Re: [liberationtech] #YesWeCode Initiative - & Prince
> If that was his attitude, then his attitude sucked. That's interesting. I saw it as an attempt to empower black youth -- changes the dynamic from "it's someone else's fault" to "what can *we* do to fix the problem?" On Fri, 22 Apr 2016 at 18:00 Chrrles Paulwrote: > --- > "I said, 'Well, yeah, Prince that's true but that's because of racism.' > And he said, 'No, it's because we have not produced enough black Mark > Zuckerbergs. That's on us. That's on us. To deal with what we're not doing > to get our young people prepared to be a part of this new information > economy.'" > --- > > If that was his attitude, then his attitude sucked. > > On Sat, Apr 23, 2016 at 9:02 AM, Jayne Cravens < > j...@coyotecommunications.com> wrote: > >> #YesWeCode (http://www.yeswecode.org) is an initiative that seeks to >> mobilize tech and social justice leaders to connect 100,000 low-opportunity >> young adults to the skills and experiences they need to access high-paying >> careers in technology. CNN commentator Van Jones founded the #YesWeCode >> initiative with the support of Prince, who passed away yesterday. >> >> http://www.yeswecode.org/prince >> >> Jones elaborated on Prince's involvement at the 20th Anniversary Essence >> Festival: >> >> "After the Trayvon Martin verdict I was talking to Prince and he said, >> 'You know, every time people see a young black man wearing a hoodie, they >> think, he's a thug. But if they see a young white guy wearing a hoodie they >> think, oh that might be Mark Zuckerberg. That might be a dot-com >> billionaire.'" >> >> "I said, 'Well, yeah, Prince that's true but that's because of racism.' >> And he said, 'No, it's because we have not produced enough black Mark >> Zuckerbergs. That's on us. That's on us. To deal with what we're not doing >> to get our young people prepared to be a part of this new information >> economy.'" >> >> Since July 2014, YesWeCode has been focused on three activities: >> >> Communicate: In partnership with Oakland, Calfornia-based organizations, >> #YesWeCode launched an interactive website with a powerful search tool that >> enables users to find local coding education resources. This tool also >> helps users find local events and learn more about coding opportunities. >> >> Convene: #YesWeCode has convened 100+ coding practitioners and >> stakeholders in New York, San Francisco, Chicago, and New Orleans. >> #YesWeCode partnered with Qeyno Labs to host a Start-Up Weekend hackathon >> in February 2015, focused on uplifting young African-American men and boys. >> >> Catalyze: In July, #YesWeCode launched at the 20th Anniversary ESSENCE >> Festival with a youth-focused hackathon and a headline performance by >> Prince, before a festival audience of 500,000 people. >> >> Just seemed appropriate to post this. >> >> --- >> <><><><><><><><><><><><><><><><> >> Ms. Jayne Cravens MSc >> Portland, Oregon, USA >> >> The web site - http://www.coyotecommunications.com >> The email - j...@coyotecommunications.com >> Me on Twitter, other social networks, & my blog: >> http://www.coyotecommunications.com/me/jayneonline.shtml >> >> Author: The Last Virtual Volunteering Guidebook >> More about the book, and how to buy it >> (as a paperback or as an e-book): >> http://www.energizeinc.com/store/1-222-E-1 >> <><><><><><><><><><><><><><><><> >> >> -- >> Liberationtech is public & archives are searchable on Google. Violations >> of list guidelines will get you moderated: >> https://mailman.stanford.edu/mailman/listinfo/liberationtech. >> Unsubscribe, change to digest, or change password by emailing moderator at >> compa...@stanford.edu. >> > > -- > Liberationtech is public & archives are searchable on Google. Violations > of list guidelines will get you moderated: > https://mailman.stanford.edu/mailman/listinfo/liberationtech. > Unsubscribe, change to digest, or change password by emailing moderator at > compa...@stanford.edu. -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] popcorn-time
