Ah, yes, those expensive man-hours. Security is so much easier when you don't
give it time and attention. It also doesn't work.
-Bill
On Feb 28, 2013, at 8:09, anonymous2...@nym.hush.com
anonymous2...@nym.hush.com wrote:
I knew this was coming at some point. Yes I
Can we please get back to the issue at hand
On Thu, 28 Feb 2013 13:16:03 + Bill Woodcock wo...@pch.net
wrote:
Ah, yes, those expensive man-hours. Security is so much easier
when you don't give it time and attention. It also doesn't work.
-Bill
On Feb 28, 2013,
On Thu, Feb 28, 2013 at 02:19:11PM +0100, Ruben Bloemgarten wrote:
It seems I might have jumped the gun, assuming the discussion was about
voting systems for use in political elections. Disclosing all voter
data, including voter identity would solve much if not all issues
regarding
Sorry, thought you'd asked for advice about the best possible way to do it.
Didn't realize you meant best possible with no time or attention. But, wait,
that's not quite it either, is it? You meant that you don't want to invest
_your_ time and attention, but you think people on the list can
Frankly your whats wrong with a small minority of the people on
LibTech. NGO's have to balance cost, security, people, user needs,
current infrastructure, software/hardware donation programs, man
hours etc etc...Every idiot knows Linux is more secure in many ways
than Windows yet sometimes
..on Thu, Feb 28, 2013 at 01:08:54PM +, anonymous2...@nym.hush.com wrote:
I knew this was coming at some point. Yes I am starting with
Windows, it's more functional (awaits incoming) and costs less in
terms of expensive man hours (the hidden cost vs software) for an
Linux guru to run
On 28 February 2013 07:39, anonymous2...@nym.hush.com wrote:
Hi,
We are a human rights NGO that is looking to invest in the best
possible level of network security (protection from high-level
cyber-security threats, changing circumvention/proxy to protect IP
address etc, encryption on
Thanks excellent advice - much to think about.
On Thu, 28 Feb 2013 14:09:39 + Tom Ritter t...@ritter.vg
wrote:
On 28 February 2013 07:39, anonymous2...@nym.hush.com wrote:
Hi,
We are a human rights NGO that is looking to invest in the best
possible level of network security (protection
On Thu, Feb 28, 2013 at 01:43:38PM +, anonymous2...@nym.hush.com wrote:
Every idiot knows Linux is more secure in many ways
than Windows yet sometimes other factors come into play that
require the use of MS.
No. MS is never required. I've heard that contention for decades and
it's
drone_guinness1 borgnet:
...end users using Linux :-D (good one)
so you say that android users aren't end users?
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
Speaking of GUNE/Linux operating systems, I am personally a big fan of
LiveCDs such as Tails (https://tails.boum.org/), where you don't need to
install any software on a computer and loose all data (almost all data)
on a reboot.
Journalists, activists in high risk countries can have multiple
I want to be dropped from subscription but have forgotten my password. Please
advise.
-Original Message-
From: x z xhzh...@gmail.com
To: liberationtech liberationtech@lists.stanford.edu
Sent: Fri, Feb 8, 2013 2:17 pm
Subject: Re: [liberationtech] The Myopia of excluding censors: The
Thanks, yes I also have seen young and old people use linux but I've also seen
hundreds of people trained to use it and as soonas they have to update a
package in Linux, get confused and reach for a windows machine. The NGO in a
box stuff is ok but not what I am asking about at all, I'm
So organizations get compromised by well-meaning users who click on a
link in an email or slip up and use an insecure connection, and while
we can ameloriate that to a certain extent with code, we really need
to think more about how to make it easier for users to make the
right choices versus
May be of interest. Document was recently updated. See:
http://stanford.edu/group/univ-librarian/2013_Copyright_Reminder.pdf
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
On Thu, Feb 28, 2013 at 5:30 PM, Richard Brooks r...@acm.org wrote:
So organizations get compromised by well-meaning users who click on a
link in an email or slip up and use an insecure connection, and while
we can ameloriate that to a certain extent with code, we really need
to think more
From: Kishonna Gray klg...@asu.edu
Hello all! I am looking for additional references similar to Gabriella's
work here (awesome book btw). A student is looking for information on
hacking as activism, hacking for social change, hacking for empowerment,
etc.
Any and all citations are welcome!
Ruben and Rich,
Ruben Bloemgarten said:
It seems I might have jumped the gun, assuming the discussion was
about voting systems for use in political elections. Disclosing all
voter data, including voter identity would solve much if not all
issues regarding verifiability, however would that not
anonymous2...@nym.hush.com:
Thanks, yes I also have seen young and old people use linux but I've also
seen hundreds of people trained to use it and as soonas they have to update a
package in Linux, get confused and reach for a windows machine. The NGO in a
box stuff is ok but not what I am
19 matches
Mail list logo