-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/10/2012 06:10 AM, Julian Oliver wrote:
Seth, your comments about the Quantum Crypto text are excellent
and, on looking more closely, factually correct. I personally don't
think such material has a place in a handbook like this but with
your
Hi list,
Great to be subscribed!
I'm one of the core group that spearheaded the CryptoParty Handbook here in
Berlin and thought I'd share a few words on its reception.
I'd like to emphasise that the point of the book is not as a static reference
guide but a text intended to grow in direct
..on Wed, Oct 10, 2012 at 12:10:10PM +0200, Julian Oliver wrote:
There's a conspicuous lack of OpenVPN clients out there for Smartphones.
Should've read:
There's a conspicuous lack of OpenVPN clients out there for non-rooted
Smartphones making L2TP/IPSec is the next best choice.
Cheers,
--
Hi Julian,
congratulations with the cryptoparty book;
On 10/10/12 12:10, Julian Oliver wrote:
Indeed the unchecked references to PPTP were unfortunate, imported from the
book
Basic Internet Security (Gerber, Hassan, Stein, van Geffen, van Santen, van
der
Velden, den Tex, Schmidt et al).
Hey Sasha,
..on Wed, Oct 10, 2012 at 01:08:22PM +0200, Sacha van Geffen wrote:
congratulations with the cryptoparty book;
On 10/10/12 12:10, Julian Oliver wrote:
Indeed the unchecked references to PPTP were unfortunate, imported from the
book
Basic Internet Security (Gerber,
Hi Julian,
On 10/10/12 13:41, Julian Oliver wrote:
Hey Sasha,
.
The book is a handbook, so it should contain the HOWTOs alongside
introductions
to core concepts, threats, etc. There was a lot missing from Basic Internet
Security that needed to be covered for it to be a guide for
..on Wed, Oct 10, 2012 at 03:08:25PM +0200, Sacha van Geffen wrote:
Hi Julian,
On 10/10/12 13:41, Julian Oliver wrote:
Hey Sasha,
.
The book is a handbook, so it should contain the HOWTOs alongside
introductions
to core concepts, threats, etc. There was a lot missing from
Re: the book edit portal - I do not have control over the platform it is
being edited on. The handbook project was launched by people in Berlin's
CryptoParty, and I was brought on board at a later point.
On 9/10/12 9:30 AM, Jacob Appelbaum wrote:
@samthetechie
Why were you offended?
Did
My biggest concern is with getting insecure suggestion out of the book
asap. Jake, if the entire chapter is worse than useless, please delete it?
x. Asher
On 9/10/12 9:36 AM, Jacob Appelbaum wrote:
The chapter that talked about using PPTP is straight up crazy talk.
Anyone using PPTP is worse
On 9/10/12 9:46 AM, Jacob Appelbaum wrote:
I'm sorry to say it but a lot of the users have been here for a while -
most people that use crypto just don't know they're doing it.
Ironically, if users don't get good advice, they'll just be in the same
spot - thinking they're safe when they're
On Fri, Oct 05, 2012 at 05:43:46AM +0200, Maxim Kammerer wrote:
Did anyone try this with devices that are supposed to be resistant to
file shredding due to wear leveling? I tried the following on two USB
keys, one ~12 years old, another ~6 years old, both formatted as
FAT32:
echo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 7 Oct 2012, at 22:35, Brian Conley wrote:
Greg its called orbot and it runs on Android. Secondly I used to agree with
you, but I'm increasingly coming to the conclusion that user education, not
simplification, is the more important piece of
I still haven't understood the canonical url for editing - can you tell
me where the main book editing page is? I agree with Adam that Github
won't involve the right people but if that is the only interface, I'll
fork the book and send a pull request.
Thanks, please list issues here:
On 9/10/12 10:36 PM, Jacob Appelbaum wrote:
I did not work on the technical aspects of the book. I cannot. I do not
have the right skill set.
This attitude, I think, is a key issue this community and many others
face. You cannot? Or you will not?
I believe that you are totally able to
Bernard Tyers - ei8fdb:
On 8 Oct 2012, at 23:46, Jacob Appelbaum wrote:
Asher Wolf:
The argument everyone is politely avoiding - while pondering the
numerous ways CryptoParty will expose already compromised
individuals - is whether the masses SHOULD use crypto.
I'm not ignoring it
Asher Wolf:
On 9/10/12 10:36 PM, Jacob Appelbaum wrote:
I did not work on the technical aspects of the book. I cannot. I do not
have the right skill set.
