-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/21/2013 07:18 PM, Eleanor Saitta wrote:
...and for any kind of business-related organizational work, much
of the time, wherein you do get plenty of actual high-value
information.
Engineering discussions are often had over e-mail, not just
That and get everyone to salt every message with a random assortment of words
and phrases from flag lists
On Jun 21, 2013, at 11:55 AM, Nadim Kobeissi na...@nadim.cc wrote:
The solution to this is to make encryption more and more widely used. By
increasing the number of people with access
Hi,
On Fri, 21 Jun 2013 18:51:01 +0200
phryk ph...@phryk.net wrote:
On Fri, 21 Jun 2013 11:55:57 -0400
Nadim Kobeissi na...@nadim.cc wrote:
The solution to this is to make encryption more and more widely used.
By increasing the number of people with access to encryption
technology for
a few people who came to our university cryptoparty asked whether they're
just going to draw attention to themselves by encrypting email.
the latest leaks seems to give a firm 'yes', as the NSA specifically keeps
encrypted comms indefinitely.
sample news item:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
It's unfortunate that Ars Technica has chosen that angle, since I
believe it misrepresents the situation: if you use encryption, the NSA
may indeed retain your encrypted traffic, but won't be able to read
it. If you don't use encryption, the NSA will
The solution to this is to make encryption more and more widely used. By
increasing the number of people with access to encryption technology for their
communications, we dilute this threat.
NK
On 2013-06-21, at 11:52 AM, Michael Rogers mich...@briarproject.org wrote:
Signed PGP part
It's
On Fri, 21 Jun 2013 11:55:57 -0400
Nadim Kobeissi na...@nadim.cc wrote:
The solution to this is to make encryption more and more widely used.
By increasing the number of people with access to encryption
technology for their communications, we dilute this threat.
My thought exactly, just
On Fri Jun 21 12:51:11 2013, phryk wrote:
On Fri, 21 Jun 2013 11:55:57 -0400
Nadim Kobeissi na...@nadim.cc wrote:
The solution to this is to make encryption more and more widely used.
By increasing the number of people with access to encryption
technology for their communications, we
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/21/2013 11:41 AM, dan mcquillan wrote:
how would list members answer the question 'to encrypt or not to
encrypt'?
Assumption: Your traffic is being recorded.
Assumption: You can't transmit anything without leaking at least one
bit (You're
On Fri, Jun 21, 2013 at 06:51:11PM +0200, phryk wrote:
On Fri, 21 Jun 2013 11:55:57 -0400
Nadim Kobeissi na...@nadim.cc wrote:
The solution to this is to make encryption more and more widely used.
By increasing the number of people with access to encryption
technology for their
From: dan mcquillan d...@internetartizans.co.uk
To: Liberation Technologies liberationtech@lists.stanford.edu
Sent: Friday, June 21, 2013 11:41 AM
Subject: [liberationtech] to encrypt or not to encrypt?
a few people who came to our university cryptoparty
On Fri, 21 Jun 2013 11:55:57 -0400
Nadim Kobeissi na...@nadim.cc wrote:
The solution to this is to make encryption more and more widely used.
By increasing the number of people with access to encryption
technology for their communications, we dilute this threat.
My thought exactly, just
On 06/21/2013 10:00 AM, Eugen Leitl wrote:
On Fri, Jun 21, 2013 at 06:51:11PM +0200, phryk wrote:
On Fri, 21 Jun 2013 11:55:57 -0400
Nadim Kobeissi na...@nadim.cc wrote:
The solution to this is to make encryption more and more widely used.
By increasing the number of people with access to
dan mcquillan d...@internetartizans.co.uk wrote:
a few people who came to our university cryptoparty asked whether they're
just going to draw attention to themselves by encrypting email.
the latest leaks seems to give a firm 'yes', as the NSA specifically keeps
encrypted comms indefinitely.
On 06/21/2013 09:57 AM, Joseph Lorenzo Hall wrote:
What about the theory that by encrypting all the things we are feeding
some massively large NSA cryptanalysis project that uses different
flavors of ciphertext to find weaknesses? Very conspiracy theorist-y,
but I've heard a few people
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 21/06/13 17:57, Joseph Lorenzo Hall wrote:
What about the theory that by encrypting all the things we are
feeding some massively large NSA cryptanalysis project that uses
different flavors of ciphertext to find weaknesses? Very conspiracy
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Fri Jun 21 14:54:29 2013, Michael Rogers wrote:
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1
On 21/06/13 17:57, Joseph Lorenzo Hall wrote:
What about the theory that by encrypting all the things we are
feeding some massively large NSA
On Fri, 21 Jun 2013 10:28:51 -0700
Martin Uecker uec...@eecs.berkeley.edu wrote:
- email is used a lot (also for important stuff)
As far as I can tell, non-techy persons mostly use their email accounts
for registering at various websites, online-shopping and that sort of
thing, not active
18 matches
Mail list logo