In my security course, I have students look at and contrast
the ACM and IEEE codes of ethics.
To be honest the ACM code is long winded, hard to follow, and
(in my opinion) almost impossible to follow.
It does not surprise me that it did not influence the people.
What would surprise me is if they
> Involving ethics in these domains - e.g., research ethics in the social
> sciences, ethics for design in ICT, and/or the ethical dimensions of
> specific "Big Data" projects involving computer scientists and
> engineers, police and first responders, national emergency authorities,
> etc.
Both
On 2/3/19 1:26 AM, Paul wrote:
> Is there any evidence, or even anecdotes, suggesting that ethics courses
> (in any form) work to make people act more ethically?
Main issue that I would see is how you measure ethics. Psychology
studies seem to lack reproducibility.
> I can see that someone
> But I wonder what the pedagogical research literature says about the
> best way to teach ethics? I'm data-driven, so I'd rather see empirical
> evidence guide educational policy or someone conduct a study to assess
> the best course of action.
I doubt that you could come up with an empirical mea
ABET accreditation requirements include ethics and some type of
contemporary issues awareness. This has to be addressed in the curriculum
in at least one course.
This can be, does not have to be, a separate course. It can be more
effective as part of another course.
To be accredited, the departme
>> Should it allow antifa? Should it include racists?
>
> If the rules of the discursive process are sufficiently
> well defined, then everyone is inhibited from causing
> damage or bring forward opinions that aren't compatible
> with previous fundamental decisions such as human rights
> etc. To e
>
> You can have all the apps and Internet fun you like, but to
> betray democracy must be technically impossible. Such an
> abuse-resistant Internet is possible. Society has to care
> and to regulate.
>
A general concern should be who does the regulation and
to what ends? The UN is questionable
On the other hand, why are they using gmail?
Our university outsourced email to Google. They
software up to date, handle the security, provide
convenient cloud access (I personally dislike
their GUIs), etc. For our university, this decision
probably did make our email traffic more secure
as well.
With all these discussions too often vote selling
is overlooked. If I can vote from an insecure location,
I can vote in front of someone paying me $100 to
vote as they want.
On 12/07/2016 09:24 AM, Rich Kulawiec wrote:
> On Fri, Dec 02, 2016 at 02:26:49PM -0500, Andres wrote:
>> Rich, the article
om&d=CwMFaQ&c=Ngd-ta5yRYsqeUsEDgxhcqsYYY1Xs5ogLxWPA_2Wlc4&r=V-iMGiA8Z-z_leHLkLSzXQ&m=SlJXG_BoOkn0cGCftQZKo1Rvd4GzZTG5vHpxYD7xAzo&s=Zbv2_gyBalZfZ6ij7X-fsvr7x8ZuRLqJ4sGecfebOq4&e=>
>
> On Mon, Dec 5, 2016 at 8:28 PM, Richard Brooks <mailto:r...@g.clemson.edu>> wrote:
>
> Have not seen a
Have not seen any discussion here on Gambia, where a surprise
peaceful exchange of power seems to be taking place. The
dictator cut off Internet and phone service during the
election and yet has accepted that he lost the election.
A rare piece of good news.
--
Liberationtech is public & archives
Am doing a prototype tool for avoiding network traffic
analysis. Does anyone have write ups on what national
firewalls are using to filter traffic?
There are the obvious DNS names, IP addresses, port numbers
and keywords in the traffic content.
What other header fields may be inspected?
If anyon
I would agree. Also consider the numerous cases of
intentional network disruptions on the continent during voting
over the past year. It is predictable that this would become
a tool of voter suppression.
Oddly, though, mobile devices have been essential tools
in monitoring voting and mobilizing vo
Here is their web page:
http://www.africtivistes.org/!/
It is (of course) in French. A very amazing community
of local activists, many with hands-on experience of
social activism putting democratic governments in place
for the first time.
--
Liberationtech is public & archives are searchable
As a recap, about 1 year ago a popular uprising called Balai Citoyen:
https://en.wikipedia.org/wiki/Le_Balai_Citoyen
started by rappers and tech activists in Ouagadougou got
a lot of the population in the street to protest moves
by the President to prolong his 27 years in office.
Ouagadougou is
As if made for each other:
ACM commentary on risks of on-line voting:
http://cacm.acm.org/blogs/blog-cacm/185174-computer-security-and-the-risks-of-online-voting/fulltext
Commercial trade press saying that
"Just five years ago, the debate about Internet voting was "dominated by
classically, appr
Goma Web Activism Summit in the city that has become the hub of web
activisim in #DRC twitter.com/arsenebaguma/s…
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech.
Is Ostel functional? Have issues getting it to work,
the CsipSimple echo appears not to be functional.
Would appreciate feedback.
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/
t until now.
> social media such as Face book, whatsapp, viber are blocked. People use
> VPN”
>
>
>
> On May 18, 2015 7:19 AM, "Richard Brooks" <mailto:r...@g.clemson.edu>
> <mailto:r...@g.clemson.edu <mailto:r...@g.clemson.edu>
We have noticed that Burundi bloggers are off-line. No
doubt related to the President's crack down after the
failed coup.
Does anyone have any news as to whether this silence is
due to:
-Internet blackout?
-Physical threat/imprisonment?
-Fear?
--
Liberationtech is public & archives are searchable
Sources in Togo report an Internet blackout. Probably related to
expecting problems after reporting results from the recent election.
Sources in Burundi also expecting a blackout as a result of
ongoing pro-democracy protests.
--
Liberationtech is public & archives are searchable on Google. Violat
About 1 hour of audio
For right to be forgotten:
-Eurocrat
-U of Chicago Law Professor
Against:
-Former Google Exec
-Zittrain from Berkmann center, Harvard
Very reasoned and thoughtful discussion of privacy issues:
http://podcastdownload.npr.org/anon.npr-podcasts/podcast/510184/393751110/npr_39
The Democratic Republic of Congo had a total net blackout
last week. Internet and SMS. Do not know if it was back.
I know that people in Togo are having trouble getting to Tor.
I suspect it may be blocked. (That or the net connections have
just degraded to the point that there are too many timeout
Actually, you also need to have source code for the compilers
used and the compiler's compilers...
And that ignores the use of hardware trojans.
On 01/15/2015 12:29 PM, carlo von lynX wrote:
> On Thu, Jan 15, 2015 at 08:49:31AM -0800, Steve Weis wrote:
>> Note you said "users will never know" if
More censorship and surveillance:
http://www.zdnet.com/article/europes-answer-to-terror-attacks-on-free-speech-is-to-double-down-on-internet-censorship/#ftag=RSSbaffb68
We can only defend freedom by killing it.<\sarcasm>
--
Liberationtech is public & archives are searchable on Google. Violations
t; There are other services specialised in sending SMS, Amazon for
> example http://docs.aws.amazon.com/sns/latest/dg/SMSMessages.html
> those I haven't used yet.
>
> Regards,
> --
> Eduardo Robles Elvira @edulix skype: edulix2
> h
Anyone willing to share experiences on setting up
(or using) an Internet to SMS interface...
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change
me in Gabon.
On 12/31/2014 05:50 PM, Collin Anderson wrote:
>
> On Wed, Dec 31, 2014 at 1:24 PM, Richard Brooks <mailto:r...@g.clemson.edu>> wrote:
>
> All of these countries have active blogger communities. One
> common fear in these countries is a nationwide c
Does anyone have any info about this hidden service?
I've been using it to set up temporary accounts to
exchange info as a pgp work-around for people having
trouble working with pgp keys. I assume the content
can be read by whoever runs the site, but they won't
know who I am.
If the other side us
Burkina Faso overthrew the government in October.
Thus far it looks like the new government has
broad support, there is little chaos, and things are
stable. Given a recent widespread revolt, the people at
the top are being careful.
Demonstrations against the Gabon kleptocracy this month have
resul
Any reviews/opinions of this:
https://resistsurveillance.org/
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password b
thinking to date...
> Richard, not sure if you can post to libtech but happy to intermediate.
>
> best, Joe
>
> On 11/19/14, 10:13 AM, Richard Brooks wrote:
>> Just looked at this:
>
>> https://letsencrypt.org/howitworks/technology/
>
>> The EFF's new
Just looked at this:
https://letsencrypt.org/howitworks/technology/
The EFF's new CA to make things cheap and easy for
installing certs. I like the goal.
What I do not get from the description is how they
really verify that I legitimately own the site. If
I should manage to reroute some traffic
Interesting article on events in Burkina Faso and
social media:
http://www.jeuneafrique.com/Article/ARTJAWEB20141031144747/
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/libera
On 09/18/2014 02:15 PM, Richard Brooks wrote:
> In a serious publication (Communications of the ACM), researchers
> from ETH in Zurich explain that cybersecurity becomes
> easier, if only we make everyone "accountable" by making
> the infrastructure indelibly track e
In a serious publication (Communications of the ACM), researchers
from ETH in Zurich explain that cybersecurity becomes
easier, if only we make everyone "accountable" by making
the infrastructure indelibly track every packet:
http://cacm.acm.org/magazines/2014/9/177943-accountability-in-future-int
List of supporters caught my eye:
https://firstlook.org/theintercept/2014/09/02/obama-12333-surveillance-nsa-rights-groups-letter/
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinf
Botnet in the mobile (BITM) like Zeus in the mobile (ZITM)
usually gets around 2-step verification by tricking people
to install malware on their Android that intercepts SMS.
Can also be done by tricking the system to SMS another device
(done lately to attack German banks).
On 08/27/2014 11:29 AM
Lack of technical expertise is apparently a plus in the world
of federal cybersecurity:
http://www.washingtonpost.com/blogs/the-switch/wp/2014/08/22/does-the-white-houses-cybersecurity-czar-need-to-be-a-coder-he-says-no/
--
Liberationtech is public & archives are searchable on Google. Violations
Gambia -- finds man guilty of broadcasting without a
license, because he used skype:
http://standard.gm/site/news/4297-UDP-pays-Lasana-Jobartehs-court-fine-says-they-will-appeal.html
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moder
On 07/17/2014 05:57 PM, Griffin Boyce wrote:
> Andy Isaacson wrote:
>>> this is exactly why some who have received these payloads are
>>> sitting on them, rather than disclosing.
>
>> Hmmm, that seems pretty antisocial and shortsighted. While the
>> pool of bugs is large, it is finite. Get bugs
egistry Expiry Date: 2015-07-03T09:40:49Z
> Sponsoring Registrar:Bizcn.com, Inc. (R1248-LROR)
>
> vxheavens.com <http://vxheavens.com> appears to be better maintained
> and registered for a while.
>
>
> On Tue, Jul 15, 2014 at 9:04 PM, Richard Brooks <mailto:r...@g.clemson.edu&g
The Vx Heaven security education website had been taken
down a year or so ago by the Ukrainian authorities for
allegedly encouraging cybercrime. Early this year it
came back up. I don't know where.
Interestingly, this week or last the vxheaven.org site
stopped working and now you get adds from DNS
Just saw this:
https://protonmail.ch/
purports to be a secure email service. Did not look at it in
detail. Would be curious about critiques.
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailm
See:
https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget
Sounds like hype to me. Anyone else have an opinion?
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
See:
http://www.sueddeutsche.de/digital/internet-ueberwachung-nsa-soll-deutschen-tor-nutzer-ausspioniert-haben-1.2029100
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberatio
The problems of Sanna Camara in Gambia:
http://www.internetsansfrontieres.org/Gambie-arrestation-et-inculpation-d-un-correspondant-d-Internet-Sans-Frontieres-une-attaque-intolerable-contre-la_a542.html
We put together a hashtag #FreeSanna on Twitter. The Gambian
government seems to be prosecuting
See:
http://www.internetsansfrontieres.org/Gambie-arrestation-et-inculpation-d-un-correspondant-d-Internet-Sans-Frontieres-une-attaque-intolerable-contre-la_a542.html
He also helped provide more information about Gambia blocking Viber.
Gambia also blocks downloading Tor, but not using Tor. (This
The author of:
http://standard.gm/site/news/4063-Police-admit-problems-with-human-trafficking.html
Was arrested yesterday. Is currently out on bail. He risks jail time,
at least six months, and at least US$105 000 fine. This is
under Gambia's recent information laws making it criminal to
insult t
The President's review of big data and privacy
In January, President Obama spoke about changes in the technology we use
for national security purposes, and what they mean for our privacy broadly.
He launched a 90-day review of big data and privacy: how they affect the
way we live, and the way we
http://www.theguardian.com/technology/2014/mar/19/internet-censorship-emerging-countries-pew
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
chang
This journalist is writing a thesis on Iranian
Censorship at the University of Bologna:
lisaviolaro...@gmail.com
She would appreciate information on the topic from
people actively working on this problem. If you want
to help her, please contact her directly.
--
Liberationtech is public & archiv
My understanding is that, in urban environments, it is very difficult to
identify the exact location of wireless signals. There is a pirate
low-power FM station in DC within blocks of the FCC. It has been
broadcasting for years, no one has been able to find it. This is due to
multi-path fading of t
Wer weiss.
On 12/31/2013 09:59 AM, andreas.ba...@nachtpult.de wrote:
> Felix von Leitner says that is's not like that, check his blog at
> blog.fefe.de :)
> -Original Message-
> From: Richard Brooks
> Sender: liberationtech-boun...@lists.stanford.edu
> Date: Tu
The Sueddeutsche Zeitung seems to think his speech
was disrupted as a type of feminist protest
http://sz.de/1.1853271
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberation
Some clarifications on the Wassenaar update:
http://www.lexology.com/library/detail.aspx?g=f642284a-03b0-4767-9c93-30a3407041cc
It seems that it is meant to be narrowly aimed at
snooping tools, and not at counter snooping tools.
On 12/10/2013 03:50 AM, Fabio Pietrosanti (naif) wrote:
> This emai
On 11/12/2013 10:14 AM, Timur Mehrvarz wrote:
> On 12.11.2013 15:28, Tamer Bilir wrote:
>> You need a MAC and IMEI changer not MAC only. In my opinion
>>
>
Seems to be an IMEI modifier:
http://forum.xda-developers.com/showthread.php?t=1103766
> I don't think so. Wifi MAC addresses are not bein
getnameinfo() should provide a list of DNS names associated
with the IP address. So that catlovers.com and terrorism.com
would both be included.
Of course, the machine can have multiple IP and DNS names.
On 10/29/2013 01:49 PM, andrew cooke wrote:
>
> people are saying that the site name is visi
I would assume that they see the port, too.
It is also well known that URLs have identifiable
signatures based on the number of items retrieved
and the packet sizes. In most cases, it is easy to
infer the URLs visited. But the encryption should
protect data entered into forms.
So, the sequences o
Since most email is spam, how productive is the NSA dragnet?
http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/15/the-nsas-giant-utah-data-center-will-probably-hold-a-bunch-of-spam/?wpisrc=nl_tech
--
Liberationtech is public & archives are searchable on Google. Violations of
list guide
10 reasons to give up, stop trying, hide in a corner, and die.
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password
Foreign Policy Magazine claims that US Dept of State
trumps the NSA:
http://thecable.foreignpolicy.com/posts/2013/10/04/not_even_the_nsa_can_crack_the_state_departments_online_anonymity_tool
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will g
http://www.washingtonpost.com/world/china-broadcasts-confession-of-chinese-american-blogger/2013/09/15/3f2d82da-1e1a-11e3-8459-657e0c72fec8_story.html?wpisrc=nl_cuzheads
--
Liberationtech is public & archives are searchable on Google. Violations of
list guidelines will get you moderated:
https:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> For large companies, I wonder how resignations would count in this?
> Could an NSL require, say, the lead cryptographer of an org to /not/
> resign?
>
>
They could easily do the equivalent of an East German Berufsverbot and
make it impossible for
Yes. There is a good hack from the CCC where they
published the fingerprints of the German Innenminister
(equivalent of Attorney General). They also showed
how latex fingerprint imprints can fool existing
scanners.
On 09/10/2013 05:54 PM, Scott Elcomb wrote:
> Starting a new thread - it's related
Follow the money.
--
Liberationtech is a public list whose archives are searchable on Google.
Violations of list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe,
change to digest, or change password by emailing moderator at
compa...@
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> They have two jobs: to monitor foreign communication, and to secure
> domestic communication against foreign monitoring.
>
> http://www.nsa.gov/about/mission/
>
> The argument for trusting NSA/NIST crypto standards has historically
> been that weak
Latest articles:
http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?emc=edit_na_20130905&_r=0&pagewanted=print
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
I find most of this (if not all) silly. They seem shocked that the
NSA does cr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
>
> There is a massive difference between cryptanalysis and decade-long,
> well-funded, and top-secret program to subtly weaken international
> cryptographic protocols and sabotage industry implementations.
>
Their job is to collect information for
For the francophones:
http://www.rue89.com/2013/09/04/nouvelles-revelations-lunite-contre-espionnage-wikileaks-245374
--
Liberationtech is a public list whose archives are searchable on Google.
Violations of list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/
I have colleagues living in a small country, far, far
away with a history of rigged elections who want to
put in place a system for collecting information
using SMS. The local government keeps shutting
down the systems that they put in place.
I think I understand their needs and wants. SMS is
real
What do you do if the government is caught illegally spying on citizens?
Change the laws:
http://www.globalpost.com/dispatch/news/afp/130821/new-zealand-passes-law-allowing-domestic-spying?goback=.gde_1836487_member_267577237#!
--
Liberationtech is a public list whose archives are searchable on Go
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I guess this is progress.
In ancient Greece and the Middle Ages, exposing people to
the truth would get you killed.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iEYE
Some idle thoughts:
Edward Snowden
Bradley Manning
Julian Assange
Gen. Hayden
Jacob or Nadim
On 08/12/2013 04:32 PM, Francisco Ruiz wrote:
> Quick request.
>
> In comments to a recent post, people seemed to agree that publishing a
> video of someone reading a hash might be a fairly hard-to-hack
Nadim,
I think it is good that Bill Gates is working to
solve health issues that have been ignored because
the people involved are mainly poor and dark
complected.
I think freedom of information, though, may be
more important than you think. Take, for example,
The Gambia, one of the poorest count
On 08/09/2013 12:25 PM, Kyle Maxwell wrote:>
http://www.theguardian.com/technology/2013/aug/09/bill-gates-google-project-loon
>
> ===
>
> Bill Gates criticises Google's Project Loon initiative
>
> Former Microsoft chief says low-income countries need more than just
> internet access
>
> ===
On the
Got a message from one of my contacts who wants to try
to publish information he finds important. He is from
a country ranked by Freedom House as not free.
I'm a techie and not a reporter. Any idea as to who
might be interested (I could contact)? The general
region is Sub-Saharan Africa.
--
Liber
15:26, Richard Brooks wrote:
>
>> New law in Gambia makes using the Internet to "incite
>> dissatisfaction" with the government punishable by
>> up to 15 years in jail and $100,00 fine:
>
>> http://frontpageinternational.wordpress.com/2013/07/28/internet-
New law in Gambia makes using the Internet to "incite
dissatisfaction" with the government punishable by
up to 15 years in jail and $100,00 fine:
http://frontpageinternational.wordpress.com/2013/07/28/internet-is-being-used-as-platform-for-nefarious-and-satanic-activities/
Looks like other govern
s running on them". Some of the very same
> technologies that enable DRM could help us verify that computers are
> running what they should be.
>
> [1] http://boingboing.net/2012/08/23/civilwar.html
> [2] http://chillingeffects.org/anticircumvention/weather.cgi?WeatherID=534
>
&g
Obviously, these issues have been very thoroughly discussed
by Corey Doctorow and Larry Lessig. DRM has not proved to be
effective at safeguarding intellectual property. It seems
to be most effective as a tool in maintaining limited
monopolies, since it stops other companies from investing
in creat
1. The NSA center of excellence program is not really that
important. If you look carefully, they are mainly 2 year
community colleges located near Army bases that give
basic sysadmin training. This is good and necessary, but
don't get fooled into thinking that they are training
the highly skilled
For those that know and care, vxheaven is back online.
It happened a week ago.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
https://mailman.stanford.edu/mailman/listinfo/liberationtech
Nathan,
You've probably explained this before, but what is the difference
between OSTN and RedPhone?
Thanks.
