Hacker Newsnew | past | comments | ask | show | jobs | submit | petera's commentslogin


It still does, try slrn and nntp.


The web interface part of it


Sure, but who uses that?


Lots of people did, back when their ISP didn't offer newsgroup access. Plus it had a great search interface and some other features I don't remember.


Fair enough.


When you earnestly believe you can compensate for a lack of skill by doubling your efforts, there's no end to what you can't do.


If you like numbers, try the ECRYPT II Yearly Report on Algorithms and Key Lengths (2012) http://www.ecrypt.eu.org/documents/D.SPA.20.pdf


Thanks for this!

I'm using BCrypt at the moment and am looking at others like SCrypt so it's great to see actual reports about this.


Depends on the robot.


I really doubt it would become a one-click privacy measure: If you like to participate in an onion-routed, privacy enhancing, anonymity network, why put it in an browser?

A browser accesses that network, it is the weakest and least point in that setup.

Because tor has no gui? Use vidalia (see https://www.torproject.org/projects/vidalia.html.en).

There are so many ways to track an individual, independent of the network, with java-script, extensions, addons, plugins, client-side-caching that even if tor becomes a feature in firefox, the slightest unmitigated problem, even your behavior may compromise your privacy.


Presumably Firefox would disable all add-ons, Flash, and possibly JavaScript if tor were enabled. Otherwise, yeah, all bets are off.


Your forgot to purge the disk- and memory-caches.


The article fails to make a good distinction for the different challenges of adhoc, infrastructure and privacy enhancing or censorship circumventing mesh networks.

Several others and I run a small (50 nodes) mesh network in my area, and it works fine for:

- enhancing WiFi access for all contributing nodes to an area which has limited or no coverage.

- providing fallback uplink connectivity for contributing nodes.

Infrastructure mesh networks are easy split into interconnected groups to avoid performance problems, and are still mesh networks, were a metropolitan area is covered by one ore more meshes to add redundancy and avoid scaling problems.

For enhanced privacy see http://www.eecs.berkeley.edu/Pubs/TechRpts/2013/EECS-2013-12...


True, but you need an identity and written material to compare it to.


Its no delivery, its a transaction.


Sorry, couldn't decrypt messages, was hungry or keys got wet.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: