Let's first have context -- at this time I am a 30 year old journalist. But (to
establish my geek bona fides) shortly after I could legally drive, but long
before I could vote, I went through the process of becoming a registered Debian
Linux developer.
Then, as is the case now, to achieve
Hi all,
this email to share the today release of the The Global Principles on
National Security and Freedom of Information (the Tshwane Principles)
by the Open Society Foundation.
That's a set of Policy Guidelines for the protection of National
Security Whistleblower.
Those Principles
I haven`t been watching that closely but in the course of my following the
current discussions on surveillance I have yet to see a reference to
RIM/Blackberry...
Is this because it`s recent loss of market share means it isn`t of
particular interest (I would have thought the up to recent user
This all rings very true for me: I'm a legal academic, and barely a geek, and
in reality I barely ever use crypto. I was at the Privacy Law Scholars
Conference in Berkeley last week when the PRISM story broke, and we had a
special session at the end of the conference to talk about what we knew
On Wed, Jun 12, 2013 at 06:15:30AM -0400, Sheila Parks wrote:
Why not use her instead of his?
Using his in 2013 is, indeed, misogyny
List moderator, please control this before it completely goes out of hand.
People are trying to get work done here, and this is not helping.
--
Too many
warning: plugging my wares [1] (again).
On 12-06-13 10:05, Andrew Feinberg wrote:
What exists is godawful at worse and cumbersome at best.
For a cryptosystem to really, and I mean really become widespread enough
to make an impact, it needs to be designed and implemented in such a way
that a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 11/06/13 17:47, Jonathan Wilkes wrote:
Concealing these patterns would require users to send and
receive dummy data even when they weren't sending or receiving
calls, which would drain their batteries and data allowances. It
would be possible
- Forwarded message from James A. Donald jam...@echeque.com -
Date: Wed, 12 Jun 2013 15:45:16 +1000
From: James A. Donald jam...@echeque.com
To: cryptogra...@randombit.net
Subject: Re: [cryptography] [liberationtech] New Anonymity Network for Short
Messages
User-Agent: Mozilla/5.0
@Richard: Alternative infrastructure-type projects like Commotion and
other mesh networks can certainly be put in place proactively. In fact,
that's a goal of Commotion: encouraging communities to build out their
own mesh networks, so residents have more ownership and control over
their local
http://www.cnn.com/2013/06/12/opinion/deibert-nsa-surveillance/
NSA spying trashes U.S. global role
By Ronald Deibert , Special to CNN
updated 8:32 AM EDT, Wed June 12, 2013 CNN.com
Can Americans trust NSA's surveillance?
Editor's note: Ronald Deibert is a professor of political science at the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 11/06/13 17:52, Sean Cassidy wrote:
I have created a simple anonymity network that broadcasts all
messages to participants so that you cannot associate chatters.
Hi Sean,
A few quick questions:
* Do routers subscribe to prefixes, or is it only
On 2013-06-12, at 6:20 AM, Eugen Leitl eu...@leitl.org wrote:
On Wed, Jun 12, 2013 at 06:15:30AM -0400, Sheila Parks wrote:
Why not use her instead of his?
Using his in 2013 is, indeed, misogyny
List moderator, please control this before it completely goes out of hand.
+1
NK
People
On 12 June 2013 11:15, Sheila Parks sheilaruthpa...@comcast.net wrote:
Why not use her instead of his?
What, in the phrase Glenn Greenwald had to substantially delay his
communications ?
Surprised you got so many bites.
It's not even very high quality trolling :)
--
Love regards etc
Michael Ale,
I gave numerous interviews back in 2010 when Blackberry started openly
co-operating with governments to keep their service online. The concerns
raised then, to this day then remain unanswered by the company.
Given the company's unwillingness to constructively engage and be open
- Forwarded message from Wasa wasabe...@gmail.com -
Date: Wed, 12 Jun 2013 15:32:02 +0100
From: Wasa wasabe...@gmail.com
To: cryptogra...@randombit.net
Subject: Re: [cryptography] [liberationtech] New Anonymity Network for Short
Messages
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
Couple of problems in that article: it says google has keys, thats not the
problem; google uses EDH ciphersuites by default like the next guy, and
while its possible that NSA/PRISM has demanded SSL server keys from google,
or from their CA perhaps without googles knowledge, and is actively MITM
From: Michael Rogers mich...@briarproject.org
To: Jonathan Wilkes jancs...@yahoo.com; liberationtech
liberationtech@lists.stanford.edu
Sent: Wednesday, June 12, 2013 6:58 AM
Subject: Re: [liberationtech] Building a encrypted mobile network
-BEGIN PGP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/11/2013 09:56 PM, Kate Krauss wrote:
This is the beauty of cryptoparties--people can sit next to you and
talk you through it. Thanks, Asher Wolf. That is often all it
takes.
