In case you missed it, Jari Arkko, Chair of the IETF and Stephen
Farrell, IETF Security Area Director, just posted:
http://www.ietf.org/blog/2013/09/security-and-pervasive-monitoring/
--
---
Joly MacFie 218 565 9365 Skype:punkcast
Recent TOR thing with freedomhosting (?) come to mind...
On Sun, Sep 8, 2013 at 6:08 PM, wrote:
> On Sat, 07 Sep 2013 17:34:36 -0600, "Keith Medcalf" said:
>
> > Sometimes, it is a deliberate feature which is deliberately used to
> attack
> > the visitors of a web site. Prime example is the DH
On Sat, 07 Sep 2013 17:34:36 -0600, "Keith Medcalf" said:
> Sometimes, it is a deliberate feature which is deliberately used to attack
> the visitors of a web site. Prime example is the DHS.
I must have missed this one. Citation please?
pgpQHZAshlFOW.pgp
Description: PGP signature
On Sun, Sep 08, 2013 at 03:50:33PM -0400, Jean-Francois Mezei wrote:
> Here is what the politicians forget:
> Because the economy is moving to the internet, losing trust in the
> internet is akin to losing trust in the banking system.
If the last five years have left anyone with a shred of trust i
On 09/08/2013 02:25 AM, Eugen Leitl wrote:
- Forwarded message from Gregory Perry -
Date: Sat, 7 Sep 2013 21:14:47 +
From: Gregory Perry
To: Phillip Hallam-Baker
Cc: "cryptogra...@metzdowd.com" , ianG
Subject: Re: [Cryptography] Opening Discussion: Speculation on "BULLRUN"
On 0
- Original Message -
> From: Kee Hinckley
> To: "nanog@nanog.org list"
> Cc:
> Sent: Sunday, September 8, 2013 2:21 PM
> Subject: Re: Yahoo is now recycling handles
>
>
> On Sep 7, 2013, at 7:58 PM, Keith Medcalf wrote:
>
>>
>> The appropriate party to inform would be the FBI ...
Actually Roland is right when he says:
If folks are unhappy with the current state of affairs, they ought to
concentrate on writing laws, not code.
Randy is being his usual self and playing devils advocate, which is
fine, but doesn't move the ball (or is simply self-serving).
In any event,
On 9/8/2013 2:38 PM, Anurag Bhatia wrote:
Hi Matthew
Interesting experience.
first into a black hole, and then bouncing with permanent failures.
What you mean by permanent failures? Can you share error you saw in bounce
report?
RFC 2505 Anti-Spam Recommendations
On Sep 7, 2013, at 7:58 PM, Keith Medcalf wrote:
>
> The appropriate party to inform would be the FBI ... The word fraud comes to
> mind, and millions of 50 centses puts company officers in prison for a long
> long long time.
The charges did indeed expire rather than get posted. None of whic
With regards to the 10$ snake oil security product versus the real one
at $100: since the NSA can break both, they are both worth worth $0 in
terms of privacy.
>From a business/corporate point of view, there are two aspects:
1- Image: If your weak security has allowed a data breach to become
pu
Hi Matthew
Interesting experience.
>first into a black hole, and then bouncing with permanent failures.
What you mean by permanent failures? Can you share error you saw in bounce
report?
On Sat, Sep 7, 2013 at 1:30 AM, Matthew Kaufman wrote:
> TL; DR: Email won't be delivered, No support
>
I use Fing app which gives traceroute (not MTR) and has some additional
features like scanning of broadcast for other machines as well as wake on
LAN trigger etc.
Checkout -
https://play.google.com/store/apps/details?id=com.overlook.android.fing&hl=en
The only bad side is irritating banner which
On 9/8/13 12:58 AM, Randy Bush wrote:
Quite frankly, all this chatter about technical 'calls to arms' and
whatnot is pointless and distracting (thereby calling into question
the motivations behind continued agitation for technical remedies,
which clearly won't have any effect whatsoever).
cool.
The topic of Canadian network sovereignty has been part of the Canadian
conscience since the failure of CANNET back in the 1970s.
Canadians citizens, on Canadian soil, already supply feeds directly to the
NSA. Rerouting Internet traffic would make no difference.
On Sat, Sep 7, 2013 at 3:08
On Sun, Sep 8, 2013 at 9:07 AM, Eugen Leitl wrote:
> 1. [...] In general the consuming public cannot tell the
> difference between “good stuff” and snake oil. So when presented
> with a $100 “good” solution or a $10 bunch of snake oil, guess
> what gets bought.
Or there might b
- Forwarded message from "Jeffrey I. Schiller" -
Date: Sat, 7 Sep 2013 19:52:44 -0400
From: "Jeffrey I. Schiller"
To: Gregory Perry
Cc: "cryptogra...@metzdowd.com" , Phillip
Hallam-Baker , ianG
Subject: Re: [Cryptography] Opening Discussion: Speculation on "BULLRUN"
User-Agent
On Sun, Sep 08, 2013 at 04:58:52PM +0900, Randy Bush wrote:
> > Quite frankly, all this chatter about technical 'calls to arms' and
> > whatnot is pointless and distracting (thereby calling into question
> > the motivations behind continued agitation for technical remedies,
> > which clearly won't
Now is pretty clear, Randy is The Mole ROFL
-J
On Sun, Sep 8, 2013 at 4:25 AM, Eugen Leitl wrote:
> - Forwarded message from Gregory Perry
> -
>
> Date: Sat, 7 Sep 2013 21:14:47 +
> From: Gregory Perry
> To: Phillip Hallam-Baker
> Cc: "cryptogra...@metzdowd.com" , ianG <
- Forwarded message from Gregory Perry -
Date: Sat, 7 Sep 2013 21:14:47 +
From: Gregory Perry
To: Phillip Hallam-Baker
Cc: "cryptogra...@metzdowd.com" , ianG
Subject: Re: [Cryptography] Opening Discussion: Speculation on "BULLRUN"
On 09/07/2013 05:03 PM, Phillip Hallam-Baker wrot
On Sep 8, 2013, at 2:58 PM, Randy Bush wrote:
> cool. then i presume you will continue to run using rc4 and rsa 1024.
The point is that no matter what crypto algorithms are developed and
implemented, it's generally trivial for authorized (for whatever value of
'authorized' applies in a given
> Quite frankly, all this chatter about technical 'calls to arms' and
> whatnot is pointless and distracting (thereby calling into question
> the motivations behind continued agitation for technical remedies,
> which clearly won't have any effect whatsoever).
cool. then i presume you will continu
21 matches
Mail list logo