming encrypted with
SMTP/TLS, with a decent TLS version and with a decent
Are you interested in making the world a better place by putting your
development skills to use in a globally used free software project?
Do you feel passionate about using web technologies for developing
highly usable web applications?
Then read on – this may interest you!
On 2/19/15 8:23 PM, Yosem Companys wrote:
From: Hille Koskela hille.kosk...@utu.fi
Has anybody done research on surveillance in Africa (South of Sahara)?
You may wish to speak to Opennet Africa (http://opennetafrica.org/) that's
working on that kind of issues too.
--
Fabio Pietrosanti
Hi all,
today when a user need to have some degree of protection for his network
connectivity, for his browser experience, for his data stored and in the
end for his endpoint safety integrity (his computer) there are few
options:
- Tor Browser Bundle (an App)
- Tails (an operating system
On 1/19/15 10:05 AM, Eduardo Robles Elvira wrote:
Hello Fabio:
Do you know about Qubes OS? http://qubes-os.org/ It might be of interest to
you.
Regards,
Eduardo Robles Elvira @edulix skype: edulix2
http://agoravoting.org @agoravoting +34 634 571 634
Qube-Os it's
On 1/14/15 11:51 AM, Marcin de Kaminski wrote:
Dear all,
What do you make of Afrileaks?
http://www.theguardian.com/world/2015/jan/13/wikileaks-for-africa-introducing-afrileaks
https://afrileaks.org/
Yo, as part of the Hermes Center (GlobaLeaks) that's the technology
partner of AfriLeaks,
*
Privacy Enhancing Technology Symposium -July 16-18, 2014
Royal Tropical Institute, Amsterdam, The Netherlands
*
The 14th Privacy Enhancing Technologies Symposium
On 06/05/14 13:37, Fabian Keil wrote:
Caspar Bowden (lists) li...@casparbowden.net wrote:
I downloaded Ponemon/Thales new survey of n=4275 IT managers (United
States, the United Kingdom, Germany, France, Australia, Japan, Brazil,
and Russia) a couple of days ago by registering here
https
I downloaded Ponemon/Thales new survey of n=4275 IT managers (United
States, the United Kingdom, Germany, France, Australia, Japan, Brazil,
and Russia) a couple of days ago by registering here
https://t.co/8rI2Z8vy1j, but they appear to have now pulled the report.
It is remarkable that one
On 04/05/14 17:19, Caspar Bowden (lists) wrote:
I downloaded Ponemon/Thales new survey of n=4275 IT managers (United
States, the United Kingdom, Germany, France, Australia, Japan, Brazil,
and Russia) a couple of days ago by registering here
https://t.co/8rI2Z8vy1j, but they appear to have now
Nope, not attachment either, should have used *link
https://twitter.com/CasparBowden/status/462967989495558144/photo/1/large*
in the first place
CB
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
On 24/04/14 19:21, Zooko Wilcox-OHearn wrote:
On Tue, Apr 22, 2014 at 11:47 AM, Caspar Bowden (lists)
li...@casparbowden.net wrote:
TAHOE is also cool, but doesn't claim to provide confidentiality. A TAHOE
service provider would have no choice but to round-up/backdoor the necessary
keys under
keys, nor to backdoor our customers.
