the code once they open source it.
Cooper Quintin
PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA
On 03/22/2013 01:48 PM, R. Jason Cronk wrote:
Anybody know the people who are doing this? http://www.crypho.com/
It's still in beta, so I'm assuming they are working out bugs prior
authentication, where Cryptocat is more
oriented toward anonymity and privacy.
For what it's worth, I would prefer to use Cryptocat over Crypho for
most of the use cases I am interested in.
Cooper Quintin
PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA
On 03/22/2013 02:03 PM, Nadim Kobeissi
.
Cooper Quintin
Technology Director
radicalDESIGNS
PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA
On 04/16/2013 02:02 PM, x z wrote:
Hi Wojtek,
GoAgent is a GAE (Google AppEngine) based proxy. I don't have first-hand
experience with GoAgent, but I know it's used by many of my Google
Can you tell me how you heard about it and what you are expecting it to
do? What are the features of the software as far as you know?
Also, Applebaum's paper on breaking the security of VPN's aside, would
VPN's not be an acceptable solution?
Cooper Quintin
Technology Director
radicalDESIGNS
PGP
are not actually very
reliable when it comes down to it.
Cooper Quintin
Technology Director
radicalDESIGNS
1201 Martin Luther King Jr. Blvd, Oakland, CA
PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA
On 06/18/2013 02:14 PM, Griffin Boyce wrote:
Wasabee wasabe...@gmail.com mailto:wasabe
this in Tor
Browser to avoid search filtering.
Cooper Quintin
Technology Director
radicalDESIGNS
(O) 415-738-0456 (C) 510 827 5382
1201 Martin Luther King Jr. Blvd, Oakland, CA
PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA
On 06/24/2013 02:26 PM, Jillian C. York wrote:
I prefer
Jillian,
It is also worth noting that DDG has safe search enabled by default as
well.
Cooper Quintin
Technology Director
radicalDESIGNS
PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA
On 06/24/2013 02:26 PM, Jillian C. York wrote:
I prefer DuckDuckGo as well - although the other
not feel comfortable
using it unless a respected cryptographer has had a chance to take a
look at it, personally.
Cooper Quintin
Technology Director - radicalDESIGNS
PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA
On 09/30/2013 09:34 AM, A.Chukin wrote:
Google Play informs me
Hi Amin,
I did a presentation on mobile device security a while ago. IT mostly
focuses on Android, but there is some IOS stuff in there as well. I
have been considering turning it into a website or at least a document.
You can find it here:
https://github.com/cooperq/spiders
Cooper Quintin
PGP
I agree, if you can stomach being in the belly of the beast it might be worth
going down to interview with these guys to find out more about what kind of
privacy invading technology they are developing.
I suspect it is similar to 'Spokeo', which is a company that essentially
creates a
https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack
snip
SUMMARY:
On July 4 2014 we found a group of relays that we assume were trying to
deanonymize users. They appear to have been targeting people who operate
or access Tor hidden services. The attack
Also this point seems a bit silly. Of course youtube will keep a record
of what you are watching. And one can assume that the NSA is keeping
tabs on youtube as well regardless of whether Stanford has received any
money from them. It is still important for people to understand
surveillance law.
If it's so obvious that this is true you should have no trouble
providing a citation.
On 01/03/2016 05:18 PM, Andrés Pacheco wrote:
> You're kidding, right?
>
>> On Jan 3, 2016, at 5:59 PM, Griffin Boyce wrote:
>>
>> Andrés Pacheco wrote:
>>> recipient of NSA etc $$$
>>>
In case it's not totally apparent to anyone, this is malware. Don't
click that link!
On 05/24/2016 06:10 AM, cypherpunks wrote:
> Hi, You're not gonna believe what I've read yesterday, you've got to
> read it yourself at
>
>
>
> My best to you, cypherpunks
>
>
>
--
Liberationtech is
I've been doing a lot of work with this over the past few months at EFF.
My current conclusion is that there is nothing that an average user or
activist would be able to reasonably use. However I think that someone
who is reasonably technologically literate and wants to take the time to
learn
15 matches
Mail list logo