Mail Index
- [Full-disclosure] Secure whistleblowing feedback / reporting systems in the content of compartmented information, endpoint security [was: [NSA bitching] [formerly Re: PRISM][]]
- [Full-disclosure] Secure whistleblowing feedback / reporting systems in the content of compartmented information, endpoint security [was: [NSA bitching] [formerly Re: PRISM][]]
- [Full-disclosure] Intelligence agency subversions and clandestine, illicit programs; lack of popular outrage [was Re: PRISM]
- [Full-disclosure] Foreign Intelligence Resistant systems [was Re: reasonable return on investment; better investments in security [....]]
- [Full-disclosure] ... endpoint security, strong encryption
- [Full-disclosure] Secure whistleblowing feedback / reporting systems in the content of compartmented information, endpoint security [was: [NSA bitching] [formerly Re: PRISM][]]
- [Full-disclosure] Secure whistleblowing feedback / reporting systems in the content of compartmented information, endpoint security [was: [NSA bitching] [formerly Re: PRISM][]]
- audiovisual (urls)
- NSA: The Game
- DEF CON cell network attacks
- NSA: The Game
- Jim Bell needs Bitcoins!
- NSA: The Game
- NSA: The Game
- NSA: The Game
- ntru-crypto - Open Source NTRU Public Key Cryptography Algorithm and Reference Code
- ntru-crypto - Open Source NTRU Public Key Cryptography Algorithm and Reference Code
- Jim Bell needs Bitcoins!
- Jim Bell needs Bitcoins!
- Jim Bell needs Bitcoins!
- ntru-crypto - Open Source NTRU Public Key Cryptography Algorithm and Reference Code
- peertech.org cert [was: DEF CON cell network attacks]
- peertech.org cert [was: DEF CON cell network attacks]
- audiovisual (urls)
- peertech.org cert [was: DEF CON cell network attacks]
- trends in cybersecurity
- trends in cybersecurity
- Willis Ware Dies
- audiovisual (urls)
- audiovisual (urls)
- Fwd: [cryptography] A new approach to steganography
- [cryptography] A new approach to steganography
- audiovisual (urls)
- NSA tracking cellphone locations worldwide
- NSA tracking cellphone locations worldwide
- NSA tracking cellphone locations worldwide
- Snowden Civil War
- NSA tracking cellphone locations worldwide
- NSA tracking cellphone locations worldwide
- NSA tracking cellphone locations worldwide
- NSA tracking cellphone locations worldwide
- audiovisual (urls)
- [Full-disclosure] Secure whistleblowing feedback / reporting systems in the content of compartmented information, endpoint security [was: [NSA bitching] [formerly Re: PRISM][]]
- [Full-disclosure] Secure whistleblowing feedback / reporting systems in the content of compartmented information, endpoint security [was: [NSA bitching] [formerly Re: PRISM][]]
- infra-org (urls)
- infra-org (urls)
- infra-org (urls)
- infra-org (urls)
- infra-org (urls)
- infra-org (urls)
- Perhaps related? ABIS protocol Re: [Full-disclosure] Secure whistleblowing feedback / reporting systems in the content of compartmented information, endpoint security [was: [NSA bitching] [formerly Re: PRISM][]]
- infra-org (urls)
- infra-org (urls)
- infra-org (urls)
- infra-org (urls)
- infra-org (urls)
- NSA morale down
- NSA morale down
- EM-nature (was: infra-org)
- NSA morale down
- EM-nature (was: infra-org)
- EM-nature
- EM-nature (was: infra-org)
- EM-nature (was: infra-org)
- EM-nature (was: infra-org)
- Android IMSI Catcher detection
- Android IMSI Catcher detection
- EM-nature (was: infra-org)
- Android IMSI Catcher detection
- Android IMSI Catcher detection
- Android IMSI Catcher detection
- Android IMSI Catcher detection
- good clocks (not using GPS) and multi-channel hw [was: sidebands of great justice]
- Android IMSI Catcher detection
- Android IMSI Catcher detection
- Open phones for privacy/anonymity applications, Guardian
- Open phones for privacy/anonymity applications, Guardian
- Open phones for privacy/anonymity applications, Guardian
- Open phones for privacy/anonymity applications, Guardian
- Android IMSI Catcher detection
- Android IMSI Catcher detection
- Fwd: [cryptography] Which encryption chips are compromised?
