Now just imagine a wireless cloud build around a Plan 9 (ie 9P)
network (anonymous and distributed)...no need for Alice and no
hole to be ratted out on from a mole. No single file server to
attack, you'd have to take every one down in parallel. And that
still wouldn't take down the back-channels. No individual sys-op
would even (necessarily) know that the data was on -their- server
since it would be broken up into chunks all over with a nice
network/app encryption layer built right in from the start.

Plan 9, Wireless, and Small World Networks...Freedom -is- Security!


---------- Forwarded message ----------
Date: Sun, 10 Nov 2002 15:44:53 -0500
From: Tyler Durden <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: CDR: eJazeera?

Well, the rason d'etre of 'eJazeera' as I see it is primarily for
publically-taken photos and videos to be quickly "gypsied" away from their
port of origination (ie, the camera that took them), so that they can
eventually make it into a public place on ye old 'Net. The enabling
technology as I see it here is802.11b, Wi-Fi. A typical scenario is the case
of public demonstrations where the local "authorities" are called in, and
where they get, shall we say, a little overzealous. In many such cases
(here, New York City, Here, USA, and there--China, etc...), such authorities
will attempt to confiscate devices that could have captured the events or
captured the perpetrators (and their badge numbers, if applicable) in photo
or video.

The ultimate aim of eJazeera is to make even the thought of "capturing" such
video non-existent, due to the commonplace practices outlined in an
eJazeera-type document (or eventually tribal knowledge). Short of that, it
is of course in itself desirable for such events to get onto the public
'Net.

The methods can be various, but the easiest one was (I think) described by
Tim May. Bob and Alice are pre-known to each other. Bob holds a camera,
Alice has a Wi-Fi enabled laptop operational in her knapsack. After Bob
takes the photos/video, he transfers the images to ALice, who walks off and
moves the data to a secure and public site.

Other methods seek to eliminate the need for various levels of pre-knowledge
between Bob and Alice, and to also stave off the "round up" scenario where a
large group is examined and cleansed of all electronica, before data can
make it onto the public net. (Less likely in US now, but easily possible
elsewhere).

ALso to be addressed in the document are (possibly) suggested technologies,
down to the actual gadgets and manufacturers, and recommended spacial
resolutions vs distances in order to record, say, badge numbers and facial
features. Also, powering requirements won't hurt, as well as suggested
methods for mitigating power issues.

(Hey--this might be way beyond what's needed or desirable, butI still think
like an engineer).

In a reasonably just world, such images might be used in he short run to
prosecute those that overstepped their legal bounds. Inthe long run, the
commonplace practice of uploading such images should act as a deterrent to
such overzealousness.

As it turns out, however, those POWs being transported were photographed in
such a way as to not need something like eJazeera (unless the scope as I
imagine it is broadened...is it worthwhile to consider the robust creation
of image links etc... on the 'Net?).

-TD







>From: "Major Variola (ret)" <[EMAIL PROTECTED]>
>To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
>Subject: Re: Photos in transport plane of prisoners: Time for eJazeera?
>Date: Sat, 09 Nov 2002 17:53:48 -0800
>
>At 08:32 PM 11/9/02 -0500, Tyler Durden wrote:
> >So I'm still playing with the idea of a publically-accessible document
>that
> >outlines the strategies, technologies, aims and requirements for
>somehow
> >uploading images and data to public repositorioes.
>
>Such a document should enumerate the threat model and describe how each
>threat
>is resisted, or not.
>
>Specific use-cases can be written: the GI who took the picture; the
>photo-developer-tech who
>kept copies; the bored netop who intercepted the pix; an activist who is
>under <insert type>
>surveillance.
>
> >Anyone interested? And what does it mean (if anything) to do this
>within the
> >context of the Cypherpunk list?
>
>Dis be da place, at least for talk :-)


_________________________________________________________________
Help STOP SPAM with the new MSN 8 and get 2 months FREE*
http://join.msn.com/?page=features/junkmail


 --
    ____________________________________________________________________

    We don't see things as they are,                      [EMAIL PROTECTED]
    we see them as we are.                                   www.ssz.com
                                                  [EMAIL PROTECTED]
    Anais Nin                                         www.open-forge.org

    --------------------------------------------------------------------

Reply via email to