On Tue, Jul 16, 2013 at 4:45 PM, James S. Tyre jst...@eff.org wrote:
For those interested, we filed a new lawsuit against the NSA today. We have
another still
in litigation, but this one focuses on a specific aspect of the new
revelations.
Intro, FAQ and a link to the Complaint at
Micah,
There's uh, this one.
http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0x25B37ACACC82107B
(warning: ascii goatse)
They tried again w/ his other key, but.. mostly fail-ish.
http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0x642AFAB27F6A5517
-Jason Gulledge
@ramdac
On 7/17/13 7:45
Couldn't be prouder to see a Unitarian Universalist church heading up the
plaintiffs. ;)
James, I was thinking today, this is something you might know who should be
thinking about it. Or anyone else DC oriented, here.
There's a major potential culture jam to be wedged regarding the national
On 17 July 2013 06:45, Micah Lee micahf...@riseup.net wrote:
I'm working on a talk for OHM2013 about PGP. Can anyone send me examples
of interesting keys in key servers that you know of?
http://shoestringfoundation.org/cgi-bin/blosxom.cgi/2004/07/01
For example, attempts at XSSing Enigmail
On Mon, Jul 15, 2013 at 02:17:38PM -0700, Tony Arcieri wrote:
They seem to have an... interesting philosophy about open source:
When you have an entire planet looking at the source code you can be
assured that the implementation is highly scrutinized and proven.
Apparently all you have to
According to newspapers [1], one of the outcomes of the NSA leaks is to
push Russian secret services to use typewriters.
Sounds a bit like a joke... how serious is this?
However it's very likely that some form of de-cloudification is going to
happen.
What steps will take government and corporate
According to the order document this is serious:
http://www.zakupki.gov.ru/pgz/public/action/orders/info/common_info/show?notificationId=6495414
On 07/17/2013 12:52 PM, A.Cammozzo wrote:
According to newspapers [1], one of the outcomes of the NSA leaks is to
push Russian secret services to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed Jul 17 01:27:27 2013, Catherine Roy wrote:
Also, has the EFF's formal objection had any effect?
To my knowledge, no information has yet been made public regarding
the outcome of this formal objection. There has been a second
formal
From: Rochelle Harris rochel...@gmail.com
Cc: rac...@ideastap.com
Hi everyone,
A favour to ask please for a friend:
Anyone know any hacktivists who might be up for being interviewed for
IdeasTap. If they don't want their real name published, it can be done
anonymously. Message me or email
I am also curious to know please - what is the situation with
hacktivists? How do you find them?
That depends entirely on your definition of 'hacktivist'. Is it
a) Most of the people on this list - i.e. activists who heavily use the
internet for their activism?
b) Hackers (Jargon file
Maybe some clues about the aim(s) and the subject(s) of the interview
would help ?
As far as I know, hacktivist is a very global label which covers a lot
of actions, groups and situations.
How do you find them?
online ;)
--
Amaelle Guiton
Journalisme au futur extérieur @ Radio France
Hi
You can find them via their chat servers or their official twitter accounts.
Another way is to contact with them via their websites/blogs. But for all of
the methods you need to let them to trust you.
Dr.Arif YILDIRIM
On 17 Tem 2013, at 18:19, Amaelle G amae...@micro-ouvert.net wrote:
Also, there's quite a bit of work on keyboard emanations (listening
to sound from keyboards) which could be applied to typewriters with
little modification. So these had better be well-swept (against
listening devices) rooms! Or have tons of typewriters in each room...
or dynamically realocate
Some of us are very public. But then, I don't code anymore. ;) It does
get odd in definitions.
http://www.sfbg.com/politics/2013/06/20/hackivist%E2%80%99s-call-culture-engagement
Yrs,
Shava Nerad
shav...@gmail.com
On Jul 17, 2013 10:42 AM, Yosem Companys compa...@stanford.edu wrote:
From:
On Wed, 17 Jul 2013 10:18:44 -0700
Collin Sullivan coll...@benetech.org wrote:
http://unsene.com/blog/2013/06/15/is-most-encryption-broken/
haystack called and wants its media pitch back
They say AES is broken and yet, Military-grade security protects your
important private messages,
It's so strong that we can't export it to Cuba, Iran, Sudan, and North
Korea.
Perhaps they should stop using pictures of Green Movement activists as an
advertisement if they are going to be ignorant and spineless about export
controls.
On Wed, Jul 17, 2013 at 1:38 PM, liberationt...@lewman.us
On 07/17/2013 01:54 PM, Collin Anderson wrote:
Wait, forgive me Libtech for amusing myself at the cost of your
collective inboxes but, is it just me or is the security page on what
purports to be a security tool empty? https://unsene.com/security.html
Hey, they have only funded $1,200 of their
On Wed, Jul 17, 2013 at 1:54 PM, Collin Anderson
col...@averysmallbird.comwrote:
Wait, forgive me Libtech for amusing myself at the cost of your collective
inboxes but, is it just me or is the security page on what purports to be a
security tool empty? https://unsene.com/security.html
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wednesday, July 17, 2013 01:54 PM, Collin Anderson wrote:
Wait, forgive me Libtech for amusing myself at the cost of your
collective inboxes but, is it just me or is the security page on
what purports to be a security tool empty?
On Wed, Jul 17, 2013 at 10:18 AM, Collin Sullivan coll...@benetech.org wrote:
http://unsene.com/blog/2013/06/15/is-most-encryption-broken/
HALP. I've slipped on a snake oil spill and can't get up!
[...]Here’s why we think many of these encryption algorithms are cracked;
[...]
• These entities
On Wed, Jul 17, 2013 at 12:54 PM, Collin Anderson
col...@averysmallbird.com wrote:
Wait, forgive me Libtech for amusing myself at the cost of your collective
inboxes but, is it just me or is the security page on what purports to be a
security tool empty? https://unsene.com/security.html
It's
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/17/2013 10:42 AM, Yosem Companys wrote:
I am also curious to know please - what is the situation with
hacktivists? How do you find them?
It is certain that at least a few of them are monitoring this mailing
list in some capacity. All
The cover of Philip Agee's book CIA Diary: Inside the Company is a
picture of his typewriter--rigged by the CIA to capture what he wrote.
On Jul 17, 2013, at 10:11 AM, Joseph Lorenzo Hall wrote:
Also, there's quite a bit of work on keyboard emanations (listening
to sound from keyboards)
Hey all,
One topic that hasn't gotten enough public attention is the practical
impact of surveillance programs on human rights work. This is a subject
WITNESS is going to explore in a blog post next week, and I'm curious if
any of you are anticipating challenges in communicating and exchanging
How about folks from this group ?
http://www.hacktivismo.com/about/index.php
17.07.2013 20:42, Yosem Companys пишет:
From: Rochelle Harris rochel...@gmail.com
Cc: rac...@ideastap.com
Hi everyone,
A favour to ask please for a friend:
Anyone know any hacktivists who might be up for being
Dear All,
I need your help!
Could you please advise me how to stop online proxy votes? Cookie blocker
and IP blocker have already been installed for
http://www.human-dignity-forum.org/2013/04/kirity-roy/.
However it looks some people are misusing the online voting system. Could
you please let
On 17/07/2013 21:22, Nick wrote:
Quoth Fabio Pietrosanti (naif):
If a JPEG is converted to PNG, maybe all metadatas are lost. (this
has to be verified)
If a DOC/DOCX is converted to a PDF, maybe all metadatas are lost.
Interesting topic. I'd be most worried about watermarks, as
depending
* Buddhadeb Halder:
However it looks some people are misusing the online voting system. Could
you please let me know how to prevent such proxy voting?
I think proxy voting is a technical term with a totally different
meaning (a proxy is someone who casts a vote on behalf of someone who
is
Seconding Florian.
You could try finding lists of free proxy servers and preventatively block
them. You could set up a rule that looks for many votes coming in either
all at once or once every X seconds.
You could try requiring cookies and captchas.
But all of these methods can be circumvented,
Sure it's all technically possible but as Lucas pointed out it's all a
matter of economies of scale.
Model dragnet surveillance is enabled by how cheap and easy it is to do
things through software. Bugging typewriters will require a lot more
deliberate precision and man hours.
Mass leaking of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/17/2013 04:01 PM, jvoisin wrote:
On 17/07/2013 21:22, Nick wrote:
Quoth Fabio Pietrosanti (naif):
If a JPEG is converted to PNG, maybe all metadatas are
lost. (this has to be verified)
Our ObscuraCam app for Android strips all EXIF metadata
You could also require email confirmation and block the disposable
providers
(http://www.ghacks.net/2012/05/31/the-ultimate-disposable-email-provider-list-2012/).
On 7/17/13 1:28 PM, Sahar Massachi wrote:
Seconding Florian.
You could try finding lists of free proxy servers and preventatively
You could ask for money for each vote. Then double voting would be to your
favour.
real.
On Wed, Jul 17, 2013 at 10:50 PM, Buddhadeb Halder bhalder...@gmail.comwrote:
Dear All,
I need your help!
Could you please advise me how to stop online proxy votes? Cookie
blocker and IP blocker
Fabio Pietrosanti (naif) li...@infosecurity.ch wrote:
Hi all,
i've been thinking about the topic of metadata cleanup of files from an
implementation point of view.
Media metadata is incredibly fascinating :D Obscuracam does a really
great job of cleaning up jpegs, but doesn't cover the
From: Rochelle Harris rochel...@gmail.com
I am also curious to know please - what is the situation with
hacktivists? How do you find them?
It might help to break this problem into pieces:
1) Based on your story angle, define hacker/hacktivist
2) Locate people who meet that criteria
Hi Joseph,
On 2013-07-17 09:52, Joseph Lorenzo Hall wrote:
To my knowledge, no information has yet been made public regarding
the outcome of this formal objection. There has been a second
formal objection filed that is also awaiting resolution [6].
I have had a hard time figuring out what,
Hi,
I've been researching the Fortuna PRNG and found a good implementation within
PostgreSQL. I ripped out a big chunk of the code in pgsql/contrib/pgcrypto and
turned it into libfortuna. My first tests are positive, seems to work. I'm
building on FreeBSD, but should work on other BSD/Unix
On Wed, Jul 17, 2013 at 01:27:27AM -0400, Catherine Roy wrote:
Hi Jonathan,
On 2013-07-16 02:04, Jonathan Wilkes wrote:
Hi Catherine,
Thanks for the link! I didn't know about that effort until now.
It seems like there are two fronts-- one, which you address by
jettisoning EME in
On Wed, Jul 17, 2013 at 09:52:06AM -0400, Joseph Lorenzo Hall wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed Jul 17 01:27:27 2013, Catherine Roy wrote:
Also, has the EFF's formal objection had any effect?
To my knowledge, no information has yet been made public
39 matches
Mail list logo