Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance

Karl Fogel kfogel at red-bean.com
Wed Jul 3 15:15:20 PDT 2013


Micah Lee <micahflee at riseup.net> writes:
>I have added the CC license to the bottom of the web version:
>
>https://pressfreedomfoundation.org/whitepapers/encryption-works-how-protect-your-privacy-age-nsa-surveillance
>
>And I've also uploaded the source LibreOffice ODT, so it'll be easier
>for people to create derivative works:
>
>https://pressfreedomfoundation.org/sites/default/files/encryption_works.odt

Wonderful, thanks (and I see you put a link to the ODT at the bottom of
the web page too).

-Karl


>On 07/02/2013 03:01 PM, Karl Fogel wrote:
>> Micah Lee <micahflee at riseup.net> writes:
>>> Freedom of the Press Foundation just published a whitepaper about how to
>>> protect your communications from NSA (or any other) surveillance.
>> 
>> Micah, thanks (& nice job).  Two quick questions:
>> 
>>   1) The CC-BY license info is only visible on the PDF; any reason it's
>>      not on the web version?
>> 
>>   2) Is the document available in source form (that is, whatever master
>>      format you edited to generate both web and PDF versions)?
>> 
>> The reason I ask (2) is that if someone wanted to make either an
>> abbreviate or an extended version of this guide, it would be easiest for
>> them to start from that source format.
>> 
>> Best,
>> -Karl
>> 
>>> https://pressfreedomfoundation.org/whitepapers/encryption-works-how-protect-your-privacy-age-nsa-surveillance
>>>
>>> The whole thing was inspired by this Edward Snowden quote: "Encryption
>>> works. Properly implemented strong crypto systems are one of the few
>>> things that you can rely on. Unfortunately, endpoint security is so
>>> terrifically weak that NSA can frequently find ways around it."
>>>
>>> Specifically we go over:
>>>
>>> * What crypto is and what makes it secure
>>> * What sort of software you can trust
>>> * Using Tor, and global adversaries
>>> * How OTR works and how to use it right
>>> * How PGP works and how to use it right
>>> * How Tails can help ensure high endpoint security


More information about the liberationtech mailing list