[liberationtech] Stop promoting Skype

2013-06-07 Thread Jacob Appelbaum
Hi,

Top secret PRISM program claims direct access to servers of firms
including Google, Facebook and Apple and others.

Some of the world's largest internet brands are claimed to be part of
the information-sharing program since its introduction in 2007.
Microsoft – which is currently running an advertising campaign with the
slogan Your privacy is our priority – was the first, with collection
beginning in December 2007.

It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009;
YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined
the program in 2012. The program is continuing to expand, with other
providers due to come online.

Collectively, the companies cover the vast majority of online email,
search, video and communications networks.

Read about it here:

http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data

http://static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/6/6/1370553948414/Prism-001.jpg

http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/6/1370554726437/PRISM-slide-crop-001.jpg

The next person that recommends Skype to human rights activists is
completely discredited. Stop it and stop it now.

Ta ta,
Jake
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Eduardo Robles Elvira
Stop promoting google hangout and hotmail, yahoo, gmail, outlook.com... =)

On Fri, Jun 7, 2013 at 8:17 AM, Jacob Appelbaum ja...@appelbaum.net wrote:
 Hi,

 Top secret PRISM program claims direct access to servers of firms
 including Google, Facebook and Apple and others.

 Some of the world's largest internet brands are claimed to be part of
 the information-sharing program since its introduction in 2007.
 Microsoft – which is currently running an advertising campaign with the
 slogan Your privacy is our priority – was the first, with collection
 beginning in December 2007.

 It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009;
 YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined
 the program in 2012. The program is continuing to expand, with other
 providers due to come online.

 Collectively, the companies cover the vast majority of online email,
 search, video and communications networks.

 Read about it here:

 http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data

 http://static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/6/6/1370553948414/Prism-001.jpg

 http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/6/1370554726437/PRISM-slide-crop-001.jpg

 The next person that recommends Skype to human rights activists is
 completely discredited. Stop it and stop it now.

 Ta ta,
 Jake
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech



-- 
Eduardo
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] NSA, FBI, Verizon caught red handed spying on US citizens in the US

2013-06-07 Thread Seth David Schoen
Anthony Papillion writes:

 It's up to us to protect ourselves and, thankfully, we have the
 technology to do just that.

(As I suggested in a previous message, I strongly support greater use
of privacy-enhancing technologies, and finding tactics to increase the
demand for them.)

I think it's become clear that traffic and location data is much harder to
protect technologically than content.  Advocates for privacy-enhancing
technology sometimes don't appreciate or don't effectively communicate
the scope of this problem.  I've seen a lot of people in the last day
or so referring to the need to encrypt everything.

Encrypting everything is surely of tremendous benefit for privacy, but
in low-latency packet-switched networks, it has no effect at all on the
ability to perform traffic analysis.  In order to get networks that we
don't control to deliver our communications to the parties we choose, we
have to tell the intermediaries who run the networks where to send the
communications, affixing identifiers like IP addresses and PSTN numbers.
Then the network operators can record and disclose all of that
information.  And the implications of that information are significant,
especially when it includes or implies location data.

We just recently had a discussion here that touched on how difficult
it might be to make a mobile phone that doesn't allow location
tracking.  I think it's possible with a significant engineering
effort, but the easiest ways to design and deploy mobile communications
networks all automatically make users' locations trackable.

The best widely-used tool to defend against traffic analysis is Tor,
but Tor's developers readily concede that it has a lot of important
limitations and that there's no obvious path around many of them.
Two of these important limitations (not the only ones) are:

① Anonymization adds latency to communications.  Better anonymization
usually adds more latency.  Everywhere else, communications engineers
are struggling to take the latency out of people's communications.
At least in some systems, anonymity engineers are struggling to put
it in.

② Network adversaries can notice that things coming out of a system
correspond to things going in.

Here's one of many statements of these two issues as they relate to
systems like Tor:

   Furthermore, Onion Routing makes no attempt to stop timing attacks
   using traffic analysis at the network endpoints. They assume that
   the routing infrastructure is uniformly busy, thus making passive
   intra-network timing difficult. However, the network might not
   be statistically uniformly busy, and attackers can tell if two
   parties are communicating via increased traffic at their respective
   endpoints. This endpoint-linkable timing attack remains a difficulty
   for all low-latency networks.

http://www.freehaven.net/src/related-comm.thtml

These issues are less severe if people are using e-mail or (maybe
better yet) forum posting, over an encrypted channel to a popular
service that many people use.  But they're quite serious for voice
calls, video conferencing, and even instant messaging.

-- 
Seth Schoen  sch...@eff.org
Senior Staff Technologist   https://www.eff.org/
Electronic Frontier Foundation  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Nadim Kobeissi
STOP PROMOTING THE INTERNET

NK

On 2013-06-07, at 3:16 AM, Eduardo Robles Elvira edu...@gmail.com wrote:

 Stop promoting google hangout and hotmail, yahoo, gmail, outlook.com... =)
 
 On Fri, Jun 7, 2013 at 8:17 AM, Jacob Appelbaum ja...@appelbaum.net wrote:
 Hi,
 
 Top secret PRISM program claims direct access to servers of firms
 including Google, Facebook and Apple and others.
 
 Some of the world's largest internet brands are claimed to be part of
 the information-sharing program since its introduction in 2007.
 Microsoft – which is currently running an advertising campaign with the
 slogan Your privacy is our priority – was the first, with collection
 beginning in December 2007.
 
 It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009;
 YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined
 the program in 2012. The program is continuing to expand, with other
 providers due to come online.
 
 Collectively, the companies cover the vast majority of online email,
 search, video and communications networks.
 
 Read about it here:
 
 http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data
 
 http://static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/6/6/1370553948414/Prism-001.jpg
 
 http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/6/1370554726437/PRISM-slide-crop-001.jpg
 
 The next person that recommends Skype to human rights activists is
 completely discredited. Stop it and stop it now.
 
 Ta ta,
 Jake
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 
 -- 
 Eduardo
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Jens Christian Hillerup
On Fri, Jun 7, 2013 at 9:23 AM, Nadim Kobeissi na...@nadim.cc wrote:

 STOP PROMOTING THE INTERNET


Stop promoting 'murica. And help me test and develop my project
escapetools that is meant for taking out your data from services like
GMail and saving them in a way that can be used in infrastructure
coorporatives like fripost.org.

http://github.com/jchillerup/escapetools

JC

PS: This email was (sadly) brought to you all by GMail.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Top secret PRISM program claims direct access to servers of firms including Google, Facebook and Apple

2013-06-07 Thread Eugen Leitl

http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data

NSA taps in to internet giants' systems to mine user data, secret files
reveal

• Top secret PRISM program claims direct access to servers of firms including
Google, Facebook and Apple

• Companies deny any knowledge of program in operation since 2007

Glenn Greenwald and Ewen MacAskill

The Guardian, Thursday 6 June 2013 23.05 BST

A slide depicting the top-secret PRISM program

The National Security Agency has obtained direct access to the systems of
Google, Facebook, Apple and other US internet giants, according to a top
secret document obtained by the Guardian.

The NSA access is part of a previously undisclosed program called PRISM,
which allows officials to collect material including search history, the
content of emails, file transfers and live chats, the document says.

The Guardian has verified the authenticity of the document, a 41-slide
PowerPoint presentation – classified as top secret with no distribution to
foreign allies – which was apparently used to train intelligence operatives
on the capabilities of the program. The document claims collection directly
from the servers of major US service providers.

Although the presentation claims the program is run with the assistance of
the companies, all those who responded to a Guardian request for comment on
Thursday denied knowledge of any such program.

In a statement, Google said: Google cares deeply about the security of our
users' data. We disclose user data to government in accordance with the law,
and we review all such requests carefully. From time to time, people allege
that we have created a government 'back door' into our systems, but Google
does not have a back door for the government to access private user data.

Several senior tech executives insisted that they had no knowledge of PRISM
or of any similar scheme. They said they would never have been involved in
such a program. If they are doing this, they are doing it without our
knowledge, one said.

An Apple spokesman said it had never heard of PRISM.

The NSA access was enabled by changes to US surveillance law introduced under
President Bush and renewed under Obama in December 2012.


The program facilitates extensive, in-depth surveillance on live
communications and stored information. The law allows for the targeting of
any customers of participating firms who live outside the US, or those
Americans whose communications include people outside the US.

It also opens the possibility of communications made entirely within the US
being collected without warrants.

Disclosure of the PRISM program follows a leak to the Guardian on Wednesday
of a top-secret court order compelling telecoms provider Verizon to turn over
the telephone records of millions of US customers.

The participation of the internet companies in PRISM will add to the debate,
ignited by the Verizon revelation, about the scale of surveillance by the
intelligence services. Unlike the collection of those call records, this
surveillance can include the content of communications and not just the
metadata.

Some of the world's largest internet brands are claimed to be part of the
information-sharing program since its introduction in 2007. Microsoft – which
is currently running an advertising campaign with the slogan Your privacy is
our priority – was the first, with collection beginning in December 2007.

It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009;
YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the
program in 2012. The program is continuing to expand, with other providers
due to come online.

Collectively, the companies cover the vast majority of online email, search,
video and communications networks.



The extent and nature of the data collected from each company varies.

Companies are legally obliged to comply with requests for users'
communications under US law, but the PRISM program allows the intelligence
services direct access to the companies' servers. The NSA document notes the
operations have assistance of communications providers in the US.

The revelation also supports concerns raised by several US senators during
the renewal of the Fisa Amendments Act in December 2012, who warned about the
scale of surveillance the law might enable, and shortcomings in the
safeguards it introduces.

When the FAA was first enacted, defenders of the statute argued that a
significant check on abuse would be the NSA's inability to obtain electronic
communications without the consent of the telecom and internet companies that
control the data. But the PRISM program renders that consent unnecessary, as
it allows the agency to directly and unilaterally seize the communications
off the companies' servers.

A chart prepared by the NSA, contained within the top-secret document
obtained by the Guardian, underscores the breadth of the data it is able to
obtain: email, video and voice chat, videos, photos, 

Re: [liberationtech] NSA has direct access to tech giants' systems for user data, secret ppt reveals

2013-06-07 Thread katana
Hi,

 NSA just $20M of budget? The same NSA that is building a data center 
 (for processing what? =) for 869 million USD$ in Maryland?

From
http://www.democracynow.org/2012/4/20/exclusive_national_security_agency_whistleblower_william

WILLIAM BINNEY: Well, it was called Thin Thread. I mean, Thin Thread was
our—a test program that we set up to do that. By the way, I viewed it as
we never had enough data, OK? We never got enough. It was never enough
for us to work at, because I looked at velocity, variety and volume as
all positive things. Volume meant you got more about your target.
Velocity meant you got it faster. Variety meant you got more aspects.
These were all positive things. All we had to do was to devise a way to
use and utilize all of those inputs and be able to make sense of them,
which is what we did.

JUAN GONZALEZ: And when they didn’t use your system, they—the NSA
developed another or attempted to develop another system to do the same?

WILLIAM BINNEY: Well, that one failed. They didn’t produce anything with
that one.

AMY GOODMAN: And that one was called?

WILLIAM BINNEY: Trailblazer, yeah.

AMY GOODMAN: Trailblazer, and—

WILLIAM BINNEY: I called it—I called it five-year plan number one.
Five-year plan number two was Turbulence. Five-year plan number three is—

AMY GOODMAN: And Trailblazer cost how much money?

WILLIAM BINNEY: That was, I think, in my—my sense, was a little over $4
billion.

AMY GOODMAN: Four billion dollars.

WILLIAM BINNEY: Right.

AMY GOODMAN: But it was scuttled. It was done away with in 2006?

WILLIAM BINNEY: Yes, '05, I think it was. But yes, that's right. And we
developed our program with $3 million, roughly.

-- 
Katana

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Top secret PRISM program claims direct access to servers of firms including Google, Facebook and Apple

2013-06-07 Thread Michael Rogers
This law does not allow the targeting of any US citizen or of any person 
located within the United States.

Note the wording of this denial: the *target* of collection may not be a US 
citizen or a person located in the US. But if the *target* is, say, Al Qaeda 
and affiliated organisations, does the law prevent data about US citizens and 
persons located in the US from being collected and retained?

Cheers,
Michael


Eugen Leitl eu...@leitl.org wrote:


http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data

NSA taps in to internet giants' systems to mine user data, secret files
reveal

• Top secret PRISM program claims direct access to servers of firms including
Google, Facebook and Apple

• Companies deny any knowledge of program in operation since 2007

Glenn Greenwald and Ewen MacAskill

The Guardian, Thursday 6 June 2013 23.05 BST

A slide depicting the top-secret PRISM program

The National Security Agency has obtained direct access to the systems of
Google, Facebook, Apple and other US internet giants, according to a top
secret document obtained by the Guardian.

The NSA access is part of a previously undisclosed program called PRISM,
which allows officials to collect material including search history, the
content of emails, file transfers and live chats, the document says.

The Guardian has verified the authenticity of the document, a 41-slide
PowerPoint presentation – classified as top secret with no distribution to
foreign allies – which was apparently used to train intelligence operatives
on the capabilities of the program. The document claims collection directly
from the servers of major US service providers.

Although the presentation claims the program is run with the assistance of
the companies, all those who responded to a Guardian request for comment on
Thursday denied knowledge of any such program.

In a statement, Google said: Google cares deeply about the security of our
users' data. We disclose user data to government in accordance with the law,
and we review all such requests carefully. From time to time, people allege
that we have created a government 'back door' into our systems, but Google
does not have a back door for the government to access private user data.

Several senior tech executives insisted that they had no knowledge of PRISM
or of any similar scheme. They said they would never have been involved in
such a program. If they are doing this, they are doing it without our
knowledge, one said.

An Apple spokesman said it had never heard of PRISM.

The NSA access was enabled by changes to US surveillance law introduced under
President Bush and renewed under Obama in December 2012.


The program facilitates extensive, in-depth surveillance on live
communications and stored information. The law allows for the targeting of
any customers of participating firms who live outside the US, or those
Americans whose communications include people outside the US.

It also opens the possibility of communications made entirely within the US
being collected without warrants.

Disclosure of the PRISM program follows a leak to the Guardian on Wednesday
of a top-secret court order compelling telecoms provider Verizon to turn over
the telephone records of millions of US customers.

The participation of the internet companies in PRISM will add to the debate,
ignited by the Verizon revelation, about the scale of surveillance by the
intelligence services. Unlike the collection of those call records, this
surveillance can include the content of communications and not just the
metadata.

Some of the world's largest internet brands are claimed to be part of the
information-sharing program since its introduction in 2007. Microsoft – which
is currently running an advertising campaign with the slogan Your privacy is
our priority – was the first, with collection beginning in December 2007.

It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009;
YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the
program in 2012. The program is continuing to expand, with other providers
due to come online.

Collectively, the companies cover the vast majority of online email, search,
video and communications networks.



The extent and nature of the data collected from each company varies.

Companies are legally obliged to comply with requests for users'
communications under US law, but the PRISM program allows the intelligence
services direct access to the companies' servers. The NSA document notes the
operations have assistance of communications providers in the US.

The revelation also supports concerns raised by several US senators during
the renewal of the Fisa Amendments Act in December 2012, who warned about the
scale of surveillance the law might enable, and shortcomings in the
safeguards it introduces.

When the FAA was first enacted, defenders of the statute argued that a
significant check on abuse would be the NSA's inability to obtain electronic

Re: [liberationtech] NSA has direct access to tech giants' systems for user data, secret ppt reveals

2013-06-07 Thread Eugen Leitl
On Fri, Jun 07, 2013 at 12:32:10PM +1200, Andrew Lewis wrote:

 PRISM isn't really even that illegal, as long as they discard communications 
 considered to be American. 

So, as long as every TLA world wide does, and they all share the information,
everything is all right? Not so fast.

 The NSA has been listening to radio signals from all over the world for 
 years, from military bases strategically positioned to pickup radio signals 
 of interest, amongst other types of communication data. This is really just 
 the extension of similar ideas, to a new form of communications, the novel 
 part of the whole thing is that it leverages the fact that so many tech 
 companies are located in the US and that a ton of the internet backbone is 
 run through America.

Why does the NSA operate these dedicated fiber splice subs, you think?
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread liberationtech
On Fri, 07 Jun 2013 06:17:56 +
Jacob Appelbaum ja...@appelbaum.net wrote:

 The next person that recommends Skype to human rights activists is
 completely discredited. Stop it and stop it now.

s/Skype/third party services/

Fixed that for you.

-- 
Andrew
http://tpo.is/contact
pgp 0x6B4D6475
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] PRISM: NSA/FBI Internet data mining project

2013-06-07 Thread Eugen Leitl
- Forwarded message from Leo Bicknell bickn...@ufp.org -

Date: Thu, 6 Jun 2013 20:28:18 -0500
From: Leo Bicknell bickn...@ufp.org
To: jim deleskie deles...@gmail.com
Cc: goe...@anime.net, NANOG na...@nanog.org
Subject: Re: PRISM: NSA/FBI Internet data mining project
X-Mailer: Apple Mail (2.1508)


On Jun 6, 2013, at 8:06 PM, jim deleskie deles...@gmail.com wrote:

 Knowing its going on, knowing nothing online is secret != OK with it, it
 mealy understand the way things are.

While there's a whole political aspect of electing people who pass better laws, 
NANOG is not a political action forum.

However many of the people on NANOG are in positions to affect positive change 
at their respective employers.

- Implement HTTPS for all services.
- Implement PGP for e-mail.
- Implement S/MIME for e-mail.
- Build cloud services that encrypt on the client machine, using a key that is 
only kept on the client machine.
- Create better UI frameworks for managing keys and identities.
- Align data retention policies with the law.
- Scrutinize and reject defective government legal requests.
- When allowed by law, charge law enforcement for access to data.
- Lobby for more sane laws applied to your area of business.

The high tech industry has often made the government's job easy, not by 
intention but by laziness.  Keeping your customer's data secure should be a 
proud marketing point.

-- 
   Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/








- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Yishay Mor
If all this already exists, why isn’t everybody doing it? Well, simply
because there is *no integration at all among all those objects*. 

No. we don't need no software bundles. we don't need no sleek installers.
How long does it take me to set up a gmail account? facebook account?
flickr account? 20 seconds. how much does it cost me to set up? how much
does it cost me to maintain? (ok, skype is an exception, I do need to
install).

See that's the standard you're competing with. Most users don't own server
space, physical or virtual, and would not in a million years be convinced
to buy any.

Yishay

___
   http://www.yishaymor.org
() ascii ribbon campaign - against html e-mail
/\www.asciiribbon.org - against proprietary attachments


On 7 June 2013 09:47, M. Fioretti mfiore...@nexaima.net wrote:

 On Fri, Jun 07, 2013 09:16:32 AM +0200, Eduardo Robles Elvira wrote:
  Stop promoting google hangout and hotmail, yahoo, gmail, outlook.com...
 =)

 and start promoting their replacement via user-friendly bundling of
 Free Software that already exist and may run in a portable way on any
 cheap VPS:


 http://stop.zona-m.net/2013/01/the-alternatives-to-apple-facebook-c-already-exist-shall-we-package-them/

 --
 M. Fioretti http://mfioretti.com   http://stop.zona-m.net

 Your own civil rights and the quality of your life heavily depend on how
 software is used *around* you
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Top secret PRISM program claims direct access to servers of firms including Google, Facebook and Apple

2013-06-07 Thread David Golumbia
On Fri, Jun 7, 2013 at 6:52 AM, Michael Rogers mich...@briarproject.orgwrote:

 This law does not allow the targeting of any US citizen or of any person
 located within the United States.

 Note the wording of this denial: the *target* of collection may not be a
 US citizen or a person located in the US. But if the *target* is, say, Al
 Qaeda and affiliated organisations, does the law prevent data about US
 citizens and persons located in the US from being collected and retained?

 Cheers,
 Michael


And in case one draws any comfort at all from these apparent limitations:
there is no chance that intelligence community representatives would take
advantage of very technical details of the wording of laws to, e.g., share
information on the citizens of other countries with whom it has formal
information sharing agreements but whom it is not supposed to directly
surveil, right? Because that would be kind of dishonest, and we know the
intelligence community is first and foremost dedicated to being truthful in
public.

http://opencanada.org/features/the-think-tank/essays/canada-and-the-five-eyes-intelligence-community/
http://en.wikipedia.org/wiki/UKUSA_Agreement



-- 
David Golumbia
dgolum...@gmail.com
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Rich Kulawiec

These revelations constitute an existence proof that the number
of backdoors in various services is nonzero.

There's no reason to believe that this nonzero value is 1.

After, if the NSA could backdoor them (with or without their cooperation)
then why couldn't MI6?  Or Mossad?  Or some other entity, which may or
may not be a national intelligence service?

There's also no reason to believe that this practice is limited to the US.

---rsk
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Top secret PRISM program claims direct access to servers of firms including Google, Facebook and Apple

2013-06-07 Thread Andrew Clark
 Michael

Well I feel much better as Australian Citizen living out side of US.

Andrew Clark
andrewrcl...@mac.com



On 07/06/2013, at 10:32 PM, David Golumbia dgolum...@gmail.com wrote:

 
 
 
 On Fri, Jun 7, 2013 at 6:52 AM, Michael Rogers mich...@briarproject.org 
 wrote:
 This law does not allow the targeting of any US citizen or of any person 
 located within the United States.
 
 Note the wording of this denial: the *target* of collection may not be a US 
 citizen or a person located in the US. But if the *target* is, say, Al Qaeda 
 and affiliated organisations, does the law prevent data about US citizens and 
 persons located in the US from being collected and retained?
 
 Cheers,
 Michael
 
 
 And in case one draws any comfort at all from these apparent limitations: 
 there is no chance that intelligence community representatives would take 
 advantage of very technical details of the wording of laws to, e.g., share 
 information on the citizens of other countries with whom it has formal 
 information sharing agreements but whom it is not supposed to directly 
 surveil, right? Because that would be kind of dishonest, and we know the 
 intelligence community is first and foremost dedicated to being truthful in 
 public. 
 
 http://opencanada.org/features/the-think-tank/essays/canada-and-the-five-eyes-intelligence-community/
 http://en.wikipedia.org/wiki/UKUSA_Agreement
 
 
 
 -- 
 David Golumbia
 dgolum...@gmail.com
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Nadim Kobeissi
On 2013-06-07, at 8:31 AM, Yishay Mor yish...@gmail.com wrote:

 If all this already exists, why isn’t everybody doing it? Well, simply 
 because there is no integration at all among all those objects. 
 
 No. we don't need no software bundles. we don't need no sleek installers. 
 How long does it take me to set up a gmail account? facebook account? flickr 
 account? 20 seconds. how much does it cost me to set up? how much does it 
 cost me to maintain? (ok, skype is an exception, I do need to install).

Interestingly, we've been getting some emails since the NSA/PRISM story 
regarding people switching to Cryptocat.

It's a really encouraging and awesome trend to see people care about 
privacy-enabling technologies that are accessible and easy to use. To an 
extent, we've succeeded here because we've made it as easy as Facebook or Skype 
to have private conversations using free and open source software. So if 
someone is switching from Facebook or Skype to Cryptocat, it's a really 
positive thing.

The big challenge, though, so far is delineating the use cases and threat 
models. I have no problem seeing a lot of regular people flock to Cryptocat 
just for common-sense privacy concerns. But catering to that, and catering to 
activists/human rights workers in Mission Impossible situations, are two 
different stories. Concerning the latter, considering the outrageous nature of 
the PRISM story, I may have not been joking when I said STOP PROMOTING THE 
INTERNET to activists after all. :P

NK

 
 See that's the standard you're competing with. Most users don't own server 
 space, physical or virtual, and would not in a million years be convinced to 
 buy any.
 
 Yishay
 
 ___
http://www.yishaymor.org
 () ascii ribbon campaign - against html e-mail 
 /\www.asciiribbon.org - against proprietary attachments
 
 
 On 7 June 2013 09:47, M. Fioretti mfiore...@nexaima.net wrote:
 On Fri, Jun 07, 2013 09:16:32 AM +0200, Eduardo Robles Elvira wrote:
  Stop promoting google hangout and hotmail, yahoo, gmail, outlook.com... =)
 
 and start promoting their replacement via user-friendly bundling of
 Free Software that already exist and may run in a portable way on any
 cheap VPS:
 
 http://stop.zona-m.net/2013/01/the-alternatives-to-apple-facebook-c-already-exist-shall-we-package-them/
 
 --
 M. Fioretti http://mfioretti.com   http://stop.zona-m.net
 
 Your own civil rights and the quality of your life heavily depend on how
 software is used *around* you
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Michael Dahan
Apropos backdooring where do think the Palestinian authority gets its
bandwidth from/through under the Oslo Accords? Not to mention the large NSA
installation next door to the center of Israeli military intelligence...
On Jun 7, 2013 3:38 PM, Nadim Kobeissi na...@nadim.cc wrote:

 On 2013-06-07, at 8:31 AM, Yishay Mor yish...@gmail.com wrote:

  If all this already exists, why isn’t everybody doing it? Well, simply
 because there is no integration at all among all those objects. 
 
  No. we don't need no software bundles. we don't need no sleek installers.
  How long does it take me to set up a gmail account? facebook account?
 flickr account? 20 seconds. how much does it cost me to set up? how much
 does it cost me to maintain? (ok, skype is an exception, I do need to
 install).

 Interestingly, we've been getting some emails since the NSA/PRISM story
 regarding people switching to Cryptocat.

 It's a really encouraging and awesome trend to see people care about
 privacy-enabling technologies that are accessible and easy to use. To an
 extent, we've succeeded here because we've made it as easy as Facebook or
 Skype to have private conversations using free and open source software. So
 if someone is switching from Facebook or Skype to Cryptocat, it's a really
 positive thing.

 The big challenge, though, so far is delineating the use cases and threat
 models. I have no problem seeing a lot of regular people flock to Cryptocat
 just for common-sense privacy concerns. But catering to that, and catering
 to activists/human rights workers in Mission Impossible situations, are two
 different stories. Concerning the latter, considering the outrageous nature
 of the PRISM story, I may have not been joking when I said STOP PROMOTING
 THE INTERNET to activists after all. :P

 NK

 
  See that's the standard you're competing with. Most users don't own
 server space, physical or virtual, and would not in a million years be
 convinced to buy any.
 
  Yishay
 
  ___
 http://www.yishaymor.org
  () ascii ribbon campaign - against html e-mail
  /\www.asciiribbon.org - against proprietary attachments
 
 
  On 7 June 2013 09:47, M. Fioretti mfiore...@nexaima.net wrote:
  On Fri, Jun 07, 2013 09:16:32 AM +0200, Eduardo Robles Elvira wrote:
   Stop promoting google hangout and hotmail, yahoo, gmail,
 outlook.com... =)
 
  and start promoting their replacement via user-friendly bundling of
  Free Software that already exist and may run in a portable way on any
  cheap VPS:
 
 
 http://stop.zona-m.net/2013/01/the-alternatives-to-apple-facebook-c-already-exist-shall-we-package-them/
 
  --
  M. Fioretti http://mfioretti.com
 http://stop.zona-m.net
 
  Your own civil rights and the quality of your life heavily depend on how
  software is used *around* you
  --
  Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
  --
  Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Eugen Leitl
On Fri, Jun 07, 2013 at 08:32:36AM -0400, Rich Kulawiec wrote:
 
 These revelations constitute an existence proof that the number
 of backdoors in various services is nonzero.
 
 There's no reason to believe that this nonzero value is 1.

It is prudent to believe that the value is exactly one.
This particular disclosure is a merely another data point.
We didn't need it in order to assume the value is exactly one.
 
 After, if the NSA could backdoor them (with or without their cooperation)
 then why couldn't MI6?  Or Mossad?  Or some other entity, which may or

We expect that each intelligence agency attempts to tap and monitor
according to their abilities and budget. It's obvious that
UKUSA members are special in the extent of space they
monitor and the budget they command, and how many vassals 
they've browbeat into co-operation (e.g. almost the entire 
Europe is basically a puppet regime with no sovereignity
in key matters). 

 may not be a national intelligence service?

Why, we must assume that everything that goes over the
wire will be analyzed in realtime, and a fair fraction
(in some cases, all of it) will be stored indefinitely,
and data-mined. We also know that the CA trust model is broken,
so unless you roll your own certs all that traffic
is only a few computations away from being cleartext.
 
 There's also no reason to believe that this practice is limited to the US.

Of course not. It's funny how USians always think it's
everything always just about them.

There are 7 gigamonkeys on this planet. Tracking 7 Gentities
in realtime is not that hard of a job. Does anyone think that
intelligence services are not doing their job? 
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] NSA has direct access to tech giants' systems for user data, secret ppt reveals

2013-06-07 Thread Eugen Leitl
On Thu, Jun 06, 2013 at 09:23:03PM -0700, x z wrote:
 What surprised me is how Guardian and Washington Post cover this story.
 The Power Point slides looks laughable to me. Maybe I should interpret
 direct access to servers of firms as like when I'm typing this email I am
 also having *a direct access* to Gmail's servers.

It's a little more direct than that.
Approaches like http://en.wikipedia.org/wiki/Room_641A are
really rather expensive, so it makes sense to move the
intercept capabilities to the providers themselves,
on a need-to-know basis, and serve them with a gagging 
order. 

