On 3/18/16, d...@geer.org wrote:
> Apple will have its Snowden.
Snowden disclosed in service of Liberty,
Apple Insider kleptography will service only Filthy Lucre...
make no mistake, the NSA gets their keys.
the FBI is the one out in the cold here!
best regards,
https://eprint.iacr.org/2016/276
Abstract: In this work we apply information theoretically optimal
arithmetic coding and a number of novel side-channel blinding
countermeasure techniques to create BLZZRD, a practical, compact, and
more quantum-resistant variant of the BLISS Ring-LWE Signature Sche
Mathematicians Discover Prime Conspiracy
A previously unnoticed property of prime numbers seems to violate a
longstanding assumption about how they behave.
By: Erica Klarreich
March 13, 2016
Two mathematicians have uncovered a simple, previously unnoticed
property of prime numbers — those n
last one for this month might be delayed awhile, as per usual procedure...
'''
This is a request under the Freedom of Information Act. I hereby
request the following records:
A copy of every "Annual Report of the Undercover Review Committee"
prepared by the Bureau, for all years available.
Pleas
with DoD finding any excuse to deny my righteous transparency desires,
E.g.:
https://www.muckrock.com/news/archives/2016/feb/26/biggest-foia-fee-all-time/
the following laser guided narrow focused FOIA formed thusly:
'''
The quantity, serial number(s), Purchase Orders, activity logs,
equipment c
uncorked!
'''
Procedures, Instructions, and any other materials regarding the proper
handling of SSL/TLS secret keys, code signing keys, Client Certificate
private keys, and other private key material obtained via National
Security Letters or Court Order under PATRIOT Act, or USA FREEDOM Act
autho
http://www.democracynow.org/2016/2/25/will_fbi_take_a_bite_out
, http://www.democracynow.org/2016/2/25/part_2_former_cia_agent_barry
---
Will FBI Take a Bite Out of Apple? Former CIA Agent on Showdown
Between Apple & U.S. Government
February 25, 2016
As the government continues to take a bite
On 2/25/16, John Young wrote:
> USG v. Apple, Apple Motion to Vacate Decrypt Order
> ... https://cryptome.org/2016/02/usg-apple-016.pdf
> (415 pp, 19.5MB)
*this* is how you tell the FBI to Get Fucked, in legalese :P
On 2/26/16, Zenaan Harkness wrote:
>
>
> OK, got the address stuffed up twice - the first time, last night, I
> started entering the cpunks address, then got distracted, then cut and
> pasted the actual address.
>
> Then I read the "rejected" email, carefully I thought.
>
> Then, this morning, I
r posting to the list, then I shall
> remove myself from this so-called "community" and find some other
> place where who I am is respected, and where cowards are told to grow
> the fuck up! Some place where children are not pretending they're
> adults with their cow
On 2/24/16, Steve Kinney wrote:
> ...
> But in the same press release, EFF endorses absurd non sequiturs
> that demonstrate painful ignorance of the subject matter at hand.
> The EFF endorses the assertations that the only way to obtain
> access to encrypted data stored on an iPhone is to manuall
On 2/23/16, Travis Biehn wrote:
> Well,
> The strings for debug code can certainly show up, even these files
> themselves. Which you can see some samples of under /content (the video
> stuff is missing, fueling the conspiracy fire?)
it was meatspin.mov renamed :o
> There's screenshots,
> walle
On 2/9/16, Ted Smith wrote:
> In an effort to re-seed discussion about cypherpunk topics I'll be
> reposting old threads from the cypherpunks list in a rough "this day in
> cpunks" effort.
>
> In this mail, John Young analyzes the subclasses of "the internet" as a
> user might see.
while i applau
On 2/24/16, coderman wrote:
> ... the barrels of lube must be sent somewhere?!?
word to the wise: it's significantly cheaper as
"industrial birthing fluid" for bovines...
the sex shop premiums are absurd! :)
On 2/24/16, Georgi Guninski wrote:
> ...
> IMHO fucking few clowns won't give sufficient (if any) change for good.
catharsis; vengeance; signaling... i suppose it's all meaningless in the end.
truth indeed - but the barrels of lube must be sent somewhere?!?
:P
best regards,
On 2/24/16, Douglas Lucas wrote:
> So here's my article on DeHart's sentencing yesterday:
>
> https://revolution-news.com/anonymous-activist-matt-dehart-sentenced-to-7-5-years/
this is wonderful reporting; thank you Douglas!
some links referenced are dead? unable to retrieve:
https://mattdeh
On 2/24/16, juan wrote:
> ...
> You are doing it wrong coderman. Make a list of people who are
> NOT shit in government/industry. It's going to be a very very
> short list.
i feel a special aversion to calculated malicious deception (see SHIT LIST)
vs. differ
Stewart Baker - Former 1st Assistant Secretary of DHS General Counsel of the NSA
Tim Belcher - Former CTO, RSA
Jim Bidzos - Chairman and CEO, Verisign
Art Coviello - Former Executive Chairman, RSA
Dr. Ann Cavoukian, Ph.D. - Executive Director of the Privacy and Big
Data Institute at Ryerson Uni
On 2/22/16, grarpamp wrote:
> ...
> Bah! Whatever! Utterly dismayed by million TOP SECRET
> holders and more retirees that dont simply open and talk.
you must have missed the continous campaign by current and past
administrations to absolutely destroy the lives of leakers; any out of
band accoun
On 2/22/16, Zenaan Harkness wrote:
> ...
> For all the publicity, actual release of relevant info from Snowden
> cache seems to have been quite the failure.
>
> Do we have a protocol for future leakers?
future(current) leakers are building covert duplex channels direct to
NSANet & JWICS :P
much
On 2/22/16, Douglas Lucas wrote:
> What were the grounds for rejection? Is the rejection document publicly
> available? (e.g. on MuckRock/) Thanks!
to be specific, it was a "no responsive records" which is a creative
denial - meaning the FOIA officer intentionally avoided responding to
the intent
On 2/20/16, Douglas Lucas wrote:
> I will be covering Courage beneficiary Matt DeHart's sentencing Monday
> in Nashville for https://revolution-news.com/ (@NewsRevo on Twitter).
>
> Can anyone suggest questions for his defense team, for his parents
> (assuming they're not too distraught), for the
'''
Disruption strategy involves “a range of tools including arrests,
interviews, or source-directed operations to effectively disrupt
subject’s activities.”
“The FBI’s overbroad and aggressive use of its investigative and
surveillance powers, and its willingness to employ ‘disruption
strategies’
On 2/9/16, Rayzer wrote:
> ...
> Somewhere on Tor's site I ran into something about how Tail's
> tor/browser was more secure than the standard torbrowser because of
> something the tails folks were doing with iptables. Perhaps they're
> 'steering' traffic away from (or yeah, perhaps towards, take
On 2/9/16, Steve Kinney wrote:
> ...
> Ted and "shakeit...@ghostmail.com" have a lot in common, including
> their vocabulary, grammatical construction, New Left ideology and
> a hostile attitude toward what passes for "native culture" on the
> CPunks list. A few posts from years earlier suggest t
On 2/9/16, Georgi Guninski wrote:
> On Tue, Feb 09, 2016 at 02:15:53AM +, shakeit...@ghostmail.com wrote:
>> The ideal would be idea to have more code, more crypto.
>
> "More code" is an ideal?
>
> I for one want _less_ code, but of higher quality.
i just want one code; the flawless version.
On 2/8/16, Sean Lynch wrote:
> ... During WWII it was not permissible
> to speak out against the war; you'd be considered to be aiding the enemy. I
> think it was worse in Europe than in the US, but still. There was a time
> when a majority of American men in a certain age range were veterans. No
On 2/6/16, jim bell wrote:
> ...
> Initially, I was confused about this. To me, a "Cantenna" was Heathkit's
> name (in about 1970 or so) for a dummy-load built from a1 gallon paint can
> with a non-inductive resistor inside, immersed in transformer oil, capable
> of dissipating 1 Kw or so. Showi
"Both the journal and the documents she obtained from the government
show how her own targeting helped to galvanize her resolve to expose
the apparatus of surveillance."
they've made fatal errors; miscalculating the blow back of global
privacy destruction.
against such injustice, some will spend
On 2/6/16, juan wrote:
> ...
> well, if you ever have trouble sleeping then you can read "no
> treason" ^-^
trolls goading each other into reading and educating themselves? ...
maybe they're just grossly inappropriate in sincerity, hmm
*grin*
On 2/5/16, Michael Best wrote:
> I stand corrected - there was an explanation. It was buried in there and it
> was bullshit and has me mad, but at least it was there. So standard FOIA
> nonsense, not a new level. I can live with that.
we must compile the authoritative reference of FOIA shenaniga
On 2/5/16, Sean Lynch wrote:
> ... Radio is being used right now to provide anonymity, but it's being used[1]
> to hide endpoints similar to the duct-taped payphone trick depicted in
> Hackers, in order to avoid attacks like the one used to capture Ross
> Ulbricht without giving him a chance to wi
good stuff in:
Major features (security, Linux), and Major features (directory system),
for those in challenging environments...
:P
best regards,
> -- Forwarded message --
> From: Nick Mathewson
> Date: Thu, 4 Feb 2016 18:24:03 -0500
> Subject: [tor-talk] Tor 0.2.8.1-alpha
On 2/4/16, Cari Machet wrote:
> ...
> she stated at ccc that they get a lot of complaints about the slowness of
> the information coming to the public regarding the snowden docs and glenn
> said they have asked eff to take on some of the task but eff declined so
> maybe they are doing better at at
https://conspicuouschatter.wordpress.com/2016/02/03/a-technical-reading-of-the-himr-data-mining-research-problem-book/
A technical reading of the “HIMR Data Mining Research Problem Book”
3 February 2016
Boing Boing just released a classified GCHQ document that was meant to
act as the Sept 2011 gu
https://theintercept.com/2016/02/02/barrett-brown-the-rule-of-law-enforcement/
The Barrett Brown Review of Arts and Letters and Prison
The Rule of Law Enforcement
Barrett Brown
Feb. 2 2016, 3:02 p.m.
AFTER HAVING SPENT the prior six months in a fruitless cycle of
retaliation and counter-retaliat
Conspicuous Chatter
Traffic analysis, anonymous and covert communications, and other magic.
https://conspicuouschatter.wordpress.com/2016/02/03/the-social-construction-of-trust-in-cryptographic-systems/
The Social Construction of Trust in Cryptographic Systems
3 February 2016
(This is an extrac
final FOIA for January:
---
https://www.muckrock.com/foi/united-states-of-america-10/injusticelaundrydept-23703/
To Whom It May Concern:
This is a request under the Freedom of Information Act. I hereby
request the following records:
1.) First page of documents, transcripts, guidelines, repor
On 1/30/16, Zenaan Harkness wrote:
>> ...
>> Why doesn't the gleeful roasting extend to the bigotry and chauvinism on
>> this list? Why are these silently accepted?
>
> Who's "job" is that? Are you defining this job for someone other than
> yourself?
the decentralized node must ascertain for itse
the TAO master spoke of "out-of-band exfiltration" of data at high
risk of discovery,
one thing an alert sysadmin might observe and react to.
has anyone seen a summary of the exfiltration methods identified in
leaks/other so far?
this would have to span everything from Google Voice Search as cov
On 1/31/16, Steve Kinney wrote:
> ...
> It always pays to outclass the opposition, in word /and/ deed.
> Trolls, Buffoons and Lunaticks have their uses and some get paid;
> but they have no staying power and eventually land on the rubbish
> heap. It is said that a wise person may choose to act li
On 1/29/16, Ryan Carboni wrote:
> ...
> It is important to troll undesirable activists. It creates a low-grade
> trauma (which may increase social withdrawal and increased sensitivity to
> threats), makes them distrust certain common aspects of the trolls (through
> mental association), and wastes
On 1/20/16, juan wrote:
> ... Maybe at the time
> when the US wasn't in a state of perpetual war?
maybe juan's the fed.
- mining for info (birthdate)
- agent provocateur
- ignorant brovado
...
