Passing this along. The Internet Freedom Festival is always great and a very
welcoming environment with a wonderful team running it.
best,
Griffin
-- Forwarded message --
From: Sandy Ordonez
Subject: [OTF-Talk] IFF Fellowship: Applications Due this Week
> Hey Friends!!
>
> Just
Yosem Companys wrote:
If you would like to participate in the process of helping to shape
the new organization, please let me know. We will definitely need the
help of some good web developers and hackers to set up the new site.
Thanks,
Yosem
Hi Yosem,
If there's any way I can help, just le
Yosem Companys wrote:
On a more serious note, I want to thank all of you for a wonderful 9
years of discussions about Liberationtech issues.
Hi Yosem,
Thanks for shepherding this list for 9 (!) years. I've really enjoyed
the list and your moderation has been fairly hands-off, which is fairly
On 2017-01-30 11:44, Collin Anderson wrote:
Google cache indicates it was up yesterday, with references to Sec.
Kerry and Ambassador Power, etc. Humanrights.gov looks like a complete
mess overall right now, so perhaps what we are seeing in an artifact
of transition rather than a purging according
Hi all,
This morning, a colleague visited the DRL website only to find that
the content had been deleted. I checked another page and found it had
was no longer available.
- https://www.state.gov/netfreedom/index.htm
- https://www.humanrights.gov/issues/internet-freedom/
So... yeah... Th
Yosem Companys wrote:
The White House comment line (202-456-) has been shut down.
It is worth calling just to hear the message telling people to go away
and send their comments via Fb messenger!
I thought the bit about facebook messenger was odd, but it REALLY DOES
ask you to send the wh
Hi Lina,
While the content isn't encrypted for most of their apps, I would
recommend Sandstorm as a good hosted option for forums and other
collaborative apps. It's free for up to 5 apps (called "grains") and up
to 200MB storage. For more, it's $9 a month: https://sandstorm.io/
For enc
carlo von lynX wrote:
So maybe you should use mailing lists or forum software instead.
How am I supposed to post dank memes on a mailing list? On a serious
note, nothing is truly neutral, and if the whole goal is to just have a
place to share links, then Facebook is a decent option.
~Gri
Andrés Pacheco wrote:
recipient of NSA etc $$$
I'm pretty
Do you have a citation for this?
~Griffin
--
“I did then what I knew then, & when I knew better, I did better.”
― Maya Angelou
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get y
Hi Patricia,
For texting, I'd highly recommend TextSecure or Signal, which both
encrypt your text messages while being transmitted *and* secure texts in
an encrypted container. However, it requires internet access on the
phone to work. If you are working in low-signal areas, then encrypted
Jens Kubieziel wrote:
* Andrés Leopoldo Pacheco Sanfuentes schrieb am 2015-01-18 um 15:16
Uhr:
Is there such a thing? Reliable? Skype sucks, and it is a Microsoft
product
now (too flickery, etc.), and I don't know of others..
Another viable solution is palava.tv. This service uses WebRTC. See
Last April, Europarl found that the EU data retention directive violated
human rights. This you already know. But the EU ordered a legal
analysis of the ruling's after-effects as they relate to various forms
of intelligence-gathering and surveillance (such as sharing financial
data and passen
Nariman Gharib wrote:
Thank you.
The stats size is based on Download request which I received through
AWS which is something around 290,000 from 14Nov to 28Nov.
Subscribers: 84K
N
Whoa! That's really great :D That's a *ton* of people downloading.[1]
It's really interesting to see what th
I wonder if Twitter restricts accounts to one per phone number. Phone
verification is readily bypassed with something like twilio, but only
the *most* advanced users would be able to pull this off. It would be
worth setting up an app to allow Iranian users to bypass it
semi-automatically, bu
em here. I'm on Virgin media. also that url you
mentioned is showing the result of HTTP of Torproject website.
N
On Thu, Nov 6, 2014 at 4:11 PM, Griffin Boyce
wrote:
Apparently allowing unsurveilled/unfiltered speech is considered
adult content by many UK service providers.
Currently bloc
Apparently allowing unsurveilled/unfiltered speech is considered adult
content by many UK service providers.
Currently blocking:
British Telecom (sometimes)
EE
O2
Sky
Virgin Media
Vodafone
Special thanks to Scott Ainslie for bringing this to my attention:
https://www.blocked.org.uk/results?u
On 2014-08-25 05:10, Nariman Gharib wrote:
Hi,
FYI, Facebook has removed 'restricted access' to Facebook
developers platform for Iranian. [ this restricted were include all
Iranian[s] and not specific range of IPs)
Nice! :D Though SSL is still throttled for connections coming out of
the
Hi Charles,
This is different than your subject led me to believe ;-) I'd say
that the largest reason behind trying to restrict pornography is
societal control -- limiting self-determination through enforced stigma
and criminalization of consensual sex between adults. Maggie Mayhem has
wr
Maxim Kammerer wrote:
Too bad the talk was retracted, I was looking towards some
actual non-propaganda Tor hidden service statistics.
Wait.
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailm
Al Billings wrote:
> Or they were trolling you.
+1, although basically all large hacker-related events get surveilled in
some fashion.
On my end, my phone now magically turns itself on, and as a bonus will
sometimes drain entirely while "charging." But then again, it's partly
my own fault for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Andy Isaacson wrote:
>> this is exactly why some who have received these payloads are
>> sitting on them, rather than disclosing.
>
> Hmmm, that seems pretty antisocial and shortsighted. While the
> pool of bugs is large, it is finite. Get bugs fixe
grarpamp wrote:
> Please no clearnet website/dumps for files. You're not teaching anyone
> how to use crypto tools by giving them the easy way out. Make them
> download and use Tor, I2P, Freenet, gnupg, sha256, whatever. You can
> put those instructions on clearnet if you want.
I was thinking mo
Nick wrote:
> Quoth edhelas:
>> What about a Torrent ? We can easily share the magnet everywhere
>
> Note that there is a torrent of the cryptome archive up to 2011:
> magnet:?xt=urn:btih:ba401110a60ad844a09d4219e5f95a46385f7410
>
> But yes, bittorrent seems like a reasonable way to distribute th
On July 8, 2014 4:11:44 PM EDT, coderman wrote:
>hi Griffin!
>
>this is the type of effort i was hoping to see undertaken.
Me too ^_^ eventually I realized I'd have to do it myself if I wanted more info
on Topic X. I obviously don't have access to the source, but there are some
clear ways to ex
One approach is to take the existing public data, make some assumptions
(educated guesses) and do additional research on top of that. It's what I'm
doing right now. It's also what led to the original cointelpro revelations.
Before the follow-up research, it was a meaningless acronym.
Find, extr
Hey Yosem!
A good experiment might be to send out releases of factual security info to
counteract the dubious press releases that all too often turn into dubious
articles.
Yosem Companys wrote:
>Seems as though we need better tactics to share with journalists our
>impressions about securit
Seth David Schoen wrote:
It seems obviously crazy to me for Twitter to prevent people from
accessing it over Tor, both in light of widespread censorship of
Twitter
on different networks and in light of governments' attempts to find out
where users of services are connecting from.
Yes, agree
Jacob Appelbaum wrote:
I agree though I am happy that they don't completely lock out the
account to the point of it being impossible to login at all.
True. That would make it much worse for users in censored countries,
since they wouldn't be able to (for example) lock their account to hide
7;d likely want to do is change my
password. Why is that the *only option* that Twitter allows when in
this locked state?!
great, now twitter knows where I live =/
Griffin Boyce
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will ge
Rich Kulawiec wrote:
It's probably just been hacked. Since the principals haven't commented
yet, I suspect they're probably busy diagnosing and fixing it. I
suggest
ignoring the yapping on Twitter, having a nice microbrew, and awaiting
further developments.
My suspicion is that either the
Ryan Sleevi wrote:
Certificate pinning is one such way to mitigate this threat.
This is true. But
There need to be more options for users/allies to solidify a
connection to a website other than relying on the webmaster to get their
cert pinned (which happens almost never). Yes, som
On 2014-05-04 01:02, Nick wrote:
https://developer.chrome.com/extensions/crx is the documentation
that mentions the signing. There are a couple of scripts there that
will create a signed .crx file. I also wrote one a while ago[0].
I don't know how crx files integrate with Google's developer acco
Nathan Freitas wrote:
Automated distributed deterministic build comparisons FTW!
Seriously, it seems like we are pretty close with such a thing for
Android APKs, so perhaps Chrome extension bundles could be added to
the list, as well.
That sounds pretty awesome :D Apps and extensions are .c
Nick wrote:
Can you definitely not sign extensions with a private key?
This is not an option available to any of my extensions or apps,
unfortunately. There's reference to it in the documentation, but I've
never seen this as an option for apps or for my developer account.
Could you then
On 2014-05-02 20:35, Andrew Cady wrote:
On Fri, May 02, 2014 at 05:22:11PM -0400, Griffin Boyce wrote:
No, though I have two-factor authentication using a secure device
(not a cell phone), and I can't be vanned/rubber-hosed because I don't
actually know the password to my Google
Tom Ritter wrote:
I'm wondering about the update mechanism.
Do chrome extensions update over SSL? Is this update connection to
google pinned, so you have to compromise a specific CA, instead of any
CA?
Chrome packaged apps update over SSL from a domain that has its
certificate pinned. Rath
Hey all,
So lately I've been obsessively working on a project to get software
into people's hands and make it easy for them to see whether it's been
tampered with in-transit.
Code: https://github.com/glamrock/satori (download the zip)
App:
https://chrome.google.com/webstore/detail/satori/o
And, whether it's a Thunderbird bug or an Enigmail bug, Gmail emails
have a tendency to be sent (typically unencrypted) during draft
autosave. So that's fun.
Thunderbird makes me think of Mutt's slogan from 1995 - "All email
clients are terrible. This one is just less terrible."
~Griffi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Computing on a device you have full control over is not necessarily
secure, and offloading everything onto a machine (or set of machines)
that you have no real control over probably won't improve your security.
There's a lot of money to be ma
Nathan of Guardian wrote:
> Two things we are exploring with using OStel.co (aka SIP!) over Tor:
>
> - Supporting TCP mode for RTP media streaming in Jitsi, Linphone, in
> order to use SOCKS proxying over Tor
>
> - Using a Jitsi video bridge in the same configuration:
> https://jitsi.org/Projects
Nick wrote:
> Yep, and it worked well, with really good quality, even projected onto
> a big screen. Questions were asked to him over IRC (mostly through
> audience members on their laptops, some via a volunteer at the front).
> I got the impression there was a bit of latency, but in this context
>
I didn't submit anything personally, but *HIGHLY* recommend that
people take a look at this submission:
https://www.newschallenge.org/challenge/2014/feedback-review/transparency-toolkit-from-document-dumps-to-actionable-info
MC is a good friend of mine, and incredibly passionate about this
wo
Just a couple of things:
-- Any project which is not transparent about its funding or
operations should never be trusted. I personally would classify paid
software in this. VPN is a bit different, but these vary widely and
there is not one paid service that I'd recommend. Setting up your own
Adam Fisk wrote:
> I agree the threats are complicated. Is an infiltrating seeder in Iran
> learning about someone serving the Tor binary dangerous
It's a serious consideration, and not an exaggeration to say that I'm
losing sleep over that exact question. My seedboxes are sitting idle at
the m
Nathan of Guardian wrote:
> Github? Maybe not whole sites, but specific files.
I've been working with users who have networks in censored countries
to expand access to specific software bundles. My two approaches right
now are Google Web Store and torrents attached to a stable offsite
seedbox.
Hello all,
There seem to be quite a few people on this list with a more academic
background, both in research and teaching, so it seems like a good group
to approach with this question =)
I do some interesting things with code, mostly with censorship and
free expression in mind, and am intere
March 5th @ 1:30pm in the demo space:
https://www.rightscon.org/programhighlights.php
I feel I should warn you now, this talk is going to be super weird.
Hope you're all okay with that. Though if you're coming to one of my
talks, you pretty much know what you were getting into. :D
This
Adam Pritchard wrote:
I would advise against getting too comfortable/confident/hubristic...
One might not want to suggest that one is unblockable.
I like Tor a lot, but obviously nothing is "unblockable." Iran's
targeting of Tor around the attempted revolution is but one data point
-- ever
Original Message
Subject: @GreatFireChina and @FreeWeibo report that Microsoft is
deploying Chinese censorship on global scale
Date: Wed, 12 Feb 2014 12:41:52 -0500
From: Sandra
Organization: OpenITP
To: a...@lists.openitp.org
Dear FreeWeibo and GreatFire.org Supporters,
Micro
[Information taken from their website. Conference is to be held June
8-10 at the Airlie Center in Warrenton, Virginia. -G]
About:
This year's conference will be co-chaired by Nuala O'Connor and Amie
Stepanovich and will feature the theme, "The Internet Wants to be Free."
The Conference will be p
Bill Woodcock wrote:
> See if you can get it to #1 on Amazon pre-orders! :-)
>
> -Bill
The only real downside with taking pre-orders is that I might,
eventually, have to write a book. ;-)
~Griffin
--
Liberationtech is public & archives are searchable on Google.
Granted, it's not written yet, but I'm starting to feel like I'm the
only one in this space who *hasn't* written a book, haha. Calling dibs
on the title. ;-)
~Griffin
PS: Everyone's books (that I've read so far) have been awesome. It's
just amusing that I wind up debating the nuances of censors
t patches or rewrite
instructions if that's what's needed.
best,
Griffin Boyce
(Happy New Year!)
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubsc
;s misleading *at all* to call it a free,
open-source, communications tool, because it is all of those things.
Commotion leverages and builds upon the work of lots of great projects
like Serval and OpenWRT, but I think that's a positive aspect of the
project. :D
Happy New Year! (it's
Maxim Kammerer wrote:
The server farm where Liberté Linux site is hosted is apparently
blocked by AT&T in the USA. Isn't this unusual?
Are websites being censored in the US? Yes. Is yours? Unlikely --
looks like it was lumped in with servers flagged for spam/malware activity.
Improper we
Sandra Ordonez wrote:
> On Jan 11, we are hosting a hackathon for circumvention tools in
> Washington DC. which will have a heavy UX and localization focus. We
> have already secured a good group of tools. Now to secure good
> contributors
Hi all,
I just wanted to chime in and say that all of
>From the brightest minds on the Cypherpunks list comes an NSA game you
can play with your friends :3
~Griffin
Original Message
Subject:NSA: The Game
Date: Mon, 02 Dec 2013 22:34:54 +1300
From: Peter Gutmann
To: cypherpu...@cpunks.org
For those of you famil
This one should work:
www.un.org/ga/search/view_doc.asp?symbol=A%2FC.3%2F68%2FL.45
Sorry about that!
On 11/13/13 14:59, Tamzen Cannoy wrote:
> On Nov 13, 2013, at 7:38 AM, Griffin Boyce
> wrote:
>
>> In it, they state that they are "deeply concerned" at human rights
In it, they state that they are "deeply concerned" at human rights violations
resulting from digital surveillance and the overall trend away from privacy.
It's a great read, and I *highly* recommend sharing it with your friends.
http://daccess-dds-ny.un.org/doc/UNDOC/GEN/N13/544/07/PDF/N135
In it, they state that they are "deeply concerned" at human rights
violations resulting from digital surveillance and the overall trend
away from privacy. It's a great read, and I *highly* recommend sharing
it with your friends.
http://daccess-dds-ny.un.org/doc/UNDOC/GEN/N13/544/07/PDF/N1354407
Next Wednesday, November 13th, the House-Senate conference committee
will be holding a meeting on a resolution that sets the congressional
budget for FY2014. They will also be looking to revise budgetary levels
for FY2013 -AND- defining budgetary goals for 2015-2023.
This is going down in the
Matt Johnson wrote:
> You described never attaching USB or an external drive and not copying
> PDFs.
That is mostly in play for computers which have internet access.
Typically, the malware deployed is very small and fetches another (more
advanced) exploit from an off-site server. If it can't r
Matt Johnson wrote:
> Griffin suggested never connecting a USB stick, or external drive or
> copying PDFs to the air gap computer. I have asked how that air-gapped
> computer would be useful. Apparently the point is too subtle.
There are a few aspects to this that I'd like you to consider.
With
anon14...@safe-mail.net wrote:
> I am really really sorry, but dude, what does **offline** mean to you?
Buy a dedicated machine for your offline activities, physically remove
the wireless card(s), disable the bluetooth module, and remove all
network drivers.
If something is fully air-gapped f
anon14...@safe-mail.net wrote:
> Trying the now rather dated Ubuntu Privacy Remix I figured out any recent
> distribution would do. Just the ability to disable networking by hand and
> that's all.
There are some really good options out there, including:
TAILS: https://tails.boum.org/about/
Who
Lucas Dixon wrote:
> Hi,
>
> I'm trying to put together a good reading and person list for what is
> currently known on network steganography (in particular, network
> traffic obfuscation)
I'd recommend checking out these selected papers in anonymity:
http://freehaven.net/anonbib/
Two papers in
On 10/18/2013 09:20 PM, 夏楚 wrote:
> To all,
>
> I just wrote up my new study of GFW and it is available at
> http://goo.gl/KfBCgT
Hi Xia,
Thanks so much for posting your new paper. It's really rare to see such
a complete body of research on this subject -- in fact, I don't think
I've seen one on
While there are easy ways to mess up using PGP, I think that a more
well-rounded approach is to be mindful of the ways that one can be
de-anonymized (by others or themselves) while using it.
People who don't have a holistic view of their security, and don't
want to learn more about their actua
On 10/04/2013 06:12 PM, Maxim Kammerer wrote:
> Both Tor Button and Tor Browser Bundle existed in 2007.
I didn't mention the browser bundle ;P
--
"Cypherpunks write code not flame wars." --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de
My posts are my own, not my employ
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
There's been a really interesting document to come out of the Guardian
today:
http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document
Interestingly:
- NSA/GCHQ was fingerprinting using Flash
- They were won
On 10/01/2013 04:44 AM, Travis Biehn wrote:
> I see no reason to chill competition with whisper systems offerings.
>
> The stego option is appealing, I'm assuming you'll be trying it with MMS?
>
The field is large enough that several competitors could have healthy
userbases at the same time. I
Have you considered putting your notes and code somewhere online, such
as GitHub? It would be a lot easier to get feedback and make public
changes there.
~Griffin
Scott Arciszewski wrote:
> That is /ugly/ as heck. Sorry.
>
> https://defuse.ca/b/MQrZXLiE <- link valid for 6 months
>
>
> On Sat,
iffin
Joseph Mornin wrote:
> Do you have a link?
>
> On 9/22/13 11:51 AM, Griffin Boyce wrote:
>> There are some really great unenforceable TOSs out there. The best
>> I've seen is a clause which states that it is a violation of the Terms
>> of Service to read the T
There are some really great unenforceable TOSs out there. The best
I've seen is a clause which states that it is a violation of the Terms
of Service to read the Terms of Service. (But of course, how would you
know unless you read them?)
~Griffin
--
"Cypherpunks write code not flame wars." --
On 09/20/2013 09:59 PM, adrelanos wrote:
> Hello liberationtech!
>
> The Whonix Project is looking for a translations coordinator.
>
> Whonix [1] is an anonymous general purpose operating system based on
> Virtual Box, Debian GNU/Linux and Tor. It has its focus on anonymity,
> privacy, security and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/16/2013 09:51 PM, Moritz Bartl wrote:
> On 09/16/2013 07:45 PM, Charles Paul wrote:
>> Hello,
>>
>> Hope everyone is doing great. I was wondering if anyone on this list is
>> aware of the current state of different javascript implementations of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/10/2013 08:41 AM, Moon Jones wrote:
> A portable distribution on an encrypted stick.
>
> In the end, I think only an USB hard drive can offer that, because of
the way memory locations are handled by flash media.
>
> But is it feasable to have a
On 09/07/2013 12:51 AM, Andy Isaacson wrote:
> Also please provide design documents for how you plan to keep it
> "private" and "secure". -andy
Defining terms also helps a lot. Define encrypted -- what protocols
are you using? Is Places based on established technology or new
research? Do you of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Douglas Lucas wrote:
> Periodic reminder that despite promises and people's positive emotional
> investments in Phil Zimmerman, Silent Circle is still not open source.
>
> We need an IsHemlisOpenSourceYet.com
I think that this is the most difficult
An interesting article on what happens when large monopolies refuse to
do business in small locales, and the creative ways that people find to
work around them =)
More info on Rhizomatica: http://rhizomatica.org/
---
Forgotten by telecoms, Mexico town runs cell service
Agence France-Presse, Augus
On 08/24/2013 05:13 PM, Francisco Ruiz wrote:
>
> My encryption app, PassLok, is currently in the shape of a standalone,
> static web page with two text boxes where users copy and paste plain
> or encrypted messages. I am considering the possibility of making a
> browser extension version out of it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 08/23/2013 12:24 PM, The Doctor wrote:
> On 08/23/2013 04:53 AM, DC wrote:
>
> > Feel free to try it out! https://scramble.io/
>
> scramble.io does not play nicely with the Tor Browser Bundle:
>
> "Sorry, you'll need a modern browser to use Scrambl
Tom O wrote:
> So it's now become about the "heroism" of the journalists and not
> Snowden and mass govt surveillance. Right.
There's enough heroism to go around. To get a story of this magnitude
out requires courage from both sources and journalists. And safety is in
no way guaranteed for anyone
Kyle Maxwell wrote:
> [Comment: This has implications for those of us involved in
> CryptoParty as well as other security education efforts.]
>
> The criminal inquiry, which hasn’t been acknowledged publicly, is
> aimed at discouraging criminals and spies from infiltrating the U.S.
> government by
So I set up a proof-of-concept server last Friday, which was far
easier than I had pictured. Special thanks to Moritz for his PGP milter
[1], but I'm also customizing a lot of the other security and spam
filter settings.
Short: It should be up for comment in the next two weeks.
Long: I'm recr
John Cusack comes to mind - he's on the board of Freedom of the Press
Foundation.
~Griffin
On 08/12/2013 04:32 PM, Francisco Ruiz wrote:
> Quick request.
>
> In comments to a recent post, people seemed to agree that publishing a
> video of someone reading a hash might be a fairly hard-to-hack way
Nadim Kobeissi wrote:
> Here's the thing: you ultimately have two types of software that the
> U.S. is interested in funding:
>
> *Software Type A:* Software that protects useful dissidents and anyone
> else from all governments (to an extent), including the U.S. government.
> *Software Type B:* So
On 08/11/2013 12:51 AM, Tom Ritter wrote:
> Some other random stats for the curious.
>
> Tor v0.2.3.25 (git-17c24b3118224d65)
> Vidalia 0.2.21 (QT 4.8.1)
>
> # Configured for speed
> ExcludeSingleHopRelays 0
> EnforceDistinctSubnets 0
> AllowSingleHopCircuits 1
>
> # Exclude countries that might ha
Randolph D. wrote:
> use bitmail
No.
Moritz Bartl wrote:
> I wrote a milter for sendmail/postfix to reject non-PGP mail that scans
> the first lines of incoming mail: https://github.com/moba/pgpmilter
Ooooh. Forked.
> My idea of a mail provider: The MX records of domains contain a list of
> differ
This probably sounds very strange, but *what if* someone ran an email
service that required that all mails be GPG encrypted?
So here's my idea: Barring the honor system, it would require a filter
to look at message content to check for PGP headers. And if said
headers didn't exist, the messag
Thanks for volunteering to help me test the service ;3
Brian Conley wrote:
>
> Griffin, make it so!!
>
> On Aug 9, 2013 7:31 AM, "Griffin Boyce" <mailto:griffinbo...@gmail.com>> wrote:
>
> Fabio Pietrosanti (naif) wrote:
> > If someone want to
Fabio Pietrosanti (naif) wrote:
> If someone want to make this recipie working, i think that the world
> would appreciate with an "easy to be setup, independently run, audio,
> video, file transfer, chat infrastructure accessible with a web
> browser" .
Welp, there goes my weekend. Dangit, naif! ;
Anthony Papillion wrote:
> This is exciting, Nadim. I'm nowhere near NYC but would be interested
> in contributing code if the time arose. I apologize for doing
> absolutely no research on this at all before asking (again, time) but
> where can I grab the latest CryptoCat source?
Latest Cryptocat
Tonight, I managed the final leg of my journey without being hassled by
security. This unprecedented event has prompted me to consider a snark-free
future.
Feel like agreeing to not snark at each other? It's not really
productive, and we all seem to snark at each other at the worst possible
t
I must admit, it can be entertaining at times. (now is not one of
those times). ;3
Griffin
On 8/6/13, Fabio Pietrosanti (naif) wrote:
> Because that's become a trolling-engagement thread, i cannot resist to
> hijack it.
>
> I LOVE NADIM AND JAKE!**
>
> -naif
>
> ** Especially when they engage in
Al,
We may have to disagree as to the way forward. I hate to be
contentious, but it seems unlikely that Tor applied a patch without
reading firefox's changelog. Two days ago I presented a talk which
emphasized how useful Tor is -- and I stand by that. Tor is still the
best option for maintaining o
Bernard Tyers - ei8fdb wrote:
> By what Roger Dingledine from Tor has stated in a previous mail, The Tor
> Project provided the "you need to upgrade message" promptly. I don't know
> if that is enough. (But it is certainly a lot more that other providers of
> software would do.)
>
I can really
Fabio Pietrosanti (naif) wrote:
> After a quick check at a random Tor2web server, it seems that there's no
> specific pattern of traffic-drop.
>
> Who knows, maybe the amount of TorHS that has been takendown are just a
> few.
Yeah, it seems like people are vastly overestimating the number of
There are really two separate issues here, and I just want to separate them
briefly.
1) Tormail and other sites were hosting malicious js code that attempts to
break firefox 17.
2) Freedom Hosting was shut off after its host was arrested.
I will say from personal experience that most hidden se
On 07/19/2013 05:44 PM, Dan Auerbach wrote:
> We're sure there are many more, and wanted to see if people here could
> help by pointing us towards launched projects to add to the list. It's
> hard to draw a bright line between what counts as a "launched project"
> vs, say, a technical solution. For
1 - 100 of 211 matches
Mail list logo