If you think this is a laughing matter, you have a pretty
strange sense of humor.
 
 This either a ploy by some pro-privacy extremist or a prank by somebody
 who's tired of these hyperbole privacy outcries.

You must realize that placating pabulum doesn't really fly
here, so I would reexamine why you are reading this list.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Rich Kulawiec
On Fri, Jun 07, 2013 at 02:48:58PM +0200, Eugen Leitl wrote:
 On Fri, Jun 07, 2013 at 08:32:36AM -0400, Rich Kulawiec wrote:
  
  These revelations constitute an existence proof that the number
  of backdoors in various services is nonzero.
  
  There's no reason to believe that this nonzero value is 1.
 
 It is prudent to believe that the value is exactly one.
 This particular disclosure is a merely another data point.
 We didn't need it in order to assume the value is exactly one.

I'm not following you -- maybe I need more coffee this morning,
but I don't understand the reasoning behind your statement.

Mine is something like this: if one day, the folks from the NSA showed
up at X's door with a van full of equipment and asked nicely if they
could please bring it in, then why wouldn't their counterparts in every
other country do the same to X's sites there?  And since X wants to do
business in those countries, why would it say no?

If on the other hand this was done by the NSA without X's knowledge,
then their counterparts in other countries could try that approach
as well.

So would you mind explaining yours?  (My apologies if it's completely
obvious and I'm just being dense.)

And a side point/adjunct to this: so far, I haven't noticed Amazon
or Rackspace or Softlayer or similar on these lists.  (Again, maybe
more coffee is badly needed.)  I can't believe for a moment that
the NSA overlooked any of the major cloud computing providers.

---rsk

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Why Metadata Matters

2013-06-07 Thread Griffin Boyce
Eugen Leitl eu...@leitl.org wrote:
 A ZByte facility (e.g. like the one in Utah) can store about
 10^10 years worth of audio (2 kByte/s with a modern codec),
 or about 1.4 year worth of audio for every human currently
 on the planet.

 So forget the metadata, of course they store it along
 with everything else.

  For me, it's less about Verizon as a specific example, and more
about the fact that all mobile carriers store this data.  In fact,
they frequently retain it for years, so if three years from now
someone subpoenas your ATT metadata, they have a realistic idea of
where you were and who you were with.  (Or at least that is the case
for most people).

  In the age of National Security Letters and other warrantless
warrants, it's even more concerning.

~Griffin
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Petter Ericson
You misunderstand. Signing up to these services is generally easy, and
there are a number of instances up and running for each. However, there
is as far as I know, no integrated service running an XMPP service, a
mail server, an OStatus instance, all connected and having the same
user database, reasonable connections between them etc etc.

It is certainly doable to install all of these, but currently it is
hard, in the sense that you need some rather in-depth knowledge to
properly glue everything together.

Making it easy to set up a server with a multitude of useful services
will not make each and every person set such a server up, but it may mean
that a much larger group of people _know_ someone who can set up such
a server.

Incidentally, I have been thinking, writing (one or two) blog posts on, but due
to time constraints not actually implementing or promoting such a project.

Best

/P

On 07 June, 2013 - Yishay Mor wrote:

 If all this already exists, why isn’t everybody doing it? Well, simply
 because there is *no integration at all among all those objects*. 
 
 No. we don't need no software bundles. we don't need no sleek installers.
 How long does it take me to set up a gmail account? facebook account?
 flickr account? 20 seconds. how much does it cost me to set up? how much
 does it cost me to maintain? (ok, skype is an exception, I do need to
 install).
 
 See that's the standard you're competing with. Most users don't own server
 space, physical or virtual, and would not in a million years be convinced
 to buy any.
 
 Yishay
 
 ___
http://www.yishaymor.org
 () ascii ribbon campaign - against html e-mail
 /\www.asciiribbon.org - against proprietary attachments
 
 
 On 7 June 2013 09:47, M. Fioretti mfiore...@nexaima.net wrote:
 
  On Fri, Jun 07, 2013 09:16:32 AM +0200, Eduardo Robles Elvira wrote:
   Stop promoting google hangout and hotmail, yahoo, gmail, outlook.com...
  =)
 
  and start promoting their replacement via user-friendly bundling of
  Free Software that already exist and may run in a portable way on any
  cheap VPS:
 
 
  http://stop.zona-m.net/2013/01/the-alternatives-to-apple-facebook-c-already-exist-shall-we-package-them/
 
  --
  M. Fioretti http://mfioretti.com   http://stop.zona-m.net
 
  Your own civil rights and the quality of your life heavily depend on how
  software is used *around* you
  --
  Too many emails? Unsubscribe, change to digest, or change password by
  emailing moderator at compa...@stanford.edu or changing your settings at
  https://mailman.stanford.edu/mailman/listinfo/liberationtech
 

 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech


-- 
Petter Ericson (pett...@acc.umu.se)
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Eugen Leitl
On Fri, Jun 07, 2013 at 09:15:32AM -0400, Rich Kulawiec wrote:

 Mine is something like this: if one day, the folks from the NSA showed
 up at X's door with a van full of equipment and asked nicely if they
 could please bring it in, then why wouldn't their counterparts in every
 other country do the same to X's sites there?  And since X wants to do
 business in those countries, why would it say no?

Why, I believe this is exactly how it goes down, your honor.
And UKUSA is effectively one compartment, and there are probably
looser co-operation programs existing in other countries.
 
 If on the other hand this was done by the NSA without X's knowledge,
 then their counterparts in other countries could try that approach
 as well.

I expect that they're collecting data everywhere they can,
some of which doesn't require cooperation (tapping submarine
fiber) and some requires partial cooperation (central tap
facilities at Tier 1 and 2) but also forcing major operators
under strict secrecy (need-to-know limited to few individuals,
some of them arguably also intelligence officers) and unmder
gagging orders so that officially disclosing the information would
bear severe penalties, and leaking would be risky since
the numbers of possible whistleblowers is very low.
 
 So would you mind explaining yours?  (My apologies if it's completely
 obvious and I'm just being dense.)

I doubt you are, we're probably in violent agreement without
realizing it.
 
 And a side point/adjunct to this: so far, I haven't noticed Amazon
 or Rackspace or Softlayer or similar on these lists.  (Again, maybe
 more coffee is badly needed.)  I can't believe for a moment that
 the NSA overlooked any of the major cloud computing providers.

I would also expect that anyone relevant would be on that list.

I would be very interested to know how the intercept and processing
is happening in so-called friendly countries, which do not have
the technical wherewithal and expertise to conduct the intercepts
themselves.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] PRISM: NSA/FBI Internet data mining project

2013-06-07 Thread Eugen Leitl
- Forwarded message from Mark Seiden m...@seiden.com -

Date: Thu, 6 Jun 2013 22:57:07 -0700
From: Mark Seiden m...@seiden.com
To: jamie rishaw j...@arpa.com
Cc: goe...@anime.net, NANOG na...@nanog.org
Subject: Re: PRISM: NSA/FBI Internet data mining project
X-Mailer: Apple Mail (2.1508)

On Jun 6, 2013, at 10:25 PM, jamie rishaw j...@arpa.com wrote:

 tinfoilhat
 Just wait until we find out dark and lit private fiber is getting vampired.
 /tinfoilhat
 

well, that's exactly and the only thing what would not surprise me, given the 
eff suit 
and mark klein's testimony about room 421a full of narus taps.   mark klein is 
an
utterly convincing and credible guy on this subject of tapping transit traffic.

but the ability to assemble intelligence out of taps on providers' internal 
connections 
would require reverse engineering the ever changing protocols of all of those 
providers.  
and at least at one of the providers named, where i worked on security and 
abuse, 
it was hard for us, ourselves, to quickly mash up data from various internal 
services 
and lines of business that were almost completely siloed  -- 
data typically wasn't exposed widely and stayed  within a particular 
server or data center absent a logged in session by the user.  

were these guys scraping the screens of non-ssl sessions of interest in real 
time?
with asymmetric routing, it's hard to reassemble both sides of a conversation, 
say
in IM.  one side might come in via a vip and the other side go out through the 
default
route, shortest path. only *on* a specific internal server might you see the 
entire 
conversation.  typically only the engineers who worked on that application would
log on or even know what to look for.

and also, only $20m/year?  in my experience, the govt cannot do anything like 
this 
addressing even a single provider for that little money.

and pretty much denials all around.   so at the moment, i don't believe it.  

(and i hope it's not true, or i might have to leave this industry in utter 
disgust
because i didn't notice this going on in about 8 years at that provider and it 
was
utterly contrary to the expressed culture.   

take up beekeeping, or alcohol, or something.).

 
 
 -- 
 Jamie Rishaw // .com.arpa@j - reverse it. ish.
 arpa / arpa labs



- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Secure tools for communications - Is there a wiki ..?

2013-06-07 Thread Robert Guerra

The frequent mention of tools for secure communications, leads me to ask - is 
there an updated wiki that this community (and perhaps others) can maintain. It 
serve as a resource for not only listing tools, but also a place to aggregate 
the analysis and comments from security experts

If such a list doesn't exist, then I would like to encourage such a resource to 
be setup.

regards

Robert
--
R. Guerra
Phone/Cell: +1 202-905-2081
Twitter: twitter.com/netfreedom 
Email: rgue...@privaterra.org

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread M. Fioretti
On Fri, Jun 07, 2013 13:31:07 PM +0100, Yishay Mor wrote:
 If all this already exists, why isn t everybody doing it? Well, simply 
 because
 there is no integration at all among all those objects. 
 
 No. we don't need no software bundles. we don't need no sleek installers. 
 How long does it take me to set up a gmail account? facebook account? flickr
 account? 20 seconds. how much does it cost me to set up? how much does it cost
 me to maintain? (ok, skype is an exception, I do need to install).
 
 See that's the standard you're competing with. Most users don't own server
 space, physical or virtual, and would not in a million years be convinced to
 buy any.

Yishay,

just out of curiosity: did you even bother to read what I actually
wrote? Like, you know, the parts about service businesses? Or the fact
that the proposal itself is about bundling existing software
**exactly** to make it a 20 seconds set up?


-- 
M. Fioretti http://mfioretti.com   http://stop.zona-m.net

Your own civil rights and the quality of your life heavily depend on how
software is used *around* you
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] NSA has direct access to tech giants' systems for user data, secret ppt reveals

2013-06-07 Thread R. Jason Cronk
I tend to agree with this. Here are some things that look fishy about 
this leak


 * The $20 million budget seems paltry. Nothing gets done in government
   for that small amount.
 * The Powerpoint is amateurish  (then again with no budget.)
 * Everybody implicated is denying it (though I suspect they would say
   the same if it were true)
 * The Guardian says it verified the authenticity of the presentation
   but it doesn't say how, nor does it appear they have any
   corroborating evidence.


Hopefully their will be some further investigation that will provide 
additional evidence about the program's existence.


Jason



On 6/7/2013 12:23 AM, x z wrote:
What surprised me is how Guardian and Washington Post cover this 
story. The Power Point slides looks laughable to me. Maybe I should 
interpret direct access to servers of firms as like when I'm typing 
this email I am also having /a direct access/ to Gmail's servers.


This either a ploy by some pro-privacy extremist or a prank by 
somebody who's tired of these hyperbole privacy outcries.




2013/6/6 Peter Eckersley peter.eckers...@gmail.com 
mailto:peter.eckers...@gmail.com


Of course, I was reading to fast and leaning to heavily on control+f.

Anyway, 20 million annually seems like a very low number by the
usual standards of efficiency in Department of Defense programs. 
But the NSA might already have a data storage, processing and

query architecture in place that is either not included in this
budget or only included on a marginal cost basis.


On 6 June 2013 16:45, Peter Eckersley peter.eckers...@gmail.com
mailto:peter.eckers...@gmail.com wrote:

Where did you get the $20m budget number from?  I can't find
it in any of the stories or attached materials.  But I could
be missing something.


On 6 June 2013 16:14, x z xhzh...@gmail.com
mailto:xhzh...@gmail.com wrote:

doesn't seem real to me.  especially the part *direct
access to servers* of firms ..., and with an annual
budget of measly $20m.


2013/6/6 Michael Carbone mich...@accessnow.org
mailto:mich...@accessnow.org

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Guardian:

http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data

WaPo:

http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story_1.html

some of the slides (haven't seen the full ppt drop):

http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/

Participating companies in chronological order:
Microsoft, Yahoo,
Google, Facebook, PalTalk, YouTube, Skype, AOL, Apple.
Dropbox
apparently next up.

- --
Michael Carbone
Manager of Tech Policy  Programs
Access | https://www.accessnow.org
mich...@accessnow.org mailto:mich...@accessnow.org |
PGP: 0x81B7A13E
PGP Fingerprint: 25EC 1D0F 2D44 C4F4 5BEF EF83 C471
AD94 81B7 A13E

-BEGIN PGP SIGNATURE-
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=NvtB
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or
change password by emailing moderator at
compa...@stanford.edu mailto:compa...@stanford.edu
or changing your settings at
https://mailman.stanford.edu/mailman/listinfo/liberationtech



--
Too many emails? Unsubscribe, change to digest, or change
password by emailing moderator at compa...@stanford.edu
mailto:compa...@stanford.edu or changing your settings
at
  

Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread R. Jason Cronk

Agreed

http://i.eatliver.com/2013/10627.jpg


Jason


On 6/7/2013 3:23 AM, Nadim Kobeissi wrote:

STOP PROMOTING THE INTERNET

NK

On 2013-06-07, at 3:16 AM, Eduardo Robles Elvira edu...@gmail.com wrote:


Stop promoting google hangout and hotmail, yahoo, gmail, outlook.com... =)

On Fri, Jun 7, 2013 at 8:17 AM, Jacob Appelbaum ja...@appelbaum.net wrote:

Hi,

Top secret PRISM program claims direct access to servers of firms
including Google, Facebook and Apple and others.

Some of the world's largest internet brands are claimed to be part of
the information-sharing program since its introduction in 2007.
Microsoft – which is currently running an advertising campaign with the
slogan Your privacy is our priority – was the first, with collection
beginning in December 2007.

It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009;
YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined
the program in 2012. The program is continuing to expand, with other
providers due to come online.

Collectively, the companies cover the vast majority of online email,
search, video and communications networks.

Read about it here:

http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data

http://static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/6/6/1370553948414/Prism-001.jpg

http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/6/1370554726437/PRISM-slide-crop-001.jpg

The next person that recommends Skype to human rights activists is
completely discredited. Stop it and stop it now.

Ta ta,
Jake
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech



--
Eduardo
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech




*R. Jason Cronk, Esq., CIPP/US*
/Privacy Engineering Consultant/, *Enterprivacy Consulting Group* 
enterprivacy.com


 * phone: (828) 4RJCESQ
 * twitter: @privacymaverick.com
 * blog: http://blog.privacymaverick.com

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Griffin Boyce
liberationt...@lewman.us wrote:
 Jacob Appelbaum ja...@appelbaum.net wrote:

 The next person that recommends Skype to human rights activists is
 completely discredited. Stop it and stop it now.

 s/Skype/third party services/

 Fixed that for you.

  I'll keep that in mind the next time someone from Tor promotes Riseup ;-)

  But seriously, average users need to have basic services that are
(unfortunately) run by third parties.  At a minimum, diversification
of services used.  If every activist uses Riseup or May First, those
services become just as high a priority for warrants as Gmail or
Hotmail.  If you have your own domain, that's awesome.  This is not a
realistic expectation for most people -- either because they lack the
knowledge to install and upkeep their hosting, class stratification,
or complete absence of time to do it.

  What would be fantastic is if more people who *did* have the
knowledge/money took the time to set up their own accounts on their
own domains.  And if you're a developer or an advanced user, help
others do it too!  It's far better to have a domain for your group of
friends than have everyone use riseup/gmail/etc.

  If you want gmail-like features, there are lots of open-source
avenues, like MailPile [1].

  I'm also going to go against the grain and say that most services
don't *need* to be integrated with each other.

~Griffin

[1] https://github.com/pagekite/Mailpile

-- 
Just another hacker in the City of Spies.
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de

My posts, while frequently amusing, are not representative of the
thoughts of my employer.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] NSA, FBI, Verizon caught red handed spying on US citizens in the US

2013-06-07 Thread Richard Brooks
On 06/07/2013 03:23 AM, Seth David Schoen wrote:

 The best widely-used tool to defend against traffic analysis is Tor,
 but Tor's developers readily concede that it has a lot of important
 limitations and that there's no obvious path around many of them.
 Two of these important limitations (not the only ones) are:
 
 ① Anonymization adds latency to communications.  Better anonymization
 usually adds more latency.  Everywhere else, communications engineers
 are struggling to take the latency out of people's communications.
 At least in some systems, anonymity engineers are struggling to put
 it in.
 
 ② Network adversaries can notice that things coming out of a system
 correspond to things going in.
 
 Here's one of many statements of these two issues as they relate to
 systems like Tor:
 
Furthermore, Onion Routing makes no attempt to stop timing attacks
using traffic analysis at the network endpoints. They assume that
the routing infrastructure is uniformly busy, thus making passive
intra-network timing difficult. However, the network might not
be statistically uniformly busy, and attackers can tell if two
parties are communicating via increased traffic at their respective
endpoints. This endpoint-linkable timing attack remains a difficulty
for all low-latency networks.
 
 http://www.freehaven.net/src/related-comm.thtml
 
 These issues are less severe if people are using e-mail or (maybe
 better yet) forum posting, over an encrypted channel to a popular
 service that many people use.  But they're quite serious for voice
 calls, video conferencing, and even instant messaging.
 
We were able to do our timing side-channel approach on Tor very
successfully on a private Tor instance in our lab. When we tried
it on the global net, we found the jitter inherent to Tor made
it practically impossible.

Have not tried it specifically on VOIP traffic, but the latency/jitter
seems to me to do a pretty good job of making timing attacks
unreliable for now.

-RRB
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread M. Fioretti
On Fri, Jun 07, 2013 10:18:25 AM -0400, Griffin Boyce wrote:

 average users need to have basic services that are
 (unfortunately) run by third parties.

The proposal in that post of mine that I already cited would also solve this.

It would be a way for non-geeks to get all their basic services
offered/managed by third parties, if you can't don't want to do it
yourself, but as ONE bundle (domain name included) that can be moved
in any moment from hosting provider to hosting provider without loss
of data/disruption of service, with two direct consequences:

- better resilience

- no way to get private data of X millions users by talking only to a
  handful of corporations, because those data would be scattered
  across many thousands of independently managed servers, worldwide.

BTW, since I'm getting offlist questions about this: in case you were
thinking what you want is the FreedomBox, NO, what I'm talking about
is NOT the FreedomBox. What I'm suggesting is compatible with the
FreedomBox, but it's something else, much more concrete. See the
details in the comments to that same post.

  Marco
-- 

M. Fioretti http://mfioretti.com   http://stop.zona-m.net

Your own civil rights and the quality of your life heavily depend on how
software is used *around* you
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Eugen Leitl
On Fri, Jun 07, 2013 at 10:18:25AM -0400, Griffin Boyce wrote:

   I'll keep that in mind the next time someone from Tor promotes Riseup ;-)
 
   But seriously, average users need to have basic services that are
 (unfortunately) run by third parties.  At a minimum, diversification
 of services used.  If every activist uses Riseup or May First, those
 services become just as high a priority for warrants as Gmail or
 Hotmail.  If you have your own domain, that's awesome.  This is not a

If your system is tied to a DNS FQDN resolution for operability, 
your system should not be tied to a DNS FQDN resolution. 

You'll notice that systems like Tor, i2p, Bitmessage or
cjdns all do not rely on DNS resolution (which is centralist,
seizable, a source of potential leaks, etc). 

 realistic expectation for most people -- either because they lack the
 knowledge to install and upkeep their hosting, class stratification,
 or complete absence of time to do it.

This is exactly what the Freedombox project is trying to address.
 
   What would be fantastic is if more people who *did* have the
 knowledge/money took the time to set up their own accounts on their
 own domains.  And if you're a developer or an advanced user, help
 others do it too!  It's far better to have a domain for your group of
 friends than have everyone use riseup/gmail/etc.
 
   If you want gmail-like features, there are lots of open-source
 avenues, like MailPile [1].
 
   I'm also going to go against the grain and say that most services
 don't *need* to be integrated with each other.
 
 ~Griffin
 
 [1] https://github.com/pagekite/Mailpile
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] James Clapper (Director of USA National Intelligence) said in a statement

2013-06-07 Thread michael gurstein
James Clapper  (Director of USA National Intelligence) said in a statement,
per USA Today--the program (PRISM) has clear limits: It cannot be used to
intentionally target any US citizen, any other US person, or anyone located
within the United States.

Reassuring I guess, unless you don't happen to be among the 6.7 billion or
so who don't happen to fall within those categories.

M



--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Eugen Leitl
On Fri, Jun 07, 2013 at 04:28:31PM +0200, M. Fioretti wrote:

 BTW, since I'm getting offlist questions about this: in case you were
 thinking what you want is the FreedomBox, NO, what I'm talking about
 is NOT the FreedomBox. What I'm suggesting is compatible with the
 FreedomBox, but it's something else, much more concrete. See the
 details in the comments to that same post.

Your model of what FBX is trying to achieve is faulty.

I suggest you connect with the community at 
http://lists.alioth.debian.org/mailman/listinfo/freedombox-discuss
and see how you can contribute.

As to much more concrete, there's the 0.1 image out

http://freedomboxfoundation.org/

I am pleased to announce our first FreedomBox software release. The FreedomBox 
0.1 image is available here (.torrent) (sha512sum: 
867f5bf462102daef82a34165017b9e67ed8e09116fe46edd67730541bbfb731083850ab5e28ee40bdbc5054cb64e4d0e46a201797f27e0b8f0d2881ef083b40).

This 0.1 version is primarily a developer release, which means that it focuses 
on architecture and infrastructure rather than finish work. The exception to 
this is privoxy-freedombox, the web proxy discussed in previous updates, which 
people can begin using right now to make their web browsing more secure and 
private and which will very soon be available on non-FreedomBox systems. More 
information on that tool at the end of this post.

What have we accomplished? This first release completes a number of important 
milestones for the project.

Full hardware support in Debian A big part of the vision for the FreedomBox 
project revolves around the Boxs, tiny plug servers that are capable of 
running full size computing loads cheaply and with little use of electricity. 
In many respects these are wireless routers given the brains of a smart phone. 
If you want to change the software on a router or smart phone today you 
normally need to worry about bootloader images, custom roms, and a whole 
collection of specialized build and install tools. We wanted to the FreedomBox 
to move beyond this fragmented environment and, with the help of some embedded 
device experts, we have managed to make our development hardware into a fully 
supported Debian platform. That means that anyone with a device can install 
Debian on it just like a laptop or desktop computer. This support is very 
important for ensuring that the work we do on the FreedomBox is as portable and 
reusable as possible.

Basic software tools selected There is a lot of great free software out there 
to choose from and we put a lot of thought into which elements would be 
included in our basic tool kit. This includes the user interface system 
plinth that I outlined in a recent kickstarter update as well as basic 
cryptography tools like gpg and a one named monkeysphere that leverages gpg 
as an authentication tool. All of these are now bundled together and installed 
on the release image. This common working environment will simplify development 
going forward.

Box-to-box communication design Some goals of the FreedomBox can be 
accomplished with one user and one FreedomBox but many, like helping someone 
route around repressive government firewalls, will require groups of people and 
groups of boxes working together. One of our greatest architectural challenges 
has been finding a way for boxes to communicate securely without so slowing 
down or breaking network access as to make the system unpleasant to use. We 
have now outlined and built the first version of our proposed solution: 
Freedom-buddy. Freedom-buddy uses the world class TOR network so that boxes can 
find each other regardless of location or restrictive firewall and then allows 
the boxes to negotiate secure direct connections to each other for actually 
sending large or time sensitive data. We believe this blended approach will be 
most effective at improving the security and usability of personal-server 
communications and all the services we plan to build into those servers.

Web cleaning Our first service, a piece of software you can use today to start 
making your web browsing more secure and private, is called 
privoxy-freedombox. This software combines the functionality of the Adblock 
Plus ad blocker, the Easy Privacy filtering list, and the (HTTPS 
Everywhere](https://www.eff.org/https-everywhere) website redirection plugin 
into a single piece of software to run on your FreedomBox. Combining these 
different plugins into software for your FreedomBox means that you can use them 
with almost any browser or mobile device using a standard web proxy connection. 
Because of our focus on building the FreedomBox as part of Debian this software 
will soon be available to anyone running a Debian system regardless of whether 
you are using our target DreamPlug hardware, a laptop, or a large rack server 
somewhere. As you read this packages should already be available in the 
Raspbian repositories, which is the optimized version of Debian used on the 
Raspberry P
 i 

[liberationtech] Torservers.net: Professional Global Tor infrastructure

2013-06-07 Thread Moritz Bartl
Hi,

I think the timing is right to inform libtech about the development of
Torservers.net. What started as a German non-profit has now grown into a
network of non-profit organizations in several countries. All member
organizations benefit from tight collaboration and knowledge exchange
about running crucial Tor infrastructure (mostly Tor exits and Tor
bridges), whereas the diversity of operators helps the stability and
anonymity of the whole network. The current members are listed at
https://www.torservers.net/partners.html .

My goal is to acquire funding from various sources, and oversee the
distribution and intelligent use of it.  If you hear about potential
grants we can apply to, for example to ramp up additional hundreds of
bridges and Tor relay bandwidth, I am more than happy to hear about it.

You are also invited as an individual to donate to the Torservers.net
umbrella, or to one of our member organizations directly:

https://www.torservers.net/donate.html

Within Europe, your donations to Torservers.net are tax deductible. In
the USA, you can donate to our partner NoiseTor, a registered 501c3, for
these purposes.

If your organization wants to join Torservers as a partner, or become an
official sponsor of one of our relays, contact me.

-- 
Moritz Bartl
https://www.torservers.net/
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread M. Fioretti
On Fri, Jun 07, 2013 16:45:53 PM +0200, Eugen Leitl wrote:
 On Fri, Jun 07, 2013 at 04:28:31PM +0200, M. Fioretti wrote:
 
  BTW, since I'm getting offlist questions about this: in case you were
  thinking what you want is the FreedomBox, NO, what I'm talking about
  is NOT the FreedomBox. What I'm suggesting is compatible with the
  FreedomBox, but it's something else, much more concrete. See the
  details in the comments to that same post.
 
 Your model of what FBX is trying to achieve is faulty.

(what follows, with the exception of the last paragraph I added right now, is 
the answer I had just sent to Eugen when he pointed out the same thing off list)

it's the model that Moglen was announcing around with Diaspora in
2010.

 FBX is not about hardware, but about a number of FOSS (Debian)
 packages

see above.

- it is a fact that this is the first time somebody points out this
  difference so clearly. Nobody, including members of the
  debian/software Freedombox ever pointed this out to me (that there
  was, that is, a software freedombox separated by Moglen's
  hw/project). Even if I've been posting for months on twitter, lists,
  etc.. that link every time it was on topic.

- I'm almost sure I never came across that project myself earlier, in
  spite of:
  - me reading FOSS-related feeds daily for a living
  - having already presented my idea on several other mailing lists,
forums, etc (INCLUDING the one on which you saw the link today...)

Even the people who commented on my blog, they knew nothing of this
other FreedomBox.  Except, indirectly Hans, who said it in such a
vague form that back then I didn't realize at all what you just told
me.

Ah, well. Now: what I'm suggesting in my posts is equivalent to the
Leaving the Cloud part of that project

http://wiki.debian.org/FreedomBox/LeavingTheCloud

with the important difference that in my own mind it's a bundle you
could/should be able to install on any Gnu/Linux system. This is
essential to make it popular. Even, say, independent hosting providers
who run Centos or whatever, should really be able to offer the bundle
as a managed service on their CURRENT systems, to capture as many
users as possible. When they have it, they can always migrate later to
a fully self-managed debian-based box.

I have two deadlines this week, and another the next one.  I see
you've subscribed to the debian freedombox list. You're welcome to
forward this email to that list, to gather feedback. If there is any,
I'll subscribe and join the discussion later.

Thanks,
Marco

ADDITION:

 As to much more concrete, there's the 0.1 image out
 ...
 This 0.1 version is primarily a developer release, which means that
 it focuses on architecture and infrastructure rather than finish
 work.

this, that is the timetable and priorities may be the main difference
between my proposal and the debian freedombox. I am suggesting
something that may be used outside debian, on any distribution, for
the reasons explained above.

Later,
Marco
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread micah
Griffin Boyce griffinbo...@gmail.com writes:

 liberationt...@lewman.us wrote:
 Jacob Appelbaum ja...@appelbaum.net wrote:

 The next person that recommends Skype to human rights activists is
 completely discredited. Stop it and stop it now.

 s/Skype/third party services/

 Fixed that for you.

   I'll keep that in mind the next time someone from Tor promotes Riseup ;-)

What about when someone from Riseup promotes Riseup services? :o

   But seriously, average users need to have basic services that are
 (unfortunately) run by third parties.  At a minimum, diversification
 of services used.  If every activist uses Riseup or May First, those
 services become just as high a priority for warrants as Gmail or
 Hotmail.  

But seriously, riseup has always wanted more people to do what we do,
not to become more a more centralized data silo. I spent many years
being a documentation activist to encourage others by walking them how
we did it. We've switched our strategy a little bit now that we are able
to document our infrastructure in code and can collaborate with others
in doing so. 

It only has been recent that companies such as google and twitter have
been doing something more interesting than just handing over things when
the police ask, that was nice to see, we felt very alone out
there... but now I'm not sure what to think when I see those companies
involved in the dragnet, I guess we feel alone again because I didn't
notice Riseup or Mayfirst's logo in that Prism powerpoint!

micah
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] NSA has direct access to tech giants' systems for user data, secret ppt reveals

2013-06-07 Thread Michael Carbone
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Well the Director of National Intelligence James Clapper has defended
the program, not denied it:
http://www.bbc.co.uk/news/world-us-canada-22809541
http://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/869-dni-statement-on-activities-authorized-under-section-702-of-fisa

And UK has access:
http://www.guardian.co.uk/technology/2013/jun/07/uk-gathering-secret-intelligence-nsa-prism

Most likely Australia, NZ, and Canada have as well, per:
https://en.wikipedia.org/wiki/UKUSA_Agreement

Michael

On 06/07/2013 10:13 AM, R. Jason Cronk wrote:
 I tend to agree with this. Here are some things that look fishy
 about this leak
 
 * The $20 million budget seems paltry. Nothing gets done in
 government for that small amount. * The Powerpoint is amateurish
 (then again with no budget.) * Everybody implicated is denying
 it (though I suspect they would say the same if it were true) * The
 Guardian says it verified the authenticity of the presentation but
 it doesn't say how, nor does it appear they have any corroborating
 evidence.
 
 
 Hopefully their will be some further investigation that will
 provide additional evidence about the program's existence.
 
 Jason
 
 
 
 On 6/7/2013 12:23 AM, x z wrote:
 What surprised me is how Guardian and Washington Post cover this 
 story. The Power Point slides looks laughable to me. Maybe I
 should interpret direct access to servers of firms as like when
 I'm typing this email I am also having /a direct access/ to
 Gmail's servers.
 
 This either a ploy by some pro-privacy extremist or a prank by 
 somebody who's tired of these hyperbole privacy outcries.
 
 
 
 2013/6/6 Peter Eckersley peter.eckers...@gmail.com 
 mailto:peter.eckers...@gmail.com
 
 Of course, I was reading to fast and leaning to heavily on
 control+f.
 
 Anyway, 20 million annually seems like a very low number by the 
 usual standards of efficiency in Department of Defense programs.
  But the NSA might already have a data storage, processing and 
 query architecture in place that is either not included in this 
 budget or only included on a marginal cost basis.
 
 
 On 6 June 2013 16:45, Peter Eckersley peter.eckers...@gmail.com 
 mailto:peter.eckers...@gmail.com wrote:
 
 Where did you get the $20m budget number from?  I can't find it
 in any of the stories or attached materials.  But I could be
 missing something.
 
 
 On 6 June 2013 16:14, x z xhzh...@gmail.com 
 mailto:xhzh...@gmail.com wrote:
 
 doesn't seem real to me.  especially the part *direct access to
 servers* of firms ..., and with an annual budget of measly
 $20m.
 
 
 2013/6/6 Michael Carbone mich...@accessnow.org 
 mailto:mich...@accessnow.org
 
 Guardian: 
 http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data

  WaPo: 
 http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story_1.html

  some of the slides (haven't seen the full ppt drop): 
 http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/

  Participating companies in chronological order: Microsoft, Yahoo, 
 Google, Facebook, PalTalk, YouTube, Skype, AOL, Apple. Dropbox 
 apparently next up.
 
 -- Too many emails? Unsubscribe, change to digest, or change
 password by emailing moderator at compa...@stanford.edu
 mailto:compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 
 -- Too many emails? Unsubscribe, change to digest, or change 
 password by emailing moderator at compa...@stanford.edu 
 mailto:compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 
 
 -- Peter
 
 
 
 
 -- Peter -- Too many emails? Unsubscribe, change to digest, or
 change password by emailing moderator at compa...@stanford.edu 
 mailto:compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 
 
 -- Too many emails? Unsubscribe, change to digest, or change
 password by emailing moderator at compa...@stanford.edu or
 changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 *R. Jason Cronk, Esq., CIPP/US* /Privacy Engineering Consultant/,
 *Enterprivacy Consulting Group* enterprivacy.com
 
 * phone: (828) 4RJCESQ * twitter: @privacymaverick.com * blog:
 http://blog.privacymaverick.com
 
 
 
 -- Too many emails? Unsubscribe, change to digest, or change
 password by emailing moderator at compa...@stanford.edu or changing
 your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 

- -- 
Michael Carbone
Manager of Tech Policy  Programs
Access | https://www.accessnow.org
mich...@accessnow.org | PGP: 0x81B7A13E
PGP Fingerprint: 25EC 1D0F 2D44 C4F4 5BEF EF83 C471 AD94 81B7 A13E

-BEGIN PGP SIGNATURE-


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/07/2013 03:23 AM, Nadim Kobeissi wrote:
 STOP PROMOTING THE INTERNET

Internet?  I've been posting to this mailing list with a bottle of
ink, a hamster, and a tarot deck!

- -- 
The Doctor [412/724/301/703] [ZS]
Developer, Project Byzantium: http://project-byzantium.org/

PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F  DD89 3BD8 FF2B 807B 17C1
WWW: https://drwho.virtadpt.net/

Rhythm compensates.

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlGyCxsACgkQO9j/K4B7F8E2IACgjBEiuN3wtnfO1SksTZANMtlI
in8AoMbSPww6yR4ERSS9/SDRZwi0shdn
=Vcy9
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Collusion Alleged between HP and Iran (reflets.info)

2013-06-07 Thread Troy Etulain
See: *Hewlett Packard, transparency and the brand valuation
bubble*http://reflets.info/hewlett-packard-transparency-and-the-brand-valuation-bubble/

*Paris – june 7th 2013 -* Last tuesday, as part of an ongoing
investigation exploring internet censorship and monitoring in Iran and in
Syria, Reflets.info uncovered Hewlett Packard’s collaboration with
TCIhttp://reflets.info/zte-et-hp-unis-pour-un-halalternet-au-pays-des-mollahs/,
Iran’s state-own ISP – controling all Iranian internet traffic -, in order
to update its filtering and surveillance capabilities, paired with Chinese
ZTE appliances...

Could Iran have done this without HP's knowledge, using this equipment? Is
this really a collaboration smoking gun?

I don't understand the code presented as evidence, but the presentation of
the presence of application layer content filtering and application
specific packet filter (HEV) (see the ) on the routers doesn't seem to
fall fall short of proving active participation of HP itself (especially if
the equipment was procured from a 3rd country).

Also the article's sensationalism casts doubts on the aptitude of its
writers. Take the quote (translated by Google translate) zxss10b200 is a
rather beautiful beast that promises love joy and eternal bliss to the
Mullah thanks to features that make dream (blacklists, QoS, Web caching.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] PRISM: NSA/FBI Internet data mining project

2013-06-07 Thread Eugen Leitl
- Forwarded message from Matthew Petach mpet...@netflight.com -

Date: Fri, 7 Jun 2013 09:32:53 -0700
From: Matthew Petach mpet...@netflight.com
Cc: NANOG na...@nanog.org
Subject: Re: PRISM: NSA/FBI Internet data mining project

On Thu, Jun 6, 2013 at 5:04 PM, Matthew Petach mpet...@netflight.comwrote:



 On Thu, Jun 6, 2013 at 4:35 PM, Jay Ashworth j...@baylink.com wrote:

 Has fingers directly in servers of top Internet content companies,
 dates to 2007.  Happily, none of the companies listed are transport
 networks:


 http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html

 Cheers,
 -- jra
 --
 Jay R. Ashworth  Baylink
 j...@baylink.com
 Designer The Things I Think   RFC
 2100
 Ashworth  Associates http://baylink.pitas.com 2000 Land
 Rover DII
 St Petersburg FL USA   #natog  +1 727
 647 1274



 I've always just assumed that if it's in electronic form,
 someone else is either reading it now, has already read
 it, or will read it as soon as I walk away from the screen.

 Much less stress in life that way.  ^_^

 Matt



When I posted this yesterday, I was speaking somewhat
tongue-in-cheek, because we hadn't yet made a formal
statement to the press.  Now that we've made our official
reply, I can echo it, and note that whatever fluffed up
powerpoint was passed around to the washington post,
it does not reflect reality.  There are no optical taps in
our datacenters funneling information out, there are no
sooper-seekret backdoors in the software that funnel
information to the government.  As our formal reply
stated: Yahoo does not provide the government with
direct access to its servers, systems, or network.
I believe the other major players supposedly listed
in the document have released similar statements,
all indicating a similar lack of super-cheap government
listening capabilities.

Speaking just for myself, and if you quote me on this
as speaking on anyone else's behalf, you're a complete
fool, if the government was able to build infrastructure
that could listen to all the traffic from a major provider
for a fraction of what it costs them to handle that traffic
in the first place, I'd be truly amazed--and I'd probably
wonder why the company didn't outsource their infrastruture
to the government, if they can build and run it so much
more cheaply than the commercial providers.  ;P
7 companies were listed; if we assume the
burden was split roughly evenly between them, that's
20M/7, about $2.85M per company per year to tap in,
or about $238,000/month per company listed, to
supposedly snoop on hundreds of gigs per second
of data.  Two ways to handle it: tap in, and funnel
copies of all traffic back to distant monitoring posts,
or have local servers digesting and filtering, just
extracting the few nuggets they want, and sending
just those back.

Let's take the first case; doing optical taps, or other
form of direct traffic mirroring, carrying it untouched
offsite to process; that's going to mean the ability to
siphon off hundreds of Gbps per datacenter and carry
it offsite for $238k/month; let's figure a major player
has data split across at least 3 datacenters, so about
$75K/month per datacenter to carry say 300Gbps of
traffic.  It's pretty clearly going to have to be DWDM
on dark fiber at that traffic volume; most recent
quotes I've seen for dark fiber put it at $325/mile
for already-laid-in-ground (new builds are considerably
more, of course).  If we figure the three datacenters
are split around just the US, on average you're going
to need to run about 1500 miles to reach their central
listening post; that's $49K/month just to carry the
bitstream, which leaves you just about $25K/month
to run the servers to digest that data; at 5c/kwhr, a
typical server pulling 300 watts is gonna cost you $11/month
to run; let's assume each server can process 2Gbps of
traffic, constantly; 150 servers for the stream of 300Gbps
means we're down to $22K for the rest of our support
costs; figure two sysadmins getting paid $10k/month
to run the servers (120k annual salary), and you've got
just $2k for GA overhead.

That's a heck of an efficient operation they'd have to be
running to listen in on all the traffic for the supposed
budget number claimed.

I'm late for work; I'll follow up with a runthrough of the
other model, doing on-site digestion and processing
later, but I think you can see the point--it's not realistic
to think they can handle the volumes of data being
claimed at the price numbers listed.  If they could,
the major providers would already be doing it for
much cheaper than they are today.  I mean, the
Utah datacenter they're building is costing them
$2B to build; does anyone really think if they're
overpaying that much for datacenter space, they
could really snoop on 

Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread katana
Hi,

 See that's the standard you're competing with. Most users don't own
 server space, physical or virtual, and would not in a million years
 be convinced to buy any.

and if you have your own server (not at home), they can go after you
with legal assistence regimes like in the cybercrime convention (Art. 19
and 32)* or informal deals with your hosting provider or like UKUSA. Do
you or anybody really think, that a normal, sold server in a remote
location protect you, if you are a target? Only in a locations outside
these eg. all legal regimes. I believe, that a broad adoption of a 2nd
infrastructure/layer as with I2P, Freenet or Tor is more needed as the
usual user recognize... perhaps now ;)

* http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm

-- 
Katana
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] PRISM: NSA/FBI Internet data mining project

2013-06-07 Thread michael gurstein
So what if it was a one character typo? m substituted for b... happens
all the time in these kinds of presentations...

M

-Original Message-
From: liberationtech-boun...@lists.stanford.edu
[mailto:liberationtech-boun...@lists.stanford.edu] On Behalf Of Eugen Leitl
Sent: Friday, June 07, 2013 12:42 PM
To: Liberation Technologies; cypherpu...@al-qaeda.net; i...@postbiota.org;
zs-...@googlegroups.com
Subject: Re: [liberationtech] PRISM: NSA/FBI Internet data mining project

- Forwarded message from Matthew Petach mpet...@netflight.com -

Date: Fri, 7 Jun 2013 09:32:53 -0700
From: Matthew Petach mpet...@netflight.com
Cc: NANOG na...@nanog.org
Subject: Re: PRISM: NSA/FBI Internet data mining project

On Thu, Jun 6, 2013 at 5:04 PM, Matthew Petach mpet...@netflight.comwrote:



 On Thu, Jun 6, 2013 at 4:35 PM, Jay Ashworth j...@baylink.com wrote:

 Has fingers directly in servers of top Internet content companies, 
 dates to 2007.  Happily, none of the companies listed are transport
 networks:


 http://www.washingtonpost.com/investigations/us-intelligence-mining-d
 ata-from-nine-us-internet-companies-in-broad-secret-program/2013/06/0
 6/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html

 Cheers,
 -- jra
 --
 Jay R. Ashworth  Baylink
 j...@baylink.com
 Designer The Things I Think   RFC
 2100
 Ashworth  Associates http://baylink.pitas.com 2000 Land
 Rover DII
 St Petersburg FL USA   #natog  +1 727
 647 1274



 I've always just assumed that if it's in electronic form, someone else 
 is either reading it now, has already read it, or will read it as soon 
 as I walk away from the screen.

 Much less stress in life that way.  ^_^

 Matt



When I posted this yesterday, I was speaking somewhat tongue-in-cheek,
because we hadn't yet made a formal statement to the press.  Now that we've
made our official reply, I can echo it, and note that whatever fluffed up
powerpoint was passed around to the washington post, it does not reflect
reality.  There are no optical taps in our datacenters funneling information
out, there are no sooper-seekret backdoors in the software that funnel
information to the government.  As our formal reply
stated: Yahoo does not provide the government with direct access to its
servers, systems, or network.
I believe the other major players supposedly listed in the document have
released similar statements, all indicating a similar lack of super-cheap
government listening capabilities.

Speaking just for myself, and if you quote me on this as speaking on anyone
else's behalf, you're a complete fool, if the government was able to build
infrastructure that could listen to all the traffic from a major provider
for a fraction of what it costs them to handle that traffic in the first
place, I'd be truly amazed--and I'd probably wonder why the company didn't
outsource their infrastruture to the government, if they can build and run
it so much more cheaply than the commercial providers.  ;P
7 companies were listed; if we assume the burden was split roughly evenly
between them, that's 20M/7, about $2.85M per company per year to tap in, or
about $238,000/month per company listed, to supposedly snoop on hundreds of
gigs per second of data.  Two ways to handle it: tap in, and funnel copies
of all traffic back to distant monitoring posts, or have local servers
digesting and filtering, just extracting the few nuggets they want, and
sending just those back.

Let's take the first case; doing optical taps, or other form of direct
traffic mirroring, carrying it untouched offsite to process; that's going to
mean the ability to siphon off hundreds of Gbps per datacenter and carry it
offsite for $238k/month; let's figure a major player has data split across
at least 3 datacenters, so about $75K/month per datacenter to carry say
300Gbps of traffic.  It's pretty clearly going to have to be DWDM on dark
fiber at that traffic volume; most recent quotes I've seen for dark fiber
put it at $325/mile for already-laid-in-ground (new builds are considerably
more, of course).  If we figure the three datacenters are split around just
the US, on average you're going to need to run about 1500 miles to reach
their central listening post; that's $49K/month just to carry the bitstream,
which leaves you just about $25K/month to run the servers to digest that
data; at 5c/kwhr, a typical server pulling 300 watts is gonna cost you
$11/month to run; let's assume each server can process 2Gbps of traffic,
constantly; 150 servers for the stream of 300Gbps means we're down to $22K
for the rest of our support costs; figure two sysadmins getting paid
$10k/month to run the servers (120k annual salary), and you've got just $2k
for GA overhead.

That's a heck of an efficient operation they'd have to be running to listen
in on all the traffic for the supposed budget number claimed.

I'm late for work; I'll follow up with a runthrough of 

Re: [liberationtech] PRISM: NSA/FBI Internet data mining project

2013-06-07 Thread Michael Rogers
 Speaking just for myself, and if you quote me on this as speaking on anyone 
 else's behalf, you're a complete fool, if the government was able to build 
 infrastructure that could listen to all the traffic from a major provider for 
 a fraction of what it costs them to handle that traffic in the first place, 
 I'd be truly amazed--and I'd probably wonder why the company didn't outsource 
 their infrastruture
to the government, if they can build and run it so much more cheaply than the 
commercial providers.  ;P

We already know the NSA gets a copy of the traffic by tapping the backbone, so 
all it needs from the service providers is the keys to decrypt the traffic.

Cheers,
Michael
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Question about otr.js

2013-06-07 Thread Nadim Kobeissi

On 2013-06-07, at 1:09 PM, Anthony Papillion anth...@cajuntechie.org wrote:

 On 06/06/2013 07:00 PM, Nadim Kobeissi wrote:
 Speaking as the lead developer for Cryptocat:
 OTR.js actually has had some vetting. We're keeping it experimental simply 
 due to the experimental nature of web cryptography as a whole. It's a handy 
 library that has had a lot of consideration put into it, but it really 
 depends on your use case and threat model. If you want to use it to keep 
 conversations private in moderate situations, go ahead. If you want to use 
 it to keep conversations private against an authoritarian regime/sprawling 
 surveillance mechanism, think twice. Overall I find it really hard to tell 
 whether it's safe enough without knowing your threat model. For example, if 
 your threat model includes a likelihood of someone backdooring your 
 hardware, pretty much nothing can help you.
 
 If you're considering building your own app and using OTR.js as a library, I 
 beseech you to be careful regarding code delivery mechanisms and XSS 
 considerations. Specifically, please use signed browser plugins as a code 
 delivery mechanism and make sure the rest of your app, including outside of 
 OTR.js, is audited against XSS, code injection, and so on. Those kind of 
 threats tend to be far more common than library bugs.
 
 NK
 
 Thank you for the excellent feedback on OTR.js. It really clears some
 stuff up and makes me much more confident in the library.
 
 I'm considering using OTR.js as a basis for an OTR plugin for
 Thunderbird chat. I suppose, in theory, people *could* decide to use it
 in life and death situations under sprawling surveillance regimes, I'd
 try to make it clear how unwise this is and provide alternatives. For
 example, I'd point them to Pidgin with its OTR instead.

I would never suggest Pidgin — Pidgin has never received an audit and is full 
of vulnerabilities that the development team is reluctant to fix. Cryptocat has 
actually received far more audits than Pidgin, although I'm not sure how to 
compare the two since the platforms are totally different.

NK

 
 Thanks again!
 
 Anthony
 
 
 -- 
 Anthony Papillion
 Phone:   1.918.533.9699
 SIP: sip:cajuntec...@iptel.org
 iNum:+883510008360912
 XMPP:cypherpun...@jit.si
 
 www.cajuntechie.org
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] NSA has direct access to tech giants' systems for user data, secret ppt reveals

2013-06-07 Thread Raven Jiang CX
This is just circumstantial speculation but read
http://talkingpointsmemo.com/archives/2013/06/is_this_who_runs_prism.php

Given Palantir's rapid expansion and aggressive recruitment, I think this
guy might be onto something.

I suspect that what is being described in the slides is not direct backdoor
access to the live systems, but rather regularly aggregated data being sent
to a central location to be contextualized using Palantir's analytics.

From the perspective of the analyst working with Palantir's software, he
can do lookups and cross references between the databases seemingly live.
At tech talks, Palantir employees will often stress the fact that their
analytic software comes with built-in privacy controls, i.e. fine-grained
user permission control so that analysts are given only the specific subset
of data points or data columns that they need to do their job. Perhaps the
so-called EULA described in the Washington Post article is really just part
of the analytics software as opposed to some live Google backdoor API.

Certainly this would seem a more plausible scenario than direct access
given the cited budget and denial from the major tech companies of direct
access.

Raven


On 7 June 2013 10:15, David Miller da...@deadpansincerity.com wrote:

 On 7 June 2013 15:13, R. Jason Cronk r...@privacymaverick.com wrote:


- The Powerpoint is amateurish  (then again with no budget.)

 These powerpoint slides are too amateurish to be real

 Poe's Law of Powerpoint states:

 A fundamental constraint of the known universe is that once your
 organisation grows to more than 100 people, it is impossible to create a
 parodic Powerpoint deck more amateurish than a Powerpoint deck being
 genuinely used within said organisation.

 --
 Love regards etc

 David Miller
 http://www.deadpansincerity.com
 07854 880 883

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Question about otr.js

2013-06-07 Thread Jurre andmore
Pidgin is a terrible client. It has quite a bit of issues. Their SSL
handling is terrible and possible to mitm, I audited the Windows build last
August and found known vulnerabilities since 2006 in 2012.. only recently
in february that the Pidgin team released a security update..

Avoid using Pidgin at all costs.

Over at https://useotrproject.org/ we are busy extending Adam langley's
xmpp-client in Go. Creating a security, privacy and aonimity client by
default.

We hope to have a beta before ohm2013.
Op 7 jun. 2013 19:19 schreef Nadim Kobeissi na...@nadim.cc het volgende:


 On 2013-06-07, at 1:09 PM, Anthony Papillion anth...@cajuntechie.org
 wrote:

  On 06/06/2013 07:00 PM, Nadim Kobeissi wrote:
  Speaking as the lead developer for Cryptocat:
  OTR.js actually has had some vetting. We're keeping it experimental
 simply due to the experimental nature of web cryptography as a whole. It's
 a handy library that has had a lot of consideration put into it, but it
 really depends on your use case and threat model. If you want to use it to
 keep conversations private in moderate situations, go ahead. If you want to
 use it to keep conversations private against an authoritarian
 regime/sprawling surveillance mechanism, think twice. Overall I find it
 really hard to tell whether it's safe enough without knowing your threat
 model. For example, if your threat model includes a likelihood of someone
 backdooring your hardware, pretty much nothing can help you.
 
  If you're considering building your own app and using OTR.js as a
 library, I beseech you to be careful regarding code delivery mechanisms and
 XSS considerations. Specifically, please use signed browser plugins as a
 code delivery mechanism and make sure the rest of your app, including
 outside of OTR.js, is audited against XSS, code injection, and so on. Those
 kind of threats tend to be far more common than library bugs.
 
  NK
 
  Thank you for the excellent feedback on OTR.js. It really clears some
  stuff up and makes me much more confident in the library.
 
  I'm considering using OTR.js as a basis for an OTR plugin for
  Thunderbird chat. I suppose, in theory, people *could* decide to use it
  in life and death situations under sprawling surveillance regimes, I'd
  try to make it clear how unwise this is and provide alternatives. For
  example, I'd point them to Pidgin with its OTR instead.

 I would never suggest Pidgin — Pidgin has never received an audit and is
 full of vulnerabilities that the development team is reluctant to fix.
 Cryptocat has actually received far more audits than Pidgin, although I'm
 not sure how to compare the two since the platforms are totally different.

 NK

 
  Thanks again!
 
  Anthony
 
 
  --
  Anthony Papillion
  Phone:   1.918.533.9699
  SIP: sip:cajuntec...@iptel.org
  iNum:+883510008360912
  XMPP:cypherpun...@jit.si
 
  www.cajuntechie.org
  --
  Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] [FoRK] [info] Top secret PRISM program claims direct access to servers of firms including Google, Facebook and Apple

2013-06-07 Thread Bill Kearney

An Apple spokesman said it had never heard of PRISM.


And probably none of the vendors heard it called that.  This doesn't mean 
anything.  Nor does it say they aren't or haven't been participating in this 
sort of thing.  Which they wouldn't if the order compelled them not to 
reveal it. 


--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Question about otr.js

2013-06-07 Thread Anthony Papillion
On 06/07/2013 12:18 PM, Nadim Kobeissi wrote:
 
 I would never suggest Pidgin — Pidgin has never received an audit and is full 
 of vulnerabilities that the development team is reluctant to fix. Cryptocat 
 has actually received far more audits than Pidgin, although I'm not sure how 
 to compare the two since the platforms are totally different.


Oh, OK. So, aside from CryptoCat, what would you suggest? How well
audited is Jitsi?


--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Question about otr.js

2013-06-07 Thread Steve Weis
Nadim's reply is much better just linking to the otr.js author's own warning.

I'd like to reiterate the importance of code delivery. I've seen a
couple dozen of attempts to do crypto via server-hosted Javascript.
All of these reduced to trusting whomever is serving the code. This
issues have been covered many times, most prominently by Matasano
Security: http://www.matasano.com/articles/javascript-cryptography/

Anthony, it sounds like you're aware of the issues and planning to
develop code that will be installed and executed on the client, i.e. a
plugin for Thunderbird chat.

On Thu, Jun 6, 2013 at 5:00 PM, Nadim Kobeissi na...@nadim.cc wrote:
 Speaking as the lead developer for Cryptocat:
 OTR.js actually has had some vetting. We're keeping it experimental simply 
 due to the experimental nature of web cryptography as a whole. It's a handy 
 library that has had a lot of consideration put into it, but it really 
 depends on your use case and threat model. If you want to use it to keep 
 conversations private in moderate situations, go ahead. If you want to use it 
 to keep conversations private against an authoritarian regime/sprawling 
 surveillance mechanism, think twice. Overall I find it really hard to tell 
 whether it's safe enough without knowing your threat model. For example, if 
 your threat model includes a likelihood of someone backdooring your hardware, 
 pretty much nothing can help you.

 If you're considering building your own app and using OTR.js as a library, I 
 beseech you to be careful regarding code delivery mechanisms and XSS 
 considerations. Specifically, please use signed browser plugins as a code 
 delivery mechanism and make sure the rest of your app, including outside of 
 OTR.js, is audited against XSS, code injection, and so on. Those kind of 
 threats tend to be far more common than library bugs.

 NK


 On 2013-06-06, at 7:49 PM, Steve Weis stevew...@gmail.com wrote:

 The status is:
 [otr.js] hasn't been properly vetted by security researchers. Do not use in 
 life and death situations!
 https://github.com/arlolra/otr#warning

 On Thu, Jun 6, 2013 at 3:14 PM, Anthony Papillion anth...@cajuntechie.org 
 wrote:
  I'm thinking about working on a web app that would use otr.js to
  enable OTR chat via the way (probably similar to Cryptocat).  Does
  anyone know what the security status of otr.js is? Has it been vetted?
  If not, what is the recommended (vetted) Javascript way of doing OTR?
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Question about otr.js

2013-06-07 Thread Eduardo Robles Elvira
On Fri, Jun 7, 2013 at 7:59 PM, Steve Weis stevew...@gmail.com wrote:

 I'd like to reiterate the importance of code delivery. I've seen a
 couple dozen of attempts to do crypto via server-hosted Javascript.
 All of these reduced to trusting whomever is serving the code. This
 issues have been covered many times, most prominently by Matasano
 Security: http://www.matasano.com/articles/javascript-cryptography/

Hello everyone:

This is what I call the server in the middle problem. I actually did
my final career project about this [1]. Basically, we need the
equivalent of SSL in the sense of standarization for end-to-end web
security, or this problem will get worse and worse.

Regards,
--
[1] 
http://edulix.wordpress.com/2012/01/08/the-server-in-the-middle-problem-and-solution/

--
Eduardo
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Email Volume Digest Option

2013-06-07 Thread Yosem Companys
Hi all,

We realize that the liberationtech list's email volume has grown over
the past few days.  Just a reminder that you can switch your account
to digest mode by following the instructions at the end of this email
or simply by asking a list moderator like me to do it for you.

Best,
Yosem
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Griffin Boyce
micah mi...@riseup.net wrote:
 What about when someone from Riseup promotes Riseup services? :o

Riseup isn't evil, I'm just amused by people who say no third-party
services! and then launch into why people should use their
third-party provider of choice.  If one wants to say no
corporate-owned services, that's a bit of a different argument =)

 It only has been recent that companies such as google and twitter have
 been doing something more interesting than just handing over things when
 the police ask, that was nice to see, we felt very alone out
 there... but now I'm not sure what to think when I see those companies
 involved in the dragnet, I guess we feel alone again because I didn't
 notice Riseup or Mayfirst's logo in that Prism powerpoint!

You should be really proud! =D Being a pain in the ass is underrated.

best,
Griffin


-- 
Just another hacker in the City of Spies.
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de

My posts, while frequently amusing, are not representative of the
thoughts of my employer.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptocat Seeking Estonian, Tibetan, Uighur and Latvian Translations

2013-06-07 Thread Nadim Kobeissi
We now only have Uighur left to go! If you know anyone who can contribute, 
please do.

This is the only translation remaining before we can push a big update.

You can contribute to the Uighur translation here:
https://www.transifex.com/projects/p/Cryptocat/language/ug/

NK

On 2013-06-05, at 3:39 PM, Nadim Kobeissi na...@nadim.cc wrote:

 Dear LibTech,
 We're on the verge of releasing a major update to Cryptocat, but we still 
 need four translations finished.
 
 All four translations are very much complete but only lack one or two 
 sentences each.
 
 You can contribute towards the translations here:
 Estonian: https://www.transifex.com/projects/p/Cryptocat/language/et/
 Tibetan: https://www.transifex.com/projects/p/Cryptocat/language/bo/
 Uighur: https://www.transifex.com/projects/p/Cryptocat/language/ug/
 Latvian: https://www.transifex.com/projects/p/Cryptocat/language/lv/
 
 Your help with this is immensely appreciated.
 
 Thank you,
 NK

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Question about otr.js

2013-06-07 Thread Pavol Luptak
On Fri, Jun 07, 2013 at 07:44:35PM +0200, Jurre andmore wrote:
Pidgin is a terrible client. It has quite a bit of issues. Their SSL
handling is terrible and possible to mitm, I audited the Windows build
last August and found known vulnerabilities since 2006 in 2012.. only
recently in february that the Pidgin team released a security update..
 
Avoid using Pidgin at all costs.

BTW, I use mcabber with OTR/PGP support http://mcabber.com/ 
Any security opinion?
--
___
[wil...@trip.sk] [http://trip.sk/wilder/] [talker: ttt.sk 5678]

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Email Volume Digest Option

2013-06-07 Thread Teresa Crawford
Apologies for adding to the list volume.  Darn reply to list!

Teresa


On Fri, Jun 7, 2013 at 2:21 PM, Teresa Crawford ter...@speakeasy.netwrote:

 Thanks for the offer.  Can you switch me to digest?  Thanks!

 Teresa


 On Fri, Jun 7, 2013 at 2:04 PM, Yosem Companys compa...@stanford.eduwrote:

 Hi all,

 We realize that the liberationtech list's email volume has grown over
 the past few days.  Just a reminder that you can switch your account
 to digest mode by following the instructions at the end of this email
 or simply by asking a list moderator like me to do it for you.

 Best,
 Yosem
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




 --
 Teresa Crawford | skype: crawte00 | cell: +1 917-873-6397 | e-mail:
 ter...@speakeasy.net




-- 
Teresa Crawford | skype: crawte00 | cell: +1 917-873-6397 | e-mail:
ter...@speakeasy.net
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] NSA has direct access to tech giants' systems for user data, secret ppt reveals

2013-06-07 Thread x z
Hi all,

I have the same feeling with Raven's. It appears that the PRISM program
does exist, and that amateurish Power Point training material is real (so I
take back my ploy or prank remark). However, none of this proves
Guardian's headline claim NSA taps in to internet giants' systems to mine
user data, or direct access to servers of firms including Google,
Facebook and Apple.

From reading the four pages of the slides, what is actually in place, is
likely just a data mining system that analyzes information NSA gathered
from these firms via the usual means (which should be of no surprise to any
of us). It's likely that NSA stores information from different providers on
different databases and servers (say, one for Facebook, one for Apple), and
the PRISM system can collect directly from these servers. And yes, a $20M
annual budget can handle that, probably half of that if it's not the
government. Guardian and Washington Post grossly misreported this and
misled their readers. After all, most journalists do not have much clue
about technology.

I have hoped people on this mailing list understand better how much it
takes to implement a real direct access to servers from firms like
Google, Facebook and Apple, and the ability to do in-depth surveillance on
live communication. This is a gargantuan task, even for these firms to
build an internal tool like this themselves.

And all these firms participate in this (direct tapping) program, and all
denying it? That's enough of conspiracy theory. Get real.

In a previous email Eugen asked he would reexamine why you are reading
this list. Yes I read this list because I care for internet freedom and
privacy. But we need to have basic sense, in order to fight the good fight.
We do need to limit NSA's power for what they are actually doing, not this
surreal direct tapping thing.

It's in our responsibility to stop this Guardian/PRISM junk, and I am very
disappointed that many people on this mailing list do the exact opposite,
i.e. jumping the Guardian bandwagon to promote their own products. (It is
not that I'm against your product or your promoting it, but please do not
use the Guardian story for it).




2013/6/7 Raven Jiang CX j...@stanford.edu

 This is just circumstantial speculation but read
 http://talkingpointsmemo.com/archives/2013/06/is_this_who_runs_prism.php

 Given Palantir's rapid expansion and aggressive recruitment, I think this
 guy might be onto something.

 I suspect that what is being described in the slides is not direct
 backdoor access to the live systems, but rather regularly aggregated data
 being sent to a central location to be contextualized using Palantir's
 analytics.

 From the perspective of the analyst working with Palantir's software, he
 can do lookups and cross references between the databases seemingly live.
 At tech talks, Palantir employees will often stress the fact that their
 analytic software comes with built-in privacy controls, i.e. fine-grained
 user permission control so that analysts are given only the specific subset
 of data points or data columns that they need to do their job. Perhaps the
 so-called EULA described in the Washington Post article is really just part
 of the analytics software as opposed to some live Google backdoor API.

 Certainly this would seem a more plausible scenario than direct access
 given the cited budget and denial from the major tech companies of direct
 access.

 Raven


 On 7 June 2013 10:15, David Miller da...@deadpansincerity.com wrote:

 On 7 June 2013 15:13, R. Jason Cronk r...@privacymaverick.com wrote:


- The Powerpoint is amateurish  (then again with no budget.)

 These powerpoint slides are too amateurish to be real

 Poe's Law of Powerpoint states:

 A fundamental constraint of the known universe is that once your
 organisation grows to more than 100 people, it is impossible to create a
 parodic Powerpoint deck more amateurish than a Powerpoint deck being
 genuinely used within said organisation.

 --
 Love regards etc

 David Miller
 http://www.deadpansincerity.com
 07854 880 883

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech



 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Time to ask again: why are you logging?

2013-06-07 Thread Anthony Papillion
On 06/07/2013 01:51 PM, micah wrote:
 
 The default syslog in Debian, rsyslog just announced that they've added
 log anonymization capabilities[0]!
 
 Almost 12 years now after riseup wrote the initial patches to
 syslog-ng[1] (a few years ago syslog-ng added this capability, so we no
 longer needed to carry that patch around) it is nice to see that this
 has been added to rsyslog!

This is an *excellent* post Micah! Thank you for writing it. It really
doesn't take a lot to turn off logging when you're setting everything
up. Not doing so is just lazy. Thank you for the post!

Anthony


-- 
Anthony Papillion
Phone:   1.918.533.9699
SIP: sip:cajuntec...@iptel.org
iNum:+883510008360912
XMPP:cypherpun...@jit.si

www.cajuntechie.org
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Time to ask again: why are you logging?

2013-06-07 Thread Brian Conley
+1
On Jun 7, 2013 11:57 AM, Anthony Papillion anth...@cajuntechie.org
wrote:

 On 06/07/2013 01:51 PM, micah wrote:
 
  The default syslog in Debian, rsyslog just announced that they've added
  log anonymization capabilities[0]!
 
  Almost 12 years now after riseup wrote the initial patches to
  syslog-ng[1] (a few years ago syslog-ng added this capability, so we no
  longer needed to carry that patch around) it is nice to see that this
  has been added to rsyslog!

 This is an *excellent* post Micah! Thank you for writing it. It really
 doesn't take a lot to turn off logging when you're setting everything
 up. Not doing so is just lazy. Thank you for the post!

 Anthony


 --
 Anthony Papillion
 Phone:   1.918.533.9699
 SIP: sip:cajuntec...@iptel.org
 iNum:+883510008360912
 XMPP:cypherpun...@jit.si

 www.cajuntechie.org
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] US NSA's Snoop Factor Is Shocking

2013-06-07 Thread Yosem Companys
http://www.calgaryherald.com/opinion/columnists/Kotarski+snoop+factor+shocking/8377821/story.html

MAY 13, 2013

Kotarski: The snoop factor is shocking

BY KRIS KOTARSKI, CALGARY HERALD

In October 2008, a 39-year-old former U.S. navy linguist who worked at
a National Security Agency (NSA) centre in Georgia went on ABC News
and blew the whistle on himself and his fellow NSA operators for
listening in on the private conversations of hundreds of American aid
workers and soldiers calling home to the United States from Iraq.

“Hey, check this out,” David Murfee Faulk says he would be told.
“There’s good phone sex or there’s some pillow talk, pull up this
call, it’s really funny, go check it out.”

Another linguist, 31-year-old Adrienne Kinne, told ABC that the NSA
would listen to calls made by military officers, journalists and aid
workers from organizations such as the International Red Cross and
Doctors Without Borders, listening to “personal, private things with
Americans who are not in any way, shape or form associated with
anything to do with terrorism.”

“We knew they were working for these aid organizations. They were
identified in our systems as ‘belongs to the International Red Cross’
and all these other organizations,” Kinne told ABC News. “And yet,
instead of blocking these phone numbers, we continued to collect on
them.”

How far has this spread since then?

Earlier this month, Tim Clemente, a former FBI counterterrorism agent,
revealed on CNN that details from a private telephone conversation
between one of the Boston bombing suspects and his wife could be
retrieved at will.

“We certainly have ways in national security investigations to find
out exactly what was said in that conversation,” he said. “It’s not
necessarily something that the FBI is going to want to present in
court, but it may help lead the investigation and/or lead to
questioning of her. We certainly can find that out.”

When pressed by the shocked news anchor whether “they can actually get
that,” Clemente was adamant.

“Welcome to America,” he answered. “All of that stuff is being
captured as we speak, whether we know it or like it or not.”

What has happened to our American cousins? And what has happened to
the rest of us? This is not North Korea, Saudi Arabia or Soviet
Russia.

This is the United States, where according to the constitution, “the
right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be
violated.”

This is also Canada’s biggest and most important security partner, our
closest military and intelligence ally, and the country where our
government continues to strive for “harmonization,” even as the U.S.
is revealed again and again to have abandoned the American citizen’s
right to basic privacy.

Just last week, the New York Times’s Charlie Savage reported that the
Obama administration is on the verge of backing an FBI plan for new
surveillance laws that would force companies like Facebook and Google
to build a capacity to comply with wiretap orders into their
instant-messaging systems.

In an April 2012 interview with Democracy Now, another NSA
whistleblower, William Binney, estimated the NSA assembled 20 trillion
“transactions,” which likely included copies of almost all e-mails
sent and received by those living in the United States.

What does this mean for Canadians?

Once upon a time, it was obvious that we would not tolerate our
governments trawling through everyone’s mail or installing a tape
recorder or a video camera in every room of every home. So why are we
so complacent about our electronic data, our phone calls and our
e-mails?

Almost all of us use some kind of American-based online infrastructure
to communicate with each other, but privacy concerns do not seem to
interest our government very much. The old “if you’ve got nothing to
hide, you’ve got nothing to fear” trope is nonsense. We all have
something to hide.

There are intimate thoughts shared between spouses and lovers. Family
quarrels, fears, hopes, family photos and business ideas.

These are all things that can be used to intimidate and abuse us, and
government analysis should not be listening to them, even if they say
that it’s for our own good.

Kris Kotarski’s column appears every second Monday.

© Copyright (c) The Calgary Herald
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] PRISM: NSA/FBI Internet data mining project

2013-06-07 Thread Andy Isaacson
Apologies for replying out of thread and the wide CC list.

On Fri, Jun 07, 2013 at 06:41:32PM +0200, Eugen Leitl wrote:
 - Forwarded message from Matthew Petach mpet...@netflight.com -
 
 Date: Fri, 7 Jun 2013 09:32:53 -0700
 From: Matthew Petach mpet...@netflight.com
 Cc: NANOG na...@nanog.org
 Subject: Re: PRISM: NSA/FBI Internet data mining project
 
 Speaking just for myself, and if you quote me on this
 as speaking on anyone else's behalf, you're a complete
 fool, if the government was able to build infrastructure
 that could listen to all the traffic from a major provider
 for a fraction of what it costs them to handle that traffic
 in the first place, I'd be truly amazed--and I'd probably
 wonder why the company didn't outsource their infrastruture
 to the government, if they can build and run it so much
 more cheaply than the commercial providers.  ;P
 7 companies were listed; if we assume the
 burden was split roughly evenly between them, that's
 20M/7, about $2.85M per company per year to tap in,
 or about $238,000/month per company listed, to
 supposedly snoop on hundreds of gigs per second
 of data.  Two ways to handle it: tap in, and funnel
 copies of all traffic back to distant monitoring posts,
 or have local servers digesting and filtering, just
 extracting the few nuggets they want, and sending
 just those back.

That's not what PRISM is claimed to do, in the WaPo/Gu slide deck.  The
deck claims that PRISM provides a way for an analyst at NSA to request
access to a specific target (gmail account, Skype account, Y! messenger,
etc) and get a dump of data in that account, plus realtime access to the
activity on the account.  The volume is quoted to be on the order of
10k-100k of requests annually.  The implication is that data production
is nearly immediate (measured in minutes or hours at most), not enough
time for a rubber-stamp FISA warrant, implying a fully automated system.

At these volumes we're talking one, or a few, boxes at each provider;
plus the necessary backdoors in the provider's storage systems (easy,
since the provider already has those backdoors in place for their own
maintenance/legal/abuse systems); and trusted personnel on staff at the
providers to build and maintain the systems.  Add a VPN link back to
Fort Meade and you're done.

That's obviously a much easier system (compared to your 200 GBps
sniffer) to build at the $2M/yr budget, and given that $2M is just the
government's part -- the company engineering time to do it is accounted
separately -- it seems like a reasonable ballpark for an efficient
government project.  (There are plenty such, and the existence of
inefficient government projects doesn't change that fact.)

It's even possible that executive/legal at the providers actually aren't
aware that their systems are compromised in this manner.  NatSec claims
will open many doors, especially with alumni of the DoD who have
reentered the civilian workforce:
https://financialcryptography.com/mt/archives/001431.html

-andy
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] PRISM: NSA/FBI Internet data mining project

2013-06-07 Thread Kyle Maxwell
FWIW, Google has issued a similar blanket (and kinda funny) denial.

http://googleblog.blogspot.com/2013/06/what.html

On Fri, Jun 7, 2013 at 2:20 PM, Andy Isaacson a...@hexapodia.org wrote:
 Apologies for replying out of thread and the wide CC list.

 On Fri, Jun 07, 2013 at 06:41:32PM +0200, Eugen Leitl wrote:
 - Forwarded message from Matthew Petach mpet...@netflight.com -

 Date: Fri, 7 Jun 2013 09:32:53 -0700
 From: Matthew Petach mpet...@netflight.com
 Cc: NANOG na...@nanog.org
 Subject: Re: PRISM: NSA/FBI Internet data mining project

 Speaking just for myself, and if you quote me on this
 as speaking on anyone else's behalf, you're a complete
 fool, if the government was able to build infrastructure
 that could listen to all the traffic from a major provider
 for a fraction of what it costs them to handle that traffic
 in the first place, I'd be truly amazed--and I'd probably
 wonder why the company didn't outsource their infrastruture
 to the government, if they can build and run it so much
 more cheaply than the commercial providers.  ;P
 7 companies were listed; if we assume the
 burden was split roughly evenly between them, that's
 20M/7, about $2.85M per company per year to tap in,
 or about $238,000/month per company listed, to
 supposedly snoop on hundreds of gigs per second
 of data.  Two ways to handle it: tap in, and funnel
 copies of all traffic back to distant monitoring posts,
 or have local servers digesting and filtering, just
 extracting the few nuggets they want, and sending
 just those back.

