On Tue, Aug 06, 2013 at 10:43:39PM -0500, Kyle Maxwell wrote:
The key, obviously, is the primary assertion that the NSA runs lots
of Tor nodes. I've seen this assertion before, and while it's
certainly a reasonable assumption, I don't know if anybody outside the
NSA actually has hard evidence
On Aug 7, 2013, at 12:05 AM, Roger Dingledine a...@mit.edu wrote:
Consider two scenarios. In scenario one, NSA doesn't run any Tor
relays, but they have done deals with ATT and other networks to be
able to passively monitor those networks -- including the (honest,
well-intentioned) Tor relays
But this data is not useful for any but most advanced user.
TBB should autoupdate for any nongeek user. I hope some safe way of this update
exists.
--
Jerzy Łogiewa -- jerz...@interia.eu
On Aug 6, 2013, at 5:11 PM, CodesInChaos wrote:
When the user's version is outdated you already display
- Forwarded message from Patrice Riemens patr...@xs4all.nl -
Date: Wed, 7 Aug 2013 08:33:44 +0200
From: Patrice Riemens patr...@xs4all.nl
To: nettim...@kein.org
Subject: nettime Deborah Orr: What does idealism get you today? Abuse,
derision, or sometimes prison (Guardian)
User-Agent:
On 2013-08-07, at 12:44 PM, Jacob Appelbaum ja...@appelbaum.net wrote:
Bbrewer:
We're understaffed, so we tend to pick the few things we might
accomplish and writing such advisory emails is weird unless there is an
exceptional event. Firefox bugs and corresponding updates are not
On 2013-08-07, at 12:58 PM, Jacob Appelbaum ja...@appelbaum.net wrote:
Nadim Kobeissi:
On 2013-08-07, at 12:44 PM, Jacob Appelbaum ja...@appelbaum.net wrote:
Bbrewer:
We're understaffed, so we tend to pick the few things we might
accomplish and writing such advisory emails is weird
Nadim Kobeissi:
On 2013-08-07, at 12:58 PM, Jacob Appelbaum ja...@appelbaum.net wrote:
Nadim Kobeissi:
On 2013-08-07, at 12:44 PM, Jacob Appelbaum ja...@appelbaum.net wrote:
Bbrewer:
We're understaffed, so we tend to pick the few things we might
accomplish and writing such advisory
On 2013-08-07, at 1:05 PM, Jacob Appelbaum ja...@appelbaum.net wrote:
Nadim Kobeissi:
On 2013-08-07, at 12:58 PM, Jacob Appelbaum ja...@appelbaum.net wrote:
Nadim Kobeissi:
On 2013-08-07, at 12:44 PM, Jacob Appelbaum ja...@appelbaum.net wrote:
Bbrewer:
We're understaffed, so we
The advisory was about bug being exploited in the wild, so, yes.
That was covered well in Roger's last email.
I'm aware, I did read his email. I was just under the impression that
you publish advisories about *vulnerabilities*, not about *exploits*.
But perhaps you're teaching me (and the
Forgive me, but I'd like to ask a question here.
Tor is a tool that is undeniably, directly marketed toward activists in
high-risk environments. Tor's presentations at conferences centre around
how Tor obtains increased usage in Arab Spring countries that matches the
timeline of
What I'm saying, Nadim, is that it's projection. Everything you say, you
need to look in a mirror.
I haven't worked for Tor since 2007.
SN
On Wed, Aug 7, 2013 at 8:56 AM, Nadim Kobeissi na...@nadim.cc wrote:
On 2013-08-07, at 3:22 PM, Shava Nerad shav...@gmail.com wrote:
Forgive me, but
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 08/07/2013 08:22 AM, Shava Nerad wrote:
snip
Vitriol is what you produce, Nadim, and so it is what you invite when
something erupts in your own vicinity.
That's karma. Look what you are laying in terms of land mines for when
something comes
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 08/07/2013 12:35 PM, Jacob Appelbaum wrote:
The advisory was about bug being exploited in the wild, so,
yes. That was covered well in Roger's last email.
I'm aware, I did read his email. I was just under the impression
that you publish
Take this off-list. I don't want a drama libtech community anymore, i'm
sick of it. Be professional and excellent to each other or fuck each
other over off-list.
All the best,
Jurre
--
Liberationtech list is public and archives are searchable on Google. Too many
emails? Unsubscribe, change to
On 8/7/13 9:22 AM, Claudio wrote:
How about we stop this nonsense repetitive blame game and get back at
proposing good practices for the future?
Nadim, since you clearly admitted on the other thread from Shava that
you're just campaigning a personal attack against Jacob, I'm not even
Although I agree in principle (in the sense of friendly advice to
Nadim), let's all just remember this same advice the next time
Applebaum goes on one of *his* tirades, shall we?
Now returning to your regularly scheduled rants against The Man.
On Wed, Aug 7, 2013 at 8:29 AM, Joseph Lorenzo Hall
On 8/7/2013 8:29 AM, Joseph Lorenzo Hall wrote:
On 8/7/13 9:22 AM, Claudio wrote:
How about we stop this nonsense repetitive blame game and get back at
proposing good practices for the future?
Nadim, since you clearly admitted on the other thread from Shava that
you're just campaigning a
little girls?!
