Thanks for your work, Yosem.
-Andreas
Am 24.02.2017 um 01:46 schrieb Yosem Companys:
> Dear List Subscribers,
>
> As of today, I have ceased to be a moderator of all Stanford Liberationtech
> lists.
>
> I feel like Superman when he loses his powers, except I hope the ending is
> more like this:
Dear Peter,
You do still have the possibility to use two different systems, e.g.
Linux/OSX for important data and Windows for the rest.
If this is no solution for you then you can just stay with Windows 8;
ignore the "feeling" that you need to upgrade.
"Never change a running system."
Kinds,
Hey guys,
we are currently looking for trainees and volunteers for our Strategic
Intellegence Network in TOR:
http://4iahqcjrtmxwofr6.onion/
If you are interested in joining our team please write a mail with your
to noergelpi...@riseup.net or ironsold...@safe-mail.net
Thank you!
--
Coursera says its not them, its an US export regulation. And this is related to
all sanctioned countries, including Syria, Sudan and Cuba, not only Iran. I
don't think that Coursera decided to do this by itself. Stanford University
also offers Coursera courses btw.
Andreas
Source:
Felix von Leitner says that is's not like that, check his blog at blog.fefe.de
:)
-Original Message-
From: Richard Brooks r...@acm.org
Sender: liberationtech-boun...@lists.stanford.edu
Date: Tue, 31 Dec 2013 09:54:56
To: liberationtechliberationtech@lists.stanford.edu
Reply-To:
Why not also JonDonym? The problem with TOR for productivity is its bandwith.
There are also some pretty good commercial services.
Andreas
--Originalnachricht--
Von: Eugen Leitl
Absender: liberationtech-boun...@lists.stanford.edu
An: cypherpu...@cpunks.org
An: Liberation Technologies
An:
Eugen Leitl:
Grimes: How many exploits does your unit have access to?
Cyber warrior: Literally tens of thousands -- it's more than that. We have
tens of thousands of ready-to-use bugs in single applications, single
operating systems.
Grimes: Is most of it zero-days?
Cyber warrior:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Nadim,
I could translate the german version of Cryptocat, please send me the
notes.
Greets,
Andreas
-BEGIN PGP SIGNATURE-
iQEcBAEBCgAGBQJRnmc6AAoJEL1atOfcpCabrPYH/RmVcW4VIixvxnj95Gs9XH/o
I am a Member of the Piraten in Germany.
Let me answer with a question. Do you really think a party like that has a
chance in the USA?
Diese Nachricht wurde Ihnen von meinem BlackBerry® von 11 gesendet. Bestellen
Sie diesen Service unter www.1und1.de.
-Original Message-
From: Andrés
How about AIO Solutions like Blackberry?
Diese Nachricht wurde Ihnen von meinem BlackBerry® von 11 gesendet. Bestellen
Sie diesen Service unter www.1und1.de.
-Original Message-
From: Bernard Tyers - ei8fdb ei8...@ei8fdb.org
Sender: liberationtech-boun...@lists.stanford.edu
Date: Mon, 6
Griffin Boyce:
Jacob Appelbaum ja...@appelbaum.net wrote:
When people ask how secure BBIM is - I suppose we can now cite RIM's
official documentation on the topic - without a BES server, it's
encrypted with a key that is embedded in all handsets.
This was critical in the London Riots
Hisham:
Hi all,
Activists whose sites come under attack struggle to find cheap solutions to
keep their websites safely guarded. Many of them are looking for
secure, inexpensive hosting. I've come across many such cases, from
Senegal, to Zambia to Egypt to Morocco. Some of them ask for
,
Treat yourself to a love one
On Sun, Mar 31, 2013 09:21:13 AM +, Andreas Bader wrote:
How could that happen?? This Email Adress is existing since a week
or two and is only used for trusted contacts and Libtech/Drones
List!
From: mark ! write2ma...@gmail.com
To: andreas.ba
Steve Weis:
A new session of Dan Boneh's free online crypto course is starting today:
https://www.coursera.org/course/crypto
Thanks, started it =)
Seems to be for amateurs, but I will see.
