Re: [liberationtech] Frei PiratenPartei
Thanks, Nicholas! That's the platform I was talking about! ;-) On May 19, 2013 9:59 PM, Nicholas Merrill li...@calyx.com wrote: It isn't that well known yet but there is a pirate party in New York state: http://nypirateparty.org/ -Nick On May 19, 2013, at 5:03 PM, André Rebentisch tabe...@gmail.com wrote: Am 18.05.2013 14:56, schrieb Andrés Leopoldo Pacheco Sanfuentes: 2. Areas of the mesh where the saturation becomes overflow can easily generate candidates for elected office - school board, city council, state legislature, us congress. What would be the actual difference, and I do not mean the process. -- A -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
Re: [liberationtech] New Yorker debut's Aaron Swartz's 'Strongbox.'
On 05/17/2013 06:02 PM, Kevin Poulsen wrote: That's awesome! But you write that the dot-onion can only be reached from mobile Android devices. What about this? I think Mark meant only as in the only way to fly... or perhaps, the only way to reach the service, or any Tor Hidden Service, from Android. Otherwise, I will make sure we review our language to be more accurate. For instance, instead of Orweb, you can also use Firefox with proxy setting activated, or you can root your device, and use any browser. Our goal with tutorial Mark linked to was to keep it simple, and show as short of path possible from zero to activated. I, personally, have had good experience with Mike Tigas' Onion Browser app on an iPad Touch, and have done a brief review of the source code. The only real issues with it are limitations with how iOS apps can interface with the WebKit browser component. For instance, it has not been able to (in the past at least) disable Javascript from executing, or possibly even from GPS location code being called. All in all, the idea of strong anonymity from any mobile device is far off. The best configuration we can recommend for someone trying to submit content to a service like this is to buy a new clean pre-paid smartphone or wifi-only device, for cash if possible, and keep it separate from your existing communications. Android makes this a lot easier than Apple, since you can sideload apps from alternate app distribution mechanisms like F-Droid, and don't need to link the device to an identity or payment method of any sort. Best, Nathan -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
Re: [liberationtech] Microsoft Accesses Skype Chats
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/18/2013 06:43 AM, Rich Kulawiec wrote: First: thanks for the followup/information/analysis. Most helpful. To follow up on what I'd mentioned as possible further things to test, yes it does follow redirects (but sadly does not follow looped redirects), and yes it follows things that the skype client has determined are links (generally anything that starts with www..., not just http...). Interestingly, Firefox, on hitting my redirect-loop, bounced back and forth for a bit before giving up, the MS scan only hit the URLs once. Is this because it's coded to detect loops, or is it only scanning links once per some timeframe? Second: [great walk-through of why this summary below is accurate snipped] Bottom line: either Microsoft is telling the truth, in which case this was a hopelessly inept and ridiculously ineffective malware scanning exercise, or they're lying and just threw this fabricated story against the wall to see if it would stick. My money's on the latter: I think they're evil, not stupid. I agree -- not sure I'd go straight to evil, but I find it too far of a stretch for the current explanation to hold. ---rsk Jon -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQIcBAEBAgAGBQJRmnVNAAoJEKmYlZ/5Jr+LVQEP/3gC7SYXvRfT68Q2xLXqM7SH ESilV8WUgi9dGmcGZqbjTNs20ZIUOGUeejnVCknIxIwYhs8rt7PV2E42g7YK0PAN SI860P+HCkdDH6w2VefsvmA3yjM+baaNz8K/J0kf3ON30VptBmcmDyFDwLQ9M41L mAr/P9quKEzt2RdShCZ59ctdxsQkFgc/Zy8Fmaxgd5IrFzgR2DdtJkU3lSHU+ttn pRQ54LAPZJwKYa3UJMa1fDn4HoQ9SC0+qgYSapwG5JyBwvSjq5bwIGCwN1yg1/BC QiaWnk6EfULHtPibT5iy8sQmiqvldnrYtHHTOCa/gUSTXZiNJVq5/w9VCiuGb1IK AgIAtBRAjl0QDUHgE4r0I7Q6DbfHX6nqQEvCvyOGscyHfHYT6Qfq6gXMgeuYY0eR IUVwJFtwQwnANhfQogc3NQTMFa7vU9whB52rzlvzF9bx2BgI528Eh3cRYyFqgCKg RES+dyoIeJhoaTi9NpcJvmZBEY/vDsndLpabcy21TaXXk0Xv+2uion1rSq3PXXtV tLjojrFqW0lnFbcTWrvCs4Aoxl22ynEFrycQwR+O4RhEk8Ph+ynZhB+Gddx2YSvx 0+VSeg/tAKrd5ep4a85ptkO3XcQSPTDGsu4sZ/qsvkhCBJcVwZuMEzKSjMt/pHEr 7THovA4a+Pf60tYp7GTZ =knHg -END PGP SIGNATURE- -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
[liberationtech] A Mac Attack ...
*Mac malware signed with Apple ID infects activist's laptop * *Backdoor took screenshots, sent them to attackers.* by Dan Goodin - May 17 2013, 1:50pm EDT http://arstechnica.com/security/2013/05/mac-malware-signed-with-apple-id-infects-activists-laptop/ Stealthy Mac OS X spyware that was digitally signed with a valid Apple Developer ID has been detected on the laptop of an Angolan activist attending a human rights conference, researchers said. The backdoor, which is programmed to take screenshots and send them to remote servers under the control of the attackers, was spread using a spear phishing e-mail https://twitter.com/ioerror/status/335161266941353985, according to privacy activist Jacob Appelbaum. Spear phishing is a term for highly targeted e-mails that address the receiver by name and usually appear to come from someone the receiver knows. The e-mails typically discuss topics the two people have talked about before. According to http://www.f-secure.com/weblog/archives/2554.html AV provider F-Secure, the malware was discovered during a workshop showing freedom of speech activists how to secure their devices against government monitoring. [ ] - / * Dr. Robert Mathews, D.Phil. * Distinguished Senior Research Scholar * National Security Affairs U.S Industrial Preparedness * Office of Scientific Inquiry and Applications * University of Hawai'i * Secure Messaging/Voice/Video available/ -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech