So summarising the you guys mentioned, it looks like our options are:
1. randomise phone MAC addresses
2. turn off WiFi
3. don't use store loyalty cards
Are there other things we can do? Are the other leakages we need to
stop?
On 2014-07-03 16:54, JCX wrote:
There are many companies that
Another option would be to go on the offensive. Someone can leave
devices in the store whose sole purpose is just to spoof mac addresses.
Ideally, this would flood their data with fake entries, making it
useless to the trackers. (They didn't ask permission to do their track.)
keira
On Fri, Jul
Dear all,
This is to bring to your attention the library of the p2p lab with free
publications about the Commons and the p2p/open source movement (
http://p2plab.gr/en/publications), as well as an open call for visiting
scholars geeks: http://p2plab.gr/en/call.
I hope the list might find these
There has been some speculation that the recent XKeyscore rule leaks
[1] do not come from Snowden — particularly, by Schneier [2]. I
believe that there is a good case that the leaks do come from Snowden,
since it is possible to pinpoint the date range when the rule sources
[3] have been last
Hi everyone,
As some of you might know, the team at Security First is doing some
work to breach the gap with some sectors that could benefit from the
knowledge of the LiberationTech community and others.
In particular, the humanitarian aid space is only now really starting
to increase it's use
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1
Errata Security
Advanced persistent cybersecurity
Friday, July 04, 2014
Jamming XKeyScore
Back in the day there was talk about jamming echelon by adding keywords to
email that the echelon system was supposedly looking for. We
Thought experiment for Independence Day...
How easy would it be to develop a “Public Google” that was distributed across
tens of thousands of computers similar to the way that the SETI@home project
uses the cycles of computers all over the world?
I’m not sure how to keep the NSA out but this
You mean YaCy? Exists already.
- Sent from my phone
Den 4 jul 2014 17:10 skrev Doug Schuler doug...@publicsphereproject.org:
Thought experiment for Independence Day...
How easy would it be to develop a “Public Google” that was distributed
across tens of thousands of computers similar to the
On 07/04/2014 10:56 AM, Eugen Leitl wrote:
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1
Errata Security
Advanced persistent cybersecurity
Friday, July 04, 2014
Jamming XKeyScore
Back in the day there was talk about jamming echelon by adding keywords to email that
the
On Fri, Jul 04, 2014 at 09:36:23PM +, isis wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Eugen Leitl transcribed 5.8K bytes:
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1
Errata Security
Advanced persistent cybersecurity
Friday, July 04, 2014
10 matches
Mail list logo