Monthly Archive: February 2014

(View on gamamb.tumblr.com)

Over the next two hours Snowden explained to Greenwald …

Over the next two hours Snowden explained to Greenwald how he could boot up the Tails system, one of the securest forms of communication, which uses the anonymising Tor network. Luke Harding: The Snowden Files – The Inside Story of the World’s Most Wanted Man (p 17) (View on gamamb.tumblr.com)

Designing a security system without public review is a …

Designing a security system without public review is a fool’s errand, ensuring that you’ve designed a system that is secure against people stupider than you, and no one else. Cory Doctorow: What happens with digital rights management in the real world? (The Guardian, 5.2.2014) (View on gamamb.tumblr.com)