Re: [liberationtech] Fwd: [riseup] Space for dissent

2013-08-22 Thread Ben Laurie
So where are these radically new services documented?


On 21 August 2013 19:18, Sean Alexandre s...@alexan.org wrote:

 - Forwarded message from newslet...@lists.riseup.net -

 Space for dissent
 

 It is a mistake to frame the recent US and European massive surveillance
 revelations in terms of the privacy of individuals. What is at stake is not
 privacy at all, but the power of the state over its citizenry.

 What surveillance really is, at its root, is a highly effective form of
 social
 control. The knowledge of always being watched changes our behavior and
 stifles
 dissent. The inability to associate secretly means there is no longer any
 possibility for free association. The inability to whisper means there is
 no
 longer any speech that is truly free of coercion, real or implied. Most
 profoundly, pervasive surveillance threatens to eliminate the most vital
 element of both democracy and social movements: the mental space for
 people to
 form dissenting and unpopular views.

 Many commentators, and Edward Snowden himself, have noted that these
 surveillance programs represent an existential threat to democracy. This
 understates the problem. The universal surveillance programs in place now
 are
 not simply a potential threat, they are certain to destroy democracy if
 left
 unchecked. Democracy, even the shadow of democracy we currently practice,
 rests
 on the bedrock foundation of free association, free speech, and dissent.
 The
 consequence of the coercive power of surveillance is to subvert this
 foundation
 and undermine everything democracy rests on.

 Within social movements, there is a temptation to say that nothing is
 really
 different. After all, governments have always targeted activist groups with
 surveillance and disruption, especially the successful ones.

 But this new surveillance is different. What the US government and European
 allies have built is an infrastructure for perfect social control. By
 automating the process of surveillance, they have created the ability to
 effortlessly peer into the lives of everyone, all the time, and thus create
 a system with unprecedented potential for controlling how we behave and
 think.

 True, this infrastructure is not currently used in this way, but it is
 a technical tool-kit that can easily be used for totalitarian ends.

 Those who imagine a government can be trusted to police itself when given
 the
 ominous power of precise insight into the inner workings of everyday life
 are
 betting the future on the ability of a secretive government to show proper
 self-restraint in the use of their ever-expanding power. If history has
 shown
 us anything, it is that the powerful will always use their full power
 unless
 they are forced to stop.

 So, how exactly are we planning on stopping them? We support people working
 through the legal system or applying political pressure, but we feel our
 best
 hope of stopping the technology of surveillance is the technology of
 encryption. Why? Because the forces that have created this brave new world
 are
 unlikely to be uprooted before it is too late to halt the advance of
 surveillance.

 Unfortunately, most existing encryption technology is counterproductive.
 Many
 people are pushing technology that is proprietary, relies on a central
 authority, or is hopelessly difficult for the common user. The only
 technology
 that has a chance to resist the rise of surveillance will be open source,
 federated, and incredibly easy to use. In the long run, decentralized
 peer-to-peer tools might meet this criteria, but for the foreseeable future
 these tools will not have the features or usability that people have grown
 accustomed to.

 In the coming months, the Riseup birds plan to begin rolling out a series
 of
 radically new services, starting with encrypted internet, encrypted email,
 and
 encrypted chat. These services will be based on 100% open source and open
 protocols, will be easy to use, and will protect your data from everyone,
 even
 Riseup. This is a massive undertaking, made in concert over the last year
 with
 several other organizations, and will only work with your support. We need
 programmers, particularly those experienced in Python, C, Ruby, and Android
 development, and sysadmins interested in starting their own secure service
 providers.

 We also need money. Donations from our amazing Riseup users keep us
 running on
 our current infrastructure. But in order to be able to graduate to a new
 generation of truly secure and easy to use communication technology, we are
 going to need a lot more money than our users are able to donate. If you
 have
 deep pockets and an interest in building this new generation of
 communication,
 then we need to hear from you. If you have friends or family who care
 about the
 future of democracy and who have deep pockets, we need to hear from them,
 too.

 At Riseup, we have felt for the last few years that the window of
 

Re: [liberationtech] Bradley Manning's sentence: 35 years for exposing us to the truth

2013-08-22 Thread André Rebentisch

On Aug 21, 2013, at 5:32 PM, Shelley shel...@misanthropia.info wrote:

 Outrageous.
 
 http://www.theguardian.com/commentisfree/2013/aug/21/bradley-manning-sentence-birgitta-jonsdottir
 
 Bradley Manning's sentence: 35 years for exposing us to the truth

From a security perspective the issue is that a soldier of his low rank could 
do that and apparently it is uncommon in the nation that superiors take 
political responsibility for critical failures, here of security architecture. 
What he did was clearly above his pay grade. The whole disproportionate 
treatment serves deterrence purposes. Puts it in a bad light.

See also the piece of Sandra Coliver for OSI, she compares penal sanctions for 
corresponding crimes in other occidental nations:
http://www.opensocietyfoundations.org/voices/sentencing-private-manning

Best, A-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] Is email Dead? Surveillance Inevitable? Introducing Project Caliop

2013-08-22 Thread Félix Tréguer
You might find this of interest:

/Project Caliop aims at providing tools and a platform for email
users can trust, guaranteeing by design the confidentiality of
communications. In the context of revelations about PRISM showing
that users cannot trust advertisement-based services such as Gmail,
and in the wake of the recent shutdown of secure mail services,
Caliop aims at rethinking the infrastructure for secure email
communications. Caliop founder Laurent Chemla calls on contributions
to the initial specifications.//
//...//
//Citizens from all across the Internet are invited to join the
Caliop bootstrap //mailing-list
mailto:talks-requ...@caliop.net?subject=subscribe//to discuss the
initial specifications before they are published on
//http://www.caliop.net//.//
/

http://www.caliop.net/is-email-dead-surveillance-inevitable-introducing-project-caliop/

Félix
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] Deterministic Builds Part One: Cyberwar and Global Compromise

2013-08-22 Thread Jacob Appelbaum
Hi,

I think a lot of people would benefit from reading Mike Perry's latest
blog post. He addresses how The Tor Project is working towards the
problems referenced by Zooko in his latest open letter to Silent Circle:


https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise

Current popular software development practices simply cannot survive
targeted attacks of the scale and scope that we are seeing today. 

All the best,
Jacob
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


[liberationtech] New Zealand

2013-08-22 Thread Richard Brooks
What do you do if the government is caught illegally spying on citizens?
Change the laws:
http://www.globalpost.com/dispatch/news/afp/130821/new-zealand-passes-law-allowing-domestic-spying?goback=.gde_1836487_member_267577237#!
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


[liberationtech] NSA's 100% perfect internal audits...

2013-08-22 Thread Case Black
http://www.techdirt.com/articles/20130820/15441924258/us-still-cant-figure-out-what-snowden-took-what-happened-to-those-perfect-audits.shtml

Remember how the NSA's biggest defenders keep insisting that the NSA's
perfect audits prevent abuse? Here's Keith Alexander insisting that
such audits
are 
perfecthttp://www.theatlantic.com/politics/archive/2013/08/can-nsa-director-keith-alexander-explain-his-contradictory-claims/278394/
:

*The assumption is our people are just out there wheeling and dealing.
Nothing could be further from the truth. We have tremendous oversight over
these programmes. We can audit the actions of our people 100%, and we do
that, he said.

Addressing the Black Hat convention in Las Vegas, an annual gathering for
the information security industry, he gave a personal example: I have four
daughters. Can I go and intercept their emails? No. The technical
limitations are in there. Should anyone in the NSA try to circumvent that,
in defiance of policy, they would be held accountable, he said: There is
100% audibility. Only 35 NSA analysts had the authority to query a
database of US phone records, he said.*

Yet, many months after the initial leaks, it's being reported that the US
government still doesn't know what Snowden
tookhttp://investigations.nbcnews.com/_news/2013/08/20/20108770-us-doesnt-know-what-snowden-took-sources-say?lite
:

*More than two months after documents leaked by former contractor Edward
Snowden first began appearing in the news media, the National Security
Agency still doesn’t know the full extent of what he took, according to
intelligence community sources, and is “overwhelmed” trying to assess the
damage.*
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] NSA's 100% perfect internal audits...

2013-08-22 Thread Eugen Leitl
On Thu, Aug 22, 2013 at 11:36:37AM -0500, Case Black wrote:

 Addressing the Black Hat convention in Las Vegas, an annual gathering for
 the information security industry, he gave a personal example: I have four
 daughters. Can I go and intercept their emails? No. The technical
 limitations are in there. Should anyone in the NSA try to circumvent that,

Are you actually spending a minute of your time listening to a known
liar? The spooks lie all the time. It's their job. Don't fall for it.

 in defiance of policy, they would be held accountable, he said: There is
 100% audibility. Only 35 NSA analysts had the authority to query a
 database of US phone records, he said.*
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Bradley Manning's sentence: 35 years for exposing us to the truth

2013-08-22 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 08/21/2013 04:59 PM, Shelley wrote:
 Sure, but I think Manning has a zero chance of obtaining a pardon.

