On 9/10/13 4:01 PM, Hannes Tschofenig wrote:
On 10.09.2013 22:37, Phillip Hallam-Baker wrote:
On Tue, Sep 10, 2013 at 3:30 PM, Hannes Tschofenig
mailto:hannes.tschofe...@gmx.net>> wrote:
Open source is certainly only one market, although important in the
security context when I think
On 9/23/13 10:11 AM, Leif Johansson wrote:
On 09/23/2013 03:17 PM, Scott Brim wrote:
On Sep 23, 2013 2:30 AM, "Leif Johansson" mailto:le...@mnt.se>> wrote:
> Instead of tilting at that windmill, would it be possible to build a
> mechanism for making detection of 3rd party intercept tools and
>
On 3/28/15 12:22 AM, Christian Huitema wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Friday, March 27, 2015 at 10:09 PM, Eliot Lear wrote:
Let me see if I understand this statement correctly: this group is working toward a world
in which we encrypt our communications, and when someo
On 1/30/16 11:51 AM, Dave Crocker wrote:
Given that the NSA has taps on almost all of the internet's major trunk
routes, the PGP records can be incredibly useful. It's a simple matter
to build a script that can identify one PGP user and then track all
their contacts to build a journal of their a
On 10/14/16 12:23 AM, Fernando Gont wrote:
The issue with MAC addresses is that they are constant across networks
when, if anything, they just need to be stable within the same subnet.
Besides, they have semantics (vendor ID) when in fact they need not.
While I understand the concern, this is
ope this is of use,
Robin
Robin Wilton
Technical Outreach Director - Identity and Privacy
On 14 Oct 2016, at 17:07, "Stephen Farrell" wrote:
On 14/10/16 15:55, Paul Kyzivat wrote:
When looking at devices seen on WiFi the vendor ID is often displayed
and used to figure out whic