> you mean like tor?
casting suspicion on Tor rather than OPSEC.. Fed :P
-- Forwarded message --
From: Sam Lanning
Date: Sat, 16 Jan 2016 09:16:48 +
Subject: [whispersystems] Addressing Frustration in the Signal Community
Hi All,
I have noticed that there has been some amount of frustration present
on this mailing list as of late, and I'd just lik
On 1/19/16, Travis Biehn wrote:
> ...
> https://docs.google.com/spreadsheets/d/1oXvCSrFzr2PoIDvOmQPaloJN_JxXFpwXNFluYATTaFw/edit?usp=sharing
>
> +1 to the Palantir employees who are already in it to win it.
>
> Perhaps the rest of the project will be conducted on world r/w google
> drive?
i can
On 1/20/16, grarpamp wrote:
> ...
> Let FOIA do the work for you...
> Annual count of all queries replied with "can neither confirm or deny /
> etc".
aha! were it only this simple.
the dispositions noted in the response,
the disposition noted in MuckRock,
the disposition noted in their elect
On 1/19/16, d...@geer.org wrote:
> ...
>Bitcoin Heist Steals Millions from Exchange
full decentralization a double edged sword, for sure.
if we're all sovreign bankers and multi-national producers,
perhaps Snowden threat model not so outlandish?
first disable passive Eve,
then deny Mallo
reply received!
"Count of Level 4 - National Security Special Sensitive SSBI or
SSBI-PR clearance screenings performed by year, for all years with
responsive records."
Fiscal Year: SSBI count
2005: 93801
2006: 90733
2007: 107747
2008: 111799
2009: 100623
2010: 108149
2011: 106214
2012: 93776
201
On 1/16/16, Troy Benjegerdes wrote:
> ...
> And Cannabis-based painkiller? Wouldn't it be cheaper for a flight
> to the mile-high-city? What are these drugmakers smoking?
a long and sordid story behind this statement of similarity.
of course it would be cheaper to buy the dank naturals,
but al
On 1/18/16, grarpamp wrote:
> ...Bernie Sanders said
> government must "have Silicon Valley help us" to discover information
> transmitted across the internet by ISIS and other terrorist
> organizations. He thinks we can do that without violating privacy, but
> didn't say how.
time to lobby Berni
On 1/18/16, Michael Best wrote:
> Does anyone know about any projects that are collecting or tracking GLOMAR
> responses? A quick Google search didn't turn anything up, but it could be
> worthwhile.
i am tracking them in my own MuckRock requests,
but there is no distinct "Glomar" state for them,
On 1/18/16, Rayzer wrote:
> Janet Reno's United States Department of Justice Investigation of Recent
> Allegations Regarding the Assassination of Dr. Martin Luther King, Jr.
> June 2000
>
> http://permanent.access.gpo.gov/websites/usdojgov/www.usdoj.gov/crt/crim/mlk/part1.htm
quite a read! than
SeppuKuma also offers 23 very different methods one can choose to end
their life, including Everlasting Sleep (lethal injection), Pillow
Kisses (suffocation), Peaceful Breath (helium asphyxia) and Sleepy
time Hug which is where the robotic bear strangles its partner until
their pulse stops for 15 m
On 1/17/16, Michael Best wrote:
>...
> Unfortunately you're right. The weird part to me is the way it's justified
> and presented as a transparency tool! Double speak never dies, I suppose.
> =(
"Better than nuthin', see?"
:P
related:
'''
In Stayin’ Alive, his powerful history of the “last days” of the
working class, the historian Jefferson Cowie describes how the proud
blue-collar identity of previous generations disintegrated during the
’70s. “Liberty has largely been reduced to an ideology that promises
economic and
On 1/15/16, Razer wrote:
> Not JUST FOIAs.
