<html><body><div style="color:#000; background-color:#fff; font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:10pt"><div id="yiv2968069828"><div><div style="color:#000;background-color:#fff;font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:10pt;"><div id="yiv2968069828"><div id="yiv2968069828yui_3_16_0_1_1401969515741_12379"><div id="yiv2968069828yui_3_16_0_1_1401969515741_12378" class="yiv2968069828yui_3_16_0_1_1401969515741_12373" style="color:#000;background-color:#fff;font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:10pt;">As mentioned by Justin Smith in his June 4 email, Rest the Net, I, for one, would find it useful to have an event on this topic. What I most need is a presentation on what, if any, security is provided by commonly used applications, tools and features and what additional security
is provided by additional tools like Tor. This might include some hands-on but would mostly be an overview of the security landscape and how apps interact with it. There is good information on the net but it doesn't answer many important questions particularly in the area of judging what combination of tools and features make sense.<br>Larry Wolfson <br><div id="yiv2968069828"><div><div class="yiv2968069828yui_3_16_0_1_1401969515741_10316 yiv2968069828yui_3_16_0_1_1401969515741_12374" style="color:#000;background-color:#fff;font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:10pt;"><div id="yiv2968069828yui_3_16_0_1_1401969515741_8447"></div></div></div></div></div></div></div></div></div></div></div></body></html>