-Andreas
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at
Hi all - at the risk of shilling, my company has released an Open
Source tool called You'll Never Take Me Alive. If your encrypted
laptop has its screen locked, and is plugged into power or ethernet,
the tool will hibernate your laptop if either of those plugs are
removed. So if you run out
Anthony Papillion:
On 03/22/2013 05:23 AM, Joseph Lorenzo Hall wrote:
On 3/21/13 9:36 PM, Michael Carbone wrote:
Anyone looked into the reports that Skype leaks your IP
address? Apparently you do not have to interact with the person
whose location you are interested in to be able to get
Anthony Papillion:
On 03/22/2013 02:21 PM, Andreas Bader wrote:
Anthony Papillion:
On 03/22/2013 05:23 AM, Joseph Lorenzo Hall wrote:
On 3/21/13 9:36 PM, Michael Carbone wrote:
Anyone looked into the reports that Skype leaks your IP
address? Apparently you do not have to interact
Anthony Papillion:
On 03/22/2013 03:25 PM, Joseph Lorenzo Hall wrote:
On 3/22/13 3:21 PM, Andreas Bader wrote:
Is this the same Script Kiddie Hack that was available for IQC a few
years ago? Don't you think that will solve itself?
Not familiar with that hack...
This one essentially
Louis Suárez-Potts:
One is tempted to suggest using other than Skype. Alternatives exist, and
these are secure, at least according to their claims. As well, Skype's code
is not transparent, in the way that other, open source, applications' are.
louis
What alternative do you exactly mean?
Remember the Cyberwar discussion we had some weeks ago?
Now the NATO official defines the Cyberwar:
http://ccdcoe.org/249.html
Andreas
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
Heather:
Hi all,
For those that aren't aware, 800,000 Rohingya Muslim people in Burma are
being cut off from communication as the military and government try to
drive them out of the country. Over 100,000 are being starved to death
in concentration camps, the rest are driven into boats
drone_guinness1 borgnet:
...end users using Linux :-D (good one)
so you say that android users aren't end users?
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
anonymous2...@nym.hush.com:
Thanks, yes I also have seen young and old people use linux but I've also
seen hundreds of people trained to use it and as soonas they have to update a
package in Linux, get confused and reach for a windows machine. The NGO in a
box stuff is ok but not what I am
On 22/02/13 03:53, Charles Zeitler wrote:
On Thu, Feb 21, 2013 at 8:10 AM, Eugen Leitl eu...@leitl.org wrote:
On Wed, Feb 20, 2013 at 09:03:06PM -0600, Charles Zeitler wrote:
http://en.wikipedia.org/wiki/Quantum_cryptography
Doesn't really work. Essentially, this is expensive
snake oil.
so,
On 02/12/2013 12:46 AM, Rich Kulawiec wrote:
On Mon, Feb 11, 2013 at 05:54:19PM +0100, Andreas Bader wrote:
Don't you think that e.g. DSL (Damn Small Linux) has less code than Android?
I don't know. While I'm somewhat familiar with DSL, I don't use
Android and know very little about it. I
On 02/12/2013 06:41 PM, Brian Conley wrote:
A good alternative for what use cases?
The problem I find with flat statements such as something like that
would be a good alternative to ChromeOS for activists is that it
fails to address what uses its providing a good alternative for. IE
you fail
On 02/11/2013 04:15 PM, Rich Kulawiec wrote:
On Mon, Feb 11, 2013 at 12:54:27AM +0700, Uncle Zzzen wrote:
Obviously systems are too complex for most people to really figure out
what's exactly running on their computer, and modern systems (from smart
phones to unity) make it harder and harder
On 02/07/2013 04:42 AM, Nadim Kobeissi wrote:
Actual headline.
http://www.extremetech.com/mobile/147714-cryptography-super-group-creates-unbreakable-encryption-designed-for-mass-market
NK
Notionally there is no unbreakable encryption.
Practically there is a unbreakable encryption (AES,
On 02/07/2013 11:58 AM, Jens Christian Hillerup wrote:
On Thu, Feb 7, 2013 at 11:41 AM, Andreas Bader noergelpi...@hotmail.de
wrote:
Notionally there is no unbreakable encryption.
Practically there is a unbreakable encryption (AES, SHA-3); our
standarts are more than adequate.
The risk
On 02/06/2013 07:28 AM, Nathan of Guardian wrote:
On 02/06/2013 01:22 PM, Ali-Reza Anghaie wrote:
How can projects like Privly play into it? Carrying a Tor Router along
with you or building one on-site. None of the operational matters will
ever be squarely addressed by one platform but it all
On 02/06/2013 04:24 PM, Tom Ritter wrote:
Nadim, I'm with you. I'm not sure it's the perfect solution for
everyone, but like Nathan said, if you already trust Google, I think
it's a good option.