This attitude, I think, is a key issue this community and many others
face. You cannot? Or you will not?
I believe that you are
On 12-10-09 10:41 AM, Jacob Appelbaum wrote:
ttscanada:
On 12-10-09 4:23 AM, Bernard Tyers - ei8fdb wrote:
Sending a PGP encrypted e-mail to you mom, should be as easy as
sending an un-encrypted e-mail to your mom. But the education of
why you should be sending an e-mail encrypted should also
Case in point: I received an invitation under the names of five separate
organizations I am affiliated with (none of which are OWS related) to
fill this out. It originally said real name required, was changed to
alias after I objected publicly, but the rest still stands.
On 12-10-09 1:53 PM, Jacob Appelbaum wrote:
Heather Marsh:
Yes, you are outlining two cases where you are communicating with people
you know as a person known to them. I am suggesting we (as in large
scale movements around the world) need to look more closely at data
driven (as opposed to
Greg Norcie:
Any book written by non-experts about something as complicated as crypto
will have imperfections.
But sometimes security researchers become paralyzed with the need for
something to be perfect. You need to look at it from a public health
perspective.
Also - sometimes people
I think this is a great project.
But I do think that a manual is a stopgap measure - it would also be
great if we worked towards making these tools usable enough that they
didn't need a manual.
If we can make an iPod so easy enough for our grandparents to use, we
should be able to do the same
I was actually really offended by @ioerror's comment on twitter. Even if it
was justified technically I think the mature approach is to use his
personal reach and voice online to rally collaborators to help make the
handbook better not declaim it for the sake of it... I nearly tweeted back
with
Sigh.
The handbook is not perfect by any means, but someone using it is
probably better off than if they were simply going in blind.
...and 50 Shades of Grey is better than nothing as far as relationship
manuals go?
Yes, that's flippant, but (eg) someone to whom I am talking has just
Edits to the #CryptoParty handbook can be made here:
https://github.com/cryptoparty/handbook
--
Unsubscribe, change to digest, or change password at:
https://mailman.stanford.edu/mailman/listinfo/liberationtech
On Fri, Oct 05, 2012 at 05:43:46AM +0200, Maxim Kammerer wrote:
Did anyone try this with devices that are supposed to be resistant to
file shredding due to wear leveling? I tried the following on two USB
Wear levelling is a function of newer devices (your old
USB flash sticks are unlikely to
On Fri, Oct 5, 2012 at 8:33 AM, Eugen Leitl eu...@leitl.org wrote:
Wear levelling is a function of newer devices (your old
USB flash sticks are unlikely to have it, but your new
SSD definitely has) and it hides damaged blocks
transparently by using the overprovisioned flash
block pool (its
Good day to you all :)
On 10/05/2012 03:57 AM, Griffin Boyce wrote:
Hey all,
Considering both the complexity of material and the time constraints
involved, the handbook came out beautifully. It's well-laid out and
covers a surprisingly large number of topics step-by-step at a beginner
On Thu, 4 Oct 2012 14:13:13 -0700
Andrew Mallis o...@ideograph.ca wrote:
This 392 page, Creative Commons licensed handbook is designed to help those
with
no prior experience to protect their basic human right to Privacy in
networked, digital domains.
This seems like good stuff, but I have
For what it's worth regarding multiple passes to sanitize data:
http://www.infosecisland.com/blogview/16130-The-Urban-Legend-of-Multipass-Hard-Disk-Overwrite.html
http://cs.harvard.edu/malan/publications/pet06.pdf
On Thu, Oct 4, 2012 at 5:06 PM, Seth David Schoen sch...@eff.org wrote:
I was
If someone wanted to make an edit, what is the best way to note that or
redistribute a derivative work?
Thanks for the hard work!
On Oct 4, 2012 9:27 PM, Asher Wolf asherw...@cryptoparty.org wrote:
As one of the people asked to participate in the writing in the
CryptoParty Handbook, I was
Andrew Mallis o...@ideograph.ca writes:
This 392 page, Creative Commons licensed handbook is designed to help
those with no prior experience to protect their basic human right to
Privacy in networked, digital domains... Most importantly however
this handbook is intended as a reference for
On Fri, Oct 5, 2012 at 2:06 AM, Seth David Schoen sch...@eff.org wrote:
NIST and others have thought about what appropriate cryptographic key lengths
are to respond to the phenomenon of computers getting faster. That's why
current NIST recommendations call for using 2048-bit RSA instead of
32 matches
Mail list logo