Perhaps you could explain what you mean here as your comment seems rather a non
sequitur.
M
-Original Message-
From: liberationtech-boun...@lists.stanford.edu
[mailto:liberationtech-boun...@lists.stanford.edu] On Behalf Of Karl Fogel
Sent: Monday, April 08, 2013 9:30 PM
To:
On 9 April 2013 01:29, Steven Clift cl...@e-democracy.org wrote:
Part of the problem maybe yahoo mail hacked accounts which are an ongoing
disaster.
What's the deal with that - I seem to get lot's of YahooMail spam...
couldn't find anything reporting on it when I googled though
--
Love
On 9 April 2013 08:29, Petter Ericson pett...@acc.umu.se wrote:
Gettings things published (as in, readable by the public) is no longer a
problem
Quite.
However, they still need to pick-and-choose... which they would then
endorse, rather than publish.
Which has long been one of the
If I understand what you are saying I think you've got it a wee bit mixed up...
-Original Message-
From: liberationtech-boun...@lists.stanford.edu
[mailto:liberationtech-boun...@lists.stanford.edu] On Behalf Of Petter Ericson
Sent: Tuesday, April 09, 2013 12:29 AM
To: liberationtech
Journals semifrequently acquire an exclusive copyright license, meaning
that you the author can not actually put your own article up for free
downloading. Instead, you need an article subscription to even access
the text (except possibly unfinished versions).
That, in short, is the difference
Some people think this is an elaborate troll. Not a Mac user so I can't
really evaluate this and as I understand it the actual details of the
iMessage implementation are not known publicly anyway.
There you go. The same beef with Skype - encrypted communications, but
Skype retains the encryption keys (assuming it works the same under
Microsoft ownership), so a no-no for privacy/security-minded
organizations and individuals.
Best Regards | Cordiales Saludos | Grato,
Andrés L. Pacheco
Call for Papers:
The 13th biennial Participatory Design Conference (PDC) in Windhoek, Namibia.
6. – 10. October 2014
www.pdc2014.org
Join us in Windhoek, Namibia in 2014 to celebrate the 13th Participatory Design
Conference (PDC). The conference theme of the PDC 2014 is “Reflecting
I entirely agree that the information could be accessed by targeting
Apple (or, likely, Skype) to access information either retroactively
or going forward.
But, one thing that did strike me as potentially an issue for LEAs
after reading the memo: given that communications aren't uniformly
going
Just a reminder...
Symposium: The Virtual Battlefield: Securing Cyberspace in a World Without
Borders
April 11, 2013 - April 12, 2013 at Stanford Law School, Crown Quadrangle
http://www.stanford.edu/group/sjil/virtual-battlefield.fb
For tech-savvy Silicon Valley, there is nothing more important
Hey libtech,
For the last couple months I've been working on a project called Tor
Browser Launcher that I hope will eventually turn into the recommended
way for GNU/Linux (and eventually Windows and Mac) users to install Tor
Browser Bundle.
It downloads the correct TBB for your architecture and
The Paris-based NGO Article 19 has put some digital security videos on
YouTube that may be of interest to anyone involved or interested in
training. At the very least it shows an attempt to try and meet the need
for such information that has long gone unmet. Any comments or thoughts
one way or
Hi Frank,
Thought it might be a good time to out myself. I've been lurking a bit on the
list here as I've recently subscribed. I appear in a couple of those videos,
so would also be happy to hear any comments or thoughts.
You can view the full videos with their interactive content here:
Pleasure to meet you, Dirk. I think the videos are a good idea, and an
effective way to introduce basic and more elaborate concepts and some
basic training. There may well different opinions on this list, of
course. And I do hope they weigh in to help us improve guidance and
training. But one way
14 matches
Mail list logo