Jonathan, see: http://webtorrent.io (Still a work in progress) How does WebTorrent work? https://github.com/feross/webtorrent/issues/39 Feross ✩ blog http://feross.org/ | ✎ studynotes http://www.apstudynotes.org/ |☮ webtorrent http://webtorrent.io/ On Mon, Apr 7, 2014 at 12:50 AM, ChaTo (Carlos Alberto Alejandro CASTILLO Ocaranza) ch...@chato.cl wrote: Hi, An answer to the single point of failure of having a URL to pull the content is to use a secure distribution mechanism. I think a great candidate is BitMessage, which I have been using for some months now: https://bitmessage.org/wiki/Main_Page BitMessage is a secure peer-to-peer communications protocol that allows you to broadcast a message (or receive a broadcast message) without revealing your IP address. Cheers, On 04/06/2014 11:41 PM, Jonathan Wilkes wrote: Hi list, Can some tech liberator out there versed in javascript and video streaming please take over the popcorn-time project? It looks like it was developed pseudonymously by at least three teams now which have all disappeared (probably due to pressure from Hollywood). If you haven't heard of it, see: https://en.wikipedia.org/wiki/Popcorn_Time Why should this interest you? * Licensed GPL v3 * Has the most user-friendly interface I've seen in a piece of free software * Runs on GNU/Linux, OSX, Windows * Streams downloads efficiently and uses Bittorrent to seed while the user watches (with no setup or intervention by the user) * Accessibility. Looks like the project is getting bullied with a game of whack-a-mole, probably due to pressure from Hollywood. AFAICT there is no new technology being used-- the original devs used mostly pre-existing libs to make something that is easy to use. What everyone on this list can do using Transmission and VLC can now be done by non-experts. How to stop the game of whack-a-mole? There needs to be something like a popcorn kernel team. It should use exactly the same API as the software currently does, but just have a place where the user can type in an address from which to pull the content. It'd be pretty easy to host a tracker with one or two public domain titles and test with that. Then if a site like archive.org decides to adopt the YTF API to access its public domain videos, users can just add that address and start streaming the content. (And again because they are also seeding this helps out archive.org, so it's a win-win.) That would remove the only controversial line of code-- the url of YTF-- so that anyone who wants to improve the software may do it without being bullied. Also, if there were a well-known organization dedicated to hosting and defending free software that could host the repo and front page it would lower the risk of a rogue, suspicious site putting up downloads with malware in them. (And each time Popcorn-time gets resurrected at some new domain that risk increases.) The original code is still on github. Not sure about the other incarnations. It's worth noting that there seemed to be quite a bit of activity on each incarnation (bug fixes, improvements) so it might be worth it to try to find a link to the most recent incarnation. (And since it's git it should be easy to audit the changes.) I really wish I knew javascript and node.js. Then I'd just do it myself. :) Best, Jonathan -- ChaTo (Carlos Castillo) http://chato.cl/ LinkedIn http://linkedin.com/in/chato · Facebookhttps://facebook.com/chato· Twitter http://twitter.com/chatox -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] Announcing Scramble.io
This is great work, DC. Congrats on launching! This does not improve on the properties of PGP, fundamentally. Without a pre-existing secure channel, knowledge of this public hash is just as susceptible to MitM. Scramble isn't trying to improve on PGP at the cryptographic level -- it actually *uses* PGP (specifically, OpenPGP.js) to encrypt the emails. The point of Scramble is to make PGP actually usable by humans. PGP's problem is not that we lack a way to make pre-existing secure channels, it's that literally no one uses it. Scramble makes PGP usable by the masses. It's webmail so it's convenient and doesn't require any software configuration. And it uses a great little trick pioneered by tor hidden services to eliminate the need for key signing parties, which weren'thttp://ripe60.ripe.net/images/photo-keysigning.jpg muchhttp://ripe61.ripe.net/wp-content/uploads/2010/11/key-signing-prague.jpg fun http://mdcc.cx/~joostvb/plaatjes/20050910-tilburg-tosti/ksp.jpganyways. All this usability gain from webmail, but what about attacks like what would have happened to LavaBit? Some say that webmail can't be made secure. We don't know much about what LavaBit was asked to do, but Scramble is (theoretically) secure against attacks from centralized adversaries like governments who control root CAs and could take over and even operate the Scramble servers. The browser treats the server as a dumb blob store, decrypts all data locally, and doesn't ever download new javascript (if you're use the chrome extension version of