** Sorry for cross-posting **
*
*
*CALL FOR PAPERS: **
*
*PHILOSOPHY AND TECHNOLOGY, Springer, Editor-in-Chief: Luciano Floridi*
*Call for Papers for a Special Issue on **The Ethical and Legal Aspects of
Digital Security*
GUEST EDITORS: Pompeu Casanovas and Ugo Pagallo
Security is one of the main
http://www.nature.com/news/researchers-split-over-nsa-hacking-1.13911
Researchers split over NSA hacking
Cryptographers condemn US National Security Agency’s tapping and tampering,
but mathematicians shrug.
Ann Finkbeiner 08 October 2013
The National Security Agency is the largest employer of
[ Apologies if you receive duplicates. Please do share this message widely ]
Dear colleagues, dear friends,
I would like to share with you the recent blog post by Neelie Kroes, Vice
President of the European Commission and Commissioner for the Digital Agenda,
on Internet Governance.
The blog
Dear Liberation Tech,
On October 5th, 2013, history was made in Armenia -- the little country
that could, where leading minds have taken flight despite a difficult
social and political history.
Enter SHIFT::Tech. A world-wide app challenge that invites entrepreneurs
from around the world to
http://cisac.stanford.edu/events/7951?
Computer Network Attacks and International Law
Social Science Seminar
DATE AND TIME
October 10, 2013
3:30 PM - 5:00 PM
AVAILABILITY
Open to the public
No RSVP required
SPEAKERS
Elaine Korzak - Cybersecurity Predoctoral Fellow, CISAC, and PhD Candidate
Haven't looked at it myself - passing on for others. Cheers, -Ali
-- Forwarded message --
From: Sandra sandraordo...@openitp.org
Date: Thu, Oct 10, 2013 at 2:23 PM
Subject: [Announce] Wanted: Lantern Ambassadors
To: annou...@lists.openitp.org
Lantern is a new type of open
Hi,
Hope all is well.
Just touching base to let you know about the inaugural EdTech Venture Capital
track at the 8th annual New England Venture Summit on December 10-11, 2013.
If you know any EdTech startups that are seeking funding, there may be an
opportunity for them present their
We had some debate on this topic at the Circumvention Tech
Summit and I got some requests to publish my six reasons
not to use PGP. Well, I spent a bit more time on it and now
they turned into 10 reasons not to. Some may appear similar
or identical, but actually they are on top of each other.
In my opinion, this makes about as much sense as telling people who are
already having sex not to use condoms.
Consider mine a critique of why this post makes almost no sense to and
won't convince any member of the public. I'm sure some of the geeks here
will have a field day with it, but some
Also, the premise of your argument, 10 reasons not to start, presupposes the
truth of your argument, essentially begigng the question. Not that it makes
your other arguments invalid, but I cringed when I saw the title, and also
laughed.
- Jason Gulledge
On Oct 10, 2013, at 9:40 PM, Jillian
While there are easy ways to mess up using PGP, I think that a more
well-rounded approach is to be mindful of the ways that one can be
de-anonymized (by others or themselves) while using it.
People who don't have a holistic view of their security, and don't
want to learn more about their
Thank you for doing this work!
The world needs someone facing the truth, explaining why gpg isn't the
solution, advocating positive change. It's a communicative task, a very
difficult one. As long there is gpg, most geeks don't see need to create
better alternatives.
I'd say, gpg's development
Piece below on crossing US borders may be of interest here. Thanks to
Josh Stearns at Free Press, Dan Auberbach at EFF, among others. I'm also
pasting the link to the Canadian Bar Association's guidance to Canadian
lawyers crossing US borders.
10 reasons to give up, stop trying, hide in a corner, and die.
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password
Social Media for Social Change and Online Security
http://www.tol.org/client/training/course/23981-social-media-for-social-change-and-online-security.html
Transitions (TOL) invite applications from civil society activists for
participation in online learning courses on Social Media for Social
Interesting. But someone should also write a piece called 1 reason not
to criticise security tech without clearly stating threat model which
serves as basis for that criticism. What if Mallory isn't a
well-funded governmental organization but is the admin who runs your
employer's email servers?
Agreed. The threat model discussion clearly is too often lost in all the
current post-Snowden debates. We need to remember that a lot if solutions might
not be enough to protect anyone against NSAish authorities but more than enough
against other, most real, threats to peoples personal safety.
From: pressl...@eff.org
Electronic Frontier Foundation Media Release
For Immediate Release: Thursday, October 10, 2013
Contact:
Jillian C. York
Director for International Freedom of Expression
Electronic Frontier Foundation
jill...@eff.org
+1 415 436-9333 x118
EFF Resigns from Global
On 10/10/2013 03:55 PM, adrelanos wrote:
Thank you for doing this work!
The world needs someone facing the truth, explaining why gpg isn't the
solution, advocating positive change. It's a communicative task, a very
difficult one. As long there is gpg, most geeks don't see need to create
better
+1 - you said it much better than me.
On Thu, Oct 10, 2013 at 1:55 PM, Enrique Piracés enriq...@benetech.orgwrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi there,
I think this is a good topic for debate among those who can or are
currently developing security tools/protocols,
I'm surprised to see this list has missed the thing that bugs me most
about PGP: It conflates non-repudiation and authentication.
I send Bob an encrypted message that we should meet to discuss the
suppression of free speech in our country. Bob obviously wants to be
sure that the message is coming
On 10/10/2013 12:23 PM, carlo von lynX wrote:
1. Downgrade Attack: The risk of using it wrong.
Fixed in the new generation of clients (mailpile, LEAP, etc).
2. The OpenPGP Format: You might aswell run around the city naked.
Fixed by using StartTLS with DANE (supported in the new version of
Hello again. I will answer to most comments all in a single mail
to avoid clogging libtech. While I wrote this another ten mails
have slipped in, so expect another large reply to those. :-)
On 10/10/2013 10:00 PM, Richard Brooks wrote:
10 reasons to give up, stop trying, hide in a corner, and
Just replying to this bit of your reply to me; the rest made sense
On Thu, Oct 10, 2013 at 3:08 PM, carlo von lynX l...@time.to.get.psyced.org
wrote:
If this is still jargony to you, hmmm... you are unlikely to understand
the risks you are exposed to by using the Internet from day to day.
Ah, I see you probably meant BULLRUN. Guess it just wasn't a well-executed
pun.
On Thu, Oct 10, 2013 at 3:17 PM, Jillian C. York jilliancy...@gmail.comwrote:
Just replying to this bit of your reply to me; the rest made sense
On Thu, Oct 10, 2013 at 3:08 PM, carlo von lynX
Next collection of answers to replies.
Expect yours to be somewhere in here.
Thanks for all the feedback!
I actually expected harsher religious replies! :)
On 10/10/2013 10:55 PM, Enrique Piracés wrote:
I think this is a good topic for debate among those who can or are
currently developing
26 matches
Mail list logo