On Fri, Apr 11, 2008 at 6:16 AM, C. Scott Ananian [EMAIL PROTECTED] wrote:
...OLPC is hiring again, which means that hopefully
soon we will only be underappreciated, not quite so much overworked.
We're more than doubling our devel team, hiring QA folk (finally!),
and I'm excited. If y'all
Weren't you just posting bitter rantings how OLPC was all lost yesterday?
On Sat, Apr 12, 2008 at 1:20 AM, Edward Cherlin [EMAIL PROTECTED] wrote:
On Fri, Apr 11, 2008 at 6:16 AM, C. Scott Ananian [EMAIL PROTECTED] wrote:
...OLPC is hiring again, which means that hopefully
soon we will
Sorry, that was meant to be a reply not reply to all. mea culpa
On Sat, Apr 12, 2008 at 6:47 AM, Charles Merriam
[EMAIL PROTECTED] wrote:
Weren't you just posting bitter rantings how OLPC was all lost yesterday?
On Sat, Apr 12, 2008 at 1:20 AM, Edward Cherlin [EMAIL PROTECTED] wrote:
On
On Thu, Apr 10, 2008 at 3:08 AM, John Gilmore [EMAIL PROTECTED] wrote:
4. It is unfortunate that a respected conference did not do a
better job at vetting this paper.
I don't know who wrote the response that you are replying to, John,
but I for one welcome both the paper and broader
4. It is unfortunate that a respected conference did not do a
better job at vetting this paper.
The conference is a small USENIX workshop (Usability, Psychology and
Security). USENIX workshops generally involve fewer than 100
participants, more timely work, and less pre-publication peer
The most represive school systems we have been talking
to have been the ones in the U.S.They even claim that they
have a legal obligation to break internet access on the
laptop everywhere but the school, to ensure compliance
with the law.
I personally configured the server to not log IP
Having received a lot of publicity, the OLPC project is a great
candidate for criticism, sometimes constructive, other times done in the
absence of other serious academic research.
Potentially weak security models in windows is no news, but in OLPC...
Now this is worth taking a shot at!
On Wed, Apr 9, 2008 at 6:21 AM, Mitch Bradley [EMAIL PROTECTED] wrote:
It would have been nice if the criticisms had been delivered directly to
OLPC, instead of broadcast in a public forum, where enemies of OLPC can
cite and expand on them as evidence that OLPC is hopelessly screwed up,
so
I'm a bit slow, being a bugbear of very little brain.
I read the paper, and it seems to summarize as:
1. The BitFrost Specification is documentation, not detailed
implementation. The author does not read code.
2. BitFrost does not promise anonymity.
3. BitFrost does not cover how to
Charles,
An attempt to answer some of your questions:
Could someone let me know if *all* the BitFrost implementation is opensource?
yes
Long lived photograph/name/laptop pairing is made.
In current implementations, there is no photograph, so any discussion
of the implementation details is
Charles Merriam [EMAIL PROTECTED] writes:
I read the paper, and it seems to summarize as:
1. The BitFrost Specification is documentation, not detailed
implementation. The author does not read code.
[...]
It seems like OLPC F. should issue an immediate (preemptive) response saying:
On 09.04.2008 05:50, Jaya Kumar wrote:
On Tue, Apr 8, 2008 at 8:38 PM, Joshua N Pritikin [EMAIL PROTECTED] wrote:
On Tue, Apr 08, 2008 at 10:24:34PM -0400, Benjamin M. Schwartz wrote:
A paper called Freezing More Than Bits: Chilling Effects of the OLPC XO
Security Model will be
I'm not a security expert and won't even BEGIN to comment on that aspect.
My only comment is that one true measure of success is the prominence
of your detractors.
SO rather then getting noses out of joint, I'd suggest taking it as a
compliment and true measure of success that the project was
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
A paper called Freezing More Than Bits: Chilling Effects of the OLPC XO
Security Model will be presented next Monday at USENIX UPSEC'08 [1]. The
author has kindly posted the paper at [2], which I discovered after Google
took me to her weblog [3].
It
On Tue, Apr 08, 2008 at 10:24:34PM -0400, Benjamin M. Schwartz wrote:
A paper called Freezing More Than Bits: Chilling Effects of the OLPC XO
Security Model will be presented next Monday at USENIX UPSEC'08 [1]. The
author has kindly posted the paper at [2], which I discovered after Google
On Tue, Apr 8, 2008 at 8:38 PM, Joshua N Pritikin [EMAIL PROTECTED] wrote:
On Tue, Apr 08, 2008 at 10:24:34PM -0400, Benjamin M. Schwartz wrote:
A paper called Freezing More Than Bits: Chilling Effects of the OLPC XO
Security Model will be presented next Monday at USENIX UPSEC'08 [1]. The
It would have been nice if the criticisms had been delivered directly to
OLPC, instead of broadcast in a public forum, where enemies of OLPC can
cite and expand on them as evidence that OLPC is hopelessly screwed up,
so you should buy our competing product instead. If you get my drift.
I
Moved the top post down.
On Tue, Apr 8, 2008 at 9:21 PM, Mitch Bradley [EMAIL PROTECTED] wrote:
It would have been nice if the criticisms had been delivered directly to
OLPC, instead of broadcast in a public forum, where enemies of OLPC can cite
and expand on them as evidence that OLPC is
18 matches
Mail list logo