>
> Fixing Pre-Publication Review: What Should Be Done?
i've found the most effective method to avoid pre-publication hassles
is to never be read in, in the first place. ;)
best regards,
still have one FOIA left for January; trying to pick a topic...
it must beat this one, in terms of poking bear caliber:
'''
Records of any communication, agreements, transcripts, memorandum of
understanding, contracts, or other responsive materials relating to
Ibragim Todashev as an Undercover Emp
On 1/17/16, Michael Best wrote:
> I spoke to someone from the list privately and did a little digging - it
> looks like the files can't be downloaded or saved electronically, at all,
> period. They have to be printed instead, from one of four computers which
> are located in College Park, MD (tran
On 1/14/16, jim bell wrote:
>
> ... The main criticism I had
> of this was the fact that the system was said to have a minimum bid of 1
> BTC, which at the time was somewhere around $1000. This, contrasting with
> my Assassination Politics essay of 1995-96 where I anticipated allowing bits
> of 1
On 1/16/16, juan wrote:
> [ ... insert feedback loop of awful here... ]
> "a picture is worth"
this is funny and accurate! i have no political disposition, no
"team". early on studying decentralization of technology it became
clear you need decentralization of all things, there is no pla
On 1/15/16, Zenaan Harkness wrote:
> ...
> I guess that's the ultimate propaganda success really - not being
> aware that your country is always at war, and pretty much always has
> been. War is the ultimate rejection and domination of the sovereignty
> of other nations and individuals.
next ques
lost in much of the FOIA reform noise of late, is this note:
"I understand that H.R. 653 does not allow or require FOIA requesters
to obtain IC records or information, without regard to the age of the
records or information, if such disclosure would adversely affect
intelligence sources and method
On 1/13/16, juan wrote:
> ...
> So, yes. I'm waiting for coderman to make some updated
> political comment after hopefully having updated his knowledge
> of american wars.
Guantanamo is closing! (that's not nothing, right? :)
regarding american wars,
new FOIA: all revisions of the OIG report on Brandon Mayfield:
'''
All versions of the document "A Review of the FBI's Handling of the
Brandon Mayfield Case - Office of the Inspector General, Oversight and
Review Division January 2006", including mandatory declassification
review (MDR) under E.O. 1
-- Forwarded message --
From: "James S. Tyre"
Date: Tue, 12 Jan 2016 10:48:05 -0800
Subject: Re: Classifed info
To: fo...@listserv.syr.edu
Fun (if only in hindsight) and true story.
In the mid-eighties, the FBI and Naval Intelligence raided my law
office, sans warrant, claiming t
looking for details on capabilities and components of "mobile digital
forensic laboratories":
'''
The raid, named Operation Pleiades, resulted in both targets being
detained. In addition, law enforcement officials used mobile labs to
inspect seized evidence.
'''
-
http://www.csoonline.com/article
On 1/12/16, Alex Stahl wrote:
> Sounds like we're in agreement then that crypto systems with political
> solutions aren't actually crypto solutions at all then?
"Cryptosystems with Political Solutions are Poisonous Impostors"
'''
Penn noted in his article his own concerns about being tracked in the
plane but said that Chapo's son put him at ease by pointing out a "red
scrambler switch below the cockpit controls" that he claimed blocked
ground radar and that an inside man provided them with information
about when the mil
On 1/11/16, Blibbet wrote:
> ...
> The physical protections mentioned above do not, however, resolve the
> problem
> of the attackers subverting the laptop hardware at manufacturing
USB Armory has schematics available, and you can verify the (locked)
bootloader on it as well. verifying these sche
the #YallQueda group alleged witnesses to improper burning saw events
which precipitated the "illegal" burn at center of this dispute.
thus, FOIA! let's see if we can find confirmation in past patterns of
burn behavior...
'''
Records associated with controlled burns in the districts of Lakeview,
On 1/11/16, coderman wrote:
> ...
> have you played with USB Armory yet? it's my new favorite ARM platform.
> https://github.com/inversepath/usbarmory
since 2014 i don't buy hardware shipped (to me) anymore.
this is obviously more complicated for hardware not readily
On 1/11/16, Blibbet wrote:
>...
> Yes, I *really* wish there were more AMD64/ARM32/ARM64 experts, most
> seem to focus on x86/x64. Even at AMD and ARM.
have you played with USB Armory yet? it's my new favorite ARM platform.
https://github.com/inversepath/usbarmory
> If Linaro finishes portin
On 1/10/16, Rayzer wrote:
> ...
> In summation, you must be olld. Older than dirt. Older than
> electricity.
