On 30 July 2013 23:09, Francisco Ruiz r...@iit.edu wrote:
3. Some users are confused by having both symmetric and asymmetric
encryption available, so they end up encrypting messages with their private
keys, which no one else has. Would it be better to hide or eliminate the
symmetric encryption
- Forwarded message from Don Marti dma...@zgp.org -
Date: Wed, 31 Jul 2013 05:38:11 -0700
From: Don Marti dma...@zgp.org
To: linux-eliti...@zgp.org
Subject: Re: [linux-elitists] Evil in certain broadband marketsa isn't really
evil
User-Agent: Mutt/1.5.21 (2010-09-15)
begin Rick Moen
- Forwarded message from Zooko Wilcox-OHearn zo...@leastauthority.com
-
Date: Wed, 31 Jul 2013 11:36:52 +
From: Zooko Wilcox-OHearn zo...@leastauthority.com
To: Tahoe-LAFS development tahoe-...@tahoe-lafs.org
Subject: [tahoe-dev] press release: LeastAuthority.com announces Spy-Proof
Looking at how technology in Israel used to subjugate Palestinians in the
occupied territories has been creeping into Israeli society proper, the
situation in the US and UK and the acceptance by more and more people of
security measures in the name of national security that restrict or make
Do you have plans for future efforts to include non-DC-located hackers?
On Wed, Jul 31, 2013 at 9:05 AM, Kirby Plessas ki...@plessas.net wrote:
FreedomHack is a hackathon put together by CommunityRED along with Amnesty
International and Cont3nt.com with the aim of building digital tools to aid
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
XKeyscore: NSA tool collects 'nearly everything a user does on the internet'
• XKeyscore gives 'widest-reaching' collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up
Now available at https://blog.twitter.com/2013/working-to-increase-transparency.
Interesting quote:
An important conversation has begun about the extent to which
companies should be allowed to publish information regarding national
security requests. We have joined forces with industry peers and
http://arstechnica.com/tech-policy/2013/07/again-federal-court-finds-cops-dont-need-a-warrant-for-cellphone-location-data/
Again, federal court finds cops don’t need a warrant for cellphone location
data
If you want your records anonymized, tell the market or the political
process.
by Cyrus
If your NGO would like to sign, please go to
https://en.necessaryandproportionate.org/about
Huge Global Coalition Stands Against Unchecked Surveillance
100+ Organizations Sign Thirteen Principles to Protect Human Rights
San Francisco - More than 100 organizations from across the globe –
Hi!
I hope you are interested in the results of a little experiment.
Q: How many users downloaded OpenPGP signatures with the old design of
download page? (You can see the design here: [1] [2])
A: 1 in ~30 users.
Q: How many users downloaded OpenPGP signatures after adding a colored
download
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 07/31/2013 10:57 AM, Kyle Maxwell wrote:
Now available at
https://blog.twitter.com/2013/working-to-increase-transparency.
Interesting quote:
An important conversation has begun about the extent to which
companies should be allowed to
On 07/26/2013 06:18 PM, Steve Weis wrote:
DRM technologies have a flip side as privacy-preserving technology.
What is the technology that lets me make my data searchable but
not copyable? What is the technology that lets Google share my
data with a few third parties which I approve but no
I think what you're saying was true in the past, but the game is
changing with modern hardware. There have been advances in CPU
features that make it possible to reduce the trust perimeter to just
the CPU and TPM. If I trust those two components, I can privately
compute on remote hardware, even if
13 matches
Mail list logo