Re: [liberationtech] The missing component: Mobile to Web interoperability (in Internet Freedom Technologies)
On Wed, Sep 25, 2013 at 9:32 PM, coderman coder...@gmail.com wrote: [... re: NSA has found a way to break Tor... ] i suspect it is the latter that is more concerning. of course NSA has the ability; but do they share it? the recent releases[0] have shown this to be more complicated than expected. in terms of sharing: other domestic agencies and some of the FVEY partners appear to be partially looped in? likely to find out more over the years,... in terms of breaking Tor: the core Tor protocol and network is described repeatedly as difficult to compromise. attacking the client, opportunistic de-anonymization, selective denial of service, and mallory-in-the-middle attacks, all appear extremely effective when they are pointed at Tor users of interest. Tor's dependencies are failing in practice, rather than the network or protocol itself. Roger says the limited number of users targeted is reassuring, “If those documents actually represent what they can do, they are not as big an adversary as I thought,”[1] the lack of widespread de-anonymization of Tor users is an interesting situation. i do not agree that they don't have the ability. other sources clearly show their privileged positioning in the IP core for active attacks as well as the global passive DPI tapping infrastructure technically capable of linking large numbers of Tor users.[2] instead this implies that the other routes to identifying users, particularly taking advantage of the endpoint and operational risks above, are cheaper and more effective. for less effort and resources locate them via side channel tricks, infect them with spyware, and observe what they do pre-encryption-and-pre-proxy directly. it's clear to see why they've been using this approach. [here is where i plug Qubes Tor VM, Tails, Whonix] so after addressing the client side weaknesses, perhaps the elligator datagram based effort[3] will be making progress in time to thwart this new adversary model as the low hanging fruit of Tor client cracking dries up... ;) best regards, 0. NSA Tor dox: http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_print.html http://cryptome.org/2013/10/nsa-iat-tor.pdf http://cryptome.org/2013/10/nsa-tor.pdf http://cryptome.org/2013/10/gchq-mullenize.pdf http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf http://cryptome.org/2013/10/nsa-tor-stinks.pdf http://cryptome.org/2013/10/packet-stain/packet-staining.htm 1. Secret NSA documents show campaign against Tor encrypted network http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_print.html 2. passing the buck on the math; the details you need: https://metrics.torproject.org/index.html / https://trac.torproject.org/projects/tor/ticket/6443 , answer for the question: what is the probability of picking a guard and exit relay using any of five-eyes-and-their-friendlies AS'es, or that travels transoceanic cables at these points, or uses guard and exit relays hosted at an IX under legally compelled (FVEY) or unaware collaboration (e.g. Belgacom)? 3. sorry, no; there is no Tor datagram protocol in the works yet, however initial considerations are in progress: Implement and experiment with one or more datagram-based designs https://trac.torproject.org/projects/tor/ticket/4684 http://www.cl.cam.ac.uk/~sjm217/papers/tor11datagramcomparison.pdf this is summarized as picking from multiple hard to very hard options. i'm fond of even more difficulty, and combining these techniques and others (multi-path SCTP in userspace, client-side traffic shaping/prioritization, stochastic fair queuing and packet reordering, etc) for better protection against traffic analysis and active attacks might take a while to code up *grin* -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
[liberationtech] Bruce Schneier on the good, old air gap
http://www.wired.com/opinion/2013/10/149481/ Want to Evade NSA Spying? Don’t Connect to the Internet BY BRUCE SCHNEIER 10.07.13 6:30 AM Photo: Ariel Zambelich / WIRED; Illustration: Ross Patton / WIRED Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA. The advice I shared included using Tor, preferring certain cryptography over others, and using public-domain encryption wherever possible. I also recommended using an air gap, which physically isolates a computer or local network of computers from the internet. (The name comes from the literal gap of air between the computer and the internet; the word predates wireless networks.) But this is more complicated than it sounds, and requires explanation. Since we know that computers connected to the internet are vulnerable to outside hacking, an air gap should protect against those attacks. There are a lot of systems that use — or should use — air gaps: classified military networks, nuclear power plant controls, medical equipment, avionics, and so on. Osama Bin Laden used one. I hope human rights organizations in repressive countries are doing the same. Air gaps might be conceptually simple, but they’re hard to maintain in practice. The truth is that nobody wants a computer that never receives files from the internet and never sends files out into the internet. What they want is a computer that’s not directly connected to the internet, albeit with some secure way of moving files on and off. But every time a file moves back or forth, there’s the potential for attack. And air gaps have been breached. Stuxnet was a U.S. and Israeli military-grade piece of malware that attacked the Natanz nuclear plant in Iran. It successfully jumped the air gap and penetrated the Natanz network. Another piece of malware named agent.btz, probably Chinese in origin, successfully jumped the air gap protecting U.S. military networks. These attacks work by exploiting security vulnerabilities in the removable media used to transfer files on and off the air gapped computers. Bruce Schneier is a security technologist and author. His latest book is Liars and Outliers: Enabling the Trust Society Needs to Survive. Since working with Snowden’s NSA files, I have tried to maintain a single air-gapped computer. It turned out to be harder than I expected, and I have ten rules for anyone trying to do the same: 1. When you set up your computer, connect it to the internet as little as possible. It’s impossible to completely avoid connecting the computer to the internet, but try to configure it all at once and as anonymously as possible. I purchased my computer off-the-shelf in a big box store, then went to a friend’s network and downloaded everything I needed in a single session. (The ultra-paranoid way to do this is to buy two identical computers, configure one using the above method, upload the results to a cloud-based anti-virus checker, and transfer the results of that to the air gap machine using a one-way process.) 