(~_~;)
algebraic attacks on GHOST, etc:
- http://crypto.2015.rump.cr.yp.to/1ea2c6c01144e0e7f6b14b324c5e4562.pdf
- https://eprint.iacr.org/2015/812.pdf
AES has intentional algebraic structure as well, yet also resists
linear, differential cryptanalysis. (e.g. strong in these aspects
despite simple algebra
https://www.washingtonpost.com/investigations/censor-or-die-the-death-of-mexican-news-in-the-age-of-drug-cartels/2015/12/09/23acf3ae-8a26-11e5-9a07-453018f9a0ec_story.html
Censor or die: The death of Mexican news in the age of drug cartels
By Dana Priest December 11, 2015
CONTROLLING THE STORY:
On 1/10/16, juan wrote:
>>
>> now USA in a state of perpetual war,
>
> It has always been. So what the fuck are you talking about.
Juan, let me return your incredulity with clarity,
i know i'm old, but that also means i remember a time we were not
actually at war (except drug war! in hinds
On 1/6/16, Sean Lynch wrote:
> ... I've found myself self-censoring quite a lot more
> since my kids were born.
this topic has been on my mind recently,
"You know, It would be a lot easier you just didn't do X"
"This wouldn't happen if you quit annoying Y"
"If you accept, Z will pay nicely and
On 1/9/16, coderman wrote:
> ... https://www.muckrock.com/foi/united-states-of-america-10/littlebird-23349/
>
> a title could be, "Who's spilling secrets to Sid?"
note, the answer may be "no one"! :)
regarding my earlier comment about reverse engineering, s
On 1/9/16, Shelley wrote:
> ...
> Thank you for continuing to seek the truth despite their shitty attempts to
> dissuade you!
one day they'll figure out this only steels my resolve ;)
> This is an especially good one.
after a year of practice, i am only beginning to feel not-incompetent
at f
ramping up FOIA in the year new, a new favorite!
'''
Records associated with the investigation of leaked sensitive US
intelligence products identified in email communication between
Hillary Clinton and Sid Blumenthal - email account name "sbwhoeop", on
June 8th, 2011. The previously sensitive info
first FOIA of the New Year!
'''
To Whom It May Concern:
This is a request under the Freedom of Information Act. I hereby
request the following records:
Records associated with the suppression, coordination, or appraisal
via third parties of vulnerabilities in Dual_EC and ANSI X9.31 in
ScreenOS or
usually there is no confirmation regarding active investigations in
FOIA replies.
unlike this one! :)
[[ see attached. ]]
"In short, this is a very open and very active criminal investigation
and we absolutely cannot release anything, particularly [[
...REDACTED... ]] and we cannot assist [REDA
On 1/6/16, Ryan Carboni wrote:
> https://www.reddit.com/r/sysadmin/comments/3zlttw/linode_user_credentials_compromised_all_customers/
>
> First under DDOS attack, now being hacked.
>
> What did Linode do?
they hosted high risk instances, apparently. :/
i do appreciate that given a small set of
On 12/31/15, Georgi Guninski wrote:
> ...
> Have they tried it on perl or assembler (or whitespace or brainfuck and
> other esoteric languages)?
yes, even intentionally obfuscated disasm resistant mungifications of
compiled programs.
> Obfuscated perl appears hard (in case it significantly diff
https://newrepublic.com/article/126674/reading-everything-aaron-swartz-wrote
'''
... In a way, Aaron is a cautionary tale for unschooling. One of the
lessons that school teaches is that the people who make the rules
don’t really have to follow them. It’s something even the most
rebellious students
interesting rejection technique on this one:
first, reply with status of "Request received and being processed"
one month after submission. Aha! inside is a Glomar rejection.
.
.
.
wait FIVE MONTHS
.
.
'This email pertains to the automated status of case FOIA 81798. Our
records indicate that a fin
https://www.princeton.edu/~aylinc/papers/caliskan-islam_deanonymizing.pdf
getting into the right one-time "headspace" for a thing is OPSEC for
codecraft :P
De-anonymizing Programmers via Code Stylometry
Aylin Caliskan-Islam
Drexel University
Arvind Narayanan
Princeton University
Richard Harang
U.S. Army Research Laboratory
Clare Voss
U.S. Army Research Laboratory
Andrew Liu
University of Maryland
Fabian Yamaguchi
University of Goettingen
Rachel Gre
On 12/28/15, coderman wrote:
> end of 2015 requests!! :)
this makes 254 requests for my first MuckRock year.
another data point, FOIA is a slow burn:
117 requests were updated in December alone!
