On Mon, Jun 10, 2013 at 10:27:33PM +0200, Guido Witmond wrote:
The big deal is that now it's become impossible to believe the lies, and
that you [Americans] are forced to accept the truth.
Reality check: https://twitter.com/_nothingtohide
Sad but I guess true, but there has been a huge amount of learning from this
particularly internationally and the reverberations on that will continue
and perhaps even grow for a very very long time.
M
-Original Message-
From: liberationtech-boun...@lists.stanford.edu
- Forwarded message from Scott Weeks sur...@mauigateway.com -
Date: Mon, 10 Jun 2013 16:36:32 -0700
From: Scott Weeks sur...@mauigateway.com
To: na...@nanog.org
Subject: RE: PRISM: NSA/FBI Internet data mining project
Reply-To: sur...@mauigateway.com
Funny, sort of. The guy was
Hi all,
this email just to notice that at OHM2013 Hacker's Camp
http://ohm2013.org there will be several talks on Whistleblowing.
It's very interesting to note how Whistleblowing has become an hot-topic
for hackers and digital hacktivism! :-)
We may need to organize a meeting other than
On Mon, Jun 10, 2013 at 01:48:23PM -0700, x z wrote:
@Rich, those are good movie scripts :-). But it does not work for 9 firms,
and hundreds of execs all with diverse values and objectives.
Two responses.
hundreds? Not necessary. Not desirable, from the NSA's point of view,
either. One
On Tue, 11 Jun 2013 13:21:49 +0200
Fabio Pietrosanti (naif) li...@infosecurity.ch wrote:
We may need to organize a meeting other than those lectures to
discuss among all various players and people interested on the topic.
Maybe the Free Village[1] could accommodate a meeting like that, it
http://www.theatlanticwire.com/national/2013/06/where-is-edward-snowden/66072/
I'm reminded of this exchange, which I presume everyone on this
list is familiar with:
I'd like to go back to New York.
You have not much future there. It will happen this way: you
Hey Fabio and others,
Our village Noisy Square (formely known as the Free Village or TA Pown OHM) is
open for these kind of meetings. Parts of the village can be opened or closed
to cater towards the privacy needs of participants in such meetings. Contact me
for details.
Anyone else
On 11-06-13 12:21, Eugen Leitl wrote:
On Mon, Jun 10, 2013 at 10:27:33PM +0200, Guido Witmond wrote:
The big deal is that now it's become impossible to believe the lies, and
that you [Americans] are forced to accept the truth.
Reality check: https://twitter.com/_nothingtohide
- Forwarded message from Jim Small jim.sm...@cdw.com -
Date: Tue, 11 Jun 2013 01:02:54 +
From: Jim Small jim.sm...@cdw.com
To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com
Subject: Re: [ipv6hackers] opportunistic encryption in IPv6
Reply-To: IPv6 Hackers Mailing List
- Forwarded message from Mark Smith markzzzsm...@yahoo.com.au -
Date: Mon, 10 Jun 2013 21:10:06 -0700 (PDT)
From: Mark Smith markzzzsm...@yahoo.com.au
To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com
Subject: Re: [ipv6hackers] opportunistic encryption in IPv6
X-Mailer:
This thread is ending, so I will limit further distribution, explicitly
removing libtech.
