e here:
http://c3media.vsos.ethz.ch/congress/2014/h264-hd/31c3-6258-en-Reconstructing_narratives_hd.mp4
thanks for sharing it, anyway. Only watched it now.
Sadly, noticeable is the fact that many of us are concerned with
hiding information, instead of exploring limits of math. There's the
power of fear.
watched the video, its amazing how much is broken and that GPG and OTR are not.
> On Dec 31, 2014, at 5:20 AM, Nicolai Josuttis wrote:
>
> OK,
> for those who didn't have time to see the talk at 31C3
> as a whole and therefore wondering why this is an important talk,
&g
> What I'm looking for is some sort of concrete information about "When ssh is
> configured the NSA can break it." I've seen quite a few sites make
> the claim that "zomg, ssh is broken!" but haven't yet seen any specifics.
First, my usual reminder: don’t focus on the three-letter Voldemort. T
On 12/31/2014 06:40 PM, Robert J. Hansen wrote:
The protocol was secure: you just had to configure it correctly.
Yes, thank you for your tidy summary of "Security 101." :)
What I'm looking for is some sort of concrete information about "When
ssh is configured the NSA can break it." I've seen
> Microsoft’s point-to-point tunneling protocol version 1.0 was a miserable
> failure. Version 2.0 closed up many of those holes and was widely regarded
> as secure, except for a configuration option which was on by default: “Enable
> backwards compatibility.” So to exploit a PPTP 2.0 connecti
> If anyone has a reference ...
Not a reference, but some history —
Microsoft’s point-to-point tunneling protocol version 1.0 was a miserable
failure. Version 2.0 closed up many of those holes and was widely regarded as
secure, except for a configuration option which was on by default: “Enable
On 1 January 2015 at 10:19, Doug Barton wrote:
> The death of IPsec has been greatly exaggerated:
>
> https://nohats.ca/wordpress/blog/2014/12/29/dont-stop-using-ipsec-just-yet/
And the “ssh is broken” remark strikes me as a little dramatic, too.
___
On 12/31/2014 3:25 PM, mark hellewell wrote:
And the “ssh is broken” remark strikes me as a little dramatic, too.
Well I've seen vague references to some of the "less secure" settings
being vulnerable, but I've yet to see, "everything below this line is
vulnerable, everything above this line
The death of IPsec has been greatly exaggerated:
https://nohats.ca/wordpress/blog/2014/12/29/dont-stop-using-ipsec-just-yet/
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
* Nicolai Josuttis wrote:
> For those who didn't have time to see it yet,
> there was an important talk at 31C3
> about the social and technical status and consequences of
> encryption by Jacob Applebaum and Laura Poitras.
> As a side effect it covers GnuPG significantly.
&
Disclaimer:
Sorry guys, I first wrote these emails as part of another thread.
(Not enough sleep over the last days of 31C3 ...)
But because IMO this is something important for this list,
please allow me to redistribute it as separate thread, again.
For those who didn't have time to see i
OK,
for those who didn't have time to see the talk at 31C3
as a whole and therefore wondering why this is an important talk,
let me point out and quote some content from
>> http://media.ccc.de/browse/congress/2014/31c3_-_6258_-_en_-_saal_1_-_201412282030_-_reconstructing_narrativ
On Fri, 12 Dec 2014 01:49, flapf...@riseup.net said:
> is it possible for you (or other FSFE people at the Assembly) to accept
> donations for GnuPG (in cash) there?
That should be possible.
Shalom-Salam,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
Hi.
On Thu, Dec 11, 2014 at 01:49:36PM +0100, Peter Lebbing wrote:
> Probably monkeyscan from monkeysign...
FWIW: A tool with a similar goal is GNOME Keysign:
https://github.com/muelli/geysigning (Note that the repository will move, so
this link will become defunct)
Contrasting caff or monkeysign
Werner Koch:
> I will be at the 31C3 at Hamburg from the 28th (late afternoon) to the
> 30th. You may find me at the FSFE Assembly or ask there for my local
> communication parameters.
Hi,
is it possible for you (or other FSFE people at the Assembly) to accept
donations for GnuPG
On Thu, 11 Dec 2014 at 13:22:28 +0100, Peter Lebbing wrote:
> On 11/12/14 11:39, Werner Koch wrote:
>> I will be at the 31C3 at Hamburg from the 28th (late afternoon) to the
>> 30th. You may find me at the FSFE Assembly or ask there for my local
>> communication paramet
On 11/12/14 17:58, Guilhem Moulin wrote:
> There is one advertized already:
Excellent!
And thank you for pointing it out, especially since they expect you to sign up
/way before/ the event. I hope they'll allow people in who didn't sign up (who
will bring their own slips of paper or QR code for
On 11/12/14 14:46, Tobias Mueller wrote:
> FWIW: A tool with a similar goal is GNOME Keysign:
Thanks for the pointer!
> Contrasting caff or monkeysign, it does not rely on keyservers.
Neither does caff, if the organiser of the keyparty simply collects all keys
(sent by the participants) and send
On 11/12/14 13:22, Peter Lebbing wrote:
> Oh, and there's this 2D
> barcode keysigning thing as well, should look it up. It was demonstrated to me
> at the keysigning at OHM2013.
Probably monkeyscan from monkeysign... the latter has been mentioned numerous
times on this list, btw.
Peter.
--
I u
On 11/12/14 11:39, Werner Koch wrote:
> Hi!
Hi!
> I will be at the 31C3 at Hamburg from the 28th (late afternoon) to the
> 30th. You may find me at the FSFE Assembly or ask there for my local
> communication parameters.
I intend to organise a keysigning party if no one else does.
Hi!
I will be at the 31C3 at Hamburg from the 28th (late afternoon) to the
30th. You may find me at the FSFE Assembly or ask there for my local
communication parameters.
Shalom-Salam,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz
21 matches
Mail list logo