Re: [liberationtech] Are you using 2-step verification? (Survey)
You migth want to take a look at a study I worked on while interning at PARC that looked at this issue in detail: (PDF warning) A Comparative Usability Study of Two-Factor Authentication http://www.norcie.com/papers/2fUSEC.pdf -- Greg Norcie (gnor...@indiana.edu) PhD Student, Security Informatics Indiana University On 1/27/15 9:33 PM, Robert Guerra wrote: Are you using 2-step verification? If so, a colleague is conducting a survey for you to complete :-) Details are below... Thanks in advance! regards Robert -- Robert Guerra Phone: +1 416-893-0377 Twitter: twitter.com/netfreedom Email: rgue...@privaterra.org PGP Keys : https://keybase.io/rguerra Are you using 2-step verification? (Survey) http://www.securityskeptic.com/2015/01/are-you-using-2-step-verification-survey.html Passwords play roles in many security incidents. Phishing attacks often seek to collect a target's login information for online banking, corporate or private email, network login, auction or social media sites. In these and other attacks, attackers benefit from how we rely only on a password to access an account or prove our identity. 2-step verification is a more secure form of proving your identity (who you are) than just passwords. In most 2-step verification systems, you register a trusted device with an online banking service, blog, or social media provider: this device is typically your mobile phone. When you log in to that service or social media, you verify your identity by entering both your password and a verification code that's sent to your trusted device (again, most often your mobile phone). By adding this second step, someone who learns your password for your online banking service, etc., can't impersonate your or access your accounts unless he also has your trusted device. 2-step verification is a good defense against stolen passwords. The purpose of this post - and the embedded survey - is to learn whether 2-step verification is popular, and where people are using it. A secondary purpose is to raise awareness of 2-step-verification so that more people will be encouraged to use it. Please take a few minutes to answer the six (6) questions. Share the survey with your colleagues, friends and family members, especially those who are not overly technical. The more responses, the better! Thanks in advance for your help. I hope to share results by 15 February. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] Liberation Technology Seminar Series- Jan 29- Hassanpour
Hey Yosem! This looks pretty interesting and relevant for some folks within the Ushahidi and iHub community. Will this be a webinar or is this a session that will be recorded and uploaded online? Angela Oduor Lungati ang...@ushahidi.com mailto:ang...@ushahidi.com Ushahidi Inc http://ushahidi.com/. On Jan 29, 2015, at 4:33 AM, Yosem Companys compa...@stanford.edu wrote: From: Kathleen Barcos kbar...@stanford.edu mailto:kbar...@stanford.edu Will the Revolution be Tweeted? Information Communication Technology and Conflict Speaker Navid Hassanpour, Postdoctoral Research Associate, Niehaus Center for Globalization and Governance (NCGG) Thursday, January 29, 2015 4:15 PM - 5:30 PM School of Education Room 128 FSI Contact Kathleen Barcos http://cddrl.fsi.stanford.edu/libtech/people/kathleen_barcos kbar...@stanford.edu mailto:kbar...@stanford.edu Abstract Is communication technology conducive to collective violence? Recent studies have provided conflicting answers to the same question. While some see the introduction of cellular communication as a contributing factor to civil conflict in Africa (Pierskalla and Hollenbach APSR 2013), others ascribe an opposite effect to mobile communications in Iraq (Shapiro and Weidmann IO forthcoming). During the talk, I will further explore the logic behind Why the revolution will not be tweeted, and argue that the answer lies in contagion processes of collective action at the periphery, not the hierarchical schemes of central coordination as was argued before. To provide evidence, I will draw on historical accounts of social revolutions, a GIS study of the Syrian Civil War, a convenience survey sample from the 2011 Egyptian Revolution, as well as network experiments of collective risk-taking in a controlled setting. Speaker Bio Navid Hassanpour http://wws.princeton.edu/faculty-research/faculty/nh6 (Ph.D.s in Political Science from Yale'14, and Electrical Engineering from Stanford'06) studies political contestation, in its contentious and electoral forms. Following an inquiry into collective and relational dimensions of contentious politics, currently he is working on a project that examines the history, emergence, and the dynamics of representative democracy outside the Western World. This year he is a Niehaus postdoctoral fellow at Princeton's Woodrow Wilson School of public and International Affairs. His work has appeared in Political Communication as well as IEEE Transactions on Information Theory. His book project, Leading from the Periphery, is under consideration at Cambridge University Press' Structural Analysis in the Social Sciences Series. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] Liberation Technology Seminar Series- Jan 29- Hassanpour
