On Fri, Mar 22, 2013 at 12:08:42PM -0400, Nadim Kobeissi wrote:
Regarding SSL, hasn't Skype claimed in the past that the conversations are
encrypted client-to-client, as in, even from Microsoft or Skype itself?
Why is it relevant what they claimed? You can't check it, so why
spend any time on
https://bitmessage.org/wiki/Main_Page
Bitmessage
Bitmessage is a P2P communications protocol used to send encrypted messages
to another person or to many subscribers. It is decentralized and trustless,
meaning that you need-not inherently trust any entities like root certificate
authorities. It
(full text available on site)
http://www.nature.com/srep/2013/130325/srep01376/full/srep01376.html
Unique in the Crowd: The privacy bounds of human mobility
Yves-Alexandre de Montjoye, César A. Hidalgo, Michel Verleysen
Vincent D. Blondel
Scientific Reports 3, Article number: 1376
http://www.nature.com/news/brain-scans-predict-which-criminals-are-more-likely-to-reoffend-1.12672
Brain scans predict which criminals are more likely to reoffend
Neuroimaging 'biomarker' linked to rearrest after incarceration.
Regina Nuzzo
25 March 2013
Activity in a particular region of
-
___
Discuss mailing list
disc...@lists.hackerspaces.org
http://lists.hackerspaces.org/mailman/listinfo/discuss
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
)
nyt reports capture of scuba divers attempting to cut telecom egypt
undersea fiber.
http://www.nytimes.com/aponline/2013/03/27/world/middleeast/ap-ml-egypt-internet.html
randy
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
On Wed, Mar 27, 2013 at 10:37:50PM -0500, Andrés Leopoldo Pacheco Sanfuentes
wrote:
The beauty of democracy! :-)
Failure, actually. It shows that democratic decisions
tend to produce technically suboptimal results.
That the whole list was spammed with voting traffic
just adds insult to injury
On Tue, Apr 02, 2013 at 06:45:37PM +0100, Bernard Tyers - ei8fdb wrote:
Suggestion 1: Can we trial putting the UNSUBSCRIBE footer (that part of the
e-mail that no-one reads) at the top of the e-mail so everyone sees it?
No, because then *everybody* has to see it.
--
Too many emails?
On Wed, Apr 03, 2013 at 10:33:17AM -0400, Joseph Lorenzo Hall wrote:
Top-posting is definitely worse. Don't do it.
A very minor point that isn't especially relevant to libtech, I suspect: I
work with a number of blind advocates and top-posting makes their lives much,
much easier (since
On Wed, Apr 03, 2013 at 11:16:08AM -0700, Katy P wrote:
If my laptop was stolen, for example, some website or something that I (or
someone else) could log into and delete the contents of the laptop's hard
drive.
Or you could use an encrypting filesystem, which requires a password
on boot, and
On Wed, Apr 03, 2013 at 11:51:11AM -0700, Katy P wrote:
What is easier for a lay person and least susceptible to a smart thief?
You didn't mention your operating system, but in terms of least
pain I would go with http://www.truecrypt.org/downloads and
encrypt the whole drive. Make sure your
://list.pitt.edu/mailman/listinfo/ccm-l
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014
http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0059909
Abstract
The metabolic phenotype varies widely due to external factors such as diet
and gut microbiome composition, among others. Despite these temporal
fluctuations, urine metabolite profiling studies have suggested
On Thu, Apr 18, 2013 at 08:50:22PM +, Andreas Bader wrote:
Hetzner Germany is pretty good.
We use it since years and never had problems with it.
Hetzner is good and cheap (though no longer that
cheap) but they'll drop you like a hot potato
in case of ever the slightest problems.
I would
On Sun, Apr 21, 2013 at 03:07:35PM +0200, ilf wrote:
I can't believe this bullshit thread recommending *only* commercial
services.
Look, free is distinctly unaffordable. If you need a dedicated
box somebody has got to pay for the hosting and remote hands.
