The two-step verification used by Google is based on the TOTP protocol [1]
which is the open standard for this sort of thing.
To answer your questions Amin:
1. Tokens last 60 seconds according to the TOTP standard.
2. Your journalist friends would be very well-advised to use an app [2]
instead of
These challenges are really great. Another source of similar training is
Stanford University's online cryptography classes, taught (for free!) by
Dan Boneh.
Boneh's classes include practical assignments that are almost identical to
the CryptoPals challenges, but it's still worth doing both
Dear LiberationTech,
I wanted to share with you GazaDeaths.com, a website for keeping track of
statistics and names of Palestinian casualties from the current Israeli
offensive on Gaza.
http://gazadeaths.com/
The website will update automatically with information from Al Jazeera and the
Gaza H
Blazevic wrote:
> > What would be the process to add other languages? I could potentially round
> > up some Swahili translators one day.
> > Neil
> >
> > Sent from a mobile device
> >
> > On 20 Aug 2013 14:42, "Nadim Kobeissi" wrote:
> >
Dear Libtech,
Echoing Commotion's recent call for translators on this list:
Cryptocat is adding cool new features (and modifying some existing ones) over
the upcoming weeks, all of which necessitate the translation of various new
words and sentences for the user interface. Currently, Cryptocat
Just a last friendly reminder for those planning to attend today/this weekend!
:-)
We're just about to start!
Schedule:
https://blog.crypto.cat/2013/08/cryptocat-hackathon-august-17-18-new-york-city/
NK
On 2013-08-10, at 11:33 AM, Nadim Kobeissi wrote:
> Hi everyone,
> I jus
On 2013-08-15, at 6:14 AM, Nathan of Guardian
wrote:
> Signed PGP part
> On 08/15/2013 12:07 AM, Nadim Kobeissi wrote:
> > Hot on the heels of last week's Bitcoin wallet for Android heist,
> > Google has confirmed that this was due to a critical crypto flaw in
> >
Hey Libtech,
Hot on the heels of last week's Bitcoin wallet for Android heist, Google has
confirmed that this was due to a critical crypto flaw in Android, which could
affect security in thousands of apps according to Ars Technica:
"Google developers have confirmed a cryptographic vulnerability
Hey Libtech,
The Dalai Lama's Chinese website has been hacked and is now serving malware to
visitors in China:
"Hackers have attacked Dalai Lama's Chinese-language website, installing an
unidentified piece of malware which could have compromised visitors' computers,
a spokesperson said.
The bri
Hey LibTech,
In a recently published interview with the New York Times, Edward Snowden
called unencrypted communications between journalists and sources "unforgivably
reckless":
"I was surprised to realize that there were people in news organizations who
didn’t recognize any unencrypted messag
Quickly adding my blog post on the matter to this thread. Would love to hear
discussion regarding it:
http://log.nadim.cc/?p=33
NK
On 2013-08-13, at 1:58 AM, Tony Arcieri wrote:
> On Mon, Aug 12, 2013 at 3:07 PM, Ali-Reza Anghaie
> wrote:
> I'm sorry but aren't we spending a lot of time con
On 2013-08-12, at 8:53 PM, Collin Anderson wrote:
> Libtech,
>
> A friend passed along little noticed comments by Gen. Hayden in June, which I
> would suggest are the most direct elaboration on the differences between the
> American security apparatus and piracy development efforts. The actua
On 2013-08-11, at 10:36 PM, danimoth wrote:
> On 11/08/13 at 01:10pm, Francisco Ruiz wrote:
>> Twice again, privacy has taken a hit across the land. Lavabit and Silent
>> Mail are gone, and to quote Phil Zimmermann, “the writing is on the wall”
>> for any other encrypted email provider located i
98
NK
On 2013-08-07, at 11:36 PM, Kyle Maxwell wrote:
> https://github.com/cryptocat/cryptocat naturally! :D
>
> On Wed, Aug 7, 2013 at 3:09 PM, Anthony Papillion
> wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA512
>>
>> On 08/07/2013 12:10 PM, Nad
I actually agree with Bill Gates here. If I had his money, I would make sure
people have clean water, toilets, condoms, before even starting to consider
working on Internet access.
Sure, his comments are "below the belt" as Andrés says below, but this is only
because he is unfairly attacking a
On 2013-08-09, at 1:55 PM, Fabio Pietrosanti (naif)
wrote:
> Il 8/9/13 10:59 AM, Julien Rabier ha scritto:
>> Le 09 août - 11:48, Nadim Kobeissi a écrit :
>>> On 2013-08-09, at 11:31 AM, Ali-Reza Anghaie wrote:
>>>
>>>> On Fri, Aug 9, 2013 at 4:26 AM
On 2013-08-09, at 1:24 PM, Nick wrote:
> On Fri, Aug 09, 2013 at 11:26:21AM +0300, Nadim Kobeissi wrote:
>> On 2013-08-08, at 11:53 PM, Mike Perry wrote:
>>> It is profoundly encouraging to see that people of such courage and
>>> integrity as the Lavabit staff ex
On 2013-08-09, at 11:59 AM, Julien Rabier wrote:
> Le 09 août - 11:48, Nadim Kobeissi a écrit :
>>
>> On 2013-08-09, at 11:31 AM, Ali-Reza Anghaie wrote:
>>
>>> On Fri, Aug 9, 2013 at 4:26 AM, Nadim Kobeissi wrote:
>>>> For what it's worth, an
On 2013-08-09, at 11:31 AM, Ali-Reza Anghaie wrote:
> On Fri, Aug 9, 2013 at 4:26 AM, Nadim Kobeissi wrote:
>> For what it's worth, and even though I think it's pretty unlikely that
>> Cryptocat will receive such an order,
> *snip*
>
> You're right
On 2013-08-08, at 11:53 PM, Mike Perry wrote:
> It is profoundly encouraging to see that people of such courage and
> integrity as the Lavabit staff exist, and are willing to put everything
> on the line to stand up against this madness.
+1.
For what it's worth, and even though I think it's pre
On 2013-08-08, at 12:25 PM, Jillian C. York wrote:
> Dear LibTech,
>
> I would like to express my concern that the CatFacts function of CryptoCat is
> not operating. This is a Very Important Function to ensure the physical,
> mental and spiritual health of cryptocat users and I am deeply, de
(Moving on from my very, very expensively made point…)
Dear Libtech,
Cryptocat, in collaboration with OpenITP, will be hosting the very first
Cryptocat Hackathon weekend in New York City, on the weekend of the 17th and
18th of August 2013! We're going to have a coding track as well as a special
On 2013-08-07, at 3:22 PM, Shava Nerad wrote:
> Forgive me, but I'd like to ask a question here.
> Tor is a tool that is undeniably, directly marketed toward activists in
> high-risk environments. Tor's presentations at conferences centre around how
> Tor obtains increased usage in Arab Spring
On 2013-08-07, at 1:05 PM, Jacob Appelbaum wrote:
> Nadim Kobeissi:
>>
>> On 2013-08-07, at 12:58 PM, Jacob Appelbaum wrote:
>>
>>> Nadim Kobeissi:
>>>>
>>>> On 2013-08-07, at 12:44 PM, Jacob Appelbaum wrote:
>>>>
>
On 2013-08-07, at 12:58 PM, Jacob Appelbaum wrote:
> Nadim Kobeissi:
>>
>> On 2013-08-07, at 12:44 PM, Jacob Appelbaum wrote:
>>
>>> Bbrewer:
>>>> "We're understaffed, so we tend to pick the few things we might
>>>> accompl
On 2013-08-07, at 12:44 PM, Jacob Appelbaum wrote:
> Bbrewer:
>> "We're understaffed, so we tend to pick the few things we might
>> accomplish and writing such advisory emails is weird unless there is an
>> exceptional event. Firefox bugs and corresponding updates are not
>> exceptional events.
On 2013-08-06, at 4:49 PM, Jacob Appelbaum wrote:
> Nadim Kobeissi:
>> On 2013-08-06, at 1:23 PM, Jacob Appelbaum
>> wrote:
>>
>>> Nadim Kobeissi:
>>>>
>>>> On 2013-08-06, at 12:55 PM, Jacob Appelbaum
>>>> wrote:
>>
On 2013-08-06, at 1:23 PM, Jacob Appelbaum wrote:
> Nadim Kobeissi:
>>
>> On 2013-08-06, at 12:55 PM, Jacob Appelbaum
>> wrote:
>>
>>> Nadim Kobeissi:
>>>>
>>>> On 2013-08-06, at 11:46 AM, Al Billings
>>>> wrote:
&g
I just hope people on LibTech read the kind of emails like the one Jacob just
wrote and see why I really think this guy has no place doing outreach at all.
Jesus.
NK
On 2013-08-06, at 1:23 PM, Jacob Appelbaum wrote:
> Nadim Kobeissi:
>>
>> On 2013-08-06, at 12:55 PM,
On 2013-08-06, at 12:55 PM, Jacob Appelbaum wrote:
> Nadim Kobeissi:
>>
>> On 2013-08-06, at 11:46 AM, Al Billings
>> wrote:
>>
>>> Nadim you seem confused by how this works. Tor doesn't need to
>>> issue advisories for Firefox issues. We, at
issues. Tor needs to issue
advisories for Tor Browser issues, and not five weeks later when s**t hits the
fan.
I really don't think one can reasonably disagree with the above statement. Tor
Browser is a Firefox fork.
NK
>
> Al
>
> --
> Al Billings
> http://makeha
On 2013-08-06, at 3:19 AM, Jacob Appelbaum wrote:
> Griffin Boyce:
>> Al,
>>
>> We may have to disagree as to the way forward. I hate to be
>> contentious, but it seems unlikely that Tor applied a patch without
>> reading firefox's changelog. Two days ago I presented a talk which
>> emphasized
On 2013-08-05, at 6:38 PM, Roger Dingledine wrote:
> On Mon, Aug 05, 2013 at 04:54:00AM -0400, Roger Dingledine wrote:
>> Specifically, it would appear that the TBB updates we put out on
>> June 26 addressed this vulnerability:
>
> https://lists.torproject.org/pipermail/tor-announce/2013-August
On 2013-08-05, at 4:19 PM, liberationt...@lewman.us wrote:
> On Mon, 5 Aug 2013 10:15:20 +0200
> Nadim Kobeissi wrote:
>
>> Now, we find out that the FBI has been sitting on an exploit since an
>> unknown amount of time that can compromise the Tor Browser Bundle,
>>
On 2013-08-05, at 11:41 AM, Nadim Kobeissi wrote:
>
> On 2013-08-05, at 11:04 AM, Michael Owen wrote:
>
>> On Mon, Aug 5, 2013 at 9:46 AM, Nadim Kobeissi wrote:
>>>
>>>
>>> Hmm. So it's more of a 38-day. Perhaps there should have been a
On 2013-08-05, at 11:04 AM, Michael Owen wrote:
> On Mon, Aug 5, 2013 at 9:46 AM, Nadim Kobeissi wrote:
>>
>>
>> Hmm. So it's more of a 38-day. Perhaps there should have been a Tor Browser
>> security advisory in that case.
>
> I'm not sure ho
On 2013-08-05, at 10:46 AM, Georg Koppen wrote:
> On 05.08.2013 10:15, Nadim Kobeissi wrote:
>> Now, we find out that the FBI has been sitting on an exploit since an
>> unknown amount of time that can compromise the Tor Browser Bundle
>
> is that really so? See:
>
Forgive me, but I'd like to ask a question here.
Tor is a tool that is undeniably, directly marketed toward activists in
high-risk environments. Tor's presentations at conferences centre around how
Tor obtains increased usage in Arab Spring countries that matches the timeline
of revolutionary a
Libtech,
I urge everyone interested in the latest "Decryptocat" issue to watch the talk
and 70-minute (!) Q&A that followed it. I gave this talk the day right after
the bug.
The talk and the Q&A sessions really serve to explain my position on the
project and I think they will clarify a lot of q
On 2013-07-11, at 4:32 PM, Andy Isaacson wrote:
> On Thu, Jul 11, 2013 at 12:23:25PM -0700, Mitar wrote:
>> BTW. Even Tor has centralized directory servers.
>
> It's incredibly misleading to imply that the Tor DA design provides a
> similar threat to a server-hosted-crypto proprietary privacy a
On 2013-07-11, at 2:08 PM, Maxim Kammerer wrote:
> On Thu, Jul 11, 2013 at 9:04 PM, Jonathan Wilkes wrote:
>> I think the upshot of that is to steer whatever funds Cryptocat has
>> toward the form of peer review that did work, which is the bug
>> hunt (as well as look into other forms of peer r
A brand new scoop by Glenn Greenwald:
http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data
"Microsoft has collaborated closely with US intelligence services to allow
users' communications to be intercepted, including helping the National
Security Agency to circumvent
On 2013-07-11, at 12:38 PM, Maxim Kammerer wrote:
> On Tue, Jul 9, 2013 at 4:57 PM, Jacob Appelbaum wrote:
>> While I think Maxim is viewed as exceedingly harsh in how he writes, I
>> think that your response is really the wrong way to deal with him. We
>> should consider that his cultural back
Hemlis have posted the answer to whether they will open source their app:
"Will it be Open Source?
We have all intentions of opening up the source as much as possible for
scrutiny and help! What we really want people to understand however, is that
Open Source in itself does not guarantee any pri
This looks awesome! The more alternatives the better.
NK
On 2013-07-09, at 12:52 PM, Julian Oliver wrote:
>
> Suprised to see Peter Sunde, Leif Högberg & Linus Olsson push out their
> private
> messaging for Android and iOS as closed-source unlock-ware:
>
>https://heml.is/
>
> (Warning:
On 2013-07-09, at 10:29 AM, Jacob Appelbaum wrote:
> Patrick Mylund Nielsen:
>> On Tue, Jul 9, 2013 at 9:22 AM, Eugen Leitl wrote:
>>
>>> On Tue, Jul 09, 2013 at 09:12:21AM -0400, Patrick Mylund Nielsen wrote:
If it's so easy, go ahead and produce a more secure alternative that
>>> people
On 2013-07-09, at 12:34 AM, Jonathan Wilkes wrote:
> On 07/08/2013 07:07 AM, Nadim Kobeissi wrote:
>> On 2013-07-08, at 3:34 AM, Tom Ritter wrote:
>>
>>> On 7 July 2013 17:20, Maxim Kammerer wrote:
>>>> This thread started off with discussion of peer re
Check out this very well-written "post-mortem" of a related bug that was fixed
recently in Cryptocat:
http://nakedsecurity.sophos.com/2013/07/09/anatomy-of-a-pseudorandom-number-generator-visualising-cryptocats-buggy-prng/
NK
--
Too many emails? Unsubscribe, change to digest, or change password b
On 2013-07-08, at 2:48 PM, Reed Black wrote:
> On Mon, Jul 8, 2013 at 11:00 AM, David Goulet wrote:
>>
>> Furthermore, looking at those lines of code, there is simply NO comments at
>> all,
>> nothing to help peer review, to explain why this or that is done that way and
>> nothing linked to a
On 2013-07-08, at 2:00 PM, David Goulet wrote:
> Hi everyone,
>
> Very good post Tom! :)
>
> I would like to point out something here, no bashing, but rather possible
> improvements from my point of view. As Tom stated, basically if you don't do
> code, you'll have no bugs so in other words th
On 2013-07-08, at 3:34 AM, Tom Ritter wrote:
> On 7 July 2013 17:20, Maxim Kammerer wrote:
>> This thread started off with discussion of peer review, so I have
>> shown that even expensive, well-qualified peer review (and I am sure
>> that Veracode people are qualified) didn't help in this case
On 2013-07-08, at 12:13 PM, Ralph Holz wrote:
> Hi Tom,
>
>> If you think this bug could never happen to you or your favorite pet
>> project; if you think there's nothing you can learn from this incident
>> - you haven't thought hard enough about ways it could have been
>> prevented, and thus h
On 2013-07-07, at 2:25 PM, CodesInChaos wrote:
> > So introductory-level programming course mistakes are right out.
>
> In my experience it's quite often a really simple mistake that gets you,
> even when you're an experienced programmer. I'm quite afraid of simple
> off-by-one bug,
> places w
Hello everyone,
I urge you to read our response at the Cryptocat Development Blog, which
strongly clarifies the situation:
https://blog.crypto.cat/2013/07/new-critical-vulnerability-in-cryptocat-details/
Thank you,
NK
On 2013-07-04, at 12:18 PM, Jens Christian Hillerup wrote:
> On Thu, Jul 4,
On 2013-07-02, at 3:06 PM, "Glassman, Michael" wrote:
> I think I really disagree with this. I find Morozov's arguments
> philosophically thin and part of what Stephen Pepper referred to as mindless
> skepticism. The fact that he is attempting to communicate to a more general
> public makes
On 2013-07-02, at 3:07 PM, Griffin Boyce wrote:
> Nadim Kobeissi wrote:
> Frederick did not call OTF a tool of US oppression, but a tool for aiding
> U.S. foreign policy. I am very pleased that my project is supported by the
> excellent people at OTF, but let us not kid ourse
On 2013-07-02, at 1:17 PM, Griffin Boyce wrote:
> Frederick FN Noronha फ्रेड्रिक नोरोन्या *فريدريك نورونيا
> wrote:
> For what? Propping up US foreign policy? FN
>
> That's an interesting statement, and I'm not sure it's really reflected in
> the types of projects that OTF funds[1]. Globa
Silent Circle's response to critical security vulnerabilities has been
*extremely* bad. They recently quietly fixed numerous critical vulnerabilities
that could lead to a full compromise, without informing their users or
submitting and advisory in any way.
Pointing to the vulnerable code on the
Thanks to Arturo Filastò for pointing this out:
https://github.com/SilentCircle/silent-phone-base/issues/5
Many remotely executable overflows in the ZRTP library used by Silent Circle.
NK
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stan
On 2013-06-24, at 8:20 PM, Mike Perry wrote:
> Nadim Kobeissi:
>> I'd just like to add that I'm a DuckDuckGo user myself and that I can
>> definitely vouch for the service.
>
> I've had a number of people tell me that they vouch for DuckDuckGo. What
>
I'd just like to add that I'm a DuckDuckGo user myself and that I can
definitely vouch for the service.
NK
On 2013-06-24, at 6:50 PM, Mike Perry wrote:
> Jacob Appelbaum:
>> Jillian C. York:
>>> +1
>>>
>>>
>>> On Mon, Jun 24, 2013 at 2:38 PM, Cooper Quintin
>>> wrote:
>>>
Start page a
On 2013-06-24, at 6:23 PM, Griffin Boyce wrote:
> Not only am I going to be presenting three talks at OHM, I will be
> presenting talks that are (in many ways) totally dead conversations in the
> US.
>
> It's interesting how much of the debate centers around the presence of
> police at
On 2013-06-24, at 3:43 PM, Jacob Appelbaum wrote:
> Brian Conley:
>> Thanks Dragana,
>>
>> But wouldn't that mean there is no new browser bundle for recent macs as
>> only 32 is specified at Jacob's link?
>
> Hi Brian,
>
> So a few things - one is that if you go into "About this mac" you shou
Today, with Cryptocat nearing 65,000 regular users, the Cryptocat project
releases “Cryptocat: Adopting Accessibility and Ease of Use as Security
Properties,” a working draft which brings together the past year of Cryptocat
research and development.
We document the challenges we have faced, bot
On 2013-06-22, at 7:58 PM, André Costa wrote:
> Hello guys
>
> Just to let you all know, we have found it possibly was a well-organized
> deceit. Apparently someone has spammed many messages with words related to
> the military, and then started to spread a rumor that there was a
> surveill
Hello Andre,
For what it's worth, I tried sending this message on my Facebook (I am in
Canada) and nothing happened. So the blocking, if factual, is probably limited
to a certain number of accounts.
>From personal experience, I don't recall hearing about this sort of thing
>happening in the pas
Yeah, this is completely nuts. You're sending the service's owner(s) your
password and plaintext in the clear. The person(s) operating this service
get(s) all the passwords, all the plaintext, and even which IP address is
sending/receiving plain texts at what time with each password. It's terrif
On 2013-06-21, at 12:57 PM, Joseph Lorenzo Hall wrote:
>
>
> On Fri Jun 21 12:51:11 2013, phryk wrote:
>> On Fri, 21 Jun 2013 11:55:57 -0400
>> Nadim Kobeissi wrote:
>>
>>> The solution to this is to make encryption more and more widely used.
>>
I wanted to share this small piece I wrote for the The New Internationalist on
PRISM:
http://newint.org/blog/2013/06/21/prism-surveillance-nsa-software/
Feedback welcome! :-)
___
Thursday 6 June, the day the PRISM story broke, was a good day to be a
cryptographer. The sud
The solution to this is to make encryption more and more widely used. By
increasing the number of people with access to encryption technology for their
communications, we dilute this threat.
NK
On 2013-06-21, at 11:52 AM, Michael Rogers wrote:
> Signed PGP part
> It's unfortunate that Ars Tec
This is a really awesome improvement. I tried the new Tor Browser yesterday (OS
X) and loved it. Did not encounter any problems.
Really glad to see such drastic usability improvements for Tor.
NK
On 2013-06-17, at 9:45 AM, Jacob Appelbaum wrote:
> Hi,
>
> I'm really excited to say that Tor B
"The world is still reeling from the leaked details of the NSA's PRISM program,
reported to give the government's top spies access to personal user data
collected by Google, Apple, Microsoft, and other services. But while the
mainstream is fighting over the precise nature of PRISM, the world of
On 2013-06-12, at 6:20 AM, Eugen Leitl wrote:
> On Wed, Jun 12, 2013 at 06:15:30AM -0400, Sheila Parks wrote:
>> Why not use "her" instead of "his"?
>>
>> Using "his" in 2013 is, indeed, misogyny
>
> List moderator, please control this before it completely goes out of hand.
+1
NK
>
> Peopl
This story really solidifies why I believe that we need to make privacy
technologies accessible to journalists, instead of simply focusing on the other
way around.
Glenn Greenwald had to substantially delay his communications with Edward
Snowden due to how inaccessible a lot of privacy and encr
I would sincerely like to apologize to the LibTech community for this
incredibly embarrassing episode.
NK
On 2013-06-11, at 6:56 PM, Catherine Roy wrote:
> On 11/06/2013 5:54 PM, Andy Isaacson wrote:
>> The amount of work you're demanding (and yes, your first public post did
>> come across as
On 2013-06-11, at 7:31 AM, Eugen Leitl wrote:
> On Mon, Jun 10, 2013 at 08:21:40PM -0400, Catherine Roy wrote:
>> On 10/06/2013 7:37 PM, Travis McCrea wrote:
>>> Opera is being released now on Webkit, though I am sure you will still have
>>> legacy opera users... I think you could put this issu
On 2013-06-10, at 8:21 PM, Catherine Roy wrote:
> On 10/06/2013 6:18 PM, Nadim Kobeissi wrote:
>> Catherine,
>> Opera is not "shut out". It's simply difficult to develop for Opera due to
>> its limited browser extension API. Your email made it sound as if Cry
On 2013-06-10, at 6:26 PM, Yosem Companys wrote:
> The distinction between direct or indirect access is semantic, not
> substantive, and likely irrelevant to most Americans. What Americans want to
> know is whether there is access to their personal data, and I would bet focus
> groups would s
On 2013-06-10, at 6:09 PM, Jacob Appelbaum wrote:
> x z:
>> @Jacob, I agree with your points regarding American exceptionalism.
>> @Eugen, to prepare for the worst scenario is one thing, to advocate some
>> shady rumor as fact is another.
>> @Rich, those are good movie scripts :-). But it does n
ra is shut out ?
>
> Best,
>
>
> Catherine
>
> --
> Catherine Roy
> http://www.catherine-roy.net
>
>
>
> On 2013-06-10 17:44, Nadim Kobeissi wrote:
>> Thanks so much to everyone who helped! The translations are now all up to
>> date.
>&g
)
NK
On 2013-05-24, at 10:23 PM, Buddhadeb Halder wrote:
> Hi Nadim,
> I have done with the Bengali translation.
> Thanks,
> Buddha
>
>
>
> On Fri, May 24, 2013 at 6:36 PM, Nadim Kobeissi wrote:
> Hi everyone,
> An entire Cryptocat translation is less than 300 wo
Some news in Canada similar to the NSA revelations in the US:
Defence Minister Peter MacKay approved a secret electronic eavesdropping
program that scours global telephone records and Internet data trails –
including those of Canadians – for patterns of suspicious activity.
Mr. MacKay signed a
On 2013-06-09, at 8:40 PM, Raven Jiang CX wrote:
> He did work in the intelligence community so maybe he has a better idea than
> us. My guess is that asylum in Iceland is ideal if everything worked out, but
> he doesn't think it is strong enough to resist U.S. pressure.
>
> Hong Kong is stab
Check out this screenshot of the front page of the New York Times right now.
Unbelievable:
https://twitter.com/kaepora/status/343888967554457600
NK
On 2013-06-09, at 8:17 PM, Matt Johnson wrote:
> Snowden says he wants asylum in Iceland. Why not go there directly?
>
> Going to Hong Kong make
Wow.
NK
On 2013-06-09, at 5:14 PM, Kate Krauss wrote:
> "I had been looking for leaders, but I realised that leadership is about
> being the first to act." - Edward Snowden
>
> This is the moment to show this person big public support. And keep showing
> it.
>
> Katie Krauss
> AIDS Policy P
It seems Europe isn't safe either from data mining, due to overreach:
http://www.zdnet.com/blog/igeneration/google-admits-patriot-act-requests-handed-over-european-data-to-u-s-authorities/12191
NK
On 2013-06-09, at 1:22 PM, Jacob Appelbaum wrote:
> Nadim Kobeissi:
>>
>> On
A new slide has just been leaked from the PRISM powerpoint. It's very
interesting, check it out:
http://www.theverge.com/2013/6/8/4410358/leaked-slide-from-prism-presentation-supports-directly-collecting-data
NK
On 2013-06-07, at 4:01 PM, Kyle Maxwell wrote:
> FWIW, Google has issued a similar
On 2013-06-09, at 1:02 PM, Jacob Appelbaum wrote:
> Nadim Kobeissi:
>> Jake, I don't agree with x z (and rather agree with you), but I'm
>> really tired of just how aggressive and rude you always are on
>> Libtech. And it doesn't appear to just be toward
n isn't just for and by the few white men spouting off here more
> often than not. Might be worth keeping in mind when posting.
>
> On Jun 9, 2013, at 10:08, Rich Kulawiec wrote:
>
>> On Sun, Jun 09, 2013 at 09:45:31AM -0400, Nadim Kobeissi wrote:
>>> I don't agr
On 2013-06-09, at 10:08 AM, Rich Kulawiec wrote:
> On Sun, Jun 09, 2013 at 09:45:31AM -0400, Nadim Kobeissi wrote:
>> I don't agree with x z (and rather agree with you), but I'm really tired of
>> just how aggressive and rude you always are on Libtech.
>
>
Jake,
I don't agree with x z (and rather agree with you), but I'm really tired of
just how aggressive and rude you always are on Libtech. And it doesn't appear
to just be towards me. I'm not the only person who feels like this.
Even if you're right, tone your ego knob down already. Be nice. I ca
I want to encourage all the open source, communication and security software
developers on this list to start talking about metadata.
1. Start raising awareness on what metadata is given to your software and how
it's handled.
2. Don't limit your privacy policy to content but also clarify what's
http://www.youtube.com/watch?v=HIWHMb3JxmE
No, really — there's nothing else I can say in a conversation where we're
supposed to discuss proprietary software not only as secure, but as
"military-grade" and "government-proof".
NK
On 2013-06-08, at 2:22 PM, Yosem Companys wrote:
> http://www.s
On 2013-06-07, at 5:18 PM, Rich Kulawiec wrote:
> On Fri, Jun 07, 2013 at 10:18:25AM -0400, Griffin Boyce wrote:
>> I'm also going to go against the grain and say that most services
>> don't *need* to be integrated with each other.
>
> I'll join you in that. I'll go one step further and say t
On 2013-06-07, at 2:06 PM, Griffin Boyce wrote:
> micah wrote:
>> What about when someone from Riseup promotes Riseup services? :o
>
> Riseup isn't evil, I'm just amused by people who say "no third-party
> services!" and then launch into why people should use their
> third-party provider of cho
:39 PM, Nadim Kobeissi wrote:
> Dear LibTech,
> We're on the verge of releasing a major update to Cryptocat, but we still
> need four translations finished.
>
> All four translations are very much complete but only lack one or two
> sentences each.
>
> You can contri
On 2013-06-07, at 1:09 PM, Anthony Papillion wrote:
> On 06/06/2013 07:00 PM, Nadim Kobeissi wrote:
>> Speaking as the lead developer for Cryptocat:
>> OTR.js actually has had some vetting. We're keeping it experimental simply
>> due to the experimental nature of w
On 2013-06-07, at 8:31 AM, Yishay Mor wrote:
> "If all this already exists, why isn’t everybody doing it? Well, simply
> because there is no integration at all among all those objects. "
>
> No. we don't need no software bundles. we don't need no sleek installers.
> How long does it take me to
STOP PROMOTING THE INTERNET
NK
On 2013-06-07, at 3:16 AM, Eduardo Robles Elvira wrote:
> Stop promoting google hangout and hotmail, yahoo, gmail, outlook.com... =)
>
> On Fri, Jun 7, 2013 at 8:17 AM, Jacob Appelbaum wrote:
>> Hi,
>>
>> "Top secret PRISM program claims direct access to server
Dear LibTech,
In case there are any Montreal-based journalists on the list:
I just wanted to quickly share that I'm hosting a privacy and operational
security workshop for journalists here in Montreal, sponsored by The Link
newspaper.
https://www.facebook.com/events/167915566718007/
It's all fo
1 - 100 of 304 matches
Mail list logo