On Mon, Jun 17, 2013 at 5:23 PM, Richard Brooks r...@acm.org wrote:
From Guardian QA with Snowden
http://www.guardian.co.uk/world/2013/jun/17/edward-snowden-nsa-files-whistleblower
Is encrypting my email any good at defeating the NSA survelielance? Id
my data protected by standard
This is a really awesome improvement. I tried the new Tor Browser yesterday (OS
X) and loved it. Did not encounter any problems.
Really glad to see such drastic usability improvements for Tor.
NK
On 2013-06-17, at 9:45 AM, Jacob Appelbaum ja...@appelbaum.net wrote:
Hi,
I'm really excited
Certainly they collect less of your data specifically, and thus have less to
leak. Furthermore, they have a smaller amount of users, meaning that they
are unable to do the sort of massive network analysis that facebook et al.
can pull off.
If that is more secure.. Well, considering that the major
I have the same results:
I do not have a Nvidia card.
sfc /verifyonly did not resolve the issue
Setting gfx.direct2d.disabled to true lets it run without setting the
compatibility to Windows XP
Once it is going it looks really great! Excited to try it out.
On Tue, Jun 18, 2013 at 6:10 AM,
John Adams j...@retina.net writes:
scarcasm
I'm completely certain that these small, poorly funded projects have hired
massive security teams (as the major social networks do) and provide a safe
alternative to Facebook or Twitter.
/scarcasm
One compromise at Twitter gave attackers access
On Mon, Jun 17, 2013 at 02:35:36PM -0400, The Doctor wrote:
There is a problem with that: Traffic to and from small providers has
to traverse the networks of the tier-II and tier-I providers to go any
appreciable distance. We already know that at least some of the
peering points are
Why settle for strong enough? Use the strongest options you have at your
disposal.
On Tue, Jun 18, 2013 at 9:02 AM, Helder Ribeiro hel...@gmail.com wrote:
On Mon, Jun 17, 2013 at 5:23 PM, Richard Brooks r...@acm.org wrote:
From Guardian QA with Snowden
..on Mon, Jun 17, 2013 at 07:13:08PM +0200, Anne Roth wrote:
Hi,
Tactical Tech has been getting a lot of questions lately on what to do
to avoid being spied on - like probably most everyone on this list.
We have compiled this 'Quick Guide to Alternatives', based on Security
in-a-box and
On Mon, Jun 17, 2013 at 10:40:23PM +0200, fukami wrote:
Hi,
it's not the first time I hear or read this from Americans: Many people
already gave up discussions about data protection a long time ago. So there
seems a lot of hope that Europeans and especially the Germans with their
This all needs to be viewed in the context of complex and contentious internal
wrangling within the EU over the data protection reform package. What the PRISM
saga does is strengthen the hand of those within the EU advocating for a
stronger new package, and less watering down. To an extent this
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
This might be of interest to people..
http://www.usatoday.com/story/news/politics/2013/06/16/snowden-whistleblower-nsa-officials-roundtable/2428809/
A round-table discussion with Thomas Drake, William Binney and J. Kirk Wiebe.
I thought these
I am pretty sure that I am not the only one thinking that we
(colloquially known as we, the people) need to make ourselves
independent from current power structures ie. governments and
corporations.
Even if you are not an anarchist or similiar you will have to
acknowledge that a centralized
Hi,
Now the new TBB works nicely for me, and I love it. One regret is UI
messages are not translated into Japanese...actually, the messages seems to
be already translated(
https://www.transifex.com/projects/p/torproject/language/ja/), but somehow
it doesn't show up (messages in the installer is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 17/06/13 18:13, Anne Roth wrote:
We have compiled this 'Quick Guide to Alternatives', based on
Security in-a-box and more.
https://alternatives.tacticaltech.org
Hi Anne,
Thanks for making this resource available.
The descriptions of
The claim of end to end encryption give me pause, although I'm also not
clear on the differences between the products and which claim applies to
which. Do they claim the other end is them the provider, or the other user?
It gives me pause because
1) They say they use SSL with CA certs. But if
On 18 June 2013 07:01, Bernard Tyers - ei8fdb ei8...@ei8fdb.org wrote:
I also thought Willliam Binney's view that Edward Snowden was potentially
crossing a line from whistleblower to traitor with the release of information
about the USA's alleged hacking of foreign computer systems is
Decoupling might have been a feasible option in Thomas Jefferson's time
(although they DID create the UNITED States after experimenting with the more
decoupled Articles of Confederation), but somehow in a nation of 300 million,
and a global system heading for 10 billion, I don't see it. At
On 18/06/13 05:46, Yosem Companys wrote:
Since not all applications are malicious, users will be able to enable
Incognito Mode on a per-app basis. The option will be available within
each application’s individual settings.
the first thing that bad apps (at least some) do is syphon out data
Hi Libtech,
Just saw this post a few minutes ago :
http://arabcrunch.com/2013/06/facebook-blocks-log-ins-from-tor-browser-putting-thousands-of-political-activist-at-risk.html
It looks like Facebook doesn't allow connections from Tor Browser
anymore. (Just tried myself and couldn't connect,
I am pretty sure that I am not the only one thinking that we
(colloquially known as we, the people) need to make ourselves
independent from current power structures ie. governments and
corporations.
Even if you are not an anarchist or similiar you will have to
acknowledge that a centralized
Friendica is definitely worth a try. They've done some really
interesting work with privacy controls, access control lists for
communication using public key crypto, etc. Not to mention that it runs
on my Raspberry Pi, among other things.
The idea of small servers, distributed throughout the
Moritz Bartl mor...@torservers.net writes:
On 17.06.2013 21:06, micah wrote:
Do you have any suggestions for what Riseup can do to resolve that
concern for you? I don't disagree with you, I'm just curious about
solutions here.
I am happy to repeat myself, since the issues I have with Riseup
On Tue, 18 Jun 2013 09:40:23 -0400
Bruce Potter at IRF bpot...@irf.org wrote:
in a nation of 300 million, and a global system heading for 10
billion, I don't see it.
I didn't mean decoupling everybody at once. I am talking about
loosening our dependance on them by introducing systems by the
On Tue, Jun 18, 2013 at 12:18:38PM +0300, Michael Azarkevich wrote:
Why settle for strong enough? Use the strongest options you have at your
disposal.
One-time pads are provably strong if done right, but come with
considerable usability disadvantages (but are potentially
worth it if people's
From: Khannea Suntzu khannea.sun...@gmail.com
This is an (admittedly huge) list of words that supposedly cause the
NSA to flag you as a potential terrorist if you over-use them in an
email.
We found this on Reddit, where James Bamford, a veteran reporter with
30 years experience covering the
Speaking of NSA flagging, I thought this piece was very funny ...
http://www.warscapes.com/literature/cryptogams-nsa
On Tue, Jun 18, 2013 at 7:59 AM, Yosem Companys compa...@stanford.eduwrote:
From: Khannea Suntzu khannea.sun...@gmail.com
This is an (admittedly huge) list of words that
On Tue, Jun 18, 2013 at 07:59:08AM -0700, Yosem Companys wrote:
From: Khannea Suntzu khannea.sun...@gmail.com
This is an (admittedly huge) list of words that supposedly cause the
NSA to flag you as a potential terrorist if you over-use them in an
email.
You may want to peruse this entire
Well, real men don't eat quiche, so that one makes sense.
But Pixar?
I'm definitely flagged.
Is there a link to this somewhere?
On Tue, Jun 18, 2013 at 11:14 AM, Joss Wright
joss-liberationt...@pseudonymity.net wrote:
On Tue, Jun 18, 2013 at 07:59:08AM -0700, Yosem Companys wrote:
From:
While I can't speak to the veracity of *this* list in particular, the
list of DHS keywords is worth a look:
http://www.scribd.com/doc/82701103/Analyst-Desktop-Binder-REDACTED
~Griffin
--
Just another hacker in the City of Spies.
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de
My
FYI, this keyword list is at least about 12/13 years old. See:
http://www.theregister.co.uk/2001/05/31/what_are_those_words/
On 18 June 2013 15:59, Yosem Companys compa...@stanford.edu wrote:
From: Khannea Suntzu khannea.sun...@gmail.com
This is an (admittedly huge) list of words that
Interesting blog post:
http://mazzintblog.afcea.org/2013/06/18/nsa-can-you-hear-me-now/
Best,
Andrë
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
Yeah, I just saw that too.
Would be interesting anyway to know why and how it happened exactly --
as it could happen again, I suppose.
Le 18/06/2013 17:42, Wassim Ben Ayed a écrit :
Hi Libtech,
Just saw this post a few minutes ago :
http://www.reddit.com/user/JimBamford
In case you haven't read his books, go read his books.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
Hi
any help for the details in the comparison of Tor Browser Bundle
old Version:
https://sourceforge.net/projects/torbrowser/
new Version:
https://people.torproject.org/~mikeperry/tbb-3.0alpha1-builds/official/
I think the new one looks great, I just searched for the Start and Stop
button.
It
On Tue, 18 Jun 2013 09:40:23 -0400
Bruce Potter at IRF bpot...@irf.org wrote:
in a nation of 300 million, and a global system heading for 10
billion, I don't see it.
I didn't mean decoupling everybody at once. I am talking about
loosening our dependance on them by introducing systems by the
- Forwarded message from Ron Teitelbaum r...@3dicc.com -
Date: Tue, 18 Jun 2013 11:45:07 -0400
From: Ron Teitelbaum r...@3dicc.com
To: openq...@googlegroups.com
Cc: t...@ritter.vg
Subject: RE: [liberationtech] security aspects of OpenQwaq
X-Mailer: Microsoft Outlook 14.0
Reply-To:
Hi,
On 18.06.2013 17:50, Randolph D. wrote: old Version:
https://sourceforge.net/projects/torbrowser/
This is not an old version. It was never official, and the author has
no interest in talking to the Tor developer team, or writing a detailed
spec such as
- Forwarded message from Matthew Bailey matthew_bai...@mac.com -
Date: Tue, 18 Jun 2013 09:47:50 -0700
From: Matthew Bailey matthew_bai...@mac.com
To: technoprogress...@yahoogroups.com
Subject: Re: [tp] NSA flag terms
X-Mailer: Apple Mail (2.1508)
Reply-To:
New Tor browser version is working great on OS X.
Have any of you folks heard about and/or verified that Facebook is blocking
logins from Tor?
http://www.wamda.com/2013/06/facebook-blocks-tor
BTW, hi everyone. I just joined the list. I work with Nick Merrill at Calyx
Institute on community
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/17/2013 10:53 PM, Eric S Johnson wrote:
Agreed. Even my 13-year-old's using it. I do wish something as easy
existed for MS Outlook users. Symantec Desktop Encryption works
well and is much more powerful but is also much harder to use
Hi everyone (first post),
I am pretty sure most of that list has been around since the late 90s at
least - I remember many of them from Jam Echelon Day in 1999.
Incidentally, if anyone is interested in a little Jam Echelon Day history
you can read the hactivism e-mail list (which the JED idea
Have you guys seen this?
https://encipher.it/
I've searched through the archives but didn't see anything. I'm wondering
how safe this is.
It has received some small attention on the media before.
http://www.pcworld.com/article/255938/encipher_it_encrypts_email_for_free.html
Thoughts?
--
It's not safe.
This is their bookmarklet:
(function(){document.body.appendChild(document.createElement('script')).src='
https://encipher.it/javascripts/inject.js';})();
That loads a JavaScript file from the encipher.it site, which can be
changed at any time and compromise your messages without
why does everyone want to trust yet another third party to encrypt data
on their behalf :)?
if u want to encrypt stuff, u should do it on ur machine. Maybe what
people should be searching for is an easy-to-use, audited and open
source stack to do it.
if we are too lazy to do it ourselves and
hi,
Privacy activists just held a protest at the well-known Berlin Wall
crossing point Checkpoint Charlie in Berlin. As President Barack Obama
prepares to arrive in the german capital, the protest critizised
excessive NSA surveillance and the Prism programme. The call from
digital rights NGO
Wasabee wasabe...@gmail.com wrote:
why does everyone want to trust yet another third party to encrypt data
on their behalf :)?
We're all relying on someone else's code to some extent, which is why I
fully support approaching groups of knowledgeable people for their input. :D
~Griffin
--
Agreed,
Security is all about trust. If you install pgp in debian you are
trusting package maintainers, package server administrators, whoever
most recently patched pgp code, the debian OS, the hardware that your
computer is running and the other applications running on your OS.
Most people don't
Jacob Appelbaum:
Hi,
I'm really excited to say that Tor Browser has had some really important
changes. Mike Perry has really outdone himself - from deterministic
builds that allow us to verify that he is honest to actually having
serious usability improvements.
First, thanks for the
I find it hard to believe the list is authentic. It has words like Java,
Quiche and Redheads for gods sake. Also, they misspelled the name of
the Israeli equivalent of the Navy SEALS (They wrote Shayet-13 instead of
Shayetet-13).
The NSA aren't stupid, they're running the biggest spying operation
I recommend reading Fred Turner's *From Counterculture to Cyberculture* for
interesting context on the ideological connection between sustainable
independent communities and tech culture.
Long story short, in the 70's the Whole Earth Catalog connected
back-to-land communes with recent tech
50 matches
Mail list logo