Dear people of liberationtech:

I've read this list for a long time, and I've posted to it
occasionally. I'm writing today to tell you about our press release
from LeastAuthority.com.

Here's the press release in HTML form:
https://leastauthority.com/press_release_2013_07_30

Here is the text of it, and following the text I'll explain why we are
marketing our service in these terms.

This is in response to this criticism from the liberationtech twitter
account: “No such thing | http://LeastAuthority.com  Announces a
Purportedly "Spy-Proof" Storage Service https://LeastAuthority.com”
(https://twitter.com/Liberationtech/status/362913144772890624).

------- begin text of press release

LeastAuthority.com Announces A Spy-Proof Storage Service

LeastAuthority.com today announced Simple Secure Storage Service (S4),
a backup service that encrypts your files to protect them from the
prying eyes of spies and criminals.

“People deserve privacy and security in the digital data that make up
our daily lives.” said the company's founder and CEO, Zooko
Wilcox-O'Hearn. “As an individual or a business, you shouldn't have to
give up control over your data in order to get the benefits of cloud
storage.”

=== Verifiable end-to-end security

The Simple Secure Storage Service offers verifiable end-to-end security.

It offers “end-to-end security” because all of the customer's data is
encrypted locally — on the customer's own personal computer — before
it is uploaded to the cloud. During its stay in the cloud, it cannot
be decrypted by LeastAuthority.com, nor by anyone else, without the
decryption key which is held only by the customer.

S4 offers “verifiable end-to-end security” because all of the source
code that makes up the Simple Secure Storage Service is published for
everyone to see. Not only is the source code publicly visible, but it
also comes with Free (Libre) and Open Source rights granted to the
public allowing anyone to inspect the source code, experiment on it,
alter it, and even to distribute their own version of it and to sell
commercial services.

Wilcox-O'Hearn says “If you rely on closed-source, proprietary
software, then you're just taking the vendor's word for it that it
actually provides the end-to-end security that they claim. As the
PRISM scandal shows, that claim is sometimes a lie.”

The web site of LeastAuthority.com proudly states “We can never see
your data, and you can always see our code.”.

=== Trusted by experts

The Simple Secure Storage Service is built on a technology named
“Least-Authority File System (LAFS)”. LAFS has been studied and used
by computer scientists, hackers, Free and Open Source software
developers, activists, the U.S. Defense Advanced Research Projects
Agency, and the U.S. National Security Agency.

The design has been published in a peer-reviewed scientific workshop:
Wilcox-O'Hearn, Zooko, and Brian Warner. “Tahoe: the least-authority
filesystem.” Proceedings of the 4th ACM international workshop on
Storage security and survivability. ACM, 2008.
http://eprint.iacr.org/2012/524.pdf

It has been cited in more than 50 scientific research papers, and has
received plaudits from the U.S. Comprehensive National Cybersecurity
Initiative, which stated: “Systems like Least-Authority File System
are making these methods immediately usable for securely and availably
storing files at rest; we propose that the methods be further
reviewed, written up, and strongly evangelized as best practices in
both government and industry.”

Dr. Richard Stallman, President of the Free Software Foundation
(https://fsf.org/) said “Free/Libre software is software that the
users control. If you use only free/libre software, you control your
local computing — but using the Internet raises other issues of
freedom and privacy, which many network services don't respect. The
Simple Secure Storage Service is an example of a network service that
does respect your freedom and privacy.”

Jacob Appelbaum, Tor project developer (https://www.torproject.org/)
and WikiLeaks volunteer (http://wikileaks.org/), said “LAFS's design
acknowledges the importance of verifiable end-to-end security through
cryptography, Free/Libre release of software and transparent
peer-reviewed system design.”

The LAFS software is already packaged in several widely-used operating
systems such as Debian GNU/Linux and Ubuntu.

https://LeastAuthority.com

------- end text of press release


Now, the liberationtech twitter account objected to the term
“Spy-Proof”. I have to admit that we hesitated to use that term when
writing the press release, because we really don't want to oversell.
Some members of our team urged me to replace “Spy-Proof” with
“Spy-Resistant” in that press release. I finally decided to go ahead
with “Spy-Proof”, and I'll tell you why.

The big issue we are facing today is the *automation* and
*generalization* of surveillance and control. These systems, while
numerous and heterogeneous, are now known to the public under the
rubric of "PRISM". Traditional targeted, labor-intensive espionage or
policing are not the problem.

This is something that it is hard for the average person to
understand, because they don't understand computer programming (also
called “automation”) and machine-learning, but I expect the
participants on this list are steeped in it: automated surveillance
and control, on everyone, all the time, performed by a machine, is a
completely different beast from the kind of espionage and police work
that existed when we were growing up.

We are in a dangerous phase of the evolution of civilization. A
generation ago, the surveillance and investigatory powers of the large
centralized powers (e.g. nation-states) required expensive manual
effort to exert, and a typical person could correctly assume that they
were not being personally spied upon in any meaningful sense. Today,
this has reversed; it would require expensive manual effort to
*exclude* any individual citizen from ubiquitous data collection and
automated processing.

Tomorrow, this situation will become even more dangerous, when the
powers begin to automate the *exertion of control* in addition to
automating the data collection and processing. Today the collection
and processing of data is performed automatically, but as far as I
know, *acting* on that information, for example sending humans to
physically investigate or arrest, or bombs to kill, is under human
control.

Tomorrow, the automated systems will act on the world as well as
sensing it, for example by censoring communications or preventing
actions which the automation has categorized as suspicious. A
foretaste of this future is visible today in the form of the automated
fraud-prevention exerted by the credit card companies. I refer not to
automated fraud-*detection*, in which computers collect and process
information and then humans decide how to act on it, but the automated
fraud-*prevention* in which a computer chooses whether each credit
card purchase will be approved, delayed, or rejected, based on its
fraud-detection algorithms.

Now imagine if the national firewall that you live under, or the
centralized social networking site that you rely on, made the
automated decision to suspend your privileges of communicating with
certain others, because, in the estimation of that machine-learning
algorithm, your communications were likely to involve banned material,
or to be contributing to an illegal activity, or to be politically
unacceptable.

Tomorrow, that kind of automated exertion of control by computers over
individuals will be extended to the individual's communications,
travel, and purchases, at least for many populations.


Now, what is our company selling? Spy-proof online storage.

As we indicated in the press release, we have worked long and hard to
avoid the pitfalls that could undermine the safety of our users. We
have studied cryptography and computer security for many years, and we
believe that the Least-Authority File System free-and-open-source
project and our S4 commercial service is best-of-class. Of course,
there is no certainty in this life, and we are continuing to seek ways
to improve the safety of LAFS and S4, in particular we are seeking
another round of external security review.

But, to the best of our knowledge—including studying the implications
of Snowden's revelations—using LAFS or S4 does in fact make it
impossible for today's automated surveillance systems to collect and
process your data.

We do *not* claim that this software protects you from targeted
attacks, such as police investigations, "spy vs. spy" targeted
espionage, targeted heists by criminals, or if you live in a war zone
and are targeted by your enemies.

But we do claim that this software protects you from the *automated*
surveillance that is being applied to everyone indiscriminately.
That's we say that it is “Spy-proof storage”, because it protects you
from the kind of spying that is happening to all of us today.


I warmly welcome any feedback from this group about our approach.
Especially I welcome accurate, specific criticisms which can help
inform our users about ways in which the product does *not* protect
them.


Regards,

Zooko Wilcox-O'Hearn

Founder, CEO, and Customer Support Rep

https://LeastAuthority.com
--
Liberationtech list is public and archives are available via Google. Too many 
emails? Unsubscribe, change to digest, or change password by emailing moderator 
at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to