Re: [liberationtech] [Freedombox-discuss] BTNS on Freedombox

2013-06-13 Thread Eugen Leitl

Any Debian developers listening?

- Forwarded message from Jonas Smedegaard d...@jones.dk -

Date: Thu, 13 Jun 2013 01:28:18 +0200
From: Jonas Smedegaard d...@jones.dk
To: Eugen Leitl eu...@leitl.org, freedombox-disc...@lists.alioth.debian.org
Subject: Re: [Freedombox-discuss] BTNS on Freedombox
User-Agent: alot/0.3.4

Quoting Eugen Leitl (2013-06-12 20:47:07)
 On Wed, Jun 12, 2013 at 07:48:30PM +0200, Jonas Smedegaard wrote:
  Quoting Eugen Leitl (2013-06-12 17:46:54)
   Do you see why IPv4/IPv6 BTNS wouldn't be a good out-of-the box 
   feature for the Freedombox?
  
  Uhm, could you please elaborate a bit on that?
  
  Bitch That Need Slappin' and Toolbar Control and Button Styles 
  are some of the options coming up when I try figure out the meaning 
  of that acronym.
 
 Oh, right. I always thought that acronym was rather unfortunate.
 
 It's Better Than Nothing Security, http://tools.ietf.org/html/rfc5386 
 an opportunistic encryption IPsec mode that omits authentication, and 
 hence the whole PKI/DNS key publishing overhead.
 
 The result is resistant to passive taps, but not active (MITM) traffic 
 tampering on the wire (which is great, since latter is expensive, and 
 forces you to show your hand, and hence is detectable in principle, 
 which ups the stakes in the game).
 
 There are already some implementations, albeit labeled experimental. 
 It could be a low-work way to make a lot of traffic go dark, and annoy 
 some professionals.

Thanks for clarifying.

Sounds cool, but also sounds like something that needs maturing.

FreedomBox is a server engineered by us geeks to be owned fully by 
non-geeks, and therefore have *no* system administrator.  That means 
there is even less room for failure than the servers we run ourselves.

I strongly believe that any and all pieces that we put into FreedomBox 
should already be in common use among geeks.  Eat our own dog food, so 
to speak.  To me that means we can *only* include in FreedomBox what is 
in Debian.

So way forward for this is to get it into Debian.

If it is patches to kernel drivers then work with Linux upstream to get 
the code into mainline branch, as it is highly unlikely that the Debian 
kernel team will be convinced to take the burden of maintaining it on 
their own.

If it is patches to ipsec or another independent tool then file 
bugreports against the relevant package if/when mature enough for 
production use.


Parallel to that, it might make sense already now to jot it onto one of 
the wiki pages for FreedomBox, for tracking its progress.  But beware 
that FreedomBox wiki pages is *not* progress, only monitoring - always 
need action elsewhere to be of use.


Hope that helps,

 - Jonas

-- 
 * Jonas Smedegaard - idealist  Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private



- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] FW: [Ottawadissenters] Infinite Romeo: The Secret Government Program to Manipulate Dating Sites

2013-06-13 Thread michael gurstein
Now we know.

 

M

 

From: ottawadissent...@yahoogroups.com
[mailto:ottawadissent...@yahoogroups.com] On Behalf Of Steve Kurtz
Sent: Thursday, June 13, 2013 6:48 AM
Subject: [Ottawadissenters] Infinite Romeo: The Secret Government Program to
Manipulate Dating Sites

 

http://dailycurrant.com/2013/06/12/infinite-romeo-the-secret-government-prog
ram-to-manipulate-dating-sites/
http://dailycurrant.com/2013/06/12/infinite-romeo-the-secret-government-pro
gram-to-manipulate-dating-sites/?utm_source=rssutm_medium=rssutm_campaign=
infinite-romeo-the-secret-government-program-to-manipulate-dating-sites 

__._,_.___


 
http://groups.yahoo.com/group/Ottawadissenters/post;_ylc=X3oDMTJybHMxZzJjBF
9TAzk3MzU5NzE0BGdycElkAzE1MjA5MDU5BGdycHNwSWQDMTcwNTA4MzUxMgRtc2dJZAMyNTI0NQ
RzZWMDZnRyBHNsawNycGx5BHN0aW1lAzEzNzExMjA0ODc-?act=replymessageNum=25245
Reply via web post 

 
mailto:kur...@ncf.ca?subject=Re%3A%20Infinite%20Romeo%3A%20The%20Secret%20G
overnment%20Program%20to%20Manipulate%20Dating%20Sites%20 Reply to sender 

 
mailto:ottawadissent...@yahoogroups.com?subject=Re%3A%20Infinite%20Romeo%3A
%20The%20Secret%20Government%20Program%20to%20Manipulate%20Dating%20Sites%20
 Reply to group 

 
http://groups.yahoo.com/group/Ottawadissenters/post;_ylc=X3oDMTJmdTYxdTA1BF
9TAzk3MzU5NzE0BGdycElkAzE1MjA5MDU5BGdycHNwSWQDMTcwNTA4MzUxMgRzZWMDZnRyBHNsaw
NudHBjBHN0aW1lAzEzNzExMjA0ODc- Start a New Topic 

 
http://groups.yahoo.com/group/Ottawadissenters/message/25245;_ylc=X3oDMTM3Z
mlzNWprBF9TAzk3MzU5NzE0BGdycElkAzE1MjA5MDU5BGdycHNwSWQDMTcwNTA4MzUxMgRtc2dJZ
AMyNTI0NQRzZWMDZnRyBHNsawN2dHBjBHN0aW1lAzEzNzExMjA0ODcEdHBjSWQDMjUyNDU-
Messages in this topic (1) 

Recent Activity: 

 
http://groups.yahoo.com/group/Ottawadissenters;_ylc=X3oDMTJmYnFkYjlwBF9TAzk
3MzU5NzE0BGdycElkAzE1MjA5MDU5BGdycHNwSWQDMTcwNTA4MzUxMgRzZWMDdnRsBHNsawN2Z2h
wBHN0aW1lAzEzNzExMjA0ODY- Visit Your Group 

 
http://groups.yahoo.com/;_ylc=X3oDMTJlamVsc2t1BF9TAzk3NDc2NTkwBGdycElkAzE1M
jA5MDU5BGdycHNwSWQDMTcwNTA4MzUxMgRzZWMDZnRyBHNsawNnZnAEc3RpbWUDMTM3MTEyMDQ4N
w-- Yahoo! Groups

Switch to:
mailto:ottawadissenters-traditio...@yahoogroups.com?subject=Change%20Delive
ry%20Format:%20Traditional Text-Only,
mailto:ottawadissenters-dig...@yahoogroups.com?subject=Email%20Delivery:%20
Digest Daily Digest .
mailto:ottawadissenters-unsubscr...@yahoogroups.com?subject=Unsubscribe
Unsubscribe .  http://docs.yahoo.com/info/terms/ Terms of Use .
mailto:ygroupsnotificati...@yahoogroups.com?subject=Feedback%20on%20the%20r
edesigned%20individual%20mail%20v1 Send us Feedback 

.

 
http://geo.yahoo.com/serv?s=97359714/grpId=15209059/grpspId=1705083512/msgI
d=25245/stime=1371120487 

__,_._,___

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] FW: [Ottawadissenters] Infinite Romeo: The Secret Government Program to Manipulate Dating Sites

2013-06-13 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/13/2013 07:51 AM, michael gurstein wrote:
 Now we know?

Kevin Flynn...

Hee hee hee...

- -- 
The Doctor [412/724/301/703] [ZS]
Developer, Project Byzantium: http://project-byzantium.org/

PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F  DD89 3BD8 FF2B 807B 17C1
WWW: https://drwho.virtadpt.net/

So light your candles, and may SERVER protect us all. --Sean Kennedy VI

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlG53r8ACgkQO9j/K4B7F8HYbgCfXqWrWW9BI1F4f4zU0y2Nk5N2
dqcAmgP16nfQCltay6jDGycXOQffJTam
=sjDT
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Brazilian Internet Privacy Rights

2013-06-13 Thread Griffin Boyce
[From Carolina Rossini -- great to have an English translation, so thought
I'd pass it along. 3 ]

Hi all,

Taking in consideration all the recent news, I would like to share with you
the current version of the Brazilian Internet Bill of Rights (Marco Civil)
in English. This is not the same version available in the Brazilian
Congress website, it is the final version put out by House Representative
Molon (thus, newer). There is a positive right to privacy in our bill, so
it would be interesting to think if this is the time to ask the same in
other countries. Below, articles 3, 8 and 10 that deal with the issue.
Article 10 has been criticized by privacy advocates from other countries
due to log retention, but I do feel it is something that has been
incorporated in our culture, since been debated since 2000 in Brazil and
the bill also requeres court order (even before we started the Marco Civil
debate).

*Article 3 The regulation of Internet use in Brazil underlies the following
principles:*

*II – protecting privacy;*

*Article 8 Protection of the right to privacy and freedom of expression in
communications is a prerequisite for the full enforcement of the right of
access to the Internet.*

*Article 10. Record retention of Internet connection and access to
application logs, for the purposes of this Act, must protect the privacy,
private life, honor and image of the parties directly or indirectly
involved.*

*§ 1 The provider responsible for record retention will only be required to
provide the aforementioned logs, alone or combined with other information
that may help identifying a user or terminal, upon court order, as set
forth in Section IV of this Chapter.*

* *

*§ 2 Security and confidentiality measures and procedures must be
communicated by the connectivity services provider and clearly meet the
standards set forth by regulation.*

* § 3 Breach of the aforementioned confidentiality right is subject to
criminal, civil or administrative sanctions.*

I will host Mr. Molon next week in meetings at Harvard (including at
Berkman). So, if you have any thoughts or questions you want to ask him or
contributions, please let me know. Talking to his assessors, we concluded
that a letter of support, or words of support focused on how Marco Civil
creates a positive right to privacy are also timely adequate and welcomed.