Hi Angela, Seminar video should be posted online at http://cddrl.fsi.stanford.edu/libtech/multimedia shortly after the live event. Best, Yosem On Thu, Jan 29, 2015 at 12:58 AM, Angela Oduor Lungati angela.od...@gmail.com wrote: Hey Yosem! This looks pretty interesting and relevant for some folks within the Ushahidi and iHub community. Will this be a webinar or is this a session that will be recorded and uploaded online? Angela Oduor Lungati ang...@ushahidi.com Ushahidi Inc http://ushahidi.com. On Jan 29, 2015, at 4:33 AM, Yosem Companys compa...@stanford.edu wrote: From: Kathleen Barcos kbar...@stanford.edu *Will the Revolution be Tweeted? * *Information Communication Technology and Conflict * *Speaker* *Navid Hassanpour,* Postdoctoral Research Associate, Niehaus Center for Globalization and Governance (NCGG) Thursday, January 29, 2015 4:15 PM - 5:30 PM *S*chool of Education Room 128 FSI Contact Kathleen Barcos http://cddrl.fsi.stanford.edu/libtech/people/kathleen_barcos kbar...@stanford.edu *Abstract* Is communication technology conducive to collective violence? Recent studies have provided conflicting answers to the same question. While some see the introduction of cellular communication as a contributing factor to civil conflict in Africa (Pierskalla and Hollenbach APSR 2013), others ascribe an opposite effect to mobile communications in Iraq (Shapiro and Weidmann IO forthcoming). During the talk, I will further explore the logic behind Why the revolution will not be tweeted, and argue that the answer lies in contagion processes of collective action at the periphery, not the hierarchical schemes of central coordination as was argued before. To provide evidence, I will draw on historical accounts of social revolutions, a GIS study of the Syrian Civil War, a convenience survey sample from the 2011 Egyptian Revolution, as well as network experiments of collective risk-taking in a controlled setting. Speaker Bio Navid Hassanpour http://wws.princeton.edu/faculty-research/faculty/nh6 (Ph.D.s in Political Science from Yale'14, and Electrical Engineering from Stanford'06) studies political contestation, in its contentious and electoral forms. Following an inquiry into collective and relational dimensions of contentious politics, currently he is working on a project that examines the history, emergence, and the dynamics of representative democracy outside the Western World. This year he is a Niehaus postdoctoral fellow at Princeton's Woodrow Wilson School of public and International Affairs. His work has appeared in Political Communication as well as IEEE Transactions on Information Theory. His book project, Leading from the Periphery, is under consideration at Cambridge University Press' Structural Analysis in the Social Sciences Series. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] The Future of Security Journalism
Nathan Andrew Fain: Quinn's thought that legislation is required to protect this form of data journalism is optimistic. Sufficient solutions would take a very long time to formulate and probably not be very workable until societies have full internalized the shift into a digital world. What will that digital world look like? It is a commonplace observation that technology disrupts social and political structures. But what will our societies look like when that disruption is complete? Well, what do you call a world in which the average individual cannot protect themselves, and must resort to protection[0] from a small, powerful, well-armed group? Feudalism. (Or racketeering. Same difference.) As for the law, I have written about this at length[1,2], but all the law does is codify the new power balance. We see this already in France, Australia, New Zealand. The All-You-Can-Spy Buffet is also being pushed hard in the UK and the US. Bottom line: If we don't wish to be serfs in the new feudal, digital world, we need to re-disrupt the disruption, and invent new tools that ensure human liberty and dignity. Activists can fight a rear-guard action with lawmakers to buy us time to build those tools, but that time is short, and the New Dark Age is nearly upon us. Jens [0] Gee this sure is a nice flower shop. Sure wouldn't want anything to happen to it. Say, you know what you need? Protection. Me and my pal Capone, we protect people. For the low, low price of all your civil liberties, we'll protect you from the knowledge of your own worthlessness. Put her there, pal! [1] https://www.borgyborgyborg.com/2014/12/what-technology-dictates-the-law-transcribes/ [2] https://www.borgyborgyborg.com/2014/04/the-printing-press-created-journalism-the-internet-will-destroy-it/ -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] Liberation Technology Seminar Series- Jan 29- Hassanpour
Thanks Yosem! Angela Oduor Lungati On Jan 29, 2015, at 2:55 PM, Yosem Companys compa...@stanford.edu wrote: Hi Angela, Seminar video should be posted online at http://cddrl.fsi.stanford.edu/libtech/multimedia http://cddrl.fsi.stanford.edu/libtech/multimedia shortly after the live event. Best, Yosem On Thu, Jan 29, 2015 at 12:58 AM, Angela Oduor Lungati angela.od...@gmail.com mailto:angela.od...@gmail.com wrote: Hey Yosem! This looks pretty interesting and relevant for some folks within the Ushahidi and iHub community. Will this be a webinar or is this a session that will be recorded and uploaded online? Angela Oduor Lungati ang...@ushahidi.com mailto:ang...@ushahidi.com Ushahidi Inc http://ushahidi.com/. On Jan 29, 2015, at 4:33 AM, Yosem Companys compa...@stanford.edu mailto:compa...@stanford.edu wrote: From: Kathleen Barcos kbar...@stanford.edu mailto:kbar...@stanford.edu Will the Revolution be Tweeted? Information Communication Technology and Conflict Speaker Navid Hassanpour, Postdoctoral Research Associate, Niehaus Center for Globalization and Governance (NCGG) Thursday, January 29, 2015 4:15 PM - 5:30 PM School of Education Room 128 FSI Contact Kathleen Barcos http://cddrl.fsi.stanford.edu/libtech/people/kathleen_barcos kbar...@stanford.edu mailto:kbar...@stanford.edu Abstract Is communication technology conducive to collective violence? Recent studies have provided conflicting answers to the same question. While some see the introduction of cellular communication as a contributing factor to civil conflict in Africa (Pierskalla and Hollenbach APSR 2013), others ascribe an opposite effect to mobile communications in Iraq (Shapiro and Weidmann IO forthcoming). During the talk, I will further explore the logic behind Why the revolution will not be tweeted, and argue that the answer lies in contagion processes of collective action at the periphery, not the hierarchical schemes of central coordination as was argued before. To provide evidence, I will draw on historical accounts of social revolutions, a GIS study of the Syrian Civil War, a convenience survey sample from the 2011 Egyptian Revolution, as well as network experiments of collective risk-taking in a controlled setting. Speaker Bio Navid Hassanpour http://wws.princeton.edu/faculty-research/faculty/nh6 (Ph.D.s in Political Science from Yale'14, and Electrical Engineering from Stanford'06) studies political contestation, in its contentious and electoral forms. Following an inquiry into collective and relational dimensions of contentious politics, currently he is working on a project that examines the history, emergence, and the dynamics of representative democracy outside the Western World. This year he is a Niehaus postdoctoral fellow at Princeton's Woodrow Wilson School of public and International Affairs. His work has appeared in Political Communication as well as IEEE Transactions on Information Theory. His book project, Leading from the Periphery, is under consideration at Cambridge University Press' Structural Analysis in the Social Sciences Series. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu mailto:compa...@stanford.edu. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu mailto:compa...@stanford.edu. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] The Future of Security Journalism
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Jen's thank you for the update concerning that law. I suspected my knowledge on it was stale. On 28/01/2015 14:51, Jens Kubieziel wrote: * Nathan Andrew Fain schrieb am 2015-01-28 um 14:17 Uhr: International journalists are not in a better position. The legal framework in some ways is worse than in the US. Specifically in Germany for information security journalism, it is still against the law to distribute (host) any code or tool that has an alternate use that could in the end be used for something illegal [1]. This is The german journal iX once distributed a copy of Backtrack and made a self-indictment. This was later quashed, because one need to have criminal intent for a prosecution. The constitutional court also said something similar. So you can distribute dual-use tools and it is done on a regular basis here. -BEGIN PGP SIGNATURE- Version: GnuPG v1 iEYEARECAAYFAlTKNA0ACgkQveagdEkPM4CGEACffDD/IT7Icchb+vHcweuLRINm 8oMAnR4UMfPK9cmPbiCCX7N20pYLC/O3 =f5n4 -END PGP SIGNATURE- -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
[liberationtech] Gauging Interest in a Test Automation Workshop at CTF in Valencia
We're considering organizing a test automation workshop for the Circumvention Technology Festival in Valencia this coming March. The idea behind the workshop would be for implementors to share tools and techniques to help projects get started with test automation at minimal cost. We're looking to gauge whether there's a strong interest in this amongst people who will be attending CTF. To that end, if you're planning to attend CTF, I'd be much obliged if you'd respond to the following questions: 1. Would you attend this workshop? 2. Is your goal to add automated testing to a project that doesn't currently have it, or to improve the automated testing that you're already doing? 3. If you don't currently do automated testing, is it because you perceive it as being too costly, you're not clear of the value, you don't know how to get started, or something else? If something else, what? 4. What is it that you're most interested in testing, user interface, back-end logic, or something else? If something else, what? 5. Are you interested in learning general techniques for designing automated tests, specific tools and technologies for testing, or both? 6. If you're already comfortable with your project's test automation, would you be interested in attending the workshop to share what you know? Cheers, Ox - I love people who harness themselves, an ox to a heavy cart, who pull like water buffalo, with massive patience, who strain in the mud and the muck to move things forward, who do what has to be done, again and again. - Marge Piercy -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.