Delivery-Date: Wed, 22 Oct 2014 12:06:47 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD,UNPARSEABLE_RELAY autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 09D1B1E0A22;
	Wed, 22 Oct 2014 12:06:46 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id ED9B4311B5;
	Wed, 22 Oct 2014 16:06:41 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id C7911311E1
 for <tor-talk@lists.torproject.org>; Wed, 22 Oct 2014 16:06:38 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id NcHHQR_QldBn for <tor-talk@lists.torproject.org>;
 Wed, 22 Oct 2014 16:06:38 +0000 (UTC)
Received: from gil.mayfirst.org (gil.mayfirst.org [216.66.23.48])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id AD21A310B0
 for <tor-talk@lists.torproject.org>; Wed, 22 Oct 2014 16:06:38 +0000 (UTC)
Received: from gil.mayfirst.org (localhost [127.0.0.1])
 by gil.mayfirst.org (Postfix) with ESMTP id 1695A5E6A
 for <tor-talk@lists.torproject.org>; Wed, 22 Oct 2014 12:06:36 -0400 (EDT)
Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender:
 nathanfreitas@gil.mayfirst.org) with ESMTPSA id 0342C5E52
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43])
 by gateway2.nyi.internal (Postfix) with ESMTP id 89F18200A2
 for <tor-talk@lists.torproject.org>; Wed, 22 Oct 2014 12:06:35 -0400 (EDT)
Received: from web2 ([10.202.2.212])
 by compute3.internal (MEProxy); Wed, 22 Oct 2014 12:06:35 -0400
Received: by web2.nyi.internal (Postfix, from userid 99)
 id 6114554028F; Wed, 22 Oct 2014 12:06:35 -0400 (EDT)
Message-Id: <1413993995.753410.182059853.4476BB8D@webmail.messagingengine.com>
X-Sasl-Enc: h6Lf19cSWebB6k9xJsQzG6YwRh3R1+m1LRmjTRcBsB8e 1413993995
From: Nathan Freitas <nathan@freitas.net>
To: tor-talk@lists.torproject.org
MIME-Version: 1.0
X-Mailer: MessagingEngine.com Webmail Interface - ajax-87015d4b
X-Forwarded-Message-Id: <512753.55494435383837312d31343036383939313433@popretr.messagingengine.com>
Date: Wed, 22 Oct 2014 12:06:35 -0400
X-Virus-Scanned: ClamAV using ClamSMTP
Subject: [tor-talk] Orbot/Tor talk at MIT tomorrow
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


http://kb.mit.edu/confluence/pages/viewpage.action?pageId=152575577

Anonymity on the Go: The Possibilities and Problems of Tor on Mobile
Devices
This talk discusses what possibilities exist for communicating more
freely on a mobile device. How can we stop telcos, ISPs, and our
governments from tracking the apps we use, the sites we visit, and the
people we communicate with, all tagged with our location data? How can
we ensure that we have open and unthrottled access to the services we
need, no matter where we are? While not a panacea, Tor is one project
working to address these questions, and for five years, has been
supporting mobile devices, as well.

Speaker: Nathan Freitas is the lead developer of Orbot, Tor for Android,
and the Orweb and Orfox privacy enhanced mobile web browsers. He also
founded the Guardian Project, a five year old effort that creates
easy-to-use open source apps, mobile OS security enhancements, and
customized mobile devices for people around the world to help them
communicate more freely, and protect themselves from intrusion and
monitoring.
Thursday, October 23, 12pm - 1:30pm, 37-252 (Marlar Lounge), RSVP
required (email myeaton@mit.edu) to attend and receive a free lunch.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

