Wed Oct 30 00:02:25 2024
EVENTS
 FREE
SOFTWARE
INSTITUTE

POLITICS
JOBS
MEMBERS'
CORNER

MAILING
LIST

NYLXS Mailing Lists and Archives
NYLXS Members have a lot to say and share but we don't keep many secrets. Join the Hangout Mailing List and say your peice.

DATE 2023-08-01

HANGOUT

2024-10-30 | 2024-09-30 | 2024-08-30 | 2024-07-30 | 2024-06-30 | 2024-05-30 | 2024-04-30 | 2024-03-30 | 2024-02-29 | 2024-01-29 | 2023-12-29 | 2023-11-29 | 2023-10-29 | 2023-09-29 | 2023-08-29 | 2023-07-29 | 2023-06-29 | 2023-05-29 | 2023-04-29 | 2023-03-29 | 2023-02-28 | 2023-01-28 | 2022-12-28 | 2022-11-28 | 2022-10-28 | 2022-09-28 | 2022-08-28 | 2022-07-28 | 2022-06-28 | 2022-05-28 | 2022-04-28 | 2022-03-28 | 2022-02-28 | 2022-01-28 | 2021-12-28 | 2021-11-28 | 2021-10-28 | 2021-09-28 | 2021-08-28 | 2021-07-28 | 2021-06-28 | 2021-05-28 | 2021-04-28 | 2021-03-28 | 2021-02-28 | 2021-01-28 | 2020-12-28 | 2020-11-28 | 2020-10-28 | 2020-09-28 | 2020-08-28 | 2020-07-28 | 2020-06-28 | 2020-05-28 | 2020-04-28 | 2020-03-28 | 2020-02-28 | 2020-01-28 | 2019-12-28 | 2019-11-28 | 2019-10-28 | 2019-09-28 | 2019-08-28 | 2019-07-28 | 2019-06-28 | 2019-05-28 | 2019-04-28 | 2019-03-28 | 2019-02-28 | 2019-01-28 | 2018-12-28 | 2018-11-28 | 2018-10-28 | 2018-09-28 | 2018-08-28 | 2018-07-28 | 2018-06-28 | 2018-05-28 | 2018-04-28 | 2018-03-28 | 2018-02-28 | 2018-01-28 | 2017-12-28 | 2017-11-28 | 2017-10-28 | 2017-09-28 | 2017-08-28 | 2017-07-28 | 2017-06-28 | 2017-05-28 | 2017-04-28 | 2017-03-28 | 2017-02-28 | 2017-01-28 | 2016-12-28 | 2016-11-28 | 2016-10-28 | 2016-09-28 | 2016-08-28 | 2016-07-28 | 2016-06-28 | 2016-05-28 | 2016-04-28 | 2016-03-28 | 2016-02-28 | 2016-01-28 | 2015-12-28 | 2015-11-28 | 2015-10-28 | 2015-09-28 | 2015-08-28 | 2015-07-28 | 2015-06-28 | 2015-05-28 | 2015-04-28 | 2015-03-28 | 2015-02-28 | 2015-01-28 | 2014-12-28 | 2014-11-28 | 2014-10-28 | 2014-09-28 | 2014-08-28 | 2014-07-28 | 2014-06-28 | 2014-05-28 | 2014-04-28 | 2014-03-28 | 2014-02-28 | 2014-01-28 | 2013-12-28 | 2013-11-28 | 2013-10-28 | 2013-09-28 | 2013-08-28 | 2013-07-28 | 2013-06-28 | 2013-05-28 | 2013-04-28 | 2013-03-28 | 2013-02-28 | 2013-01-28 | 2012-12-28 | 2012-11-28 | 2012-10-28 | 2012-09-28 | 2012-08-28 | 2012-07-28 | 2012-06-28 | 2012-05-28 | 2012-04-28 | 2012-03-28 | 2012-02-28 | 2012-01-28 | 2011-12-28 | 2011-11-28 | 2011-10-28 | 2011-09-28 | 2011-08-28 | 2011-07-28 | 2011-06-28 | 2011-05-28 | 2011-04-28 | 2011-03-28 | 2011-02-28 | 2011-01-28 | 2010-12-28 | 2010-11-28 | 2010-10-28 | 2010-09-28 | 2010-08-28 | 2010-07-28 | 2010-06-28 | 2010-05-28 | 2010-04-28 | 2010-03-28 | 2010-02-28 | 2010-01-28 | 2009-12-28 | 2009-11-28 | 2009-10-28 | 2009-09-28 | 2009-08-28 | 2009-07-28 | 2009-06-28 | 2009-05-28 | 2009-04-28 | 2009-03-28 | 2009-02-28 | 2009-01-28 | 2008-12-28 | 2008-11-28 | 2008-10-28 | 2008-09-28 | 2008-08-28 | 2008-07-28 | 2008-06-28 | 2008-05-28 | 2008-04-28 | 2008-03-28 | 2008-02-28 | 2008-01-28 | 2007-12-28 | 2007-11-28 | 2007-10-28 | 2007-09-28 | 2007-08-28 | 2007-07-28 | 2007-06-28 | 2007-05-28 | 2007-04-28 | 2007-03-28 | 2007-02-28 | 2007-01-28 | 2006-12-28 | 2006-11-28 | 2006-10-28 | 2006-09-28 | 2006-08-28 | 2006-07-28 | 2006-06-28 | 2006-05-28 | 2006-04-28 | 2006-03-28 | 2006-02-28 | 2006-01-28 | 2005-12-28 | 2005-11-28 | 2005-10-28 | 2005-09-28 | 2005-08-28 | 2005-07-28 | 2005-06-28 | 2005-05-28 | 2005-04-28 | 2005-03-28 | 2005-02-28 | 2005-01-28 | 2004-12-28 | 2004-11-28 | 2004-10-28 | 2004-09-28 | 2004-08-28 | 2004-07-28 | 2004-06-28 | 2004-05-28 | 2004-04-28 | 2004-03-28 | 2004-02-28 | 2004-01-28 | 2003-12-28 | 2003-11-28 | 2003-10-28 | 2003-09-28 | 2003-08-28 | 2003-07-28 | 2003-06-28 | 2003-05-28 | 2003-04-28 | 2003-03-28 | 2003-02-28 | 2003-01-28 | 2002-12-28 | 2002-11-28 | 2002-10-28 | 2002-09-28 | 2002-08-28 | 2002-07-28 | 2002-06-28 | 2002-05-28 | 2002-04-28 | 2002-03-28 | 2002-02-28 | 2002-01-28 | 2001-12-28 | 2001-11-28 | 2001-10-28 | 2001-09-28 | 2001-08-28 | 2001-07-28 | 2001-06-28 | 2001-05-28 | 2001-04-28 | 2001-03-28 | 2001-02-28 | 2001-01-28 | 2000-12-28 | 2000-11-28 | 2000-10-28 | 2000-09-28 | 2000-08-28 | 2000-07-28 | 2000-06-28 | 2000-05-28 | 2000-04-28 | 2000-03-28 | 2000-02-28 | 2000-01-28 | 1999-12-28

Key: Value:

Key: Value:

MESSAGE
DATE 2023-08-16
FROM From: "Miriam Bastian, FSF"
SUBJECT Subject: [Hangout - NYLXS] Parents, domestic violence victims,
From hangout-bounces-at-nylxs.com Wed Aug 16 18:08:57 2023
Return-Path:
X-Original-To: archive-at-mrbrklyn.com
Delivered-To: archive-at-mrbrklyn.com
Received: from www2.mrbrklyn.com (www2.mrbrklyn.com [96.57.23.82])
by mrbrklyn.com (Postfix) with ESMTP id C8A911640A3;
Wed, 16 Aug 2023 18:08:55 -0400 (EDT)
X-Original-To: hangout-at-www2.mrbrklyn.com
Delivered-To: hangout-at-www2.mrbrklyn.com
Received: by mrbrklyn.com (Postfix, from userid 1000)
id 30E1E16409D; Wed, 16 Aug 2023 18:08:53 -0400 (EDT)
Resent-From: Ruben Safir
Resent-Date: Wed, 16 Aug 2023 18:08:53 -0400
Resent-Message-ID: <20230816220853.GA25171-at-www2.mrbrklyn.com>
Resent-To: hangout-at-mrbrklyn.com
X-Original-To: ruben-at-mrbrklyn.com
Delivered-To: ruben-at-mrbrklyn.com
Received: from mailout0p.fsf.org (mailout0p.fsf.org [209.51.188.184])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mrbrklyn.com (Postfix) with ESMTPS id 9A04C164091
for ; Wed, 16 Aug 2023 17:47:40 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=fsf.org;
s=mailout0p-fsf-org; h=Date:To:Subject:From:MIME-Version:in-reply-to:
references; bh=cqRWA3yW/4S7Vl7KJoxiJJKNbudJbe4fpJWgQNQ+6zs=; b=heusLOfWCSB2Sx
TNFCcDv0rhmC8LtnKaq5cDtqgvnJl4x8/UAK68M4LWk9Y92GRFQ+OSYAIcexnSESejQrqcDFFPTGW
M4k8QP7lVpj5ZSlMQvJUpyCCFY+3l4rPl2yj2DKx8e85oRrBHhR9w6+uiAfwmtWza7t4G8fPWP6X5
vLclVhC5h5J04oTVSBPVoWdI5LbpH5M5FaA2Xl1j3oOY1IRV4ytCML4tVY+gwVHn1S926Otu+iNwj
z0ZkYdXRFg/rDqZk3YjF8WIqAcwN0Wct9jH4B8Q2rFSqUeadSfuKX5lkFZPvgnklwEmhcatNj3Tr3
TwUASKZhRxLr4PCRCFSA==;
Received: from crmserver2p.fsf.org ([2001:470:142:5::223])
by mailout0p.fsf.org with esmtps (TLS1.2) tls
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93)
(envelope-from )
id 1qWOMd-004LdI-Kd
for ruben-at-mrbrklyn.com; Wed, 16 Aug 2023 17:47:39 -0400
Received: from localhost ([::1] helo=my.fsf.org)
by crmserver2p.fsf.org with esmtp (Exim 4.90_1)
(envelope-from )
id 1qWOMd-0005GP-EP
for ruben-at-mrbrklyn.com; Wed, 16 Aug 2023 17:47:39 -0400
MIME-Version: 1.0
From: "Miriam Bastian, FSF"
job_id: 167384
To: Ruben Safir
Precedence: bulk
X-CiviMail-Bounce: crmmailer+b.167384.84249212.01cc731a0af7f987-at-fsf.org
Date: Wed, 16 Aug 2023 17:47:39 -0400
Message-Id:
Subject: [Hangout - NYLXS] Parents, domestic violence victims,
lawyers: Read about people who protect their privacy with free
software
X-BeenThere: hangout-at-nylxs.com
X-Mailman-Version: 2.1.30rc1
List-Id: NYLXS Tech Talk and Politics
List-Unsubscribe: ,

List-Archive:
List-Post:
List-Help:
List-Subscribe: ,

Reply-To: "Miriam Bastian, FSF"
Content-Type: multipart/mixed; boundary="===============0396351496=="
Errors-To: hangout-bounces-at-nylxs.com
Sender: "Hangout"

--===============0396351496==
Content-Type: multipart/alternative;
boundary="=_175faf60d499519d960ea76d8085329b"

--=_175faf60d499519d960ea76d8085329b
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=utf-8

*Please consider adding to your address book, which
will ensure that our messages reach you and not your spam box.*

*Read and share online: *


Dear Ruben Safir,

In the [previous installment][1] of our [privacy series][2], we heard
from people who have to fight for their rights and who protect their
privacy by using free software. Maybe you live in a democratic country
where citizens enjoy legal certainty and therefore deem government
oppression far away. Maybe you trust your government to never fail
(and I sincerely hope you will never be disappointed). Why should you
care about privacy and use free software to protect it? The following
people can tell you from their own experiences.

[1]: https://www.fsf.org/blogs/community/from-pro-democracy-activist-to-minorities-why-people-use-tor-and-encrypted-chats
[2]: https://www.fsf.org/blogs/community/we-have-nothing-to-hide-only-everything-to-protect

## Meet people who use free software to protect privacy

Ina Johnson is a domestic violence victim who lives in the United
States. Her husband tracks her online activity in real time,
selectively blocks her access to websites, attempts to steal her
account credentials, deletes data from her devices, and violates her
right to privacy in a multitude of ways. In a survey conducted by the
[Tor Project][3], Johnson says, "I started using Tor to protect my
privacy […] If not for Tor, I would not have another option for online
privacy."

[3]: https://torproject.org

Tor is a [browser][4] and [online anonymity network][5] that improves
privacy on the Internet. It [uses encryption][6] and IP address
obfuscation to make web traffic untraceable and private. Tor, as well
as all the projects and software we present in this article, is free
software, which is [the only type of software that can guarantee true
privacy][7]. While free software doesn't guarantee privacy, only free
software *allows us* to guarantee true privacy.

[4]: https://directory.fsf.org/wiki/Tor_Browser
[5]: https://directory.fsf.org/wiki/Tor
[6]: https://support.torproject.org/glossary/encryption/
[7]: https://www.fsf.org/bulletin/2020/spring/privacy-encryption

Going back to the topic of why privacy in general is important, let's
do a thought experiment. Let's assume you trust your spouse, all the
people around you, and your government. Take a moment to think about
whether you also trust *big tech giants* like Google and Meta to the
same degree. Consider whether you trust them, for example, to
responsibly handle sensitive information of your children's health and
other data. George Sanchez would answer that question with a decided
*no*. His reasons are simple, he wants to protect his children in
today's technological environment. In the Tor survey, he says, "I am a
father of two teenagers. […] I try to be up to date with research,
information, and details if anything arises. I use Tor to do the
research to basically avoid telling Google (and others) that my
children have […] issues." Similarly, James Taylor explains, "I use
Tor as my everyday browser. Especially, when I research doctors and
other very personal stuff, it feels better, 'cause hopefully there
won't be data for sale, telling the world about my assumed medical
condition."

[Micky Metts][8], LibrePlanet [keynote speaker][9] and worker/owner of
[Agaric Technology Collective][10] uses free software because it
grants her the right to study how the software that holds her data is
working and lets her control who has access to her information. She
states:

> Personal information has been used to deny people healthcare and to
> deny employment based on medical conditions or political
> beliefs. […] Some corporations buy data in bulk to learn more about
> their employees. A good example would be that your employer finds
> out you may be pregnant because you bought a pregnancy test at a
> pharmacy that sells their data […] and then terminates you
> immediately.

[8]: https://www.fsf.org/working-together/profiles/micky-metts
[9]: https://media.libreplanet.org/u/libreplanet/m/how-can-we-prevent-the-orwellian-1984-digital-world/
[10]: https://agaric.coop/

Next, let's meet doctor Steven White. Sanchez, Taylor, Metts, and all
the rest of us can only hope that our doctor is as thoughtful with our
medical information as Dr. White, who goes out of his way to protect
his patients' privacy, and does so with free software. Dr. White has
politicians as patients whose legislation made them big enemies in the
telecom, social media, and search engine industries. When he does
research on diseases and treatment, he has to ensure that his search
histories can't be correlated to patient visits nor leak information
about their health, families, and personal lives.

Unfortunately, we see more and more people use proprietary software,
such as what runs on devices like the Apple Watch, to monitor their
health. In our [fall *FSF Bulletin* article on privacy][11], you can
read how proprietary period tracking apps send the health data about
its users to surveillance capitalism tech giants like Meta.

[11]: https://www.fsf.org/bulletin/2022/fall/protect-your-freedom-by-managing-your-privacy

Healthcare is one example of an area with especially sensitive
information. There are other areas with similar concerns, like
education or law. If you ever need a lawyer, you should check that
they will handle what you tell them as carefully as [Alper
Atmaca][12], a lawyer in Turkey, or Neil Brown from
[decoded.legal][13], a virtual English law firm. Both exclusively use
free software to communicate with their clients. When Atmaca offers a
videoconference on [Jitsi Meet][14], he is often confronted with
resistance in the beginning. Many clients want to stick to a program
by the tech giants that they know. However, after some explanation,
his clients soon come to understand that the delicate topics they are
talking about with their attorney will only stay confidential if they
communicate via software that respects their privacy. "In the end,
most of them are amazed what a self-hosted Jitsi has to offer," says
Atmaca.

[12]: https://www.fsf.org/working-together/profiles/alper-atmaca
[13]: https://decoded.legal/blog/2022/10/running-a-law-firm-on-linux-a-year-or-so-in
[14]: https://directory.fsf.org/wiki/Jitsi-Meet

[Jitsi Meet offers end-to-end encryption][15] for conversations
between two people and encryption at the network level for
videoconferencing between more people, which is why the FSF provides a
[fully free Jitsi Meet server][16] to all associate members as a
member benefit. The service notably does not use any third party
servers for network initialization. Hosting own instances of services
is the fastest way to controlling software privacy. To help others, we
published the [source code of the FSF's customizations][17] of Jitsi
Meet.

[15]: https://jitsi.org/blog/e2ee/
[16]: https://www.fsf.org/associate/about-the-fsf-jitsi-meet-server
[17]: https://vcs.fsf.org/?p=jitsi-ansible.git

Finally, let's hear from Neil Brown, who also thinks that
communicating securely is important. He, too, uses Jitsi for
videoconferences and, if a client requests it, encrypts his emails.
"Whether you are communicating with your lawyer or your lover, it's
important that what you say stays with you and the person you are
communicating with only and that no one else can alter it!" The same
is true for client-identifiable information. Brown therefore encrypts
files with [Cryptomator][18] before syncing them to a free,
decentralized file storage platform called [Nextcloud][19]. If someone
accesses the system remotely they will only see encrypted files. In
addition, Brown encrypts his disks in case his computer gets lost or
stolen. Brown is keen to point out that valuing freedom does not mean
compromising on quality. He says, "there's a wealth of amazing free
software, offering both quality and freedom -- you don't need to
settle for just one or the other."

[18]: https://directory.fsf.org/wiki/Cryptomator
[19]: https://directory.fsf.org/wiki/Nextcloud

## Protecting our privacy is not a crime, it's a fundamental right

There are countless reasons why we should protect our privacy using
end-to-end encryption. Nevertheless, some still draw a foregone
conclusion that the *mere use* of encryption is *in itself* sufficient
evidence of criminal actions. Unfortunately, this is also the case in
the investigations of the so-called ["8 December" case][20], in which
seven people were accused of being part of a terrorist conspiracy. The
defendants adamantly deny the charge of terrorism. Their trial is set
to be held in October 2023.

[La Quadrature du Net revealed][21] that the investigation cites the
use of encrypted communication and privacy tools such as VPN or Tor as
proof of so-called "clandestine behavior," which is considered to
reinforce the charge of terrorism. The following quote of the
conclusion by the *Parquet National Antiterroriste* (National
Antiterrorist Prosecution Office) on the 8 December case shows this
paradigmatically:

> The protagonists of the case were all characterized by their cult of
> secrecy and obsession with discretion, both in their exchanges *and*
> in their Internet browsing habits. The encrypted application Signal
> was used by all of the accused, some of whom communicated
> _exclusively_ [highlighted in the original text] through it.

[20]: https://en.wikipedia.org/wiki/8_December_2020_incident
[21]: https://www.laquadrature.net/en/2023/06/05/criminalization-of-encryption-the-8-december-case/

It's a popular misconception that someone who encrypts their
communication or protects their browsing from prying eyes is hiding a
crime. Misconceptions like this make it even more important that
people who use encryption tell their story and let the world know how
free software encryption helps protect our privacy, and why that is
*so* important. Because we have everything to protect from snoops.
What we write, where we browse, and who we are belongs to us and only
to us. No one else should be allowed to see it without our
permission. Privacy is not a crime; it's our fundamental right.

## Tell your own story

Let us and the world know why you use free software to protect your
privacy. Tell your story on [social media][22] starting your statement
with "I use #freesoftware to protect my #privacy because […]"

[22]: https://www.fsf.org/share

## Read more on privacy and free software

Visit the website of the [FSF's anti-surveillance campaign][23] to
learn more about privacy and free software.

Discover why [privacy and security depend on free software][24].

Check out the FSF's [Email Self-Defense Guide][25] which is available
in eight different languages.

Take action! [Protect free software that respects our privacy][26]
against legislative attempts to install a backdoor.

[23]: https://www.fsf.org/campaigns/surveillance
[24]: https://www.fsf.org/bulletin/2020/spring/privacy-encryption
[25]: https://emailselfdefense.fsf.org/en/
[26]: https://www.fsf.org/blogs/community/take-action-protect-end-to-end-encryption

In freedom,

Miriam Bastian
Program Manager

*Editorial note: Names have been changed to protect the privacy of the
people whose stories are told in this article.*

--
* Follow us on Mastodon at , GNU social at
, PeerTube at , and on Twitter at -at-fsf.
* Read about why we use Twitter, but only with caveats:
* Subscribe to our RSS feeds:
* Join us as an associate member:
* Read our Privacy Policy:

Sent from the Free Software Foundation,

51 Franklin St, Fifth Floor
Boston, Massachusetts 02110-1335
United States


You can unsubscribe from this mailing list by visiting

https://my.fsf.org/civicrm/mailing/unsubscribe?reset=1&jid=167384&qid=84249212&h=01cc731a0af7f987.

To stop all email from the Free Software Foundation, including Defective by Design,
and the Free Software Supporter newsletter, visit

https://my.fsf.org/civicrm/mailing/optout?reset=1&jid=167384&qid=84249212&h=01cc731a0af7f987.
--=_175faf60d499519d960ea76d8085329b
Content-Transfer-Encoding: 8bit
Content-Type: text/html; charset=utf-8

































Free Software Foundation







 

Please consider adding info@fsf.org to your address book, which
will ensure that our messages reach you and not your spam box.



Read and share online: https://www.fsf.org/blogs/community/parents-domestic-violence-victims-lawyers-read-about-people-who-protect-their-privacy-with-free-software





Dear Ruben Safir,



In the previous installment of our privacy series, we heard
from people who have to fight for their rights and who protect their
privacy by using free software. Maybe you live in a democratic country
where citizens enjoy legal certainty and therefore deem government
oppression far away. Maybe you trust your government to never fail
(and I sincerely hope you will never be disappointed). Why should you
care about privacy and use free software to protect it? The following
people can tell you from their own experiences.








Meet people who use free software to protect privacy



Ina Johnson is a domestic violence victim who lives in the United
States. Her husband tracks her online activity in real time,
selectively blocks her access to websites, attempts to steal her
account credentials, deletes data from her devices, and violates her
right to privacy in a multitude of ways. In a survey conducted by the
Tor Project, Johnson says, "I started using Tor to protect my
privacy […] If not for Tor, I would not have another option for online
privacy."



Tor is a browser and online anonymity network that improves
privacy on the Internet. It uses encryption and IP address
obfuscation to make web traffic untraceable and private. Tor, as well
as all the projects and software we present in this article, is free
software, which is the only type of software that can guarantee true
privacy
. While free software doesn't guarantee privacy, only free
software allows us to guarantee true privacy.



Going back to the topic of why privacy in general is important, let's
do a thought experiment. Let's assume you trust your spouse, all the
people around you, and your government. Take a moment to think about
whether you also trust big tech giants like Google and Meta to the
same degree. Consider whether you trust them, for example, to
responsibly handle sensitive information of your children's health and
other data. George Sanchez would answer that question with a decided
no. His reasons are simple, he wants to protect his children in
today's technological environment. In the Tor survey, he says, "I am a
father of two teenagers. […] I try to be up to date with research,
information, and details if anything arises. I use Tor to do the
research to basically avoid telling Google (and others) that my
children have […] issues." Similarly, James Taylor explains, "I use
Tor as my everyday browser. Especially, when I research doctors and
other very personal stuff, it feels better, 'cause hopefully there
won't be data for sale, telling the world about my assumed medical
condition."



Micky Metts, LibrePlanet keynote speaker and worker/owner of
Agaric Technology Collective uses free software because it
grants her the right to study how the software that holds her data is
working and lets her control who has access to her information. She
states:



Personal information has been used to deny people healthcare and to
deny employment based on medical conditions or political
beliefs. […] Some corporations buy data in bulk to learn more about
their employees. A good example would be that your employer finds
out you may be pregnant because you bought a pregnancy test at a
pharmacy that sells their data […] and then terminates you
immediately.



Next, let's meet doctor Steven White. Sanchez, Taylor, Metts, and all
the rest of us can only hope that our doctor is as thoughtful with our
medical information as Dr. White, who goes out of his way to protect
his patients' privacy, and does so with free software. Dr. White has
politicians as patients whose legislation made them big enemies in the
telecom, social media, and search engine industries. When he does
research on diseases and treatment, he has to ensure that his search
histories can't be correlated to patient visits nor leak information
about their health, families, and personal lives.



Unfortunately, we see more and more people use proprietary software,
such as what runs on devices like the Apple Watch, to monitor their
health. In our fall FSF Bulletin article on privacy, you can
read how proprietary period tracking apps send the health data about
its users to surveillance capitalism tech giants like Meta.