Thank you,

Carol

-- 

*Carolina Rossini*
http://carolinarossini.net/
*carolina.ross...@gmail.com*
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] [cryptography] [ipv6hackers] opportunistic encryption in IPv6

2013-06-13 Thread Bill Woodcock

On Jun 12, 2013, at 4:25 PM, Nico Williams n...@cryptonector.com wrote:
 There have been many proposed ways of doing roughly the same thing.
 To my knowledge not one has succeeded wildly.  RFC5660 has not been
 implemented.  Lacking IPsec channels one needs something like CGA to
 ensure peer key/ID continuity, as otherwise IPsec only authenticates
 individual packets (and their senders), not *packet flows*, which
 wouldn't be a problem if IP addresses weren't assigned dynamically.

Any reasonable way to bootstrap this off DNSSEC and dynamic DNS in the in-addr? 
 More complicated than DANE, but if the key distribution is the hard part, and 
DNSSEC solved that, I'd rather do the hard part once and get the benefit of it 
for multiple other protocols, rather than reinvent the wheel each time.

-Bill





--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] NSA Director Alexander @ Senate Appropriations Committee (Jun 12)

2013-06-13 Thread David Golumbia
readers of this list may find interesting a brief analysis I've just posted
of the discrepancies between General Alexander's testimony and media
coverage of it--from the actual testimony it appears he did not mean to be
claiming that dozens of terrorists attacks were prevented via collection
of phone records, despite nearly every news source today using that as a
headline:

Through the PRISM of Media Distortions (of BLARNEY)
http://www.uncomputing.org/?p=262

David


On Thu, Jun 13, 2013 at 12:10 PM, Kyle Maxwell ky...@xwell.org wrote:

 Thanks for this. His comments on Guarding Privacy and Civil
 Liberties are as follows:

 Let me emphasize that our nation’s security in cyberspace is not a
 matter of resources alone. It is an enduring principle and an
 imperative. Everything depends on trust. We operate in a way that
 ensures we keep the trust of the American people because that trust is
 a sacred requirement. We do not see a tradeoff between security and
 liberty. It is not a choice, and we can and must do both
 simultaneously. The men and women of USCYBERCOM and NSA/CSS take this
 responsibility very seriously, as do I. Beyond my personal commitment
 to do this right, there are multiple oversight mechanisms in place.
 Given the nature of our work, of course, few outside of our Executive,
 Legislative and Judicial Branch oversight bodies can know the details
 of what we do or see that we operate every day under strict guidelines
 and accountability within one of the most rigorous oversight regimes
 in the U.S. Government. For those of you who do, and who have the
 opportunity to meet with the men and women of USCYBERCOM and NSA/CSS,
 you have seen for yourself how seriously we take this responsibility
 and our commitment to earning and maintaining your trust.

 Someday - not today, of course, but someday - they're going to get
 it about increased transparency. Some things will and should remain
 secret, but not anywhere near the extent of today.

 I hope that day comes sooner rather than later.

 On Wed, Jun 12, 2013 at 11:51 PM, Gregory Foster
 gfos...@entersection.org wrote:
  U.S. Senate Committee on Appropriations (Jun 12) - Hearing on
  Cybersecurity:
 
 http://www.appropriations.senate.gov/ht-full.cfm?method=hearings.viewid=33dda6f9-5d83-409d-a8c5-7ada84b0c598
 
  Complete video of the hearing and prepared testimony of each of the
  witnesses is linked here.  This previously scheduled hearing received
 some
  press today as it was General Keith B. Alexander's first public
 appearance
  since the inception of the Snowden event.
 
  The General's prepared testimony provides a useful primer on the NSA/CSS
 and
  its relationship with Cyber Command - the US military branch active in
 the
  networked domain (PDF download):
 
 http://www.appropriations.senate.gov/ht-full.cfm?method=hearings.downloadid=6ae112a2-f7e1-4c6e-92a9-bd7b16f2824e
 
  gf
 
  --
  Gregory Foster || gfos...@entersection.org
  @gregoryfoster  http://entersection.com/
 
  --
  Too many emails? Unsubscribe, change to digest, or change password by
  emailing moderator at compa...@stanford.edu or changing your settings at
  https://mailman.stanford.edu/mailman/listinfo/liberationtech
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




-- 
David Golumbia
dgolum...@gmail.com
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] NSA Director Alexander @ Senate Appropriations Committee (Jun 12)

2013-06-13 Thread Richard Brooks
Reminds me of a recent comment from someone I was
training:

Government information should be public. Personal
information should be private.

Unfortunately, we have it backwards.


On 06/13/2013 12:10 PM, Kyle Maxwell wrote:
 Thanks for this. His comments on Guarding Privacy and Civil
 Liberties are as follows:
 
 Let me emphasize that our nation’s security in cyberspace is not a
 matter of resources alone. It is an enduring principle and an
 imperative. Everything depends on trust. We operate in a way that
 ensures we keep the trust of the American people because that trust is
 a sacred requirement. We do not see a tradeoff between security and
 liberty. It is not a choice, and we can and must do both
 simultaneously. The men and women of USCYBERCOM and NSA/CSS take this
 responsibility very seriously, as do I. Beyond my personal commitment
 to do this right, there are multiple oversight mechanisms in place.
 Given the nature of our work, of course, few outside of our Executive,
 Legislative and Judicial Branch oversight bodies can know the details
 of what we do or see that we operate every day under strict guidelines
 and accountability within one of the most rigorous oversight regimes
 in the U.S. Government. For those of you who do, and who have the
 opportunity to meet with the men and women of USCYBERCOM and NSA/CSS,
 you have seen for yourself how seriously we take this responsibility
 and our commitment to earning and maintaining your trust.
 
 Someday - not today, of course, but someday - they're going to get
 it about increased transparency. Some things will and should remain
 secret, but not anywhere near the extent of today.
 
 I hope that day comes sooner rather than later.
 
 On Wed, Jun 12, 2013 at 11:51 PM, Gregory Foster
 gfos...@entersection.org wrote:
 U.S. Senate Committee on Appropriations (Jun 12) - Hearing on
 Cybersecurity:
 http://www.appropriations.senate.gov/ht-full.cfm?method=hearings.viewid=33dda6f9-5d83-409d-a8c5-7ada84b0c598

 Complete video of the hearing and prepared testimony of each of the
 witnesses is linked here.  This previously scheduled hearing received some
 press today as it was General Keith B. Alexander's first public appearance
 since the inception of the Snowden event.

 The General's prepared testimony provides a useful primer on the NSA/CSS and
 its relationship with Cyber Command - the US military branch active in the
 networked domain (PDF download):
 http://www.appropriations.senate.gov/ht-full.cfm?method=hearings.downloadid=6ae112a2-f7e1-4c6e-92a9-bd7b16f2824e

 gf

 --
 Gregory Foster || gfos...@entersection.org
 @gregoryfoster  http://entersection.com/

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Moving Martus forward

2013-06-13 Thread Collin Sullivan
Dear LibTech,

Brief update from us here at Benetech: we're pretty excited about the direction 
Martus is headed. We're working on all kinds of long-desired 
functionalities--built-in Tor integration, mobile write-only, translations, 
visualizations and onward. We've just released 4.2, with speed enhancements and 
some security improvements (and, for those interested: Burmese font 
compatibility!), and we're already working on 4.3. Have a look at what we're up 
to at https://martus.org

And, what with all the exciting work to be done, we're looking for someone to 
manage a major software and training project as we develop Martus' next 
generation. You can read about the position here: 
http://www.benetech.org/join_us/position_postings.shtml#hrppm

Please share that link around to anyone who seems a good fit or might be 
interested. And as always, we invite your input on how to make Martus better.

Cheers,
Collin



Collin Sullivan
Human Rights Program Associate
Benetech Human Rights Program

Email:  colli...@benetech.org
GPG:0x78657D4D
XMPP:   collin.sulli...@riseup.net
OTR:A0946621 68E641FA 4DFBF9F0 10B20AA9 88601348
11C7957D 5A99DAF7 1D0DD4BC EE243287 943AD67A

https://www.benetech.org - Technology Serving Humanity
https://www.martus.org - Martus Human Rights Bulletin System

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Moving Martus forward

2013-06-13 Thread kipp . guru
Awesome Collin.  Sent from my BlackBerry 10 smartphone. From: Collin SullivanSent: Thursday, 13 June 2013 21:44To: liberationtech ListReply To: liberationtechSubject: [liberationtech] Moving Martus forwardDear LibTech,Brief update from us here at Benetech: we're pretty excited about the direction Martus is headed. We'reworking on all kinds of long-desired functionalities--built-in Tor integration, mobile write-only,translations, visualizations and onward. We've just released 4.2, with speed enhancements and somesecurity improvements (and, for those interested: Burmese font compatibility!), and we're already workingon 4.3. Have a look at what we're up to athttps://martus.orgAnd, what with all the exciting work to be done, we're looking for someone to manage a major software and training project as we develop Martus' next generation. You can read about the position here:http://www.benetech.org/join_us/position_postings.shtml#hrppmPlease share that link around to anyone who seems a good fit or might be interested. And as always, we invite your input on how to make Martus better.Cheers,CollinCollin SullivanHuman Rights Program AssociateBenetech Human Rights ProgramEmail:	colli...@benetech.orgGPG:	0x78657D4DXMPP: collin.sulli...@riseup.netOTR:	A0946621 68E641FA 4DFBF9F0 10B20AA988601348	11C7957D 5A99DAF7 1D0DD4BC EE243287943AD67Ahttps://www.benetech.org- Technology Serving Humanityhttps://www.martus.org - Martus Human Rights Bulletin System

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Secure and Cheap Provider in Sweden or Iceland?

2013-06-13 Thread Lorenzo Franceschi Bicchierai
Hey guys,

In lieu of the recent NSA leaks, I'm going to transfer my website to a new
provider in either Sweden or Iceland (because well, you never know).
Griffin Boyce suggested I use moln.is, do you guys have any other
suggestion? Any other kind of advice?

Thanks!

-- 
*Lorenzo Franceschi-Bicchierai
*Mashable http://www.mashable.com Junior US  World Reporter
lore...@mashable.com | lorenzo...@gmail.com
#: (+1) 917 257 1382
Twitter: @lorenzoFB http://www.twitter.com/lorenzoFB
Skype: lorenzofb8
OTR: lorenz...@jabber.ccc.de
www.lorenzofb.com
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Moving Martus forward

2013-06-13 Thread Dirk Slater
Oh gosh, I just have to ask. Which Burmese fonts?

Dirk Slater
Lead Consultant/Founder
Fabriders
www.fabriders.net
twitter: fabrider
skype: dirkslater

On 13 Jun 2013, at 19:45, kipp.g...@gmail.com wrote:

 Awesome Collin.
 
 
 Sent from my BlackBerry 10 smartphone.
 From: Collin Sullivan
 Sent: Thursday, 13 June 2013 21:44
 To: liberationtech List
 Reply To: liberationtech
 Subject: [liberationtech] Moving Martus forward
 
 Dear LibTech,
 
 Brief update from us here at Benetech: we're pretty excited about the 
 direction Martus is headed. We're working on all kinds of long-desired 
 functionalities--built-in Tor integration, mobile write-only, translations, 
 visualizations and onward. We've just released 4.2, with speed enhancements 
 and some security improvements (and, for those interested: Burmese font 
 compatibility!), and we're already working on 4.3. Have a look at what we're 
 up to at https://martus.org
 
 And, what with all the exciting work to be done, we're looking for someone to 
 manage a major software and training project as we develop Martus' next 
 generation. You can read about the position here: 
 http://www.benetech.org/join_us/position_postings.shtml#hrppm
 
 Please share that link around to anyone who seems a good fit or might be 
 interested. And as always, we invite your input on how to make Martus better.
 
 Cheers,
 Collin
 
 
 
 Collin Sullivan
 Human Rights Program Associate
 Benetech Human Rights Program
 
 Email:colli...@benetech.org
 GPG:  0x78657D4D
 XMPP:   collin.sulli...@riseup.net
 OTR:  A0946621 68E641FA 4DFBF9F0 10B20AA9 88601348
   11C7957D 5A99DAF7 1D0DD4BC EE243287 943AD67A
 
 https://www.benetech.org - Technology Serving Humanity
 https://www.martus.org - Martus Human Rights Bulletin System
 
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Secure and Cheap Provider in Sweden or Iceland?

2013-06-13 Thread Patrick Mylund Nielsen
Sweden isn't much better when it comes to wiretapping:
https://en.wikipedia.org/wiki/FRA_law. Iceland is probably a good choice.


On Thu, Jun 13, 2013 at 2:51 PM, Lorenzo Franceschi Bicchierai 
lorenzo...@gmail.com wrote:

 Hey guys,

 In lieu of the recent NSA leaks, I'm going to transfer my website to a new
 provider in either Sweden or Iceland (because well, you never know).
 Griffin Boyce suggested I use moln.is, do you guys have any other
 suggestion? Any other kind of advice?

 Thanks!

 --
 *Lorenzo Franceschi-Bicchierai
 *Mashable http://www.mashable.com Junior US  World Reporter
 lore...@mashable.com | lorenzo...@gmail.com
 #: (+1) 917 257 1382
 Twitter: @lorenzoFB http://www.twitter.com/lorenzoFB
 Skype: lorenzofb8
 OTR: lorenz...@jabber.ccc.de
 www.lorenzofb.com

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Secure and Cheap Provider in Sweden or Iceland?

2013-06-13 Thread Bill Best
On 13 June 2013 19:51, Lorenzo Franceschi Bicchierai
lorenzo...@gmail.com wrote:
 Hey guys,

 In lieu of the recent NSA leaks, I'm going to transfer my website to a new
 provider in either Sweden or Iceland (because well, you never know). Griffin
 Boyce suggested I use moln.is, do you guys have any other suggestion? Any
 other kind of advice?

 Thanks!

 --
 Lorenzo Franceschi-Bicchierai

Hi

This company:

http://ecodissident.net/

hosts websites out of Iceland specifically because of the Icelandic
Modern Media Initiative (https://immi.is/):

Iceland will become the inverse of a tax haven; by offering
journalists and publishers some of the most powerful protections for
free speech and investigative journalism in the world. Tax havens aim
is to make everything opaque. Our aim is to make everything
transparent. — Birgitta Jónsdóttir, the chief sponsor in parliament of
the Icelandic Modern Media Initiative.

Regards

Bill Best
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Secure and Cheap Provider in Sweden or Iceland?

2013-06-13 Thread Andrés Leopoldo Pacheco Sanfuentes
About Sweden: a person from the Swedish Pirate Party, which has a
bunker data center there, was quoted in a video on Julian Assange
saying that Sweden, in security matters, is the US lapdog.
Best Regards | Cordiales Saludos | Grato,

Andrés L. Pacheco Sanfuentes
a...@acm.org
+1 (817) 271-9619


On Thu, Jun 13, 2013 at 3:01 PM, Anthony Papillion
anth...@cajuntechie.org wrote:
 On 06/13/2013 01:51 PM, Lorenzo Franceschi Bicchierai wrote:
 Hey guys,

 In lieu of the recent NSA leaks, I'm going to transfer my website to a
 new provider in either Sweden or Iceland (because well, you never know).
 Griffin Boyce suggested I use moln.is http://moln.is, do you guys have
 any other suggestion? Any other kind of advice?

 I know you're looking for out of the US providers, but why not consider
 hosting it yourself? If you've got the tech know-how, it's pretty easy
 and offers you a few more guarantees than putting it out at a provider.
 Of course, there's added costs and manpower which you may be wanting to
 avoid but, if not, why not consider that?

 A.

 --
 Anthony Papillion
 Phone:   1.918.533.9699
 SIP: sip:cajuntec...@iptel.org
 iNum:+883510008360912
 XMPP:cypherpun...@jit.si

 www.cajuntechie.org
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Secure and Cheap Provider in Sweden or Iceland?

2013-06-13 Thread Mikael Nordfeldth
2013-06-13 20:51, Lorenzo Franceschi Bicchierai skrev:
 In lieu of the recent NSA leaks, I'm going to transfer my website to a
 new provider in either Sweden or Iceland (because well, you never know).
 Griffin Boyce suggested I use moln.is http://moln.is, do you guys have
 any other suggestion? Any other kind of advice?

Hi, another choice is to find someone in Sweden willing to be your proxy
to send an encased Raspberry Pi with installed SD card and power
cable/adapter to FS Data, as they offer free (gratis) hosting with 1
Mb/s full duplex:

   Info [Swedish]: https://fsdata.se/server/raspberry-pi-colocation/
   Requirements: Only 1 per Swedish citizen. Case max size: 10x3x7 cm
   You get: 1 routable, PTR:able IP (not IPv6 yet) and 100GB/month.

Even if they would quit this gratis service after a couple of months
(remember to keep backups ;)), it'd be worth the small cost of purchase
and shipping. Their official response on the company blog is however
that they're not going to end the gratis service in the foreseeable future.

I've no idea whether FS Data are devoted to good privacy policies or
anything. But then again, I don't think those things mean a whole lot
when dealing with third-party hosting anyway. Any profit-driven company
offering a service like this will either:
   1) let the police take your computer when they come with a warrant.
   2) be raided by the police so they get whichever computer they want.

(even Bahnhof, who many will probably recommend as they have managed to
pull several PR stunts on privacy and integrity, are fully
commercial and won't stand up against the police if they have a warrant)

Another choice is just to move here. Thanks to our relatively high
taxes, we've got good healthcare and social security. You're very
welcome (and we currently are in need of some more people fighting for a
free internet, but no real panic just as of yet).

-- 
Mikael Nordfeldth
http://blog.mmn-o.se/
XMPP/mail: m...@hethane.se

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Internet blackout

2013-06-13 Thread Rich Kulawiec
On Tue, Jun 11, 2013 at 05:44:38PM -0400, Richard Brooks wrote:
 This lead me to start thinking about the possibility
 of deploying something like Fidonet as a tool for
 getting around Internet blackouts. Has anyone tried
 something like that?

Usenet has long since demonstrated the ability to route around
amazing amounts of damage and flakiness and to maintain communications
over very slow (including sneakernet) links.

Arguably, that sentence describes the normal operational state of the
network on a typical summer day just like this one, 30 years ago. ;-)

Usenet has some very nice properties for applications like this:

1. There is no centralization.  Thus there is no single target to
shut down or block.

2. Messages are not addressed to individuals.  This frustrates
some traffic analysis.

3. It's transport-agnostic.  Messages can be passed via IP, via UUCP,
by USB stick, CD, DVD, etc.

4. It's highly delay-tolerant.

5. It's content-agnostic.

6. It's highly fault-tolerant.

7. It doesn't require real-time IP connectivity.  In areas where
IP connectivity is scarce, expensive, intermittment, wiretapped
or blocked, this is a big plus.

8. It's standardized.

9. Mature open-source software already exists for it.

10. Peering relationships can be ad-hoc.

Not that it would work for this application as-is: the article
duplication method would need to be replaced because the current
one leaks origin information.  But I think that's a solvable problem.

I submitted a proposal on this very point a few months ago; haven't
heard a thing back, so my guess is that's not going anywhere.  But I
think with a relatively modest investment, the additional code could
be written and a testbed network constructed to figure out if this
really is a viable architecture.  My hunch (of course) is yes but
I'd prefer to remain skeptical until there's some experimental
evidence that it'll hold up under the kind of duress we've seen
in various countries during the past few years.

---rsk
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] The people of Turkey need you: Can you translate from Turkish to English and/or other languages?

2013-06-13 Thread Yosem Companys
From: Lydia Lorenz Lada lydial...@gmail.com

[gezipark.nadir.org] We need you: we need people who can translate
from Turkish to English or other languages. If you want to help, send
an email to gezip...@nadir.org

http://gezipark.nadir.org/index_eng.html
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Internet blackout

2013-06-13 Thread Seth David Schoen
Rich Kulawiec writes:

 Usenet has long since demonstrated the ability to route around
 amazing amounts of damage and flakiness and to maintain communications
 over very slow (including sneakernet) links.
 
 Arguably, that sentence describes the normal operational state of the
 network on a typical summer day just like this one, 30 years ago. ;-)
 
 Usenet has some very nice properties for applications like this:
 
 1. There is no centralization.  Thus there is no single target to
 shut down or block.
 
 2. Messages are not addressed to individuals.  This frustrates
 some traffic analysis.
 
 3. It's transport-agnostic.  Messages can be passed via IP, via UUCP,
 by USB stick, CD, DVD, etc.
 
 4. It's highly delay-tolerant.
 
 5. It's content-agnostic.
 
 6. It's highly fault-tolerant.
 
 7. It doesn't require real-time IP connectivity.  In areas where
 IP connectivity is scarce, expensive, intermittment, wiretapped
 or blocked, this is a big plus.
 
 8. It's standardized.
 
 9. Mature open-source software already exists for it.
 
 10. Peering relationships can be ad-hoc.

These properties are really awesome.  One thing that I'm concerned
about is that classic Usenet doesn't really do authenticity.  It
was easy for people to spoof articles, although there would be
_some_ genuine path information back to the point where the spoofed
article originated.  It seems like if we're talking about using
Usenet in an extremely hostile environment, spoofing and forgery
are pretty significant threats (including classic problems like
spoofed control messages! but also cases of nodes modifying
message content).  A lot of the great properties you've mentioned
above that Usenet has already demonstrated have more to do with
performing well over slow or unreliable network links, but perhaps
not over actively hostile ones.

Some Usenet clients support PGP signing, but that may be of limited
use unless most users can verify and generate signatures.

-- 
Seth Schoen  sch...@eff.org
Senior Staff Technologist   https://www.eff.org/
Electronic Frontier Foundation  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Agora Voting

2013-06-13 Thread Yosem Companys
From: Eduardo Robles Elvira edu...@wadobo.com

https://agoravoting.com we're currently working in version 3.0 which
will be the first cryptographically secure liquid democracy voting
system. We're going to use the open source library verificatum for
mixnets. Here is a description of the secure voting scheme [1].

We'd love to have some funded help to work on make this voting
software robust. We've been doing this for a while all in our free
time. There are tons of things to improve, audit and implement. In
fact, we spent a lot of time putting a group of institutions together
to request European Union funding but we didn't make the cut (it was
the first time I tried such a thing).

So if you are interested in our project or helping us out, please do
not hesitate to contact with me and thanks for reading =)

Regards,
--
[1] 
https://blog.agoravoting.com/index.php/2013/01/03/agora-a-virtual-parliament/
--
Eduardo Robles Elvira +34 668 824 393skype: edulix2
http://www.wadobo.comit's not magic, it's wadobo!--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Moving Martus forward

2013-06-13 Thread Collin Sullivan

On Jun 13, 2013, at 10:15 PM, Dirk Slater wrote:

Which Burmese fonts?

Zawgyi.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Schrodinger’s Catnip: Questions Answers on NSA Data Collection

2013-06-13 Thread Yosem Companys
From: Mark Rasch mdra...@aol.com

Schrodinger’s Catnip

DISCLAIMER: I know nothing about the NSA surveillance programs other
than what I read in the papers.  Thus, my legal analysis of the
program may be completely wrong, since they are highly fact dependent.

The NSA programs to retrieve and analyze telephone metadata and
internet communications and files (the former I will call the
telephony program, the latter codenamed PRISM) are at one and the same
time narrow and potentially reasonably designed programs aimed at
obtaining potentially useful information within the scope of the
authority granted by Congress.  They are, at one and the same time
perfectly legal and grossly unconstitutional.  It’s not that I am of
two opinions about these programs.  It is that the character of these
programs are such that they have both characteristics at the same
time.  Like Schrodinger’s cat, they are both alive and dead at the
same time – and a further examination destroys the experiment.

Let’s look at the telephony program first.  Telephone companies, in
addition to providing services, collect a host of information about
the customer including their name, address, billing and payment
information (including payment method, payment history, etc.).  When
the telephone service is used, the phone company collects records of
when, where and how it was used – calls made (or attempted), received,
telephone numbers, duration of calls, time of day of calls, location
of the phones from which the calls were made,  and other information
you might find on your telephone bill.  In addition, the phone company
may collect certain technical information – for example, if you use a
cell phone, the location of the cell from which the call was made, and
the signal strength to that cell tower or others.  From this signal
strength, the phone company can tell reasonably precisely where the
caller is physically located (whether they are using the phone or not)
even if the phone does not have GPS.  In fact, that is one of the ways
that the Enhanced 911 service can locate callers.

The phone company creates these records for its own business purposes.
 It used to collect this primarily for billing, but with unlimited
landline calling, that need has diminished.  However, the phone
companies still collect this data to do network engineering, load
balancing and other purposes.  They have data retention and
destruction policies which may keep the data for as short as a few
days, or as long as several years, depending on the data.  Similar
“metadata” or non-content information is collected about other uses of
the telephone networks, including SMS message headers and routing
information.

Continuing with the Schrödinger analogy, the law says that this is
private personal information, which the consumer does not own and for
which the consumer has no expectation of privacy.  Is that clear?
Federal law http://www.law.cornell.edu/uscode/text/47/222 calls this
telephone metadata “Consumer Proprietary Network Information” or CPNI.
 47 U.S.C. 222 (c)(1) provides that:

Except as required by law or with the approval of the customer, a
telecommunications carrier that receives or obtains customer
proprietary network information by virtue of its provision of a
telecommunications service shall only use, disclose, or permit access
to individually identifiable customer proprietary network information
in its provision of (A) the telecommunications service from which such
information is derived, or (B) services necessary to, or used in, the
provision of such telecommunications service, including the publishing
of directories.

Surprisingly, the exceptions to this prohibition do not include a
specific “law enforcement” or “authorized intelligence activity”
exception.  Thus, if the disclosure of consumer CPNI to the NSA under
the telephony program is “required by law” then the phone company can
do it.  If not, it can’t.  But wait, there’s more.

At the same time that the law says that consumer’s telephone metadata
is private, it also says that consumers have no expectation of privacy
in that data.  In a landmark 1979  decision,
http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=usvol=442invol=735
the United States Supreme Court held that the government could use a
simple subpoena (rather than a search warrant) to obtain the telephone
billing records of a consumer.  See, these aren’t the consumer’s
records.  They are the phone company’s records.  The Court noted, “we
doubt that people in general entertain any actual expectation of
privacy in the numbers they dial. All telephone users realize that
they must convey phone numbers to the telephone company, since it is
through telephone company switching equipment that their calls are
completed. All subscribers realize, moreover, that the phone company
has facilities for making permanent records of the numbers they dial,
for they see a list of their long-distance (toll) calls on their
monthly bills.”  The court went 

[liberationtech] Fwd: Schrodinger’s Catnip: Questions Answers on NSA Data Collection

2013-06-13 Thread Gregory Foster

Thank you for forwarding this, Yosem.

For reference, here's the article online:
http://www.raschcyber.com/1/post/2013/06/schrodingers-cat-nip.html

The blog byline credits Mark Rasch and Sophia N. Hannah - and suggests 
that the authors are working on an analysis of PRISM, which I hope will 
also be forwarded to LibTech upon release.


FYI, I've taken the liberty of replacing the original text forwarded to 
the list with a copy of the online text because the original character 
encoding introduced artifacts which made subsequent forwards hard to 
read.  It also looks like there may have been subsequent edits.


Thanks to the authors for this helpful analysis -
gf


 Original Message 
Subject: 	[liberationtech] Schrodinger’s Catnip: Questions  Answers on 
NSA Data Collection

Date:   Thu, 13 Jun 2013 20:09:23 -0700 (PDT)
From:   Yosem Companys compa...@stanford.edu
Reply-To:   liberationtech liberationtech@lists.stanford.edu
To: Liberation Technologies liberationtech@lists.stanford.edu
CC: Mark Rasch mdra...@aol.com



From: Mark Rasch mdra...@aol.com

Schrodinger'€™s Catnip

DISCLAIMER: I know nothing about the NSA surveillance programs other
than what I read in the papers.  Thus, my legal analysis of the
program may be completely wrong, since they are highly fact dependent.

The NSA programs to retrieve and analyze telephone metadata and internet
communications and files (the former I will call the telephony program, the
latter codenamed PRISM) are at one and the same time narrow and potentially
reasonably designed programs aimed at obtaining potentially useful information
within the scope of the authority granted by Congress.  They are, at one and the
same time perfectly legal and grossly unconstitutional.  It’s not that I am of
two opinions about these programs.  It is that the character of these programs
are such that they have both characteristics at the same time.  Like
Schrodinger’s cat, they are both alive and dead at the same time – and a further
examination destroys the experiment.

Let’s look at the telephony program first.  Telephone companies, in addition to
providing services, collect a host of information about the customer including
their name, address, billing and payment information (including payment method,
payment history, etc.).  When the telephone service is used, the phone company
collects records of when, where and how it was used – calls made (or attempted),
received, telephone numbers, duration of calls, time of day of calls, location
of the phones from which the calls were made,  and other information you might
find on your telephone bill.  In addition, the phone company may collect certain
technical information – for example, if you use a cell phone, the location of
the cell from which the call was made, and the signal strength to that cell
tower or others.  From this signal strength, the phone company can tell
reasonably precisely where the caller is physically located (whether they are
using the phone or not) even if the phone does not have GPS.  In fact, that is
one of the ways that the Enhanced 911 service can locate callers.

The phone company creates these records for its own business purposes.  It used 
to
collect this primarily for billing, but with unlimited landline calling, that
need has diminished.  However, the phone companies still collect this data to do
network engineering, load balancing and other purposes.  They have data
retention and destruction policies which may keep the data for as short as a few
days, or as long as several years, depending on the data.  Similar “metadata” or
non-content information is collected about other uses of the telephone networks,
including SMS message headers and routing information.

Continuing with the Schrödinger analogy, the law says that this is private
personalinformation, which the consumer does not own and for which the consumer
has no expectation of privacy.  Is that clear?  Federal law 
http://www.law.cornell.edu/uscode/text/47/222calls this telephone metadata 
“Consumer Proprietary Network Information” or CPNI. 47 U.S.C. 222 (c)(1) 
provides that:

Except as required by law or with the approval of the customer, a 
telecommunications
carrier that receives or obtains customer proprietary network information by
virtue of its provision of a telecommunications service shall only use,
disclose, or permit access to individually identifiable customer proprietary
network information in its provision of (A) the telecommunications service from
which such information is derived, or (B) services necessary to, or used in, the
provision of such telecommunications service, including the publishing of
directories.

Surprisingly, the exceptions to this prohibition do not include a specific “law 
enforcement”or
“authorized intelligence activity” exception.  Thus, if the disclosure of
consumer CPNI to the NSA under the telephony program is “required by law” then
the phone company can do it.  If not, it