Examples needed to be made to dissuade anybody else from doing
something similar.  Manning was the example.  There will probably be
another such example in four or five years, after most people have
forgotten and gone on with their lives.

- -- 
The Doctor [412/724/301/703] [ZS]
Developer, Project Byzantium: http://project-byzantium.org/

PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F  DD89 3BD8 FF2B 807B 17C1
WWW: https://drwho.virtadpt.net/

It appears my producers set this up.  They set /me/ up. --Anthony
Bourdain

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlIWSqcACgkQO9j/K4B7F8FsLgCgvTLia6mx1hXaQ+ZFcHraHGK8
qqMAnRyJykQQLCHMmXEj11e83wO1gESY
=miRw
-END PGP SIGNATURE-
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] NSA's 100% perfect internal audits...

2013-08-22 Thread Case Black
You are quite correct! Being in the operational side of intelligence
requires one to be adept at deception. And clearly the current NSA
leadership has fallen far below the standards of such predecessors as Bobby
Inman when comes to not injecting open deception into the arena of public
policy debate.

It's very useful to point out that fact; however, the members of this list
are uniquely qualified to influence that policy debate in terms of shaping
both hard and soft policy in far more substantial ways.

We can shape soft policy by expanding the selectorate[1] willing to
influence the political leadership to better circumscribe domestic
surveillance capabilities. It's important to keep the focus on capabilities
rather than intentions and assurances. And on the long range danger of
having these surveillance databases in existence and their inevitable use
to warp the political process in dark and dangerous ways[2].

Hard policy is shaped by changing the technological landscape...by altering
the very ground surveillance agencies stand on. The support of more and
better privacy and encryption projects with less juvenile sniping, less
gotcha behavior and more genuine mutual help and support for relevant
projects has the chance to fundamentally alter that landscape. It happened
during the Crypto Wars of the 1990's[3] and it can happen again.

There's massive experience and expertise on this list. Many of us have deep
crypto and technology backgrounds and many of us were foot soldiers on the
ground during the earlier Crypto Wars. And that war is CLEARLY NOT OVER[4].

---

[1] http://en.wikipedia.org/wiki/Selectorate_theory
[2] http://www.salon.com/2011/11/15/the_long_shadows_of_nixon_and_hoover

[3] http://wiki.openrightsgroup.org/wiki/Crypto_Wars
[4] http://www.fipr.org/press/050525crypto.html


On Thu, Aug 22, 2013 at 11:58 AM, Eugen Leitl eu...@leitl.org wrote:

 On Thu, Aug 22, 2013 at 11:36:37AM -0500, Case Black wrote:

  Addressing the Black Hat convention in Las Vegas, an annual gathering for
  the information security industry, he gave a personal example: I have
 four
  daughters. Can I go and intercept their emails? No. The technical
  limitations are in there. Should anyone in the NSA try to circumvent
 that,

 Are you actually spending a minute of your time listening to a known
 liar? The spooks lie all the time. It's their job. Don't fall for it.

  in defiance of policy, they would be held accountable, he said: There is
  100% audibility. Only 35 NSA analysts had the authority to query a
  database of US phone records, he said.*
 --
 Liberationtech is a public list whose archives are searchable on Google.
 Violations of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech.
 Unsubscribe, change to digest, or change password by emailing moderator at
 compa...@stanford.edu.

-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] Open Whisper Systems' neat asynch FPS pre-keying

2013-08-22 Thread Joseph Lorenzo Hall
https://whispersystems.org/blog/asynchronous-security/

...

The TextSecure Protocol

TextSecure’s upcoming iOS client (and Android data channel client) uses
a simple trick to provide asynchronous messaging while simultaneously
providing forward secrecy.

At registration time, the TextSecure client preemptively generates 100
signed key exchange messages and sends them to the server. We call these
“prekeys.” A client that wishes to send a secure message to a user for
the first time can now:

1.  Connect to the server and request the destination’s next “prekey.”
2.  Generate its own key exchange message half.
3.  Calculate a shared secret with the prekey it received and its own
key exchange half.
4.  Use the shared secret to encrypt the message.
5.  Package up the prekey id, the locally generated key exchange
message, and the ciphertext.
6.  Send it all in one bundle to the destination client.

