[sudo-discuss] Sudden public interest in basic crypto/security tools.

Max B maxb.personal at gmail.com
Mon Jun 10 23:46:42 PDT 2013


I have a quick question to throw out for anyone with opinions:

When the NSA PRISM program was exposed, it was leaked that the NSA has 
the capabilities to monitor the content of communications taking place 
through any of the list of companies they mentioned. Then Google, 
Apple, and crew came out and denied it.

Would it be possible for the NSA to be monitoring traffic without them 
knowing it/allowing a backdoor? Would that require NSA servers doing 
128-bit SSL decryption at real-time speeds? Or perhaps only when 
specific emails needed to be read? Could they have covertly compromised 
the private keys of all of these establishments? ("US Government hacked 
google" seems like a great Guardian headline)

Or do folks think that those companies are just lying through their 
teeth?

On Mon 10 Jun 2013 10:43:42 PM PDT, Rabbit wrote:
> Yes, let's have a end-user focused crypto workshop!
>
> I'm not an expert but I can help OS X users get set up with
>
> Tor
> Adium + OTR
> Making encrypted disk images
> Truecrypt
>
> And I wanna learn about web of trust, keysigning, gpg for email
>
> Also I'm really wishing for a better social network for people to
> switch to.  Any thoughts on that?
>
>
>
>
>
> On Mon, Jun 10, 2013 at 7:55 PM, GtwoG PublicOhOne
> <g2g-public01 at att.net <mailto:g2g-public01 at att.net>> wrote:
>
>
>     YES! a crypto party.
>
>     PGP and GPG won't protect your metadata from traffic analysis ("TA"),
>     which is what's been revealed that Anagram Inn has been up to.  But
>     protecting your content is a good start, and building email
>     servers that
>     are end-to-end encrypted is the next step.
>
>     -G.
>
>
>     =====
>
>
>
>     On 13-06-10-Mon 7:13 PM, William Budington wrote:
>     > There was some discussion about this at the last meeting, mostly
>     around
>     > securing personal data on physical devices, but it would be good
>     to have
>     > another end-user based cryptoparty, even have it be a full-day event
>     > stemming from Today I Learned.  I'll bring this up at the meeting on
>     > Wednesday.
>     >
>     > Bill
>     >
>     > On 06/10/2013 07:02 PM, William Gillis wrote:
>     >> Hey Sudoroomers,
>     >>
>     >> I've been deluged by friends this weekend suddenly interested
>     in things
>     >> like finally figuring out how to install that there tor, or god
>     forbid
>     >> venturing into the realm of pgp. I offered my nonstop 1:1
>     handholding
>     >> services over facebook to any and all friends and have been a
>     little
>     >> overwhelmed by the number.
>     >>
>     >> Someone local suggested a teach day at Sudoroom and I thought
>     I'd check to
>     >> see if anyone else is interested and, you know, what actual
>     members have to
>     >> say.
>     >>
>     >> There has never been a more opportune moment for cryptoparty
>     outreach, and
>     >> yet I haven't seen anyone declare anything yet. Am I just out
>     of the loop?
>     >>
>     >>
>     >>
>     >> _______________________________________________
>     >> sudo-discuss mailing list
>     >> sudo-discuss at lists.sudoroom.org
>     <mailto:sudo-discuss at lists.sudoroom.org>
>     >> http://lists.sudoroom.org/listinfo/sudo-discuss
>     >>
>     > _______________________________________________
>     > sudo-discuss mailing list
>     > sudo-discuss at lists.sudoroom.org
>     <mailto:sudo-discuss at lists.sudoroom.org>
>     > http://lists.sudoroom.org/listinfo/sudo-discuss
>     >
>
>     _______________________________________________
>     sudo-discuss mailing list
>     sudo-discuss at lists.sudoroom.org
>     <mailto:sudo-discuss at lists.sudoroom.org>
>     http://lists.sudoroom.org/listinfo/sudo-discuss
>
>
>
>
> _______________________________________________
> sudo-discuss mailing list
> sudo-discuss at lists.sudoroom.org
> http://lists.sudoroom.org/listinfo/sudo-discuss



More information about the sudo-discuss mailing list