From: Yosem Companys compa...@stanford.edu
To: Liberation Technologies liberationtech@lists.stanford.edu
Sent: Saturday, June 8, 2013 2:22 PM
Subject: [liberationtech] Want to shield text, photos from government? Wickr
says it has an app for that |
From: Yosem Companys compa...@stanford.edu
To: Liberation Technologies liberationtech@lists.stanford.edu
Cc: Charles Lenchner clench...@organizing20.org
Sent: Monday, June 10, 2013 2:26 PM
Subject: [liberationtech] Use of PRISM corporations by social activists
campaigns
From: Charles
From: Michael Rogers mich...@briarproject.org
To: liberationtech liberationtech@lists.stanford.edu
Sent: Tuesday, June 11, 2013 10:45 AM
Subject: Re: [liberationtech] Building a encrypted mobile network
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
From: Michael Rogers mich...@briarproject.org
To: Jonathan Wilkes jancs...@yahoo.com; liberationtech
liberationtech@lists.stanford.edu
Sent: Wednesday, June 12, 2013 6:58 AM
Subject: Re: [liberationtech] Building a encrypted mobile network
-BEGIN PGP
From: micah mi...@riseup.net
To: Andy Isaacson a...@hexapodia.org; liberationtech
liberationtech@lists.stanford.edu
Sent: Wednesday, June 12, 2013 11:54 AM
Subject: Re: [liberationtech] Guardian reporter delayed e-mailing NSA source
because crypto is a pain
Is there a list somewhere for software that gives a user more privacy regarding
their meta-data?
If not then here's a three-pronged start:
1) Peer-reviewed, stable:
* Tor - https://www.torproject.org/
2) Not (yet) peer-reviewed(?):
* torchat - https://github.com/prof7bit/TorChat
* torfone -
From: Eugen Leitl eu...@leitl.org
To: Liberation Technologies liberationtech@lists.stanford.edu;
i...@postbiota.org; zs-...@googlegroups.com
Sent: Saturday, June 15, 2013 8:24 AM
Subject: Re: [liberationtech] [cryptography] NSA breakthrough
-
From: Anne Roth annal...@riseup.net
To: liberationtech@lists.stanford.edu liberationtech@lists.stanford.edu
Sent: Monday, June 17, 2013 1:13 PM
Subject: [liberationtech] Quick Guide to Alternatives
Hi,
Tactical Tech has been getting a lot of questions
From: micah mi...@riseup.net
To: Jonathan Wilkes jancs...@yahoo.com; liberationtech
liberationtech@lists.stanford.edu; liberationtech
liberationtech@lists.stanford.edu
Sent: Monday, June 17, 2013 3:06 PM
Subject: Re: [liberationtech] Quick Guide
From: Jonathan Wilkes jancs...@yahoo.com
To: micah mi...@riseup.net; liberationtech
liberationtech@lists.stanford.edu
Sent: Monday, June 17, 2013 5:16 PM
Subject: Re: [liberationtech] Quick Guide to Alternatives
Here's the much more articulate version
From: Mike Perry mikepe...@torproject.org
To: liberationtech liberationtech@lists.stanford.edu
Sent: Tuesday, June 18, 2013 11:54 PM
Subject: [liberationtech] Deterministic builds and software trust [was: Help
test Tor Browser!]
[...]
This is where
From: Mike Perry mikepe...@torproject.org
To: liberationtech liberationtech@lists.stanford.edu
Sent: Thursday, June 20, 2013 4:34 AM
Subject: Re: [liberationtech] Deterministic builds and software trust
[...]
Thanks for the responses. I'm not a security
From: dan mcquillan d...@internetartizans.co.uk
To: Liberation Technologies liberationtech@lists.stanford.edu
Sent: Friday, June 21, 2013 11:41 AM
Subject: [liberationtech] to encrypt or not to encrypt?
a few people who came to our university cryptoparty
Hi list,
Did anyone ever take a look at Magnus Brading's phantom protocol?
http://code.google.com/p/phantom/
Hasn't been much development on it for awhile. I'm just curious if anyone
used it and saw problems with the design or not.
Thanks,
Jonathan--
Too many emails? Unsubscribe, change
From: Mike Perry mikepe...@torproject.org
To: liberationtech liberationtech@lists.stanford.edu
Sent: Tuesday, June 25, 2013 2:26 AM
Subject: Re: [liberationtech] DuckDuckGo vs Startpage
Google is also unwilling to work with us to deploy rate limiting
From: Eleanor Saitta e...@dymaxion.org
To: liberationtech liberationt...@mailman.stanford.edu
Sent: Friday, June 28, 2013 12:24 PM
Subject: Re: [liberationtech] a privacy preserving and resilient social network
[...]
Congratulations! Your job is now to
On 06/29/2013 01:07 AM, Eleanor Saitta wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 2013.06.28 21.02, Jonathan Wilkes wrote:
That's anecdotal evidence.
The vast majority of the smartphone userbase just learned the word
meta-data a few weeks ago. The news about the scope of NSA
On 07/01/2013 07:06 PM, Landon Hurley wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
(And the quote I cannot find ATM from the cryptography guy back in the 1800s
who
said you should be able to describe how a cryptosystem works without
breaking it probably applies here.)
On 07/01/2013 09:22 PM, Martin Uecker wrote:
Jonathan Wilkes jancs...@yahoo.com:
On 07/01/2013 07:22 PM, Martin Uecker wrote:
Jacob Appelbaum ja...@appelbaum.net wrote:
...
We need a secure downloading tool, we need it to be built into every OS
by default and until then, we'll have to rely
On 07/02/2013 03:44 PM, Lucas Gonze wrote:
I also had a hard time with his nastiness, which struck me as vapid.
It's kind of hard to look at the writing of Tim O'Reilly, for example,
and be kind:
http://radar.oreilly.com/2007/08/my-tonguelashing-from-eben-mog.html
It's instructive to play
On 07/03/2013 04:47 AM, intrigeri wrote:
Hi,
Jonathan Wilkes wrote (02 Jul 2013 21:57:01 GMT) :
On 07/02/2013 12:46 PM, Jonathan Wilkes wrote:
On 07/02/2013 04:51 AM, intrigeri wrote:
+ verify that the signed file you've downloaded is actually the
version you intended to download
On 07/04/2013 10:04 PM, hellekin wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I want to thank Christian Grothoff and his team(s) for the exceptional
work they're doing on GNUnet. Christian gave an awesome presentation
at the Free University of Amsterdam a couple of days ago, and the
On 07/07/2013 05:20 PM, Maxim Kammerer wrote:
On Sun, Jul 7, 2013 at 3:25 PM, CodesInChaos codesinch...@gmail.com wrote:
So introductory-level programming course mistakes are right out.
In my experience it's quite often a really simple mistake that gets you,
even when you're an experienced
On 07/09/2013 10:29 AM, Jacob Appelbaum wrote:
Patrick Mylund Nielsen:
On Tue, Jul 9, 2013 at 9:22 AM, Eugen Leitl eu...@leitl.org wrote:
On Tue, Jul 09, 2013 at 09:12:21AM -0400, Patrick Mylund Nielsen wrote:
If it's so easy, go ahead and produce a more secure alternative that
people
You
On 07/09/2013 02:33 PM, Jacob Appelbaum wrote:
Jonathan Wilkes:
On 07/09/2013 10:29 AM, Jacob Appelbaum wrote:
Patrick Mylund Nielsen:
On Tue, Jul 9, 2013 at 9:22 AM, Eugen Leitl eu...@leitl.org wrote:
On Tue, Jul 09, 2013 at 09:12:21AM -0400, Patrick Mylund Nielsen wrote:
If it's so easy
On 07/11/2013 12:38 PM, Maxim Kammerer wrote:
On Tue, Jul 9, 2013 at 4:57 PM, Jacob Appelbaumja...@appelbaum.net wrote:
While I think Maxim is viewed as exceedingly harsh in how he writes, I
think that your response is really the wrong way to deal with him. We
should consider that his cultural
On 07/11/2013 02:08 PM, Maxim Kammerer wrote:
On Thu, Jul 11, 2013 at 9:04 PM, Jonathan Wilkes jancs...@yahoo.com wrote:
I think the upshot of that is to steer whatever funds Cryptocat has
toward the form of peer review that did work, which is the bug
hunt (as well as look into other forms
Hi List,
Looking at the enormous list of members in the WC3 along with the
fact that application membership is subject to final arbitrary approval
by the current WC3, I'm concerned about the lack of democratic checks on
their decision making.