Activists donating own resources are
On Sun, Apr 21, 2013 at 09:26:05PM -0400, micah wrote:
Can't rely on them to be there for what exactly?
Just being there and responsive for the entire duration
you need them.
Where is the liberatory technological element to recommending commercial
The liberatory technological element is
http://www.acri.org.il/en/2013/04/24/ag-tourists-israel-emails/
Attorney General: Tourists’ Emails Can be Searched at Israel’s Borders
Update:April 24, 2013
Photo by Tal Dahan
In response to an inquiry from ACRI regarding reports of authorities
requiring access to tourists’ email accounts
On Thu, May 16, 2013 at 10:18:09PM +, andreas.ba...@nachtpult.de wrote:
I am a Member of the Piraten in Germany.
Let me answer with a question. Do you really think a party like that has a
chance in the USA?
Failure is default if you never try.
--
Too many emails? Unsubscribe, change to
On Fri, May 24, 2013 at 12:56:32PM -0700, Yosem Companys wrote:
From: Dan Gillmor d...@gillmor.com
Given the vanishingly small likelihood that companies or governments
will do anything about cell phone tracking, I'm interested in what
countermeasures we can take individually. The obvious one
On Fri, May 24, 2013 at 02:19:05PM -0700, Seth David Schoen wrote:
I'm curious whether people in some countries have had success using
wifi-only phones, including to make and receive calls by VoIP. There
are ways that wifi can be more private in some ways in some situations
compared to the
http://www.businessweek.com/articles/2013-05-23/how-the-u-dot-s-dot-government-hacks-the-world#r=tec-st
How the U.S. Government Hacks the World
By Michael Riley on May 23, 2013
http://www.businessweek.com/articles/2013-05-23/how-the-u-dot-s-dot-government-hacks-the-world
Obscured by trees and
http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data
NSA taps in to internet giants' systems to mine user data, secret files
reveal
• Top secret PRISM program claims direct access to servers of firms including
Google, Facebook and Apple
• Companies deny any knowledge of program
On Fri, Jun 07, 2013 at 12:32:10PM +1200, Andrew Lewis wrote:
PRISM isn't really even that illegal, as long as they discard communications
considered to be American.
So, as long as every TLA world wide does, and they all share the information,
everything is all right? Not so fast.
The NSA
/~bicknell/
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89
On Fri, Jun 07, 2013 at 08:32:36AM -0400, Rich Kulawiec wrote:
These revelations constitute an existence proof that the number
of backdoors in various services is nonzero.
There's no reason to believe that this nonzero value is 1.
It is prudent to believe that the value is exactly one.
On Thu, Jun 06, 2013 at 09:23:03PM -0700, x z wrote:
What surprised me is how Guardian and Washington Post cover this story.
The Power Point slides looks laughable to me. Maybe I should interpret
direct access to servers of firms as like when I'm typing this email I am
also having *a direct
On Fri, Jun 07, 2013 at 09:15:32AM -0400, Rich Kulawiec wrote:
Mine is something like this: if one day, the folks from the NSA showed
up at X's door with a van full of equipment and asked nicely if they
could please bring it in, then why wouldn't their counterparts in every
other country do
at that provider and it
was
utterly contrary to the expressed culture.
take up beekeeping, or alcohol, or something.).
--
Jamie Rishaw // .com.arpa@j - reverse it. ish.
arpa / arpa labs
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
On Fri, Jun 07, 2013 at 10:18:25AM -0400, Griffin Boyce wrote:
I'll keep that in mind the next time someone from Tor promotes Riseup ;-)
But seriously, average users need to have basic services that are
(unfortunately) run by third parties. At a minimum, diversification
of services
On Fri, Jun 07, 2013 at 04:28:31PM +0200, M. Fioretti wrote:
BTW, since I'm getting offlist questions about this: in case you were
thinking what you want is the FreedomBox, NO, what I'm talking about
is NOT the FreedomBox. What I'm suggesting is compatible with the
FreedomBox, but it's
speculation, I'm not speaking for anyone,
on behalf of anyone, or even remotely authorized
or acknowledged by any entity on this rambling,
so please don't go quoting this anywhere else,
it'll make you look foolish, and probably get me
in trouble anyhow. :(
Matt
- End forwarded message -
--
Eugen
Native IPv6 deployment is on an exponential
track http://www.google.com/ipv6/statistics.html
Unlike IPv4, IPv6 has had encryption as part
of the specs, but no opportunistic ways to
set up an encrypted session.
There have been efforts like
http://www.inrialpes.fr/planete/people/chneuman/OE.html
On Mon, Jun 10, 2013 at 10:27:33PM +0200, Guido Witmond wrote:
The big deal is that now it's become impossible to believe the lies, and
that you [Americans] are forced to accept the truth.
Reality check: https://twitter.com/_nothingtohide
-no-illegal-spying/article_ec623964-d23a-53c6-aeb0-14bf325a7f3c.html
scott
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
of it.
--Jim
___
Ipv6hackers mailing list
ipv6hack...@lists.si6networks.com
http://lists.si6networks.com/listinfo/ipv6hackers
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
/listinfo/ipv6hackers
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89
___
Ipv6hackers mailing list
ipv6hack...@lists.si6networks.com
http://lists.si6networks.com/listinfo/ipv6hackers
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM
/cryptopolitics
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89
On Wed, Jun 12, 2013 at 06:15:30AM -0400, Sheila Parks wrote:
Why not use her instead of his?
Using his in 2013 is, indeed, misogyny
List moderator, please control this before it completely goes out of hand.
People are trying to get work done here, and this is not helping.
--
Too many
(Windows NT 5.1; rv:17.0) Gecko/20130509
Thunderbird/17.0.6
Reply-To: jam...@echeque.com
On 2013-06-12 1:09 PM, Peter Gutmann wrote:
Eugen Leitl eu...@leitl.org either writes or quotes:
- Forwarded message from Sean Cassidy sean.a.cass...@gmail.com -
- Any specific reason you picked CTR?
CTR
:17.0) Gecko/20130510
Thunderbird/17.0.6
On 12/06/13 07:27, Eugen Leitl wrote:
Additionally to this, CTR allows bit-level maleability of the cleartext:
a bit flipped in a CTR cipherstream translates into a bit flipped in
the cleartext.
all encryption modes usually provide confidentiality
___
Ipv6hackers mailing list
ipv6hack...@lists.si6networks.com
http://lists.si6networks.com/listinfo/ipv6hackers
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
like Scrypt. It's not more difficult to implement
than SHA et al. but it's slower to brute-force with dedicated crypto hardware.
On Jun 12, 2013, at 5:21, Eugen Leitl eu...@leitl.org wrote:
- Forwarded message from Jim Small jim.sm...@cdw.com -
Date: Wed, 12 Jun 2013 03:31:10 +
-
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Too many emails? Unsubscribe, change
Any Debian developers listening?
- Forwarded message from Jonas Smedegaard d...@jones.dk -
Date: Thu, 13 Jun 2013 01:28:18 +0200
From: Jonas Smedegaard d...@jones.dk
To: Eugen Leitl eu...@leitl.org, freedombox-disc...@lists.alioth.debian.org
Subject: Re: [Freedombox-discuss] BTNS
https://www.coursera.org/course/crypto?utm_classid=971022utm_notid=5333944utm_linknum=1
Cryptography I
Dan Boneh
Learn about the inner workings of cryptographic primitives and how to apply
this knowledge in real-world applications!
Workload: 5-7 hours/week
Watch intro video
Sessions:
Jun
On Fri, Jun 14, 2013 at 12:11:34AM -0700, William Gillis wrote:
Now that everyone knows about the NSA isn't it time you tackled setting up
PGP?
If it's not transparent, Johny User will eventually drop it.
Before you do that, rather enable StartTLS on your mail
transport agent (e.g. postfix).
http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html
U.S. Agencies Said to Swap Data With Thousands of Firms
By Michael Riley - Jun 14, 2013 4:44 AM GMT+0200
Thousands of technology, finance and manufacturing companies are working
closely with
On Thu, Jun 13, 2013 at 02:51:05PM -0400, Lorenzo Franceschi Bicchierai wrote:
Hey guys,
In lieu of the recent NSA leaks, I'm going to transfer my website to a new
provider in either Sweden or Iceland (because well, you never know).
Griffin Boyce suggested I use moln.is, do you guys have any
http://www.guardian.co.uk/environment/earth-insight/2013/jun/14/climate-change-energy-shocks-nsa-prism
Pentagon bracing for public dissent over climate and energy shocks
NSA Prism is motivated in part by fears that environmentally-linked disasters
could spur anti-government activism
US
will (look into
this message's rich headers, chances are, you're already
secure along some part of transport way without being
even aware of it).
And of course it's fully compaptible with VPNs, or GNUPG
or whatever have you.
--
Matt Johnson
On Fri, Jun 14, 2013 at 12:56 AM, Eugen Leitl eu
On Fri, Jun 14, 2013 at 01:32:14PM -0400, Griffin Boyce wrote:
The Doctor dr...@virtadpt.net wrote:
1984.is have been very helpful to colleagues of mine. The boxen over
there are said to be very stable.
The only downside with 1984 is they require you to order an annual
subscription,
?
---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com
Luck is the residue of opportunity and design.
-- John Milton
--
Phil Fagan
Denver, CO
970-480-7618
- End forwarded message -
--
Eugen* Leitl a href=http
it could be done cheaper somewhere
else presupposes we know the economics of what they're trying to do.
We don't, so we should assume that routers just like everything else are
a target, and that you almost certainly won't notice it if they are.
Mike
- End forwarded message -
--
Eugen* Leitl
On Sat, Jun 15, 2013 at 03:10:36AM +0200, Moritz Bartl wrote:
On 15.06.2013 02:18, Guido Witmond wrote:
The original analysis read to me:
We face severe problems that might lead to civil unrest. We need more
population control, whatever the price. Now we also have civil unrest
due to the
- Forwarded message from Scott Helms khe...@zcorum.com -
Date: Sat, 15 Jun 2013 07:44:32 -0400
From: Scott Helms khe...@zcorum.com
To: Eugen Leitl eu...@leitl.org
Cc: NANOG na...@nanog.org
Subject: Re: huawei
With the CPU and RAM available in a router that has to actually continue
and hopefully crashing their systems while fooling with their
minds.
___
tt mailing list
t...@postbiota.org
http://postbiota.org/mailman/listinfo/tt
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
someone should look into packaging
http://www.zimbra.com/downloads/os-downloads.html
into a free VMWare appliance that is easy to deploy even for novice
users -- yes, this still will need support, but much less so).
Thanks!
Brian
On Jun 14, 2013 7:03 PM, Eugen Leitl eu...@leitl.org wrote
-
From: openq...@googlegroups.com [mailto:openq...@googlegroups.com]
On Behalf Of Eugen Leitl
Sent: Monday, June 17, 2013 9:11 AM
To: openq...@googlegroups.com
Subject: security aspects of OpenQwaq
What's the security model of OpenQwaq?
How secure is the communication model
On Mon, Jun 17, 2013 at 08:16:54AM -0700, Andy Isaacson wrote:
It's true that in the limit, we can never be sure that a given piece of
hardware contains no trojans. However, there are many ways that a
trojan could be implemented which could be found with available
techniques. It would be
On Mon, Jun 17, 2013 at 02:35:36PM -0400, The Doctor wrote:
There is a problem with that: Traffic to and from small providers has
to traverse the networks of the tier-II and tier-I providers to go any
appreciable distance. We already know that at least some of the
peering points are
On Mon, Jun 17, 2013 at 10:40:23PM +0200, fukami wrote:
Hi,
it's not the first time I hear or read this from Americans: Many people
already gave up discussions about data protection a long time ago. So there
seems a lot of hope that Europeans and especially the Germans with their
On Tue, Jun 18, 2013 at 12:18:38PM +0300, Michael Azarkevich wrote:
Why settle for strong enough? Use the strongest options you have at your
disposal.
One-time pads are provably strong if done right, but come with
considerable usability disadvantages (but are potentially
worth it if people's
http://www.reddit.com/user/JimBamford
In case you haven't read his books, go read his books.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
. This is for military users not corporate or casual users.
-tom
On Jun 17, 2013 10:46 AM, Eugen Leitl mailto:eu...@leitl.org
eu...@leitl.org wrote:
OpenQwaq is potentially a useful tool for collaboration, especially
multimedia (webcam streaming to avatar face, audio (best
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Too many
at
https://mailman.stanford.edu/mailman/listinfo/liberationtech
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5
http://timesofindia.indiatimes.com/tech/enterprise-it/security/India-sets-up-nationwide-snooping-programme-to-tap-your-emails-phones/articleshow/20678562.cms
India sets up nationwide snooping programme to tap your emails, phones
Reuters | Jun 20, 2013, 12.32 PM IST
India has launched a
http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant
Revealed: the top secret rules that allow NSA to use US data without a
warrant
Fisa court submissions show broad scope of procedures governing NSA's
surveillance of Americans' communication
• Document one: procedures
emails from it, send an email
to doctrinezero+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
http://www.forbes.com/sites/andygreenberg/2013/06/20/leaked-nsa-doc-says-it-can-collect-and-keep-your-encrypted-data-as-long-as-it-takes-to-crack-it/
Leaked NSA Doc Says It Can Collect And Keep Your Encrypted Data As Long As It
Takes To Crack It
If you use privacy tools, according to the
On Fri, Jun 21, 2013 at 06:51:11PM +0200, phryk wrote:
On Fri, 21 Jun 2013 11:55:57 -0400
Nadim Kobeissi na...@nadim.cc wrote:
The solution to this is to make encryption more and more widely used.
By increasing the number of people with access to encryption
technology for their
On Fri, Jun 21, 2013 at 10:25:21AM -0700, Matt Johnson wrote:
So do we all need to generate random MAC addresses now? I don't think
you can do that on an iPhone though.
MACs are easy, and they're limited-scope, anyway.
Much better would be a daemon that mutates your IMEI on a daily,
or hourly
: nett...@kein.org
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489
On Mon, Jun 24, 2013 at 04:28:11PM -0700, coderman wrote:
On Mon, Jun 24, 2013 at 4:17 PM, Nadim Kobeissi na...@nadim.cc wrote:
...
If you want to focus your ire on something, go take a look at how DEFCON
and BlackHat are inviting NSA Director Keith Alexander to give the keynote!
they
On Mon, Jun 24, 2013 at 09:08:59PM -0300, hellekin wrote:
They are ramping such a system up but it isn't in place yet,
remember, they are firing 600 people in the following years.
*** I guess you mean: outsourcing to the private sector.
The budgets in general will shrink a lot in the
/
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Too
“People who radicalise under the influence of jihadist websites often go
through a number of stages,” the Dutch report said. “Their virtual activities
increasingly shift to the invisible Web, their security awareness increases
and their activities become more conspiratorial.”