-Richard
On 06/21/2013 10:30 AM, Nathan of Guardian wrote:
> On 06/20/2013 10:08 AM, Jacob Appelbaum wrote:
>> To the Skype promoters, apologists and deniers - I encourage you to
>> star
http://arstechnica.com/tech-policy/2013/06/use-of-tor-and-e-mail-crypto-could-increase-chances-that-nsa-keeps-your-data/
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
https://mailman.stanford.edu/
>From Guardian Q&A with Snowden
http://www.guardian.co.uk/world/2013/jun/17/edward-snowden-nsa-files-whistleblower
Is encrypting my email any good at defeating the NSA survelielance? Id
my data protected by standard encryption?
Answer:
Encryption works. Properly implemented strong crypto sy
You can't defend against this. There is a lot of research
going into detecting hardware trojans. In general, verifying
that either hardware or software is (or is not) malicious
in undecidable. We are even lacking in tools, short of exhaustive
tests, for verifying that either hardware or software ma
Reminds me of a recent comment from someone I was
training:
"Government information should be public. Personal
information should be private."
Unfortunately, we have it backwards.
On 06/13/2013 12:10 PM, Kyle Maxwell wrote:
> Thanks for this. His comments on "Guarding Privacy and Civil
> Libert
Just finished interacting with people from a number
of countries worried about Internet blackouts being
used by their governments to help prevent reporting
of unpleasant truths, such as vote-rigging.
I discussed with them what Telecomics did for Egypt
and other Arab countries and what Commotion an
On 06/07/2013 03:23 AM, Seth David Schoen wrote:
> The best widely-used tool to defend against traffic analysis is Tor,
> but Tor's developers readily concede that it has a lot of important
> limitations and that there's no obvious path around many of them.
> Two of these important limitations (no
nt in some way. I would find it hard to
imagine other configurations.
> -Original Message-
> From: liberationtech-boun...@lists.stanford.edu
> [mailto:liberationtech-boun...@lists.stanford.edu] On Behalf Of Richard
> Brooks
> Sent: Thursday, June 06, 2013 10:00 AM
&g
On 06/06/2013 03:45 AM, michael gurstein wrote:
> This is probably not a Liberation issue directly but I'm not sure where else
> to address it...
>
> Sunday I was flying (Porter Airlines--small short hop Canadian carrier) from
> NYC to Ottawa, ON with a plane change in Toronto. When we arrived i
Just talked with a lot of people who think network surveillance
equipment in their countries are being bought from either
Israelis or Chinese. It seems that they are competing for
market share. Was not aware of Israeli companies working in this
space.
Would be interested if anyone had more data.
We are unipolar:
"We have the best government that money can buy."
Mark Twain
On 05/16/2013 10:33 PM, Andrés Leopoldo Pacheco Sanfuentes wrote:
> This whole list, and many others, and we even have at least a martyr
> in Aaron Swartz, are for the tenets of the Swedish Pirate Party. So!
> What d
We did some work on power analysis sidechannels. The NSA solution
is to physically isolate anything that does crypto from
anything else. Separate power supplies and Faraday cages are used.
This is effective, but not practical for mobile devices.
Another alternative is to use dual rail instructions
On 4/26/2013 1:26 AM, Julian Oliver wrote:
> ..on Thu, Apr 25, 2013 at 07:12:21PM -0400, Richard Brooks wrote:
>> I have a student trying to make a modified
>> build of the Liberte Linux distribution. If
>> anyone would have time and be willing to
>> give her some pointe
Happened to come across this, which I wasn't
aware of:
http://openpgpjs.github.io/
Am curious as to the opinions people might have
about it.
-Richard Brooks
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing
I have a student trying to make a modified
build of the Liberte Linux distribution. If
anyone would have time and be willing to
give her some pointers, please send me an email
and I will forward to her.
Thank you,
-Richard Brooks
--
Too many emails? Unsubscribe, change to digest, or change
>
> forms of academic publishing.
>
>
>
> If for whatever reason (and there are lots including the issues
> pointed to
>
> here) one doesn't want to go to a pay for play model that leaves
>
> advertising(???) or donations (?
It's not curious. It is accurate. As the funding model
moved from subscribers paying for access to authors
paying for publication, the financial incentives
changed as well. The loosening of standards is an
obvious consequence of this decision.
The question of how best to publish quality academic
i
1 - 100 of 101 matches
Mail list logo