cover photo

Seth Martin

Seth Martin
  last edited: Sun, 24 Sep 2017 13:19:32 -0500  
#Freedom and #Liberty require #Decentralization

Practically everyone knows a geek. Ask your geeks to share their websites by running decentralization software such as Hubzilla, thereby making centralized social networks irrelevant.

Senatorial Candidate Austin Petersen Receives Controversial Facebook Ban 


Former Libertarian Party Presidential candidate Austin Petersen received a 30-day ban on his personal facebook account yesterday for an unspecified TOS violation. Only one post was removed and it contained a video.  The video breaks down his take on Senator Clair McCaskill‘s anti-gun record, specifically her voting for the Assault Weapon Ban. Petersen is concurrently running a promotion which involves giving away an AR-15 – a weapon which would have been illegal under the ban.

#Politics #Facebook #Social Networking @LibertyPod+
Seth Martin
This bill would make several pieces of software that I use, Illegal. Even the software running the website you're viewing right now would be illegal.

'Leaked' Burr-Feinstein Encryption Bill Is a Threat to American Privacy


Every service, person, human rights worker, protester, reporter, company—the list goes on—will be easier to spy on.

#Privacy #Surveillance #Encryption #Freedom #Liberty @LibertyPod+ @Gadget Guru+
Mike Macgirvin
I don't know that it has been physically introduced, by Feinstein is pretty tenacious. She'll keep refinng it and wait for some high profile event to act as a trigger/catalyst and then ram it through in the aftermath when the opposition is on the defensive. I suspect she also leaks her own bills. That way all the furor erupts way ahead of schedule and by the time the bill is actually introduced, nobody can mobilise opposition because by then it's old news.
Marshall Sutherland
Here is my answer, I guess... They are still beating the drum for this abomination.

The Lawmakers Who Control Your Digital Future Are Clueless About Technology

It is becoming increasingly clear that Senators Dianne Feinstein and Richard Burr, co-chairs of the Senate Intelligence Committee, don’t have the slightest clue about how encryption works. Good thing they’re currently pushing disastrous legislation that would force tech companies to decrypt things for law enforcement!

Today Feinstein and Burr co-authored an op-ed in the Wall Street Journal entitled “Encryption Without Tears,” and wow, it is bad. They have yet again demonstrated a failure to grasp even the most basic principles of technology.

Seth Martin
  last edited: Mon, 13 Oct 2014 13:14:18 -0500  
Why privacy matters


Glenn Greenwald was one of the first reporters to see -- and write about -- the Edward Snowden files, with their revelations about the United States' extensive surveillance of private citizens. In this searing talk, Greenwald makes the case for why you need to care about privacy, even if you’re “not doing anything you need to hide."

#Greenwald #Snowden #Privacy #NSA #Surveillance #Spying #Freedom #Security @LibertyPod+
Seth Martin
  last edited: Wed, 15 Oct 2014 22:58:23 -0500  
Free Speech Gets Tricky When ISIS Shows Up


Social networks struggle with open access as terrorists’ account proliferate

It looks like Adam Rawnsley didn't notice the #IS accounts on #diaspora before he finished the article.

#Friendica #RedMatrix #FreeSpeech #Freedom #Liberty #Social Networking #FOSS #FLOSS #Twitter #Social Media #ISIS #Terrorism @LibertyPod+
Seth Martin
  last edited: Sun, 17 Aug 2014 06:34:38 -0500  
It looks like they have found their home in diaspora land.

Going by the new accounts sharing with diaspora* HQ, the majority of people currently signing up to diaspora* are Islamic State jihadists (15-20 yesterday, about 40-50 overnight).
Thomas Willingham
I always thought it'd be gay porn that broke Diaspora.

I posted one SMBC comic once about gay engineers, and overnight, my stream became 99% gay porn posted by random strangers who followed me because of a comic.

Giving head to beheading in three short years.  Well done, Diaspora.
Thomas Willingham
This cartoon:


Seth Martin
  last edited: Wed, 15 Oct 2014 23:00:37 -0500  
Well, that was unpleasant. I had to remove a channel and account from my #RedMatrix website at

The channel name was "Free Speech" which made it even more unpleasant. I sent an e-mail to the address the account holder entered during signup:
I wish to provide a free speech platform for everyone but cannot. I cannot host Islamic State channels because it jeopardizes my safety and the safety of others.

You made the right decision by choosing the Red Matrix for your communications but you need to host it yourself. Instructions are here:

I must now remove your channel(s) from my servers to protect our safety.

Now I look back on that message and wonder if the message is jeopardizing our safety by providing a suggestion.

#Liberty #Freedom #RedMatrix #Free Speech @LibertyPod+
Mike Macgirvin
We provide a network that is relatively free of censorship - providing you follow the rules of the house.

If you're hosting the site - it's your house, you get to set the rules. You're responsible for the content on it, and in most countries you can go to jail if the content is of an illegal nature - no matter who posted it. Therefore as the site owner you must have the right to remove anybody or any content any of your site members post.

The network itself does not have any rules about who can be a site owner and what content is allowed or not - and cannot enforce any rules on anybody. The site owner alone gets to set the rules, and they will usually do so based on the laws in effect in their jurisdiction.

So if you want freedom from censorship, you need to do two things...

1. Host the site yourself or find a site owner who is comfortable with your views
2. Ensure the site is located in a country whose laws are compatible with your views.
Mike Macgirvin
[Between you and me, you can also make your content private. The house usually won't try to remove questionable content that it can't see.]
Thomas Willingham
Well, that was unpleasant. I had to remove a channel and account from my #RedMatrix website at

The channel name was "Free Speech" which made it even more unpleasant

Like I said in the other thread, there's an awful lot to consider here, and a painful decision that'll leave you wondering whether you did the right thing either way - but ultimately, what Mike said.

The network is free.  Individual hubs were never even supposed to be free - in either sense of the word - unless they're your own.
Seth Martin
I cannot help but think that the Reason magazine image only hurts the image of libertarians and liberals. It sure caught my attention though.

Poll links “frequent” US gamers to libertarian political stances


Gamers show stronger support for free-market policies than non-gamers.

#Free-Market #Libertarian #Liberal #Politics #Gaming #Freedom @LibertyPod+ @Laissez-Faire Capitalism+
Seth Martin
I also noticed that it got bumped before you commented. I did a git pull immediately before the bump.
Mike Macgirvin
It came through with a string of "likes" on your wall, so it's entirely possible it was a double like that triggered it. That does happen.
Seth Martin
That makes sense.
Seth Martin
  last edited: Mon, 05 Oct 2015 14:27:11 -0500  
Marshall SutherlandMarshall Sutherland wrote the following post Sat, 03 May 2014 15:49:43 -0500
The Strangest Interview Yet With the Outgoing Head of the NSA

On network television, broadcasters tend to be very deferential when interviewing U.S. officials. This is especially true if they're wearing military dress.  In contrast, comedians who appear on fake news programs affect an adversarial, intentionally disrespectful persona for laughs. And sometimes, as in John Oliver's interview with outgoing NSA head Keith Alexander, the result is a U.S. official getting called on his slipperiness in a way that would never happen on more "serious" programs.

General Keith Alexander Extended Interview: Last Week Tonight With John Oliver (HBO)
by LastWeekTonight on YouTube

#NSA #Surveillance #Privacy #Snowden #Liberty #Spying #Freedom #Privacy #Comedy #Humor #Humour
Seth Martin
Flashing Headlights To Warn of Speed Traps Permanently Protected in Missouri Town


It's the happy conclusion to a free speech battle with potentially broad application: A federal judge says flashing your headlights to warn oncoming drivers of speed traps is protected by the First Amendment. Under a permanent injunction issued in the case, the town of Ellisville, Missouri, will have to stop hassling drivers considerate enough to give fellow motorists a friendly heads-up.

The American Civil Liberties Union of Missouri, which represented Michael Elli, describes the facts of the dispute:

While driving along Kiefer Creek Road [in November 2012], Michael Elli, flashed his headlights to warn oncoming traffic to proceed with caution. He was pulled over by a City of Ellisville police officer and issued a citation for flashing lights to warn of radar ahead. When Elli appeared in municipal court, he was told the standard punishment is a $1,000 fine. The charge against Elli was eventually dismissed.

A pro-speech outcome seemed certain early on. When issuing a preliminary injunction against Ellisville, U.S. District Court Judge Henry E. Autrey pointed out in his decision that Ellisville's ordinance forbidding any sort of flashing of lights by vehicles other than buses directly contradicts Missouri Department of Revenue advice that lightsshould be flashed to signal emergencies.

Autrey also noted that using headlights to communicate makes the act speech, which is protected on First Amendment grounds. He also dismissed officials' promises that they would behave better in the future if only they were allowed to keep the ordinance on the books.

With the deck stacked against, city officials folded. They entered a joint agreement with Elli to make the preliminary injunction permanent. Autrey obliged them[pdf]:

It is now the order and judgment of this Court that the preliminary injunction entered on February 23, 2014, be made permanent. Defendant City of Ellisville and its police officers are permanently enjoined from detaining, seizing, citing, or prosecuting any individual within the City of Ellisville for communicating by flashing his or her automobile headlamps.

Chalk one up for free speech in Missouri.

Flashing headlights to warn other motorists of speed traps remains subject to a hodgepodge of laws across the United States—protected in some places, forbidden in others, and punished by cops under creative interpretations of local rules in many jurisdictions.

It's also good manners.

#Free Speech #Constitution #Rights #Freedom #Liberty @LibertyPod
Mike Macgirvin
Around here people always flash their lights whenever something "out of the ordinary" or "unexpected" is on the road. There aren't any cops out here in the bush so seeing a police car anywhere doing anything is out of the ordinary.
Seth Martin
  last edited: Mon, 05 Oct 2015 13:07:48 -0500  
A Skyped interview by Roger Cohen with Glenn Greenwald of The Intercept, Laura Poitras, filmmaker and Barton Gellman of The Washington Post.

Recorded: 03-21-2014

Sources and Secrets: The Snowden Revelations
by cunytv75 on YouTube
#Privacy #Rights #Journalism #Liberty #Greenwald #Snowden #Poitras #National Security #NSA #Surveillance #Freedom @LibertyPod+
Seth Martin
  last edited: Mon, 10 Feb 2014 04:16:12 -0600  
I never knew that it was illegal to sell vehicles on Sunday here in Missouri.

Push to change the Missouri Blue Law


KANSAS CITY, Mo. -- Recently there has been a push to change the law on the Sunday sales of motorcycles in Missouri. Worth Harley Davidson gets a big chunk of its business on Saturdays. Sundays, on...

#Missouri #Blue Law #Freedom #Liberty @LibertyPod

Seth Martin
  last edited: Mon, 10 Feb 2014 03:45:09 -0600  
Ballmer: “Linux is a cancer”

Contaminates all other software with Hippie GPL rubbish

#Linux #GNU #GPL #Freedom #Open-Source #Software #License

Seth Martin
  last edited: Mon, 30 Dec 2013 13:45:47 -0600  
Der Spiegel has released more NSA documents detailing the agency's hacking efforts around the globe. The so-called Tailored Access Operations (TAO) is the NSA's group of tech masterminds, deployed to insert the agency into worldwide communications. TAO uses a variety of exploits and backdoors to achieve this access, much of which is detailed in a 50-page document that Der Spiegel likens to a "mail-order catalog."

Another team (ANT -- Advanced or Access Network Technology) creates the exploits and "sells" them to the agency, providing access to communications and data that TAO can't achieve on its own.

In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet.

Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.

Between TAO and ANT, vast amounts of computer hardware have been compromised. Der Spiegel notes that ANT prefers to deploy its exploits at the BIOS level where they can remain undetected by most security and anti-virus programs. Other programs it creates hitch a ride in device firmware, including that of major American hard drive manufacturers like Western Digital, Seagate and Maxtor. (Apparently, Samsung and Huawei are similarly compromised, making them the only non-American companies listed in the documents.)

ANT also targets communications by compromising network equipment.

Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment.

It's unclear whether ANT provides exploits to other agencies, but the fact that a catalog exists suggests ANT isn't solely supplying the NSA. (If it is, one wonders why prices are listed. If it's internal development and deployment only, cost wouldn't be an issue.)

Security researcher Jacob Appelbaum, one of the contributors to the Der Spiegel article, addressed the Chaos Communication Congress over the weekend, delivering more details on ANT's exploits, including exploits affecting iOS devices and any phone using GSM connections. Most surprising perhaps was this exploit-in-a-box device that can deliver its compromising payload from up to eight miles away.


None of this should be taken to imply the TAO isn't perfectly capable of creating its own high-level exploits and backdoors. If anything, TAO is the more physical and aggressive counterpart to ANT, executing raids to achieve physical access to devices and networks (often with the assistance of the FBI -- or at least its vehicles).

An internal description of TAO's responsibilities makes clear that aggressive attacks are an explicit part of the unit's tasks. In other words, the NSA's hackers have been given a government mandate for their work. During the middle part of the last decade, the special unit succeeded in gaining access to 258 targets in 89 countries -- nearly everywhere in the world. In 2010, it conducted 279 operations worldwide…

To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren't connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour's work.

Even more disturbing, the NSA's TAO operation waylays purchased hardware en route to customers in order to install exploits.

If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer.

The NSA's programs continue to make the world less safefor computer users under the guise of "security." Exploits go undiscovered and unpatched. Handcrafted exploits and backdoors are deployed without affected companies' knowledge. TAO has manipulated one of the most infamous Windows error messages in order to gain passive access to computers around the world.

The automated crash reports are a "neat way" to gain "passive access" to a machine, the presentation continues. [via XKEYSCORE, most likely.] Passive access means that, initially, only data the computer sends out into the Internet is captured and saved, but the computer itself is not yet manipulated. Still, even this passive access to error messages provides valuable insights into problems with a targeted person's computer and, thus, information on security holes that might be exploitable for planting malware or spyware on the unwitting victim's computer.

While not as directly useful as TAO and ANT's other tools, it still deployed frequently enough that the dialog box itself has become an agency inside joke.

[The altered text reads: "This information may be intercepted by a foreign SIGINT system to gather detailed information and better exploit your machine."]

These new revelations will only give foreign customers even more reasons to distrust American hardware. Der Spiegel's article notes that Samsung and Huawei hardware may be similarly compromised, but by and large, most of the "damage" seems to be domestic. Estimates have suggested American companies will potentially lose $150+ billion as a result of the NSA's actions. This should push that number even higher.

The question that needs to be asked is if this damage is worth it. The agency likely believes it is -- or at least believes it shouldn't be held responsible for tanking the overseas prospects of American tech companies. According to its defenders, the real problem here is the leaks, not the exploitation of every piece of hardware and software it can get its hands on. After all, if Snowden hadn't taken those documents, this would still be a secret and foreign companies will still be purchasing compromised goods from US companies.

The NSA has never seriously considered the consequences of its activities being exposed. This should have been factored in when considering the "costs" of programs like these. Nothing operates in a vacuum, not even the most secretive of agencies. Frankly, the level of exploitation exposed here verges on inconceivable. Any crying agency spokespersons have done about methods being exposed now looks like nothing more than diversionary noises delivered with poker faces. The agency has "root access." The rest is just skimming the surface.


#TAO #ANT #NSA #Surveillance #Snowden #Privacy #Spying #Spy #Snooping #Exploits #Backdoors #Freedom #Liberty @LibertyPod
Marshall Sutherland
It's pretty sad that I feel safer using a router from a former Soviet-block country then I do using one from an American company.

Seth Martin
Exclusive: Secret contract tied NSA and security industry pioneer


SAN FRANCISCO (Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.

#RSA #Bsafe #Backdoor #Encryption #NSA #Spying #Snooping #Snowden #Computer Security #Privacy #Freedom #Liberty #Security @LibertyPod

Seth Martin
  last edited: Fri, 20 Dec 2013 17:45:14 -0600  
Was Silk Road 2.0 an FBI trap?

Silk Road 2.0 forum moderators going by the handles "Inigo" and "Libertas" were reportedly arrested in Virginia and Wicklow, Ireland, respectively.

In a post to the user forums of Tor Market – a competing site to Silk Road 2.0 – a user who is believed to be Inigo suggested that authorities may have a far better view into the workings of the online marketplace than anyone previously suspected:

Guys I was arrested yesterday and out on bond now. But something is fucked! I know I'm risking more warning you guys and my attorney doesn't even want me on the internet but you guys need to know this. When I was in the interview they showed me all sorts of shit that they should not know or have access to ... Something is definitely wrong and they have the ability to see things on here only mods or admins should like transfers and a dispute I had.

Alleged Top Moderators Of Silk Road 2 Forums Arrested In Ireland, U.S. In International Sweep | TechCrunch


At least two moderators of the Silk Road 2 user forums have been arrested by authorities in the U.S. and Ireland. A source claiming to have inside knowledge..

#FBI #SilkRoad #Anonymous Marketplace #Deep Web #Silk Road #Market #Tor Market #Freedom @Laissez-Faire Capitalism @LibertyPod
Mike Macgirvin
they have the ability to see things on here only mods or admins should like transfers and a dispute I had

Whilst admittedly merely conjecture - this sounds like they located the service provider and either applied pressure or tapped it. Alternatively, remember that I'm a bit suspicious (not tin foil hat suspicious, but markedly curious) that all of our hardware has backdoors which can be remotely triggered. All of it.
  last edited: Sat, 21 Dec 2013 12:50:12 -0600  
So general sense is that everyone is easily and remotely vulnerable to secret searches by government and subcontractor assets.  This, along with complete data storage of web traffic, makes retroactive prosecution both possible and likely.

The only thing not happening is tens of thousands of people being picked up at night by people driving dark sedans.

We're on the cusp of losing big to a new form of totalitarian politics, globally distributed, and effectively pre-possitioned to take advantage of its tech superiority, and human gullibility.

Is there anything that can be done to maintain some form of political freedom?

Seth Martin
We've seen it argued that privacy is a bad thing. People like former DHS official Stewart Baker have argued that the privacy-protecting efforts of civil liberties activists are the reason we're forced to be fondled and de-shod at TSA checkpoints. Not only that, he's tried to blame the 9/11 attacks on "rise of civil libertarianism." Unbelievably, we've also had a politician recently claim that your privacy isn't violated if you don't notice the violation.

We've also seen attacks on anonymity by (anonymous) police officers and a whole slew of pundits and politicians who believe the only thing online anonymity does is provide a shield for trolls, bullies and pirates to hide behind. Efforts have been made to outlaw online anonymity, but fortunately, very few laws have been passed.

Now, try wrapping your mind around this argument being made by Art Coviello, executive chairman of RSA Security and the head of EMC's security division. According to him, anonymity and privacy are at odds with each other.

A dogmatic allegiance to anonymity is threatening privacy, according to Art Coviello, executive chairman of RSA.

Coviello cast anonymity as the "enemy of privacy" because it gives "free reign to our networks to adversaries" with "no risk of discovery or prosecution."

On one hand, anonymity is slowing down the pursuit of online criminals. On the other hand, companies are increasingly wary of subjecting their employees to intrusive security software.

Customers are caught in a Catch-22. They're afraid to deploy technology for fear of violating workers' privacy" even though security intelligence tools are ultimately the best way to protect personal information, Coviello argued.

How Coviello arrives at the conclusion that anonymity is damaging privacy isn't exactly clear. It may be the enemy to security (or at least, unhelpful to retributive actions), but the online anonymity shielding crooks doesn't threaten users' privacy, at least not directly. Indirectly it could, but it wouldn't be anonymity's "fault." If Coviello wants attackers to be stripped of anonymity, there's little doubt he'd like to see clients' employees stripped of their privacy. Both would make his companies' jobs easier. Attackers would be easily identified and clients would received (arguably) better protection (thanks to more, non-anonymized data gathering). Win-win for security. Not so much for those who cherish privacy and anonymity.

This isn't exactly new ground for Coviello. He did some complaining about privacy at last year's RSA conference as well.

RSA executive chairman Art Coviello has criticised privacy advocates for basing their arguments on “dangerous reasoning”, comments that have already earned him a tongue lashing from Big Brother Watch and the Open Rights Group.

Coviello, whilst noting the need for privacy, lambasted privacy groups’ “knee jerk” reactions to public and private sector attempts to improve people’s security, pointing to the “insanity” of the situation, in a keynote to open the RSA 2012 conference in London this morning.
In Coviello’s view, privacy advocates are over-reacting to measures designed to protect online identities, preferring to live in a world of danger: “Because privacy advocates don’t realise that safeguards can be implemented, they think we must expect reasonable danger to protect our freedoms,” Coviello said.

“But this is based on dangerous reasoning, a knee jerk reaction, without understanding the severity and scope of the problem.

“Where is it written that cyber criminals can steal our identities but any industry action to protect us invites cries of Big Brother.”

Not for nothing has someone noted that RSA is only a letter away from the United States' most notorious intelligence agency.

Coviello's arguments here aren't that much different than the government's opinions on the "liberty vs. security" balance. And like other defenders of intrusive programs, Coviello refers to the statements of critics as an "over-reaction." But is it? He bristles at being compared to Big Brother but his thought processes roughly align with the government's foremost proponents of intrusive programs. According to both, people just don't understand how bad things actually are, and in our unenlightened state, we're making the wrong choice between security and liberty.

Additionally, the "knee jerk reaction" he sees in privacy activists is, in reality, no different than the knee jerk reactions he fails to see in security and intelligence entities. While privacy activists are focused on retaining what's remaining and make small pushes for more, security/intelligence agencies leverage every tragedy or attack to expand their scope and dial back privacy protections.

But where his argument against privacy (and anonymity) ultimately falls apart is in his belief that collecting and storing large amounts of private data is the best solution for all involved.

To “suggest the only way to protect against cyber crime is to sacrifice privacy and civil liberties is absurd,” Nick Pickles, director of privacy campaign group Big Brother Watch, told TechWeekEurope. “It is a simple fact that if data has not been collected, it cannot be stolen, lost or misused. The best safeguard for consumers and businesses is for data not to be collected unless it is absolutely essential, and then deleted as soon as it is no longer required.”

As for his complaints about anonymity? It's pretty much all or nothing. You can't whip up statutes and laws that allow anonymity and their privacy protections unless you're a criminal. Either you take the good with the bad or you eliminate it for everybody. No one's going to agree with that last one, so security groups and companies will just have to deal with the fact that their adversaries will be cloaking their identities. Cops may wish robbers wouldn't wear masks when committing crime, but that's the way it goes. You can't ban the sale of masks simply because someone holds up a bank wearing one.

I'm sure he understands this, but he's in a field where security is valued over privacy. But that's the expected mindset for someone is his position. The problem is that those with his mindset expect others to come to the same conclusion -- and when they don't, they're portrayed as part of the problem.

To be fair, Coviello at least had this to say about the jargon being deployed by government security officials and advisors.

"I absolutely hate the term 'Cyber Pearl Harbor'," he said. "I just think it's a poor metaphor to describe the state we are really in. What do I do differently once I've heard it? And I've been hearing it for 10 years now. To trigger a physically destructive event solely from the internet might not be impossible, but it is still, as of today, highly unlikely."

Coviello may not like this particular FUD, but claiming anonymity and privacy are standing in the way of security isn't that far removed from the panicky assertions of the "cyber Pearl Harbor" types.


#Anonymity #Privacy #Freedom #Liberty #RSA #Encryption #Security #Intelligence @LibertyPod
Sean Tilley
Seth Martin
OliverOliver wrote the following post Thu, 31 Oct 2013 05:38:41 -0500

Dark Mail Alliance


Privacy Innovators
Silent Circle and Lavabit are developing a new way to do email with end-to-end encryption. We welcome like-minded organizations to join our alliance.

Our Mission
To bring the world our unique end-to-end encrypted protocol and architecture that is the 'next-generation' of private and secure email. As founding partners of The Dark Mail Alliance, both Silent Circle and Lavabit will work to bring other members into the alliance, assist them in implementing the new protocol and jointly work to proliferate the worlds first end-to-end encrypted 'Email 3.0' throughout the world's email providers. Our goal is to open source the protocol and architecture and help others implement this new technology to address privacy concerns against surveillance and back door threats of any kind.

(Piwik is running in background, no OptOut?)

#Privacy #Lavabit #Silent Circle #Dark Mail Alliance #Liberty #Freedom #E-Mail #Communication #Encryption @LibertyPod
Mike Macgirvin
It's only ISPs who draw a distinction between clients and servers. But realistically if you want to provide web resources, you probably want them served from the "wild west" side of your home router and not the side that's locked down. You also probably want to keep this machine turned on so your photo albums are available to friends in Australia that are awake when you're sleeping (if you have any of these). SIP and XMPP are solving different problems. We want to share web resources. That's what we're providing. Photos, files, events, *and* conversations. If it was just text comments about what we had for dinner with one or two people that are always online when we are, one might make different protocol decisions.
Seth Martin
  last edited: Tue, 05 Nov 2013 13:52:08 -0600  
Dark Mail Initiative is on Kickstarter now.

The goal is to cleanup and release the source code that was used to power Lavabit as a f/oss project with support for dark mail added.
  last edited: Wed, 06 Nov 2013 02:03:45 -0600  
Moxie Marlinspike >> Blog >> A Critique Of Lavabit

In August of this year, Ladar Levison shut down his email service, Lavabit, in an attempt to avoid complying with a US government request for his users’ emails. To defy the US government’s gag order and shut down his service took great courage, and I believe that Ladar deserves our support in his legal defense of that decision. There is now an ...
Seth Martin
Ladar Levison's legal fight against the federal government is still ongoing.

In September, Campaign for Liberty was proud to feature Ladar as a speaker at the 2013 Liberty Political Action Conference.

So please take a moment to watch this EXCLUSIVE video presentation of Ladar Levison at LPAC 2013 talking about the need for trust when using technology and some of the challenges posed by out-of-control government spying.

Ladar Levison Statement of Support!


Ladar Levison: Statement of Support...

#Ladar Levison #Lavabit #Government #Privacy #FISA #NSA #Surveillance #Spying #Spy #Constitution #Law #Freedom #LPAC #Campaign for Liberty #Liberty @LibertyPod @Laissez-Faire Capitalism