The user experience for the sender is ideal: they type a message, hit
send, and an encrypted message is immediately sent.

The destination client receives all of this as a single push
notification. When the user taps it, the client has everything it needs
to calculate the key exchange on its end, immediately decrypt the
ciphertext, and display the message.

With the initial key exchange out of the way, both parties can then
continue communicating with an OTR-style protocol as usual. Since the
server never hands out the same prekey twice (and the client would never
accept the same prekey twice), we are able to provide forward secrecy in
a fully asynchronous environment.

-- 
Joseph Lorenzo Hall
Senior Staff Technologist
Center for Democracy  Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
j...@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: BE7E A889 7742 8773 301B 4FA1 C0E2 6D90 F257 77F8


-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


[liberationtech] Hey Silicon Valley! Not every problem can be solved by giving people internet access or teaching them to code [feedly]

2013-08-22 Thread Amin Sabeti

  
 
Shared via feedly // published on GigaOM // visit site
Hey Silicon Valley! Not every problem can be solved by giving people internet 
access or teaching them to code
This might go without saying, but I’m probably one of the biggest boosters of 
technology there is, especially when it comes to the benefits of internet 
access and the startup ecosystem that has grown up around it: it’s what I write 
about, I use the internet and mobile technology all day, and I think internet 
access should probably be a human right. But even I know that there are some 
problems in the world — and some fairly significant ones — that can’t be solved 
by simply giving people internet access and teaching them how to code.

Unfortunately, Facebook founder Mark Zuckerberg and some tech entrepreneurs 
either don’t know this or are deliberately choosing to ignore it. And by doing 
so, they are only reinforcing the image of Silicon Valley and the 
technology-startup scene as a bubble of unrealistic expectations, if not 
outright blinkered ignorance about the world around it.

Zuckerberg’s new venture, known as Internet.org, is a joint project aimed at 
bringing easy and/or cheap internet access to those who don’t have it — 
primarily in non-Western countries — and arrived wrapped in a motivational and 
humanitarian-themed video that was largely based on some sections of a speech 
by John F. Kennedy (sections that were chosen rather selectively, as Alexis 
Madrigal notes in a post at The Atlantic). In this vision, internet access 
pretty much solves everything, and makes people’s lives immeasurably awesome:

Homelessness is not a “glitch”

The other exhibit in my Silicon Valley bubble-mentality case comes from 
entrepreneur Patrick McConlogue, who wrote a spectacularly thoughtless post for 
Medium — not the first one from a young entrepreneur, I should note — about how 
he believes that homeless people would be a lot better off if they learned how 
to program (McConlogue is a New Yorker, but I think his viewpoint is an Eastern 
extension of a common Silicon Valley mindset). He says he plans to conduct an 
experiment in which he offers a specific homeless man $100 or three books on 
JavaScript to see which he will take:

“I like to think I can see the few times when [a homeless person is] a wayward 
puzzle piece. It’s that feeling you get when you know the waiter, the cashier, 
the janitor is in the wrong place—they are smart, brilliant even. This is my 
attempt to fix one of those lost pieces.”

In an interview with the Huffington Post, the writer — a 23-year-old founder of 
Echo Republic — says that as a software engineer, “I see a glitch and I want to 
fix the glitch.” If I didn’t know better, I would think that McConlogue had 
been invented by author and internet gadfly Evgeny Morozov, who has become 
known for criticizing the technology-based mindset he calls “solutionism,” 
which sees the internet and gadgets as the answer to virtually any societal 
problem. McConlogue is like the poster child for this viewpoint.

In fact, the “technology will fix you” mentality in the piece was so 
overwhelming that at least some people in my Twitter stream thought it was a 
joke — a satire of Silicon Valley’s startup mentality and the focus on 
programming as the cure for every ill. Within a matter of hours, Harvard law 
student Sarah Jeong had created a Medium post that consisted of entries from a 
fictional advice column, where the answer to every personal problem is to learn 
how to code.

After reaching its peak at 117CE, the Roman Empire collapsed due to its total 
inability to teach its citizens to code.— 
Anil Dash (@anildash) August 22, 2013

A certain tone-deaf eagerness

Jessica Roy at Betabeat told McConlogue that “the homeless are not bit players 
in your imaginary entrepreneurial novella,” and Ezra Klein at the Washington 
Post said the most objectionable part of the essay was the writer’s attempt to 
“absorb this homeless man — a real person, with an actual history that 
McConlogue can’t really intuit by looking into his eyes — into his precanned, 
triumphant programmer narrative.” Kevin Roose at New York magazine said “Check 
back soon for McConlogue’s next post: ‘How Ruby on Rails Fixes Racism.’”

In an update and response to the outcry over his original post, McConlogue says 
he remains undaunted by the criticism he received, and that Leo — the homeless 
person he mentioned — has accepted his offer of programming instruction manuals 
and a free Chromebook instead of $100. He also says that he plans a meetup in 
New York in the future in order to “discuss some of the feedback” to his post 
and suggests this would be “a good venue for non-profits to connect around the 
issue of homelessness.”

 

It seems obvious that McConlogue’s heart is in the right place, and that he 
genuinely wants to help this young homeless man, just as it seems obvious (or 
at least arguable) that Mark Zuckerberg actually wants to try and improve 

Re: [liberationtech] Fwd: [riseup] Space for dissent

2013-08-22 Thread Sean Alexandre
On Thu, Aug 22, 2013 at 04:22:17AM -0400, Ben Laurie wrote:
 So where are these radically new services documented?

From what I understand it's this:

LEAP Encryption Access Project
https://leap.se
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Hey Silicon Valley! Not every problem can be solved by giving people internet access or teaching them to code [feedly]

2013-08-22 Thread Glassman, Michael
While I am no great fan of Silicon Valley - Silicon Valley I think does not 
equal the Internet.  What I hope we guard against with this reaction against I 
guess technological triumphalism is throwing the proverbial baby out with the 
bathwater.  I think joining the church of the savvy (a saying from journalism 
that I think can be transferred to discussions about the Internet) can be just, 
or even more dangerous than belief in the Internet as an ultimate problem 
solver.

Maybe to take the example of the homeless man as one example.  I had been a 
member of a group working with homeless youth a few years ago - in the sort of 
myspace to Facebook era.  What we found anecdote wise was that youth who had a 
presence on social network sites were able to stay more connected.  One of the 
difficulties that homeless youth face is that they lose connection to 
mainstream society because that is not where their lives take them.  This 
ability to stay at least minimally visible may or may not being a defining 
circumstance of their lives, but it seemed important.  And the reason they were 
able to do this is because libraries offered computers with free and open 
Internet access.  I have no idea what Mark Zuckerberg's motives are, but there 
is nothing wrong with Internet access.

Homeless youth are different from the adult homeless population.  I have seen 
some very good research suggesting that the most important issue in adult 
homelessness is, self evidently enough, lack of stable housing.  We somehow got 
this view of most homeless as being homeless because they have other problems.  
I think it is more likely that these other problems come from lack of stable 
housing and perceiving there are no avenues to stable housing.  There are many 
reasons for this, but I think one of the reason is that many homeless don't 
know their rights and/or what might be available to them (less and less in the 
modern U.S. I admit).  The Internet it seems to me can serve as a source of 
information, available at the same libraries as the youth use (caveat, many 
homeless youth are homeless because of other often family related problems, but 
stable housing is still extraordinarily important  and at the same time almost 
completely out of reach for this population).

Teaching a homeless man coding may have important benefits.  Somebody who is 
homeless might be better at creating connecting platforms that meet the needs 
of the homeless as opposed to say upper middle class college students.

I don't know where what seems like a snowball of Internet cynicism comes from.  
Perhaps part of it is that everybody seems to be trying to make a buck off the 
Internet and it has spawned an awful lot of e-confidence artists.  But that 
doesn't diminish the potential it has for changing the way we live in ways we 
are just beginning to recognize.

Michael

From: liberationtech-boun...@lists.stanford.edu 
[liberationtech-boun...@lists.stanford.edu] on behalf of Amin Sabeti 
[aminsab...@gmail.com]
Sent: Thursday, August 22, 2013 2:05 PM
To: liberationtech
Subject: [liberationtech] Hey Silicon Valley! Not every problem can be solved 
by giving people internet access or teaching them to code [feedly]




Shared via feedlyhttp://bit.ly/SA6Efh // published on GigaOM // visit 
sitehttp://feedproxy.google.com/~r/OmMalik/~3/Ra1oB4m44LI/
Hey Silicon Valley! Not every problem can be solved by giving people internet 
access or teaching them to code

This might go without saying, but I’m probably one of the biggest boosters of 
technology there is, especially when it comes to the benefits of internet 
access and the startup ecosystem that has grown up around it: it’s what I write 
about, I use the internet and mobile technology all day, and I think internet 
access should probably be a human 
righthttp://gigaom.com/2012/01/05/is-internet-access-a-fundamental-human-right/.
 But even I know that there are some problems in the world — and some fairly 
significant ones — that can’t be solved by simply giving people internet access 
and teaching them how to code.

Unfortunately, Facebook founder Mark Zuckerberg and some tech entrepreneurs 
either don’t know this or are deliberately choosing to ignore it. And by doing 
so, they are only reinforcing the image of Silicon Valley and the 
technology-startup scene as a bubble of unrealistic expectations, if not 
outright blinkered ignorance about the world around it.

Zuckerberg’s new venture, known as Internet.orghttp://Internet.org, is a 
joint project aimed at bringing easy and/or cheap internet 
accesshttp://gigaom.com/2013/08/20/facebook-launches-internet-org-initiative-to-connect-the-world/
 to those who don’t have it — primarily in non-Western countries — and arrived 
wrapped in a motivational and humanitarian-themed video that was largely based 
on some sections of a speech by John F. Kennedy (sections that were chosen 
rather selectively, as Alexis Madrigal notes in a 

Re: [liberationtech] Bradley Manning's sentence: 35 years for exposing us to the truth

2013-08-22 Thread Albert López
His statement:
The decisions that I made in 2010 were made out of a concern for my country and 
the world that we live in. Since the tragic events of 9/11, our country has 
been at war. We’ve been at war with an enemy that chooses not to meet us on any 
traditional battlefield, and due to this fact we’ve had to alter our methods of 
combating the risks posed to us and our way of life.I initially agreed with 
these methods and chose to volunteer to help defend my country. It was not 
until I was in Iraq and reading secret military reports on a daily basis that I 
started to question the morality of what we were doing. It was at this time I 
realized in our efforts to meet this risk posed to us by the enemy, we have 
forgotten our humanity. We consciously elected to devalue human life both in 
Iraq and Afghanistan. When we engaged those that we perceived were the enemy, 
we sometimes killed innocent civilians. Whenever we killed innocent civilians, 
instead of accepting responsibility for our conduct, we elected to hide behind 
the veil of national security and classified information in order to avoid any 
public accountability.In our zeal to kill the enemy, we internally debated the 
definition of torture. We held individuals at Guantanamo for years without due 
process. We inexplicably turned a blind eye to torture and executions by the 
Iraqi government. And we stomached countless other acts in the name of our war 
on terror.Patriotism is often the cry extolled when morally questionable acts 
are advocated by those in power. When these cries of patriotism drown our any 
logically based intentions [unclear], it is usually an American soldier that is 
ordered to carry out some ill-conceived mission.Our nation has had similar dark 
moments for the virtues of democracy—the Trail of Tears, the Dred Scott 
decision, McCarthyism, the Japanese-American internment camps—to name a few. I 
am confident that many of our actions since 9/11 will one day be viewed in a 
similar light.As the late Howard Zinn once said, There is not a flag large 
enough to cover the shame of killing innocent people.I understand that my 
actions violated the law, and I regret if my actions hurt anyone or harmed the 
United States. It was never my intention to hurt anyone. I only wanted to help 
people. When I chose to disclose classified information, I did so out of a love 
for my country and a sense of duty to others.If you deny my request for a 
pardon, I will serve my time knowing that sometimes you have to pay a heavy 
price to live in a free society. I will gladly pay that price if it means we 
could have country that is truly conceived in liberty and dedicated to the 
proposition that all women and men are created equal.




gpg --keyserver pgp.mit.edu --search-keys 
EEE5A447http://pgp.mit.edu:11371/pks/lookup?search=0xEEE5A447op=vindex


 Date: Thu, 22 Aug 2013 13:30:15 -0400
 From: dr...@virtadpt.net
 To: liberationtech@lists.stanford.edu
 Subject: Re: [liberationtech] Bradley Manning's sentence: 35 years for 
 exposing us to the truth
 
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 On 08/21/2013 04:59 PM, Shelley wrote:
  Sure, but I think Manning has a zero chance of obtaining a pardon.
 
 Examples needed to be made to dissuade anybody else from doing
 something similar.  Manning was the example.  There will probably be
 another such example in four or five years, after most people have
 forgotten and gone on with their lives.
 