Example with Encrypted Media Extensions
On 07/15/2013 11:45 PM, Catherine Roy wrote:
As a member of the HTML working group and the Restricted Media
community group, my experience is that discussions within these groups
surrounding the EME draft have been extremely frustrating. The same
scenario as with Jeff Jaffe's blog post has
On 07/16/2013 10:15 AM, Nick Daly wrote:
On Tue, Jul 16, 2013 at 1:04 AM, Jonathan Wilkes jancs...@yahoo.com wrote:
On 07/15/2013 11:45 PM, Catherine Roy wrote:
As a member of the HTML working group and the Restricted Media community
group, my experience is that discussions within these groups
On 07/16/2013 10:15 AM, Nick Daly wrote:
On Tue, Jul 16, 2013 at 1:04 AM, Jonathan Wilkesjancs...@yahoo.com
wrote:
On 07/15/2013 11:45 PM, Catherine Roy wrote:
As a member of the HTML working group and the Restricted Media
community
group, my experience is that discussions within these groups
To any U.S. citizens out there, this might be a good time to act:
https://www.eff.org/deeplinks/2013/07/tomorrow-congress-votes-amendment-defund-spying-heres-how-you-can-help
-Jonathan
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at
On 07/25/2013 07:14 AM, Mitar wrote:
Hi!
Some very good arguments *for* DRM on the web:
http://unitscale.com/mb/bomb-in-the-garden/
Sure. It's also _necessarily_ an argument against free software operating
systems as well as an argument against general purpose computing.
It is both of these
On 07/26/2013 08:06 AM, Mitar wrote:
Hi!
On Thu, Jul 25, 2013 at 6:15 AM, Nickliberationt...@njw.me.uk wrote:
But his wider point that everything sucks if it's designed with
advertising as the only business model is fair, and an important
issue. DRM cannot be a fair and reasonable solution,
On 07/26/2013 06:18 PM, Steve Weis wrote:
DRM technologies have a flip side as privacy-preserving technology.
What is the technology that lets me make my data searchable but
not copyable? What is the technology that lets Google share my
data with a few third parties which I approve but no
On 08/07/2013 03:26 AM, Bill Woodcock wrote:
On Aug 7, 2013, at 12:05 AM, Roger Dingledine a...@mit.edu wrote:
Consider two scenarios. In scenario one, NSA doesn't run any Tor
relays, but they have done deals with ATT and other networks to be
able to passively monitor those networks --
Is there such a thing yet? I can see a lot of cases where, my lawyer
has the
other half of this amulet, would come in handy.
-Jonathan
--
Liberationtech is a public list whose archives are searchable on Google.
Violations of list guidelines will get you moderated:
On 08/30/2013 01:51 PM, Michael Hicks wrote:
Thank you so much we appreciate your opinion and facts. would you have
any recommendations? something we could fix? the whle purpose of this
software is to give the American people privacy and not have to worry
about the NSA's spying.
The American
Hello,
I want to download and play with Liberté Linux, but I have a few
questions that are of a general enough nature to be of interest for this
list. At least that's my hope.
My Abilities: can use GPG cli commands, can install junk I download to a
thumbdrive, use free software (almost)
On 09/06/2013 12:26 PM, Maxim Kammerer wrote:
On Sat, Aug 31, 2013 at 2:08 AM, Jonathan Wilkes jancs...@yahoo.com wrote:
For example, if it turns out that Bitcoin has a backdoor in it, a
lot of people (some on this list) would take a big reputation hit.
That's most certainly not what would
Hi Eugen,
When Bruce Schneier made the call for people to come forward
and describe being asked to degrade standards or build backdoors
I don't think this is what he meant.
Mr. Gilmore seems perfectly happy to give us enough details to
be able to find the identity of a suspicious Kernel
On 09/07/2013 02:46 PM, Eugen Leitl wrote:
On Sat, Sep 07, 2013 at 12:26:22PM -0400, Jonathan Wilkes wrote:
Hi Eugen,
When Bruce Schneier made the call for people to come forward
and describe being asked to degrade standards or build backdoors
I don't think this is what he meant.
Bruce
On 09/09/2013 03:40 PM, Case Black wrote:
There's a more subtle variant to this idea...
