In my security course, I have students look at and contrast
the ACM and IEEE codes of ethics.
To be honest the ACM code is long winded, hard to follow, and
(in my opinion) almost impossible to follow.
It does not surprise me that it did not influence the people.
What would surprise me is if they
On 2/3/19 1:26 AM, Paul wrote:
> Is there any evidence, or even anecdotes, suggesting that ethics courses
> (in any form) work to make people act more ethically?
Main issue that I would see is how you measure ethics. Psychology
studies seem to lack reproducibility.
> I can see that
> But I wonder what the pedagogical research literature says about the
> best way to teach ethics? I'm data-driven, so I'd rather see empirical
> evidence guide educational policy or someone conduct a study to assess
> the best course of action.
I doubt that you could come up with an empirical
ABET accreditation requirements include ethics and some type of
contemporary issues awareness. This has to be addressed in the curriculum
in at least one course.
This can be, does not have to be, a separate course. It can be more
effective as part of another course.
To be accredited, the
>> Should it allow antifa? Should it include racists?
>
> If the rules of the discursive process are sufficiently
> well defined, then everyone is inhibited from causing
> damage or bring forward opinions that aren't compatible
> with previous fundamental decisions such as human rights
> etc. To
>
> You can have all the apps and Internet fun you like, but to
> betray democracy must be technically impossible. Such an
> abuse-resistant Internet is possible. Society has to care
> and to regulate.
>
A general concern should be who does the regulation and
to what ends? The UN is
On the other hand, why are they using gmail?
Our university outsourced email to Google. They
software up to date, handle the security, provide
convenient cloud access (I personally dislike
their GUIs), etc. For our university, this decision
probably did make our email traffic more secure
as
With all these discussions too often vote selling
is overlooked. If I can vote from an insecure location,
I can vote in front of someone paying me $100 to
vote as they want.
On 12/07/2016 09:24 AM, Rich Kulawiec wrote:
> On Fri, Dec 02, 2016 at 02:26:49PM -0500, Andres wrote:
>> Rich, the article
A8Z-z_leHLkLSzXQ=SlJXG_BoOkn0cGCftQZKo1Rvd4GzZTG5vHpxYD7xAzo=Zbv2_gyBalZfZ6ij7X-fsvr7x8ZuRLqJ4sGecfebOq4=>
>
> On Mon, Dec 5, 2016 at 8:28 PM, Richard Brooks <r...@g.clemson.edu
> <mailto:r...@g.clemson.edu>> wrote:
>
> Have not seen any discussion here on Gambia, where a surp
Have not seen any discussion here on Gambia, where a surprise
peaceful exchange of power seems to be taking place. The
dictator cut off Internet and phone service during the
election and yet has accepted that he lost the election.
A rare piece of good news.
--
Liberationtech is public & archives
Am doing a prototype tool for avoiding network traffic
analysis. Does anyone have write ups on what national
firewalls are using to filter traffic?
There are the obvious DNS names, IP addresses, port numbers
and keywords in the traffic content.
What other header fields may be inspected?
If
I would agree. Also consider the numerous cases of
intentional network disruptions on the continent during voting
over the past year. It is predictable that this would become
a tool of voter suppression.
Oddly, though, mobile devices have been essential tools
in monitoring voting and mobilizing
Here is their web page:
http://www.africtivistes.org/!/
It is (of course) in French. A very amazing community
of local activists, many with hands-on experience of
social activism putting democratic governments in place
for the first time.
--
Liberationtech is public & archives are searchable
As a recap, about 1 year ago a popular uprising called Balai Citoyen:
https://en.wikipedia.org/wiki/Le_Balai_Citoyen
started by rappers and tech activists in Ouagadougou got
a lot of the population in the street to protest moves
by the President to prolong his 27 years in office.
Ouagadougou is
As if made for each other:
ACM commentary on risks of on-line voting:
http://cacm.acm.org/blogs/blog-cacm/185174-computer-security-and-the-risks-of-online-voting/fulltext
Commercial trade press saying that
Just five years ago, the debate about Internet voting was dominated by
classically,
Goma Web Activism Summit in the city that has become the hub of web
activisim in #DRC twitter.com/arsenebaguma/s…
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech.
for their
security.
4 private media have been burnt and other forced to close!
I myself didn't reach Burundi. I am in Kigali.
Not imprisonment until now.
social media such as Face book, whatsapp, viber are blocked. People use
VPN”
On May 18, 2015 7:19 AM, Richard
We have noticed that Burundi bloggers are off-line. No
doubt related to the President's crack down after the
failed coup.
