On Mon, Nov 12, 2012 at 4:53 AM, Mike Perry wrote:
> In various venues, you keep claiming that the Tor Project is somehow
> blinded by its own propaganda, as if by some form of conspiracy or
> cultural phenomena.
Just one venue (tor-talk), which is why I am reluctant to continue
this discussion h
Thus spake Maxim Kammerer (m...@dee.su):
> On Wed, Nov 7, 2012 at 3:17 AM, Griffin Boyce wrote:
> > Has anyone asked Tim Berners-Lee about child pornography lately? Cell
> > phones are used by drug dealers, and my dicing knife doubles as a deadly
> > weapon. There's a world of difference between
On Wed, Nov 7, 2012 at 3:17 AM, Griffin Boyce wrote:
> Has anyone asked Tim Berners-Lee about child pornography lately? Cell
> phones are used by drug dealers, and my dicing knife doubles as a deadly
> weapon. There's a world of difference between the inventor's intended
> use and those secondary
On 11/06/2012 04:28 PM, Maxim Kammerer wrote:
> On Tue, Nov 6, 2012 at 11:14 PM, Roger Dingledine wrote:
>> it's times like this that
>> I'm glad I work for a non-profit that doesn't have to make a business
>> tradeoff to decide how much to lie to its users.
> *cough*
> Hate to recycle one of my p
Am 06.11.2012 20:13, schrieb Nadim Kobeissi:
> Greg,
> I don't intend to be anonymous. Why would I? I intend for Silent
> Circle to open their source code for review, because as it stands they
> are being dangerous to the methodology of security software development.
For the open source call (just
Maxim Kammerer:
> publicly acknowledge the currently primary use
> of hidden services
Please enlighten us all about the primary use of hidden services.
--SiNA
--
“Be the change you want to see in the world.” Gandhi
OTR: i...@jabber.ccc.de
a5dae15f45a37e9768f6deae7b54807fc4942ec9
--
Unsubscri
On Tue, Nov 6, 2012 at 11:14 PM, Roger Dingledine wrote:
> it's times like this that
> I'm glad I work for a non-profit that doesn't have to make a business
> tradeoff to decide how much to lie to its users.
*cough*
Hate to recycle one of my past favorite discussion topics, but:
https://www.torpr
The full response in the FAQ is: "Yes it is. Silent Phone uses
Device-to-Device encryption technology so that only the users have the keys
exchanged on their device for each call peer-to-peer….the keys are not held
on a server. Silent Phone uses TLS and the ZRTP protocols to encrypt the
packets of
On Tue, Nov 06, 2012 at 02:28:36PM -0500, Nadim Kobeissi wrote:
> I believe that releasing closed-source, unreviewed and centralized crypto
> software and then marketing it as secure to be malpractice. That is simply
> my point.
I stopped looking at SilentCircle when I was looking through their
FA
Nadim is biased - and that matters little IMO.
That puts him in the company of, oh, 100% of other professionals. ;-)
My complaint is that if there is an agenda, and I take him at his word for
what he wrote, are these repeated and targeted nits at an accessible and
usable player who does use stand
OK - now we actually have a detail disagreement.
Please show me evidence of Silent Circle "malpractice"..
That's a big leap from disagreeing with a practice or declaring a best
practice as you see fit and negligence or even blatant disregard.
Context matters.
-Ali
On Tue, Nov 6, 2012 at 2:22
Ali,
Of course I would publicize my complaints. That's how you get your voice
heard. I repeat that my only concern here if Silent Circle shipping
questionably secure software and going against the open sourcing of
cryptography software. I don't care if it's, as you say "a bit of 'look at
me!'", Thi
It's not just me who interprets it that way - the only reason I responded
was that after Nadim's first post I was approached by former colleagues who
are still in the DoD circles. They all wondered if these complaints, that
seemed awfully specific to ~one~ player in the industry, were born from
Ano
Nadim
I understand your position, but actions like this website won't help
your cause.
Can you understand how actions like setting up this web site might be
viewed as a way to call attention to oneself, rather than champion the
(respectable) ideals of the open source movement?
--
Greg Norcie (g..
Trust isn't a simple matter of FOSS or not. It just isn't - you know that
as well. The code isn't often the biggest limiting factor although the code
availability provides a degree of mobility not otherwise available.
Additionally
~availability~ and ~usability~ matter too. The standoff position fro
Ali,
The issue is trust. Security software verifiability should not have to
depend on Silent Circle (or who they hire to audit, for example Veracode.)
NK
On Tue, Nov 6, 2012 at 1:51 PM, Ali-Reza Anghaie wrote:
> Nobody would dispute that - that's not quite the same thing as FOSS
> default posi
I read them before - I followed the thread before. I too have written that
Silent Circle needs to follow-through on their promises. I also highlighted
some of the challenges of being a commercial entity in this space.
I wasn't being aggressive - hardly.
I'm disillusioned with the state of hacktiv
Seriously - what's your agenda?
Where are the domains for the other tens of providers who charge arms and
legs based on closed protocols even?
What's the nit with Silent Circle specifically? Because they're accessible?
Because it's easier to use? Because the founders have good track records of
st
http://issilentcircleopensourceyet.com/
NK
--
Unsubscribe, change to digest, or change password at:
https://mailman.stanford.edu/mailman/listinfo/liberationtech
19 matches
Mail list logo