On 09/05/14 02:31, Anthony Papillion wrote:
On 05/08/2014 08:23 PM, Doug Schuler wrote:
Realistically we need to develop an entire suite of publicly owned
tools. Could the development and implementation be massively
distributed?
Or is it over? We lost all the other media
In just
On 08/05/14 14:05, Nariman Gharib wrote:
Hey all,
Just I want to remind you, Gmail is keeping your chat history even you enable
the OTR on your gmail chat.
how? if you going to plus.google.com http://plus.google.com and on the top
right side of the page you click on the Hangout, and
On 02/04/14 22:57, Maxim Kammerer wrote:
On Wed, Apr 2, 2014 at 10:33 PM, Steve Weis stevew...@gmail.com wrote:
As an epilogue, the Telegram client misused a non-secure random number
generator mrand48 for the keys used in their contest. A student, Thijs
Alkemade, was able to recover their keys
On 20/03/14 07:55, Maxim Kammerer wrote:
On Thu, Mar 20, 2014 at 4:04 AM, Ximin Luo infini...@pwned.gg wrote:
Welcome to 2014. Telegram has more of these, more severe, more obvious, and
from further in the past. OTR also did not claim they were secure because it
was written by a team of PhDs
On 19/03/14 16:14, Maxim Kammerer wrote:
On Wed, Mar 19, 2014 at 5:25 PM, Tony Arcieri basc...@gmail.com wrote:
Rather than admitting their mistake, Telegram doubled down on their bad
crypto, and began making claims that it's the cryptographic community, not
themselves, who don't know what
On 20/03/14 01:54, Maxim Kammerer wrote:
On Thu, Mar 20, 2014 at 3:21 AM, Ximin Luo infini...@pwned.gg wrote:
The stuff the developer posted in the other fork of this thread is really
something. I wish we had a cryptographic equivalent of funroll-loops.info.
This is just the key exchange
On 04/10/13 16:42, Griffin Boyce wrote:
There are some questions in my mind as to the legitimacy of this
document -- particularly given that a slide is marked 2007, but
references 2012. (In particular, neither Torservers nor TorButton
existed in 2007).
I take it you mean this from the first
On 05/10/13 16:31, John Adams wrote:
On Oct 5, 2013, at 12:17 AM, Andy Isaacson a...@hexapodia.org wrote:
I wonder if tor.eff.org has any referer logs from 2006 showing inbound
traffic from http://wiki.gchq/ or similar.
.gchq isn't an Internet TLD, so
That's doubtful.
-j
On 05/09/13 21:10, Richard Brooks wrote:
There is a massive difference between cryptanalysis and decade-long,
well-funded, and top-secret program to subtly weaken international
cryptographic protocols and sabotage industry implementations.
Their job is to collect information for the
On 23/08/13 09:53, DC wrote:
Hi everyone,
I'm DC, and I've been lurking here for a few weeks :)
Since the NSA leaks, I've been inspired to work on an old dream: end-to-end
encrypted email.
One difficult problem in public-key encryption is key exchange: how to get a
recipient's public
On 23/08/13 00:02, elijah wrote:
On 08/22/2013 01:22 AM, Ben Laurie wrote:
So where are these radically new services documented?
On 08/22/2013 11:50 AM, Sean Alexandre wrote:
From what I understand it's this:
LEAP Encryption Access Project
https://leap.se
You are right to be
On 11/08/13 22:28, Nadim Kobeissi wrote:
On 2013-08-11, at 10:36 PM, danimoth danim...@cryptolab.net wrote:
On 11/08/13 at 01:10pm, Francisco Ruiz wrote:
Twice again, privacy has taken a hit across the land. Lavabit and Silent
Mail are gone, and to quote Phil Zimmermann, “the writing is on
On 12/08/13 14:02, Ben Laurie wrote:
On 12 August 2013 06:14, Ximin Luo infini...@gmx.com wrote:
How is it possible to defend against timing attacks in JS? Any language
theoretically can be complied into anything, but the JS runtime does not
give you much control in what the CPU actually
On 11/08/13 20:36, danimoth wrote:
On 11/08/13 at 01:10pm, Francisco Ruiz wrote:
Twice again, privacy has taken a hit across the land. Lavabit and Silent
Mail are gone, and to quote Phil Zimmermann, “the writing is on the wall”
for any other encrypted email provider located in US territory.
+1, especially since we are trying to promote the idea that crypto is *not*
just for terrorists.
If you are trying to make the point that by the govt's definition we are all
terrorists then at least say so somewhere clearly and intelligently (i.e. not
a wall of text that everyone will skip),
+1 for source. Since crypto is hard to get right, it could definitely do with
more eyes fixing things and refining the explanations to be clearer. The
cryptoparty handbook[1] shares a similar goal. I have various concerns about
the quality of the content with little time to review it properly,
16 matches
Mail list logo