- Forwarded message from Jim Small jim.sm...@cdw.com -
Date: Tue, 11 Jun 2013 04:27:33 +
From: Jim Small jim.sm...@cdw.com
To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com
On 2013-06-10, at 8:21 PM, Catherine Roy ecr...@catherine-roy.net wrote:
On 10/06/2013 6:18 PM, Nadim Kobeissi wrote:
Catherine,
Opera is not shut out. It's simply difficult to develop for Opera due to
its limited browser extension API. Your email made it sound as if Cryptocat
had
On 2013-06-11, at 7:31 AM, Eugen Leitl eu...@leitl.org wrote:
On Mon, Jun 10, 2013 at 08:21:40PM -0400, Catherine Roy wrote:
On 10/06/2013 7:37 PM, Travis McCrea wrote:
Opera is being released now on Webkit, though I am sure you will still have
legacy opera users... I think you could put
On Jun 11, 2013, at 4:07 PM, Nadim Kobeissi na...@nadim.cc wrote:
On 2013-06-10, at 8:21 PM, Catherine Roy ecr...@catherine-roy.net wrote:
On 10/06/2013 6:18 PM, Nadim Kobeissi wrote:
Catherine,
Opera is not shut out. It's simply difficult to develop for Opera due to
its limited browser
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Anthony,
On 08/06/13 13:36, Anthony Papillion wrote:
1. Location is a particularly thorny issue. Presentations at either
HOPE or BlackHat demonstrated how easy it is to locate a mobile
even if you're not the government with a massive budget and
Catherine, shut out is an active verb indicating intention, which is very
different from not available for which implies the potential to become
available, unlike shut out which ones a decision to not provide support.
That said Nadim, I do find increasing use of opera in areas of low
bandwidth
To be honest, if you are not in a situation that needs cryptocat anyway, and
Nadim doesn't make any money from you using cryptocat... and it means less
hostile bug reports from you... why would he want you to?
No one is forced to use the program, yes, Opera might be used by people we
would
Hi Fabio et al,
My talk is about computer forensics, but many of the examples used are
specific to whistleblowing. I will also be giving at least one short
workshop on document forensics specifically.
Keep an eye out for Do You Want To Know A Secret: A Brief History of
Computer Forensics
From: Michael Rogers mich...@briarproject.org
To: liberationtech liberationtech@lists.stanford.edu
Sent: Tuesday, June 11, 2013 10:45 AM
Subject: Re: [liberationtech] Building a encrypted mobile network
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
Hello all,
I have created a simple anonymity network that broadcasts all messages
to participants so that you cannot associate chatters.
https://bitbucket.org/scassidy/dinet
There is a simple sample client available, but you could write your
own client to build your own features atop the
It would be a fairly simple task to review all of the chat information and
correlate call and response for all of the conversations.
~Griffin
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
Hi. I took a quick look while procrastinating at work and found a few
potential issues:
- What's up with this hard-coded
salthttps://bitbucket.org/scassidy/dinet/src/9f3afe465afb124367e03b63c6b63cba261e4edf/client/broadcast_client.c?at=master#cl-16
?
- Any specific reason you picked
- Forwarded message from Adam Back a...@cypherspace.org -
Date: Tue, 11 Jun 2013 19:28:44 +0200
From: Adam Back a...@cypherspace.org
To: Ethan Heilman eth...@gmail.com
Cc: Crypto discussion list cryptogra...@randombit.net, New Cpunks List
cryptopolit...@randombit.net
Subject: Re:
On Tue, Jun 11, 2013 at 10:10 AM, Griffin Boyce griffinbo...@gmail.com wrote:
It would be a fairly simple task to review all of the chat information and
correlate call and response for all of the conversations.
I disagree for several reasons.
First is that if the load on the network is high
On Tue, Jun 11, 2013 at 10:29 AM, Steve Weis stevew...@gmail.com wrote:
Hi. I took a quick look while procrastinating at work and found a few
potential issues:
Thanks for taking a look. I'll be sure to incorporate your feedback.
- What's up with this hard-coded salt?
Lack of love for the
On 11 June 2013 13:42, Sean Cassidy sean.a.cass...@gmail.com wrote:
On Tue, Jun 11, 2013 at 10:10 AM, Griffin Boyce griffinbo...@gmail.com
wrote:
It would be a fairly simple task to review all of the chat information and
correlate call and response for all of the conversations.
I disagree
Comments inline...
On Tue, Jun 11, 2013 at 10:47 AM, Sean Cassidy sean.a.cass...@gmail.comwrote:
- Any specific reason you picked CTR?
CTR is widely recommended. Cryptography Engineering specifically
recommends it.
The reason I ask is that this makes your IV-generation more critical than,
On Tue, Jun 11, 2013 at 9:52 AM, Sean Cassidy sean.a.cass...@gmail.com wrote:
I have created a simple anonymity network that broadcasts all messages
to participants so that you cannot associate chatters.
https://bitbucket.org/scassidy/dinet
See also: https://bitmessage.org/wiki/Main_Page
(I
On Tue, Jun 11, 2013 at 07:31:59PM +0200, Eugen Leitl wrote:
democracies downfall. The most dangerous aspect is the secerecy - not only
do they want to collect the biggest dossier on everyone ever, they want to
do it in secret, with secret courts, secret legal interpretations, and gag
orders
Sean Cassidy sean.a.cass...@gmail.com wrote:
First is that if the load on the network is high enough, conversations
can hide in the noise. This is helped by dummy message generation
either by clients or servers (preferably clients to protect against
attackers that can monitor every node).
On Tue, Jun 11, 2013 at 11:42 AM, Griffin Boyce griffinbo...@gmail.com wrote:
Sean Cassidy sean.a.cass...@gmail.com wrote:
First is that if the load on the network is high enough, conversations
can hide in the noise. This is helped by dummy message generation
either by clients or servers
On Tue, Jun 11, 2013 at 11:13 AM, Gregory Maxwell gmaxw...@gmail.com wrote:
On Tue, Jun 11, 2013 at 9:52 AM, Sean Cassidy sean.a.cass...@gmail.com
wrote:
I have created a simple anonymity network that broadcasts all messages
to participants so that you cannot associate chatters.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On second thought, disregard this. Prizma is a fairly standard social
media analytics platform. It has none of the features of PRISM that
have come out in the past week.
On 06/08/2013 05:52 PM, Peter Bourgelais wrote:
Hello again libtech,
Steve Weis:
Comments inline...
On Tue, Jun 11, 2013 at 10:47 AM, Sean Cassidy
sean.a.cass...@gmail.comwrote:
- Any specific reason you picked CTR?
CTR is widely recommended. Cryptography Engineering specifically
recommends it.
I was puzzled by this recommendation. CTR has several
Just finished interacting with people from a number
of countries worried about Internet blackouts being
used by their governments to help prevent reporting
of unpleasant truths, such as vote-rigging.
I discussed with them what Telecomics did for Egypt
and other Arab countries and what Commotion
On 11/06/2013 5:54 PM, Andy Isaacson wrote:
The amount of work you're demanding (and yes, your first public post
did come across as, arguably, demanding; and you doubled down when
Nadim pushed back)
I suggest you read my first email again. I did not demand anything. I
asked why Opera was not
I would sincerely like to apologize to the LibTech community for this
incredibly embarrassing episode.
NK
On 2013-06-11, at 6:56 PM, Catherine Roy ecr...@catherine-roy.net wrote:
On 11/06/2013 5:54 PM, Andy Isaacson wrote:
The amount of work you're demanding (and yes, your first public post
This story really solidifies why I believe that we need to make privacy
technologies accessible to journalists, instead of simply focusing on the other
way around.
Glenn Greenwald had to substantially delay his communications with Edward
Snowden due to how inaccessible a lot of privacy and
On Tue, Jun 11, 2013 at 6:56 PM, Kate Krauss ka...@critpath.org wrote:
It's really easy to use these tools if you already know how to do it.
I've been using PGP since 1994, if not earlier. In more recent times
it's become a regular part of my workflow in discussing security
critical bugs. I am a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 2013.06.11 17.44, Richard Brooks wrote:
This lead me to start thinking about the possibility of deploying
something like Fidonet as a tool for getting around Internet
blackouts. Has anyone tried something like that?
Not Fidonet, because the
41 matches
Mail list logo