Healthcare is one example of an area with especially sensitive
information. There are other areas with similar concerns, like
education or law. If you ever need a lawyer, you should check that
they will handle what you tell them as carefully as Alper
Atmaca
, a lawyer in Turkey, or Neil Brown from
decoded.legal, a virtual English law firm. Both exclusively use
free software to communicate with their clients. When Atmaca offers a
videoconference on Jitsi Meet, he is often confronted with
resistance in the beginning. Many clients want to stick to a program
by the tech giants that they know. However, after some explanation,
his clients soon come to understand that the delicate topics they are
talking about with their attorney will only stay confidential if they
communicate via software that respects their privacy. "In the end,
most of them are amazed what a self-hosted Jitsi has to offer," says
Atmaca.



Jitsi Meet offers end-to-end encryption for conversations
between two people and encryption at the network level for
videoconferencing between more people, which is why the FSF provides a
fully free Jitsi Meet server to all associate members as a
member benefit. The service notably does not use any third party
servers for network initialization. Hosting own instances of services
is the fastest way to controlling software privacy. To help others, we
published the source code of the FSF's customizations of Jitsi
Meet.



Finally, let's hear from Neil Brown, who also thinks that
communicating securely is important. He, too, uses Jitsi for
videoconferences and, if a client requests it, encrypts his emails.
"Whether you are communicating with your lawyer or your lover, it's
important that what you say stays with you and the person you are
communicating with only and that no one else can alter it!" The same
is true for client-identifiable information. Brown therefore encrypts
files with Cryptomator before syncing them to a free,
decentralized file storage platform called Nextcloud. If someone
accesses the system remotely they will only see encrypted files. In
addition, Brown encrypts his disks in case his computer gets lost or
stolen. Brown is keen to point out that valuing freedom does not mean
compromising on quality. He says, "there's a wealth of amazing free
software, offering both quality and freedom -- you don't need to
settle for just one or the other."



Protecting our privacy is not a crime, it's a fundamental right



There are countless reasons why we should protect our privacy using
end-to-end encryption. Nevertheless, some still draw a foregone
conclusion that the mere use of encryption is in itself sufficient
evidence of criminal actions. Unfortunately, this is also the case in
the investigations of the so-called "8 December" case, in which
seven people were accused of being part of a terrorist conspiracy. The
defendants adamantly deny the charge of terrorism. Their trial is set
to be held in October 2023.



La Quadrature du Net revealed that the investigation cites the
use of encrypted communication and privacy tools such as VPN or Tor as
proof of so-called "clandestine behavior," which is considered to
reinforce the charge of terrorism. The following quote of the
conclusion by the Parquet National Antiterroriste (National
Antiterrorist Prosecution Office) on the 8 December case shows this
paradigmatically:



The protagonists of the case were all characterized by their cult of
secrecy and obsession with discretion, both in their exchanges and
in their Internet browsing habits. The encrypted application Signal
was used by all of the accused, some of whom communicated
exclusively [highlighted in the original text] through it.



It's a popular misconception that someone who encrypts their
communication or protects their browsing from prying eyes is hiding a
crime. Misconceptions like this make it even more important that
people who use encryption tell their story and let the world know how
free software encryption helps protect our privacy, and why that is
so important. Because we have everything to protect from snoops.
What we write, where we browse, and who we are belongs to us and only
to us. No one else should be allowed to see it without our
permission. Privacy is not a crime; it's our fundamental right.



Tell your own story



Let us and the world know why you use free software to protect your
privacy. Tell your story on social media starting your statement
with "I use #freesoftware to protect my #privacy because […]"



Read more on privacy and free software



Visit the website of the FSF's anti-surveillance campaign to
learn more about privacy and free software.



Discover why privacy and security depend on free software.



Check out the FSF's Email Self-Defense Guide which is available
in eight different languages.



Take action! Protect free software that respects our privacy
against legislative attempts to install a backdoor.



In freedom,



Miriam Bastian

Program Manager



Editorial note: Names have been changed to protect the privacy of the
people whose stories are told in this article.



Illustration Copyright © 2014, Johannes Landin. Licensed under
Creative Commons Attribution-Share Alike 3.0 Unported
International license.








--=_175faf60d499519d960ea76d8085329b--

--===============0396351496==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Hangout mailing list
Hangout-at-nylxs.com
http://lists.mrbrklyn.com/mailman/listinfo/hangout

--===============0396351496==--

--===============0396351496==
Content-Type: multipart/alternative;
boundary="=_175faf60d499519d960ea76d8085329b"

--=_175faf60d499519d960ea76d8085329b
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=utf-8

*Please consider adding to your address book, which
will ensure that our messages reach you and not your spam box.*

*Read and share online: *


Dear Ruben Safir,

In the [previous installment][1] of our [privacy series][2], we heard
from people who have to fight for their rights and who protect their
privacy by using free software. Maybe you live in a democratic country
where citizens enjoy legal certainty and therefore deem government
oppression far away. Maybe you trust your government to never fail
(and I sincerely hope you will never be disappointed). Why should you
care about privacy and use free software to protect it? The following
people can tell you from their own experiences.

[1]: https://www.fsf.org/blogs/community/from-pro-democracy-activist-to-minorities-why-people-use-tor-and-encrypted-chats
[2]: https://www.fsf.org/blogs/community/we-have-nothing-to-hide-only-everything-to-protect

## Meet people who use free software to protect privacy

Ina Johnson is a domestic violence victim who lives in the United
States. Her husband tracks her online activity in real time,
selectively blocks her access to websites, attempts to steal her
account credentials, deletes data from her devices, and violates her
right to privacy in a multitude of ways. In a survey conducted by the
[Tor Project][3], Johnson says, "I started using Tor to protect my
privacy […] If not for Tor, I would not have another option for online
privacy."

[3]: https://torproject.org

Tor is a [browser][4] and [online anonymity network][5] that improves
privacy on the Internet. It [uses encryption][6] and IP address
obfuscation to make web traffic untraceable and private. Tor, as well
as all the projects and software we present in this article, is free
software, which is [the only type of software that can guarantee true
privacy][7]. While free software doesn't guarantee privacy, only free
software *allows us* to guarantee true privacy.