On Thu, Apr 24, 2014 at 6:13 PM, Caspar Bowden (lists)
li...@casparbowden.net wrote:
This is semantics. If you provide the service to a customer, you can be
forced to backdoor
No, this is wrong. I can understand why you say this, because you've
looked at dozens
On 17/04/14 20:29, David Solomonoff wrote:
This blog post was inspired by a recent breakthrough in homomorphic
encryption at MIT:
In 2010 I asked Professor Eben Moglen
https://en.wikipedia.org/wiki/Eben_Moglen to speak to the Internet
Society of New York http://isoc-ny.org about software
On 22/04/14 14:05, Tom Ritter wrote:
On 22 April 2014 07:47, Caspar Bowden (lists) li...@casparbowden.net wrote:
TAHOE is also cool, but doesn't claim to provide confidentiality. A TAHOE
service provider would have no choice but to round-up/backdoor the necessary
keys under existing US (FISA
It's been a remarkable few days for the Committee of European privacy
regulators (the Art.29 Working Party)
In their first opinion on Data Protection law and national security
http://t.co/itKVGpDI1L, they grudgingly sort of admit it is their job
to stop NSA spying, but then the next day they
Please disregard previous, main highlighted link got mangled
=
It's been a remarkable few days for the Committee of European privacy
regulators (the Art.29 Working Party)
In their first opinion on Data Protection law and national security
I recommend this conference (am on PC) - Caspar
---
CALL FOR PAPERS
Ninth International Summer School organised jointly by the IFIP Working Groups
9.2, 9.5, 9.6/11.7, 11.4, 11.6, Special Interest Group 9.2.2
IFIP Summer School on Privacy and Identity Management for the Future
hello Liberation Techers
I was wonder what people think is the current state of IM clients,
particularly Jitsi and Gajim
I know both have had problems is past but today seem to be safer option
than libpurple based cients (Pidgin/Adium). Are they still worth using or
is there anything better?
I wonder if there's a false analogy here. Hypothetically, the
librarian's sign could fall down (maybe the wind blew it over) whereas a
notice on a site would have to be removed via coding. There would be
little other explanation, even in the case where one does not
affirmatively renew the dead
Dear Camino
On 09/04/13 08:39, camino.man...@ec.europa.eu wrote:
It is not out department in charge of blocking Tor users from accessing content
hosted under Europa,eu.
Conversations with the DG In charge (DG DIGIT) as most of you know, have been
long and unfruitful so far.
I am on leave
On 09/01/13 21:49, Michael Rogers wrote:
On 01/09/13 10:00, Caspar Bowden (lists) wrote:
AFAIK Deleuze, Foucault et al. did not say anything specifically
about covert (mass-)surveillance, or analyse how the inherently
secret nature of such organizations might be a causal element in
theories
On 09/01/13 22:21, Guido Witmond wrote:
...
Before the revelations and the subsequent confirmations, many people
would rather believe the old truth (having nothing to hide) than to live
with the new truth that they've been misled.
Truth hurts. That's the reason why so many people claim they
On 09/02/13 08:46, Caspar Bowden (lists) wrote:
On 09/01/13 21:49, Michael Rogers wrote:
...
Wasn't the NSA closer to the panoptic ideal when it was No Such Agency
than now, when we know we're being watched?
Yes, absolutely, but I don't think NSA wanted that, although a grimly
conspiratorial
Many thanks Yosem, Luis Felipe Greg
On 08/31/13 07:14, Luis Felipe R. Murillo wrote:
On 08/30/2013 01:54 PM, Yosem Companys wrote:
From: Caspar Bowden li...@casparbowden.net
I realize this is an improbable request (I think), but is anyone aware of
any Surveillance Studies research on the
So the spying on the rest-of-the-world's data sent to the US, including
information with respect to a foreign-based political organization _or_
foreign territory that _relates_ to the _conduct of the foreign affairs_
of the United States, that's totally fine is it? When the US domestic
spying
On 05/17/13 12:31, Rich Kulawiec wrote:
...
And incidentally, the proffered rationale for this doesn't fly, given
that (a) they're only sending HEAD: actually scanning destination URLs
for malware et.al. would require fetching the whole page and (b) they're
only retrieving HTTPS URLs (per Heise)
...@lists.stanford.edu] on behalf of LISTS
[li...@robertwgehl.org]
Sent: Monday, April 08, 2013 1:45 PM
To: liberationtech@lists.stanford.edu
Subject: Re: [liberationtech] For everyone and their grad students: Fake,
pay-to-publish journals conferences
Or, potentially, university libraries could
32 matches
Mail list logo