This was expected.
As Skype definitely ruined its reputation as free end-to-end application for
secure communication, other products are taking their chances.
Agencies showing sudden interest in encrypted comm ---
http://gcn.com/blogs/cybereye/2013/06/agencies-sudden-interest-encrypted-com
On 2013-06-30 5:13 PM, Danilo Gligoroski wrote:
This was expected.
As Skype definitely ruined its reputation as free end-to-end application for
secure communication, other products are taking their chances.
Agencies showing sudden interest in encrypted comm ---
On 2013-06-29, at 11:48 PM, Jacob Appelbaum ja...@appelbaum.net wrote:
Natanael:
I'm not seeing that many options though. The Phantom project died pretty
fast;
https://code.google.com/p/phantom/
https://groups.google.com/forum/#!forum/phantom-protocol
http://phantom-anon.blogspot.se/
So
that if Snowden has access to them - other people who wish to have
access may also have these document - too bad none of them seem to care
to educate the public or to expose the incredibly illegal interpretation
The incidence/depth of leakers/leaks over time seems to be increasing.
Whether or
There should be a disclaimer somewhere that Tor is a competitor to I2P, is
far from perfect itself (actually has a few glaring weaknesses, such as exit
nodes), and the guy critiquing I2P works for Tor.
There should be a table somewhere that shows that
all these different systems have
I'm not seeing that many options though. The Phantom project died pretty
fast;
https://code.google.com/p/phantom/
https://groups.google.com/forum/#!forum/phantom-protocol
http://phantom-anon.blogspot.se/
I would bet that Phantom both ran out of developer time and
has discouraged further
On 29/06/13 13:23 PM, Jacob Appelbaum wrote:
http://www.guardian.co.uk/world/2013/jun/17/edward-snowden-nsa-files-whistleblower
One of the most interesting things to fall out of this entire ordeal is
that we now have a new threat model that regular users will not merely
dismiss as paranoid.
On 30-06-13 09:44, James A. Donald wrote:
On 2013-06-30 5:13 PM, Danilo Gligoroski wrote:
This was expected.
As Skype definitely ruined its reputation as free end-to-end
application for
secure communication, other products are taking their chances.
Agencies showing sudden interest in
Fully agree. I suspect the released figures showing a spike in FBI
wire-taps may be cover/laundry and indicative of receiving domestic
targetted crime tips from NSA.
Another vector: the UK GCHQ have reportedly on their list of authorized
spying motivations economic well being. That translates
Nadim Kobeissi:
On 2013-06-29, at 11:48 PM, Jacob Appelbaum ja...@appelbaum.net
wrote:
Natanael:
I'm not seeing that many options though. The Phantom project died
pretty fast; https://code.google.com/p/phantom/
https://groups.google.com/forum/#!forum/phantom-protocol
On 2013-06-30, at 9:40 AM, Jacob Appelbaum ja...@appelbaum.net wrote:
Nadim Kobeissi:
On 2013-06-29, at 11:48 PM, Jacob Appelbaum ja...@appelbaum.net
wrote:
Natanael:
I'm not seeing that many options though. The Phantom project died
pretty fast; https://code.google.com/p/phantom/
Nadim Kobeissi:
Read my email more carefully next time. I specifically encouraged
experimentation in a way that seems reasonably safe:
There's no need to be so patronizing — I'm aware that you recommended TAILS
(which is also a Tor project).
I'm sorry to write with more bad news - it
I don't think they are doing this (as I said, they only bother with the
low hanging fruit) but they could.
Is there a tool that detects changes of CA?
Certificate Patrol does it for you on client-side:
https://addons.mozilla.org/de/firefox/addon/certificate-patrol/
Our own Crossbear does
So who's out there developing any useful protocols for anonymization today?
*Anybody*? Could we try to start a new project (if needed) to create one?
I'd love to see a revitalisation of remailer research, focussing on
unlinkability (which we know many people would benefit from) rather than
Michael Rogers:
So who's out there developing any useful protocols for
anonymization today? *Anybody*? Could we try to start a new project
(if needed) to create one?
I'd love to see a revitalisation of remailer research, focussing on
unlinkability (which we know many people would benefit
The fastest hardware implementation of RC4 that I know is 2 bytes/clock. I
personally programmed a 1 byte/clock RC4 in a FPGA, it's quite simple.
At 2 bytes/clock you still need a clock of 10 gigahertz to encrypt 100
Gbps. That's unfeasible, the way it's done is using paralelism, then you
can use
I believe Anonymity is a problem orders of magnitude bigger than privacy.
Tor seems like the only serious project aiming at solving it but I think
you should be wise by choosing your enemies and Tor in its current state
is useless against government-type surveillance for the following reasongs
Oops, miscalculation. That should be a 6.5 Ghz clock for 100 Gbps. ((100
Gbps/8)/2) . Anyway I don't think anybody has hardware that fast except
maybe for IBM with the Power8.
The fastest hardware implementation of RC4 that I know is 2 bytes/clock. I
personally programmed a 1 byte/clock RC4 in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Jun 30, 2013, at 12:44 AM, James A. Donald jam...@echeque.com wrote:
Silent Circle expects end users to manage their own keys, which is of course
the only way for end users to be genuinely secure. Everything else is snake
oil, or rapidly
On 2013-06-30, at 3:44 AM, James A. Donald jam...@echeque.com wrote:
On 2013-06-30 5:13 PM, Danilo Gligoroski wrote:
This was expected.
As Skype definitely ruined its reputation as free end-to-end application for
secure communication, other products are taking their chances.
Agencies
On 2013-07-01 8:55 AM, Nadim Kobeissi wrote:
On 2013-06-30, at 3:44 AM, James A. Donald jam...@echeque.com wrote:
On 2013-06-30 5:13 PM, Danilo Gligoroski wrote:
This was expected.
As Skype definitely ruined its reputation as free end-to-end application for
secure communication, other
On 2013-06-30, at 7:36 PM, James A. Donald jam...@echeque.com wrote:
On 2013-07-01 8:55 AM, Nadim Kobeissi wrote:
On 2013-06-30, at 3:44 AM, James A. Donald jam...@echeque.com
wrote:
On 2013-06-30 5:13 PM, Danilo Gligoroski wrote:
This was expected.
As Skype definitely ruined its
aort...@alu.itba.edu.ar:
I believe Anonymity is a problem orders of magnitude bigger than privacy.
I agree - though most people think the two terms mean the same thing.
Lots of different terms are a similar set of things for different people.
Tor seems like the only serious project aiming at
Speaking of which...
If you had an extra $2-3K to give to a liberationtech or crypto project,
who do you think would benefit the most?
Thanks,
Yosem
___
cryptography mailing list
cryptography@randombit.net
Yosem Companys:
Speaking of which...
If you had an extra $2-3K to give to a liberationtech or crypto project,
who do you think would benefit the most?
Tails. They could use support:
https://tails.boum.org
All the best,
Jacob
___
cryptography
Though it wouldn't necessarily advance anonymity or cryptography knowledge I
think funding of a public repository that had reviewed, stable packages or
for the most popular distributions fnginx, apache and openssl that came with
the most secure stuff enabled; for example today Redhat doesn't ship
hRyan Hurst:
Though it wouldn't necessarily advance anonymity or cryptography knowledge I
think funding of a public repository that had reviewed, stable packages or
for the most popular distributions fnginx, apache and openssl that came with
the most secure stuff enabled; for example today
Humor or depression so hard to decide.
-Original Message-
From: Jacob Appelbaum [mailto:ja...@appelbaum.net]
Sent: Sunday, June 30, 2013 7:23 PM
To: Ryan Hurst
Cc: cryptography@randombit.net
Subject: Re: [cryptography] What project would you finance? [WAS: Potential
funding for
The way I read that (and combined with the overall disclosures that they
are basically collecting everything they can get their hands on) the NSA
has now been de-militarised, or civilianised if you prefer that term. In
the sense that, information regarding criminal activity is now being shared
Ethan Heilman:
The way I read that (and combined with the overall disclosures that they
are basically collecting everything they can get their hands on) the NSA
has now been de-militarised, or civilianised if you prefer that term. In
the sense that, information regarding criminal activity is
On 1 July 2013 01:55, Jacob Appelbaum ja...@appelbaum.net wrote:
I would like to see a tor configuration flag that sacrifices speed for
anonymity.
You're the first person, perhaps ever, to make that feature request
without it being in a mocking tone. At least, I think you're not mocking!
31 matches
Mail list logo