do.
> Or how about just popping out the battery?
>
>
>
>
>
> From: coderman
> To: tor-talk@lists.torproject.org
> Cc: mansourmou...@gmail.com
> Sent: Thursday, January 17, 2013 11:19 AM
> Subject: Re: [tor-talk] Leave Your Cel
popping out the battery?
>
>
>
>
>
> From: coderman
> To: tor-talk@lists.torproject.org
> Cc: mansourmou...@gmail.com
> Sent: Thursday, January 17, 2013 11:19 AM
> Subject: Re: [tor-talk] Leave Your Cellphone at Home
>
> On Wed, Jan 16, 2013 at 3:12 PM, Ja
Or how about just popping out the battery?
From: coderman
To: tor-talk@lists.torproject.org
Cc: mansourmou...@gmail.com
Sent: Thursday, January 17, 2013 11:19 AM
Subject: Re: [tor-talk] Leave Your Cellphone at Home
On Wed, Jan 16, 2013 at 3:12 PM, Jago
On Wed, Jan 16, 2013 at 3:12 PM, Jago Pearce wrote:
> How much improvement might flightmode realistically provide?..
baseband exploits can tamper with airplane/flight mode. it is designed
to prevent transmission, however, the radio can still receive.
get a faraday bag/case instead...
___
How much improvement might flightmode realistically provide?
On the one hand, if you are a targetted individual it's basically not
going to provide any protection because with a rootkit it can be so
easily overridden.
However, for the average Joe such as myself who just likes to have a
little bit m
On Thu, Sep 6, 2012, at 01:56, Mansour Moufid wrote:
> Anyway, I think cryptography will depend more and more on steganography
> -- and in the case of Tor, covert/subliminal channels. Imagine a protocol
> where Alice sends Bob a steady stream of garbage, and the message is
> encoded in the inter-pa
On 2012-09-05, at 11:48 PM, grarpamp wrote:
>
>> I think cryptography will depend more and more on steganography [...]
>> and the message is encoded in the inter-packet timing noise. ;)
>
> Moot when you suck up and process everything to extract the
> crypto. Steg is nothing more than crypto with
> Very interesting read.
"
Resnick: The recent article in Wired describes where and how the NSA plans to
store its share of collected data. But as the article explains, the Utah
facility will have another important function: cryptanalysis, or
code-breaking, as much of the data cycling through
On 2012-09-05, at 6:16 AM, Eugen Leitl wrote:
> http://nplusonemag.com/leave-your-cellphone-at-home
>
> Sarah Resnick
>
> Leave Your Cellphone at Home
>
> Interview with Jacob Appelbaum
>
> From OCCUPY Gazette 4, out May 1.
Very interesting read.
I'm not sure I buy the theories for the new d
http://nplusonemag.com/leave-your-cellphone-at-home
Sarah Resnick
Leave Your Cellphone at Home
Interview with Jacob Appelbaum
From OCCUPY Gazette 4, out May 1.
Earlier this year in Wired, writer and intelligence expert James Bamford
described the National Security Agency’s plans for the Utah
10 matches
Mail list logo