- Forwarded message from Lunar lu...@torproject.org -
Date: Wed, 6 Aug 2014 14:00:57 +0200
From: Lunar lu...@torproject.org
To: tor-n...@lists.torproject.org, tor-t...@lists.torproject.org
Subject: [tor-talk] Tor Weekly News — August 6th, 2014
Message-ID: 20140806120057.GB20092@loar
https://www.techdirt.com/articles/20140721/11362227955/carnegie-mellon-kills-black-hat-talk-about-identifying-tor-users.shtml
Carnegie Mellon Kills Black Hat Talk About Identifying Tor Users -- Perhaps
Because It Broke Wiretapping Laws
from the questionable-legality dept
There's some buzz in
http://blogs.computerworld.com/privacy/24145/leaked-gchq-catalog-exploit-tools-manipulation-and-mass-surveillance?source=CTWNLE_nlt_security_2014-07-17
Leaked GCHQ catalog of exploit tools for manipulation and mass surveillance
By Darlene Storm
July 16, 2014 1:22 PM EDTAdd a comment
Just as
http://www.reuters.com/article/2014/07/15/usa-nsa-software-idUSL2N0PP2BM20140715
Experts report potential software back doors in U.S. standards
BY JOSEPH MENN
SAN FRANCISCO, July 14 Mon Jul 14, 2014 8:58pm EDT
(Reuters) - U.S. government standards for software may enable spying by the
- Forwarded message from Nicolas Bourbaki nicolasbourb...@riseup.net -
Date: Fri, 11 Jul 2014 07:39:12 +0200
From: Nicolas Bourbaki nicolasbourb...@riseup.net
To: cypherpu...@cpunks.org
Subject: GeoIP is a threat to democracy
Message-ID: 53bf7880.5050...@riseup.net
User-Agent: Mozilla/5.0
http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the-nsa-is-total-population-control
The ultimate goal of the NSA is total population control
At least 80% of all audio calls, not just metadata, are recorded and stored
in the US, says whistleblower William Binney –
On Wed, Jul 09, 2014 at 04:58:05PM +0200, edhelas wrote:
What about a Torrent ? We can easily share the magnet everywhere
(Reddit, Twitter…).
Great idea. Don't forget to publish the magnet on TPB as well.
--
Liberationtech is public archives are searchable on Google. Violations of
list
- Forwarded message from doug douglasrankine2...@yahoo.co.uk -
Date: Tue, 08 Jul 2014 13:34:31 +0100
From: doug douglasrankine2...@yahoo.co.uk
To: crypt...@freelists.org
Subject: [cryptome] Cryptome Kickstart Project
Message-ID: 53bbe557.7060...@yahoo.co.uk
User-Agent: Mozilla/5.0 (X11;
http://www.wired.com/2014/07/morgan-marquis-boire-first-look-media/
The Ex-Google Hacker Taking on the World’s Spy Agencies
BY ANDY GREENBERG 07.08.14 | 6:30 AM | PERMALINK
Ariel Zambelich/WIRED
During his last six years working as an elite security researcher for Google,
the hacker
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1
Errata Security
Advanced persistent cybersecurity
Friday, July 04, 2014
Jamming XKeyScore
Back in the day there was talk about jamming echelon by adding keywords to
email that the echelon system was supposedly looking for. We
http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html
NSA targets the privacy-conscious
von J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge
The investigation discloses the following:
Two servers in Germany - in Berlin and Nuremberg - are under surveillance by
the NSA.
(Just who is a radicalizer, these days, in which we have bona
fide dissidents who are persecuted for fighting for our freedoms?)
http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html?1385526024
Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To
Discredit
http://www.techdirt.com/articles/20131126/01352025373/if-you-dont-care-about-nsa-because-you-havent-done-anything-wrong-youre-wrong.shtml
If You Don't Care About The NSA Because You 'Haven't Done Anything Wrong,'
You're Wrong
from the you-have-done-many-things-wrong dept
Cardinal Richelieu's
http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work?hidecomments=yespage=full
Meet the Spies Doing the NSA's Dirty Work
This obscure FBI unit does the domestic surveillance that no other
intelligence agency can touch.
BY SHANE HARRIS | NOVEMBER
- Forwarded message from Dave Farber d...@farber.net -
Date: Sat, 23 Nov 2013 14:56:20 -0500
From: Dave Farber d...@farber.net
To: ip i...@listbox.com
Subject: [IP] NSA report
Message-ID: CAKx4trhUOu7dOpsXqKO=jfwg6l9scwkv1fql-dx1wwqmnmh...@mail.gmail.com
Reply-To: d...@farber.net
[image:
http://thecable.foreignpolicy.com/posts/2013/11/20/exclusive_inside_americas_plan_to_kill_online_privacy_rights_everywhere
Exclusive: Inside America's Plan to Kill Online Privacy Rights Everywhere
Posted By Colum Lynch Wednesday, November 20, 2013 - 6:10 PM Share
The United States and
- Forwarded message from Dave Farber d...@farber.net -
Date: Thu, 14 Nov 2013 11:28:48 -0500
From: Dave Farber d...@farber.net
To: ip i...@listbox.com
Subject: [IP] My blog today on Permissionless Innovation
Message-ID: CAKx4triMv4zeA6mV_POaLfyosZk_1qumW7m+=1fw37zvs9m...@mail.gmail.com
On Wed, Nov 06, 2013 at 01:21:20PM -0800, Matt Johnson wrote:
Sorry Eugen, I am still not getting it. You will author content in
isolation, without reference to any information at all? Or perhaps in
Let's say you're a journalist working with Snowden's leaked documents.
Would you be comfortable
On Wed, Nov 06, 2013 at 10:54:34AM -0800, Matt Johnson wrote:
I fail grasp the utility of such and offline computer. If you keep a
You must have nothing to hide, then. Some of us do.
computer air gaped as you describe you will not be able to do much
with it.
Gee, how about authoring content,
http://www.openaire.eu/en/component/openaire/project_info/default/619?id=218086
Project: INDECT
Title: Intelligent Information System Supporting Observation, Searching and
Detection for Security of Citizens in Urban Environment
Call: FP7-SEC-2007-1
Grant agreement number: 218086
On Sun, Oct 20, 2013 at 04:53:41PM -0700, coderman wrote:
this works for most wifi devices if you have root; just modify init
scripts to ifconfig hw ether a random mac (you can do this in shell).
don't delegate something critical like this to an arbitrary app, which
is invoked much later in
declined to provide details about his living conditions in
Moscow, except to say that he was not under Russian government control
and was free to move around.
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Liberationtech is public
http://www.theguardian.com/commentisfree/2013/jun/10/edward-snowden-united-stasi-america
Edward Snowden: saving us from the United Stasi of America
Snowden's whistleblowing gives us a chance to roll back what is tantamount to
an 'executive coup' against the US constitution
Daniel Ellsberg
http://www.wired.com/business/2013/10/free-thinkers/all/
How a Radical New Teaching Method Could Unleash a Generation of Geniuses
BY JOSHUA DAVIS10.15.136:30 AM
These students in Matamoros, Mexico, didn’t have reliable Internet access,
steady electricity, or much hope—until a radical new
message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Liberationtech is public
http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html?wpisrc=al_national
NSA collects millions of e-mail address books globally
Video: In June, President Obama said the NSA’s email
of the nets
# more info: http://mx.kein.org/mailman/listinfo/nettime-l
# archive: http://www.nettime.org contact: nett...@kein.org
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM
-
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Liberationtech is public archives are searchable
http://www.nature.com/news/researchers-split-over-nsa-hacking-1.13911
Researchers split over NSA hacking
Cryptographers condemn US National Security Agency’s tapping and tampering,
but mathematicians shrug.
Ann Finkbeiner 08 October 2013
The National Security Agency is the largest employer of
http://www.newyorker.com/online/blogs/elements/2013/10/how-lavabit-edward-snowden-email-service-melted-down.html
HOW LAVABIT MELTED DOWN
POSTED BY MICHAEL PHILLIPS AND MATT BUCHANAN
On August 8th, Lavabit, newly famous for being the secure e-mail service used
by the National Security Agency
http://www.wired.com/opinion/2013/10/149481/
Want to Evade NSA Spying? Don’t Connect to the Internet
BY BRUCE SCHNEIER 10.07.13 6:30 AM
Photo: Ariel Zambelich / WIRED; Illustration: Ross Patton / WIRED
Since I started working with Snowden’s documents, I have been using a number
of tools to
On Mon, Oct 07, 2013 at 09:14:35PM +0200, yersinia wrote:
I like Bruce much, i have read all of him, every book, mostly article,
from years. But no normal person would follow these advice, all smartphones
That advice is not exactly targeted towards Jane Doe.
should be turned off, each
On Sat, Sep 21, 2013 at 12:07:10PM +0100, Nick wrote:
Sorry for coming late to the party. This is an interesting idea,
that I hadn't thought of before. I also like that it can allow one
I'm glad that nobody sees a massive flaw in the scheme.
to stop disclosing location data in a way that's
: Roundcube Webmail/0.9.2
Am 2013-09-20 11:51, schrieb Eugen Leitl:
The Intel Atom-based MinnowBoard is a new UEFI dev platform, and it's
Linux-based, and targets hackers; it uses Intel's definition of Open
Hardware, mainly meaning no NDAs involved. It is much cheaper and
smaller than the above
On Fri, Sep 13, 2013 at 06:39:35PM +1000, Erik de Castro Lopo wrote:
Yes, but Firefox OS and Cryanogenmod only control the user facing part
of the smartphone. Loading eg Cryanogenmod onto a android phone leaves
the software running the radio part of the phone untouched (otherwise
the phone
On Wed, Sep 11, 2013 at 11:04:44AM -0500, Matt Mackall wrote:
Similarly, any other sort of one-way algorithm that prevents you from
reconstructing a valid input from the stored data is not going to work.
Typical fingerprint matching uses classification, recognizing and
encoding multiple
On Wed, Sep 11, 2013 at 09:20:56AM -0700, Peat Bakke wrote:
This is likely subject to a precompiled hash lookup table attack,
as the number of all possible fingerprints, quantized via a classification
vector is not that large.
Can you give us a better idea of how large not that large is?
On Mon, Sep 09, 2013 at 12:50:49PM +0200, phryk wrote:
http://cryptome.org/2013/09/nsa-cowboy.htm
9 September 2013
The Cowboy of the NSA Keith Alexander
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Liberationtech
forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Liberationtech
-
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Liberationtech is a public list whose archives
On Sat, Sep 07, 2013 at 12:26:22PM -0400, Jonathan Wilkes wrote:
Hi Eugen,
When Bruce Schneier made the call for people to come forward
and describe being asked to degrade standards or build backdoors
I don't think this is what he meant.
Bruce is a cool guy, but nobody died, and made him
http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance
How to remain secure against NSA surveillance
The NSA has huge capabilities – and if it wants in to your computer, it's in.
With that in mind, here are five ways to stay safe
Bruce Schneier
theguardian.com,
it.
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
http://www.theguardian.com/world/2013/sep/04/barrett-brown-gag-order-us-government
US stops jailed activist Barrett Brown from discussing leaks prosecution
Federal court order prohibits Brown from talking to the media in what critics
say is latest in crackdown on investigative journalism
Ed
http://rt.com/news/wikileaks-spy-files-release-402/
Spy Files: New WikiLeaks docs expose secretive, unruly surveillance industry
Published time: September 04, 2013 16:06
Edited time: September 05, 2013 10:00 Get short URL
Screenshot from a leaked documentScreenshot from a leaked document
- Forwarded message from Scott Helms khe...@zcorum.com -
Date: Thu, 5 Sep 2013 10:02:39 -0400
From: Scott Helms khe...@zcorum.com
To: Eugen Leitl eu...@leitl.org
Cc: NANOG list na...@nanog.org
Subject: Re: [liberationtech] NSA Laughs at PCs, Prefers Hacking Routers and
Switches
The last
easily found hidden services, exited around camouflaging
exits. That, to be sure, was and remains the fundamental
intent of Tor: off the grid, criminal, illegal, illegitimate,
government grade security.
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http
http://www.wired.com/threatlevel/2013/09/nsa-router-hacking/
NSA Laughs at PCs, Prefers Hacking Routers and Switches
BY KIM ZETTER09.04.136:30 AM
Photo: Santiago Cabezas/Flickr
The NSA runs a massive, full-time hacking operation targeting foreign
systems, the latest leaks from Edward Snowden
I'm looking to build a list for reasonably secure (no snake oil)
ways to communicate (search, store, etc.). My ad hoc list so far is:
Pidgin/OTR
cables
Jitsi
Tor
YaCy
RetroShare
TorChat
Tahoe LAFS
GnuNet
No doubt I'm missing a lot. Any further suggestions?
--
Liberationtech is a public list
On Sat, Aug 31, 2013 at 10:46:15AM +, andreas.ba...@nachtpult.de wrote:
Why not also JonDonym? The problem with TOR for productivity is its bandwith.
Because it's officially backdoored.
There are also some pretty good commercial services.
--
Liberationtech is a public list whose archives
/
⁵
ftp://ftp.netbsd.org/pub/pkgsrc/current/pkgsrc/filesystems/tahoe-lafs/README.html
___
tahoe-dev mailing list
tahoe-...@tahoe-lafs.org
https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev
- End forwarded message -
--
Eugen* Leitl a href=http
at 11:50 PM, Eugen Leitl eu...@leitl.org wrote:
...
Much of what has changed is proof technology, and it is a
technology. The tools for doing formal verification are now, for the
first time, just barely usable for real work on interesting programs,
and getting better all the time
cyber effects, our
technological and operational superiority delivers
unparalleled effects against our adversaries' systems.
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM
...@vcnv.org
--
Want to unsubscribe? Want to receive a weekly digest instead of daily emails?
Change your preferences:
https://mailman.stanford.edu/mailman/listinfo/drone-list or email
compa...@stanford.edu
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http
On Thu, Aug 22, 2013 at 01:30:15PM -0400, The Doctor wrote:
On 08/21/2013 04:59 PM, Shelley wrote:
Sure, but I think Manning has a zero chance of obtaining a pardon.
Examples needed to be made to dissuade anybody else from doing
something similar. Manning was the example. There will
On Thu, Aug 22, 2013 at 11:36:37AM -0500, Case Black wrote:
Addressing the Black Hat convention in Las Vegas, an annual gathering for
the information security industry, he gave a personal example: I have four
daughters. Can I go and intercept their emails? No. The technical
limitations are in
How very surprising.
http://harpers.org/blog/2013/08/anatomy-of-an-al-qaeda-conference-call/
Anatomy of an Al Qaeda “Conference Call”
Dubious sources feed national-security reporter Eli Lake a fraudulent story
for political purposes — once again
By Ken Silverstein
Share Single Page
vulnerable to some degree or another - it's just a
function of cost and skill to compromise. turtles all the way down!
;P
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM
mailing list for net criticism,
# collaborative text filtering and cultural politics of the nets
# more info: http://mx.kein.org/mailman/listinfo/nettime-l
# archive: http://www.nettime.org contact: nett...@kein.org
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl
On Mon, Aug 12, 2013 at 01:46:26PM +0200, Arjen Kamphuis wrote:
Client-side encryption means a Free Software code stack running on a
machine that is physically under your control at all time. Anything
else is BS.
Indeed. And it can be argued that we even need open, fully inspectable
hardware,
and cultural politics of the nets
# more info: http://mx.kein.org/mailman/listinfo/nettime-l
# archive: http://www.nettime.org contact: nett...@kein.org
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
preferences:
https://mailman.stanford.edu/mailman/listinfo/drone-list or email
compa...@stanford.edu
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http
: @saftergood
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Too many emails
://wikileaks.org/
6. https://leastauthority.com/
___
tahoe-dev mailing list
tahoe-...@tahoe-lafs.org
https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
XKeyscore: NSA tool collects 'nearly everything a user does on the internet'
• XKeyscore gives 'widest-reaching' collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up
http://arstechnica.com/tech-policy/2013/07/again-federal-court-finds-cops-dont-need-a-warrant-for-cellphone-location-data/
Again, federal court finds cops don’t need a warrant for cellphone location
data
If you want your records anonymized, tell the market or the political
process.
by Cyrus
On Mon, Jul 29, 2013 at 05:19:27PM -0700, Percy Alpha wrote:
On Mon, Jul 29, 2013 at 10:58 AM, Randolph D. rdohm...@gmail.com wrote:
uh? why commercial? http://bitmail.sf.net is open source. Regards
Again, I want common people to use PGP. I want every communication to be
Then, put GPG
http://arstechnica.com/tech-policy/2013/07/moscow-metro-says-new-tracking-system-is-to-find-stolen-phones-no-one-believes-them/
Moscow Metro says new tracking system is to find stolen phones; no one
believes them
Experts: Russians are probably using fake cell tower devices for
surveillance.
documented “back-door” hardware and
“firmware” vulnerabilities in Lenovo chips.
...
___
cryptography mailing list
cryptogra...@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
- End forwarded message -
--
Eugen* Leitl a href=http
criticism,
# collaborative text filtering and cultural politics of the nets
# more info: http://mx.kein.org/mailman/listinfo/nettime-l
# archive: http://www.nettime.org contact: nett...@kein.org
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
the mail analogy of T/A
for the envelope, C/A for the contents.
As noted elsewhere T/A is now publicized as metadata.
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100
(See also https://en.wikipedia.org/wiki/Convergence_(SSL) )
http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/
Feds put heat on Web firms for master encryption keys
Whether the FBI and NSA have the legal authority to obtain the master keys
that
On Thu, Jul 25, 2013 at 11:22:25AM +0100, Nick wrote:
On Thu, Jul 25, 2013 at 11:19:22AM +0200, Eugen Leitl wrote:
(See also https://en.wikipedia.org/wiki/Convergence_(SSL) )
Would Convergence help here? I can't see how. If a government
secretly aquired the SSL private keys for a site
___
Discuss mailing list
disc...@lists.hackerspaces.org
http://lists.hackerspaces.org/mailman/listinfo/discuss
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
https://blog.torproject.org/blog/join-us-tor-hack-day-munich-germany
JOIN US - Tor Hack Day, Munich, Germany
Posted July 8th, 2013 by kelley in dev meeting hack day
Join us for a public hack day on Friday, July 26, 2013 in Munich, Germany.
Thank you to our hosts at the Technische Universität
On Mon, Jul 22, 2013 at 10:06:50AM +0200, Jason Gulledge wrote:
It looks like https://cpunks.org/mailman/listinfo/cypherpunks also
serves the same purpose.
is to drive away potential subscribers -- that was a funny one.
Going to that other one presents with a bad SSL certificate pointed to
On Mon, Jul 22, 2013 at 11:14:11AM +0200, jd.cypherpu...@gmail.com wrote:
22.07.2013 10:43 Eugen Leitl eu...@leitl.org:
Either way, interesting to see how many of original list members
are still around.
