Re: [liberationtech] Frei PiratenPartei

2013-05-20 Thread Andrés Leopoldo Pacheco Sanfuentes
Thanks, Nicholas!

That's the platform I was talking about! ;-)
On May 19, 2013 9:59 PM, Nicholas Merrill li...@calyx.com wrote:

 It isn't that well known yet but there is a pirate party in New York
 state:  http://nypirateparty.org/

 -Nick






 On May 19, 2013, at 5:03 PM, André Rebentisch tabe...@gmail.com wrote:

 Am 18.05.2013 14:56, schrieb Andrés Leopoldo Pacheco Sanfuentes:


 2. Areas of the mesh where the saturation becomes overflow can

 easily generate candidates for elected office - school board, city

 council, state legislature, us congress.


 What would be the actual difference, and I do not mean the process.

 -- A
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech


 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] New Yorker debut's Aaron Swartz's 'Strongbox.'

2013-05-20 Thread Nathan of Guardian
On 05/17/2013 06:02 PM, Kevin Poulsen wrote:
 That's awesome! But you write that the dot-onion can only be reached
 from mobile Android devices. What about this?

I think Mark meant only as in the only way to fly... or perhaps, the
only way to reach the service, or any Tor Hidden Service, from Android.
Otherwise, I will make sure we review our language to be more accurate.
For instance, instead of Orweb, you can also use Firefox with proxy
setting activated, or you can root your device, and use any browser. Our
goal with tutorial Mark linked to was to keep it simple, and show as
short of path possible from zero to activated.

I, personally, have had good experience with Mike Tigas' Onion Browser
app on an iPad Touch, and have done a brief review of the source code.
The only real issues with it are limitations with how iOS apps can
interface with the WebKit browser component. For instance, it has not
been able to (in the past at least) disable Javascript from executing,
or possibly even from GPS location code being called.

All in all, the idea of strong anonymity from any mobile device is far
off. The best configuration we can recommend for someone trying to
submit content to a service like this is to buy a new clean pre-paid
smartphone or wifi-only device, for cash if possible, and keep it
separate from your existing communications. Android makes this a lot
easier than Apple, since you can sideload apps from alternate app
distribution mechanisms like F-Droid, and don't need to link the device
to an identity or payment method of any sort.

Best,
 Nathan


--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Microsoft Accesses Skype Chats

2013-05-20 Thread Jon Camfield
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 05/18/2013 06:43 AM, Rich Kulawiec wrote:
 First: thanks for the followup/information/analysis.  Most
 helpful.

To follow up on what I'd mentioned as possible further things to test,
yes it does follow redirects (but sadly does not follow looped
redirects), and yes it follows things that the skype client has
determined are links (generally anything that starts with www..., not
just http...).

Interestingly, Firefox, on hitting my redirect-loop, bounced back and
forth for a bit before giving up, the MS scan only hit the URLs once.
 Is this because it's coded to detect loops, or is it only scanning
links once per some timeframe?

 Second:
[great walk-through of why this summary below is accurate snipped]
 
 Bottom line: either Microsoft is telling the truth, in which case
 this was a hopelessly inept and ridiculously ineffective malware
 scanning exercise, or they're lying and just threw this fabricated
 story against the wall to see if it would stick.  My money's on the
 latter: I think they're evil, not stupid.

I agree -- not sure I'd go straight to evil, but I find it too far
of a stretch for the current explanation to hold.


 ---rsk
 

Jon


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=knHg
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] A Mac Attack ...

2013-05-20 Thread Robert Mathews (OSIA)


*Mac malware signed with Apple ID infects activist's laptop
*
*Backdoor took screenshots, sent them to attackers.*

by Dan Goodin - May 17 2013, 1:50pm EDT
http://arstechnica.com/security/2013/05/mac-malware-signed-with-apple-id-infects-activists-laptop/

Stealthy Mac OS X spyware that was digitally signed with a valid Apple
Developer ID has been detected on the laptop of an Angolan activist
attending a human rights conference, researchers said.

The backdoor, which is programmed to take screenshots and send them to
remote servers under the control of the attackers, was spread using a
spear phishing e-mail
https://twitter.com/ioerror/status/335161266941353985, according to
privacy activist Jacob Appelbaum. Spear phishing is a term for highly
targeted e-mails that address the receiver by name and usually appear to
come from someone the receiver knows. The e-mails typically discuss
topics the two people have talked about before. According to
http://www.f-secure.com/weblog/archives/2554.html AV provider
F-Secure, the malware was discovered during a workshop showing freedom
of speech activists how to secure their devices against government
monitoring.

[  ]


-
/
* Dr. Robert Mathews, D.Phil.
* Distinguished Senior Research Scholar
* National Security Affairs  U.S Industrial Preparedness
* Office of Scientific Inquiry and Applications
* University of Hawai'i
* Secure Messaging/Voice/Video available/

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech