Kate Krauss ka...@critpath.org wrote:
Dear Liberationists:
I'm an non-technical activist who works with communities with serious
threat models who just published *“A Modest Proposal for Encrypting the
Work of Activists.*”
https://medium.com/p/f561c5260bf3
I hear ya Kate. We have started an
Not to be a downer here, but until this is addressed:
- security is incredibly easy to use
- security does not slow down the internet or the computing power
- security does not attract the attention of security services
then all the training in the world isn't going to make people take these
Katy Pearce katyca...@gmail.com wrote:
Not to be a downer here, but until this is addressed:
Your post specifically discussed building a training wizard and I was simply
showing you what we had done here to make a simple, friendly experience using
plain language.
I would keep the discussion
My point is that, to my understanding, there already exists a lot of very
digestible trainings. But until other issues are addressed, adoption is not
likely. Decades of research tells us this. :)
On Mon, Jan 20, 2014 at 11:17 AM, Nathan of Guardian
nat...@guardianproject.info wrote:
Katy
Hi list,
I'm thinking about setting up a slightly modified version of nweb
as a Tor hidden service:
http://www.ibm.com/developerworks/systems/library/es-nweb/index.html?ca=dat
This is for fun, mostly just to learn some more about Tor hidden
services and webservers. But it's got me
On Jan 20, 2014, at 11:07 AM, Katy Pearce katyca...@gmail.com wrote:
- security does not slow down the internet or the computing power
Unfortunately, low-latency access and anonymity are two opposing goals. That is
the reason why Tor's threat model does not include a global passive
Hi,
I think the idea is that there is a subset of activists and journalists who
are very motivated to encrypt who can't. Glen Greenwald comes to mind. I
come to mind, and a bunch of my activist friends from countries under
pressure. I don't see much easy to use instruction on how--and finding
Okay, my perspective comes from researching and knowing activists in
authoritarian states - they have so much ICT security training and
documentation thrown at them in a multitude of languages, yet they still
don't use it. I had no idea that someonel ike Glen Greewald - a native
English speaker
Glenn said he didn't know how to encrypt until Snowden taught him how:
http://www.huffingtonpost.com/2013/06/10/edward-snowden-glenn-greenwald_n_3416978.html
On Mon, Jan 20, 2014 at 11:36 AM, Katy Pearce katyca...@gmail.com wrote:
Okay, my perspective comes from researching and knowing
Kate Krauss ka...@critpath.org writes:
Dear Liberationists:
I'm an non-technical activist who works with communities with serious
threat models who just published *“A Modest Proposal for Encrypting
the Work of Activists.*”
https://medium.com/p/f561c5260bf3
See what you think. It's not a
Nweb is easily exploitable
A simple petition like this crashs server:
GET
BTW, mod_security it's available for Nginx at beta stage, it's a good deal
install it and add OWASP core rules. For dynamic content, CMS like drupal,
wordpress, joomla, etc, works better Atomicorp (GotRoot) rules for
mod_security.
2014/1/20 Jorge SoydelBierzo berci...@soydelbierzo.com
Nweb is
Thanks for this--comments throughout:
On Mon, Jan 20, 2014 at 2:43 PM, Nicolás Reynolds
fa...@endefensadelsl.orgwrote:
Kate Krauss ka...@critpath.org writes:
Dear Liberationists:
I'm an non-technical activist who works with communities with serious
threat models who just published *“A
Nathan of Guardian nat...@guardianproject.info wrote:
Katy Pearce katyca...@gmail.com wrote:
Not to be a downer here, but until this is addressed:
Your post specifically discussed building a training wizard and I was
simply showing you what we had done here to make a simple, friendly
From: Stuart Hamilton stuart.hamil...@ifla.org
http://www.eurodig.org/subject-proposals
There you can see a number of proposals for the theme of this year’s
European Internet Governance Forum (also known as the EuroDIG). IFLA
has submitted the following proposal for a main theme:
The Internet
Adam Midvidy:
On Jan 20, 2014, at 11:07 AM, Katy Pearce katyca...@gmail.com
wrote:
- security does not slow down the internet or the computing power
Unfortunately, low-latency access and anonymity are two opposing
goals.
This isn't a natural law, though. It only requires a bunch of
Katy Pearce:
they have so much ICT security training and
documentation thrown at them in a multitude of languages, yet they still
don't use it.
As someone who writes documentation (for the Whonix project and
previously for torproject wiki), I suppose instructions are too long and
complex. The
Kate Krauss:
I do see a lot of obsolete sites
Seems like we haven't adapted to the documentation is a process, not a
one time task mindset at large yet.
There is also little motivation in creating new content. There is so
much obsolete content with with good spots in engine, who will read your
On 01/20/2014 02:56 PM, Jorge SoydelBierzo wrote:
Nweb is easily exploitable
A simple petition like this crashs server:
GET
From: David Tindall tind...@mail.ubc.ca
Some folks might be interested that a special issue of Social Movement
Studies has been published on social networks and social movements.
Details are available at:
http://www.tandfonline.com/loi/toc/csms20/13/1
I believe access to this special issue is
http://www.theglobeandmail.com/technology/business-technology/the-strange-connection-between-the-nsa-and-an-ontario-tech-firm/article16402341/
January 20, 2014
The strange connection between the NSA and an Ontario tech firm
By OMAR EL AKKAD
For more than six years, one of the central items listed
I've tested this several years ago, may be the get needs to be bigger for a
buffer overflow (over 1012 bytes, no matters if you use A, U or 5 ;-D)
When buffer overflow works, you can get a core dump file.
With ESP and EIP values in core dump, and patternOffset tool from
Metasploit, you can
*Seems like we haven't adapted to the documentation is a process, not aone
time task mindset at large yet.*
:) Maybe making a list of accidental offenders and then asking them to
take down their old info would be useful? I haven't tried this before,
though; maybe it's difficult to track them
23 matches
Mail list logo