Hi list,Let's say I revise Bitmessage to have the following constraints:* only
two messages are sent per day: one at 0:00 GMT and another at 12:00 GMT*
receipt acknowledgement happens inside messages, either manually "Hi, I got
your message", or automating the process in the client. Either way
email:
"""
Why is this message in Spam? It has a from address in yahoo.com but has failed
yahoo.com's required tests for authentication.
"""
Strange. I wonder what are yahoo's tests for authentication.
Regards,
real.
On Mon, Oct 5, 2015 at 8:37 PM, Jonathan Wilkes <
t anonymity-overlays?
-Jonathan
On Monday, October 5, 2015 1:48 PM, carlo von lynX
<l...@time.to.get.psyced.org> wrote:
On Mon, Oct 05, 2015 at 05:37:50PM +, Jonathan Wilkes wrote:
> Glad to see you finally removed Oneswarm. :)
Onewhat? I don't know what that is.
> I pers
-coins show that it is just as difficult to solve
the bootstrapping as it is to solve the db sync'ing.
Best,Jonathan
On Sunday, August 9, 2015 4:57 AM, Jaromil jaro...@dyne.org wrote:
dear John,
On 9 August 2015 01:42:05 CEST, Jonathan Wilkes jancs...@yahoo.com wrote:
Hi jaromil
and citations?
-Jonathan
On Sunday, August 9, 2015 12:24 AM, hellekin helle...@gnu.org wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 08/09/2015 12:32 AM, Jonathan Wilkes wrote:
Hi hellekin,In which file are you seeing that flag?
File? I provided a link. I'm not sure
:
dear Jonathan,
Please excuse me if I'm not going to explain further what we are doing,
I guess the doc I've sent is already a tl;dr for many. Nevertheless, a
few answers to clarify our focus:
On Fri, 15 May 2015, Jonathan Wilkes wrote:
1) You don't have a bootstrapping algo. Leaving
Hi hellekin,In which file are you seeing that flag? I can't find it, and to be
honest I'm not even sure how it would induce buggy behavior.
Do you have a crasher demo?
In general I do agree that it is _imperative_ to get the economics and politics
exactly right before releasing. Just like
On 05/13/2015 08:04 AM, Jaromil wrote:
Dear peers, friends and colleagues, comrades and futurists,
I hope this email finds you well. I'm writing you because in the past,
in a way or another, we have chatted, conspired and dreamed around the
scenario of cryptographic blockchain technologies and
Hi list,
Let's say protesters plan an action in an as of yet undisclosed location on
Wednesday. One of the dangers of wide-net surveillance is that if law
enforcement finds out on Tuesday, they could query The Big Harddrive and search
through _everyone's_ data from Monday and find the
So it's
a former FBI lawyer
vs.
the former FBI lawyer's friend who doesn't use SSL, doesn't have a GPG
key/fingerprint on his site, nor really any time to do his own research on a
foundational principle in his area of expertise.
I do not think this will end up being a very vigorous debate, but
That's great. And if TBB implements the security slider with Whistleblower
at one end and Log in to Facebook at the other, where do you think the
average post-Snowden user would set it? Where would you set it?
https://trac.torproject.org/projects/tor/ticket/9387
Not that the TBB devs would
Hi Rob,You do know TBB's defaults regarding scripts, right? If it's a
conundrum with no easy answer for Tor devs, it's a conundrum for Facebook as
well. So please do get on Tor Talk list and criticise TBB for having an
(advised) yet non-default setting for blocking all scripts.
I understand
a strange location, so
there will be that issue.
In the end, I don't get why FB is doing this, other than to look
hip.
- Rob
On 10/31/2014 11:40 AM, Jonathan Wilkes wrote:
Hi Rob,
You do know TBB's defaults regarding scripts, right? If it's a conundrum with
no easy answer for Tor
Hi Bill,Just keep in mind that there hasn't been a single citation of any
reliable research or human rights reports about deniability in this thread. So
if you are looking for advice specifically on whether the system should even
include deniability, you're basically working off an opinion of
And just to keep the discussion on topic-- I'm talking about research or
reports on the benefits/drawbacks of using software in the field that has some
deniability features.