- Fwd: [zs-p2p] [Cryptography] Fwd: [IP] 'We cannot trust' Intel and Via's chip-based crypto, FreeBSD developers say
- Fwd: [zs-p2p] [Cryptography] Fwd: [IP] 'We cannot trust' Intel and Via's chip-based crypto, FreeBSD developers say
- Fwd: [zs-p2p] [Cryptography] Fwd: [IP] 'We cannot trust' Intel and Via's chip-based crypto, FreeBSD developers say
- Android IMSI Catcher detection
- Android IMSI Catcher detection
- Android IMSI Catcher detection
- Android IMSI Catcher detection
- Android IMSI Catcher detection
- Android IMSI Catcher detection
- Tradeoffs in Cyber Security
- [cryptography] Which encryption chips are compromised?
- [cryptography] Which encryption chips are compromised?
- Android IMSI Catcher detection
- [cryptography] Which encryption chips are compromised?
- catalog A & B (urls)
- [cryptography] Which encryption chips are compromised?
- Tradeoffs in Cyber Security
- [cryptography] Which encryption chips are compromised?
- [tor-talk] Tor 0.2.4.19 is released
- IndependenceKey?
- [cryptography] Which encryption chips are compromised?
- [cryptography] Which encryption chips are compromised?
- [cryptography] Which encryption chips are compromised?
- [cryptography] Which encryption chips are compromised?
- [cryptography] Which encryption chips are compromised?
- [cryptography] Which encryption chips are compromised?
- Fwd: [liberationtech] PrivateSky Takedown
- [cryptography] Which encryption chips are compromised?
- [cryptography] Which encryption chips are compromised?
- [cryptography] Which encryption chips are compromised?
- How long does it take to design and release a chip?
- Multiple Plots by US, UK to Kidnap Edward Snowden
- [cryptography] Which encryption chips are compromised?
- Joke
- Joke
- BlueHat v13 crypto talks - request for leaks ;)
- BlueHat v13 crypto talks - request for leaks ;)
- BlueHat v13 crypto talks - request for leaks ;)
- RDRAND used directly when default engines loaded in openssl-1.0.1-beta1 through openssl-1.0.1e
- cognitive dissonance in threat modelling?
- [Full-disclosure] RDRAND used directly when default engines loaded in openssl-1.0.1-beta1 through openssl-1.0.1e
- RDRAND used directly when default engines loaded in openssl-1.0.1-beta1 through openssl-1.0.1e
- Joke
- Fwd: Jacob impervious to "Rubber Hose Cryptanalysis" performed by Stewart Baker
- Jacob impervious to "Rubber Hose Cryptanalysis" performed by Stewart Baker
- BlueHat v13 crypto talks - request for leaks ;)
- Gmail's receiving mostly authenticated email
- Services Blocking Tor [was: Joke]
- BlueHat v13 crypto talks - request for leaks ;)
- Joke
- c4-r3kN.txt (urls)
- Joke
- Joke
- Joke
- Joke
- Joke
- c4-r3kN.txt (urls)
- Joke
- c4-r3kN.txt (urls)
- Fwd: Jacob impervious to "Rubber Hose Cryptanalysis" performed by Stewart Baker
- Fwd: Jacob impervious to "Rubber Hose Cryptanalysis" performed by Stewart Baker
- Gmail's receiving mostly authenticated email
- Gmail's receiving mostly authenticated email
- Gmail's receiving mostly authenticated email
- [Cryptography] Size of the PGP userbase?
- Gmail's receiving mostly authenticated email
- Gaps in email [was: PGP userbase]
- The next generation secure email solution
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- BlueHat v13 crypto talks - request for leaks ;)
- BlueHat v13 crypto talks - request for leaks ;)
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- [Cryptography] Size of the PGP userbase?
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- Old response to (new?) thing
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- [Cryptography] Size of the PGP userbase?
- [Cryptography] Size of the PGP userbase?
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- [Cryptography] Size of the PGP userbase?
- Aqua - a high bandwidth anonymity system that resists traffic analysis
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- [Cryptography] Size of the PGP userbase?
- fallout of NSA induced difficulties (lots of drinking, self medication)
- [Cryptography] Size of the PGP userbase?
