Hi,
Top secret PRISM program claims direct access to servers of firms
including Google, Facebook and Apple and others.
Some of the world's largest internet brands are claimed to be part of
the information-sharing program since its introduction in 2007.
Microsoft – which is currently running an
Stop promoting google hangout and hotmail, yahoo, gmail, outlook.com... =)
On Fri, Jun 7, 2013 at 8:17 AM, Jacob Appelbaum ja...@appelbaum.net wrote:
Hi,
Top secret PRISM program claims direct access to servers of firms
including Google, Facebook and Apple and others.
Some of the world's
Anthony Papillion writes:
It's up to us to protect ourselves and, thankfully, we have the
technology to do just that.
(As I suggested in a previous message, I strongly support greater use
of privacy-enhancing technologies, and finding tactics to increase the
demand for them.)
I think it's
STOP PROMOTING THE INTERNET
NK
On 2013-06-07, at 3:16 AM, Eduardo Robles Elvira edu...@gmail.com wrote:
Stop promoting google hangout and hotmail, yahoo, gmail, outlook.com... =)
On Fri, Jun 7, 2013 at 8:17 AM, Jacob Appelbaum ja...@appelbaum.net wrote:
Hi,
Top secret PRISM program
On Fri, Jun 7, 2013 at 9:23 AM, Nadim Kobeissi na...@nadim.cc wrote:
STOP PROMOTING THE INTERNET
Stop promoting 'murica. And help me test and develop my project
escapetools that is meant for taking out your data from services like
GMail and saving them in a way that can be used in
http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data
NSA taps in to internet giants' systems to mine user data, secret files
reveal
• Top secret PRISM program claims direct access to servers of firms including
Google, Facebook and Apple
• Companies deny any knowledge of program
Hi,
NSA just $20M of budget? The same NSA that is building a data center
(for processing what? =) for 869 million USD$ in Maryland?
From
http://www.democracynow.org/2012/4/20/exclusive_national_security_agency_whistleblower_william
WILLIAM BINNEY: Well, it was called Thin Thread. I mean,
This law does not allow the targeting of any US citizen or of any person
located within the United States.
Note the wording of this denial: the *target* of collection may not be a US
citizen or a person located in the US. But if the *target* is, say, Al Qaeda
and affiliated organisations, does
On Fri, Jun 07, 2013 at 12:32:10PM +1200, Andrew Lewis wrote:
PRISM isn't really even that illegal, as long as they discard communications
considered to be American.
So, as long as every TLA world wide does, and they all share the information,
everything is all right? Not so fast.
The NSA
On Fri, 07 Jun 2013 06:17:56 +
Jacob Appelbaum ja...@appelbaum.net wrote:
The next person that recommends Skype to human rights activists is
completely discredited. Stop it and stop it now.
s/Skype/third party services/
Fixed that for you.
--
Andrew
http://tpo.is/contact
pgp 0x6B4D6475
- Forwarded message from Leo Bicknell bickn...@ufp.org -
Date: Thu, 6 Jun 2013 20:28:18 -0500
From: Leo Bicknell bickn...@ufp.org
To: jim deleskie deles...@gmail.com
Cc: goe...@anime.net, NANOG na...@nanog.org
Subject: Re: PRISM: NSA/FBI Internet data mining project
X-Mailer: Apple Mail
If all this already exists, why isn’t everybody doing it? Well, simply
because there is *no integration at all among all those objects*.
No. we don't need no software bundles. we don't need no sleek installers.
How long does it take me to set up a gmail account? facebook account?
flickr account?
On Fri, Jun 7, 2013 at 6:52 AM, Michael Rogers mich...@briarproject.orgwrote:
This law does not allow the targeting of any US citizen or of any person
located within the United States.
Note the wording of this denial: the *target* of collection may not be a
US citizen or a person located in
These revelations constitute an existence proof that the number
of backdoors in various services is nonzero.
There's no reason to believe that this nonzero value is 1.
After, if the NSA could backdoor them (with or without their cooperation)
then why couldn't MI6? Or Mossad? Or some other
Michael
Well I feel much better as Australian Citizen living out side of US.
Andrew Clark
andrewrcl...@mac.com
On 07/06/2013, at 10:32 PM, David Golumbia dgolum...@gmail.com wrote:
On Fri, Jun 7, 2013 at 6:52 AM, Michael Rogers mich...@briarproject.org
wrote:
This law does not
On 2013-06-07, at 8:31 AM, Yishay Mor yish...@gmail.com wrote:
If all this already exists, why isn’t everybody doing it? Well, simply
because there is no integration at all among all those objects.
No. we don't need no software bundles. we don't need no sleek installers.
How long does it
Apropos backdooring where do think the Palestinian authority gets its
bandwidth from/through under the Oslo Accords? Not to mention the large NSA
installation next door to the center of Israeli military intelligence...
On Jun 7, 2013 3:38 PM, Nadim Kobeissi na...@nadim.cc wrote:
On 2013-06-07,
On Fri, Jun 07, 2013 at 08:32:36AM -0400, Rich Kulawiec wrote:
These revelations constitute an existence proof that the number
of backdoors in various services is nonzero.
There's no reason to believe that this nonzero value is 1.
It is prudent to believe that the value is exactly one.
On Thu, Jun 06, 2013 at 09:23:03PM -0700, x z wrote:
What surprised me is how Guardian and Washington Post cover this story.
The Power Point slides looks laughable to me. Maybe I should interpret
direct access to servers of firms as like when I'm typing this email I am
also having *a direct
On Fri, Jun 07, 2013 at 02:48:58PM +0200, Eugen Leitl wrote:
On Fri, Jun 07, 2013 at 08:32:36AM -0400, Rich Kulawiec wrote:
These revelations constitute an existence proof that the number
of backdoors in various services is nonzero.
There's no reason to believe that this nonzero value
Eugen Leitl eu...@leitl.org wrote:
A ZByte facility (e.g. like the one in Utah) can store about
10^10 years worth of audio (2 kByte/s with a modern codec),
or about 1.4 year worth of audio for every human currently
on the planet.
So forget the metadata, of course they store it along
with
You misunderstand. Signing up to these services is generally easy, and
there are a number of instances up and running for each. However, there
is as far as I know, no integrated service running an XMPP service, a
mail server, an OStatus instance, all connected and having the same
user database,
On Fri, Jun 07, 2013 at 09:15:32AM -0400, Rich Kulawiec wrote:
Mine is something like this: if one day, the folks from the NSA showed
up at X's door with a van full of equipment and asked nicely if they
could please bring it in, then why wouldn't their counterparts in every
other country do
- Forwarded message from Mark Seiden m...@seiden.com -
Date: Thu, 6 Jun 2013 22:57:07 -0700
From: Mark Seiden m...@seiden.com
To: jamie rishaw j...@arpa.com
Cc: goe...@anime.net, NANOG na...@nanog.org
Subject: Re: PRISM: NSA/FBI Internet data mining project
X-Mailer: Apple Mail (2.1508)
The frequent mention of tools for secure communications, leads me to ask - is
there an updated wiki that this community (and perhaps others) can maintain. It
serve as a resource for not only listing tools, but also a place to aggregate
the analysis and comments from security experts
If such a
On Fri, Jun 07, 2013 13:31:07 PM +0100, Yishay Mor wrote:
If all this already exists, why isn t everybody doing it? Well, simply
because
there is no integration at all among all those objects.
No. we don't need no software bundles. we don't need no sleek installers.
How long does it take
I tend to agree with this. Here are some things that look fishy about
this leak
* The $20 million budget seems paltry. Nothing gets done in government
for that small amount.
* The Powerpoint is amateurish (then again with no budget.)