[4]: https://directory.fsf.org/wiki/Tor_Browser
[5]: https://directory.fsf.org/wiki/Tor
[6]: https://support.torproject.org/glossary/encryption/
[7]: https://www.fsf.org/bulletin/2020/spring/privacy-encryption

Going back to the topic of why privacy in general is important, let's
do a thought experiment. Let's assume you trust your spouse, all the
people around you, and your government. Take a moment to think about
whether you also trust *big tech giants* like Google and Meta to the
same degree. Consider whether you trust them, for example, to
responsibly handle sensitive information of your children's health and
other data. George Sanchez would answer that question with a decided
*no*. His reasons are simple, he wants to protect his children in
today's technological environment. In the Tor survey, he says, "I am a
father of two teenagers. […] I try to be up to date with research,
information, and details if anything arises. I use Tor to do the
research to basically avoid telling Google (and others) that my
children have […] issues." Similarly, James Taylor explains, "I use
Tor as my everyday browser. Especially, when I research doctors and
other very personal stuff, it feels better, 'cause hopefully there
won't be data for sale, telling the world about my assumed medical
condition."

[Micky Metts][8], LibrePlanet [keynote speaker][9] and worker/owner of
[Agaric Technology Collective][10] uses free software because it
grants her the right to study how the software that holds her data is
working and lets her control who has access to her information. She
states:

> Personal information has been used to deny people healthcare and to
> deny employment based on medical conditions or political
> beliefs. […] Some corporations buy data in bulk to learn more about
> their employees. A good example would be that your employer finds
> out you may be pregnant because you bought a pregnancy test at a
> pharmacy that sells their data […] and then terminates you
> immediately.

[8]: https://www.fsf.org/working-together/profiles/micky-metts
[9]: https://media.libreplanet.org/u/libreplanet/m/how-can-we-prevent-the-orwellian-1984-digital-world/
[10]: https://agaric.coop/

Next, let's meet doctor Steven White. Sanchez, Taylor, Metts, and all
the rest of us can only hope that our doctor is as thoughtful with our
medical information as Dr. White, who goes out of his way to protect
his patients' privacy, and does so with free software. Dr. White has
politicians as patients whose legislation made them big enemies in the
telecom, social media, and search engine industries. When he does
research on diseases and treatment, he has to ensure that his search
histories can't be correlated to patient visits nor leak information
about their health, families, and personal lives.

Unfortunately, we see more and more people use proprietary software,
such as what runs on devices like the Apple Watch, to monitor their
health. In our [fall *FSF Bulletin* article on privacy][11], you can
read how proprietary period tracking apps send the health data about
its users to surveillance capitalism tech giants like Meta.

[11]: https://www.fsf.org/bulletin/2022/fall/protect-your-freedom-by-managing-your-privacy

Healthcare is one example of an area with especially sensitive
information. There are other areas with similar concerns, like
education or law. If you ever need a lawyer, you should check that
they will handle what you tell them as carefully as [Alper
Atmaca][12], a lawyer in Turkey, or Neil Brown from
[decoded.legal][13], a virtual English law firm. Both exclusively use
free software to communicate with their clients. When Atmaca offers a
videoconference on [Jitsi Meet][14], he is often confronted with
resistance in the beginning. Many clients want to stick to a program
by the tech giants that they know. However, after some explanation,
his clients soon come to understand that the delicate topics they are
talking about with their attorney will only stay confidential if they
communicate via software that respects their privacy. "In the end,
most of them are amazed what a self-hosted Jitsi has to offer," says
Atmaca.

[12]: https://www.fsf.org/working-together/profiles/alper-atmaca
[13]: https://decoded.legal/blog/2022/10/running-a-law-firm-on-linux-a-year-or-so-in
[14]: https://directory.fsf.org/wiki/Jitsi-Meet

[Jitsi Meet offers end-to-end encryption][15] for conversations
between two people and encryption at the network level for
videoconferencing between more people, which is why the FSF provides a
[fully free Jitsi Meet server][16] to all associate members as a
member benefit. The service notably does not use any third party
servers for network initialization. Hosting own instances of services
is the fastest way to controlling software privacy. To help others, we
published the [source code of the FSF's customizations][17] of Jitsi
Meet.

[15]: https://jitsi.org/blog/e2ee/
[16]: https://www.fsf.org/associate/about-the-fsf-jitsi-meet-server
[17]: https://vcs.fsf.org/?p=jitsi-ansible.git

Finally, let's hear from Neil Brown, who also thinks that
communicating securely is important. He, too, uses Jitsi for
videoconferences and, if a client requests it, encrypts his emails.
"Whether you are communicating with your lawyer or your lover, it's
important that what you say stays with you and the person you are
communicating with only and that no one else can alter it!" The same
is true for client-identifiable information. Brown therefore encrypts
files with [Cryptomator][18] before syncing them to a free,
decentralized file storage platform called [Nextcloud][19]. If someone
accesses the system remotely they will only see encrypted files. In
addition, Brown encrypts his disks in case his computer gets lost or
stolen. Brown is keen to point out that valuing freedom does not mean
compromising on quality. He says, "there's a wealth of amazing free
software, offering both quality and freedom -- you don't need to
settle for just one or the other."

[18]: https://directory.fsf.org/wiki/Cryptomator
[19]: https://directory.fsf.org/wiki/Nextcloud

## Protecting our privacy is not a crime, it's a fundamental right

There are countless reasons why we should protect our privacy using
end-to-end encryption. Nevertheless, some still draw a foregone
conclusion that the *mere use* of encryption is *in itself* sufficient
evidence of criminal actions. Unfortunately, this is also the case in
the investigations of the so-called ["8 December" case][20], in which
seven people were accused of being part of a terrorist conspiracy. The
defendants adamantly deny the charge of terrorism. Their trial is set
to be held in October 2023.

[La Quadrature du Net revealed][21] that the investigation cites the
use of encrypted communication and privacy tools such as VPN or Tor as
proof of so-called "clandestine behavior," which is considered to
reinforce the charge of terrorism. The following quote of the
conclusion by the *Parquet National Antiterroriste* (National
Antiterrorist Prosecution Office) on the 8 December case shows this
paradigmatically:

> The protagonists of the case were all characterized by their cult of
> secrecy and obsession with discretion, both in their exchanges *and*
> in their Internet browsing habits. The encrypted application Signal
> was used by all of the accused, some of whom communicated
> _exclusively_ [highlighted in the original text] through it.

[20]: https://en.wikipedia.org/wiki/8_December_2020_incident
[21]: https://www.laquadrature.net/en/2023/06/05/criminalization-of-encryption-the-8-december-case/

It's a popular misconception that someone who encrypts their
communication or protects their browsing from prying eyes is hiding a
crime. Misconceptions like this make it even more important that
people who use encryption tell their story and let the world know how
free software encryption helps protect our privacy, and why that is
*so* important. Because we have everything to protect from snoops.
What we write, where we browse, and who we are belongs to us and only
to us. No one else should be allowed to see it without our
permission. Privacy is not a crime; it's our fundamental right.

## Tell your own story

Let us and the world know why you use free software to protect your
privacy. Tell your story on [social media][22] starting your statement
with "I use #freesoftware to protect my #privacy because […]"

[22]: https://www.fsf.org/share

## Read more on privacy and free software

Visit the website of the [FSF's anti-surveillance campaign][23] to
learn more about privacy and free software.

Discover why [privacy and security depend on free software][24].

Check out the FSF's [Email Self-Defense Guide][25] which is available
in eight different languages.

Take action! [Protect free software that respects our privacy][26]
against legislative attempts to install a backdoor.

[23]: https://www.fsf.org/campaigns/surveillance
[24]: https://www.fsf.org/bulletin/2020/spring/privacy-encryption
[25]: https://emailselfdefense.fsf.org/en/
[26]: https://www.fsf.org/blogs/community/take-action-protect-end-to-end-encryption

In freedom,

Miriam Bastian
Program Manager

*Editorial note: Names have been changed to protect the privacy of the
people whose stories are told in this article.*

--
* Follow us on Mastodon at , GNU social at
, PeerTube at , and on Twitter at -at-fsf.
* Read about why we use Twitter, but only with caveats:
* Subscribe to our RSS feeds:
* Join us as an associate member:
* Read our Privacy Policy:

Sent from the Free Software Foundation,

51 Franklin St, Fifth Floor
Boston, Massachusetts 02110-1335
United States


You can unsubscribe from this mailing list by visiting

https://my.fsf.org/civicrm/mailing/unsubscribe?reset=1&jid=167384&qid=84249212&h=01cc731a0af7f987.

To stop all email from the Free Software Foundation, including Defective by Design,
and the Free Software Supporter newsletter, visit

https://my.fsf.org/civicrm/mailing/optout?reset=1&jid=167384&qid=84249212&h=01cc731a0af7f987.
--=_175faf60d499519d960ea76d8085329b
Content-Transfer-Encoding: 8bit
Content-Type: text/html; charset=utf-8

































Free Software Foundation







 

Please consider adding info@fsf.org to your address book, which
will ensure that our messages reach you and not your spam box.



Read and share online: https://www.fsf.org/blogs/community/parents-domestic-violence-victims-lawyers-read-about-people-who-protect-their-privacy-with-free-software





Dear Ruben Safir,



In the previous installment of our privacy series, we heard
from people who have to fight for their rights and who protect their
privacy by using free software. Maybe you live in a democratic country
where citizens enjoy legal certainty and therefore deem government
oppression far away. Maybe you trust your government to never fail
(and I sincerely hope you will never be disappointed). Why should you
care about privacy and use free software to protect it? The following
people can tell you from their own experiences.








Meet people who use free software to protect privacy



Ina Johnson is a domestic violence victim who lives in the United
States. Her husband tracks her online activity in real time,
selectively blocks her access to websites, attempts to steal her
account credentials, deletes data from her devices, and violates her
right to privacy in a multitude of ways. In a survey conducted by the
Tor Project, Johnson says, "I started using Tor to protect my
privacy […] If not for Tor, I would not have another option for online
privacy."



Tor is a browser and online anonymity network that improves
privacy on the Internet. It uses encryption and IP address
obfuscation to make web traffic untraceable and private. Tor, as well
as all the projects and software we present in this article, is free
software, which is the only type of software that can guarantee true
privacy
. While free software doesn't guarantee privacy, only free
software allows us to guarantee true privacy.



Going back to the topic of why privacy in general is important, let's
do a thought experiment. Let's assume you trust your spouse, all the
people around you, and your government. Take a moment to think about
whether you also trust big tech giants like Google and Meta to the
same degree. Consider whether you trust them, for example, to
responsibly handle sensitive information of your children's health and
other data. George Sanchez would answer that question with a decided
no. His reasons are simple, he wants to protect his children in
today's technological environment. In the Tor survey, he says, "I am a
father of two teenagers. […] I try to be up to date with research,
information, and details if anything arises. I use Tor to do the
research to basically avoid telling Google (and others) that my
children have […] issues." Similarly, James Taylor explains, "I use
Tor as my everyday browser. Especially, when I research doctors and
other very personal stuff, it feels better, 'cause hopefully there
won't be data for sale, telling the world about my assumed medical
condition."



Micky Metts, LibrePlanet keynote speaker and worker/owner of
Agaric Technology Collective uses free software because it
grants her the right to study how the software that holds her data is
working and lets her control who has access to her information. She
states:



Personal information has been used to deny people healthcare and to
deny employment based on medical conditions or political
beliefs. […] Some corporations buy data in bulk to learn more about
their employees. A good example would be that your employer finds
out you may be pregnant because you bought a pregnancy test at a
pharmacy that sells their data […] and then terminates you
immediately.



Next, let's meet doctor Steven White. Sanchez, Taylor, Metts, and all
the rest of us can only hope that our doctor is as thoughtful with our
medical information as Dr. White, who goes out of his way to protect
his patients' privacy, and does so with free software. Dr. White has
politicians as patients whose legislation made them big enemies in the
telecom, social media, and search engine industries. When he does
research on diseases and treatment, he has to ensure that his search
histories can't be correlated to patient visits nor leak information
about their health, families, and personal lives.



Unfortunately, we see more and more people use proprietary software,
such as what runs on devices like the Apple Watch, to monitor their
health. In our fall FSF Bulletin article on privacy, you can
read how proprietary period tracking apps send the health data about
its users to surveillance capitalism tech giants like Meta.



Healthcare is one example of an area with especially sensitive
information. There are other areas with similar concerns, like
education or law. If you ever need a lawyer, you should check that
they will handle what you tell them as carefully as Alper
Atmaca
, a lawyer in Turkey, or Neil Brown from
decoded.legal, a virtual English law firm. Both exclusively use
free software to communicate with their clients. When Atmaca offers a
videoconference on Jitsi Meet, he is often confronted with
resistance in the beginning. Many clients want to stick to a program
by the tech giants that they know. However, after some explanation,
his clients soon come to understand that the delicate topics they are
talking about with their attorney will only stay confidential if they
communicate via software that respects their privacy. "In the end,
most of them are amazed what a self-hosted Jitsi has to offer," says
Atmaca.



Jitsi Meet offers end-to-end encryption for conversations
between two people and encryption at the network level for
videoconferencing between more people, which is why the FSF provides a
fully free Jitsi Meet server to all associate members as a
member benefit. The service notably does not use any third party
servers for network initialization. Hosting own instances of services
is the fastest way to controlling software privacy. To help others, we
published the source code of the FSF's customizations of Jitsi
Meet.



Finally, let's hear from Neil Brown, who also thinks that
communicating securely is important. He, too, uses Jitsi for
videoconferences and, if a client requests it, encrypts his emails.
"Whether you are communicating with your lawyer or your lover, it's
important that what you say stays with you and the person you are
communicating with only and that no one else can alter it!" The same
is true for client-identifiable information. Brown therefore encrypts
files with Cryptomator before syncing them to a free,
decentralized file storage platform called Nextcloud. If someone
accesses the system remotely they will only see encrypted files. In
addition, Brown encrypts his disks in case his computer gets lost or
stolen. Brown is keen to point out that valuing freedom does not mean
compromising on quality. He says, "there's a wealth of amazing free
software, offering both quality and freedom -- you don't need to
settle for just one or the other."



Protecting our privacy is not a crime, it's a fundamental right



There are countless reasons why we should protect our privacy using
end-to-end encryption. Nevertheless, some still draw a foregone
conclusion that the mere use of encryption is in itself sufficient
evidence of criminal actions. Unfortunately, this is also the case in
the investigations of the so-called "8 December" case, in which
seven people were accused of being part of a terrorist conspiracy. The
defendants adamantly deny the charge of terrorism. Their trial is set
to be held in October 2023.



La Quadrature du Net revealed that the investigation cites the
use of encrypted communication and privacy tools such as VPN or Tor as
proof of so-called "clandestine behavior," which is considered to
reinforce the charge of terrorism. The following quote of the
conclusion by the Parquet National Antiterroriste (National
Antiterrorist Prosecution Office) on the 8 December case shows this
paradigmatically:



The protagonists of the case were all characterized by their cult of
secrecy and obsession with discretion, both in their exchanges and
in their Internet browsing habits. The encrypted application Signal
was used by all of the accused, some of whom communicated
exclusively [highlighted in the original text] through it.



It's a popular misconception that someone who encrypts their
communication or protects their browsing from prying eyes is hiding a
crime. Misconceptions like this make it even more important that
people who use encryption tell their story and let the world know how
free software encryption helps protect our privacy, and why that is
so important. Because we have everything to protect from snoops.
What we write, where we browse, and who we are belongs to us and only
to us. No one else should be allowed to see it without our
permission. Privacy is not a crime; it's our fundamental right.



Tell your own story



Let us and the world know why you use free software to protect your
privacy. Tell your story on social media starting your statement
with "I use #freesoftware to protect my #privacy because […]"



Read more on privacy and free software



Visit the website of the FSF's anti-surveillance campaign to
learn more about privacy and free software.



Discover why privacy and security depend on free software.



Check out the FSF's Email Self-Defense Guide which is available
in eight different languages.



Take action! Protect free software that respects our privacy
against legislative attempts to install a backdoor.



In freedom,



Miriam Bastian

Program Manager



Editorial note: Names have been changed to protect the privacy of the
people whose stories are told in this article.



Illustration Copyright © 2014, Johannes Landin. Licensed under
Creative Commons Attribution-Share Alike 3.0 Unported
International license.








--=_175faf60d499519d960ea76d8085329b--

--===============0396351496==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Hangout mailing list
Hangout-at-nylxs.com
http://lists.mrbrklyn.com/mailman/listinfo/hangout

--===============0396351496==--

  1. 2023-08-01 From: "Free Software Foundation" <info-at-fsf.org> Subject: [Hangout - NYLXS] Free Software Supporter -- Issue 184, August 2023
  2. 2023-08-07 Gabor Szabo <gabor-at-szabgab.com> Subject: [Hangout - NYLXS] [Perlweekly] #628 - Have you tried Perl v5.38?
  3. 2023-08-07 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] New windowmaker is out
  4. 2023-08-09 Touro Graduate School of Technology <info.gst-at-touro.edu> Subject: [Hangout - NYLXS] Upcoming 3D Printing Workshop
  5. 2023-08-09 Touro Graduate School of Technology <info.gst-at-touro.edu> Subject: [Hangout - NYLXS] Teaching Transformed : AI and Computational
  6. 2023-08-10 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Physics
  7. 2023-08-10 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Edward Snowden On Artificial Intelligence &
  8. 2023-08-11 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] ms w11 shocker
  9. 2023-08-11 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Section 702 an agregous sin
  10. 2023-08-11 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] CVS - Theives Profit
  11. 2023-08-14 From: "=?US-ASCII?Q?NYS_Department_of_Labor?=" <NYSDOL-at-info.labor.ny.gov> Subject: [Hangout - NYLXS] =?iso-8859-1?q?Attend_the_New_York_City_Jobs_a?=
  12. 2023-08-14 Gabor Szabo <gabor-at-szabgab.com> Subject: [Hangout - NYLXS] [Perlweekly] #629 - Are we afraid of other
  13. 2023-08-16 Touro Graduate School of Technology <info.gst-at-touro.edu> Subject: [Hangout - NYLXS] Domestic Informational Session
  14. 2023-08-16 From: "Miriam Bastian, FSF" <info-at-fsf.org> Subject: [Hangout - NYLXS] Parents, domestic violence victims,
  15. 2023-08-16 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout - NYLXS] Parents, domestic violence victims,
  16. 2023-08-18 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Patent Trolls lobby for patent law changes to
  17. 2023-08-20 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Singing Klingons
  18. 2023-08-22 Touro Graduate School of Technology <info.gst-at-touro.edu> Subject: [Hangout - NYLXS] ITP Workshop : Introduction to Chat GPT for
  19. 2023-08-22 Touro Graduate School of Technology <info.gst-at-touro.edu> Subject: [Hangout - NYLXS] Upcoming 3D Printing Workshop
  20. 2023-08-25 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Good Newws for the Moth of Elul
  21. 2023-08-27 Ruben Safir <ruben.safir-at-my.liu.edu> Subject: [Hangout - NYLXS] Fwd: Informational Message: Scholarships

NYLXS are Do'ers and the first step of Doing is Joining! Join NYLXS and make a difference in your community today!