Certainly they collect less of your data specifically, and thus have less to
leak. Furthermore, they have a smaller amount of users, meaning that they
are unable to do the sort of massive network analysis that facebook et al.
can pull off.
If that is "more secure".. Well, considering that the majo
I have the same results:
I do not have a Nvidia card.
"sfc /verifyonly" did not resolve the issue
Setting gfx.direct2d.disabled to true lets it run without setting the
compatibility to Windows XP
Once it is going it looks really great! Excited to try it out.
On Tue, Jun 18, 2013 at 6:10 AM, Na
John Adams writes:
>
>
> I'm completely certain that these small, poorly funded projects have hired
> massive security teams (as the major social networks do) and provide a safe
> alternative to Facebook or Twitter.
>
>
One compromise at Twitter gave attackers access to a slew of login
details
On Mon, Jun 17, 2013 at 02:35:36PM -0400, The Doctor wrote:
> There is a problem with that: Traffic to and from small providers has
> to traverse the networks of the tier-II and tier-I providers to go any
> appreciable distance. We already know that at least some of the
> peering points are backd
Why settle for "strong enough"? Use the strongest options you have at your
disposal.
On Tue, Jun 18, 2013 at 9:02 AM, Helder Ribeiro wrote:
> On Mon, Jun 17, 2013 at 5:23 PM, Richard Brooks wrote:
> >
> > From Guardian Q&A with Snowden
> >
> >
> http://www.guardian.co.uk/world/2013/jun/17/edwa
..on Mon, Jun 17, 2013 at 07:13:08PM +0200, Anne Roth wrote:
> Hi,
>
> Tactical Tech has been getting a lot of questions lately on what to do
> to avoid being spied on - like probably most everyone on this list.
>
> We have compiled this 'Quick Guide to Alternatives', based on Security
> in-a-box
On Mon, Jun 17, 2013 at 10:40:23PM +0200, fukami wrote:
> Hi,
>
> it's not the first time I hear or read this from Americans: Many people
> already gave up discussions about data protection a long time ago. So there
> seems a lot of hope that Europeans and especially the Germans with their
> le
This all needs to be viewed in the context of complex and contentious internal
wrangling within the EU over the data protection reform package. What the PRISM
saga does is strengthen the hand of those within the EU advocating for a
stronger new package, and less watering down. To an extent this
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
This might be of interest to people..
http://www.usatoday.com/story/news/politics/2013/06/16/snowden-whistleblower-nsa-officials-roundtable/2428809/
A round-table discussion with Thomas Drake, William Binney and J. Kirk Wiebe.
I thought these videos
I am pretty sure that I am not the only one thinking that we
(colloquially known as "we, the people") need to make ourselves
independent from current power structures ie. governments and
corporations.
Even if you are not an anarchist or similiar you will have to
acknowledge that a centralized gove
Hi,
Now the new TBB works nicely for me, and I love it. One regret is UI
messages are not translated into Japanese...actually, the messages seems to
be already translated(
https://www.transifex.com/projects/p/torproject/language/ja/), but somehow
it doesn't show up (messages in the installer is t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 17/06/13 18:13, Anne Roth wrote:
> We have compiled this 'Quick Guide to Alternatives', based on
> Security in-a-box and more.
>
> https://alternatives.tacticaltech.org
Hi Anne,
Thanks for making this resource available.
The descriptions of RedP
The claim of end to end encryption give me pause, although I'm also not
clear on the differences between the products and which claim applies to
which. Do they claim the other end is them the provider, or the other user?
It gives me pause because
1) They say they use SSL with CA certs. But if Jo
On 18 June 2013 07:01, Bernard Tyers - ei8fdb wrote:
> I also thought Willliam Binney's view that Edward Snowden was potentially
> crossing a line from whistleblower to traitor with the release of information
> about the USA's alleged hacking of foreign computer systems is interesting.
> Is he
Decoupling might have been a feasible option in Thomas Jefferson's time
(although they DID create the UNITED States after experimenting with the more
decoupled "Articles of Confederation), but somehow in a nation of 300 million,
and a global system heading for 10 billion, I don't see it. At lea
On 18/06/13 05:46, Yosem Companys wrote:
Since not all applications are malicious, users will be able to enable
Incognito Mode on a per-app basis. The option will be available within
each application’s individual settings.
the first thing that bad apps (at least some) do is syphon out data
right
Hi Libtech,
Just saw this post a few minutes ago :
http://arabcrunch.com/2013/06/facebook-blocks-log-ins-from-tor-browser-putting-thousands-of-political-activist-at-risk.html
It looks like Facebook doesn't allow connections from Tor Browser
anymore. (Just tried myself and couldn't connect, indeed
I am pretty sure that I am not the only one thinking that we
(colloquially known as "we, the people") need to make ourselves
independent from current power structures ie. governments and
corporations.
