On Fri, Aug 19, 2016 at 11:22:48AM -0700, Jenna Burrell wrote:
> When considering usage, don't forget to think about phone sharing. There's
> a piece I wrote a while back (pre smartphone) that discusses practices
> around phone sharing in rural Uganda and the related gender dynamics:
> --
Libtech folks:
This month's San Francisco Techno-Activism Third Monday has two very special
guest speakers, who I thought you would all appreciate:
MARIETJE SCHAAKE, one of the leading lights in Internet issues in the European
Parliament, and KAJA KALLAS, who as a Parliamentary member for
On Mon, Oct 06, 2014 at 05:56:59PM +0100, Eleanor Saitta wrote:
On 2014.10.06 01.56, Bill Cox wrote:
I will have an impact on the code going forward. Also, I am
entirely a pragmatist. I am an engineer, not a cryptographer, and
I build stuff that works in the real world. Can you explain a
(Apologies if you get this via a few mailing lists. I've tried to spread
it widely yet thinly. And of course, feel free to forward yourself, if
only so I get less blame for over-forwarding)
The newly created Review Group on Intelligence and Communications
Technologies is seeking public comment on
tech expertise is more highly distributed right now
across Amsterdam and Nevada than usual, but it might make sense to meet
soon to discuss some of these developments. Local and cloud security has
never looked so precarious, nor attacks more well-funded.
d.
On Wed, Jul 31, 2013 at 7:32 PM, Danny
On Wed, Jul 24, 2013 at 12:14:59AM +0100, Caspar Bowden (lists) wrote:
So the spying on the rest-of-the-world's data sent to the US, including
information with respect to a foreign-based political organization or
foreign territory that relates to the conduct of the foreign affairs of
On Wed, Jul 17, 2013 at 01:27:27AM -0400, Catherine Roy wrote:
Hi Jonathan,
On 2013-07-16 02:04, Jonathan Wilkes wrote:
Hi Catherine,
Thanks for the link! I didn't know about that effort until now.
It seems like there are two fronts-- one, which you address by
jettisoning EME in
On Wed, Jul 17, 2013 at 09:52:06AM -0400, Joseph Lorenzo Hall wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed Jul 17 01:27:27 2013, Catherine Roy wrote:
Also, has the EFF's formal objection had any effect?
To my knowledge, no information has yet been made public
I received this message from a colleague; they've given me permission to
ask on open forums, provided I maintain their anonymity. I can field
questions about their project, although I think the threat model here is
targetted traffic surveillance by existing centralised security
services, and the
--- Forward as much as you like ---
Hey everyone,
Every month, a group of hacktivists in New York working on
anti-censorship and anti-surveillance team meet up to collaborate, meet
new friends, and recruit for projects. We're starting a cousin event
here in San Francisco, and
On Wed, Dec 19, 2012 at 05:26:05AM +, Jacob Appelbaum wrote:
Hi,
fr...@journalistsecurity.net:
But if
you're getting information security advice from a Forbes blog, that
will be the least of your worries.
Where would you suggest we get information security advice from?
This
On 10/15/2012 05:55 PM, Lee Fisher wrote:
FYI, Mozilla clarifies policy on B2G RIL blobs.
[The platform might become a handset option, someday, in some countries,
starting with Latin America, AFAIK. Today you can dual-boot it on a few
Android v4 phones.]
https://wiki.mozilla.org/B2G/RIL
12 matches
Mail list logo