Passing this along. The Internet Freedom Festival is always great and a very
welcoming environment with a wonderful team running it.
best,
Griffin
-- Forwarded message --
From: Sandy Ordonez
Subject: [OTF-Talk] IFF Fellowship: Applications Due this Week
> Hey Friends!!
>
>
Yosem Companys wrote:
If you would like to participate in the process of helping to shape
the new organization, please let me know. We will definitely need the
help of some good web developers and hackers to set up the new site.
Thanks,
Yosem
Hi Yosem,
If there's any way I can help, just
Yosem Companys wrote:
On a more serious note, I want to thank all of you for a wonderful 9
years of discussions about Liberationtech issues.
Hi Yosem,
Thanks for shepherding this list for 9 (!) years. I've really enjoyed
the list and your moderation has been fairly hands-off, which is fairly
On 2017-01-30 11:44, Collin Anderson wrote:
Google cache indicates it was up yesterday, with references to Sec.
Kerry and Ambassador Power, etc. Humanrights.gov looks like a complete
mess overall right now, so perhaps what we are seeing in an artifact
of transition rather than a purging
Hi all,
This morning, a colleague visited the DRL website only to find that
the content had been deleted. I checked another page and found it had
was no longer available.
- https://www.state.gov/netfreedom/index.htm
- https://www.humanrights.gov/issues/internet-freedom/
So... yeah...
Yosem Companys wrote:
The White House comment line (202-456-) has been shut down.
It is worth calling just to hear the message telling people to go away
and send their comments via Fb messenger!
I thought the bit about facebook messenger was odd, but it REALLY DOES
ask you to send the
Hi Lina,
While the content isn't encrypted for most of their apps, I would
recommend Sandstorm as a good hosted option for forums and other
collaborative apps. It's free for up to 5 apps (called "grains") and up
to 200MB storage. For more, it's $9 a month: https://sandstorm.io/
For
Andrés Pacheco wrote:
recipient of NSA etc $$$
I'm pretty
Do you have a citation for this?
~Griffin
--
“I did then what I knew then, & when I knew better, I did better.”
― Maya Angelou
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get
Hi Patricia,
For texting, I'd highly recommend TextSecure or Signal, which both
encrypt your text messages while being transmitted *and* secure texts in
an encrypted container. However, it requires internet access on the
phone to work. If you are working in low-signal areas, then
Last April, Europarl found that the EU data retention directive violated
human rights. This you already know. But the EU ordered a legal
analysis of the ruling's after-effects as they relate to various forms
of intelligence-gathering and surveillance (such as sharing financial
data and
Nariman Gharib wrote:
Thank you.
The stats size is based on Download request which I received through
AWS which is something around 290,000 from 14Nov to 28Nov.
Subscribers: 84K
N
Whoa! That's really great :D That's a *ton* of people downloading.[1]
It's really interesting to see what
I wonder if Twitter restricts accounts to one per phone number. Phone
verification is readily bypassed with something like twilio, but only
the *most* advanced users would be able to pull this off. It would be
worth setting up an app to allow Iranian users to bypass it
semi-automatically,
Apparently allowing unsurveilled/unfiltered speech is considered adult
content by many UK service providers.
Currently blocking:
British Telecom (sometimes)
EE
O2
Sky
Virgin Media
Vodafone
Special thanks to Scott Ainslie for bringing this to my attention:
that url you
mentioned is showing the result of HTTP of Torproject website.
N
On Thu, Nov 6, 2014 at 4:11 PM, Griffin Boyce grif...@cryptolab.net
wrote:
Apparently allowing unsurveilled/unfiltered speech is considered
adult content by many UK service providers.
Currently blocking:
British Telecom
On 2014-08-25 05:10, Nariman Gharib wrote:
Hi,
FYI, Facebook has removed 'restricted access' to Facebook
developers platform for Iranian. [ this restricted were include all
Iranian[s] and not specific range of IPs)
Nice! :D Though SSL is still throttled for connections coming out of
the
Hi Charles,
This is different than your subject led me to believe ;-) I'd say
that the largest reason behind trying to restrict pornography is
societal control -- limiting self-determination through enforced stigma
and criminalization of consensual sex between adults. Maggie Mayhem has
Maxim Kammerer wrote:
Too bad the talk was retracted, I was looking towards some
actual non-propaganda Tor hidden service statistics.
Wait.
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
Al Billings wrote:
Or they were trolling you.
+1, although basically all large hacker-related events get surveilled in
some fashion.
On my end, my phone now magically turns itself on, and as a bonus will
sometimes drain entirely while charging. But then again, it's partly
my own fault for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Andy Isaacson wrote:
this is exactly why some who have received these payloads are
sitting on them, rather than disclosing.
Hmmm, that seems pretty antisocial and shortsighted. While the
pool of bugs is large, it is finite. Get bugs fixed and
Nick wrote:
Quoth edhelas:
What about a Torrent ? We can easily share the magnet everywhere
Note that there is a torrent of the cryptome archive up to 2011:
magnet:?xt=urn:btih:ba401110a60ad844a09d4219e5f95a46385f7410
But yes, bittorrent seems like a reasonable way to distribute this
grarpamp wrote:
Please no clearnet website/dumps for files. You're not teaching anyone
how to use crypto tools by giving them the easy way out. Make them
download and use Tor, I2P, Freenet, gnupg, sha256, whatever. You can
put those instructions on clearnet if you want.
I was thinking more
On July 8, 2014 4:11:44 PM EDT, coderman coder...@gmail.com wrote:
hi Griffin!
this is the type of effort i was hoping to see undertaken.
Me too ^_^ eventually I realized I'd have to do it myself if I wanted more info
on Topic X. I obviously don't have access to the source, but there are some
is that the *only option* that Twitter allows when in
this locked state?!
great, now twitter knows where I live =/
Griffin Boyce
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo
Seth David Schoen wrote:
It seems obviously crazy to me for Twitter to prevent people from
accessing it over Tor, both in light of widespread censorship of
Twitter
on different networks and in light of governments' attempts to find out
where users of services are connecting from.
Yes,
Hey Yosem!
A good experiment might be to send out releases of factual security info to
counteract the dubious press releases that all too often turn into dubious
articles.
Yosem Companys wrote:
Seems as though we need better tactics to share with journalists our
impressions about
Ryan Sleevi wrote:
Certificate pinning is one such way to mitigate this threat.
This is true. But
There need to be more options for users/allies to solidify a
connection to a website other than relying on the webmaster to get their
cert pinned (which happens almost never). Yes,
Nathan Freitas wrote:
Automated distributed deterministic build comparisons FTW!
Seriously, it seems like we are pretty close with such a thing for
Android APKs, so perhaps Chrome extension bundles could be added to
the list, as well.
That sounds pretty awesome :D Apps and extensions are
On 2014-05-04 01:02, Nick wrote:
https://developer.chrome.com/extensions/crx is the documentation
that mentions the signing. There are a couple of scripts there that
will create a signed .crx file. I also wrote one a while ago[0].
I don't know how crx files integrate with Google's developer
Nick wrote:
Can you definitely not sign extensions with a private key?
This is not an option available to any of my extensions or apps,
unfortunately. There's reference to it in the documentation, but I've
never seen this as an option for apps or for my developer account.
Could you
Hey all,
So lately I've been obsessively working on a project to get software
into people's hands and make it easy for them to see whether it's been
tampered with in-transit.
Code: https://github.com/glamrock/satori (download the zip)
App:
Tom Ritter wrote:
I'm wondering about the update mechanism.
Do chrome extensions update over SSL? Is this update connection to
google pinned, so you have to compromise a specific CA, instead of any
CA?
Chrome packaged apps update over SSL from a domain that has its
certificate pinned.
On 2014-05-02 20:35, Andrew Cady wrote:
On Fri, May 02, 2014 at 05:22:11PM -0400, Griffin Boyce wrote:
No, though I have two-factor authentication using a secure device
(not a cell phone), and I can't be vanned/rubber-hosed because I don't
actually know the password to my Google developer
And, whether it's a Thunderbird bug or an Enigmail bug, Gmail emails
have a tendency to be sent (typically unencrypted) during draft
autosave. So that's fun.
Thunderbird makes me think of Mutt's slogan from 1995 - All email
clients are terrible. This one is just less terrible.
~Griffin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Computing on a device you have full control over is not necessarily
secure, and offloading everything onto a machine (or set of machines)
that you have no real control over probably won't improve your security.
There's a lot of money to be
Nick wrote:
Yep, and it worked well, with really good quality, even projected onto
a big screen. Questions were asked to him over IRC (mostly through
audience members on their laptops, some via a volunteer at the front).
