FYI
Forwarded Message
Subject: A crowdfunding campaign to build a free baseband
Date: Mon, 6 Apr 2015 05:41:54 GMT
From: Spacefalcon the Outlaw fal...@ivan.harhan.org
To: replic...@lists.osuosl.org
Hello free phone lovers,
As we all know, the
On 03/22/2015 04:47 AM, Florian Weimer wrote:
It's been reported that the U.S. State Department hands out laptops
with anonymization capability to dissidents in select regions. (I can
dig out the exact reference, I thnk I've read it in Lettre
International.)
Do we know what kind of
How would one map an entire city's surveillance anyway? Are the
location of police cameras available? And even if they are, how
does one map out all the private cameras watching?
To the OP, Seattle Privacy http://seattleprivacy.org/ has a map of
Seattle.gov's mesh network, at least parts of
There was a good thread on this topic on the OSS-Security list, and
another, probably this list about 6 months ago.
It'd be worth studying Tor's Thandy, a secure update tool. I wish I
could recall why Tor abandoned Thandy, that might be important. :-(
There might be clues in Trac.
On 5/9/14 1:08 PM, Steve Weis wrote:
Hi Tom. Does hibernation on a Mac protect from physical memory
extraction by default or is this something yontma configures?
There may be an ACPI/UEFI attack here... UEFI Runtime Service drivers
continue to run in the background while the main OS is
Stop waiting.
http://www.bunniestudios.com/blog/?p=3750
http://www.crowdsupply.com/kosagi/novena-open-laptop
On 2/26/14 9:45 PM, Al Billings wrote:
I’d wait a few months since Bunnie says they’ll make an
announcement when they’re ready for people to do so.
From: Blibbet Blibbet
Reply
Been on vacation? :-)
I wish. It was news to me, sorry if this was old news to everyone.
But, as of today, they still need funding, so is not over yet, perhaps
re-visit site and fund at a higher level. :-)
Thanks.
--
Liberationtech is public archives are searchable on Google. Violations
Hi list,
Hi,
Please also search the list's archives -- and archives of tor-talk at
torproject.org -- as in the last year or so there've been about 4
threads on WoT privacy/security issues that you are asking.
Also check out:
https://we.riseup.net/riseuplabs+paow/openpgp-best-practices
If
Hi,
We're trying to build a list of contacts to
(city,county,state,county)-based privacy groups, to
see if a multi-city coalition would be helpful. I have private contacts
that I'm hoping to shortly have a mailing list setup, so they can
communicate better.
Below is summary of results of my
I'm trying to build a list of contacts to city-based privacy groups, to
see if a multi-city coalition would be helpful.
[...]
Just in case you are interested in cities outside the US as well, [...]
Thanks Fabian!
Yes, please! All cities which're organized.
And scope is also not just at city
Hi,
I'm trying to build a list of contacts to city-based privacy groups, to
see if a multi-city coalition would be helpful.
So far, I know about Seattle, Oakland, and Los Angeles:
Seattle Privacy
https://www.seattleprivacy.org/
Oakland Privacy
Any suggestions?
Buy commodity parts and build the 3D printed parts and assemble your own
Novenas.
http://www.kosagi.com/w/index.php?title=Novena_Main_Page
http://www.bunniestudios.com/blog/?p=3597
http://www.bunniestudios.com/blog/?p=3265
http://www.bunniestudios.com/blog/?tag=novena
PS:
(We call the bad version of Secure Boot, where the user does not have
the ability to modify the set of trusted keys or disable the system,
Restricted Boot.)
We have discussed the idea of trying to become a root key holder for
Secure Boot, working with OEMs to by default trust GNU/Linux distro
I don't think so -- unless you have a laptop flashed with a free
software BIOS / boot firmware that you can inspect and modify. There are
a handful of dated possibilities out there like that (Thinkpad x60
models that support coreboot, Lemote Yeelongs), but not the vast
majority of laptops. The
I stumbled upon UPR these last days. It does not work on my machines.
But the idea sounds good. Yet I could not find anything like it. Tails
comes close, but the network is enabled.
AFAIK, there are only 2 privacy-centric distros that disable networking:
UPR and Tinfoil Hat Linux.
Outrageous.
tragic.
Would this work?
http://www.justice.gov/pardon/pardon_instructions.htm
--
Liberationtech is a public list whose archives are searchable on Google.
Violations of list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech.
Has anyone taken a run at would it take to have a independent,
space based data haven?
The Constellation project might be a place to start looking.
https://lists.shackspace.de/mailman/listinfo/constellation
http://aerospaceresearch.net/constellation/aboutconstellation.php
--
Liberationtech is
(1) A unique key built into each device, which can't be read directly
by software, but which can be used to derive other keys (e.g. for disk
encryption) at a limited rate, slowing down brute-force attacks
against such keys.
(2) An effaceable area of flash storage where the operating system can
I think, this kind of tool doesn't exist yet.
I wonder if Thandy - the Google(?)-funded Tor secure installer tool --
be used for securely-installing software other than Tor?
https://gitweb.torproject.org/thandy.git
--
Too many emails? Unsubscribe, change to digest, or change password by
apt-get install tor torify wget http://path.to/file
And how did you verify the trust path for your initial debian install
It is easy enough for me, nearly impossible for regular users.
FYI, there was recently an interesting thread on the OSS-Security list
on this topic:
Subject:
Good list: Yeeloong, Coreboot, Opencores, etc.
This book isn't bad for explaining some of the general problems:
http://www.amazon.com/Embedded-Systems-Security-Practical-Development/dp/0123868866
In addition to UEFI alternatives, I'd also argue that we need to fix
UEFI, to handle the use case
On 6/12/13 10:21 AM, John Adams wrote:
[...] This is one of the reasons why the EFF does not recommend
tools. The issues associated with each tool are myriad and vast. [...]
Huh? The EFF Surveillance Self Defense article, while out-of-date,
does recommend tools.
https://ssd.eff.org/tech
--
22 matches
Mail list logo