Hi all,
It has been reported on some websites that cellular carriers and ISPs in
Egypt no longer provide credit to recharge accounts for Internet and GSM
access. Can anyone in Egypt or those with contacts there confirm this?
The current military rule may want to limit access to the net in this
On 25-07-13 19:14, Jonathan Wilkes wrote:
On 07/25/2013 07:14 AM, Mitar wrote:
Hi!
Some very good arguments *for* DRM on the web:
http://unitscale.com/mb/bomb-in-the-garden/
On the first pages,the author makes this point:
The web is good at making information free. Which he contradict in
Hi!
On Thu, Jul 25, 2013 at 6:15 AM, Nick liberationt...@njw.me.uk wrote:
But his wider point that everything sucks if it's designed with
advertising as the only business model is fair, and an important
issue. DRM cannot be a fair and reasonable solution, needless to
say, but it is a pity
Scenario: you, Alice, realize you're under NSA surveillance. You need to
get a crucial bit of information to your friend Bob, right away.
You've been using PGP, but now you suspect the NSA may have installed a bug
on your machine. Your keystrokes are being recorded.
What can you do? Use PassLok
On 07/26/2013 08:06 AM, Mitar wrote:
Hi!
On Thu, Jul 25, 2013 at 6:15 AM, Nickliberationt...@njw.me.uk wrote:
But his wider point that everything sucks if it's designed with
advertising as the only business model is fair, and an important
issue. DRM cannot be a fair and reasonable solution,
Obviously, these issues have been very thoroughly discussed
by Corey Doctorow and Larry Lessig. DRM has not proved to be
effective at safeguarding intellectual property. It seems
to be most effective as a tool in maintaining limited
monopolies, since it stops other companies from investing
in
Francisco Ruiz r...@iit.edu writes:
Scenario: you, Alice, realize you're under NSA surveillance. You need
to get a crucial bit of information to your friend Bob, right away.
You've been using PGP, but now you suspect the NSA may have installed
a bug on your machine. Your keystrokes are being
You should use ContentSecurityPolicy to help avoid XSS attacks:
http://content-security-policy.com/
https://people.mozilla.com/~bsterne/content-security-policy/
Regards,
David
On Fri, 26 Jul 2013 15:42:02 -0500, Francisco Ruiz r...@iit.edu wrote:
Scenario: you, Alice, realize you're under
DRM technologies have a flip side as privacy-preserving technology.
It's all a matter of whose data is being protected and who owns the
hardware.
We generally think of DRM in cases where the data owner is large
company and an individual owns the hardware. In this case, DRM stops
you from copying
Also interestingly explored in Vernor Vinge's Rainbow's End
On 07/26/2013 06:18 PM, Steve Weis wrote:
DRM technologies have a flip side as privacy-preserving technology.
It's all a matter of whose data is being protected and who owns the
hardware.
We generally think of DRM in cases where
On Fri, Jul 26, 2013 at 1:42 PM, Francisco Ruiz r...@iit.edu wrote:
Scenario: you, Alice, realize you're under NSA surveillance. You need to
get a crucial bit of information to your friend Bob, right away.
You've been using PGP, but now you suspect the NSA may have installed a bug
on your
If you assume communications are monitored and your machine is
compromised, this has some fundamental flaws:
- How do I communicate a password to Bob? Before I get a crucial bit
of information to Bob, I need to first get a crucial bit of information to Bob?
- You assumed a keylogger is installed.
These TPMs are being abused. You should be able to install your Linux
on your general purpose computer. Even if Windows and the OEM enable
the TPM, you should be given the ability to disable that. And that is
not the case in many OEM Windows 8 computers. I dual boot all my
computers. I have the
Everybody is asking Facebook, Google et al whether they've been
compelled to share users' personal information, but I've yet to hear
whether they've been asked to selectively alter the scripts they serve
to millions of third-party sites for analytics, fonts, social widgets,
etc.
Has anybody been
Does anyone know, if this tool is really secure?
Fwd:
DOWNLOAD PRESS RELEASE 2013-07-27 - English / Deutsch weiter unten
_ _ _
/ | | | | | _ \
| | __ ___ | | __| | |_) |_ _ __ _
| | |_ |/ _ \| |/ _` | _ | | | |/ _` |
| |__| | (_) | | (_| | |_) | |_| |
Thanks, Greg. I knew Rainey had done the talk, but I hadn't seen it before.
On the same general subject, a new article by James Bamford, who's been digging
into NSA
longer than anyone.
http://www.nybooks.com/articles/archives/2013/aug/15/nsa-they-know-much-more-you-think/
--
James S. Tyre
Law
Mentioned in the talk,
Freedom of the Press Foundation (Jul 2) - Encryption Works: How to
Protect Your Privacy in the Age of NSA Surveillance by @micahflee:
https://pressfreedomfoundation.org/encryption-works
Interesting to see the above 'Encryption works' quote making
the rounds.
Similarly
17 matches
Mail list logo