Even if you are not an anarchist or similiar you will have to
acknowledge that a centralized gove
Friendica is definitely worth a try. They've done some really
interesting work with privacy controls, access control lists for
communication using public key crypto, etc. Not to mention that it runs
on my Raspberry Pi, among other things.
The idea of small servers, distributed throughout the worl
Moritz Bartl writes:
>On 17.06.2013 21:06, micah wrote:
>> Do you have any suggestions for what Riseup can do to resolve that
>> concern for you? I don't disagree with you, I'm just curious about
>> solutions here.
>
>I am happy to repeat myself, since the issues I have with Riseup have
>not been
On Tue, 18 Jun 2013 09:40:23 -0400
Bruce Potter at IRF wrote:
> in a nation of 300 million, and a global system heading for 10
> billion, I don't see it.
I didn't mean decoupling everybody at once. I am talking about
loosening our dependance on them by introducing systems by the people
for the p
On Tue, Jun 18, 2013 at 12:18:38PM +0300, Michael Azarkevich wrote:
> Why settle for "strong enough"? Use the strongest options you have at your
> disposal.
One-time pads are provably strong if done right, but come with
considerable usability disadvantages (but are potentially
worth it if people's
From: Khannea Suntzu
This is an (admittedly huge) list of words that supposedly cause the
NSA to flag you as a potential terrorist if you over-use them in an
email.
We found this on Reddit, where James Bamford, a veteran reporter with
30 years experience covering the NSA, is answering questions
Speaking of NSA flagging, I thought this piece was very funny ...
http://www.warscapes.com/literature/cryptogams-nsa
On Tue, Jun 18, 2013 at 7:59 AM, Yosem Companys wrote:
> From: Khannea Suntzu
>
> This is an (admittedly huge) list of words that supposedly cause the
> NSA to flag you as a pot
On Tue, Jun 18, 2013 at 07:59:08AM -0700, Yosem Companys wrote:
> From: Khannea Suntzu
>
> This is an (admittedly huge) list of words that supposedly cause the
> NSA to flag you as a potential terrorist if you over-use them in an
> email.
>
> You may want to peruse this entire list yourself, but
Well, real men don't eat quiche, so that one makes sense.
But "Pixar"?
I'm definitely flagged.
Is there a link to this somewhere?
On Tue, Jun 18, 2013 at 11:14 AM, Joss Wright <
joss-liberationt...@pseudonymity.net> wrote:
> On Tue, Jun 18, 2013 at 07:59:08AM -0700, Yosem Companys wrote:
> > F
While I can't speak to the veracity of *this* list in particular, the
list of DHS keywords is worth a look:
http://www.scribd.com/doc/82701103/Analyst-Desktop-Binder-REDACTED
~Griffin
--
Just another hacker in the City of Spies.
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de
My posts,
FYI, this keyword list is at least about 12/13 years old. See:
http://www.theregister.co.uk/2001/05/31/what_are_those_words/
On 18 June 2013 15:59, Yosem Companys wrote:
> From: Khannea Suntzu
>
> This is an (admittedly huge) list of words that supposedly cause the
> NSA to flag you as a potent
Interesting blog post:
http://mazzintblog.afcea.org/2013/06/18/nsa-can-you-hear-me-now/
Best,
Andrë
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
https://mailman.stanford.edu/mailman/listinfo/lib
> Hi Libtech,
>
> Just saw this post a few minutes ago :
> http://arabcrunch.com/2013/06/facebook-blocks-log-ins-from-tor-browser-putting-thousands-of-political-activist-at-risk.html
>
> It looks like Facebook doesn't allow connections from Tor Browser
> anymore. (Just tried myself and couldn't co
Yeah, I just saw that too.
Would be interesting anyway to know why and how it happened exactly --
as it could happen again, I suppose.
Le 18/06/2013 17:42, Wassim Ben Ayed a écrit :
>
>> Hi Libtech,
>>
>> Just saw this post a few minutes ago :
>> http://arabcrunch.com/2013/06/facebook-blocks-log-
http://www.reddit.com/user/JimBamford
In case you haven't read his books, go read his books.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
https://mailman.stanford.edu/mailman/listinfo/liberation
Hi
any help for the details in the comparison of Tor Browser Bundle
old Version:
https://sourceforge.net/projects/torbrowser/
new Version:
https://people.torproject.org/~mikeperry/tbb-3.0alpha1-builds/official/
I think the new one looks great, I just searched for the Start and Stop
button.
It
On Tue, 18 Jun 2013 09:40:23 -0400
Bruce Potter at IRF wrote:
> in a nation of 300 million, and a global system heading for 10
> billion, I don't see it.