You do have the courage to ask? Nobody will tell you. :)
I *know* who
to the Cypherpunks mailing list. If
you're interested, you can join via
https://al-qaeda.net/mailman/listinfo/cypherpunks
Hello,
In the past couple days I've exchanged emails with John Young and
Eugen Leitl on some brokenness in the Cypherpunks mailing list. This
discussion brought us
; rv:17.0) Gecko/20130514
Thunderbird/17.0.6
On 07/17/2013 12:11 PM, Eugen Leitl wrote:
- Forwarded message from John Gilmore g...@toad.com -
Date: Tue, 16 Jul 2013 11:17:54 -0700
From: John Gilmore g...@toad.com
To: Eugen Leitl eu...@leitl.org, g...@toad.com
Cc: freedombox
)
___
tahoe-dev mailing list
tahoe-...@tahoe-lafs.org
https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http
On Thu, Jul 18, 2013 at 10:51:23AM -0500, Charles Allhands wrote:
Thanks for the link! Is there a reason why mix networks aren't commonly
used? I see mixminion hasn't been worked on in years.
Most of the payload of mix was spam and malware. It's effectively
an open relay as far as RBLs are
On Mon, Jul 15, 2013 at 02:17:38PM -0700, Tony Arcieri wrote:
They seem to have an... interesting philosophy about open source:
When you have an entire planet looking at the source code you can be
assured that the implementation is highly scrutinized and proven.
Apparently all you have to
, CAs and chat systems for Americans spring to mind.
___
cryptography mailing list
cryptogra...@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http
On Thu, Jul 11, 2013 at 08:12:32PM -0500, Paul Elliott wrote:
Are there any practical one time pad management systems out there,
GPLed for GNU/Linux?
The biggest problem of one-time pads is their generation.
You need a properly whitened and reviewed hardware entropy
source for that, which is a
On Fri, Jul 12, 2013 at 07:23:17AM -0700, Bill Woodcock wrote:
On Jul 12, 2013, at 7:15 AM, Eugen Leitl eu...@leitl.org wrote:
I would be very interested in hardware recommendations for
an affordable, high-quality hardware RNG (ideally something
like VIA Padlock RNG).
We use
tor-t...@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com
://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46
On Wed, Jul 10, 2013 at 11:03:50AM +, Andreas Bader wrote:
Tens of thousands zero-days; that sounds like totally shit. That guy
seems to be a script kiddie poser, nothing more.
Are there any real hackers that can issue a competent statement to that?
See http://blog.fefe.de/
--
Too many
https://medium.com/surveillance-state/b804de3b5b
in Surveillance State14 min read
Thank you for choosing cyberpunk dystopia.
encryption, capitalism, and law
June has been a pretty surreal month. As the Guardian and the Washington Post
continue to publish internal NSA documents in what has
___
cryptography mailing list
cryptogra...@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100
http://pastebin.com/yMGTZ1PZ#
DELETED ARTICLE FROM GUARDIAN
http://www.guardian.co.uk/info/2013/jun/30/taken-down
Revealed: secret European deals to hand over private data to America
Germany 'among countries offering intelligence' according to new claims by
former US defence analyst
At
On Mon, Jul 01, 2013 at 02:15:15AM +0200, André Rebentisch wrote:
Dear all,
do you follow the news?
http://www.guardian.co.uk/world/2013/jun/30/berlin-washington-cold-war
http://www.theglobeandmail.com/news/national/eu-confronts-us-over-alleged-spying-on-european-allies/article12899295/
http://news.cnet.com/8301-13578_3-57591391-38/surveillance-partnership-between-nsa-and-telcos-points-to-at-t-verizon/
Surveillance 'partnership' between NSA and telcos points to ATT, Verizon
Newly disclosed classified document suggests firms allowed spy agency to
access e-mail and phone call
On Wed, Jun 26, 2013 at 04:02:15PM -0700, Mike Perry wrote:
YaCY and other FOSS engines (in a sibling thread someone mentioned
another that I already forgot) are also something that I will accept
search plugins for the Omnibox, but their result quality, index depth,
and crawl frequency are no
(for the sake of completeness)
http://www.theregister.co.uk/2013/06/26/ssl_forward_secrecy/
A simple SSL tweak could protect you from GCHQ/NSA snooping
It might slow you down, but hey, you can't have everything
By John Leyden, 26th June 2013
Forward Secrecy
An obscure feature of SSL/TLS
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Too many emails
they don't know about.
--
Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM
1 - 100 of 240 matches
Mail list logo