 That's not what PRISM is claimed to do, in the WaPo/Gu slide deck.  The
 deck claims that PRISM provides a way for an analyst at NSA to request
 access to a specific target (gmail account, Skype account, Y! messenger,
 etc) and get a dump of data in that account, plus realtime access to the
 activity on the account.  The volume is quoted to be on the order of
 10k-100k of requests annually.  The implication is that data production
 is nearly immediate (measured in minutes or hours at most), not enough
 time for a rubber-stamp FISA warrant, implying a fully automated system.

 At these volumes we're talking one, or a few, boxes at each provider;
 plus the necessary backdoors in the provider's storage systems (easy,
 since the provider already has those backdoors in place for their own
 maintenance/legal/abuse systems); and trusted personnel on staff at the
 providers to build and maintain the systems.  Add a VPN link back to
 Fort Meade and you're done.

 That's obviously a much easier system (compared to your 200 GBps
 sniffer) to build at the $2M/yr budget, and given that $2M is just the
 government's part -- the company engineering time to do it is accounted
 separately -- it seems like a reasonable ballpark for an efficient
 government project.  (There are plenty such, and the existence of
 inefficient government projects doesn't change that fact.)

 It's even possible that executive/legal at the providers actually aren't
 aware that their systems are compromised in this manner.  NatSec claims
 will open many doors, especially with alumni of the DoD who have
 reentered the civilian workforce:
 https://financialcryptography.com/mt/archives/001431.html

 -andy
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Who Runs Prism...

2013-06-07 Thread Peter Lindener
It might be good to elevate this to it's own thread...
so I forward it here..

-- Forwarded message --
From: Raven Jiang CX j...@stanford.edu
Date: Fri, Jun 7, 2013 at 10:30 AM
Subject: Re: [liberationtech] NSA has direct access to tech giants' systems
for user data, secret ppt reveals

This is just circumstantial speculation but read
http://talkingpointsmemo.com/archives/2013/06/is_this_who_runs_prism.php

Given Palantir's rapid expansion and aggressive recruitment, I think this
guy might be onto something.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Google Denies PRISM Involvement

2013-06-07 Thread Travis McCrea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

http://googleblog.blogspot.com/2013/06/what.html

I do believe them, but I have no proof to back that up. You would assume
they wouldn't make a bold faced lie, they would just not talk about it.
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCgAGBQJRsmQGAAoJEES9cOv0A0l0vZgH/ArXy3Emx5PbaB5FgUDxvBdc
XkzI+C9E57ZNkhC7IOb1FmihMkTBEsbr3WlFre3ECZ3aMDikdMY2zq3cpCUh5tms
M28SPkoSE+4MV/bxmKPJuq4M5TopCDKGaDpQbZ1swj5nxCqomImIf3BVX7vfcJzf
m8jLe5c6ePScBiG6sNmog18F2eHZabRohfIBAbVUhHYmE/aQy4QfyUGZxCqtyDxO
6gv+RUctTGbM/A99KCjvn9/H3h5DmOI5ynEs0p+2IZsHhopoDwFjnvFMDVsetk0l
Sd6bSF8FiVWbFZo4c8hZQ5+ov3ukCcyqvubnrlXlkk51uwxc4rAOq7gpJ9fl7zk=
=4usx
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Google Denies PRISM Involvement

2013-06-07 Thread Yosem Companys
Washington Post Backtracks on Claims of Tech Giants Giving US Govt Direct
Access to Their Servers
http://www.businessinsider.com/washington-post-updates-spying-story-2013-6

On Fri, Jun 7, 2013 at 3:51 PM, Travis McCrea m...@travismccrea.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512

 http://googleblog.blogspot.com/2013/06/what.html

 I do believe them, but I have no proof to back that up. You would assume
 they wouldn't make a bold faced lie, they would just not talk about it.
 -BEGIN PGP SIGNATURE-
 Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
 Comment: GPGTools - http://gpgtools.org
 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

 iQEcBAEBCgAGBQJRsmQGAAoJEES9cOv0A0l0vZgH/ArXy3Emx5PbaB5FgUDxvBdc
 XkzI+C9E57ZNkhC7IOb1FmihMkTBEsbr3WlFre3ECZ3aMDikdMY2zq3cpCUh5tms
 M28SPkoSE+4MV/bxmKPJuq4M5TopCDKGaDpQbZ1swj5nxCqomImIf3BVX7vfcJzf
 m8jLe5c6ePScBiG6sNmog18F2eHZabRohfIBAbVUhHYmE/aQy4QfyUGZxCqtyDxO
 6gv+RUctTGbM/A99KCjvn9/H3h5DmOI5ynEs0p+2IZsHhopoDwFjnvFMDVsetk0l
 Sd6bSF8FiVWbFZo4c8hZQ5+ov3ukCcyqvubnrlXlkk51uwxc4rAOq7gpJ9fl7zk=
 =4usx
 -END PGP SIGNATURE-
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] OpenWatch Releases #OccupyGezi Android Application

2013-06-07 Thread Rich Jones
We were asked by members of the media in Turkey who have been shut down to
release a version of our new streaming media capture applications. In an
effort document the history of the struggle and to help show abuses by
authorities there, we are pleased to announce the Occupy Gezi android
application.

Announcement:
https://openwatch.net/i/87/openwatch-releases-occupygezi-mobile-application
Download: https://play.google.com/store/apps/details?id=org.ale.occupygezi
Code: https://github.com/OpenWatch

You will be able to see all of the media produced by the apps live as it
comes in here: https://openwatch.net/w/occupygezi and we will use the media
received to produce additional documentaries and reports.

If you've got any feedback, please get at us: t...@openwatch.net

Thanks!,

Rich Jones
OpenWatch

=
Why Turkey Needs an Independent Free Press - And How OpenWatch Is
Helping *Media
conglomeration and an ever-worsening press-freedom record have created a
void in independent reporting in Turkey, so OpenWatch has released a mobile
application for Turkish mobile reporters.*

In support of a free press, the right to demonstrate, and the right to use
media to document the truth, OpenWatch has released an Occupy Gezi
application for
Androidhttps://play.google.com/store/apps/details?id=org.ale.occupygezi
 (with an iPhone version coming out shortly) to allow people on the ground
to collaboratively document the history they are making together.

Download the application here on the Google Play
storehttps://play.google.com/store/apps/details?id=org.ale.occupygezi
!

The applications will send videos and photos directly online, where they
can be found in the apps and on the web by following the
#occupygezihttps://openwatch.net/w/occupygezi
  hashtag on OpenWatch https://openwatch.net/w/occupygezi, which will
show a live feed of media as it is received. We have optimized the
application to stream videos and photos to our servers in the fastest way
possible, even in low-connectivity environments.

We will be producing documentaries and reports using the media created by
the Occupy Gezi applications. All media created is Creative Commons, and
all of the code is Free and Open Source, and available on our GitHub
pagehttp://github.com/openwatch.
We have also updated our own open source software with additional Turkish
translations.
 Why?While thousands of demonstrators took over a public space in an
unprecedented act of mass political protest, the mainstream Turkish media
instead ran documentaries about penguins. This is actually not surprising,
as Turkey, which has the most imprisoned journalists of any country
according to Reporters Without Borders, has been increasingly restrictive
of press freedom in the past few years.

As a result, much of the coverage of the events in the Turkish streets was
provided by users of social networking services like Twitter. Now,
authorities are targeting social media reporters and provocateurs as well:
Authorities in Turkey have raided the houses and detained 38 people accused
of using social media services to promote insurrection. What now?Going
forward, we hope that people will be able to use mobile media to document
the truth, the history they are making, and to protect themselves from
abusive authorities by capturing and exposing the reality of events.

The #OccupyGezi App was built on top of open source software which is being
actively developed - there are some bugs, so please report them so that we
can fix them. (It is not an app for anonymous reporting, and we do not make
any such claims - it is an application simply designed to rapidly capture
and redistribute important information which needs to be seen by as many
people as possible. In the future, we do intend to build a separate
architecture to support anonymous submissions, but we take identity
security extremely seriously here, which is why we make no claims about
anonymity at the moment.)

If you are in Turkey and wish to document your experiences during this
struggle, or just want to show your solidarity, use the
applicationhttps://play.google.com/store/apps/details?id=org.ale.occupygezi
 and share your view with the world!
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] OpenWatch Releases #OccupyGezi Android Application

2013-06-07 Thread Brian Conley
Hi Rich,

That sounds pretty cool, have you heard of StoryMaker yet?

It's an app we have been building at Small World News, in collaboration
with the guardian project and scal.io, along with support from free press
unlimited and the open tech fund.

StoryMaker helps users tell stories not just document events and provides
on the job training to improve their skills. It also does enable anonymous
publishing via tor through integration with orbot.

I wonder if your colleagues in turkey may be interested in using it?

https://play.google.com/store/apps/details?id=info.guardianproject.mrapp

Let me know if you have questions!

Brian
On Jun 7, 2013 8:14 PM, Rich Jones r...@anomos.info wrote:

 We were asked by members of the media in Turkey who have been shut down to
 release a version of our new streaming media capture applications. In an
 effort document the history of the struggle and to help show abuses by
 authorities there, we are pleased to announce the Occupy Gezi android
 application.

 Announcement:
 https://openwatch.net/i/87/openwatch-releases-occupygezi-mobile-application
 Download: https://play.google.com/store/apps/details?id=org.ale.occupygezi
 Code: https://github.com/OpenWatch

 You will be able to see all of the media produced by the apps live as it
 comes in here: https://openwatch.net/w/occupygezi and we will use the
 media received to produce additional documentaries and reports.

 If you've got any feedback, please get at us: t...@openwatch.net

 Thanks!,

 Rich Jones
 OpenWatch

 =
 Why Turkey Needs an Independent Free Press - And How OpenWatch Is Helping
 *Media conglomeration and an ever-worsening press-freedom record have
 created a void in independent reporting in Turkey, so OpenWatch has
 released a mobile application for Turkish mobile reporters.*

 In support of a free press, the right to demonstrate, and the right to use
 media to document the truth, OpenWatch has released an Occupy Gezi
 application for 
 Androidhttps://play.google.com/store/apps/details?id=org.ale.occupygezi
  (with an iPhone version coming out shortly) to allow people on the
 ground to collaboratively document the history they are making together.

 Download the application here on the Google Play 
 storehttps://play.google.com/store/apps/details?id=org.ale.occupygezi
 !

 The applications will send videos and photos directly online, where they
 can be found in the apps and on the web by following the 
 #occupygezihttps://openwatch.net/w/occupygezi
   hashtag on OpenWatch https://openwatch.net/w/occupygezi, which will
 show a live feed of media as it is received. We have optimized the
 application to stream videos and photos to our servers in the fastest way
 possible, even in low-connectivity environments.

 We will be producing documentaries and reports using the media created by
 the Occupy Gezi applications. All media created is Creative Commons, and
 all of the code is Free and Open Source, and available on our GitHub 
 pagehttp://github.com/openwatch.
 We have also updated our own open source software with additional Turkish
 translations.
  Why?While thousands of demonstrators took over a public space in an
 unprecedented act of mass political protest, the mainstream Turkish media
 instead ran documentaries about penguins. This is actually not surprising,
 as Turkey, which has the most imprisoned journalists of any country
 according to Reporters Without Borders, has been increasingly restrictive
 of press freedom in the past few years.

 As a result, much of the coverage of the events in the Turkish streets was
 provided by users of social networking services like Twitter. Now,
 authorities are targeting social media reporters and provocateurs as well:
 Authorities in Turkey have raided the houses and detained 38 people accused
 of using social media services to promote insurrection. What now?Going
 forward, we hope that people will be able to use mobile media to document
 the truth, the history they are making, and to protect themselves from
 abusive authorities by capturing and exposing the reality of events.

 The #OccupyGezi App was built on top of open source software which is
 being actively developed - there are some bugs, so please report them so
 that we can fix them. (It is not an app for anonymous reporting, and we do
 not make any such claims - it is an application simply designed to rapidly
 capture and redistribute important information which needs to be seen by as
 many people as possible. In the future, we do intend to build a separate
 architecture to support anonymous submissions, but we take identity
 security extremely seriously here, which is why we make no claims about
 anonymity at the moment.)

 If you are in Turkey and wish to document your experiences during this
 struggle, or just want to show your solidarity, use the 
 applicationhttps://play.google.com/store/apps/details?id=org.ale.occupygezi
  and share your view with the world!

 --
 Too many emails? 

Re: [liberationtech] Crypho

2013-06-07 Thread zooko
On Tue, Mar 26, 2013 at 09:24:13AM +0100, Yiorgis Gozadinos wrote:
 
 Assuming there is a point of reference for js code, some published instance 
 of the code, that can be audited and verified by others that it does not 
 leak. The point then becomes: Is the js I am running in my browser the same 
 as the js that everybody else is?. 
 Like you said, it comes down to the trust one can put in the verifier.
 A first step could be say for instance a browser extension, that compares a 
 hash of the js with a trusted authority. The simplest version of that would 
 be a comparison of a hash with a hash of the code on a repo.
 Another (better) idea, would be if browser vendors would take up the task 
 (say Mozilla for instance) and act as the trusted authority and built-in 
 verifier. Developers would sign their code and the browser would verify.
 Finally, I want to think there must be a way for users to broadcast some 
 property of the js they received. Say for example the color of a hash. Then 
 when I see blue when everyone else is seeing pink, I know there is something 
 fishy. There might be a way to even do that in a decentralised way, without 
 having to trust a central authority.

Dear Yiorgis:

I think this is a promising avenue for investigation. I think the problem is
that people like you, authors of user-facing apps, know what the problem is
that you want to solve, but you can't solve it without help from someone else,
namely the authors of web browsers.

With help from the web browser, this problem would be at least partly solvable.
There is no reason why this problem is more impossible to solve for apps
written in Javascript and executed by a web browser than for apps written in a
language like C# and executed by an operating system like Windows.

Perhaps the next step is to explain concisely to the makers of web browsers
what we want.

Ben Laurie has published a related idea:

http://www.links.org/?p=1262

Regards,

Zooko

https://tahoe-lafs.org - Free, Open Source Secure Decentralized Storage
https://LeastAuthority.com - Commercial Ciphertext Storage Service
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech