On Fri, Aug 19, 2016 at 11:22:48AM -0700, Jenna Burrell wrote:
> When considering usage, don't forget to think about phone sharing. There's
> a piece I wrote a while back (pre smartphone) that discusses practices
> around phone sharing in rural Uganda and the related gender dynamics:
> -- http://on
Libtech folks:
This month's San Francisco Techno-Activism Third Monday has two very special
guest speakers, who I thought you would all appreciate:
MARIETJE SCHAAKE, one of the leading lights in Internet issues in the European
Parliament, and KAJA KALLAS, who as a Parliamentary member for Estonia
ing
cordoning material, and encrypting that, but not creating a deniable
partition.
d.
>
>On Monday, October 6, 2014 2:53 PM, Danny O'Brien wrote:
>
>On Mon, Oct 06, 2014 at 05:56:59PM +0100, Eleanor Saitta wrote:
>> On 2014.10.06 01.56, Bill Cox wrote
On Mon, Oct 06, 2014 at 05:56:59PM +0100, Eleanor Saitta wrote:
> On 2014.10.06 01.56, Bill Cox wrote:
> > I will have an impact on the code going forward. Also, I am
> > entirely a pragmatist. I am an engineer, not a cryptographer, and
> > I build stuff that works in the real world. Can you exp
(Apologies if you get this via a few mailing lists. I've tried to spread
it widely yet thinly. And of course, feel free to forward yourself, if
only so I get less blame for over-forwarding)
The newly created Review Group on Intelligence and Communications
Technologies is seeking public comment on
loud security has
never looked so precarious, nor attacks more well-funded.
d.
> On Wed, Jul 31, 2013 at 7:32 PM, Danny O'Brien wrote:
> > Of course, such remote attestation/control works as well for
> > privacy-preservation as it does for DRM -- not very. If you *have* the
>
On Fri, Jul 26, 2013 at 03:18:58PM -0700, Steve Weis wrote:
> DRM technologies have a flip side as privacy-preserving technology.
> It's all a matter of whose data is being protected and who owns the
> hardware.
>
> We generally think of DRM in cases where the data owner is large
> company and an
On Wed, Jul 24, 2013 at 12:14:59AM +0100, Caspar Bowden (lists) wrote:
>So the spying on the rest-of-the-world's data sent to the US, including
>"information with respect to a foreign-based political organization or
>foreign territory that relates to the conduct of the foreign affairs o
On Wed, Jul 17, 2013 at 09:52:06AM -0400, Joseph Lorenzo Hall wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
>
> On Wed Jul 17 01:27:27 2013, Catherine Roy wrote:
> >
> >> Also, has the EFF's formal objection had any effect?
> >
> > To my knowledge, no information has yet been made
On Wed, Jul 17, 2013 at 01:27:27AM -0400, Catherine Roy wrote:
> Hi Jonathan,
>
> On 2013-07-16 02:04, Jonathan Wilkes wrote:
> >Hi Catherine,
> >Thanks for the link! I didn't know about that effort until now.
> >
> >It seems like there are two fronts-- one, which you address by
> >jettisoning EM
On Sat, Mar 16, 2013 at 01:31:19AM -0400, Griffin Boyce wrote:
> Ali-Reza Anghaie wrote:
>
> These wins, even if not permanent, are very meaningful.
>
> Well done. Well done indeed. -Ali
>
>
> They also give a window in which more positive action can happen. Despite
> being very bus
I received this message from a colleague; they've given me permission to
ask on open forums, provided I maintain their anonymity. I can field
questions about their project, although I think the threat model here is
targetted traffic surveillance by existing centralised security
services, and the ex
<--- Forward as much as you like --->
Hey everyone,
Every month, a group of hacktivists in New York working on
anti-censorship and anti-surveillance team meet up to collaborate, meet
new friends, and recruit for projects. We're starting a cousin event
here in San Francisco, and t
On Fri, Dec 21, 2012 at 07:26:44PM +0200, Nadim Kobeissi wrote:
> On Fri, Dec 21, 2012 at 6:56 PM, Nathan of Guardian <
> nat...@guardianproject.info> wrote:
>
> On 2012-12-21 20:22, Brian Conley wrote:
>
> This is a long way of asking, is Goohke Hangout functionally better?
>
On Wed, Dec 19, 2012 at 05:26:05AM +, Jacob Appelbaum wrote:
> Hi,
>
> fr...@journalistsecurity.net:
> > But if
> >> you're getting information security advice from a Forbes blog, that
> >> will be the least of your worries.
> >
> > Where would you suggest we get information security advice f
On Mon, Dec 17, 2012 at 10:49:33AM -0700, fr...@journalistsecurity.net wrote:
> If anyone here has any thoughts about the tools recommended in this
> Forbes piece, please speak up. The piece gets specific with
> recommendations form Ashkan Soltani, a technologist who I do not think
> is on this lis
On 10/15/2012 05:55 PM, Lee Fisher wrote:
FYI, Mozilla clarifies policy on B2G RIL blobs.
[The platform might become a handset option, someday, in some countries,
starting with Latin America, AFAIK. Today you can dual-boot it on a few
Android v4 phones.]
https://wiki.mozilla.org/B2G/RIL
https://
Just to add to this:
It's surprising just how much of the old cryptowar language is still hanging
around ready to trip someone up. The US government is still unwilling to grant
blanket exemptions for classes of crypto-using products, so the only way you
can know whether you're violating the br
18 matches
Mail list logo