Regularly state (put up a sign) that you HAVE in fact received an
NSL...with the public understanding that it must be a lie (there's no
law against falsely making such a claim...yet!).
When actually
On 09/09/2013 12:50 PM, Al Billings wrote:
Have fun tilting that windmill, Mr. Quixote.
Like it or not, to fully use websites at this point, you generally
need things like Javascript and CSS. The reason that most folks, even
security folks like the ones I work with, don't run with NoScript on
On 09/12/2013 04:00 PM, Case Black wrote:
Although not an unalloyed fan of Ms. Rand, her words of 50 years ago
do seem relevant to our current situation ---
Instead of being a protector of man’s rights, the government is
becoming their most dangerous violator.
Instead of protecting men from
On 09/14/2013 06:03 AM, Fabio Pietrosanti (naif) wrote:
Hi all,
i would like to notice that in those internet freedom space there's
a missing component in the communication security landscape, that's
the ability to interoperate between Web and Mobile for
communication security technologies.
On 09/15/2013 04:22 AM, Brian Conley wrote:
On Sep 15, 2013 2:22 AM, coderman coder...@gmail.com
mailto:coder...@gmail.com wrote:
On Sat, Sep 14, 2013 at 8:12 AM, Lee Azzarello
l...@guardianproject.info mailto:l...@guardianproject.info wrote:
We have a federated telephony system...
On 09/15/2013 02:32 PM, Michael Rogers wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 15/09/13 16:49, Jonathan Wilkes wrote:
I'm not completely sure, but I don't think that is possible.
For example: regardless of privacy implications, discoverability on
Facebook is a feature
On 09/17/2013 04:46 PM, Michael Rogers wrote:
[...]
Please push me back on the right track if I have a blind spot
here-- I'm having a difficult time seeing a technical difference
between a social network that allows partial views of the graph in
order to maintain a semblance of privacy, and a
On 09/23/2013 11:20 AM, Michael Rogers wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 22/09/13 20:51, Jonathan Wilkes wrote:
[...]
Otherwise you create a social network that looks like it has
checks and balances built-in, but, e.g, no one really understands
_why_ sharing beyond
On 09/24/2013 09:56 AM, Michael Rogers wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 24/09/13 05:21, Jonathan Wilkes wrote:
Is Briar able to hide metadata that describes who is messaging
whom within the network from an attacker with a splitter on the
internet and a $50+ billion
On 09/26/2013 12:32 AM, coderman wrote:
On Wed, Sep 25, 2013 at 1:34 PM, Jonathan Wilkes jancs...@yahoo.com wrote:
...
Roger Dingledine has said that his biggest fear is that the
NSA has found a way to break Tor,
citation? ;)
http://www.youtube.com/watch?v=-VUyuFH9CbI
It was a mistake
On 10/10/2013 03:55 PM, adrelanos wrote:
Thank you for doing this work!
The world needs someone facing the truth, explaining why gpg isn't the
solution, advocating positive change. It's a communicative task, a very
difficult one. As long there is gpg, most geeks don't see need to create
better
On 10/15/2013 06:47 PM, elijah wrote:
On 10/15/2013 03:07 PM, Yosem Companys wrote:
If you have any thoughts about Riseup, whether
security/privacy-related or otherwise, I'd love to hear them.
I think I am the only person from the Riseup collective who is
subscribed to liberationtech, so I
On 10/18/2013 04:57 PM, groente wrote:
On Fri, Oct 18, 2013 at 11:20:58PM +0300, Maxim Kammerer wrote:
snip
Second, the unusual stress of ideology in such a service is very
relevant to product's security in this case. When I read RiseUp's
social contract page [1] some time ago, I found the mild
On 10/18/2013 07:23 PM, Alfredo Lopez wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Besides being wrong, this is truly offensive. Rise-Up is a remarkable
collective with outstanding service and enormous commitment to
principle.
Then I'd strongly suggest rethinking the four bullet
It's an interesting idea.
What is the little party/ceremony people have in Germany when they
decide to address each other with du instead of the formal Sie? How
about celebrating with a beer and then clicking
a button on your FBXes that reciprocates 10gigs of storage on each
others drives?
