On Sat, 2013-01-05 at 16:20 +0100, Jonas Smedegaard wrote:
> I believe Tor is only relevant to consider including into FreedomBox
> when someone can provide sensible defaults for it which can be
> integrated with the Debian packaging of Tor.
>
> Until then, Tor is outside the scope of FreedomBox
On Fri, 2012-12-07 at 01:01 +0100, Alexander Berntsen wrote:
> Hi,
>
> First-time poster here. Nice to meet you all!
>
> Seemingly "all" foundations of every kind make money off of various
> merchandise. I'm sorry if this is corny or just really ridiculous in
> the present state of the project, b
On Thu, 2012-11-29 at 17:06 +0100, Jonas Smedegaard wrote:
> But please - rather than posting (again? I didn't check my archive)
> here
> what I recommend is to make it easier to find such ongoing activities
> at
> the Wiki. Yes, I see now (thanks to your edit today) that this
> particular thin
On Wed, 2012-11-14 at 13:21 -0800, Jonathan Wilkes wrote:
> When I referred to "these" attacks going away, I was talking about
> implementations
> of the Kaminsky attack, or efforts to link an IP address with a
> transaction even
> without connecting to all nodes (say, making inferences from the da
On Mon, 2012-11-12 at 22:11 -0800, Jonathan Wilkes wrote:
> My initial point might not have been clear. To keep an ISP from spying it
> makes
> no sense to grab a different IP from the pool every time you view a web page--
> this will not impede the ISP from reviewing their log of your activity i
On Mon, 2012-11-12 at 14:13 -0800, Jonathan Wilkes wrote:
> I'm with you so far.
>
> >
> > When the attacker has the IP address of a Bitcoin address, they're one
> > step away from getting the underlying home address -- but they have to
> > go through either the legal system or an existing attac
On Mon, 2012-11-12 at 11:56 -0800, Jonathan Wilkes wrote:
> >
> > The Bitcoin transaction log records transactions between addresses. If
> > you never change your Bitcoin address, the transaction log will
> > accumulate records of your transactions.
> >
> > Without a very significant amount of w
On Mon, 2012-11-12 at 10:28 -0800, Jonathan Wilkes wrote:
> - Original Message -
>
> > From: Daniel Pocock
> > To: freedombox list
> > Cc:
> > Sent: Monday, November 12, 2012 3:32 AM
> > Subject: [Freedombox-discuss] FreedomBox and Bitcoin (and the petition)
> >
> >
> >
> > I'm just
On Thu, 2012-08-30 at 17:52 +0100, Michael Rogers wrote:
> On 30/08/12 17:45, Dan Ballance wrote:
> > Would it be possible for "power" FBX users to provide a
> > PageKite-equivalent service for other users on dynamic IPs? Could
> > these services be advertised within the FBX network maybe?
>
> I'
On Sun, 2012-07-29 at 17:40 -0500, Nick M.Daly wrote:
> To use wireless, make sure eth1 can access the Internet during the
> first-boot process, so the wireless driver is downloaded and
> installed correctly. After it reboots, it'll start broadcasting
> the
> "freedombox" network,
On Sun, 2012-07-15 at 12:37 +0200, Jonas Smedegaard wrote:
> Correct, Diaspora is written in Rails, which unfortunately is
> similarly
> worrisome as PHP: even if (arguably) the underlying Ruby language has
> saner coding style and community habits, Ruby on Rails tend to focus
> on
> rapidly mas
On Tue, 2012-06-26 at 10:27 -0700, Jonathan Wilkes wrote:
>
> The activists are the ones sending data with a tor fingerprint. The
> Everybodies are the ones doing what they were already doing--
> going to Facebook and Twitter.
