Kubieziel a écrit :
> * Aymeric Vitte schrieb am 2018-02-02 um 18:01 Uhr:
>> This is not the purpose of the project (http://www.peersm.com) but you
>> can use: http://peersm.com/peersm (this is a standalone js app,
>> everything stays local for our concern) but the app will not
This is not the purpose of the project (http://www.peersm.com) but you
can use: http://peersm.com/peersm (this is a standalone js app,
everything stays local for our concern) but the app will not work if it
can't established circuits with the Tor network (which has absolutely
nothing to do with
the use of other modules that goes with it
Le 29/01/2018 à 21:31, Marc Juul a écrit :
>
>
> On Mon, Jan 29, 2018 at 8:30 AM, Aymeric Vitte <vitteayme...@gmail.com
> <mailto:vitteayme...@gmail.com>> wrote:
>
> What do you mean by "since we can't compile it aft
ntech community. A longstanding participant
> has created something to try to advance the public good. There may
> be differences in terms of how to do it. But we can all speak
> amicably about the issues.
>
> On Sun, Jan 28, 2018 at 10:16 AM, Aymeric Vitte
>
we stated something like "Should this project be
funded we will remove the dev fees and it will become fully open source"
This is still valid
Le 28/01/2018 à 11:38, Marc Juul a écrit :
>
>
> On Sat, Jan 27, 2018 at 3:49 AM, Aymeric Vitte <vitteayme...@gmail.com
> <mailt
Please see https://github.com/Ayms/bitcoin-transactions
And the short story here: https://bitcointalk.org/index.php?topic=2827163.0
I reactivated (and finished) this module after the complete chaos of
Bitcoin Gold launch where everybody got robbed by scammy wallets and/or
were desperately trying
Yes, already posted on this list:
https://mailman.stanford.edu/pipermail/liberationtech/2017-February/016685.html
, for example 2.1.1 p22, very brief and sketched but plausible, unlike
many inventions where blockchains (who are unfortunately today
everything but decentralized) are supposed to
and sends the message encrypted
> using S/MIME and SMTP.
>
> The policy above can be enforced as a sending policy automatically. If
> Alice's key is registered in the mail app, the message will be sent
> securely with no additional effort required from Alice.
>
>
>
>
>
>
>
Please find here: http://www.peersm.com/Convergence.pdf a proposal
addressing all of what you are discussing here and even more (IOT,
crypto money, etc), writen for some fundings opportunities but that did
not make it so far for some administrative reasons + apparently some
misunderstanding
Le 10/11/2015 12:00, carlo von lynX a écrit :
> a social networking tool which is decentralized
> and actually functional to scale to humanity-wide use MUST not put
> all its data onto some servers but MUST operate from the devices
> directly. not purely P2P, but using the paradigms of
+1 for the PS and the rest
I don't want to bother with this project again, but here [1] is
explained part of what the browsers are doing, we can see that they send
http/https request outside (example 2), but that's not enough of course,
some of them like Chrome do inject by default some
,
Yosem
One of the moderators
On Sun, Apr 26, 2015 at 4:36 PM, Al Billings alb...@openbuddha.com
mailto:alb...@openbuddha.com wrote:
I'm not sure why you're asking us for the list instead of finding
it yourself.
On Apr 26, 2015, at 4:14 PM, Aymeric Vitte
vitteayme...@gmail.com
, Aymeric Vitte vitteayme...@gmail.com wrote:
Are you serious? block google.com
Should we block mozilla.org too?
--
Check the 10 M passwords list: http://peersm.com/findmyass
Anti-spies and private torrents, dynamic blocklist: http://torrent-live.org
Peersm : http://www.peersm.com
torrent-live: https
Le 26/04/2015 01:02, Al Billings a écrit :
block google.com and all related sites in your local hosts file
Are you serious? block google.com
Should we block mozilla.org too?
Could you be more precise and give the complete list of
safebrowsing_stuff.google.com and related sites that FF is
This is a study based on the DHT only which shows how to
find/track/block real-time the bittorrent monitoring spies, how to set
methods to protect the bittorrent users and make their use of the
bittorrent network much more private, how to create/maintain a dynamic
blocklist and possibly how to
Le 16/01/2015 21:18, carlo von lynX a écrit :
Al, you may want to deviate the discussion towards the 10.000th
debate about proprietary vs free software, but the topic here is
the impossibility for a U.S. company to deliver what it promises.
My 10 000th comment about this kind of discussion is
Le 17/01/2015 14:57, hellekin a écrit :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 01/17/2015 08:08 AM, Aymeric Vitte wrote:
But you still need to trust: the browsers, the OS, the hw... which is
quite a lot...
*** The browser is problematic with javascript because of the global
:30, ɣęƈƞą a écrit :
On Tue, Jan 6, 2015 at 11:48 PM, Aymeric Vitte vitteayme...@gmail.com
mailto:vitteayme...@gmail.com wrote:
Interesting, I would add this link to your presentation
https://github.com/vecna/trackmap , which I think
explains/summarizes well the project without
Le 08/01/2015 13:50, ɣęƈƞą a écrit :
yes, I guess, I admin I've to experiment other techniques, but at the
moment the script in the repository is a modified version of
https://code.google.com/p/phantomjs/source/browse/examples/netlog.js
and what matter for me is catch the third party
Le 08/01/2015 15:45, ɣęƈƞą a écrit :
I forgot something: things that browsers are sending out without
telling you, cf
https://s3.amazonaws.com/ksr/assets/000/690/973/f9a25528976205dff93e60fc40dfa91f_large.jpg?1371808994
You don't take it into account?
I don't understand,
Interesting, I would add this link to your presentation
https://github.com/vecna/trackmap , which I think explains/summarizes
well the project without overloading with technical details.
Le 05/01/2015 21:55, Anne Roth a écrit :
=
*Trackography*
=
Tactical
Le 27/11/2014 15:43, hellekin a écrit :
What
matters is that the source code is available for review or not.
Maybe Robert could add Peersm [1], [2]
This is not only a js Tor bittorrent inside browsers for
streaming/download, people can exchange whatever content and encrypt it
personnaly on
Maybe the project can take a look at Via'AGRI [1] (note: we have an
agreement with Pfizer regarding the name), an app (started in 2006) of
us for farmers (agri wine), working on any device since it's a web
app, but running locally and looking like a native app for smartphones
(connected to
Le 06/10/2014 22:11, Francisco Ruiz a écrit :
I am in the process if adding WebRTC capabilities to my PassLok
privacy app. In its current incarnation, PassLok's public key
functions are used to generate an encrypted chat invite that only
the intended recipients would be able to decrypt. Once
Le 12/08/2014 22:12, Marc W. Abel a écrit :
On 08/12/2014 05:19 AM, Aymeric Vitte wrote:
I don't know what is the state of the art regarding this but is there
not a way while parsing the slots to determine that this one might have
your key so you don't have to decrypt everything and just
.
Probably not and you have an answer to this, or I misunderstood something.
Regards,
Le 06/08/2014 17:18, Marc W. Abel a écrit :
/
Aymeric Vitte wrote:
Maybe I did not find it, but is there a spec/description how it works
exactly (something else than the man pages)? If I understand correctly
Le 05/08/2014 20:52, Marc W. Abel a écrit :
Good news: Clique peers do not broadcast message traffic (although
they do broadcast announcements about the keys they have available).
It's actually not feasible to broadcast, because the peers negotiate
their own connection speeds. A
Le 23/07/2014 01:52, Jérôme Pinguet a écrit :
But why stick to JavaScript and the browser after all? These are
endangered species.
??? You must be kidding...
In the US, mobile apps made up 47% of Internet traffic at the
beginning of this year, overtaking the PC (45%). Mobile browsers
Le 22/07/2014 03:16, Tony Arcieri a écrit :
On Mon, Jul 21, 2014 at 5:52 PM, Aymeric Vitte vitteayme...@gmail.com
mailto:vitteayme...@gmail.com wrote:
You obviously don't know what you are talking about or just did
not get what I explained or just do not understand http versus
https
Thanks for your comments, please see mine below.
Le 22/07/2014 03:40, coderman a écrit :
On Mon, Jul 21, 2014 at 5:52 PM, Aymeric Vitte vitteayme...@gmail.com wrote:
... including your focus on elementary mitm
issue, your arguments and judgement are so basic that I am wondering why I
am
Interesting thoughts, please see my comments below.
Le 22/07/2014 03:48, Seth David Schoen a écrit :
Aymeric Vitte writes:
You obviously don't know what you are talking about or just did not
get what I explained or just do not understand http versus https or
the contrary, or just do
Answering to the three last answers in one time.
Le 22/07/2014 20:44, Tony Arcieri a écrit :
Of course, we're still left with the bootstrapping problem of getting
an authentic parent page.
So finally you have highlighted the main issue, this is valid for
extensions too, this is why the
Le 19/07/2014 11:13, carlo von lynX a écrit :
On Fri, Jul 18, 2014 at 7:59 AM, Lorenzo Franceschi-Bicchierai
lorenzo...@gmail.com wrote:
I was wondering if it's time to make a list of not-so-good snakeoil
encryption services that have popped up after the Snowden revelations.
Let's look at
, while the check of the code, which does not
depend on tons of libraries, is trivial.
Le 21/07/2014 15:57, Maxim Kammerer a écrit :
On Mon, Jul 21, 2014 at 12:59 PM, Aymeric Vitte vitteayme...@gmail.com wrote:
Unlike obscure elefantesque open source code that you don't even know what
it becomes
Arcieri a écrit :
On Mon, Jul 21, 2014 at 2:59 AM, Aymeric Vitte vitteayme...@gmail.com
mailto:vitteayme...@gmail.com wrote:
So Peersm is a monolithic js code app, monolithic so you don't
load tons of potentially insecure modules, it does not use neither
rely on any plugin/add
Le 08/07/2014 19:53, The Doctor a écrit :
One drawback that I've observed is that there aren't very many
publically accessible YaCy nodes out there. It isn't (yet) as if you
can plug yacy.example.com into your browser (or your provider's
frontpage) and run searches. The perception, thus, is
That's the purpose of [1] and [2] to solve these issues, the files could
be splitted in reasonable sizes and put inside initial anonymous
seeder's browser or Peersm client, then downloaded and shared
anonymously by others using their hash_names (kind of infohash)
But not in the current phase
Le 10/06/2014 16:19, Joshua Kopstein a écrit :
I get pitched on the latest magic email encryption
snakeoil regularly.
That's not magic but the initial idea of Peersm was to exchange
encrypted data anonymously inside browsers (so from any device, no
installation) without any third party in
I don't really agree with your approach. In a standard company process
if you want good things then you need good employees and if you want
good employees then you need to pay them accordingly.
The open source model is not correct and can just end up with heartbleed
or earlyccs.
I don't
aren't making your point very well. Would you care to
restate it?
On Jun 5, 2014, at 4:32 PM, Aymeric Vitte vitteayme...@gmail.com
mailto:vitteayme...@gmail.com wrote:
I meant open source projects not notoriously funded but notoriously
used, you are working for Mozilla.
Al Billings
alb
implementations.
Le 06/06/2014 01:59, Al Billings a écrit :
Fair enough. I will move on and ignore your message. Thanks.
On Jun 5, 2014, at 4:53 PM, Aymeric Vitte vitteayme...@gmail.com wrote:
Your guess is wrong, I don't know how to restate my point better, please
highlight what seems
, Aymeric Vitte wrote:
[...]
- nodejs is easy to audit (assuming that modules like V8 can be
audited), you can override node's functions/objects if you like
[...]
Actually, in my mind, that's one point against safety of Node.js
applications. Redefining, say, Array.prototype.forEach is a good way
Without any hesitation: js + nodejs (note: I am not part of the node's team)
- the code is very reduced and transparent, difficult to backdoor
including nodejs itself
- js is familiar but not trivial as many people think
- works on any platform, can even be browserified (see links below) --
43 matches
Mail list logo