WTF
On Wed Aug 7 09:37:55 2013, Crypto wrote:
On 8/7/2013 8:29 AM, Joseph Lorenzo Hall wrote:
I add my vote also. If you two want to fight like little girls that it
off list. Continuing to SPAM the list with your constant bickering only
increases your lack of credibility.
Yay casual sexism... okay, everybody's had their say. I agree with
Nadim's point, but he's made it already, and I agree with those who
say it's time for us all to get back to work.
It's a beautiful day here in Texas and I hope for the same for you
all, wherever you are. I'll be getting back to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 05/08/13 19:55, Caleb James DeLisle wrote:
This is good from a capabilities standpoint but it doesn't cover
motive which is hugely important to threat modeling. If someone
has significant resources and their motive is to cause mayhem,
securing
On 8/7/2013 8:49 AM, Kyle Maxwell wrote:
Yay casual sexism... okay, everybody's had their say. I agree with
Nadim's point, but he's made it already, and I agree with those who
say it's time for us all to get back to work.
It's a beautiful day here in Texas and I hope for the same for you
+1
On Aug 7, 2013 6:25 AM, Jurre drw...@gmail.com wrote:
Take this off-list. I don't want a drama libtech community anymore, i'm
sick of it. Be professional and excellent to each other or fuck each
other over off-list.
All the best,
Jurre
--
Liberationtech list is public and archives are
[Apologies for cross posting]
Forwarded from the Web Accessibility Initiative Interest Group mailing
list. I find this development quite distressing.
*Amazon and Sony Are Requesting That The Accessibility Requirement Be
Waved for E-Book Readers*
The ) Twenty-First Century Communications
+1
From: Brian Conley bri...@smallworldnews.tv
+1
On Aug 7, 2013 6:25 AM, Jurre drw...@gmail.com wrote:
Take this off-list. I don't want a drama libtech community anymore, i'm
sick of it. Be professional and excellent to each other or fuck each
other over off-list.
All the best,
Jurre
I will happily take it off list -- but I will point out that the whole
discussion was opened with the question openly and clearly asked. If
people want to be coy with these things, perhaps they need to find
different ways to approach their diplomacy. I honestly do believe that
you get back what
I just promised myself to point out people who are not being excellent
to each other, and you are. This comment was absolutely unnecessary to
post to libtech, post it to Nadim if it was itching you so hard.
Could we quit being egomaniacs and actually get some work done? I was at
OHM last week and
On Tue, Aug 6, 2013 at 8:43 PM, Kyle Maxwell ky...@xwell.org wrote:
...
The key, obviously, is the primary assertion that the NSA runs lots
of Tor nodes.
it is incorrect to assume this is for attacking anonymity of Tor users.
more likely these nodes are used as trusted guards and exits in
No and no.
It was an issue found by a external security researcher who has submitted a lot
of issues to us over time. He found it through his process of investigation and
reported it directly to us (responsible disclosure and such). It was a problem
and we fixed it. The first indications of
(Moving on from my very, very expensively made point…)
Dear Libtech,
Cryptocat, in collaboration with OpenITP, will be hosting the very first
Cryptocat Hackathon weekend in New York City, on the weekend of the 17th and
18th of August 2013! We're going to have a coding track as well as a
OK, everyone, let's try to cool it a bit. This discussion is extremely
important, so let's not let it deteriorate into bickering. Otherwise, I'll
have to moderate it, a task I don't enjoy.
Kudos to all of you who have already expressed a similar sentiment,
Yosem, one of the moderators
On
List is now under moderation, and no personal attack of any kind will
be tolerated, per our moderation guidelines.
Yosem, one of your moderators
On Wed, Aug 7, 2013 at 9:12 AM, Jurre drw...@gmail.com wrote:
I just promised myself to point out people who are not being excellent to
each other,
On 08/07/2013 03:26 AM, Bill Woodcock wrote:
On Aug 7, 2013, at 12:05 AM, Roger Dingledine a...@mit.edu wrote:
Consider two scenarios. In scenario one, NSA doesn't run any Tor
relays, but they have done deals with ATT and other networks to be
able to passively monitor those networks --
https://github.com/cryptocat/cryptocat naturally! :D
On Wed, Aug 7, 2013 at 3:09 PM, Anthony Papillion
anth...@cajuntechie.org wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 08/07/2013 12:10 PM, Nadim Kobeissi wrote:
(Moving on from my very, very expensively made point?)
Dear
Dear All,
Some of you have written to us via Twitter or privately asking that we
implement changes to enhance discussion and reduce the incidence of
flame wars. Per your request, we're issuing a call for suggestions to
improve the liberationtech mailing list.
Consider this a brainstorming
Are they being irresponsible or aren't they?
http://mashable.com/2013/08/07/chrome-password-security/?utm_cid=mash-com-fb-main-link
That is a serous question in interested to hear a variety of opinions on,
both for and against Google's position, OK go!
Spoiler alert, I think both players are
On Wed, Aug 7, 2013 at 7:04 PM, Brian Conley bri...@smallworldnews.tv wrote:
Are they being irresponsible or aren't they?
http://mashable.com/2013/08/07/chrome-password-security/?utm_cid=mash-com-fb-main-link
That is a serous question in interested to hear a variety of opinions
this is how
Encrypting the passwords with a master passphrase wouldn't be useless. At
the very least it makes it harder to extract plaintext passwords from a
discarded harddrive. On the other hand, a master passphrase doesn't offer
nearly as much security as users think it does when they enable the
feature.
37 matches
Mail list logo