Re: [liberationtech] Are you using 2-step verification? (Survey)

2015-01-29 Thread Greg Norcie
You migth want to take a look at a study I worked on while interning at
PARC that looked at this issue in detail:

(PDF warning)

A Comparative Usability Study of Two-Factor Authentication
http://www.norcie.com/papers/2fUSEC.pdf
--
Greg Norcie (gnor...@indiana.edu)
PhD Student, Security Informatics
Indiana University

On 1/27/15 9:33 PM, Robert Guerra wrote:
 Are you using 2-step verification? If so, a colleague is conducting a survey 
 for you to complete :-) Details are below...
 
 Thanks in advance!
 
 regards
 
 Robert
 
 --
 Robert Guerra
 Phone: +1 416-893-0377 
 Twitter: twitter.com/netfreedom 
 Email: rgue...@privaterra.org
 PGP Keys : https://keybase.io/rguerra
 
 Are you using 2-step verification? (Survey)
 http://www.securityskeptic.com/2015/01/are-you-using-2-step-verification-survey.html
 
 Passwords play roles in many security incidents. Phishing attacks often seek 
 to collect a target's login information for online banking, corporate or 
 private email, network login, auction or social media sites. In these and 
 other attacks, attackers benefit from how we rely only on a password to 
 access an account or prove our identity.
 
 2-step verification is a more secure form of proving your identity (who you 
 are) than just passwords. In most 2-step verification systems, you register a 
 trusted device with an online banking service, blog, or social media 
 provider: this device is typically your mobile phone. When you log in to that 
 service or social media, you verify your identity by entering both your 
 password and a verification code that's sent to your trusted device (again, 
 most often your mobile phone). By adding this second step, someone who learns 
 your password for your online banking service, etc., can't impersonate your 
 or access your accounts unless he also has your trusted device. 2-step 
 verification is a good defense against stolen passwords. 
 
 The purpose of this post - and the embedded survey - is to learn whether 
 2-step verification is popular, and where people are using it. A secondary 
 purpose is to raise awareness of 2-step-verification so that more people will 
 be encouraged to use it.
 
 Please take a few minutes to answer the six (6) questions. Share the survey 
 with your colleagues, friends and family members, especially those who are 
 not overly technical. The more responses, the better!
 
  Thanks in advance for your help. I hope to share results by 15 February.
 
 
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Liberation Technology Seminar Series- Jan 29- Hassanpour

2015-01-29 Thread Angela Oduor Lungati
Hey Yosem! 

This looks pretty interesting and relevant for some folks within the Ushahidi 
and iHub community. Will this be a webinar or is this a session that will be 
recorded and uploaded online? 

Angela Oduor Lungati
ang...@ushahidi.com mailto:ang...@ushahidi.com
Ushahidi Inc http://ushahidi.com/.



 On Jan 29, 2015, at 4:33 AM, Yosem Companys compa...@stanford.edu wrote:
 
 From: Kathleen Barcos kbar...@stanford.edu mailto:kbar...@stanford.edu
 Will the Revolution be Tweeted?
 
 Information  Communication Technology and Conflict
 
 
 Speaker
 Navid Hassanpour,
 Postdoctoral Research Associate, 
 Niehaus Center for Globalization and Governance (NCGG)
 
 
 Thursday, January 29, 2015
 4:15 PM - 5:30 PM
 School of Education 
 Room 128
 
 FSI Contact
 
 Kathleen Barcos http://cddrl.fsi.stanford.edu/libtech/people/kathleen_barcos
 kbar...@stanford.edu mailto:kbar...@stanford.edu
 Abstract
 Is communication technology conducive to collective violence? Recent studies 
 have provided conflicting answers to the same question. While some see the 
 introduction of cellular communication as a contributing factor to civil 
 conflict in Africa (Pierskalla and Hollenbach APSR 2013), others ascribe an 
 opposite effect to mobile communications in Iraq (Shapiro and Weidmann IO 
 forthcoming). During the talk, I will further explore the logic behind Why 
 the revolution will not be tweeted, and argue that the answer lies in 
 contagion processes of collective action at the periphery, not the 
 hierarchical schemes of central coordination as was argued before. To provide 
 evidence, I will draw on historical accounts of social revolutions, a GIS 
 study of the Syrian Civil War, a convenience survey sample from the 2011 
 Egyptian Revolution, as well as network experiments of collective risk-taking 
 in a controlled setting.
 
 Speaker Bio
 
 Navid Hassanpour http://wws.princeton.edu/faculty-research/faculty/nh6 
 (Ph.D.s in Political Science from Yale'14, and Electrical Engineering from 
 Stanford'06) studies political contestation, in its contentious and electoral 
 forms. Following an inquiry into collective and relational dimensions of 
 contentious politics, currently he is working on a project that examines the 
 history, emergence, and the dynamics of representative democracy outside the 
 Western World. This year he is a Niehaus postdoctoral fellow at Princeton's 
 Woodrow Wilson School of public and International Affairs. His work has 
 appeared in Political Communication as well as IEEE Transactions on 
 Information Theory. His book project, Leading from the Periphery, is under 
 consideration at Cambridge University Press' Structural Analysis in the 
 Social Sciences Series.
 
 
 -- 
 Liberationtech is public  archives are searchable on Google. Violations of 
 list guidelines will get you moderated: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
 change to digest, or change password by emailing moderator at 
 compa...@stanford.edu.

-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] Liberation Technology Seminar Series- Jan 29- Hassanpour

2015-01-29 Thread Yosem Companys
Hi Angela,

Seminar video should be posted online at
http://cddrl.fsi.stanford.edu/libtech/multimedia shortly after the live
event.

Best,
Yosem

On Thu, Jan 29, 2015 at 12:58 AM, Angela Oduor Lungati 
angela.od...@gmail.com wrote:

 Hey Yosem!

 This looks pretty interesting and relevant for some folks within the
 Ushahidi and iHub community. Will this be a webinar or is this a session
 that will be recorded and uploaded online?

 Angela Oduor Lungati
 ang...@ushahidi.com
 Ushahidi Inc http://ushahidi.com.



 On Jan 29, 2015, at 4:33 AM, Yosem Companys compa...@stanford.edu wrote:

 From: Kathleen Barcos kbar...@stanford.edu
 *Will the Revolution be Tweeted? * *Information  Communication
 Technology and Conflict *

 *Speaker*
 *Navid Hassanpour,*
 Postdoctoral Research Associate,
 Niehaus Center for Globalization and Governance (NCGG)


   Thursday, January 29, 2015
 4:15 PM - 5:30 PM

 *S*chool of Education
 Room 128
   FSI Contact
 Kathleen Barcos
 http://cddrl.fsi.stanford.edu/libtech/people/kathleen_barcos

 kbar...@stanford.edu
 *Abstract*

 Is communication technology conducive to collective violence? Recent
 studies have provided conflicting answers to the same question. While some
 see the introduction of cellular communication as a contributing factor to
 civil conflict in Africa (Pierskalla and Hollenbach APSR 2013), others
 ascribe an opposite effect to mobile communications in Iraq (Shapiro and
 Weidmann IO forthcoming). During the talk, I will further explore the logic
 behind Why the revolution will not be tweeted, and argue that the answer
 lies in contagion processes of collective action at the periphery, not the
 hierarchical schemes of central coordination as was argued before. To
 provide evidence, I will draw on historical accounts of social revolutions,
 a GIS study of the Syrian Civil War, a convenience survey sample from the
 2011 Egyptian Revolution, as well as network experiments of collective
 risk-taking in a controlled setting.
 Speaker Bio

 Navid Hassanpour http://wws.princeton.edu/faculty-research/faculty/nh6 
 (Ph.D.s
 in Political Science from Yale'14, and Electrical Engineering from
 Stanford'06) studies political contestation, in its contentious and
 electoral forms. Following an inquiry into collective and relational
 dimensions of contentious politics, currently he is working on a project
 that examines the history, emergence, and the dynamics of representative
 democracy outside the Western World. This year he is a Niehaus postdoctoral
 fellow at Princeton's Woodrow Wilson School of public and International
 Affairs. His work has appeared in Political Communication as well as IEEE
 Transactions on Information Theory. His book project, Leading from the
 Periphery, is under consideration at Cambridge University Press' Structural
 Analysis in the Social Sciences Series.

 --
 Liberationtech is public  archives are searchable on Google. Violations
 of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech.
 Unsubscribe, change to digest, or change password by emailing moderator at
 compa...@stanford.edu.