I got the impression there was a bit of latency, but in this context
it
Nathan of Guardian wrote:
Two things we are exploring with using OStel.co (aka SIP!) over Tor:
- Supporting TCP mode for RTP media streaming in Jitsi, Linphone, in
order to use SOCKS proxying over Tor
- Using a Jitsi video bridge in the same configuration:
Just a couple of things:
-- Any project which is not transparent about its funding or
operations should never be trusted. I personally would classify paid
software in this. VPN is a bit different, but these vary widely and
there is not one paid service that I'd recommend. Setting up your own
Adam Fisk wrote:
I agree the threats are complicated. Is an infiltrating seeder in Iran
learning about someone serving the Tor binary dangerous
It's a serious consideration, and not an exaggeration to say that I'm
losing sleep over that exact question. My seedboxes are sitting idle at
the
Hello all,
There seem to be quite a few people on this list with a more academic
background, both in research and teaching, so it seems like a good group
to approach with this question =)
I do some interesting things with code, mostly with censorship and
free expression in mind, and am
Nathan of Guardian wrote:
Github? Maybe not whole sites, but specific files.
I've been working with users who have networks in censored countries
to expand access to specific software bundles. My two approaches right
now are Google Web Store and torrents attached to a stable offsite
seedbox.
March 5th @ 1:30pm in the demo space:
https://www.rightscon.org/programhighlights.php
I feel I should warn you now, this talk is going to be super weird.
Hope you're all okay with that. Though if you're coming to one of my
talks, you pretty much know what you were getting into. :D
Adam Pritchard wrote:
I would advise against getting too comfortable/confident/hubristic...
One might not want to suggest that one is unblockable.
I like Tor a lot, but obviously nothing is unblockable. Iran's
targeting of Tor around the attempted revolution is but one data point
-- every
[Information taken from their website. Conference is to be held June
8-10 at the Airlie Center in Warrenton, Virginia. -G]
About:
This year's conference will be co-chaired by Nuala O'Connor and Amie
Stepanovich and will feature the theme, The Internet Wants to be Free.
The Conference will be
Original Message
Subject: @GreatFireChina and @FreeWeibo report that Microsoft is
deploying Chinese censorship on global scale
Date: Wed, 12 Feb 2014 12:41:52 -0500
From: Sandra sandraordo...@openitp.org
Organization: OpenITP
To: a...@lists.openitp.org
Dear FreeWeibo and
Granted, it's not written yet, but I'm starting to feel like I'm the
only one in this space who *hasn't* written a book, haha. Calling dibs
on the title. ;-)
~Griffin
PS: Everyone's books (that I've read so far) have been awesome. It's
just amusing that I wind up debating the nuances of
Bill Woodcock wrote:
See if you can get it to #1 on Amazon pre-orders! :-)
-Bill
The only real downside with taking pre-orders is that I might,
eventually, have to write a book. ;-)
~Griffin
--
Liberationtech is public archives are searchable on Google.
it a free,
open-source, communications tool, because it is all of those things.
Commotion leverages and builds upon the work of lots of great projects
like Serval and OpenWRT, but I think that's a positive aspect of the
project. :D
Happy New Year! (it's still 2013 here haha)
Griffin Boyce
(While I
Maxim Kammerer wrote:
The server farm where Liberté Linux site is hosted is apparently
blocked by ATT in the USA. Isn't this unusual?
Are websites being censored in the US? Yes. Is yours? Unlikely --
looks like it was lumped in with servers flagged for spam/malware activity.
Improper
From the brightest minds on the Cypherpunks list comes an NSA game you
can play with your friends :3
~Griffin
Original Message
Subject:NSA: The Game
Date: Mon, 02 Dec 2013 22:34:54 +1300
From: Peter Gutmann pgut...@cs.auckland.ac.nz
To: cypherpu...@cpunks.org
Sandra Ordonez wrote:
On Jan 11, we are hosting a hackathon for circumvention tools in
Washington DC. which will have a heavy UX and localization focus. We
have already secured a good group of tools. Now to secure good
contributors
Hi all,
I just wanted to chime in and say that all of the
This one should work:
www.un.org/ga/search/view_doc.asp?symbol=A%2FC.3%2F68%2FL.45
Sorry about that!
On 11/13/13 14:59, Tamzen Cannoy wrote:
On Nov 13, 2013, at 7:38 AM, Griffin Boyce grif...@opentechinstitute.org
wrote:
In it, they state that they are deeply concerned at human rights
Next Wednesday, November 13th, the House-Senate conference committee
will be holding a meeting on a resolution that sets the congressional
budget for FY2014. They will also be looking to revise budgetary levels
for FY2013 -AND- defining budgetary goals for 2015-2023.
This is going down in
Matt Johnson wrote:
Griffin suggested never connecting a USB stick, or external drive or
copying PDFs to the air gap computer. I have asked how that air-gapped
computer would be useful. Apparently the point is too subtle.
There are a few aspects to this that I'd like you to consider.
anon14...@safe-mail.net wrote:
Trying the now rather dated Ubuntu Privacy Remix I figured out any recent
distribution would do. Just the ability to disable networking by hand and
that's all.
There are some really good options out there, including:
TAILS: https://tails.boum.org/about/
On 10/18/2013 09:20 PM, 夏楚 wrote:
To all,
I just wrote up my new study of GFW and it is available at
http://goo.gl/KfBCgT
Hi Xia,
Thanks so much for posting your new paper. It's really rare to see such
a complete body of research on this subject -- in fact, I don't think
I've seen one on the
While there are easy ways to mess up using PGP, I think that a more
well-rounded approach is to be mindful of the ways that one can be
de-anonymized (by others or themselves) while using it.
People who don't have a holistic view of their security, and don't
want to learn more about their
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
There's been a really interesting document to come out of the Guardian
today:
http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document
Interestingly:
- NSA/GCHQ was fingerprinting using Flash
- They were
On 10/04/2013 06:12 PM, Maxim Kammerer wrote:
Both Tor Button and Tor Browser Bundle existed in 2007.
I didn't mention the browser bundle ;P
--
Cypherpunks write code not flame wars. --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de
My posts are my own, not my
On 10/01/2013 04:44 AM, Travis Biehn wrote:
I see no reason to chill competition with whisper systems offerings.
The stego option is appealing, I'm assuming you'll be trying it with MMS?
The field is large enough that several competitors could have healthy
userbases at the same time. I
Have you considered putting your notes and code somewhere online, such
as GitHub? It would be a lot easier to get feedback and make public
changes there.
~Griffin
Scott Arciszewski wrote:
That is /ugly/ as heck. Sorry.
https://defuse.ca/b/MQrZXLiE - link valid for 6 months
On Sat, Sep
On 09/20/2013 09:59 PM, adrelanos wrote:
Hello liberationtech!
The Whonix Project is looking for a translations coordinator.
Whonix [1] is an anonymous general purpose operating system based on
Virtual Box, Debian GNU/Linux and Tor. It has its focus on anonymity,
privacy, security and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/16/2013 09:51 PM, Moritz Bartl wrote:
On 09/16/2013 07:45 PM, Charles Paul wrote:
Hello,
Hope everyone is doing great. I was wondering if anyone on this list is
aware of the current state of different javascript implementations of
RSA or
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/10/2013 08:41 AM, Moon Jones wrote:
A portable distribution on an encrypted stick.
In the end, I think only an USB hard drive can offer that, because of
the way memory locations are handled by flash media.
But is it feasable to have a two
On 09/07/2013 12:51 AM, Andy Isaacson wrote:
Also please provide design documents for how you plan to keep it
private and secure. -andy
Defining terms also helps a lot. Define encrypted -- what protocols
are you using? Is Places based on established technology or new
research? Do you offer
An interesting article on what happens when large monopolies refuse to
do business in small locales, and the creative ways that people find to
work around them =)
More info on Rhizomatica: http://rhizomatica.org/
---
Forgotten by telecoms, Mexico town runs cell service
Agence France-Presse,
On 08/24/2013 05:13 PM, Francisco Ruiz wrote:
My encryption app, PassLok, is currently in the shape of a standalone,
static web page with two text boxes where users copy and paste plain
or encrypted messages. I am considering the possibility of making a
browser extension version out of it,
Tom O wrote:
So it's now become about the heroism of the journalists and not
Snowden and mass govt surveillance. Right.
There's enough heroism to go around. To get a story of this magnitude
out requires courage from both sources and journalists. And safety is in
no way guaranteed for anyone
Kyle Maxwell wrote:
[Comment: This has implications for those of us involved in
CryptoParty as well as other security education efforts.]
The criminal inquiry, which hasn’t been acknowledged publicly, is
aimed at discouraging criminals and spies from infiltrating the U.S.
government by using
So I set up a proof-of-concept server last Friday, which was far
easier than I had pictured. Special thanks to Moritz for his PGP milter
[1], but I'm also customizing a lot of the other security and spam
filter settings.
Short: It should be up for comment in the next two weeks.
Long: I'm
Nadim Kobeissi wrote:
Here's the thing: you ultimately have two types of software that the
U.S. is interested in funding:
*Software Type A:* Software that protects useful dissidents and anyone
else from all governments (to an extent), including the U.S. government.
*Software Type B:*
John Cusack comes to mind - he's on the board of Freedom of the Press
Foundation.
~Griffin
On 08/12/2013 04:32 PM, Francisco Ruiz wrote:
Quick request.
In comments to a recent post, people seemed to agree that publishing a
video of someone reading a hash might be a fairly hard-to-hack way to
On 08/11/2013 12:51 AM, Tom Ritter wrote:
Some other random stats for the curious.
Tor v0.2.3.25 (git-17c24b3118224d65)
Vidalia 0.2.21 (QT 4.8.1)
# Configured for speed
ExcludeSingleHopRelays 0
EnforceDistinctSubnets 0
AllowSingleHopCircuits 1
# Exclude countries that might have blocks
Fabio Pietrosanti (naif) wrote:
If someone want to make this recipie working, i think that the world
would appreciate with an easy to be setup, independently run, audio,
video, file transfer, chat infrastructure accessible with a web
browser .
Welp, there goes my weekend. Dangit, naif! ;-)
Thanks for volunteering to help me test the service ;3
Brian Conley wrote:
Griffin, make it so!!
On Aug 9, 2013 7:31 AM, Griffin Boyce griffinbo...@gmail.com
mailto:griffinbo...@gmail.com wrote:
Fabio Pietrosanti (naif) wrote:
If someone want to make this recipie working, i think
This probably sounds very strange, but *what if* someone ran an email
service that required that all mails be GPG encrypted?
So here's my idea: Barring the honor system, it would require a filter
to look at message content to check for PGP headers. And if said
headers didn't exist, the
Randolph D. wrote:
use bitmail
No.
Moritz Bartl wrote:
I wrote a milter for sendmail/postfix to reject non-PGP mail that scans
the first lines of incoming mail: https://github.com/moba/pgpmilter
Ooooh. Forked.
My idea of a mail provider: The MX records of domains contain a list of
different
I must admit, it can be entertaining at times. (now is not one of
those times). ;3
Griffin
On 8/6/13, Fabio Pietrosanti (naif) li...@infosecurity.ch wrote:
Because that's become a trolling-engagement thread, i cannot resist to
hijack it.
I LOVE NADIM AND JAKE!**
-naif
** Especially when
Tonight, I managed the final leg of my journey without being hassled by
security. This unprecedented event has prompted me to consider a snark-free
future.
Feel like agreeing to not snark at each other? It's not really
productive, and we all seem to snark at each other at the worst possible
Fabio Pietrosanti (naif) li...@infosecurity.ch wrote:
After a quick check at a random Tor2web server, it seems that there's no
specific pattern of traffic-drop.
Who knows, maybe the amount of TorHS that has been takendown are just a
few.
Yeah, it seems like people are vastly
Bernard Tyers - ei8fdb ei8...@ei8fdb.org wrote:
By what Roger Dingledine from Tor has stated in a previous mail, The Tor
Project provided the you need to upgrade message promptly. I don't know
if that is enough. (But it is certainly a lot more that other providers of
software would do.)
I
Al,
We may have to disagree as to the way forward. I hate to be
contentious, but it seems unlikely that Tor applied a patch without
reading firefox's changelog. Two days ago I presented a talk which
emphasized how useful Tor is -- and I stand by that. Tor is still the
best option for maintaining
There are really two separate issues here, and I just want to separate them
briefly.
1) Tormail and other sites were hosting malicious js code that attempts to
break firefox 17.
2) Freedom Hosting was shut off after its host was arrested.
I will say from personal experience that most hidden
On 07/19/2013 05:44 PM, Dan Auerbach wrote:
We're sure there are many more, and wanted to see if people here could
help by pointing us towards launched projects to add to the list. It's
hard to draw a bright line between what counts as a launched project
vs, say, a technical solution. For
Fabio Pietrosanti (naif) li...@infosecurity.ch wrote:
Hi all,
i've been thinking about the topic of metadata cleanup of files from an
implementation point of view.
Media metadata is incredibly fascinating :D Obscuracam does a really
great job of cleaning up jpegs, but doesn't cover the
From: Rochelle Harris rochel...@gmail.com
I am also curious to know please - what is the situation with
hacktivists? How do you find them?
It might help to break this problem into pieces:
1) Based on your story angle, define hacker/hacktivist
2) Locate people who meet that criteria
Usability is certainly one of the most neglected security properties of
almost every software. Jitsi is pretty dang good from a security
standpoint, but fails miserably from a usability perspective. This is not
an insurmountable problem. Even GPG4win has problems with user
experience.
When
There are also undefined amounts of federal grants being awarded to bot
offense and defensive cyber weapons. It's pretty ludicrous. There's
never going to be a plug-and-play auto-hacking tool that works with any
degree of reliability.
(Though to be fair, there are servers out there still
Grim Meathook Future indeed.
For everyone reading the English text, keep in mind that it is from Google
Translate. But I couldn't be patient either.
Thanks for helping to bring these stories to light. I sincerely hope that
nothing too terrible happens as a result.
There's that old Orwell quote
I think he missed a prime opportunity to call his post DecipherDog ;-)
~Griffin
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
https://mailman.stanford.edu/mailman/listinfo/liberationtech
Frederick FN Noronha फ्रेड्रिक नोरोन्या *فريدريك نورونيا
fredericknoro...@gmail.com wrote:
For what? Propping up US foreign policy? FN
That's an interesting statement, and I'm not sure it's really reflected
in the types of projects that OTF funds[1]. GlobaLeaks doesn't really seem
like a
Nadim Kobeissi na...@nadim.cc wrote:
Frederick did not call OTF a tool of US oppression, but a tool for aiding
U.S. foreign policy. I am very pleased that my project is supported by the
excellent people at OTF, but let us not kid ourselves and say that U.S.
foreign policy has nothing to do
(Just to clarify, I meant that I disagree that Cryptocat etc are propping
up US foreign policy).
~g
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
Yosem Companys compa...@stanford.edu wrote:
If you had an extra $2-3K to give to a liberationtech or crypto project,
who do you think would benefit the most?
If I had an extra $3000 to I would give it to transparency toolkit [1].
While it's still early-stage, it shows a lot of promise and the
On Jul 1, 2013 5:02 PM, Eleanor Saitta e...@dymaxion.org wrote:
This, of course, is a global problem everywhere. A secure channel
requires a shared secret, in this case between the developers and the
end user. How does the user get their initial OS image if it didn't
come with their machine
Jacob Appelbaum ja...@appelbaum.net wrote:
Congratulations. I look forward to seeing them, probably on a remote
stream but also perhaps in person.
It should be fun. =) I'm not sure that my Noisy Square talk [1] will be
recorded though.
No one has said that the cops shouldn't submit a talk -
Not only am I going to be presenting three talks at OHM, I will be
presenting talks that are (in many ways) totally dead conversations in the
US.
It's interesting how much of the debate centers around the presence of
police at OHM, as if American hacker cons didn't have the head of the NSA
+1 Nathan. Jitsi is great, but does need more love and attention from
developers to be a real contender.
Skype got its foot hold on various communities because it's useful, usable,
and has (had?) an under-educated user base. The ongoing debate about their
terrible security practices will likely
Louis Suárez-Potts lui...@gmail.com wrote:
My understanding is that the TSA archives but does not examine the data
except under specific FISA searches. This is their justification that it
isn't really domestic spying, because it's a fossil record of the data,
like archive.org for every
dan mcquillan d...@internetartizans.co.uk wrote:
a few people who came to our university cryptoparty asked whether they're
just going to draw attention to themselves by encrypting email.
the latest leaks seems to give a firm 'yes', as the NSA specifically keeps
encrypted comms indefinitely.
Louis Suárez-Potts lui...@gmail.com wrote:
Every day, one learns a new thing… or at least has one's guesses
confirmed—and then does the same old. I think all of us (undefined set of
persons but including those on this public list) have simply assumed that
all information is kept for always,
1 - 100 of 168 matches
Mail list logo