On Mon, Jan 07, 2013 at 02:20:28PM -0800, John Adams wrote:
> On Sun, Jan 6, 2013 at 1:47 PM, Jacob Appelbaum wrote:
>
> > I generally agree that the data should be encrypted, though I think it
> > should also be authenticated and integrity checked before it is actually
> > used.
> >
>
> If this
http://thenextweb.com/insider/2013/01/07/it-may-be-possible-to-send-secret-messages-via-skype-using-silence/
Skype is used by millions of people every day, all of whom do not want
anyone eavesdropping on their conversations. Naturally, interested parties
will do everything they can to listen in, e
Dear LibTech,
It's occurred to me that I actually haven't submitted the Cryptocat Threat
Model for review on this mailing list before. It could probably help if you
took a look at it.
The first draft of the threat model is available here:
https://github.com/cryptocat/cryptocat/wiki/Threat-Model
F
Rafal Rohozinski:
> Jacob:
>
>>> What is the difference between Black Watch and ooniprobe,
>>> practically?
>>
>> Or rephrased, we'd be happy to take patches for ooniprobe if the
>> features aren't already implemented and if nothing else, we'd like
>> to ensure that our output data formats are c
Rafal Rohozinski:
> John,
>
> With respect to SORM-II, the "signatures" are based upon the
> technical characteristics of the system rather than something that's
> detectable by protocol scanning.
What are the technical characteristics of SORM-II?
> In a nutshell, SORM-II boxes
> located on
This is a great conversation, and I really like the fact that some of these
"old as new" technologies are being talked about. I spent much of early 1990s
and Russia and the former Soviet Union. Fido7 or Region 50, in Fido terms, was
at one point in time the largest FidoNet network in the world!
Julian Oliver:
> ..on Mon, Jan 07, 2013 at 02:20:28PM -0800, John Adams wrote:
>> On Sun, Jan 6, 2013 at 1:47 PM, Jacob Appelbaum wrote:
>>
>>> I generally agree that the data should be encrypted, though I think it
>>> should also be authenticated and integrity checked before it is actually
>>> us
John Adams:
> On Sun, Jan 6, 2013 at 1:47 PM, Jacob Appelbaum wrote:
>
>> I generally agree that the data should be encrypted, though I think it
>> should also be authenticated and integrity checked before it is actually
>> used.
>>
>
> If this level of paranoia is relevant to you, then maintain
The Syrian Internet went dark at the same time as President Assad was giving a
speech reassuring supporters of his intention to stay in power.
Latest SecDev FlashNote can be downloaded here:
https://docs.google.com/open?id=0B4_SBxiVQGUOaWdHclRVeUlhZDA
Rafal
--
Unsubscribe, change to digest, or
-- Forwarded message --
Date: 2013/1/8
Subject: [developerteam getadooble] Dooble Version 1.38
To: dooble-developm...@lists.sourceforge.net,
dooble-t...@lists.sourceforge.net
We are proud to announce a new Dooble release, the first of 2013. Enjoy!
https://sourceforge.net/projects
FWIW, over the weekend I discovered I still have an unused SEAdog package
dating from the late eighties. SEAdog was a commercial adaptation of the
Fidonet Electronic Mail Protocol and which for a bunch of years we used
extensively in another NGO to make overseas modem calls to far flung partners
I'm a satisfied customer :)
It's not as out-of-the-box as dropbox etc. because you have to get used to
concepts like "the url is the key", each file or folder has different urls
for read/write and read-only access, etc.
You also need to avoid leaking refer[r]ers (best is to install a browser
extens
..on Mon, Jan 07, 2013 at 02:20:28PM -0800, John Adams wrote:
> On Sun, Jan 6, 2013 at 1:47 PM, Jacob Appelbaum wrote:
>
> > I generally agree that the data should be encrypted, though I think it
> > should also be authenticated and integrity checked before it is actually
> > used.
> >
>
> If th
On Sun, Jan 6, 2013 at 1:47 PM, Jacob Appelbaum wrote:
> I generally agree that the data should be encrypted, though I think it
> should also be authenticated and integrity checked before it is actually
> used.
>
If this level of paranoia is relevant to you, then maintain multiple
offline SHA, M
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 01/06/2013 03:50 PM, John Adams wrote:
> Why don't you just get around the problem entirely and use
> Dropbox's storage for encrypted disk images?
