On Sat, Sep 7, 2013 at 6:21 PM, Maxim Kammerer m...@dee.su wrote:
Personally, I wouldn't trust an embedded engineer to
implement bubble sort correctly, and see no reason to trust them with
security-critical implementations, even if one assumes no malice or
subversion of production process.
By
- Forwarded message from Patrick Georgi patr...@georgi-clan.de -
Date: Fri, 20 Sep 2013 13:49:49 +0200
From: Patrick Georgi patr...@georgi-clan.de
To: coreb...@coreboot.org
Subject: Re: [coreboot] [liberationtech] Fwd: Firefox OS with built in support
for OpenPGP encryption
User-Agent:
Blibbet blib...@gmail.com writes:
I don't think so -- unless you have a laptop flashed with a free
software BIOS / boot firmware that you can inspect and modify. There are
a handful of dated possibilities out there like that (Thinkpad x60
models that support coreboot, Lemote Yeelongs), but
Electronic Frontier Foundation Media Release
For Immediate Release: Friday, September 20, 2013
Contact:
Katitza Rodriguez
International Rights Director
Electronic Frontier Foundation
kati...@eff.org
Thirteen Principles Against Unchecked Surveillance Launched
at United Nations
Privacy
(We call the bad version of Secure Boot, where the user does not have
the ability to modify the set of trusted keys or disable the system,
Restricted Boot.)
We have discussed the idea of trying to become a root key holder for
Secure Boot, working with OEMs to by default trust GNU/Linux distro
Micah Lee mi...@micahflee.com writes:
I completely disagree. Ubiquitous end-to-end encryption will help
protect against *dragnet* surveillance. The fact that smartphones are
imminently pwnable doesn't change this fact. Even if you're using a
Carrier IQ-infested/baseband backdoored device,
On 09/12/2013 04:14 PM, Erik de Castro Lopo wrote:
Bernard Tyers - ei8fdb wrote:
Stefan: Why not?
For verification, OpenPGP on smartphones is *possibly* ok. For
a device used to sign or encrypt smartphones are totally
inappropriate regardless of the potential convenience.
No such agency and
Blibbet blib...@gmail.com writes:
(We call the bad version of Secure Boot, where the user does not have
the ability to modify the set of trusted keys or disable the system,
Restricted Boot.)
We have discussed the idea of trying to become a root key holder for
Secure Boot, working with OEMs
On Sep 18, 2013, at 9:40 AM, Bill Woodcock wo...@pch.net wrote:
Well, there are a bunch of different concepts being discussed. The primary
one is localization of routing, which isn't just possible, it's
best-practice, and something Brazil has been doing an excellent job of
already for
http://mashable.com/2013/09/20/samantha-power-social-good-summit/
Digital tools such as Facebook http://mashable.com/category/facebook/ and
Twitter http://mashable.com/category/twitter/ have empowered activists
around the world to become revolutionaries. Despite the advances civil
society has
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hello liberationtech!
The Whonix Project is looking for a translations coordinator.
Whonix [1] is an anonymous general purpose operating system based on
Virtual Box, Debian GNU/Linux and Tor. It has its focus on anonymity,
privacy, security and
On 09/20/2013 09:59 PM, adrelanos wrote:
Hello liberationtech!
The Whonix Project is looking for a translations coordinator.
Whonix [1] is an anonymous general purpose operating system based on
Virtual Box, Debian GNU/Linux and Tor. It has its focus on anonymity,
privacy, security and
12 matches
Mail list logo