>
Tor traffic is designed to be identical to HTTPS, and can even be
o
On Tue, 2012-06-26 at 09:32 +0800, Sandy Harris wrote:
> On Mon, Jun 25, 2012 at 12:20 PM, Ted Smith wrote:
>
> > On Mon, 2012-06-25 at 11:07 +0800, Sandy Harris wrote:
> >> Evgeny Morozov has written a critique of the whole
> >> notion of using the net as a way t
On Mon, 2012-06-25 at 10:00 +0200, Michiel de Jong wrote:
> Pros of Tor:
> - it is the only (or at least the most mature) option we know of to
> not inadvertently disclose your geographical position. Since
> freedombox is for a large part about privacy-by-design, that seems to
> be a strong argumen
On Mon, 2012-06-25 at 01:59 -0400, Daniel Kahn Gillmor wrote:
> Note also that Tor brings with it its own bit of centralized control, in
> the form of the 8 directory authorities [0] (4 need to be compromised
> for an adversary to gain control over your tor connection), but i think
> that's an impr
On Mon, 2012-06-25 at 11:07 +0800, Sandy Harris wrote:
> Evgeny Morozov has written a critique of the whole
> notion of using the net as a way to liberate the world.
> His book definitely has limitations; for one thing, he
> looks at the problem mainly from the point of view
> of US foreign policy.
On Tue, 2012-03-13 at 13:23 -0400, Daniel Kahn Gillmor wrote:
>
> I haven't seen any proposals for how FreedomBox could help the user
> themselves resist disclosure of their own credentials. Maybe i
> haven't
> been following closely enough. i would be happy to be wrong, please
> point me to
On Mon, 2012-03-12 at 14:59 -0400, James Vasile wrote:
> On Mon, 12 Mar 2012 18:15:27 +0000, Ted Smith wrote:
> > On Mon, 2012-03-12 at 18:47 +0100, Mathieu Jourdan wrote:
> > >
> > > - my girlfriend took briefly a look on it, she said those colours were
> &
On Mon, 2012-03-12 at 18:47 +0100, Mathieu Jourdan wrote:
>
> - my girlfriend took briefly a look on it, she said those colours were
> for males.
I'm no authority on this list, but I'd appreciate it if the freedombox
initiative would use actual research for things like choosing
gender-neutral de
On Fri, 2011-12-09 at 18:36 +0100, Eugen Leitl wrote:
>
> How are software updates planned, for that matter? Self-hosted
> via p2p or regular Debian depositories?
You can do "regular Debian" repositories over p2p
(apt-transport-debtorrent, apt-p2p). These are centrally managed, but
"self-hosted"
On Tue, 2011-10-04 at 12:38 -0400, Daniel Kahn Gillmor wrote:
>
> One thought: what about a point-to-point wired connection? That's
> pretty easy for humans to physically inspect/verify, and wouldn't need
> the additional optical verification check.
>
> Is there such a standard connection for co
On Mon, 2011-10-03 at 19:35 +0100, Michael Rogers wrote:
> On 03/10/11 18:13, The Doctor wrote:
> > Sort of like this?
> >
> > http://www.thc.org/papers/ffp.html
> >
> > I am surprised that no one has brought up bubble-babble fingerprints
> > yet (https://secure.wikimedia.org/wikipedia/en/wiki/Bu
, 2011-09-30 at 16:09 +0200, Timur Mehrvarz wrote:
> I provided this with my original post: http://timur.mobi/anymime-ksp/
> Can you please phrase your concern relative to the fingerprint
> verification example?
>
> On 30.09.2011 15:50, Ted Smith wrote:
> > So, how can a use
So, how can a user verify that the key material comes from the expected
peer? I know nothing of bluetooth and NFC, so instead of describing
low-level protocols (which in most cases are NOT implemented using free
software and CANNOT be naively trusted), please describe what I'd see
using your app.
On Mon, 2011-09-19 at 20:44 +0200, Jonas Smedegaard wrote:
> On 11-09-19 at 01:04pm, Felipe Sanches wrote:
> > This is so sick! They seem to be trying to hide the trash...
>
> Sickness is on FSF for suggesting and encouraging that approach.
The FSF position on this, for those who aren't familiar,
On Thu, 2011-09-08 at 17:54 +0200, Eugen Leitl wrote:
> On Thu, Sep 08, 2011 at 08:15:08AM -0700,
> freedombox-discuss.neophyte_...@ordinaryamerican.net wrote:
> > It's not unusual for the existing cartels to use all their tools to
> > resist a revolution. How many patents does the FreedomBox Fou
On Wed, 2011-09-07 at 15:49 -0700,
freedombox-discuss.neophyte_...@ordinaryamerican.net wrote:
> On Wed, Sep 7, 2011 at 7:41 AM, Ted Smith - te...@riseup.net wrote:
> >
> > What the Freedombox Foundation could do to address this is come up with:
> >
> > * A list
On Wed, 2011-09-07 at 08:59 -0400, Jim Tarvid wrote:
> Some commercial off the shelf products approach the design requirements for
> FreedomBox. For example, the FoxConn nT535 -
> http://www.foxconnchannel.com/product/Barebones/nT-535/index.html# The
> addition of a 2.5" SATA drive, a single stick
Tay Zonday? As in Chocolate Rain?
The internet is a great equalizer to exactly the extent that IP, DNS,
and the physical infrastructure involved is egalitarian.
On Tue, 2011-09-06 at 09:04 -0400, Jim Tarvid wrote:
> Tay Zonday undoubtedly gets closer than I will but is a server on the
> Internet
On Mon, 2011-08-15 at 15:40 +0200, Isaac Wilder wrote:
> 4) Persistent Names (which don't rely on existing DNS)
>
> a)Name resolution based on a DHT. Problem with table poisoning
> could be approached by authorizing and authenticating those that
> participate in the resolution table. T
On Tue, 2011-08-16 at 14:24 +0200, Henry Story wrote:
> Is there a good link to .onion urls ? Wikipedia does not mention
> those. I am wondering if .onion urls can be resolved using DNS or if
> they require a special protocol. If they require a special protocol,
> then one can't simply write
>
>
On Wed, 2011-08-10 at 06:33 -0700, J David Eisenberg wrote:
> On Tue, Aug 9, 2011 at 3:37 PM, Jonas Smedegaard wrote:
> > On 11-08-09 at 08:45pm, John Walsh wrote:
> [snip]
>
> > I recommended Buddycloud as an initial sample application for FreedomBox
> > development, because it...
> >
> > * is
On Tue, 2011-08-02 at 20:01 +0200, Jonas Smedegaard wrote:
> On 11-08-02 at 06:40pm, Melvin Carvalho wrote:
> > I think it's well established by now that freedombox will run a web
> > server.
>
> Personally I still keep it open to have a FreedomBox design without a
> web UI. But I might be quit
On Tue, 2011-08-02 at 18:40 +0200, Melvin Carvalho wrote:
> I think it's well established by now that freedombox will run a web server.
>
> I'm keen to start getting things up and running, even if it's only
> something as small as a web presence running under debian, maybe with
> an FB badge.
>
>
On Mon, 2011-07-18 at 22:45 +, ya knygar wrote:
> i'll not mention the possible need for ERP again:)
>
> what i know - there are, definitely, a lot of existing projects in various
> states, i think - making from what's already in Debian reps is controversial
> desicion, however - why not if w
On Tue, 2011-07-19 at 16:31 +1000, John Walsh wrote:
> Hi Ted,
> I am expressing my personal opinion and do not speak for FBF.
> >
> > I think that the mistake being made most on this mailing list
> > is the tendency to devise solutions to complicated problems.
> > Sadly, this is just not a thin
On Mon, 2011-07-18 at 17:13 -0400, James Vasile wrote:
> On Mon, 18 Jul 2011 16:14:37 -0400, Ted Smith wrote:
> Non-text part: multipart/mixed
> Non-text part: multipart/signed
> > On Mon, 2011-07-18 at 12:19 +0100, Luke Kenneth Casson Leighton wrote:
> > > a non-centrali
On Mon, 2011-07-18 at 12:19 +0100, Luke Kenneth Casson Leighton wrote:
> a non-centralised non-attackable truly peer-to-peer
> replacement for the existing DNS infrastructure.