 --
 Liberationtech is public  archives are searchable on Google. Violations
 of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech.
 Unsubscribe, change to digest, or change password by emailing moderator at
 compa...@stanford.edu.

-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] The Future of Security Journalism

2015-01-29 Thread J.M. Porup
Nathan Andrew Fain:
 Quinn's thought that legislation is required to protect this form of
 data journalism is optimistic. Sufficient solutions would take a very
 long time to formulate and probably not be very workable until
 societies have full internalized the shift into a digital world. 

What will that digital world look like?

It is a commonplace observation that technology disrupts social and
political structures. But what will our societies look like when that
disruption is complete?

Well, what do you call a world in which the average individual cannot
protect themselves, and must resort to protection[0] from a small,
powerful, well-armed group?

Feudalism. (Or racketeering. Same difference.)

As for the law, I have written about this at length[1,2], but all the
law does is codify the new power balance. We see this already in France,
Australia, New Zealand. The All-You-Can-Spy Buffet is also being pushed
hard in the UK and the US.

Bottom line: If we don't wish to be serfs in the new feudal, digital
world, we need to re-disrupt the disruption, and invent new tools that
ensure human liberty and dignity. Activists can fight a rear-guard
action with lawmakers to buy us time to build those tools, but that time
is short, and the New Dark Age is nearly upon us.

Jens


[0] Gee this sure is a nice flower shop. Sure wouldn't want anything to
happen to it. Say, you know what you need? Protection. Me and my pal
Capone, we protect people. For the low, low price of all your civil
liberties, we'll protect you from the knowledge of your own
worthlessness. Put her there, pal!

[1]
https://www.borgyborgyborg.com/2014/12/what-technology-dictates-the-law-transcribes/

[2]
https://www.borgyborgyborg.com/2014/04/the-printing-press-created-journalism-the-internet-will-destroy-it/

-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Liberation Technology Seminar Series- Jan 29- Hassanpour

2015-01-29 Thread Angela Oduor Lungati
Thanks Yosem!

Angela Oduor Lungati


 On Jan 29, 2015, at 2:55 PM, Yosem Companys compa...@stanford.edu wrote:
 
 Hi Angela,
 
 Seminar video should be posted online at 
 http://cddrl.fsi.stanford.edu/libtech/multimedia 
 http://cddrl.fsi.stanford.edu/libtech/multimedia shortly after the live 
 event.
 
 Best,
 Yosem
 
 On Thu, Jan 29, 2015 at 12:58 AM, Angela Oduor Lungati 
 angela.od...@gmail.com mailto:angela.od...@gmail.com wrote:
 Hey Yosem! 
 
 This looks pretty interesting and relevant for some folks within the Ushahidi 
 and iHub community. Will this be a webinar or is this a session that will be 
 recorded and uploaded online? 
 
 Angela Oduor Lungati
 ang...@ushahidi.com mailto:ang...@ushahidi.com
 Ushahidi Inc http://ushahidi.com/.
 
 
 
 On Jan 29, 2015, at 4:33 AM, Yosem Companys compa...@stanford.edu 
 mailto:compa...@stanford.edu wrote:
 
 From: Kathleen Barcos kbar...@stanford.edu mailto:kbar...@stanford.edu
 Will the Revolution be Tweeted?
 
 Information  Communication Technology and Conflict
 
 
 Speaker
 Navid Hassanpour,
 Postdoctoral Research Associate, 
 Niehaus Center for Globalization and Governance (NCGG)
 
 
 Thursday, January 29, 2015
 4:15 PM - 5:30 PM
 School of Education 
 Room 128
 
 FSI Contact
 
 Kathleen Barcos 
 http://cddrl.fsi.stanford.edu/libtech/people/kathleen_barcos
 kbar...@stanford.edu mailto:kbar...@stanford.edu
 Abstract
 Is communication technology conducive to collective violence? Recent studies 
 have provided conflicting answers to the same question. While some see the 
 introduction of cellular communication as a contributing factor to civil 
 conflict in Africa (Pierskalla and Hollenbach APSR 2013), others ascribe an 
 opposite effect to mobile communications in Iraq (Shapiro and Weidmann IO 
 forthcoming). During the talk, I will further explore the logic behind Why 
 the revolution will not be tweeted, and argue that the answer lies in 
 contagion processes of collective action at the periphery, not the 
 hierarchical schemes of central coordination as was argued before. To 
 provide evidence, I will draw on historical accounts of social revolutions, 
 a GIS study of the Syrian Civil War, a convenience survey sample from the 
 2011 Egyptian Revolution, as well as network experiments of collective 
 risk-taking in a controlled setting.
 