Scramble, two click install). An actively malicious server is not a problem. Mad cool. Even if you're *not* using the chrome extension version (i.e. paranoid mode), it's impossible for a central adversary who controls the Scramble servers to do a targeted attack against you specifically, because the browser downloads all the javascript upfront and only requests user-specific mailbox data afterwards. It doesn't download any new code after it's identified you to the server. Again, mad cool. If the attacker served malicious JS to everyone, users would quickly notice and word would get out. A distributed program could automate this check. I recommend you all read the two links DC posted. Scramble is the real deal. Good news for all of us! Feross feross.org - peercdn.com (make your site faster reduce your bandwidth costs!) On Fri, Aug 23, 2013 at 2:12 AM, Ximin Luo infini...@gmx.com wrote: On 23/08/13 09:53, DC wrote: Hi everyone, I'm DC, and I've been lurking here for a few weeks :) Since the NSA leaks, I've been inspired to work on an old dream: end-to-end encrypted email. One difficult problem in public-key encryption is key exchange: how to get a recipient's public key and know it's really theirs. My plan is to make make your email the hash of your public key. For example, my address is *nqkgpx6bqscsl...@scramble.io mailto:nqkgpx6bqscsl...@scramble.io* (I borrowed this idea from Tor Hidden Services.) This does not improve on the properties of PGP, fundamentally. Without a pre-existing secure channel, knowledge of this public hash is just as susceptible to MitM. You can argue well my email address is pasted on so many websites, it's infeasible for an attacker to MitM all of them, but you can say the same thing for PGP keys too. In some senses it's even worse because a human has to remember the hash *exactly*, instead of having PGP manage the email-fingerprint mapping for you. You could write some address book software to improve on this, however. This lets you build an email system with some nice properties: * It's webmail. I want something easy to use and understand, unlike PGP, so that nontechnical people can grok it. * Webmail has an inherent weakness: if push comes to shove, the NSA can compel a Scramble server to serve bad Javascript to their users. I want to give users the option to install the app as a Chrome extension. Same HTML, CSS, and JS, but served locally, so the server is untrusted. * You can look up someone's public key from an untrusted server, and verify that it's actually theirs. * Anyone can run a Scramble server * It's open source * All email between Scramble addresses is encrypted. Both Subject and Body are encrypted via PGP. * With some precautions, it's possible to avoid associating your real identity with your email address at all. This means that even From and To can be anonymous. Feel free to try it out! https://scramble.io/ Here's a more thorough description of my design and my motivations: https://scramble.io/doc/ Finally, here's a more thorough description of the technical details: https://scramble.io/doc/how.html Thoughts? Best DC -- GPG: 4096R/1318EFAC5FBBDBCE git://github.com/infinity0/pubkeys.git -- Liberationtech is a public list whose archives are searchable on Google. Violations of list guidelines will get you moderated:
Re: [liberationtech] Announcing Scramble.io
Sounds very cool yes. But where is the OpenPGP.js stored? scramble webmail: it's stored on the server and transmitted over https. scramble extension: stored locally, never/rarely updated, like tor browser bundle. See: https://scramble.io/doc/#explanation I'm sure DC can elaborate more. Feross feross.org - peercdn.com (make your site faster reduce your bandwidth costs!) On Fri, Aug 23, 2013 at 5:36 AM, Jerzy Łogiewa jerz...@interia.eu wrote: Sounds very cool yes. But where is the OpenPGP.js stored? -- Jerzy Łogiewa -- jerz...@interia.eu On Aug 23, 2013, at 2:28 PM, Feross Aboukhadijeh wrote: Even if you're *not* using the chrome extension version (i.e. paranoid mode), it's impossible for a central adversary who controls the Scramble servers to do a targeted attack against you specifically, because the browser downloads all the javascript upfront and only requests user-specific mailbox data afterwards. It doesn't download any new code after it's identified you to the server. Again, mad cool. -- Liberationtech is a public list whose archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu. -- Liberationtech is a public list whose archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.