Dear Andrew,
It is not out department in charge of blocking Tor users from accessing content
hosted under Europa,eu.
Conversations with the DG In charge (DG DIGIT) as most of you know, have been
long and unfruitful so far.
I am on leave now but at my return I will retake conversations with
Dear all,
And now the full EC link, for all those ones, like our friends in CN for
instance, where bitly is blocked
http://ec.europa.eu/digital-agenda/en/news/smart-2013n004-—-european-capability-situational-awareness
Thanks Erik J. for the warning.
Seems we do really have a problem with
Dear Camino
On 09/04/13 08:39, camino.man...@ec.europa.eu wrote:
It is not out department in charge of blocking Tor users from accessing content
hosted under Europa,eu.
Conversations with the DG In charge (DG DIGIT) as most of you know, have been
long and unfruitful so far.
I am on leave
Caspar Bowden (lists) li...@casparbowden.net wrote
Wed, 04 Sep 2013 10:13:45 +0100:
| *) Is there an official channel (web page? email?) for individuals to
| complain about this policy ? (there's only a general email here
| http://ec.europa.eu/dgs/informatics/contact/index_en.htm and
|
Dear all,
Apologies for bombarding you with so many emails, but again, for those of you
having trouble accessing the content of the links because you receive a
response of this like internal commission content, please access from
- Forwarded message from John Young j...@pipeline.com -
Date: Tue, 03 Sep 2013 19:04:39 -0400
From: John Young j...@pipeline.com
To: cypherpu...@cpunks.org
Subject: Re: Safest exit country?
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Look for gaps in global and national systems.
LibTech
Earlier this year (January 2013) there was some discussion on this list about
possible FinFisher in Turkmenistan.
Citizen Lab research had earlier identified evidence of a C2 server in
Turkmenistan.
Apropos of that discussion, among the Wikileaks documents released today is a
Gamma
Special Issue Call for Papers
Communication Theory special issue on
Communication for Social Change
Guest editors: Jan Servaes and Karin Wilkins
Submission deadline: February 1, 2014
Advocacy and communication for social change have been interpreted and
applied in different ways across
This outlines my experience yesterday at the border.
http://falkvinge.net/2013/09/04/open-letter-to-us-border-patrol-cbp/
tl;dr - because I am the leader of a Canadian political party I might be a
terrorist--
Liberationtech is a public list whose archives are searchable on Google.
Violations
http://www.wired.com/threatlevel/2013/09/nsa-router-hacking/
NSA Laughs at PCs, Prefers Hacking Routers and Switches
BY KIM ZETTER09.04.136:30 AM
Photo: Santiago Cabezas/Flickr
The NSA runs a massive, full-time hacking operation targeting foreign
systems, the latest leaks from Edward Snowden
I'm interested in testing the vulnerability to an outside attacker of some
of our organization's protected data. I'd like to try not just
network-based attacks but also probe for human weaknesses in our security
regime. We've contracted before for software reviews and system audits, but
I've never
On Tue, Aug 20, 2013 at 12:27:24PM -0400, Matt Holland wrote:
Rich: We actually do run our email lists in-house, sent from our own MTA's,
with appropriate SPF records, DKIM signature, list-precedence headers, etc.
etc. Our message to members was focused on getting into a particular tab
at
From Travis McCrea:
This outlines my experience yesterday at the border.
http://falkvinge.net/2013/09/04/open-letter-to-us-border-patrol-cbp/
tl;dr - because I am the leader of a Canadian political party I might be a
terrorist
Hi Travis,
Sorry to hear your repeated experiences. Its good to
This is very interesting.
One distinction that I think is worth pondering though: it seems like the
standard of serious about email is in conflict with the goal of
frequently communicating with 20M supporters.
If Avaaz has to choose between the former and the latter, I imagine they'd
choose the
Curious on people's comments on types of routers, firewalls and other
appliances that might be affected as well as mitigation strategies. Would
installing a pfsense and/or other open source firewall be helpful in anyway at
a home net location?
--
R. Guerra
Phone/Cell: +1 202-905-2081
While slingshots didn't exist, slings did (which is what the story means)
and they they do basically the same thing but using different mechanics.
Slings are very old and David certainly could have had one. -
https://en.wikipedia.org/wiki/Sling_%28weapon%29
-Charles
On Tue, Aug 27, 2013
Marshall Ganz talks about the David and Goliath story in terms of social
movements.
Sometimes the person or group with fewer resources wins…
http://inthesetimes.com/article/4552/why_david_sometimes_wins
Veracode will gladly pwn you.
On Thursday, September 5, 2013, Matt Holland wrote:
I'm interested in testing the vulnerability to an outside attacker of some
of our organization's protected data. I'd like to try not just
network-based attacks but also probe for human weaknesses in our security
On Wed, 4 Sep 2013 20:33:09 -0400
Robert Guerra rgue...@privaterra.org wrote:
Curious on people's comments on types of routers, firewalls and
other appliances that might be affected as well as mitigation
strategies. Would installing a pfsense and/or other open source
firewall be helpful in
On Wed, Sep 4, 2013 at 7:33 PM, Robert Guerra rgue...@privaterra.org wrote:
Curious on people's comments on types of routers, firewalls and other
appliances that might be affected as well as mitigation strategies. Would
installing a pfsense and/or other open source firewall be helpful in
Well their core business is SIGINT. it's only logical for this to be the
focus.
I don't see how this is surprising.
On Thursday, September 5, 2013, Tom Ritter wrote:
On Wed, Sep 4, 2013 at 7:33 PM, Robert Guerra
rgue...@privaterra.orgjavascript:;
wrote:
Curious on people's comments on
Tom Ritter t...@ritter.vg writes:
I *think* that app stores take a binary you upload and run their
static and dynamic checks on that. They then publish that binary
without modification. (Indeed, how could they modify it? You sign it
with your key.) In that case, I think a verifiable build
Individuals on the SDN list can be searched here:
http://sdnsearch.ofac.treas.gov/default.aspx
On Tue, Sep 3, 2013 at 11:45 AM, Amin Sabeti aminsab...@gmail.com wrote:
Then can we say FB can block the Iran's Supreme Leader page or the Rouhani
one?
Sent from my iPhone
On 3 Sep 2013, at
Is this spam?
On Wed, Sep 4, 2013 at 12:11 PM, Aaron Brokmeier
aaronbrokme...@yahoo.comwrote:
Hello All!
Some of you may already be using these sites, but if not, I urge you to
check out the following:
Ravetree (www.ravetree.com) - A Social Network Built On Privacy
DuckDuckGo
Aaron,
Are you associated with any of these products and are asking for advice or
other assistance?
Otherwise, hard sells of products or services aren't allowed on this list,
per our guidelines. For more info, please see
https://mailman.stanford.edu/mailman/listinfo/liberationtech.
Best,
25 matches
Mail list logo