-
https://www.muckrock.com/foi/mylist/?page=1&per_page=100&sort=date_updated&orde
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Fingerprint: 023255B5 5B390F33 F0171191 A9AD7ED1 A3FD2CBE
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
iQJ8BAEBCgBmBQJWgj9cXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ1ODNCRkZEQzY1MDQwNUJGNURCNzRBRkI5
NjJCMzQ5OEV
On 12/20/15, Michael Best wrote:
> I'm curious what everyone thinks. I personally agree with TheCthulhu, but
> I'm not a tech or crypto expert.
>
> Original: https://www.thecthulhu.com/a-response-to-cryptome/
clearly we should not be posting hashes because then they get blacklisted!
E.g. https
https://cryptome.org/2015/12/anon-v-panopticon.pdf
'''
We believe the vulnerabilities and measurability limitations of onion
routing may stem from an attempt to achieve an impossible set
of goals and to defend an ultimately indefensible position.
Current tools offer a general-purpose, unc
On 12/28/15, John Young wrote:
>Cryptome disavows this senselessly bloated and mirrored material,
>and all like it junking up the Internet like space debris.
"CRYPTOME: ABRIDGED & CONTENTIOUS - 2015 Ed."
- Only the most censored, DMCA'd, and potentially illegal documents!
This hand crafted coll
On 12/28/15, Rayzer wrote:
> ...
> I have this discussion with local social activists quite a bit. The
> 'roles/titles and position' ARE the important thing. The names change.
> Structure doesn't.
Sssh, you're not helping my FOIA :P
> ... There's a local houseless person's 'activist' around
>
end of 2015 requests!! :)
'''
Requests, orders, configuration requirements, technical manuals and
any other responsive materials regarding "lawful intercept" of
cellular communications, specifically LTE, CDMA, or GSM
communications, requesting specific service levels during intercept,
including "b
even more requests!
'''
The URL or URI or PATH of each source code repository operated,
archived, used by, or accessed on behalf-of the Bureau. This is to
include source code repositories in the RCCS, CVS, Subversion (Svn),
Git, Mercurial (Hg), Bazaar (Bzr), Darcs, BitKeeper, ClearCase, or any
oth
new requests,
'''
The number (quantity) of documents, guidelines, instructions, manuals,
process documents or related materials regarding activities authorized
by Executive Order 12,333. See
http://www.archives.gov/federal-register/codification/executive-order/12333.html.
If activities are performe
On 12/22/15, StealthMonger wrote:
>...
> I have https://peertech.org/files/taobios-v2.tar.bz2 downloaded December
> 7 04:14 UT (18963087 bytes). Are you interested? sha256sum:
> 0ba12b0ecf89d109301b619cbc8275e5cd78b6fefd3724fba0b6952186e37779
that's a known GOOD digest. carry on, and thanks!
-BEGIN PGP PUBLIC KEY BLOCK-
mQINBFZzsUwBEAC+f1pBdTJKvz95Ce40BJ7eSntDqybpMoXrGjfgC4rW58+XT+/e
NTGBjlcQZsMyZQph9e/B8hoGkvx0tbmphlR/de3X41O0GQIShN5FQUTzCizrgjJZ
kL6/b7GdjcmU83PMylw8bvPqlVSdMt3ycqiMlsmu5tX9LqnWb0Ttg5slLeV0lAK3
e3Qo0J7N+9fl0CQmjIk9/HOIuuXkKKsidvkgMxWk5K3c8rFcbo6tA15ATQoH5h8U
On 12/23/15, John Young wrote:...
> http://bell-labs.com/usr/dmr/www/crypt.html
'''
... The result of the NSA query was that Bob and I--the arrangements
were made by him--received a visit from a man whom Bob called "a
retired gentleman from Virginia." He was quite a charmer. What he
said, over l
1 - 100 of 1085 matches
Mail list logo