There are other ways of doing so as well. Media collections on blogs,
for example.
> If you have da
John,
With respect to SORM-II, the "signatures" are based upon the technical
characteristics of the system rather than something that's detectable by
protocol scanning. In a nutshell, SORM-II boxes located on remote network
segments (i.e. ISP's or other providers) require a separate command
Joss Wright:
> On Mon, Jan 07, 2013 at 01:23:40PM -0500, Rafal Rohozinski wrote:
>
>> At some stage in the near future we will share a design document so as
>> to lay this out as clearly as possible.
>
> I'd love to see this at the Usenix FOCI workshop this year. (Call for
> papers will be forth
Margaret Silver:
> I am trying to unsubscribe. I never wanted to be on this list. Please
> unsubscribe me. My email has been hacked.
> Thank you
This might be the ideal list for you to read, I guess. Otherwise, at the
bottom of every email there is this URL provided to change subscription
option
Just wanted to add that Least Authority offers Tahoe-on-S3 as a commercial
service for $1/GB/month:
https://leastauthority.com/
On Mon, Jan 7, 2013 at 9:08 AM, Leigh Honeywell wrote:
> Try https://tahoe-lafs.org/trac/tahoe-lafs - I think it's precisely
> what you're looking for. It's also an
On Mon, Jan 07, 2013 at 01:23:40PM -0500, Rafal Rohozinski wrote:
> At some stage in the near future we will share a design document so as
> to lay this out as clearly as possible.
I'd love to see this at the Usenix FOCI workshop this year. (Call for
papers will be forthcoming in a few weeks.)
You can unsubscribe from this list by following the instructions from
the bottom of this mail.
On 01/07/2013 06:38 PM, Margaret Silver wrote:
> I am trying to unsubscribe. I never wanted to be on this list. Please
> unsubscribe me. My email has been hacked.
> Thank you
>
> On Mon, Jan 7, 2013 at
Jacob:
>> What is the difference between Black Watch and ooniprobe, practically?
>
> Or rephrased, we'd be happy to take patches for ooniprobe if the
> features aren't already implemented and if nothing else, we'd like to
> ensure that our output data formats are compatible for analysis.
There m
I have never had a problem with creating images via hdiutil, setting them
to AES-256, and then using them on dropbox.
Additionally, if dropbox is breaking files, file a bug report. I've met
with their team multiple times and they're certainly willing to fix things
like this.
-j
On Sun, Jan 6,
I am trying to unsubscribe. I never wanted to be on this list. Please
unsubscribe me. My email has been hacked.
Thank you
On Mon, Jan 7, 2013 at 12:32 PM, Jacob Appelbaum wrote:
> Jerzy Łogiewa:
> > Hm Jake, can you tell more about this? Was this data publish?
> >
>
> It was a talk we gave at t
I rather suspect that this is prelude to Facebook monetizing the suckers
again by charging advertizers bulk rates, e.g., $350K to hit 1M users,
where the 1M are targeted a selected based on information in FB's databases.
Once the billing infrastructure is in place (and it sounds like it already
is)
Jerzy Łogiewa:
> Hm Jake, can you tell more about this? Was this data publish?
>
It was a talk we gave at the 23rd CCC Congress:
http://code.google.com/p/vilefault/
http://arstechnica.com/apple/2006/12/6436/
All the best,
Jacob
--
Unsubscribe, change to digest, or change password at:
https
Try https://tahoe-lafs.org/trac/tahoe-lafs - I think it's precisely
what you're looking for. It's also an admirably friendly open source
community, as an added bonus :)
-Leigh
On Sun, Jan 6, 2013 at 12:49 AM, Jerzy Łogiewa wrote:
> Hello!
>
> Dropbox is completely convenient, but source is clos
Hi,
Would like to invite everyone to OpenITP's next Techno-Activism 3rd
Mondays (TA3M), which will be held on Jan 21 in both New York and San
Francisco.
As always, tacos, beer and good convo will be provided :) The event is
designed to connect and create synergy between various HFLOSS and
techno
Hm Jake, can you tell more about this? Was this data publish?
--
Jerzy Łogiewa -- jerz...@interia.eu
On Jan 6, 2013, at 10:47 PM, Jacob Appelbaum wrote:
> I also think most disk images are not actually that difficult to brute
> force - I was involved in a project to perform FileVault bruteforcin
29 matches
Mail list logo