> Okay, isn't this a bit over the top?
>
>
> --
> Kevin
Over the top you say? I will tell you what is over the top ...
The US and UK are doing the digital equivalent of the medieval practice of
throwing corpses, rats and dead cats over the fence of our backyards on the
mere suspicion that w
> Message du 13/03/14 15:33
> De : "John Young"
> A : cypherpu...@cpunks.org, cryptography@randombit.net, crypt...@freelists.org
> Copie à :
> Objet : Comsec as Public Utility Beyond Illusory Privacy
>
> Snowden may have raised the prospect of comsec as a public utility
> like power, water, ga
> Message du 14/03/14 04:52
> De : "Troy Benjegerdes"
> A : tpb-cry...@laposte.net
> Copie à : "John Young" , cypherpu...@cpunks.org, cryptography@randombit.net,
> crypt...@freelists.org
> Objet : Re: Comsec as Public Utility Beyond Illusory Privacy
>
> > > getting agreement of all targets --
> Message du 03/04/14 16:54
> De : "Cari Machet"
>
> > Not that journalists should be expected
> > to make a lasting difference.
> >
> >
> WTF?
>
> this shit was posted on huffington post probably for those without ad
> blocker there was ad with bewbs on it next to the text
>
> one more thing w
> Message du 04/04/14 20:09
> De : "Eric Mill"
> Along with Cloudflare's 2014 plan to offer SSL termination for free, and
> their stated plan to double SSL on the Internet by end of year, the barrier
> to HTTPS everywhere is dropping rapidly.
>
I agree that putting https everywhere is great, but
> Message du 06/04/14 17:41
> De : "staticsafe"
> On 4/6/2014 10:40, tpb-cry...@laposte.net wrote:
> >> Message du 04/04/14 20:09
> >> De : "Eric Mill"
> >> Along with Cloudflare's 2014 plan to offer SSL termination for free, and
> >> their stated plan to double SSL on the Internet by end of year
> Message du 08/04/14 18:44
> De : "ianG"
>
> E.g., if we cannot show any damages from this breach, it isn't worth
> spending a penny on it to fix! Yes, that's outrageous and will be
> widely ignored ... but it is economically and scientifically sound, at
> some level.
>
So, let's wait until an
> Message du 08/04/14 21:42
> De : "ianG"
> A : tpb-cry...@laposte.net, cryptogra...@metzdowd.com,
> cryptography@randombit.net
> Copie à :
> Objet : Re: [Cryptography] The Heartbleed Bug is a serious vulnerability in
> OpenSSL
>
> On 8/04/2014 20:18 pm, tpb-cry...@laposte.net wrote:
> >> Messa
> Message du 08/04/14 22:18
> De : "ianG"
> A : tpb-cry...@laposte.net, cryptogra...@metzdowd.com,
> cryptography@randombit.net
> Copie à :
> Objet : Re: [Cryptography] The Heartbleed Bug is a serious vulnerability in
> OpenSSL
>
> On 8/04/2014 21:02 pm, tpb-cry...@laposte.net wrote:
>
> >
> Message du 22/04/14 20:30
> De : "Randolph"
>
> > This thread pertains specifically to the use of P2P/DHT models
> > to replace traditional email as we know it today.
>
>
> *Anonymous Email based on virtual institutions*
>
> What about this model? In a network you send your public email encry
> Message du 29/04/14 20:11
> De : "Ben Laurie"
>
> On 29 April 2014 07:41, Ryan Carboni wrote:
> > the only logical way to protect against man in the middle attacks would be
> > perspectives (is that project abandoned?) or some sort of distributed
> > certificate cache checking.
>
> Or Certific
> Message du 13/05/14 05:55
> De : "grarpamp"
> A : cypherpu...@cpunks.org
> Copie à : p2p-hack...@lists.zooko.com, cryptography@randombit.net
> Objet : Re: [cryptography] The next gen P2P secure email solution
>
> On Fri, May 9, 2014 at 11:49 AM, rysiek wrote:
> > Dnia wtorek, 22 kwietnia 2014
Oh boy, here we go.
> Message du 15/05/14 23:14
> De : "grarpamp"
>
> > http://arstechnica.com/security/2014/05/good-news-for-privacy-fewer-servers-sending-e-mail-naked-facebook-finds/
> > I think that answers your concern about SMTP transport in the clear
>
> Yes, great, we're now moving towar
> Message du 16/05/14 02:26
> De : "grarpamp"
> A : p2p-hack...@lists.zooko.com
> Copie à : cypherpu...@cpunks.org, cryptography@randombit.net
> Objet : Re: [cryptography] The next gen P2P secure email solution
>
> >> pesky to/from/subject/etc headers.
> >
> > Oh boy, here we go.
> > Those are
> Message du 29/05/14 10:20
> De : "Lukasz Biegaj"
> A : cryptography@randombit.net
> Copie à :
> Objet : Re: [cryptography] TrueCrypt
>
> On 29.05.2014 09:34, David Johnston wrote:
> >
> >>> So WTF happened?
> >>>
> >> The same thing that happened with Lavabit.
> >>
> >>
> > Someone needs to
Unfortunately both seem to be too stupid to run grep in their files ... they go
the old fashioned way. If they had sysadmin help, maybe the documents could be
perl-filtered and have the most interesting bits extracted in one big file.
> Message du 29/05/14 23:56
> De : "Jeffrey Walton"
> A : "S
> Message du 01/06/14 20:37
> De : "grarpamp"
>
> In May 2014 someone wrote:
> >> > p2p is no panacea, it doesn't scale
> >>
> >> I believe it could. Even if requiring super aggregating
> >> nodes of some sort. Layers of service of the whole
> >> DHT space. More research is surely required.
>
> >
I think frivolous stuff could wait some more ... but you can always bundle
several connections by means of bonding interfaces.
I know it is not the best approach, but let's suppose you need to command a
robot or conduct a surgery over p2p. Bonding a few openvpn connections together
would do the
18 matches
Mail list logo