 Speaker Bio
 
 Navid Hassanpour http://wws.princeton.edu/faculty-research/faculty/nh6 
 (Ph.D.s in Political Science from Yale'14, and Electrical Engineering from 
 Stanford'06) studies political contestation, in its contentious and 
 electoral forms. Following an inquiry into collective and relational 
 dimensions of contentious politics, currently he is working on a project 
 that examines the history, emergence, and the dynamics of representative 
 democracy outside the Western World. This year he is a Niehaus postdoctoral 
 fellow at Princeton's Woodrow Wilson School of public and International 
 Affairs. His work has appeared in Political Communication as well as IEEE 
 Transactions on Information Theory. His book project, Leading from the 
 Periphery, is under consideration at Cambridge University Press' Structural 
 Analysis in the Social Sciences Series.
 
 
 -- 
 Liberationtech is public  archives are searchable on Google. Violations of 
 list guidelines will get you moderated: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
 change to digest, or change password by emailing moderator at 
 compa...@stanford.edu mailto:compa...@stanford.edu.
 
 
 --
 Liberationtech is public  archives are searchable on Google. Violations of 
 list guidelines will get you moderated: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
 change to digest, or change password by emailing moderator at 
 compa...@stanford.edu mailto:compa...@stanford.edu.
 
 -- 
 Liberationtech is public  archives are searchable on Google. Violations of 
 list guidelines will get you moderated: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
 change to digest, or change password by emailing moderator at 
 compa...@stanford.edu.

-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] The Future of Security Journalism

2015-01-29 Thread Nathan Andrew Fain
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Jen's thank you for the update concerning that law. I suspected my
knowledge on it was stale.

On 28/01/2015 14:51, Jens Kubieziel wrote:
 * Nathan Andrew Fain schrieb am 2015-01-28 um 14:17 Uhr:
 International journalists are not in a better position. The
 legal framework in some ways is worse than in the US.
 Specifically in Germany for information security journalism, it
 is still against the law to distribute (host) any code or tool
 that has an alternate use that could in the end be used for
 something illegal [1]. This is
 
 The german journal iX once distributed a copy of Backtrack and made
 a self-indictment. This was later quashed, because one need to
 have criminal intent for a prosecution. The constitutional court
 also said something similar.
 
 So you can distribute dual-use tools and it is done on a regular
 basis here.
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iEYEARECAAYFAlTKNA0ACgkQveagdEkPM4CGEACffDD/IT7Icchb+vHcweuLRINm
8oMAnR4UMfPK9cmPbiCCX7N20pYLC/O3
=f5n4
-END PGP SIGNATURE-
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


[liberationtech] Gauging Interest in a Test Automation Workshop at CTF in Valencia

2015-01-29 Thread Ox Cart
We're considering organizing a test automation workshop for the
Circumvention Technology Festival in Valencia this coming March.  The idea
behind the workshop would be for implementors to share tools and techniques
to help projects get started with test automation at minimal cost.  We're
looking to gauge whether there's a strong interest in this amongst people
who will be attending CTF.  To that end, if you're planning to attend CTF,
I'd be much obliged if you'd respond to the following questions:


1. Would you attend this workshop?

2. Is your goal to add automated testing to a project that doesn't
currently have it, or to improve the automated testing that you're already
doing?

3. If you don't currently do automated testing, is it because you perceive
it as being too costly, you're not clear of the value, you don't know how
to get started, or something else? If something else, what?

4. What is it that you're most interested in testing, user interface,
back-end logic, or something else? If something else, what?

5. Are you interested in learning general techniques for designing
automated tests, specific tools and technologies for testing, or both?

6. If you're already comfortable with your project's test automation, would
you be interested in attending the workshop to share what you know?

Cheers,
Ox

-

I love people who harness themselves, an ox to a heavy cart,
who pull like water buffalo, with massive patience,
who strain in the mud and the muck to move things forward,
who do what has to be done, again and again.

- Marge Piercy
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.