 - -- 
 The Doctor [412/724/301/703] [ZS]
 Developer, Project Byzantium: http://project-byzantium.org/
 
 PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F  DD89 3BD8 FF2B 807B 17C1
 WWW: https://drwho.virtadpt.net/
 
 It appears my producers set this up.  They set /me/ up. --Anthony
 Bourdain
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v2.0.20 (GNU/Linux)
 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
 
 iEYEARECAAYFAlIWSqcACgkQO9j/K4B7F8FsLgCgvTLia6mx1hXaQ+ZFcHraHGK8
 qqMAnRyJykQQLCHMmXEj11e83wO1gESY
 =miRw
 -END PGP SIGNATURE-
 -- 
 Liberationtech is a public list whose archives are searchable on Google. 
 Violations of list guidelines will get you moderated: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
 change to digest, or change password by emailing moderator at 
 compa...@stanford.edu.
  -- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] Deterministic Builds Part One: Cyberwar and Global Compromise

2013-08-22 Thread phreedom
 I think a lot of people would benefit from reading Mike Perry's latest
 blog post. He addresses how The Tor Project is working towards the
 problems referenced by Zooko in his latest open letter to Silent Circle:

 Current popular software development practices simply cannot survive
 targeted attacks of the scale and scope that we are seeing today. 

NixOS distro[1] takes build reproducibility seriously and build determinism is 
being worked on.

I have patched the most important toolchains to not systematically introduce 
non-determinism[2]. Some of the patches are in the master branch already, some 
are in the staging branch and will be merged in a month or two. These patches 
are sufficient to make a large subset of package builds deterministic.

After the merge, I'll do another round this time fixing non-determinism due to 
quirks of build systems of specific packages. Luckily, there aren't that many 
packages like Firefox and luckily Firefox has been already tackled by someone 
else :)

I'm committed to making at least installation media, typical desktop and 
server installs fully deterministic.

[1] http://nixos.org/nixos/
[2] http://lists.science.uu.nl/pipermail/nix-dev/2013-June/011357.html
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Open Whisper Systems' neat asynch FPS pre-keying

2013-08-22 Thread Maxim Kammerer
On Thu, Aug 22, 2013 at 9:03 PM, Joseph Lorenzo Hall j...@cdt.org wrote:
 TextSecure’s upcoming iOS client (and Android data channel client) uses
 a simple trick to provide asynchronous messaging while simultaneously
 providing forward secrecy.

Not sure if I understand all iOS-related issues described, but this
seems like overcoming engineering problems with a synchronous protocol
like OTR on iOS at the expense of exposing the clients to a DOS attack
of exhausting the prekeys.

However, an asynchronous protocol does not mean that all information
must be delivered in one push. In cables communication [1], I chose
simple asynchronous messages because I don't trust complex SSL
handshakes or the cumbersome OTR protocol, and because I believe that
reliable delivery receipts and resilience to DOS attacks are as
important as the message itself. The exchange goes similar to the
following (each line describes what is sent by sender (s) / receiver
(r)) [2]:

(s) peer request
(r) certificate, signed peer key
(s) certificate, signed peer key, encrypted message+MAC
(r) receipt+MAC
(s) acknowledgement+MAC

and is similar to a state machine where each state is retried in
sender / receiver until a new state is reached. The exchange above is
somewhat implementation-specific for short requests followed by long
fetches (implementation is HTTP-based and targeted for .onions), and
for generic messages it can be reformulated as:

(s) certificate, signed peer key
(r) certificate, signed peer key
(s) encrypted message+MAC
(r) receipt+MAC
(s) acknowledgement+MAC

(In cables, username is certificate's fingerprint, so MITM'ing the
certificate is not an issue.)

So, with a centralized DB / prekeys I guess it's possible to shave off
the first two messages, but does it really matter if the protocol is
asynchronous to begin with?

[1] http://dee.su/cables
[2] https://github.com/mkdesu/cables/blob/master/doc/cable.txt

-- 
Maxim Kammerer
Liberté Linux: http://dee.su/liberte
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Open Whisper Systems' neat asynch FPS pre-keying

2013-08-22 Thread Gregory Maxwell
On Thu, Aug 22, 2013 at 11:03 AM, Joseph Lorenzo Hall j...@cdt.org wrote:
 TextSecure’s upcoming iOS client (and Android data channel client) uses
 a simple trick to provide asynchronous messaging while simultaneously
 providing forward secrecy.

I've seen people want PGP to do this before— have every encrypted and
signed message you send include a number of single use ephemeral reply
coupons, to be used instead of key agreement with a fixed key...

The primary argument against it is that if the receiver changes
systems the messages will be undecodable.  You can do things to
prevent this, like backing up your tokens, but that defeats PFS.
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] Fwd: [riseup] Space for dissent

2013-08-22 Thread elijah
On 08/22/2013 01:22 AM, Ben Laurie wrote:

 So where are these radically new services documented?

On 08/22/2013 11:50 AM, Sean Alexandre wrote:

 From what I understand it's this:
 LEAP Encryption Access Project
 https://leap.se

You are right to be skeptical, given the steady stream of snake oil
announced these days.

Here is the overview page for email:

https://leap.se/en/services/email

Technical details can be found in the links on that page. Constructive
criticism warmly encouraged.

I would say the things that distinguish the LEAP approach:

* free software client and free software turn-key infrastructure
* we are taking our time to do things the right way
* we are not ignoring the hard problems https://leap.se/en/hard-problems

-elijah


-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Fwd: [riseup] Space for dissent

2013-08-22 Thread Ximin Luo
On 23/08/13 00:02, elijah wrote:
 On 08/22/2013 01:22 AM, Ben Laurie wrote:
 
 So where are these radically new services documented?
 
 On 08/22/2013 11:50 AM, Sean Alexandre wrote:
 
 From what I understand it's this:
 LEAP Encryption Access Project
 https://leap.se
 
 You are right to be skeptical, given the steady stream of snake oil
 announced these days.
 
 Here is the overview page for email:
 
 https://leap.se/en/services/email
 
 Technical details can be found in the links on that page. Constructive
 criticism warmly encouraged.
 
 I would say the things that distinguish the LEAP approach:
 
 * free software client and free software turn-key infrastructure
 * we are taking our time to do things the right way
 * we are not ignoring the hard problems https://leap.se/en/hard-problems
 
 -elijah
 
 

I saw you guys before and remembered being impressed with the docs. The
comparison of architecture is nice and shows that you understand how your
system fits in to existing state-of-the-art solutions. They look a lot expanded
from what I remember from last time. Nice work, keep it up!

There is indeed a lot of bullshit bandwagon-jumping solutions that are in fact
harming the goal by distracting attention away from good proper efforts that
involve hard work and thoughtful research. I'm glad to see LEAP taking the slow
and steady approach.

Let the recent events inspire you, but don't let them ruin your long-term
strategy. Stay on target and don't get distracted by politics. I also hope I
can join you some time!

X

-- 
GPG: 4096R/1318EFAC5FBBDBCE
git://github.com/infinity0/pubkeys.git

-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] Open Whisper Systems' neat asynch FPS pre-keying

2013-08-22 Thread Tom Ritter
 https://whispersystems.org/blog/asynchronous-security/
 Since these key exchange parts are ephemeral, recording ciphertext traffic 
 doesn’t help a would-be adversary, since there is no durable key for them to 
 compromise in the future.

I disagree.  PFS traffic today protected with 1024-bit DH will be
readable in 10 years, if not sooner, to organizations like the NSA.
In twice that time it may be cheap enough to be decryptable on a mass
scale.

Anyway, that's a nit.  My first thought is that the nastiest part of
this protocol is that Bob (a client) is trusting the server to give it
legitimate keys for Alice (the other client.)  The server can lie, and
hand out fradulent keys (I'll call one KeyF as opposed to a legit one
KeyA).

If the server lies, Bob will send a message to Alice, encrypted to KeyF.

If the message makes it's way to Alice, she'll be confused, because
she can't decrypt it.  The server won't see it.
If the server colludes with a network attacker, Bob will send a
message encrypted to KeyF, which the network attacker sees.  The
network attacker gives the ciphertext to the server who decrypts it,
and the network attacker also blocks the message from being sent to
Alice, so Alice is non the wiser.
If the server is compelled to provide fraudulent keys for Alice, then
the network attacker presumably has the private key, decrypts it, and
doesn't deliver it.

The server introduces a central component in this network.  A
component that must be secured quite thoroughly, trusted by all the
participants, and ultimately if it's Denial-of-Serviced takes down all
users' chats*.  It would be possible to build a protocol such that the
server is federated (e.g. I run my own server, and there's an open
protocol for all OTR apps [or all TextSecure-OTR apps] to know how to
query to find my server.)  Even if Moxie didn't want to build that
into TextSecure, there's no reason other OTR apps couldn't follow a
similar prekeying design with a federated prekey server.

*Of course there ways to resist DoS, but they add engineering cost.

-tom
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.