I didn't mean decoupling everybody at once. I am talking about
loosening our dependance on them by introducing systems by the people
for the p
- Forwarded message from Ron Teitelbaum -
Date: Tue, 18 Jun 2013 11:45:07 -0400
From: Ron Teitelbaum
To: openq...@googlegroups.com
Cc: t...@ritter.vg
Subject: RE: [liberationtech] security aspects of OpenQwaq
X-Mailer: Microsoft Outlook 14.0
Reply-To: openq...@googlegroups.com
Hi Tom,
Hi,
On 18.06.2013 17:50, Randolph D. wrote:> old Version:
> https://sourceforge.net/projects/torbrowser/
This is not an "old version". It was never official, and the author has
no interest in talking to the Tor developer team, or writing a detailed
spec such as https://www.torproject.org/projects
- Forwarded message from Matthew Bailey -
Date: Tue, 18 Jun 2013 09:47:50 -0700
From: Matthew Bailey
To: technoprogress...@yahoogroups.com
Subject: Re: [tp] NSA flag terms
X-Mailer: Apple Mail (2.1508)
Reply-To: technoprogress...@yahoogroups.com
I am pretty impressed by the list. But pr
New Tor browser version is working great on OS X.
Have any of you folks heard about and/or verified that Facebook is blocking
logins from Tor?
http://www.wamda.com/2013/06/facebook-blocks-tor
BTW, hi everyone. I just joined the list. I work with Nick Merrill at Calyx
Institute on community en
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/17/2013 10:53 PM, Eric S Johnson wrote:
> Agreed. Even my 13-year-old's using it. I do wish something as easy
> existed for MS Outlook users. Symantec Desktop Encryption works
> well and is much more powerful but is also much harder to use
> (be
Hi everyone (first post),
I am pretty sure most of that list has been around since the late 90s at
least - I remember many of them from "Jam Echelon Day" in 1999.
Incidentally, if anyone is interested in a little Jam Echelon Day history
you can read the hactivism e-mail list (which the JED idea e
Have you guys seen this?
https://encipher.it/
I've searched through the archives but didn't see anything. I'm wondering
how safe this is.
It has received some small attention on the media before.
http://www.pcworld.com/article/255938/encipher_it_encrypts_email_for_free.html
Thoughts?
--
*Lor
It's not safe.
This is their bookmarklet:
(function(){document.body.appendChild(document.createElement('script')).src='
https://encipher.it/javascripts/inject.js';})();
That loads a JavaScript file from the encipher.it site, which can be
changed at any time and compromise your messages without yo
why does everyone want to trust yet another third party to encrypt data
on their behalf :)?
if u want to encrypt stuff, u should do it on ur machine. Maybe what
people should be searching for is an easy-to-use, audited and open
source stack to do it.
if we are too lazy to do it ourselves and wan
hi,
Privacy activists just held a protest at the well-known Berlin Wall
crossing point Checkpoint Charlie in Berlin. As President Barack Obama
prepares to arrive in the german capital, the protest critizised
excessive NSA surveillance and the Prism programme. The call from
digital rights NGO
Wasabee wrote:
> why does everyone want to trust yet another third party to encrypt data
> on their behalf :)?
>
We're all relying on someone else's code to some extent, which is why I
fully support approaching groups of knowledgeable people for their input. :D
~Griffin
--
Too many emails? U
Agreed,
Security is all about trust. If you install pgp in debian you are
trusting package maintainers, package server administrators, whoever
most recently patched pgp code, the debian OS, the hardware that your
computer is running and the other applications running on your OS.
Most people don't
Jacob Appelbaum:
> Hi,
>
> I'm really excited to say that Tor Browser has had some really important
> changes. Mike Perry has really outdone himself - from deterministic
> builds that allow us to verify that he is honest to actually having
> serious usability improvements.
First, thanks for the
I find it hard to believe the list is authentic. It has words like "Java",
"Quiche" and "Redheads" for gods sake. Also, they misspelled the name of
the Israeli equivalent of the Navy SEALS (They wrote "Shayet-13" instead of
"Shayetet-13").
The NSA aren't stupid, they're running the biggest spying
I recommend reading Fred Turner's *From Counterculture to Cyberculture* for
interesting context on the ideological connection between sustainable
independent communities and tech culture.
Long story short, in the 70's the Whole Earth Catalog connected
back-to-land communes with recent tech researc
>From: Mike Perry
>To: liberationtech
>Sent: Tuesday, June 18, 2013 11:54 PM
>Subject: [liberationtech] Deterministic builds and software trust [was: Help
>test Tor Browser!]
[...]
>This is where deterministic builds come in: any individual can use our
50 matches
Mail list logo