- Original Message -
From: Nick M. Daly nick.m.d...@gmail.com
To: freedombox-disc...@lists.alioth.debian.org; Liberation Technologies
liberationtech@lists.stanford.edu
Cc:
Sent: Sunday, February 10, 2013 2:47 PM
Subject: [Freedombox-discuss] Happy Creepy February!
T hanks to
On 11/04/2013 05:28 AM, phree...@yandex.ru wrote:
On Sunday, November 03, 2013 04:06:11 PM Bill Woodcock wrote:
On Nov 3, 2013, at 3:30, phree...@yandex.ru phree...@yandex.ru wrote:
I don't see how pasting over a QR code in a way that's not easily
detectable is somehow harder than pasting over
Hi Jacob,
Can you talk more about how the user would run arkOS services as
Tor hidden services?
Can the user run the services they want _only_ as hidden services (i.e.,
not accessible through normal web)?
Will the user need to do any extra configuration to enable this option,
or will
On 11/06/2013 04:21 PM, Matt Johnson wrote:
Sorry Eugen, I am still not getting it. You will author content in
isolation, without reference to any information at all? Or perhaps in
a library with books on paper? When I author something I constantly
refer to other material.
You know most
On 01/10/2014 08:57 AM, carlo von lynX wrote:
On Thu, Jan 09, 2014 at 08:50:34PM +0100, Simon Rothe wrote:
Here is another one: Twitter based on Bitmessage: https://bitchirp.org/
Found this via Slashdot:
twister is the fully decentralized P2P microblogging platform
leveraging from the free
Hi list,
I'm thinking about setting up a slightly modified version of nweb
as a Tor hidden service:
http://www.ibm.com/developerworks/systems/library/es-nweb/index.html?ca=dat
This is for fun, mostly just to learn some more about Tor hidden
services and webservers. But it's got me
static content.
-Jonathan
2014/1/20 Jonathan Wilkes jancs...@yahoo.com mailto:jancs...@yahoo.com
Hi list,
I'm thinking about setting up a slightly modified version of
nweb as a Tor hidden service:
http://www.ibm.com/developerworks/systems/library/es-nweb/index.html?ca=dat
...@gmail.com'); escribió:
On Mon, Jan 20, 2014 at 7:06 PM, Jonathan Wilkes
jancs...@yahoo.com wrote:
GET
On 01/20/2014 02:29 PM, Kate Krauss wrote:
Hi,
I think the idea is that there is a subset of activists and
journalists who are very motivated to encrypt who can't. Glen
Greenwald comes to mind. I come to mind, and a bunch of my activist
friends from countries under pressure. I don't see much
On 01/26/2014 08:12 AM, Guido Witmond wrote:
On 01/26/14 10:20, Tomer Altman wrote:
To Liberation Tech:
Stanford is implementing a new security policy detailed here:
http://ucomm.stanford.edu/computersecurity/
I am personally very concerned about steps #2 and #3. BigFix is
basically a back
On 01/29/2014 04:50 PM, Guido Witmond wrote:
On 01/29/14 19:57, Jonathan Wilkes wrote:
On 01/26/2014 08:12 AM, Guido Witmond wrote:
BigFix: the missing package manager for Windows. What every self
respecting unix/linux/bsd/etc system already has. Good.
How is a centralized service
On 01/30/2014 11:38 AM, Patrick Schleizer wrote:
Jonathan Wilkes:
Before I write anything else: Is the BigFix client free software?
Couldn't figure it out from a quick look at the website.
I also couldn't find confirmation it's Free Software.
Someone from Stanford want to weigh in here
On 01/30/2014 05:29 PM, Gregory Maxwell wrote:
On Thu, Jan 30, 2014 at 2:13 PM, Nicholas Merrill li...@calyx.com wrote:
Hey all
I wanted to let everyone here know that we (The Calyx Institute) opened
an experimental public and free Jabber / XMPP server to the public today
that has a number of
On 01/30/2014 07:23 PM, Nathan of Guardian wrote:
On 01/30/2014 07:02 PM, Jonathan Wilkes wrote:
So I'd recommend forcing OTR. Then the people discussing lolcats won't
feel so bad about wasting their time, because even seemingly frivolous
privacy helps to protect everyone else's.
Is there any
On 02/07/2014 01:12 PM, Gregory Maxwell wrote:
On Fri, Feb 7, 2014 at 9:52 AM, taltm...@stanford.edu wrote:
This is the kind of heavy hand that Stanford is laying down on
students and faculty who do not want to give up their privacy.
This seemed to me like an inevitable outcome when there was
On 02/14/2014 01:23 PM, hellekin wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/14/2014 02:30 PM, Morgan Marquis-Boire wrote:
Thanks Frank,
Thanks for the kind words. The ubiquitous targeting of journalists
is very concerning.
*** Indeed it is. Thank you for this report. I
On 02/18/2014 01:00 PM, Yosem Companys wrote:
http://liberationtechnology.stanford.edu/events/the_fight_for_internet_freedom/
The Fight for Internet Freedom
Stanford CDDRL Seminar Series
SPEAKER
David C. Drummond - Senior Vice President, Corporate Development and Chief
Legal Officer at
On 02/19/2014 03:56 PM, Mitar wrote:
Hi!
I would like to point to this change in the future W3C spec:
https://github.com/w3c/webappsec/commit/cbfaa8edfadebf21a9c7428242c12e45934d8c55
This change effectively allows a website to prevent bookmarklets from
working. In essence, content providers
On 02/19/2014 06:39 PM, Gregory Maxwell wrote:
On Wed, Feb 19, 2014 at 3:21 PM, Jonathan Wilkes jancs...@yahoo.com wrote:
Now say that the user has installed a third party add-on that either
accidentally or intentionally (through design or through compromise) blocks
or otherwise prevents my TV
for the Internet
On 02/19/2014 06:39 PM, Gregory Maxwell wrote:
On Wed, Feb 19, 2014 at 3:21 PM, Jonathan Wilkes jancs...@yahoo.com wrote:
Now say that the user has installed a third party add-on that either
accidentally or intentionally (through design or through compromise) blocks
On 03/03/2014 12:19 PM, Rayzer Raygun wrote:
On 3/2/2014 12:13 PM, Andrés Leopoldo Pacheco Sanfuentes wrote:
Isn't it reasonable to assume that EVERYBODY IS BEING OR IS BOUND TO
BE SPIED ON in the Internet?
[...]
I've always assumed anything I ever put on the internet, no matter
encrypted
On 03/17/2014 06:30 AM, Marc Juul wrote:
[...]
Seriously... other hackerspaces deal with theft, homeless people
sleeping in the space, violent individuals, armed robbery, hate
speech, etc. and they still haven't set up cameras.
That's right. A hackerspace is the _last_ place we should
Has anyone seen this:
http://media.libreplanet.org/u/zakkai/m/free-software-for-freedom-surveillance-and-you/
If that is indeed what people saw when they watched a live stream going over
Tor, I'm very impressed. Interested to know more about the setup.
-Jonathan
--
Liberationtech is public
On 03/27/2014 11:02 AM, Nick wrote:
Quoth Jonathan Wilkes:
Has anyone seen this:
http://media.libreplanet.org/u/zakkai/m/free-software-for-freedom-surveillance-and-you/
If that is indeed what people saw when they watched a live stream going over
Tor, I'm very impressed. Interested to know
On 03/27/2014 11:25 AM, Griffin Boyce wrote:
Nick wrote:
Yep, and it worked well, with really good quality, even projected onto
a big screen. Questions were asked to him over IRC (mostly through
audience members on their laptops, some via a volunteer at the front).
I got the impression there
Anyone ever heard of this?
https://www.grc.com/sqrl/sqrl.htm
-Jonathan--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change
Hi list,
Can some tech liberator out there versed in javascript and video
streaming please take over the popcorn-time project? It looks like it
was developed pseudonymously by at least three teams now which have all
disappeared (probably due to pressure from Hollywood).
If you haven't
: https://bitmessage.org/wiki/Main_Page
BitMessage is a secure peer-to-peer communications protocol that
allows you to broadcast a message (or receive a broadcast message)
without revealing your IP address.
Cheers,
On 04/06/2014 11:41 PM, Jonathan Wilkes wrote:
Hi list
: https://bitmessage.org/wiki/Main_Page
BitMessage is a secure peer-to-peer communications protocol that
allows you to broadcast a message (or receive a broadcast message)
without revealing your IP address.
Cheers,
On 04/06/2014 11:41 PM, Jonathan Wilkes wrote:
Hi list,
Can some tech
On 04/23/2014 10:04 AM, Louis Suárez-Potts wrote:
On 23 Apr 2014, at 08:38, Nick liberationt...@njw.me.uk wrote:
I took the liberty of changing the subject line to something that
hopefully somewhat summarises your email.
Quoth Arnaud Legout:
As polemical as it can be, deeply-held belief
On 04/25/2014 03:16 PM, Louis Suárez-Potts wrote:
On 25 Apr 2014, at 14:21, Jonathan Wilkes jancs...@yahoo.com wrote:
On 04/23/2014 10:04 AM, Louis Suárez-Potts wrote:
On 23 Apr 2014, at 08:38, Nick liberationt...@njw.me.uk wrote:
I took the liberty of changing the subject line
On 04/26/2014 05:18 PM, Shava Nerad wrote:
Anyone who is lauding the verifiability of open source security
software had best show that their code has been regularly and
thoroughly audited.
I'm not sure what that means, so I'll start a new paragraph for what
could be a non sequitur...
On 04/26/2014 09:33 PM, Shava Nerad wrote:
Security software isn't like a lot of open source projects. Generally
there have to be narrowly controlled commits, well reviewed. Those
people are experts who may have a lot of other demands on their time
that are far far more monetarily
Astronomy, astrology-- at this point I am pretty much universally disgusted by
anything publishing conclusions without clear data to back it up.
Neither is perfect at describing the universe, so there's plenty of blame to go
around. We should try to focus less on ideology and more on improving
Hi list,
Does anyone use Cables?
Is Cables included any distro other than Liberté Linux?
Could Cables be packaged in Debian, or does it require a hardened/privacy-based
distro in order to work properly?
Has a non-anonymous dev experienced in security software ever had a look at the
code?
If so,
On 05/07/2014 05:47 PM, Tor Krill wrote:
Dear list,
I just wanted to take some time to inform you on our IndieGoGo campaign
to launch our new device OPI:
https://www.indiegogo.com/projects/opi-reclaim-your-digital-life/
OPI is an attempt to let everyday users take back control over their
On 05/08/2014 07:06 PM, carlo von lynX wrote:
On Thu, May 08, 2014 at 08:15:04AM -0500, Anthony Papillion wrote:
The bottom line is that, bug or not, privacy conscious people need to
simply stay away from Google. And I don't mean just Google Search or
Chat. I mean /all/ of Google, Everything
On 05/08/2014 09:31 PM, Anthony Papillion wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 05/08/2014 08:23 PM, Doug Schuler wrote:
Realistically we need to develop an entire suite of publicly owned
tools. Could the development and implementation be massively
distributed?
Or is it
On 05/09/2014 06:13 AM, Anthony Papillion wrote:
On May 9, 2014, at 4:42, Ximin Luo infini...@pwned.gg wrote:
On 09/05/14 02:31, Anthony Papillion wrote:
On 05/08/2014 08:23 PM, Doug Schuler wrote:
Realistically we need to develop an entire suite of publicly owned
tools. Could the
On 05/18/2014 09:54 AM, Cristina wrote:
El 18/05/14 09:40, Fabio Pietrosanti (naif) escribió:
Il 5/15/14, 11:47 PM, Tom Ritter ha scritto:
On 14 May 2014 23:36, Fabio Pietrosanti (naif) li...@infosecurity.ch wrote:
i think that would be very important to organize a project to Audit the
On 06/05/2014 06:28 AM, carlo von lynX wrote:
Heya.. I saw the ACLU, AI, EFF, FSF, Greenpeace, MoveOn
and other logos on the https://www.resetthenet.org page.
[...]
- Would be better to fix the scalability of Tor hidden
services so we can use .onion instead of the broken
HTTPS thing.
On 06/10/2014 05:03 PM, Tom Ritter wrote:
I just want to jump in and mention again that it's entirely possible
to pick apart applications written for Android, iPhone, Windows, Mac,
etc and understand how they operate. Going even deeper than just
'what they store on disk' and 'what they send
Hi,
Is anybody doing router software that allows guest access, but _only_ if
the client is using Tor to connect? The Tor network and its various relays and
exits are known, so it seems like it should be doable.
In this case, the router owner could open up access with less risk of having
1 - 100 of 136 matches
Mail list logo