Re: [liberationtech] issilentcircleopensourceyet.com

2012-11-07 Thread Maxim Kammerer
On Wed, Nov 7, 2012 at 3:17 AM, Griffin Boyce griffinbo...@gmail.com wrote: Has anyone asked Tim Berners-Lee about child pornography lately? Cell phones are used by drug dealers, and my dicing knife doubles as a deadly weapon. There's a world of difference between the inventor's intended use

Re: [liberationtech] issilentcircleopensourceyet.com

2012-11-06 Thread Greg Norcie
Nadim I understand your position, but actions like this website won't help your cause. Can you understand how actions like setting up this web site might be viewed as a way to call attention to oneself, rather than champion the (respectable) ideals of the open source movement? -- Greg Norcie

Re: [liberationtech] issilentcircleopensourceyet.com

2012-11-06 Thread Ali-Reza Anghaie
It's not just me who interprets it that way - the only reason I responded was that after Nadim's first post I was approached by former colleagues who are still in the DoD circles. They all wondered if these complaints, that seemed awfully specific to ~one~ player in the industry, were born from

Re: [liberationtech] issilentcircleopensourceyet.com

2012-11-06 Thread Nadim Kobeissi
Ali, Of course I would publicize my complaints. That's how you get your voice heard. I repeat that my only concern here if Silent Circle shipping questionably secure software and going against the open sourcing of cryptography software. I don't care if it's, as you say a bit of 'look at me!', This

Re: [liberationtech] issilentcircleopensourceyet.com

2012-11-06 Thread Ali-Reza Anghaie
OK - now we actually have a detail disagreement. Please show me evidence of Silent Circle malpractice.. That's a big leap from disagreeing with a practice or declaring a best practice as you see fit and negligence or even blatant disregard. Context matters. -Ali On Tue, Nov 6, 2012 at 2:22

Re: [liberationtech] issilentcircleopensourceyet.com

2012-11-06 Thread Roger Dingledine
On Tue, Nov 06, 2012 at 02:28:36PM -0500, Nadim Kobeissi wrote: I believe that releasing closed-source, unreviewed and centralized crypto software and then marketing it as secure to be malpractice. That is simply my point. I stopped looking at SilentCircle when I was looking through their FAQ:

Re: [liberationtech] issilentcircleopensourceyet.com

2012-11-06 Thread Ali-Reza Anghaie
The full response in the FAQ is: Yes it is. Silent Phone uses Device-to-Device encryption technology so that only the users have the keys exchanged on their device for each call peer-to-peer….the keys are not held on a server. Silent Phone uses TLS and the ZRTP protocols to encrypt the packets of

Re: [liberationtech] issilentcircleopensourceyet.com

2012-11-06 Thread SiNA Rabbani
Maxim Kammerer: publicly acknowledge the currently primary use of hidden services Please enlighten us all about the primary use of hidden services. --SiNA -- “Be the change you want to see in the world.” Gandhi OTR: i...@jabber.ccc.de a5dae15f45a37e9768f6deae7b54807fc4942ec9 --