Send Link mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        https://mailman.anu.edu.au/mailman/listinfo/link
or, via email, send a message with subject or body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Link digest..."


Today's Topics:

   1. Re: email oligopolies (David)
   2. 2026 Predictions (Marghanita da Cruz)
   3. Signal creator Moxie Marlinspike wants to do for AI what he
      did for messaging (Kim Holburn)


----------------------------------------------------------------------

Message: 1
Date: Tue, 13 Jan 2026 12:41:08 +1100
From: David <[email protected]>
To: [email protected]
Subject: Re: [LINK] email oligopolies
Message-ID: <6857736.MDQidcC6GM@ulysses>
Content-Type: text/plain; charset="us-ascii"

On Tuesday, 13 January 2026 08:28:29 AEDT Tom Worthington wrote:

> At one stage I was collecting digital IDs like postage stamps. I had one from 
> the Post Office, one from the Australian Government and others from assorted 
> organizations. None of them actually worked.

Yep, that supports my argument for a PKI server which is set up and run 
explicitly for that purpose, not as an adjunct to some government department's 
primary responsibility or the profitability of a private company, offshore or 
not.

>> ... Government-run (therefore trusted) server ...
> The Donald J. Trump Trusted Server?

Quite so, but when things get to that stage it's a different story entirely!  
And that brings us full circle back to Marghanita's call for predictions as to 
2026:  I predict IT&C technological developments will have little to do with it.

Will China take over Taiwan?  Will Russia become desperate enough to use 
strategic nuclear weapons in Ukraine?  Will NATO / China / U.S. then get 
involved?  Will the White House continue its current volatile course?  Will a 
decent chunk of Antarctic ice slide into the ocean causing a 3-metre rise in 
sea-levels?  Most people don't realise (a) how vulnerable much of our global 
Internet-based "services" really are and (b) how little they would be missed 
after a few months.

> I have been singing my email because some email servers seem to think it 
> makes my messages more trustworthy.

In the current world, singing is about all we can do (:-))  But what an 
exciting time the next few years will be...

_DavidL_





------------------------------

Message: 2
Date: Tue, 13 Jan 2026 14:04:17 +1100
From: Marghanita da Cruz <[email protected]>
To: [email protected]
Subject: [LINK] 2026 Predictions
Message-ID: <[email protected]>
Content-Type: text/plain; charset=UTF-8; format=flowed

I was only calling for IT&T predictions.

I am hoping for Water views but don't predict this will happen as early 
as 2026. But world may go nuclear as argument to fix man made climate 
change.

Perhaps "There will Come Soft Rain" by Sarah Tisdale (1884 ?1933) is an 
appropriate poem https://www.youtube.com/watch?v=XB3vXrPjNWM

or

So, this is Christmas by John Lennon (from 1971) 
https://www.youtube.com/watch?v=7tSuREVliWM

Marghanita

On 1/13/26 12:41, David wrote:
> Quite so, but when things get to that stage it's a different story entirely!  
> And that brings us full circle back to Marghanita's call for predictions as 
> to 2026:  I predict IT&C technological developments will have little to do 
> with it.
>
> Will China take over Taiwan?  Will Russia become desperate enough to use 
> strategic nuclear weapons in Ukraine?  Will NATO / China / U.S. then get 
> involved?  Will the White House continue its current volatile course?  Will a 
> decent chunk of Antarctic ice slide into the ocean causing a 3-metre rise in 
> sea-levels?  Most people don't realise (a) how vulnerable much of our global 
> Internet-based "services" really are and (b) how little they would be missed 
> after a few months.

-- 
Marghanita da Cruz
Telephone: 0414-869202
Email:  [email protected]
Website: http://ramin.com.au



------------------------------

Message: 3
Date: Wed, 14 Jan 2026 09:00:13 +1100
From: Kim Holburn <[email protected]>
To: Link mailing list <[email protected]>
Subject: [LINK] Signal creator Moxie Marlinspike wants to do for AI
        what he did for messaging
Message-ID: <[email protected]>
Content-Type: text/plain; charset=UTF-8; format=flowed

Do we really need more AIs?


https://arstechnica.com/security/2026/01/signal-creator-moxie-marlinspike-wants-to-do-for-ai-what-he-did-for-messaging/

Introducing Confer, an end-to-end AI assistant that just works.

Moxie Marlinspike?the pseudonym of an engineer who set a new standard for 
private messaging with the creation of the Signal 
Messenger?is now aiming to revolutionize AI chatbots in a similar way.

His latest brainchild is Confer, an open source AI assistant that provides 
strong assurances that user data is unreadable to the 
platform operator, hackers, law enforcement, or any other party other than 
account holders. The service?including its large language 
models and back-end components?runs entirely on open source software that users 
can cryptographically verify is in place.

Data and conversations originating from users and the resulting responses from 
the LLMs are encrypted in a trusted execution 
environment (TEE) that prevents even server administrators from peeking at or 
tampering with them. Conversations are stored by 
Confer in the same encrypted form, which uses a key that remains securely on 
users? devices.

Like Signal, the under-the-hood workings of Confer are elegant in their design 
and simplicity. Signal was the first end-user privacy 
tool that made using it a snap. Prior to that, using PGP email or other options 
to establish encrypted channels between two users 
was a cumbersome process that was easy to botch. Signal broke that mold. Key 
management was no longer a task users had to worry 
about. Signal was designed to prevent even the platform operators from peering 
into messages or identifying users? real-world 
identities.
?Inherent data collectors?

All major platforms are required to turn over user data to law enforcement or 
private parties in a lawsuit when either provides a 
valid subpoena. Even when users opt out of having their data stored long term, 
parties to a lawsuit can compel the platform to store 
it, as the world learned last May when a court ordered OpenAI to preserve all 
ChatGPT users? logs?including deleted chats and 
sensitive chats logged through its API business offering. Sam Altman, CEO of 
OpenAI, has said such rulings mean even psychotherapy 
sessions on the platform may not stay private. Another carve out to opting out: 
AI platforms like Google Gemini may have humans read 
chats.

Data privacy expert Em (she keeps her last name off the Internet) called AI 
assistants the ?archnemesis? of data privacy because 
their utility relies on assembling massive amounts of data from myriad sources, 
including individuals.

?AI models are inherent data collectors,? she told Ars. ?They rely on large 
data collection for training, improvements, operations, 
and customizations. More often than not, this data is collected without clear 
and informed consent (from unknowing training subjects 
or from platform users), and is sent to and accessed by a private company with 
many incentives to share and monetize this data.?

The lack of user-control is especially problematic given the nature of LLM 
interactions, Marlinspike says. Users often treat 
dialogue as an intimate conversation. Users share their thoughts, fears, 
transgressions, business dealings, and deepest, darkest 
secrets as if AI assistants are trusted confidants or personal journals. The 
interactions are fundamentally different from 
traditional web search queries, which usually adhere to a transactional model 
of keywords in and links out.

He likens AI use to confessing into a ?data lake.?
Awaking from the nightmare that is today?s AI landscape

In response, Marlinspike has developed and is now trialing Confer. In much the 
way Signal uses encryption to make messages readable 
only to parties participating in a conversation, Confer protects user prompts, 
AI responses, and all data included in them. And just 
like Signal, there?s no way to tie individual users to their real-world 
identity through their email address, IP address, or other 
details.

?The character of the interaction is fundamentally different because it?s a 
private interaction,? Marlinspike told Ars. ?It?s been 
really interesting and encouraging and amazing to hear stories from people who 
have used Confer and had life-changing conversations, 
in part because they haven?t felt free to include information in those 
conversations with sources like ChatGPT or they had insights 
using data that they weren?t really free to share with ChatGPT before but can 
using an environment like Confer.?

One of the main ingredients of Confer encryption is passkeys. The industry-wide 
standard generates a 32-byte encryption keypair 
that?s unique to each service a user logs in to. The public key is sent to the 
server. The private key is stored only on the user 
device, inside protected storage hardware that hackers (even those with 
physical access) can?t access. Passkeys provide two-factor 
authentication and can be configured to log in to an account with a 
fingerprint, face scan (both of which also stay securely on a 
device), or a device unlock PIN or passcode.

The private key allows the device to log in to Confer and encrypt all input and 
output with encryption that?s widely believed to be 
impossible to break. That allows users to store conversations on Confer servers 
with confidence that they can?t be read by anyone 
other than themselves. The storage allows conversations to sync across other 
devices the user owns. The code making this all work is 
available for anyone to inspect. It looks like this:

This robust internal engine is fronted by a user interface (shown in the two 
images above) that?s deceptively simple. In just two 
strokes, a user is logged in, and all previous chats are decrypted. These chats 
are then available to any device logged in to the 
same account. This way, Confer can sync chats without compromising privacy. The 
ample 32 bytes of key material allow the private key 
to change regularly, a feature that allows for forward secrecy, meaning that in 
the event a key is compromised, an attacker cannot 
read previous or future chats.

The other main Confer ingredient is a TEE on the platform servers. TEEs encrypt 
all data and code flowing through the server CPU, 
protecting them from being read or modified by someone with administrative 
access to the machine. The Confer TEE also provides 
remote attestation. Remote attestation is a digital certificate sent by the 
server that cryptographically verifies that data and 
software are running inside the TEE and lists all software running on it.

On Confer, remote attestation allows anyone to reproduce the bit-by-bit outputs 
that confirm that the publicly available proxy and 
image software?and only that software?is running on the server. To further 
verify Confer is running as promised, each release is 
digitally signed and published in a transparency log.

Native support for Confer is available in the most recent versions of macOS, 
iOS, and Android. On Windows, users must install a 
third-party authenticator. Linux support also doesn?t exist, although this 
extension bridges that gap.
There are other private LLMs, but none from the big players

Another publicly available LLM offering E2EE is Lumo, provided by Proton, a 
European company that?s behind the popular encrypted 
email service. It adopts the same encryption engine used by Proton Mail, Drive, 
and Calendar. The internals of the engine are 
considerably more complicated than Confer because they rely on a series of both 
symmetric and asymmetric keys. The end result for 
the user is largely the same, however.

Once a user authenticates to their account, Proton says, all conversations, 
data, and metadata is encrypted with a symmetrical key 
that only the user has. Users can opt to store the encrypted data on Proton 
servers for device syncing or have it wiped immediately 
after the conversation is finished.

A third LLM provider promising privacy is Venice. It stores all data locally, 
meaning on the user device. No data is stored on the 
remote server.

Most of the big LLM platforms offer a means for users to exempt their 
conversations and data for marketing and training purposes. 
But as noted earlier, these promises often come with major carve-outs. Besides 
selected review by humans, personal data may still be 
used to enforce terms of service or for other internal purposes, even when 
users have opted out of default storage.

Given today?s legal landscape?which allows most data stored online to be 
obtained with a subpoena?and the regular occurrence of 
blockbuster data breaches by hackers, there can be no reasonable expectation 
that personal data remains private.

It would be great if big providers offered end-to-end encryption protections, 
but there?s currently no indication they plan to do 
so. Until then, a handful of smaller alternatives will keep user data out of 
the ever-growing data lake.


-- 
Kim Holburn
IT Network & Security Consultant
+61 404072753
mailto:[email protected]  aim://kimholburn
skype://kholburn - PGP Public Key on request




------------------------------

Subject: Digest Footer

_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link


------------------------------

End of Link Digest, Vol 398, Issue 12
*************************************

Reply via email to