Is this something the FreedomBox Debian project or the FreedomBox
Foundation have committed to producing?
Such a replace
On Sat, 2011-07-02 at 16:14 +0200, Lukas Nagl wrote:
> Hi,
>
> although the topic is raised in various subjects, I think that there is
> a need for a specific place to talk about how different freedomboxes
> will be able to establish communication with each other.
>
> This question doesn't conc
On Mon, 2011-07-04 at 15:52 -0400, i...@churchkey.org wrote:
> I think it is important to consider that people want a mechanism for
> enforcing community standards of SPAM and abuse. Everything from forums
> to online dating sites rely on having a mechanism for filtering out
> communications and me
On Wed, 2011-06-29 at 13:46 -0400, Daniel Kahn Gillmor wrote:
> On 06/29/2011 01:35 PM, Ted Smith wrote:
> > Any time two programs running on FreedomBoxes are talking to each other,
> > there's very little reason not to use Tor. It only makes sense not to
> > use Tor if t
On Tue, 2011-06-28 at 12:23 -0400, i...@churchkey.org wrote:
> On 06/28/2011 08:55 AM, berta...@ptitcanardnoir.org wrote:
> > First, there is no real "central" logging, no unique big
> > brother that the freedombox might want to defeat, but a lot of different
> > (from size to content) logging data
On Tue, 2011-06-21 at 19:43 +0200, Jonas Smedegaard wrote:
> On 11-06-21 at 11:56am, Anthony Papillion wrote:
> > Hi Everyone,
> >
> > I've been following the discussion here on the list and one thing I've
> > not seen a lot of discussion about is government intervention. Since
> > the Freedombo
On Tue, 2011-05-31 at 17:42 -0400, James Vasile wrote:
> On Tue, 31 May 2011 16:22:56 -0400, Ted Smith wrote:
> > On Tue, 2011-05-31 at 10:23 -0400, James Vasile wrote:
> > > * Is a torrent client and can use TOR for that purpose.
> >
> > Is this a typo? Using
On Tue, 2011-05-31 at 10:23 -0400, James Vasile wrote:
> * Is a torrent client and can use TOR for that purpose.
Is this a typo? Using Tor for BitTorrent traffic is frowned up by the
Tor Project, and the default exit policy is to block common BitTorrent
ports, and BitTorrent clients commonly leak
On Tue, 2011-05-24 at 22:27 -0400, Daniel Kahn Gillmor wrote:
> On 05/24/2011 03:31 PM, James Vasile wrote:
> > On Tue, 24 May 2011 16:05:04 -0300, Nicolás Reynolds
> > wrote:
> >>> First of all is the use of "Free World"[0] to refer to a certain sector of
> >>> the world. As the Wikipedia refere
On Mon, 2011-05-09 at 07:13 -0700, Chris Troutner wrote:
> Hey all,
>
>
>
> I'm sure that I'm not alone in getting swamped by emails from this list.
> It's great that the list is so big and so active, but the meaningful
> emails containing important information/thoughts tend to get swamped out
On Mon, 2011-03-28 at 14:51 -0500, Charles N Wyble wrote:
> > Second, I just read Phantom's license. That was quite a chore, given
> > how it is drafted. Phantom is released under the Hacktivismo
> > Enhanced-Source Software License Agreement (HESSLA), which appears to be
> > neither GPL compatib
On Sat, 2011-03-12 at 16:20 -0500, Boaz wrote:
> This is something that I think ordinary people can actually do. You
> make a phone call, up on your screen it says “clockwork pegasus”. You
> say “hey Bob, does your screen say 'clockwork pegasus'?”, and Bob
> responds “yeah, mine says 'clockwork p
49 matches
Mail list logo