* Everybody implicated is denying it (though I
Agreed
http://i.eatliver.com/2013/10627.jpg
Jason
On 6/7/2013 3:23 AM, Nadim Kobeissi wrote:
STOP PROMOTING THE INTERNET
NK
On 2013-06-07, at 3:16 AM, Eduardo Robles Elvira edu...@gmail.com wrote:
Stop promoting google hangout and hotmail, yahoo, gmail, outlook.com... =)
On Fri, Jun 7,
liberationt...@lewman.us wrote:
Jacob Appelbaum ja...@appelbaum.net wrote:
The next person that recommends Skype to human rights activists is
completely discredited. Stop it and stop it now.
s/Skype/third party services/
Fixed that for you.
I'll keep that in mind the next time someone
On 06/07/2013 03:23 AM, Seth David Schoen wrote:
The best widely-used tool to defend against traffic analysis is Tor,
but Tor's developers readily concede that it has a lot of important
limitations and that there's no obvious path around many of them.
Two of these important limitations (not
On Fri, Jun 07, 2013 10:18:25 AM -0400, Griffin Boyce wrote:
average users need to have basic services that are
(unfortunately) run by third parties.
The proposal in that post of mine that I already cited would also solve this.
It would be a way for non-geeks to get all their basic services
On Fri, Jun 07, 2013 at 10:18:25AM -0400, Griffin Boyce wrote:
I'll keep that in mind the next time someone from Tor promotes Riseup ;-)
But seriously, average users need to have basic services that are
(unfortunately) run by third parties. At a minimum, diversification
of services
James Clapper (Director of USA National Intelligence) said in a statement,
per USA Today--the program (PRISM) has clear limits: It cannot be used to
intentionally target any US citizen, any other US person, or anyone located
within the United States.
Reassuring I guess, unless you don't happen
On Fri, Jun 07, 2013 at 04:28:31PM +0200, M. Fioretti wrote:
BTW, since I'm getting offlist questions about this: in case you were
thinking what you want is the FreedomBox, NO, what I'm talking about
is NOT the FreedomBox. What I'm suggesting is compatible with the
FreedomBox, but it's
Hi,
I think the timing is right to inform libtech about the development of
Torservers.net. What started as a German non-profit has now grown into a
network of non-profit organizations in several countries. All member
organizations benefit from tight collaboration and knowledge exchange
about
On Fri, Jun 07, 2013 16:45:53 PM +0200, Eugen Leitl wrote:
On Fri, Jun 07, 2013 at 04:28:31PM +0200, M. Fioretti wrote:
BTW, since I'm getting offlist questions about this: in case you were
thinking what you want is the FreedomBox, NO, what I'm talking about
is NOT the FreedomBox. What
Griffin Boyce griffinbo...@gmail.com writes:
liberationt...@lewman.us wrote:
Jacob Appelbaum ja...@appelbaum.net wrote:
The next person that recommends Skype to human rights activists is
completely discredited. Stop it and stop it now.
s/Skype/third party services/
Fixed that for you.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Well the Director of National Intelligence James Clapper has defended
the program, not denied it:
http://www.bbc.co.uk/news/world-us-canada-22809541
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/07/2013 03:23 AM, Nadim Kobeissi wrote:
STOP PROMOTING THE INTERNET
Internet? I've been posting to this mailing list with a bottle of
ink, a hamster, and a tarot deck!
- --
The Doctor [412/724/301/703] [ZS]
Developer, Project Byzantium:
See: *Hewlett Packard, transparency and the brand valuation
bubble*http://reflets.info/hewlett-packard-transparency-and-the-brand-valuation-bubble/
*Paris – june 7th 2013 -* Last tuesday, as part of an ongoing
investigation exploring internet censorship and monitoring in Iran and in
Syria,
- Forwarded message from Matthew Petach mpet...@netflight.com -
Date: Fri, 7 Jun 2013 09:32:53 -0700
From: Matthew Petach mpet...@netflight.com
Cc: NANOG na...@nanog.org
Subject: Re: PRISM: NSA/FBI Internet data mining project
On Thu, Jun 6, 2013 at 5:04 PM, Matthew Petach
Hi,
See that's the standard you're competing with. Most users don't own
server space, physical or virtual, and would not in a million years
be convinced to buy any.
and if you have your own server (not at home), they can go after you
with legal assistence regimes like in the cybercrime
So what if it was a one character typo? m substituted for b... happens
all the time in these kinds of presentations...
M
-Original Message-
From: liberationtech-boun...@lists.stanford.edu
[mailto:liberationtech-boun...@lists.stanford.edu] On Behalf Of Eugen Leitl
Sent: Friday, June 07,
Speaking just for myself, and if you quote me on this as speaking on anyone
else's behalf, you're a complete fool, if the government was able to build
infrastructure that could listen to all the traffic from a major provider for
a fraction of what it costs them to handle that traffic in the
On 2013-06-07, at 1:09 PM, Anthony Papillion anth...@cajuntechie.org wrote:
On 06/06/2013 07:00 PM, Nadim Kobeissi wrote:
Speaking as the lead developer for Cryptocat:
OTR.js actually has had some vetting. We're keeping it experimental simply
due to the experimental nature of web
This is just circumstantial speculation but read
http://talkingpointsmemo.com/archives/2013/06/is_this_who_runs_prism.php
Given Palantir's rapid expansion and aggressive recruitment, I think this
guy might be onto something.
I suspect that what is being described in the slides is not direct
Pidgin is a terrible client. It has quite a bit of issues. Their SSL
handling is terrible and possible to mitm, I audited the Windows build last
August and found known vulnerabilities since 2006 in 2012.. only recently
in february that the Pidgin team released a security update..
Avoid using
An Apple spokesman said it had never heard of PRISM.
And probably none of the vendors heard it called that. This doesn't mean
anything. Nor does it say they aren't or haven't been participating in this
sort of thing. Which they wouldn't if the order compelled them not to
reveal it.
--
On 06/07/2013 12:18 PM, Nadim Kobeissi wrote:
I would never suggest Pidgin — Pidgin has never received an audit and is full
of vulnerabilities that the development team is reluctant to fix. Cryptocat
has actually received far more audits than Pidgin, although I'm not sure how
to compare
Nadim's reply is much better just linking to the otr.js author's own warning.
I'd like to reiterate the importance of code delivery. I've seen a
couple dozen of attempts to do crypto via server-hosted Javascript.
All of these reduced to trusting whomever is serving the code. This
issues have been
On Fri, Jun 7, 2013 at 7:59 PM, Steve Weis stevew...@gmail.com wrote:
I'd like to reiterate the importance of code delivery. I've seen a
couple dozen of attempts to do crypto via server-hosted Javascript.
All of these reduced to trusting whomever is serving the code. This
issues have been
Hi all,
We realize that the liberationtech list's email volume has grown over
the past few days. Just a reminder that you can switch your account
to digest mode by following the instructions at the end of this email
or simply by asking a list moderator like me to do it for you.
Best,
Yosem
--
micah mi...@riseup.net wrote:
What about when someone from Riseup promotes Riseup services? :o
Riseup isn't evil, I'm just amused by people who say no third-party
services! and then launch into why people should use their
third-party provider of choice. If one wants to say no
corporate-owned
We now only have Uighur left to go! If you know anyone who can contribute,
please do.
This is the only translation remaining before we can push a big update.
You can contribute to the Uighur translation here:
https://www.transifex.com/projects/p/Cryptocat/language/ug/
NK
On 2013-06-05, at
On Fri, Jun 07, 2013 at 07:44:35PM +0200, Jurre andmore wrote:
Pidgin is a terrible client. It has quite a bit of issues. Their SSL
handling is terrible and possible to mitm, I audited the Windows build
last August and found known vulnerabilities since 2006 in 2012.. only
recently
Apologies for adding to the list volume. Darn reply to list!
Teresa
On Fri, Jun 7, 2013 at 2:21 PM, Teresa Crawford ter...@speakeasy.netwrote:
Thanks for the offer. Can you switch me to digest? Thanks!
Teresa
On Fri, Jun 7, 2013 at 2:04 PM, Yosem Companys compa...@stanford.eduwrote:
Hi all,
I have the same feeling with Raven's. It appears that the PRISM program
does exist, and that amateurish Power Point training material is real (so I
take back my ploy or prank remark). However, none of this proves
Guardian's headline claim NSA taps in to internet giants' systems to mine
On 06/07/2013 01:51 PM, micah wrote:
The default syslog in Debian, rsyslog just announced that they've added
log anonymization capabilities[0]!
Almost 12 years now after riseup wrote the initial patches to
syslog-ng[1] (a few years ago syslog-ng added this capability, so we no
longer
+1
On Jun 7, 2013 11:57 AM, Anthony Papillion anth...@cajuntechie.org
wrote:
On 06/07/2013 01:51 PM, micah wrote:
The default syslog in Debian, rsyslog just announced that they've added
log anonymization capabilities[0]!
Almost 12 years now after riseup wrote the initial
http://www.calgaryherald.com/opinion/columnists/Kotarski+snoop+factor+shocking/8377821/story.html
MAY 13, 2013
Kotarski: The snoop factor is shocking
BY KRIS KOTARSKI, CALGARY HERALD
In October 2008, a 39-year-old former U.S. navy linguist who worked at
a National Security Agency (NSA) centre
Apologies for replying out of thread and the wide CC list.
On Fri, Jun 07, 2013 at 06:41:32PM +0200, Eugen Leitl wrote:
- Forwarded message from Matthew Petach mpet...@netflight.com -
Date: Fri, 7 Jun 2013 09:32:53 -0700
From: Matthew Petach mpet...@netflight.com
Cc: NANOG
FWIW, Google has issued a similar blanket (and kinda funny) denial.
http://googleblog.blogspot.com/2013/06/what.html
On Fri, Jun 7, 2013 at 2:20 PM, Andy Isaacson a...@hexapodia.org wrote:
Apologies for replying out of thread and the wide CC list.
On Fri, Jun 07, 2013 at 06:41:32PM +0200,
It might be good to elevate this to it's own thread...
so I forward it here..
-- Forwarded message --
From: Raven Jiang CX j...@stanford.edu
Date: Fri, Jun 7, 2013 at 10:30 AM
Subject: Re: [liberationtech] NSA has direct access to tech giants' systems
for user data, secret ppt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
http://googleblog.blogspot.com/2013/06/what.html
I do believe them, but I have no proof to back that up. You would assume
they wouldn't make a bold faced lie, they would just not talk about it.
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2
Washington Post Backtracks on Claims of Tech Giants Giving US Govt Direct
Access to Their Servers
http://www.businessinsider.com/washington-post-updates-spying-story-2013-6
On Fri, Jun 7, 2013 at 3:51 PM, Travis McCrea m...@travismccrea.com wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash:
We were asked by members of the media in Turkey who have been shut down to
release a version of our new streaming media capture applications. In an
effort document the history of the struggle and to help show abuses by
authorities there, we are pleased to announce the Occupy Gezi android
Hi Rich,
That sounds pretty cool, have you heard of StoryMaker yet?
It's an app we have been building at Small World News, in collaboration
with the guardian project and scal.io, along with support from free press
unlimited and the open tech fund.
StoryMaker helps users tell stories not just
On Tue, Mar 26, 2013 at 09:24:13AM +0100, Yiorgis Gozadinos wrote:
Assuming there is a point of reference for js code, some published instance
of the code, that can be audited and verified by others that it does not
leak. The point then becomes: Is the js I am running in my browser the same
68 matches
Mail list logo