-Jonathan
On Monday, October 6, 2014 12:56 PM, Eleanor Saitta e...@dymaxion.org
wrote:
-BEGIN PGP SIGNED
On 10/03/2014 12:57 PM, Greg wrote:
Dear Natanael,
Call up Red Hat and ask them about how they manage their open source
Linux distribution.
Oh, I am very familiar with the Red Hat model, and I respect it
greatly, and am in fact pursuing something similar.
Red Hat works because it is
Hi Rich, Your footnote #1 is dubious at best. The cost of aiming peoples
eyes at bugs is _not_ $0. Until it is, the free software community has a
problem with too few resources chasing too many bugs. Sitting my Debian box
next to an XP box that's running Flash certainly doesn't change
Well, to be completely honest I wouldn't use security software with a
proprietary GUI myself. But I'm not most people, and it would be better for
your business logic to be open source than for the whole thing to be subject to
the terms you describe.
-Jonathan
On Friday, October 3, 2014
Hi list,
I'd like to set up a machine to automatically fetch emails from my yahoo
account at some interval-- maybe once or twice a day, and then to send out any
emails I happen to write at a similar interval. In the outgoing emails, I want
the time/date in headers to reflect the time the
Hi Eleanor,
I understand the logic of the argument, but are there news stories about
people being harmed in the field due specifically (or mainly) to deniability of
the software they are using? (Or research on the topic, though I'm not sure
how it could be a falsifiable or reproducible.)
Hi list,
There now seems to be a wealth of documents and articles on the general
techniques spy agencies employ for both wide-net and targeted surveillance
around the world. Additionally, there are many documents and articles that
outline general techniques of exploiting end-user devices
On 08/27/2014 08:17 PM, Jonathan Wilkes wrote:
Does your software have a friendly UI that shows the user sharing
their internet connection _exactly_ what requests they are making on
another's behalf? Does it store a log and require the user to read
and analyze that log?
I'll just go ahead
Does your software have a friendly UI that shows the user sharing their
internet connection _exactly_ what requests they are making on another's
behalf? Does it store a log and require the user to read and analyze that log?
-Jonathan
On Wednesday, August 27, 2014 4:30 PM, Adam Fisk
On 08/04/2014 08:45 AM, Charles Haynes wrote:
Totally agree with Travis. Also - who is the intended audience for
this? People who want to know how the different layers of the OSI
stack work in practice?
-- Charles
On Mon, Aug 4, 2014 at 10:27 PM, Travis Biehn tbi...@gmail.com
On 08/10/2014 12:44 PM, Lodewijk andré de la porte wrote:
So, the response was this:
Guys, calm down.
The code you posted doesn't send your username to
bitcoinarmory.com http://bitcoinarmory.com, it sends the
*truncated hash* of your user home directory path. This does not
Is there anything like a database for software that is critical to a
functioning internet?
Best,
Jonathan
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech.
On 07/20/2014 11:00 AM, Michael Rogers wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 18/07/14 01:02, coderman wrote:
as thought experiment: a hidden site is setup by presumed
trustworthy experts. exploits are funneled there, then they all
dry up.
- congratulations! NSA is out of
On 07/18/2014 06:12 AM, coderman wrote:
[...]
i approve of this timeline, and am anxious to see if NSL's are used to
trump some exploits. (how would you know? good question :)
* U.S. National Security Letters
* U.S. National Exploit Stockpile
* Effective public bug-quashing program in U.S.
Hello list,
We know something about the selectors that could trigger Foxacid
attacks, and we can record the data sent to a machine running Tor
Browser Bundle. So has anyone set up a sitting duck to trigger and
record the payload of the attack?
Once the payload is known then Firefox
On 07/17/2014 04:11 PM, coderman wrote:
On Thu, Jul 17, 2014 at 12:41 PM, Andy Isaacson a...@hexapodia.org wrote:
...
this is exactly why some who have received these payloads are sitting
on them, rather than disclosing.
Hmmm, that seems pretty antisocial and shortsighted. While the pool of
On 07/13/2014 02:23 PM, Derek Frech wrote:
Hey LibTech,
We are happy to announce that Lantern (censorship circumvention
tool) is no longer invite only. As of yesterday, we have released a
public download of the software via our website https://getlantern.org/
https://getlantern.org/%20
On 07/11/2014 06:36 AM, Eugen Leitl wrote:
http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the-nsa-is-total-population-control
The ultimate goal of the NSA is total population control
At least 80% of all audio calls, not just metadata, are recorded and stored
in the
On 07/11/2014 02:15 PM, carlo von lynX wrote:
[...]
Using ratchets to authenticate at the current point in time without
needing an absolute identity (the thing about OTR being used in an
ephemeral way) is how Briar does it. It makes it harder to reconstruct
the social graph as you need to
On 07/10/2014 09:28 AM, Ryan Bartos wrote:
Hi LibTech,
The debates that rage on after every trickle of snowden release
justifiably causes much resentment. However, one crucial point about
these debates are often missed. And that is that the exact debates we
are having and the exact evidence on
On 07/04/2014 10:56 AM, Eugen Leitl wrote:
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1
Errata Security
Advanced persistent cybersecurity
Friday, July 04, 2014
Jamming XKeyScore
Back in the day there was talk about jamming echelon by adding keywords to email that
the
On 06/23/2014 07:07 PM, Moritz Bartl wrote:
On 06/23/2014 04:55 PM, Jonathan Wilkes wrote:
Is anybody doing router software that allows guest access, but
_only_ if the client is using Tor to connect? The Tor network and its
various relays and exits are known, so it seems like it should
Hi,
Is anybody doing router software that allows guest access, but _only_ if
the client is using Tor to connect? The Tor network and its various relays and
exits are known, so it seems like it should be doable.
In this case, the router owner could open up access with less risk of having
On 06/10/2014 05:03 PM, Tom Ritter wrote:
I just want to jump in and mention again that it's entirely possible
to pick apart applications written for Android, iPhone, Windows, Mac,
etc and understand how they operate. Going even deeper than just
'what they store on disk' and 'what they send
On 06/05/2014 06:28 AM, carlo von lynX wrote:
Heya.. I saw the ACLU, AI, EFF, FSF, Greenpeace, MoveOn
and other logos on the https://www.resetthenet.org page.
[...]
- Would be better to fix the scalability of Tor hidden
services so we can use .onion instead of the broken
HTTPS thing.
On 05/18/2014 09:54 AM, Cristina wrote:
El 18/05/14 09:40, Fabio Pietrosanti (naif) escribió:
Il 5/15/14, 11:47 PM, Tom Ritter ha scritto:
On 14 May 2014 23:36, Fabio Pietrosanti (naif) li...@infosecurity.ch wrote:
i think that would be very important to organize a project to Audit the
On 05/09/2014 06:13 AM, Anthony Papillion wrote:
On May 9, 2014, at 4:42, Ximin Luo infini...@pwned.gg wrote:
On 09/05/14 02:31, Anthony Papillion wrote:
On 05/08/2014 08:23 PM, Doug Schuler wrote:
Realistically we need to develop an entire suite of publicly owned
tools. Could the
On 05/08/2014 07:06 PM, carlo von lynX wrote:
On Thu, May 08, 2014 at 08:15:04AM -0500, Anthony Papillion wrote:
The bottom line is that, bug or not, privacy conscious people need to
simply stay away from Google. And I don't mean just Google Search or
Chat. I mean /all/ of Google, Everything
On 05/08/2014 09:31 PM, Anthony Papillion wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 05/08/2014 08:23 PM, Doug Schuler wrote:
Realistically we need to develop an entire suite of publicly owned
tools. Could the development and implementation be massively
distributed?
Or is it
On 05/07/2014 05:47 PM, Tor Krill wrote:
Dear list,
I just wanted to take some time to inform you on our IndieGoGo campaign
to launch our new device OPI:
https://www.indiegogo.com/projects/opi-reclaim-your-digital-life/
OPI is an attempt to let everyday users take back control over their
Hi list,
Does anyone use Cables?
Is Cables included any distro other than Liberté Linux?
Could Cables be packaged in Debian, or does it require a hardened/privacy-based
distro in order to work properly?
Has a non-anonymous dev experienced in security software ever had a look at the
code?
If so,
Astronomy, astrology-- at this point I am pretty much universally disgusted by
anything publishing conclusions without clear data to back it up.
Neither is perfect at describing the universe, so there's plenty of blame to go
around. We should try to focus less on ideology and more on improving
On 04/25/2014 03:16 PM, Louis Suárez-Potts wrote:
On 25 Apr 2014, at 14:21, Jonathan Wilkes jancs...@yahoo.com wrote:
On 04/23/2014 10:04 AM, Louis Suárez-Potts wrote:
On 23 Apr 2014, at 08:38, Nick liberationt...@njw.me.uk wrote:
I took the liberty of changing the subject line
On 04/26/2014 05:18 PM, Shava Nerad wrote:
Anyone who is lauding the verifiability of open source security
software had best show that their code has been regularly and
thoroughly audited.
I'm not sure what that means, so I'll start a new paragraph for what
could be a non sequitur...
On 04/26/2014 09:33 PM, Shava Nerad wrote:
Security software isn't like a lot of open source projects. Generally
there have to be narrowly controlled commits, well reviewed. Those
people are experts who may have a lot of other demands on their time
that are far far more monetarily
On 04/23/2014 10:04 AM, Louis Suárez-Potts wrote:
On 23 Apr 2014, at 08:38, Nick liberationt...@njw.me.uk wrote:
I took the liberty of changing the subject line to something that
hopefully somewhat summarises your email.
Quoth Arnaud Legout:
As polemical as it can be, deeply-held belief
: https://bitmessage.org/wiki/Main_Page
BitMessage is a secure peer-to-peer communications protocol that
allows you to broadcast a message (or receive a broadcast message)
without revealing your IP address.
Cheers,
On 04/06/2014 11:41 PM, Jonathan Wilkes wrote:
Hi list
: https://bitmessage.org/wiki/Main_Page
BitMessage is a secure peer-to-peer communications protocol that
allows you to broadcast a message (or receive a broadcast message)
without revealing your IP address.
Cheers,
On 04/06/2014 11:41 PM, Jonathan Wilkes wrote:
Hi list,
Can some tech
Hi list,
Can some tech liberator out there versed in javascript and video
streaming please take over the popcorn-time project? It looks like it
was developed pseudonymously by at least three teams now which have all
disappeared (probably due to pressure from Hollywood).
If you haven't
Anyone ever heard of this?
https://www.grc.com/sqrl/sqrl.htm
-Jonathan--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change
Has anyone seen this:
http://media.libreplanet.org/u/zakkai/m/free-software-for-freedom-surveillance-and-you/
If that is indeed what people saw when they watched a live stream going over
Tor, I'm very impressed. Interested to know more about the setup.
-Jonathan
--
Liberationtech is public
On 03/27/2014 11:02 AM, Nick wrote:
Quoth Jonathan Wilkes:
Has anyone seen this:
http://media.libreplanet.org/u/zakkai/m/free-software-for-freedom-surveillance-and-you/
If that is indeed what people saw when they watched a live stream going over
Tor, I'm very impressed. Interested to know
On 03/27/2014 11:25 AM, Griffin Boyce wrote:
Nick wrote:
Yep, and it worked well, with really good quality, even projected onto
a big screen. Questions were asked to him over IRC (mostly through
audience members on their laptops, some via a volunteer at the front).
I got the impression there
On 03/17/2014 06:30 AM, Marc Juul wrote:
[...]
Seriously... other hackerspaces deal with theft, homeless people
sleeping in the space, violent individuals, armed robbery, hate
speech, etc. and they still haven't set up cameras.
That's right. A hackerspace is the _last_ place we should
On 03/03/2014 12:19 PM, Rayzer Raygun wrote:
On 3/2/2014 12:13 PM, Andrés Leopoldo Pacheco Sanfuentes wrote:
Isn't it reasonable to assume that EVERYBODY IS BEING OR IS BOUND TO
BE SPIED ON in the Internet?
[...]
I've always assumed anything I ever put on the internet, no matter
encrypted
for the Internet
On 02/19/2014 06:39 PM, Gregory Maxwell wrote:
On Wed, Feb 19, 2014 at 3:21 PM, Jonathan Wilkes jancs...@yahoo.com wrote:
Now say that the user has installed a third party add-on that either
accidentally or intentionally (through design or through compromise) blocks
On 02/19/2014 03:56 PM, Mitar wrote:
Hi!
I would like to point to this change in the future W3C spec:
https://github.com/w3c/webappsec/commit/cbfaa8edfadebf21a9c7428242c12e45934d8c55
This change effectively allows a website to prevent bookmarklets from
working. In essence, content providers
On 02/19/2014 06:39 PM, Gregory Maxwell wrote:
On Wed, Feb 19, 2014 at 3:21 PM, Jonathan Wilkes jancs...@yahoo.com wrote:
Now say that the user has installed a third party add-on that either
accidentally or intentionally (through design or through compromise) blocks
or otherwise prevents my TV
On 02/18/2014 01:00 PM, Yosem Companys wrote:
http://liberationtechnology.stanford.edu/events/the_fight_for_internet_freedom/
The Fight for Internet Freedom
Stanford CDDRL Seminar Series
SPEAKER
David C. Drummond - Senior Vice President, Corporate Development and Chief
Legal Officer at
On 02/14/2014 01:23 PM, hellekin wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/14/2014 02:30 PM, Morgan Marquis-Boire wrote:
Thanks Frank,
Thanks for the kind words. The ubiquitous targeting of journalists
is very concerning.
*** Indeed it is. Thank you for this report. I
On 02/07/2014 01:12 PM, Gregory Maxwell wrote:
On Fri, Feb 7, 2014 at 9:52 AM, taltm...@stanford.edu wrote:
This is the kind of heavy hand that Stanford is laying down on
students and faculty who do not want to give up their privacy.
This seemed to me like an inevitable outcome when there was
On 01/30/2014 11:38 AM, Patrick Schleizer wrote:
Jonathan Wilkes:
Before I write anything else: Is the BigFix client free software?
Couldn't figure it out from a quick look at the website.
I also couldn't find confirmation it's Free Software.
Someone from Stanford want to weigh in here
On 01/30/2014 05:29 PM, Gregory Maxwell wrote:
On Thu, Jan 30, 2014 at 2:13 PM, Nicholas Merrill li...@calyx.com wrote:
Hey all
I wanted to let everyone here know that we (The Calyx Institute) opened
an experimental public and free Jabber / XMPP server to the public today
that has a number of
On 01/30/2014 07:23 PM, Nathan of Guardian wrote:
On 01/30/2014 07:02 PM, Jonathan Wilkes wrote:
So I'd recommend forcing OTR. Then the people discussing lolcats won't
feel so bad about wasting their time, because even seemingly frivolous
privacy helps to protect everyone else's.
Is there any
On 01/26/2014 08:12 AM, Guido Witmond wrote:
On 01/26/14 10:20, Tomer Altman wrote:
To Liberation Tech:
Stanford is implementing a new security policy detailed here:
http://ucomm.stanford.edu/computersecurity/
I am personally very concerned about steps #2 and #3. BigFix is
basically a back
On 01/29/2014 04:50 PM, Guido Witmond wrote:
On 01/29/14 19:57, Jonathan Wilkes wrote:
On 01/26/2014 08:12 AM, Guido Witmond wrote:
BigFix: the missing package manager for Windows. What every self
respecting unix/linux/bsd/etc system already has. Good.
How is a centralized service
On 01/20/2014 02:29 PM, Kate Krauss wrote:
Hi,
I think the idea is that there is a subset of activists and
journalists who are very motivated to encrypt who can't. Glen
Greenwald comes to mind. I come to mind, and a bunch of my activist
friends from countries under pressure. I don't see much
...@gmail.com'); escribió:
On Mon, Jan 20, 2014 at 7:06 PM, Jonathan Wilkes
jancs...@yahoo.com wrote:
GET
Hi list,
I'm thinking about setting up a slightly modified version of nweb
as a Tor hidden service:
http://www.ibm.com/developerworks/systems/library/es-nweb/index.html?ca=dat
This is for fun, mostly just to learn some more about Tor hidden
services and webservers. But it's got me
static content.
-Jonathan
2014/1/20 Jonathan Wilkes jancs...@yahoo.com mailto:jancs...@yahoo.com
Hi list,
I'm thinking about setting up a slightly modified version of
nweb as a Tor hidden service:
http://www.ibm.com/developerworks/systems/library/es-nweb/index.html?ca=dat
On 01/10/2014 08:57 AM, carlo von lynX wrote:
On Thu, Jan 09, 2014 at 08:50:34PM +0100, Simon Rothe wrote:
Here is another one: Twitter based on Bitmessage: https://bitchirp.org/
Found this via Slashdot:
twister is the fully decentralized P2P microblogging platform
leveraging from the free
On 11/06/2013 04:21 PM, Matt Johnson wrote:
Sorry Eugen, I am still not getting it. You will author content in
isolation, without reference to any information at all? Or perhaps in
a library with books on paper? When I author something I constantly
refer to other material.
You know most
Hi Jacob,
Can you talk more about how the user would run arkOS services as
Tor hidden services?
Can the user run the services they want _only_ as hidden services (i.e.,
not accessible through normal web)?
Will the user need to do any extra configuration to enable this option,
or will
On 11/04/2013 05:28 AM, phree...@yandex.ru wrote:
On Sunday, November 03, 2013 04:06:11 PM Bill Woodcock wrote:
On Nov 3, 2013, at 3:30, phree...@yandex.ru phree...@yandex.ru wrote:
I don't see how pasting over a QR code in a way that's not easily
detectable is somehow harder than pasting over
On 10/18/2013 07:23 PM, Alfredo Lopez wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Besides being wrong, this is truly offensive. Rise-Up is a remarkable
collective with outstanding service and enormous commitment to
principle.
Then I'd strongly suggest rethinking the four bullet
On 10/15/2013 06:47 PM, elijah wrote:
On 10/15/2013 03:07 PM, Yosem Companys wrote:
If you have any thoughts about Riseup, whether
security/privacy-related or otherwise, I'd love to hear them.
I think I am the only person from the Riseup collective who is
subscribed to liberationtech, so I
On 10/18/2013 04:57 PM, groente wrote:
On Fri, Oct 18, 2013 at 11:20:58PM +0300, Maxim Kammerer wrote:
snip
Second, the unusual stress of ideology in such a service is very
relevant to product's security in this case. When I read RiseUp's
social contract page [1] some time ago, I found the mild
On 10/10/2013 03:55 PM, adrelanos wrote:
Thank you for doing this work!
The world needs someone facing the truth, explaining why gpg isn't the
solution, advocating positive change. It's a communicative task, a very
difficult one. As long there is gpg, most geeks don't see need to create
better
On 09/26/2013 12:32 AM, coderman wrote:
On Wed, Sep 25, 2013 at 1:34 PM, Jonathan Wilkes jancs...@yahoo.com wrote:
...
Roger Dingledine has said that his biggest fear is that the
NSA has found a way to break Tor,
citation? ;)
http://www.youtube.com/watch?v=-VUyuFH9CbI
It was a mistake
On 09/24/2013 09:56 AM, Michael Rogers wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 24/09/13 05:21, Jonathan Wilkes wrote:
Is Briar able to hide metadata that describes who is messaging
whom within the network from an attacker with a splitter on the
internet and a $50+ billion
On 09/23/2013 11:20 AM, Michael Rogers wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 22/09/13 20:51, Jonathan Wilkes wrote:
[...]
Otherwise you create a social network that looks like it has
checks and balances built-in, but, e.g, no one really understands
_why_ sharing beyond
On 09/17/2013 04:46 PM, Michael Rogers wrote:
[...]
Please push me back on the right track if I have a blind spot
here-- I'm having a difficult time seeing a technical difference
between a social network that allows partial views of the graph in
order to maintain a semblance of privacy, and a
On 09/15/2013 04:22 AM, Brian Conley wrote:
On Sep 15, 2013 2:22 AM, coderman coder...@gmail.com
mailto:coder...@gmail.com wrote:
On Sat, Sep 14, 2013 at 8:12 AM, Lee Azzarello
l...@guardianproject.info mailto:l...@guardianproject.info wrote:
We have a federated telephony system...
On 09/15/2013 02:32 PM, Michael Rogers wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 15/09/13 16:49, Jonathan Wilkes wrote:
I'm not completely sure, but I don't think that is possible.
For example: regardless of privacy implications, discoverability on
Facebook is a feature
On 09/14/2013 06:03 AM, Fabio Pietrosanti (naif) wrote:
Hi all,
i would like to notice that in those internet freedom space there's
a missing component in the communication security landscape, that's
the ability to interoperate between Web and Mobile for
communication security technologies.
On 09/12/2013 04:00 PM, Case Black wrote:
Although not an unalloyed fan of Ms. Rand, her words of 50 years ago
do seem relevant to our current situation ---
Instead of being a protector of man’s rights, the government is
becoming their most dangerous violator.
Instead of protecting men from
On 09/07/2013 02:46 PM, Eugen Leitl wrote:
On Sat, Sep 07, 2013 at 12:26:22PM -0400, Jonathan Wilkes wrote:
Hi Eugen,
When Bruce Schneier made the call for people to come forward
and describe being asked to degrade standards or build backdoors
I don't think this is what he meant.
Bruce
On 09/09/2013 03:40 PM, Case Black wrote:
There's a more subtle variant to this idea...
Regularly state (put up a sign) that you HAVE in fact received an
NSL...with the public understanding that it must be a lie (there's no
law against falsely making such a claim...yet!).
When actually
On 09/09/2013 12:50 PM, Al Billings wrote:
Have fun tilting that windmill, Mr. Quixote.
Like it or not, to fully use websites at this point, you generally
need things like Javascript and CSS. The reason that most folks, even
security folks like the ones I work with, don't run with NoScript on
Hi Eugen,
When Bruce Schneier made the call for people to come forward
and describe being asked to degrade standards or build backdoors
I don't think this is what he meant.
Mr. Gilmore seems perfectly happy to give us enough details to
be able to find the identity of a suspicious Kernel
On 09/06/2013 12:26 PM, Maxim Kammerer wrote:
On Sat, Aug 31, 2013 at 2:08 AM, Jonathan Wilkes jancs...@yahoo.com wrote:
For example, if it turns out that Bitcoin has a backdoor in it, a
lot of people (some on this list) would take a big reputation hit.
That's most certainly not what would
On 08/30/2013 01:51 PM, Michael Hicks wrote:
Thank you so much we appreciate your opinion and facts. would you have
any recommendations? something we could fix? the whle purpose of this
software is to give the American people privacy and not have to worry
about the NSA's spying.
The American
Hello,
I want to download and play with Liberté Linux, but I have a few
questions that are of a general enough nature to be of interest for this
list. At least that's my hope.
My Abilities: can use GPG cli commands, can install junk I download to a
thumbdrive, use free software (almost)
Is there such a thing yet? I can see a lot of cases where, my lawyer
has the
other half of this amulet, would come in handy.
-Jonathan
--
Liberationtech is a public list whose archives are searchable on Google.
Violations of list guidelines will get you moderated:
On 08/07/2013 03:26 AM, Bill Woodcock wrote:
On Aug 7, 2013, at 12:05 AM, Roger Dingledine a...@mit.edu wrote:
Consider two scenarios. In scenario one, NSA doesn't run any Tor
relays, but they have done deals with ATT and other networks to be
able to passively monitor those networks --
On 07/26/2013 06:18 PM, Steve Weis wrote:
DRM technologies have a flip side as privacy-preserving technology.
What is the technology that lets me make my data searchable but
not copyable? What is the technology that lets Google share my
data with a few third parties which I approve but no
1 - 100 of 136 matches
Mail list logo