- Wyden spends weeks preparing for questions to intelligence officials
- Bruce Schneier to leave BT
- Alleged NSA co-worker describes Snowden
- Wyden spends weeks preparing for questions to intelligence officials
- Bruce Schneier to leave BT
- Bruce Schneier to leave BT
- Bruce Schneier to leave BT
- Bruce Schneier to leave BT
- Gmail's receiving mostly authenticated email
- Aqua - a high bandwidth anonymity system that resists traffic analysis
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- RDRAND used directly when default engines loaded in openssl-1.0.1-beta1 through openssl-1.0.1e
- Aqua - a high bandwidth anonymity system that resists traffic analysis
- Aqua - a high bandwidth anonymity system that resists traffic analysis
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- Fwd: Jacob impervious to "Rubber Hose Cryptanalysis" performed by Stewart Baker
- BlueHat v13 crypto talks - request for leaks ;)
- [Cryptography] Fwd: [IP] 'We cannot trust' Intel and Via's chip-based crypto, FreeBSD developers say
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- Aqua - a high bandwidth anonymity system that resists traffic analysis
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- Fwd: Jacob impervious to "Rubber Hose Cryptanalysis" performed by Stewart Baker
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- corektion (re:c4-r3kN.txt (urls))
- Fwd: Jacob impervious to "Rubber Hose Cryptanalysis" performed by Stewart Baker
- Fwd: Jacob impervious to "Rubber Hose Cryptanalysis" performed by Stewart Baker
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- Fwd: Jacob impervious to "Rubber Hose Cryptanalysis" performed by Stewart Baker
- Fwd: Jacob impervious to "Rubber Hose Cryptanalysis" performed by Stewart Baker
- Tor funding [was: ranting at Juan's hatebait rapaciously [before that, something about: request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet]]
- Tor funding [was: ranting at Juan's hatebait rapaciously [before that, something about: request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet]]
- Tor funding [was: ranting at Juan's hatebait rapaciously [before that, something about: request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet]]
- HavenCo - Rebirth?
- Tor funding [was: ranting at Juan's hatebait rapaciously [before that, something about: request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet]]
- acoustic side channel attacks against TEMPEST shielded equipment
- [cryptome] acoustic side channel attacks against TEMPEST shielded equipment
- patterns & tracks (urls)
- Fwd: Jacob impervious to "Rubber Hose Cryptanalysis" performed by Stewart Baker
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- PVDF and you - (01)
- energy harvesting via PVDF - (02)
- PVDF as antenna - (03)
- tuning piezo antenna - (4)
- [cryptography] NIST Randomness Beacon
- PVDF & microcontrollers - (5)
- Malware that's transmitted through sound
- RDRAND used directly when default engines loaded in openssl-1.0.1-beta1 through openssl-1.0.1e
- energy harvesting via PVDF - (02)
- energy harvesting via PVDF - (02)
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- Fwd: Whitepaper for Crypto-Torrents
- NSA holiday talking points humor
- Vegetation Comsec
- [cryptography] Vegetation Comsec
- PVDF strategies - (06)
- Vegetation Comsec
- Human scum: Jim Bidzous of RSA
- Human scum: Jim Bidzous of RSA
- soft backdoors: ECDSA vs RSA vs EdDSA (aka EC Schnorr) (Re: BlueHat v13 crypto talks - request for leaks ;))
- RSA complicity or not in the EC_DBRG backdoor (Re: Human scum: Jim Bidzous of RSA)
- PVDF and sensing - (07)
- Human scum in the crypto/security industry industry
- footnote (07)
- soft backdoors: ECDSA vs RSA vs EdDSA (aka EC Schnorr) (Re: BlueHat v13 crypto talks - request for leaks ; ))
- RSA complicity or not in the EC_DBRG backdoor (Re: Human scum: Jim Bidzous of RSA)
- public notice: TLA scrutiny an opportunity for catching capabilities
- public notice: TLA scrutiny an opportunity for catching capabilities
- for those going to 30C3: Fwd: USB Sticks for TAILS [and OpenPGPv2 smartcards, and Yubikeys, and ...]
- FYI
- FYI
- FYI
- FYI
- FYI
- FYI
- FYI
- FYI
- RSA complicity or not in the EC_DBRG backdoor (Re: Human scum: Jim Bidzous of RSA)
- RSA complicity or not in the EC_DBRG backdoor (Re: Human scum: Jim Bidzous of RSA)
- RSA complicity or not in the EC_DBRG backdoor (Re: Human scum: Jim Bidzous of RSA)
- RSA complicity or not in the EC_DBRG backdoor (Re: Human scum: Jim Bidzous of RSA)
- ECDHE-RSA-CHACHA20-POLY1305-SHA256 server side support in OpenSSL / Nginx
- Vegetation Comsec
- Vegetation Comsec
- Exclusive: Secret contract tied NSA and security industry pioneer
- Exclusive: Secret contract tied NSA and security industry pioneer
- Exclusive: Secret contract tied NSA and security industry pioneer
- private sector privacy enhancing technology transition for disillusioned IC employees
- private sector privacy enhancing technology transition for disillusioned IC employees
- Exclusive: Secret contract tied NSA and security industry pioneer
- request for transcript: Bruce Schneier and Eben Moglen discuss a post-Snowden Internet
- FYI
- Acoustic Cryptanalysis: Extracting RSA Key From GnuPG by capturing Computer Sound
- Alan Turing Pardoned by Queen Elizabeth II
- stu-iii type4 included; Key Gen Servers; TEMPEST; CMW.....
- [Cryptography] HSBC's Password Approach: Impressive
- [p2p-hackers] [Cryptography] Size of the PGP userbase?
- The next gen P2P secure email solution
- [cryptography] The next gen P2P secure email solution
- [cryptography] The next gen P2P secure email solution
- The next gen P2P secure email solution
- [cryptography] The next gen P2P secure email solution
- [cryptography] The next gen P2P secure email solution
- [cryptography] The next gen P2P secure email solution
- The next gen P2P secure email solution
- [tor-talk] Request for "Tor, king of anonymity" graphic
- [tor-talk] Request for "Tor, king of anonymity" graphic
- [tor-talk] Request for "Tor, king of anonymity" graphic
- [cryptography] The next gen P2P secure email solution
- The next gen P2P secure email solution
- [tor-talk] Request for "Tor, king of anonymity" graphic
- [tor-talk] Request for "Tor, king of anonymity" graphic
- [cryptography] The next gen P2P secure email solution
- blackflag operations
- [tor-talk] Request for "Tor, king of anonymity" graphic
- conceptual theatre
- conceptual theatre (addenda)
- P2P VPN
- [cryptography] The next gen P2P secure email solution
- Boycott the RSA Conference - List of Honor
- [tor-talk] Request for "Tor, king of anonymity" graphic
- Article About a Secret Communication Channel in 1980's South Africa
- [p2p-hackers] The next gen P2P secure email solution
- P2P VPN
- Boycott the RSA Conference - List of Honor
- Replacing corporate search engines with anonymous/decentralized search
- Replacing corporate search engines with anonymous/decentralized search
- 30c3: The Year in Crypto default engines loaded in openssl-1.x through openssl-1.0.1e]
- automated crash reporting XKeyscore hooks
- 30c3: To Protect And Infect, Part 2
- trojan hardware (keyboard black bag implant) circa 2003
- trojan hardware (keyboard black bag implant) circa 2003
- trojan hardware (keyboard black bag implant) circa 2003
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- "To Protect and Infect" - the edges of privacy-invading technology
- "To Protect and Infect" - the edges of privacy-invading technology
- "To Protect and Infect" - the edges of privacy-invading technology
- Jacob Appelbaum in Germany
- "To Protect and Infect" - the edges of privacy-invading technology
- Jacob Appelbaum in Germany
- Replacing corporate search engines with anonymous/decentralized search
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Fw: Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Replacing corporate search engines with anonymous/decentralized search
- Replacing corporate search engines with anonymous/decentralized search
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- "To Protect and Infect" - the edges of privacy-invading technology
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- To Protect and Infect Slides
- [cryptography] To Protect and Infect Slides
- Jim Bell comes to Cypherpunks?
- [cryptography] To Protect and Infect Slides
- Jacob Appelbaum in Germany
- [cryptography] To Protect and Infect Slides
- Jacob Appelbaum in Germany
- [cryptography] To Protect and Infect Slides
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- [cryptography] To Protect and Infect Slides
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- [cryptography] To Protect and Infect Slides
- Fw: Jacob Appelbaum in Germany
- Jacob Appelbaum in Germany
- Replacing corporate search engines with anonymous/decentralized search
- "To Protect and Infect" - the edges of privacy-invading technology
- "To Protect and Infect" - the edges of privacy-invading technology
- "To Protect and Infect" - the edges of privacy-invading technology
- From: coderman at gmail.com (coderman)
- [no subject]
- [no subject]
- [no subject]
- [no subject]
Mail converted by MHonArc