ISP that advertises they encrypt their links that
leave the country? :)
--
Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
? (or get a copy of the monitor
ports)
-chris
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8
/secondary/besserwisser/machina
MN-1334-RIPE +46 705 989668
Your CHEEKS sit like twin NECTARINES above a MOUTH that knows no BOUNDS --
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Too many emails? Unsubscribe
/donate
___
Steven Aftergood
Project on Government Secrecy
Federation of American Scientists
web:www.fas.org/sgp/index.html
email: safterg...@fas.org
voice: (202) 454-4691
twitter: @saftergood
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
Too many emails
they don't know about.
--
Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM
On Wed, Jun 26, 2013 at 09:03:43AM -0700, Yosem Companys wrote:
Where is the effort honor the Internet paradigm and move away from the
presumption of hierarchy to a distributed approach that doesn’t assume that
we must declare our intent merely to exchange bits? At very least we should
move
On Wed, Jun 26, 2013 at 04:02:15PM -0700, Mike Perry wrote:
YaCY and other FOSS engines (in a sibling thread someone mentioned
another that I already forgot) are also something that I will accept
search plugins for the Omnibox, but their result quality, index depth,
and crawl frequency are no
(for the sake of completeness)
http://www.theregister.co.uk/2013/06/26/ssl_forward_secrecy/
A simple SSL tweak could protect you from GCHQ/NSA snooping
It might slow you down, but hey, you can't have everything
By John Leyden, 26th June 2013
Forward Secrecy
An obscure feature of SSL/TLS
http://news.cnet.com/8301-13578_3-57591391-38/surveillance-partnership-between-nsa-and-telcos-points-to-at-t-verizon/
Surveillance 'partnership' between NSA and telcos points to ATT, Verizon
Newly disclosed classified document suggests firms allowed spy agency to
access e-mail and phone call
On Mon, Jul 01, 2013 at 02:15:15AM +0200, André Rebentisch wrote:
Dear all,
do you follow the news?
http://www.guardian.co.uk/world/2013/jun/30/berlin-washington-cold-war
http://www.theglobeandmail.com/news/national/eu-confronts-us-over-alleged-spying-on-european-allies/article12899295/
___
cryptography mailing list
cryptogra...@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100
http://pastebin.com/yMGTZ1PZ#
DELETED ARTICLE FROM GUARDIAN
http://www.guardian.co.uk/info/2013/jun/30/taken-down
Revealed: secret European deals to hand over private data to America
Germany 'among countries offering intelligence' according to new claims by
former US defence analyst
At
On Wed, Jul 10, 2013 at 11:03:50AM +, Andreas Bader wrote:
Tens of thousands zero-days; that sounds like totally shit. That guy
seems to be a script kiddie poser, nothing more.
Are there any real hackers that can issue a competent statement to that?
See http://blog.fefe.de/
--
Too many
https://medium.com/surveillance-state/b804de3b5b
in Surveillance State14 min read
Thank you for choosing cyberpunk dystopia.
encryption, capitalism, and law
June has been a pretty surreal month. As the Guardian and the Washington Post
continue to publish internal NSA documents in what has
tor-t...@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com
://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46
On Thu, Jul 11, 2013 at 08:12:32PM -0500, Paul Elliott wrote:
Are there any practical one time pad management systems out there,
GPLed for GNU/Linux?
The biggest problem of one-time pads is their generation.
You need a properly whitened and reviewed hardware entropy
source for that, which is a
On Fri, Jul 12, 2013 at 07:23:17AM -0700, Bill Woodcock wrote:
On Jul 12, 2013, at 7:15 AM, Eugen Leitl eu...@leitl.org wrote:
I would be very interested in hardware recommendations for
an affordable, high-quality hardware RNG (ideally something
like VIA Padlock RNG).
We use
, CAs and chat systems for Americans spring to mind.
___
cryptography mailing list
cryptogra...@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http
On Mon, Jul 15, 2013 at 02:17:38PM -0700, Tony Arcieri wrote:
They seem to have an... interesting philosophy about open source:
When you have an entire planet looking at the source code you can be
assured that the implementation is highly scrutinized and proven.
Apparently all you have to
1 - 100 of 240 matches
Mail list logo