|1830 Machine Learning Meetup #1 Jiri Materna|
|1900 BRMCW - vyuka telegrafie 2000 TalkNight|
This is an old revision of the document!
Aim of this project is to create knowledge base for everybody who need or want to behave in secure way, because “Informations want to be free!” but “Privacy does matter!”
I [we] want to collect all privacy and cryptography related projects of BRMLAB here, too.
Do not hesitate to contribute.
TODO: - at the moment all
Certainly, I don't run the NSA, but it doesn't take much more than a middling operations professional to tell you that exception processing is the key. Attacking this stuff is a question of priorities.
Though experiment: What order of difficulty would you assign:
Have a server with a master key that decrypts incoming mail, re-encrypts with board members' individual subkeys? If it *has* to be the same email account, does it support IMAP? If so, IMAP behaves like a folder; you can take stuff out, and put it back in again. A Python script could be written to scan over new mail, remove “master key” mail and deposit “subkey-re-encrypted” mail. When members access the mail, it will usually have been accessed, re-encrypted and replaced with one they can decrypt. If not, they'll have to wait a few minutes and try again.
Police in democratic-law following country play a game with you, they are sure, you are afraid and unsure of law and situation, keep it in mind This howto is based on Overdrive's experience, not really universal
this howto is ment for moments, when they want something from you, in case you need them, use it is oppsite way [not only last point ;]
TO DO: short anotations