I think it's time for another wave of cryptoparties.
- --
The
On Wed, Jun 12, 2013 at 6:34 AM, Michael Rogers
mich...@briarproject.org wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 11/06/13 17:52, Sean Cassidy wrote:
I have created a simple anonymity network that broadcasts all
messages to participants so that you cannot associate chatters.
- Forwarded message from Tim tim-secur...@sentinelchicken.org -
Date: Wed, 12 Jun 2013 09:34:11 -0700
From: Tim tim-secur...@sentinelchicken.org
To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com
Subject: Re: [ipv6hackers] opportunistic encryption in IPv6
User-Agent:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 2013.06.12 11.54, micah wrote:
I'm constantly hearing from people who complain about the UI in
things like gnupg. I feel your pain, I do not want to argue that
you are wrong. However, I do want to argue that complaining doesn't
help to solve
Dear all,
I spent some time writing a blogpost aimed at not-so-aware people who
may have heard about PRISM but lack the background knowledge about
massive surveillance and as such could make incorrect decisions if
trying to protect themselves.
- Forwarded message from Will Yager will.ya...@gmail.com -
Date: Wed, 12 Jun 2013 11:08:27 -0500
From: Will Yager will.ya...@gmail.com
To: cryptogra...@randombit.net
Subject: Re: [cryptography] [ipv6hackers] opportunistic encryption in IPv6
X-Mailer: iPhone Mail (10B146)
The process of
Dear friends,
i would like to share with you this project and see your comments.
http://prism-break.org/
best,
--
Andrea Stroppa
http://huffingtonpost.com/andrea-stroppa
@andst7
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at
the ideal would be to hit a high enough rate that it makes real-time
analysis of content (by a human) impossible. By the time the service hit
that rate of chats, it will be nigh-unusable by people.
Every client could broadcast a message on a timer. Sometimes the message
would be wheat and
On Wed, Jun 12, 2013 at 05:59:38PM +0200, Eugen Leitl wrote:
Here, I just don't understand the logic. To me, encrypting without
authenticating buys you absolutely nothing, except to burn CPU cycles
and contribute to global warming. In the *vast* majority of
networking technology we use,
On 6/12/13 10:21 AM, John Adams wrote:
[...] This is one of the reasons why the EFF does not recommend
tools. The issues associated with each tool are myriad and vast. [...]
Huh? The EFF Surveillance Self Defense article, while out-of-date,
does recommend tools.
https://ssd.eff.org/tech
--
There are a few great places to look at your options for breaking out of
tracking situations:
Fix your tracking situation (to some extent): http://fixtracking.com/
Get recommendations at: http://prism-break.org/
Get more in-depth information and recommendations: https://ssd.eff.org/tech
~Griffin
On 12-06-13 19:21, John Adams wrote:
I like that you're promoting free and open tools, but your title is
misleading.
You offer people false hope here. By listing the tools and not listing
what level of security they offer, people will assume they can just
switch and be protected. This is one of
Dear friends
about John Adams, i just copied the title of the website. No more, no less.
2013/6/12 Guido Witmond gu...@witmond.nl
On 12-06-13 19:21, John Adams wrote:
I like that you're promoting free and open tools, but your title is
misleading.
You offer people false hope here. By
I see many emails from journalists here about this project. I'm not
the author, i'm just a visitor like you. the author's email is:
p...@nylira.com (you can find on the footer)
thank you!
2013/6/12 Andrea St and...@gmail.com:
Dear friends
about John Adams, i just copied the title of the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Obviously we don't know much about NSA/CIA spying on citizens and
non-citizens but my question is this:
I am a dual citizen of the US and Canada, many of the tools I use I
identify as a Canadian. I am the leader of a Canadian political party,
and
My bad, I thought you were the author of the page.
In any event, I hadn't seen the EFF SSD page and had been cautioned by EFF
staffers about recommending tools.
Their approach is vastly better (albeit more verbose) than just raw
recommendations of products. They go into full explanations of what
- Forwarded message from Eric Beck ersatz...@gmail.com -
Date: Wed, 12 Jun 2013 10:41:48 -0500
From: Eric Beck ersatz...@gmail.com
To: nettim...@kein.org
Subject: Re: nettime dark days
On Wednesday, June 12, 2013, Keith Hart wrote:
European governments are challenging the Obama
On 12 June 2013 14:21, Travis McCrea m...@travismccrea.com wrote:
I was wondering if you guys had any ideas on how to potentially leverage
that to perhaps sue the CIA in an effort to ensure they are not
collecting any data on Travis McCrea the Canadian who is Travis
McCrea the American. Is
We've updated the app and the website a bunch this week. We hope that it's
even more useful and functional now.
Please go to ostel.co and start using our tool for encrypted phone calls.
We'd love to hear feedback. Thanks!
--*
@mbelinsky https://twitter.com/mbelinsky |
From: micah mi...@riseup.net
To: Andy Isaacson a...@hexapodia.org; liberationtech
liberationtech@lists.stanford.edu
Sent: Wednesday, June 12, 2013 11:54 AM
Subject: Re: [liberationtech] Guardian reporter delayed e-mailing NSA source
because crypto is a pain
Now EFF has too.
https://www.eff.org/document/fisc-opinion-and-order-granting-effs-motion
--
James S. Tyre
Law Offices of James S. Tyre
10736 Jefferson Blvd., #512
Culver City, CA 90230-4969
310-839-4114/310-839-4602(fax)
jst...@jstyre.com
Policy Fellow, Electronic Frontier Foundation
+1 Micah
+1 Jillian Anne and Paul.
On Jun 12, 2013 7:24 PM, micah mi...@riseup.net wrote:
Eleanor Saitta e...@dymaxion.org writes:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 2013.06.12 11.54, micah wrote:
I'm constantly hearing from people who complain about the UI in
Dear list,
FYI, the standard practice at Stanford (and many other universities and
Fortune 500 corporations) is to use gender-neutral terms when speaking or
writing. Doing otherwise is considered disrespectful.
Of course, everyone has a right to free speech. But, if someone is
disrespectful,
Meant to post this to the whole list, sorry.
--
James S. Tyre
Law Offices of James S. Tyre
10736 Jefferson Blvd., #512
Culver City, CA 90230-4969
310-839-4114/310-839-4602(fax)
jst...@jstyre.com
Policy Fellow, Electronic Frontier Foundation
https://www.eff.org
-Original Message-
From:
From: Preston Rhea preston.r...@gmail.com
I need your help for a project that will bring me to 10 cities to
teach folks how to organize mesh networks. I'd like to contact the
brigade captains and organizers in these cities to build
relationships:
Bay Area Reno Salt Lake City Denver Omaha
Find below two of our Spies Without Borders posts looking into how the
information disclosed in the NSA leaks affect the international community.
* Spies Without Borders : Using Domestic Networks to Spy on the World.
By Tamir Israel (CIPPIC) and Katitza Rodriguez (EFF)
*
On Tue, Jun 11, 2013 at 8:45 AM, Eugen Leitl eu...@leitl.org wrote:
From: Jim Small jim.sm...@cdw.com
To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com
Better-Than-Nothing Security: An Unauthenticated Mode of IPsec
http://tools.ietf.org/html/rfc5386
Thanks - I was not aware of
[BTW, thanks Eugen for forwarding these posts!]
Date: Wed, 12 Jun 2013 09:34:11 -0700
From: Tim tim-secur...@sentinelchicken.org
To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com
Subject: Re: [ipv6hackers] opportunistic encryption in IPv6
[...]
S many different attempts
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/12/2013 11:17 AM, KheOps wrote:
Dear all,
I spent some time writing a blogpost aimed at not-so-aware people
who may have heard about PRISM but lack the background knowledge
about massive surveillance and as such could make incorrect
From: Arlene Luck al...@law.usc.edu
Information Technologies International Development has just published its
latest issue at http://itidjournal.org/index.php/itid.
Reflections at the Nexus of Theory and Practice:
Selected Papers from ICTD2012
Jonathan Donner, Rebecca E. Grinter, Gary Marsden
U.S. Senate Committee on Appropriations (Jun 12) - Hearing on
Cybersecurity:
http://www.appropriations.senate.gov/ht-full.cfm?method=hearings.viewid=33dda6f9-5d83-409d-a8c5-7ada84b0c598
Complete video of the hearing and prepared testimony of each of the
witnesses is linked here. This
48 matches
Mail list logo