Does anyone have any news as to whether this silence is
due to:
-Internet blackout?
-Physical threat/imprisonment?
-Fear?
--
Liberationtech is public archives are searchable
Sources in Togo report an Internet blackout. Probably related to
expecting problems after reporting results from the recent election.
Sources in Burundi also expecting a blackout as a result of
ongoing pro-democracy protests.
--
Liberationtech is public archives are searchable on Google.
About 1 hour of audio
For right to be forgotten:
-Eurocrat
-U of Chicago Law Professor
Against:
-Former Google Exec
-Zittrain from Berkmann center, Harvard
Very reasoned and thoughtful discussion of privacy issues:
Actually, you also need to have source code for the compilers
used and the compiler's compilers...
And that ignores the use of hardware trojans.
On 01/15/2015 12:29 PM, carlo von lynX wrote:
On Thu, Jan 15, 2015 at 08:49:31AM -0800, Steve Weis wrote:
Note you said users will never know if e2e
More censorship and surveillance:
http://www.zdnet.com/article/europes-answer-to-terror-attacks-on-free-speech-is-to-double-down-on-internet-censorship/#ftag=RSSbaffb68
sarcasmWe can only defend freedom by killing it.\sarcasm
--
Liberationtech is public archives are searchable on Google.
.
Regards,
--
Eduardo Robles Elvira @edulix skype: edulix2
http://agoravoting.org @agoravoting +34 634 571 634
tel:%2B34%20634%20571%20634
On Thu, Jan 1, 2015 at 5:41 PM, Richard Brooks r...@g.clemson.edu
mailto:r...@g.clemson.edu wrote
Anyone willing to share experiences on setting up
(or using) an Internet to SMS interface...
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change
Does anyone have any info about this hidden service?
I've been using it to set up temporary accounts to
exchange info as a pgp work-around for people having
trouble working with pgp keys. I assume the content
can be read by whoever runs the site, but they won't
know who I am.
If the other side
in Gabon.
On 12/31/2014 05:50 PM, Collin Anderson wrote:
On Wed, Dec 31, 2014 at 1:24 PM, Richard Brooks r...@g.clemson.edu
mailto:r...@g.clemson.edu wrote:
All of these countries have active blogger communities. One
common fear in these countries is a nationwide communications
Any reviews/opinions of this:
https://resistsurveillance.org/
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password
Just looked at this:
https://letsencrypt.org/howitworks/technology/
The EFF's new CA to make things cheap and easy for
installing certs. I like the goal.
What I do not get from the description is how they
really verify that I legitimately own the site. If
I should manage to reroute some traffic
but happy to intermediate.
best, Joe
On 11/19/14, 10:13 AM, Richard Brooks wrote:
Just looked at this:
https://letsencrypt.org/howitworks/technology/
The EFF's new CA to make things cheap and easy for installing
certs. I like the goal.
What I do not get from the description is how
Interesting article on events in Burkina Faso and
social media:
http://www.jeuneafrique.com/Article/ARTJAWEB20141031144747/
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
In a serious publication (Communications of the ACM), researchers
from ETH in Zurich explain that cybersecurity becomes
easier, if only we make everyone accountable by making
the infrastructure indelibly track every packet:
On 09/18/2014 02:15 PM, Richard Brooks wrote:
In a serious publication (Communications of the ACM), researchers
from ETH in Zurich explain that cybersecurity becomes
easier, if only we make everyone accountable by making
the infrastructure indelibly track every packet:
http://cacm.acm.org
List of supporters caught my eye:
https://firstlook.org/theintercept/2014/09/02/obama-12333-surveillance-nsa-rights-groups-letter/
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
Botnet in the mobile (BITM) like Zeus in the mobile (ZITM)
usually gets around 2-step verification by tricking people
to install malware on their Android that intercepts SMS.
Can also be done by tricking the system to SMS another device
(done lately to attack German banks).
On 08/27/2014 11:29
Lack of technical expertise is apparently a plus in the world
of federal cybersecurity:
http://www.washingtonpost.com/blogs/the-switch/wp/2014/08/22/does-the-white-houses-cybersecurity-czar-need-to-be-a-coder-he-says-no/
--
Liberationtech is public archives are searchable on Google. Violations
Gambia -- finds man guilty of broadcasting without a
license, because he used skype:
http://standard.gm/site/news/4297-UDP-pays-Lasana-Jobartehs-court-fine-says-they-will-appeal.html
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you
On 07/17/2014 05:57 PM, Griffin Boyce wrote:
Andy Isaacson wrote:
this is exactly why some who have received these payloads are
sitting on them, rather than disclosing.
Hmmm, that seems pretty antisocial and shortsighted. While the
pool of bugs is large, it is finite. Get bugs fixed and
The Vx Heaven security education website had been taken
down a year or so ago by the Ukrainian authorities for
allegedly encouraging cybercrime. Early this year it
came back up. I don't know where.
Interestingly, this week or last the vxheaven.org site
stopped working and now you get adds from
Registrar:Bizcn.com, Inc. (R1248-LROR)
vxheavens.com http://vxheavens.com appears to be better maintained
and registered for a while.
On Tue, Jul 15, 2014 at 9:04 PM, Richard Brooks r...@g.clemson.edu
mailto:r...@g.clemson.edu wrote:
The Vx Heaven security education website had been taken
Just saw this:
https://protonmail.ch/
purports to be a secure email service. Did not look at it in
detail. Would be curious about critiques.
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
See:
https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget
Sounds like hype to me. Anyone else have an opinion?
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
The problems of Sanna Camara in Gambia:
http://www.internetsansfrontieres.org/Gambie-arrestation-et-inculpation-d-un-correspondant-d-Internet-Sans-Frontieres-une-attaque-intolerable-contre-la_a542.html
We put together a hashtag #FreeSanna on Twitter. The Gambian
government seems to be
See:
http://www.sueddeutsche.de/digital/internet-ueberwachung-nsa-soll-deutschen-tor-nutzer-ausspioniert-haben-1.2029100
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
The author of:
http://standard.gm/site/news/4063-Police-admit-problems-with-human-trafficking.html
Was arrested yesterday. Is currently out on bail. He risks jail time,
at least six months, and at least US$105 000 fine. This is
under Gambia's recent information laws making it criminal to
insult
See:
http://www.internetsansfrontieres.org/Gambie-arrestation-et-inculpation-d-un-correspondant-d-Internet-Sans-Frontieres-une-attaque-intolerable-contre-la_a542.html
He also helped provide more information about Gambia blocking Viber.
Gambia also blocks downloading Tor, but not using Tor.
The President's review of big data and privacy
In January, President Obama spoke about changes in the technology we use
for national security purposes, and what they mean for our privacy broadly.
He launched a 90-day review of big data and privacy: how they affect the
way we live, and the way we
http://www.theguardian.com/technology/2014/mar/19/internet-censorship-emerging-countries-pew
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
This journalist is writing a thesis on Iranian
Censorship at the University of Bologna:
lisaviolaro...@gmail.com
She would appreciate information on the topic from
people actively working on this problem. If you want
to help her, please contact her directly.
--
Liberationtech is public
My understanding is that, in urban environments, it is very difficult to
identify the exact location of wireless signals. There is a pirate
low-power FM station in DC within blocks of the FCC. It has been
broadcasting for years, no one has been able to find it. This is due to
multi-path fading of
The Sueddeutsche Zeitung seems to think his speech
was disrupted as a type of feminist protest
http://sz.de/1.1853271
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
Wer weiss.
On 12/31/2013 09:59 AM, andreas.ba...@nachtpult.de wrote:
Felix von Leitner says that is's not like that, check his blog at
blog.fefe.de :)
-Original Message-
From: Richard Brooks r...@acm.org
Sender: liberationtech-boun...@lists.stanford.edu
Date: Tue, 31 Dec 2013 09:54
Some clarifications on the Wassenaar update:
http://www.lexology.com/library/detail.aspx?g=f642284a-03b0-4767-9c93-30a3407041cc
It seems that it is meant to be narrowly aimed at
snooping tools, and not at counter snooping tools.
On 12/10/2013 03:50 AM, Fabio Pietrosanti (naif) wrote:
This
On 11/12/2013 10:14 AM, Timur Mehrvarz wrote:
On 12.11.2013 15:28, Tamer Bilir wrote:
You need a MAC and IMEI changer not MAC only. In my opinion
Seems to be an IMEI modifier:
http://forum.xda-developers.com/showthread.php?t=1103766
I don't think so. Wifi MAC addresses are not being
I would assume that they see the port, too.
It is also well known that URLs have identifiable
signatures based on the number of items retrieved
and the packet sizes. In most cases, it is easy to
infer the URLs visited. But the encryption should
protect data entered into forms.
So, the sequences
getnameinfo() should provide a list of DNS names associated
with the IP address. So that catlovers.com and terrorism.com
would both be included.
Of course, the machine can have multiple IP and DNS names.
On 10/29/2013 01:49 PM, andrew cooke wrote:
people are saying that the site name is
Since most email is spam, how productive is the NSA dragnet?
http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/15/the-nsas-giant-utah-data-center-will-probably-hold-a-bunch-of-spam/?wpisrc=nl_tech
--
Liberationtech is public archives are searchable on Google. Violations of
list
10 reasons to give up, stop trying, hide in a corner, and die.
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password
Foreign Policy Magazine claims that US Dept of State
trumps the NSA:
http://thecable.foreignpolicy.com/posts/2013/10/04/not_even_the_nsa_can_crack_the_state_departments_online_anonymity_tool
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will
http://www.washingtonpost.com/world/china-broadcasts-confession-of-chinese-american-blogger/2013/09/15/3f2d82da-1e1a-11e3-8459-657e0c72fec8_story.html?wpisrc=nl_cuzheads
--
Liberationtech is public archives are searchable on Google. Violations of
list guidelines will get you moderated:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
For large companies, I wonder how resignations would count in this?
Could an NSL require, say, the lead cryptographer of an org to /not/
resign?
They could easily do the equivalent of an East German Berufsverbot and
make it impossible for them
Follow the money.
--
Liberationtech is a public list whose archives are searchable on Google.
Violations of list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password by emailing moderator at
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
They have two jobs: to monitor foreign communication, and to secure
domestic communication against foreign monitoring.
http://www.nsa.gov/about/mission/
The argument for trusting NSA/NIST crypto standards has historically
been that weak
For the francophones:
http://www.rue89.com/2013/09/04/nouvelles-revelations-lunite-contre-espionnage-wikileaks-245374
--
Liberationtech is a public list whose archives are searchable on Google.
Violations of list guidelines will get you moderated:
Latest articles:
http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?emc=edit_na_20130905_r=0pagewanted=print
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
I find most of this (if not all) silly. They seem shocked that the
NSA does
I have colleagues living in a small country, far, far
away with a history of rigged elections who want to
put in place a system for collecting information
using SMS. The local government keeps shutting
down the systems that they put in place.
I think I understand their needs and wants. SMS is
What do you do if the government is caught illegally spying on citizens?
Change the laws:
http://www.globalpost.com/dispatch/news/afp/130821/new-zealand-passes-law-allowing-domestic-spying?goback=.gde_1836487_member_267577237#!
--
Liberationtech is a public list whose archives are searchable on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I guess this is progress.
In ancient Greece and the Middle Ages, exposing people to
the truth would get you killed.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
Some idle thoughts:
Edward Snowden
Bradley Manning
Julian Assange
Gen. Hayden
Jacob or Nadim
On 08/12/2013 04:32 PM, Francisco Ruiz wrote:
Quick request.
In comments to a recent post, people seemed to agree that publishing a
video of someone reading a hash might be a fairly hard-to-hack way
Nadim,
I think it is good that Bill Gates is working to
solve health issues that have been ignored because
the people involved are mainly poor and dark
complected.
I think freedom of information, though, may be
more important than you think. Take, for example,
The Gambia, one of the poorest
On 08/09/2013 12:25 PM, Kyle Maxwell wrote:
http://www.theguardian.com/technology/2013/aug/09/bill-gates-google-project-loon
===
Bill Gates criticises Google's Project Loon initiative
Former Microsoft chief says low-income countries need more than just
internet access
===
On the one
Got a message from one of my contacts who wants to try
to publish information he finds important. He is from
a country ranked by Freedom House as not free.
I'm a techie and not a reporter. Any idea as to who
might be interested (I could contact)? The general
region is Sub-Saharan Africa.
--
New law in Gambia makes using the Internet to incite
dissatisfaction with the government punishable by
up to 15 years in jail and $100,00 fine:
http://frontpageinternational.wordpress.com/2013/07/28/internet-is-being-used-as-platform-for-nefarious-and-satanic-activities/
Looks like other
:26, Richard Brooks wrote:
New law in Gambia makes using the Internet to incite
dissatisfaction with the government punishable by
up to 15 years in jail and $100,00 fine:
http://frontpageinternational.wordpress.com/2013/07/28/internet-is-being-used-as-platform-for-nefarious-and-satanic
Obviously, these issues have been very thoroughly discussed
by Corey Doctorow and Larry Lessig. DRM has not proved to be
effective at safeguarding intellectual property. It seems
to be most effective as a tool in maintaining limited
monopolies, since it stops other companies from investing
in
/civilwar.html
[2] http://chillingeffects.org/anticircumvention/weather.cgi?WeatherID=534
On Fri, Jul 26, 2013 at 2:22 PM, Richard Brooks r...@acm.org wrote:
Obviously, these issues have been very thoroughly discussed
by Corey Doctorow and Larry Lessig. DRM has not proved to be
effective
For those that know and care, vxheaven is back online.
It happened a week ago.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
https://mailman.stanford.edu/mailman/listinfo/liberationtech
1. The NSA center of excellence program is not really that
important. If you look carefully, they are mainly 2 year
community colleges located near Army bases that give
basic sysadmin training. This is good and necessary, but
don't get fooled into thinking that they are training
the highly skilled
http://arstechnica.com/tech-policy/2013/06/use-of-tor-and-e-mail-crypto-could-increase-chances-that-nsa-keeps-your-data/
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
Nathan,
You've probably explained this before, but what is the difference
between OSTN and RedPhone?
Thanks.
-Richard
On 06/21/2013 10:30 AM, Nathan of Guardian wrote:
On 06/20/2013 10:08 AM, Jacob Appelbaum wrote:
To the Skype promoters, apologists and deniers - I encourage you to
start
You can't defend against this. There is a lot of research
going into detecting hardware trojans. In general, verifying
that either hardware or software is (or is not) malicious
in undecidable. We are even lacking in tools, short of exhaustive
tests, for verifying that either hardware or software
From Guardian QA with Snowden
http://www.guardian.co.uk/world/2013/jun/17/edward-snowden-nsa-files-whistleblower
Is encrypting my email any good at defeating the NSA survelielance? Id
my data protected by standard encryption?
Answer:
Encryption works. Properly implemented strong crypto
Reminds me of a recent comment from someone I was
training:
Government information should be public. Personal
information should be private.
Unfortunately, we have it backwards.
On 06/13/2013 12:10 PM, Kyle Maxwell wrote:
Thanks for this. His comments on Guarding Privacy and Civil
Liberties
Just finished interacting with people from a number
of countries worried about Internet blackouts being
used by their governments to help prevent reporting
of unpleasant truths, such as vote-rigging.
I discussed with them what Telecomics did for Egypt
and other Arab countries and what Commotion
On 06/07/2013 03:23 AM, Seth David Schoen wrote:
The best widely-used tool to defend against traffic analysis is Tor,
but Tor's developers readily concede that it has a lot of important
limitations and that there's no obvious path around many of them.
Two of these important limitations (not
On 06/06/2013 03:45 AM, michael gurstein wrote:
This is probably not a Liberation issue directly but I'm not sure where else
to address it...
Sunday I was flying (Porter Airlines--small short hop Canadian carrier) from
NYC to Ottawa, ON with a plane change in Toronto. When we arrived in
We are unipolar:
We have the best government that money can buy.
Mark Twain
On 05/16/2013 10:33 PM, Andrés Leopoldo Pacheco Sanfuentes wrote:
This whole list, and many others, and we even have at least a martyr
in Aaron Swartz, are for the tenets of the Swedish Pirate Party. So!
What do we
We did some work on power analysis sidechannels. The NSA solution
is to physically isolate anything that does crypto from
anything else. Separate power supplies and Faraday cages are used.
This is effective, but not practical for mobile devices.
Another alternative is to use dual rail
I have a student trying to make a modified
build of the Liberte Linux distribution. If
anyone would have time and be willing to
give her some pointers, please send me an email
and I will forward to her.
Thank you,
-Richard Brooks
--
Too many emails? Unsubscribe, change to digest, or change
Happened to come across this, which I wasn't
aware of:
http://openpgpjs.github.io/
Am curious as to the opinions people might have
about it.
-Richard Brooks
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your
Of
Richard
Brooks
Sent: Monday, April 08, 2013 9:34 AM
To: liberationtech@lists.stanford.edu
mailto:liberationtech@lists.stanford.edu
Subject: Re: [liberationtech] For everyone and their grad students:
Fake,
pay-to-publish journals
So organizations get compromised by well-meaning users who click on a
link in an email or slip up and use an insecure connection, and while
we can ameloriate that to a certain extent with code, we really need
to think more about how to make it easier for users to make the
right choices versus
91 matches
Mail list logo