2014 Archives by thread
      
      Starting: Sun Jan 26 17:19:13 PST 2014
         Ending: Wed Dec 31 17:35:40 PST 2014
         Messages: 1307
     
- [messaging] Testing
 
Trevor Perrin
- [messaging] a test
 
Daniel Kahn Gillmor
- [messaging] Note from your host
 
Trevor Perrin
- [messaging] Welcome
 
Trevor Perrin
- [messaging] Useability of public-key fingerprints
 
Trevor Perrin
- [messaging] Social Security cards and additional issues
 
Watson Ladd
- [messaging] Base32
 
Trevor Perrin
- [messaging] Short Auth Strings
 
Trevor Perrin
- [messaging] "Pseudoword" base32 fingerprints
 
Trevor Perrin
- [messaging] Sample constant-time base16 coder
 
Robert Ransom
- [messaging] Introduction secrets and "unlinkable rendezvous"	protocols
 
Trevor Perrin
- [messaging] Secure messaging over insecure chat frameworks
 
George Kadianakis
- [messaging] Let's run a usability study (was Useability of	public-key fingerprints)
 
Tom Ritter
- [messaging] DH vs PAKE vs SAS
 
Brian Warner
- [messaging] Key Poems
 
Trevor Perrin
- [messaging] between fingerprint transcription and comparison
 
Daniel Kahn Gillmor
- [messaging] Are we pursuing real solutions for security?
 
Tony Arcieri
- [messaging] Announcing the EFF Crypto Usability Prize (EFF CUP)	Workshop, July 9
 
Joseph Bonneau
- [messaging] Separation of concerns, usability,	and partial verification
 
Ximin Luo
- [messaging] Partial ordering, dynamic groups and event ordering
 
Ximin Luo
- [messaging] Human sized keys
 
Watson Ladd
- [messaging] Unlinkable rendezvous via human-sized keys (was: Re: Human sized keys)
 
Trevor Perrin
- [messaging] Comparing introduction secret schemes (was Re: Unlinkable rendezvous via human-sized keys)
 
Trevor Perrin
- [messaging] PIR (in Pynchon Gate)
 
Brian Warner
- [messaging] Transparency for E2E encrypted messaging at a	centralized service
 
Joseph Bonneau
- [messaging] Message delivery and revocation in Pond etc
 
Trevor Perrin
- [messaging] Stanford Security Seminar slides
 
Trevor Perrin
- [messaging] Minimal requirements for group chat
 
Michael Rogers
- [messaging] Message order in group chat (attempt at summary)
 
Trevor Perrin
- [messaging] Password reset mechanisms with an SRP authentication	framework
 
Dave Baggett
- [messaging] "stxt", by Graydon Hoare
 
Brian Warner
- [messaging] Don't settle for eventual consistency
 
Michael Rogers
- [messaging] DNSChain 0.1.0 adds DANE/TLSA support for blockchain +	canonical DNS
 
Tao Effect
- [messaging] Necessary considerations of a linear order based on server-receive time
 
Ximin Luo
- [messaging] Improving the state of end-to-end crypto
 
Ben Laurie
- [messaging] Displaying threads
 
Michael Rogers
- [messaging] Can we do the Crypto Usability Study on Mechanical Turk?
 
Joseph Bonneau
- [messaging] Rough list of secure email/chat solutions
 
Joseph Bonneau
- [messaging] TextSecure's MultiParty Chat
 
Tom Ritter
- [messaging] Test Data for the Usability Study
 
Tom Ritter
- [messaging] Replacing group signatures with HMAC in Pond.
 
Adam Langley
- [messaging] Word list for English Words
 
Tom Ritter
- [messaging] Padding
 
David Leon Gil
- [messaging] DP5 - attempt at summary
 
Trevor Perrin
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Trevor Perrin
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Bjarni Runar Einarsson
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Tom Ritter
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
David Leon Gil
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
elijah
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Eleanor Saitta
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Trevor Perrin
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Daniel Kahn Gillmor
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Ximin Luo
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Eleanor Saitta
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Michael Rogers
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Daniel Kahn Gillmor
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Ximin Luo
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Eleanor Saitta
 
 
- [messaging] Tor Hidden Services in (Cables, SMTorP, Pond)
 
Bjarni Runar Einarsson
 
- [messaging] Ring signature implementations?
 
David Leon Gil
- [messaging] Fingerprint usability study (experiment design)
 
David Leon Gil
- [messaging] SafeSlinger's Ephemeral Fingerprint
 
Michael Farb
- [messaging] plausible deniability and transcript editors
 
Guy K. Kloss
- [messaging] [curves] Generating nonces for Schnorr signatures
 
David Leon Gil
- [messaging] Invisible.im
 
Trevor Perrin
- [messaging] "Short" authentication strings
 
Tony Arcieri
- [messaging] Sneek Peek: Confusion Key Exchange
 
Tony Arcieri
- [messaging] Petmail invitation codes, demo video
 
Brian Warner
- [messaging] Whiteout Secure PGP Key Sync
 
Tom Ritter
- [messaging] Bounding hash 2d preimage bits (was Re:...Test Data)
 
David Leon Gil
- [messaging] Mixmaster Protocol Design
 
Tom Ritter
- [messaging] Anonymity networks and incentives
 
Trevor Perrin
- [messaging] Efficiently compressing an exabyte of ciphertext
 
David Leon Gil
- [messaging] Proposal for anonymous contact discovery
 
Joseph Bonneau
- [messaging] Zero knowledge proofs of passport
 
Mike Hearn
- [messaging] [Remops] New Zax-style nymserver with forward	secrecy
 
Tom Ritter
- [messaging] Audible public-key fingerprints
 
Mansour Moufid
- [messaging] Thoughts on keyservers
 
Trevor Perrin
- [messaging] Proposal: AOL should start offering free SSL	Certificates
 
