I like the idea, so I was checking it out. I was confused by this
statement in the download terms:
> Since MyZone Client Application is open source, you will not change any
> part of MyZone’s code without the written approval of MyZone’s copyright
> owner Alireza Mahdian reached at (alireza.mahdia
Hi,
With all the recent news on NSA spying on social network users the concern over
the user privacy has increased even more. I am not arguing whether it is
ethical or not and whether it is needed for the safety of citizens and how
effective it would be. even before this, social network provide
Forwarded conversation
Subject: MyZone social network
From: *Alireza Mahdian*
Date: Thu, Jun 27, 2013 at 12:18 PM
To: building-a-distributed-decentralized-inter...@googlegroups.com
Hi,
With all the recent news on NSA spying on social network users the concern
over the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Passing this along for some friends of mine...
=
Data Dealer, the new game about digital privacy and online
surveillance (nonprofit, under CC)
Neat, promoted.
I can't say that I agree with the claim that all exit nodes are professionally
operated ;)
Moritz Bartl wrote:
>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA512
>
>Hi!
>
>I've just started a crowdfunding campaign for Tor exit relays and
>bridges.
>
>tl;dr: We collect donations
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi!
I've just started a crowdfunding campaign for Tor exit relays and
bridges.
tl;dr: We collect donations, and simply distribute them equally among
all Torservers.net partner organizations.
http://www.indiegogo.com/projects/tor-anti-censorship-an
Rich Kulawiec:
> On Wed, Jun 05, 2013 at 10:16:23PM -0700, Andy Isaacson wrote:
> > This is a really deeply interesting assertion. You seem to imagine a
> > bright line of "abuse" that is agreed on by all parties, with a policy
> > that can be implemented by thoughtful operators to "make the abuse
Thanks to Arturo Filastò for pointing this out:
https://github.com/SilentCircle/silent-phone-base/issues/5
Many remotely executable overflows in the ZRTP library used by Silent Circle.
NK
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stan
Hello!
Thanks, this is just in time, I'll try to use Elliptic Curve
cryptography (ECDHE) whenever possible =)
Kind regards,
On Thu, Jun 27, 2013 at 12:05 PM, Eugen Leitl wrote:
>
> (for the sake of completeness)
>
> http://www.theregister.co.uk/2013/06/26/ssl_forward_secrecy/
>
> A simple SSL t
On Wed, Jun 05, 2013 at 10:16:23PM -0700, Andy Isaacson wrote:
> This is a really deeply interesting assertion. You seem to imagine a
> bright line of "abuse" that is agreed on by all parties, with a policy
> that can be implemented by thoughtful operators to "make the abuse
> stop". I submit tha
(for the sake of completeness)
http://www.theregister.co.uk/2013/06/26/ssl_forward_secrecy/
A simple SSL tweak could protect you from GCHQ/NSA snooping
It might slow you down, but hey, you can't have everything
By John Leyden, 26th June 2013
Forward Secrecy
An obscure feature of SSL/TLS call
And though CFP is over, I will be in DC for meetings for Blue Rose until
maybe Saturday, now, it looks like, if anyone wants to get together!
I am renewing my researcher card and camping out at LOC at the law library
as "coworking space" when not in meetings.
It will feel like the late 90s (only
Robert, Kristin, Kody
Thanks for you feedbacks and for forgiving me to have missed it the first
time.
Good to know that this work is still around, although it is not that fresh
now and should probably be used with care (and of course the CC ND is
unfortunate for anyone willing to update or transla
On Wed, Jun 26, 2013 at 04:02:15PM -0700, Mike Perry wrote:
> YaCY and other FOSS engines (in a sibling thread someone mentioned
> another that I already forgot) are also something that I will accept
> search plugins for the Omnibox, but their result quality, index depth,
> and crawl frequency are
14 matches
Mail list logo