On 6 February 2013 07:12, Andreas Bader noergelpi...@hotmail.de wrote:
Why don't you use an old
We started with the notion of Linux, and we were attracted to
Chromebooks for a bunch of reasons. Going back to Linux loses all the
things we were attracted to.
- ChromeOS's attack surface is infinitely smaller than with Linux
- The architecture of ChromeOS is different from Linux -
On 02/06/2013 08:36 PM, Brian Conley wrote:
Andreas,
Plenty of Syrians do have internet access, and use it on a regular basis.
Also, lack of appropriateness for one use-case doesn't necessitate
lack of appropriateness across the board.
Linux is a great solution for many use cases, but as
On 01/31/2013 04:39 PM, Gregory Foster wrote:
Thanks for bringing up this subject, Andreas.
I'll just add that aggression (cyber-aggression perhaps?) requires
actors. And as Andreas points out, on January 27th the Pentagon
announced approval of US Cyber Command's expansion from 900 personnel
On 01-29-2013 the website http://www.syrian-martyrs.com/ got hacked.
On 01-30-2013 there was a man in the middle attack on GitHub (?).
On 01-27-2013 the Pentagon was boosting the Cybersecurity Force.
On 01-14-2013 Red October was exposed.
And that were only the big incidents in this year. Things
On 01/31/2013 09:33 AM, Aaron Greenspan wrote:
Andres,
I don't think so. I also generally don't like the word cyberwar, as
(thus far) it's generally been used by reporters who aren't really
sure what they're talking about to scare people.
I think we have an increase in the number of
Thank you for that conclusion!
But I think you forgot one important thing:
This conflicts must all together culminate in something. What will that
be? The only parts that the war on piracy has are hacking offenses
like the Anonymous Operations. But I don't think that you can compare
that with
On 01/23/2013 03:41 AM, Alex Comninos wrote:
Cracking tool milks weakness to reveal some Mega passwords
Dotcom's Mega aids crackers by sending password hashes in plain-text
e-mail. Really!
http://arstechnica.com/security/2013/01/cracking-tool-milks-weakness-to-reveal-some-mega-passwords/
On 01/23/2013 01:40 PM, bbrewer wrote:
Andreas Bader noergelpi...@hotmail.de wrote:
Mega seems also to have an exploitable bug for email spaming.
A lot of bloggers report this.
All the money in the world, and still, so many listed problems on this new
service. Malicious intent, or just
On 01/21/2013 08:42 PM, Randolph D. wrote:
the secure alternative is htp://retroshare.sf.net
http://retroshare.sf.net
without payment, without google chrome sponsoring, without central
servers. a full alternative.
2013/1/21 Sam de Silva s...@media.com.au mailto:s...@media.com.au
Hi
On 01/14/2013 06:23 PM, André Rebentisch wrote:
fyi, André
Original-Nachricht
Betreff: [Crypto Stick News] Vulnerabilities of Self-Encrypted SSDs
Datum:Mon, 14 Jan 2013 17:14:51 +0100
Von: n...@crypto-stick.com
Antwort an: webmas...@crypto-stick.com,
You can unsubscribe from this list by following the instructions from
the bottom of this mail.
On 01/07/2013 06:38 PM, Margaret Silver wrote:
I am trying to unsubscribe. I never wanted to be on this list. Please
unsubscribe me. My email has been hacked.
Thank you
On Mon, Jan 7, 2013 at
On 01/04/2013 09:56 PM, Nadim Kobeissi wrote:
I would like to share this truly fascinating article:
http://www.salon.com/2012/12/31/north_korea_cracks_down_on_knowledge_smugglers/
From the article: “We must extend the fight against the enemy’s
ideological and cultural infiltration,” Kim said
On 12/28/2012 12:46 PM, Maxim Kammerer wrote:
On Fri, Dec 28, 2012 at 10:49 AM, Julian Oliver jul...@julianoliver.com
wrote:
I've been extensively questioned at the border on a few occassions over the
years /because/ my laptops don't have a Desktop as such, no icons either.
Both
my arms
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 11/30/2012 04:06 PM, Rafal Rohozinski wrote:
Sorry folks, a bit of Google dyslexia… here is the proper public link for the
brief report. Nothing
really new here except for the fact that we were tracking withdrawal of
routes as far back as the
45 matches
Mail list logo