Daniel Kahn Gillmor d...@fifthhorseman.net writes:
On 02/15/2013 10:25 PM, Nick M. Daly wrote:
For example, is it acceptable if the client's secret key be exposed
when the box is rooted by attackers? (Probably not, but that does
let the host act as a trust proxy without relying
Hi folks, here's an active question that I'd appreciate your input on.
What is an appropriate threat-model for the FreedomBox's
client-server communications?
Please discuss on list or feel free to add to the FBX wiki:
http://wiki.debian.org/FreedomBox/ClientServerCommunication
This
Hi folks, can you help me understand how to interpret this data? It
appears that Gmail's SSL certificate changed fairly frequently during
the month of December. That seems wrong to me. What's this all mean?
https://www.betweennowhere.net/blog/2013/01/gmails-changing-ssl-certificates/
The
John Adams j...@retina.net writes:
On Sat, Jan 12, 2013 at 2:54 PM, John Adams j...@retina.net wrote:
Google has stated publically that they rapidly roll their SSL
certificates. Nothing to see here, no blog post to write, move along
now...
Thanks for pointing that out, I must've missed
fr...@journalistsecurity.net writes:
If anyone here has any thoughts about the tools recommended in this
Forbes piece, please speak up. The piece gets specific with
recommendations form Ashkan Soltani, a technologist who I do not think
is on this list, about half way down. Again, any thoughts
Andrew Mallis o...@ideograph.ca writes:
This 392 page, Creative Commons licensed handbook is designed to help
those with no prior experience to protect their basic human right to
Privacy in networked, digital domains... Most importantly however
this handbook is intended as a reference for
Paul Bernal (LAW) writes:
I've just come across this paper: The 'Re-Identification' of Governor
William Weld's Medical Information: A Critical Re-Examination of
Health Data Identification Risks and Privacy Protections, Then and
Now
It can be downloaded here: