Hi libtech!
The PETS conference is where all of the academic privacy / anonymity
experts gather each year:
https://petsymposium.org/
This year it's in Minneapolis, July 18-21. Please consider joining us --
and if you do, be sure to stay for the hike on July 22, which is where
many interactions
On Fri, Jan 20, 2017 at 07:01:03AM -0800, Yosem Companys wrote:
> We are pleased to accounce that Tor Browser 6.5 is ready for testing.
> Bundles can be found on:
Hi Yosem, Libtech people,
This is a testing release, not a release.
If people here want to help with testing, I encourage you to
On Tue, Oct 22, 2013 at 11:44:46PM -0700, Adam Fisk wrote:
We do, however, strongly believe in the potential of WebRTC to provide both
interesting cover traffic as well as usability improvements that come as a
result of reusing technology already built into the browser.
I agree! I think the
On Mon, Oct 21, 2013 at 10:25:48AM -0700, Yosem Companys wrote:
The most ambitious product launch is uProxy, a new Web browser
extension that uses peer-to-peer technology to let people around the
world provide each other with a trusted Internet connection.
It's a shame that designs like this
On Fri, Oct 04, 2013 at 02:05:23PM -0700, d.nix wrote:
Just published by Bart Gellman (Thanks Bart!):
http://apps.washingtonpost.com/g/page/world/nsa-research-report-on-the-tor-encryption-program/501/
And when you're done reading it, read the better, newer version of their
mjolnir attack:
On Wed, Sep 25, 2013 at 09:32:46PM -0700, coderman wrote:
On Wed, Sep 25, 2013 at 1:34 PM, Jonathan Wilkes jancs...@yahoo.com wrote:
...
Roger Dingledine has said that his biggest fear is that the
NSA has found a way to break Tor,
citation? ;)
You left out the rest of his sentence
On Tue, Aug 06, 2013 at 10:43:39PM -0500, Kyle Maxwell wrote:
The key, obviously, is the primary assertion that the NSA runs lots
of Tor nodes. I've seen this assertion before, and while it's
certainly a reasonable assumption, I don't know if anybody outside the
NSA actually has hard evidence
On Wed, Aug 07, 2013 at 07:20:21AM +0300, Nadim Kobeissi wrote:
You will note that this was posted recently. However, 5 weeks ago,
Mozilla posted a security advisory for Firefox and fixed the issue. Tor
then updated the Tor Browser Bundle with the fix, 5 weeks ago, *without
releasing a security
On Mon, Aug 05, 2013 at 10:46:35AM +0200, Georg Koppen wrote:
On 05.08.2013 10:15, Nadim Kobeissi wrote:
Now, we find out that the FBI has been sitting on an exploit since an
unknown amount of time that can compromise the Tor Browser Bundle
is that really so? See:
On Mon, Aug 05, 2013 at 04:54:00AM -0400, Roger Dingledine wrote:
Specifically, it would appear that the TBB updates we put out on
June 26 addressed this vulnerability:
https://lists.torproject.org/pipermail/tor-announce/2013-August/89.html
has some more details now.
Or see
https
On Tue, Feb 26, 2013 at 04:01:03PM -0800, Eva Galperin wrote:
I'm not sure that I would support ranking drug cartels as a less
technologically sophisticated threat than the government in Mexico.
When we did a Tor talk for the US DEA in January, one of the use cases
we explained for Tor was law
On Tue, Nov 06, 2012 at 02:28:36PM -0500, Nadim Kobeissi wrote:
I believe that releasing closed-source, unreviewed and centralized crypto
software and then marketing it as secure to be malpractice. That is simply
my point.
I stopped looking at SilentCircle when I was looking through their
FAQ:
12 matches
Mail list logo