Daniel Roesler
- [messaging] Keyservers discussion - Day 1 highlights
 
Trevor Perrin
- [messaging] User key lookup and the Web PKI analogy
 
Trevor Perrin
- [messaging] JackPair
 
Tom Ritter
- [messaging] Summary of discussion session at USENIX HotSec
 
Joseph Bonneau
- [messaging] Namecoin
 
Trevor Perrin
- [messaging] Transparency in Keybase
 
Trevor Perrin
- [messaging] Google End-to-End plans on using key directories with a CT-like verification protocol
 
Tony Arcieri
- [messaging] IBE for Service Sub-Keys?
 
Tom Ritter
- [messaging] Release of OpenKeychain 2.8 for Android
 
zaki at manian.org
- [messaging] Research topics on multiparty messaging (MSc thesis)
 
George Kadianakis
- [messaging] Hashing entries in a transparency log
 
Trevor Perrin
- [messaging] Opportunistic encryption and authentication methods
 
Trevor Perrin
- [messaging] Modern anti-spam and E2E crypto
 
Mike Hearn
- [messaging] key validation rules for today
 
elijah
- [messaging] "Keybase Attack" on RSA signatures
 
Tony Arcieri
- [messaging] fyi: metadata-eliminating tor-based chat program:	Ricochet
 
=JeffH
- [messaging] Spam-resistance of different systems
 
Trevor Perrin
- [messaging] The Trouble with Certificate Transparency
 
Tao Effect
- [messaging] The Simple Thing
 
elijah
- [messaging] Informing the user they have the wrong key
 
Tony Arcieri
- [messaging] Gossip doesn't save Certificate Transparency
 
Tao Effect
- [messaging] Logging Bad Situations (was Informing the user they	have the wrong key)
 
Tom Ritter
- [messaging] Metadata free instant messaging protocol,	with basic spam throttling
 
Mike Hearn
- [messaging] yet another CT thread
 
elijah
- [messaging] GNU Name System
 
D. J. Bernstein
- [messaging] Group messaging consistency under resource constraints
 
Ximin Luo
- [messaging] Provable (private) conversation while allowing (somewhat) precise redaction
 
Tamme Schichler
- [messaging] Transparency for a key directory without publishing	usernames
 
Trevor Perrin
- [messaging] [Cryptography] Gossip doesn't save Certificate	Transparency
 
Peter Gutmann
- [messaging] Simply Secure is hiring a Research Director (or Assoc. Director) and an Operations Manager
 
Sara Sinclair Brody
- [messaging] the Whisper problem
 
elijah
- [messaging] Memento,	decentralised password-to-key method with brute forcing controls
 
Mike Hearn
- [messaging] keys.gnupg.net returns random pages
 
Daniel Roesler
- [messaging] Whiteout Mail now Open Source
 
Tankred Hase
- [messaging] An Insecure Messaging Algorithm
 
Jason A. Donenfeld
- [messaging] Forward secrecy and multiple devices
 
Nadim Kobeissi
- [messaging] Generating memorable hidden service names
 
David Leon Gil
- [messaging] Netflix announces Message Security Layer
 
Tony Arcieri
- [messaging] How secure is TextSecure?
 
David Leon Gil
- [messaging] EFF Secure Messaging Scorecard
 
Joseph Bonneau
- [messaging] Tahoe-Lafs + miniLock: A device agnostic & user friendly zero knowledge file system?
 
totient at riseup.net
- [messaging] Distributed Social Graph + GNU Name System
 
carlo von lynX
- [messaging] EFF Insecure Messaging Scorecard
 
carlo von lynX
- [messaging] WhatsApp & OWS team up
 
Mike Hearn
- [messaging] Second thoughts on WhatsApp encryption
 
Nadim Kobeissi
- [messaging] (no subject)
 
steve at actor.im
- [messaging] Axolotl: Lacking deniability or MITM?
 
Alexey Kudinkin
- [messaging] Encrypted Group Chats
 
steve at actor.im
- [messaging] Fwd: [liberationtech] (n+1)sec = more privacy on the	internet
 
Natanael
- [messaging] Value of deniability
 
Mike Hearn
- [messaging] Simple decentralised KeyBase using the blockchain
 
Ben Harris
- [messaging] Axolotl questions
 
Sunny Marueli
- [messaging] Dissent: Anonymous accountable group communication
 
Tony Arcieri
- [messaging] BabelCrypt: The Universal Encryption Layer for Mobile	Messaging Applications
 
Wasa Bee
- [messaging] Tor Messenger - Alpha
 
Arlo Breault
- [messaging] PBKDF2 vs bcrypt vs scrypt ... when dealing with	browsers
 
Tao Effect
- [messaging] CONIKS
 
Mike Hearn
- [messaging] Random questions, kind of
 
David Gil
- [messaging] Session at 31C3
 
Ximin Luo
- [messaging] Multiple devices and key synchronization: some thoughts
 
David Leon Gil
- [messaging] Cryptographic social networking
 
contact at sharebook.com
- [messaging] Dark Internet Mail Environment (DIME) specification
 
Tony Arcieri
    
      Last message date: 
       Wed Dec 31 17:35:40 PST 2014
    Archived on: Wed Dec 31 17:35:44 PST 2014
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).