2. Install the minimum software set you need to do your job, and disable all operating system services that you won’t need. The less software you install, the less an attacker has available to exploit. I downloaded and installed OpenOffice, a PDF reader, a text editor, TrueCrypt, and BleachBit. That’s all. (No, I don’t have any inside knowledge about TrueCrypt, and there’s a lot about it that makes me suspicious. But for Windows full-disk encryption it’s that, Microsoft’s BitLocker, or Symantec’s PGPDisk — and I am more worried about large U.S. corporations being pressured by the NSA than I am about TrueCrypt.) 3. Once you have your computer configured, never directly connect it to the internet again. Consider physically disabling the wireless capability, so it doesn’t get turned on by accident. 4. If you need to install new software, download it anonymously from a random network, put it on some removable media, and then manually transfer it to the air gapped computer. This is by no means perfect, but it’s an attempt to make it harder for the attacker to target your computer. 5. Turn off all auto-run features. This should be standard practice for all the computers you own, but it’s especially important for an air-gapped computer. Agent.btz used autorun to infect U.S. military computers. 6. Minimize the amount of executable code you move onto the air-gapped computer. Text files are best. Microsoft Office files and PDFs are more dangerous, since they might have embedded macros. Turn off all macro capabilities you can on the air-gapped computer. Don’t worry too much about patching your system; in general, the risk of the executable code is worse than the risk of not having your patches up to date. You’re not on the internet, after all. 7. Only use trusted media to move files on and off air-gapped computers. A USB stick you purchase from a store is safer than one given to you by someone you don’t
[liberationtech] Ideas of digital (or offline) campaign tactics in 8 different countries
From: Guppi Bola gkb...@googlemail.com I'm working on a youth activist training programme in Nairobi this December with participants from eight different countries: Niger Mali Tanzania Georgia Nepal Afghanistan Pakistan Vietnam Before I begin developing the training content, I wanted to get an idea of what technologies and tactic have been used in the past by either traditional campaigning organisations or informal activist networks (successful or otherwise) In order to get an idea of what is worth adding as potential new tools that they can use for future campaigns If anyone has data/case-studies/contacts with those eight countries in particular I'd be really grateful. The activists are all working on Health, Education and Sexual Reproductive Health Rights, but I am happy to explore tactics that have been used for different issues such as environment/justice/trade etc Thanks a gazillion! Guppi Bola -- Guppi Bola l @guppikb l skype:guppibola l +447761 731153 -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] Bruce Schneier on the good, old air gap
On Mon, Oct 7, 2013 at 5:16 PM, Eugen Leitl eu...@leitl.org wrote: http://www.wired.com/opinion/2013/10/149481/ Want to Evade NSA Spying? Don’t Connect to the Internet BY BRUCE SCHNEIER 10.07.13 6:30 AM Photo: Ariel Zambelich / WIRED; Illustration: Ross Patton / WIRED Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA. The advice I shared included using Tor, preferring certain cryptography over others, and using public-domain encryption wherever possible. I also recommended using an air gap, which physically isolates a computer or local network of computers from the internet. (The name comes from the literal gap of air between the computer and the internet; the word predates wireless networks.) But this is more complicated than it sounds, and requires explanation. Since we know that computers connected to the internet are vulnerable to outside hacking, an air gap should protect against those attacks. There are a lot of systems that use — or should use — air gaps: classified military networks, nuclear power plant controls, medical equipment, avionics, and so on. Osama Bin Laden used one. I hope human rights organizations in repressive countries are doing the same. Air gaps might be conceptually simple, but they’re hard to maintain in practice. The truth is that nobody wants a computer that never receives files from the internet and never sends files out into the internet. What they want is a computer that’s not directly connected to the internet, albeit with some secure way of moving files on and off. But every time a file moves back or forth, there’s the potential for attack. And air gaps have been breached. Stuxnet was a U.S. and Israeli military-grade piece of malware that attacked the Natanz nuclear plant in Iran. It successfully jumped the air gap and penetrated the Natanz network. Another piece of malware named agent.btz, probably Chinese in origin, successfully jumped the air gap protecting U.S. military networks. These attacks work by exploiting security vulnerabilities in the removable media used to transfer files on and off the air gapped computers. Bruce Schneier is a security technologist and author. His latest book is Liars and Outliers: Enabling the Trust Society Needs to Survive. Since working with Snowden’s NSA files, I have tried to maintain a single air-gapped computer. It turned out to be harder than I expected, and I have ten rules for anyone trying to do the same: 1. When you set up your computer, connect it to the internet as little as possible. It’s impossible to completely avoid connecting the computer to the internet, but try to configure it all at once and as anonymously as possible. I purchased my computer off-the-shelf in a big box store, then went to a friend’s network and downloaded everything I needed in a single session. (The ultra-paranoid way to do this is to buy two identical computers, configure one using the above method, upload the results to a cloud-based anti-virus checker, and transfer the results of that to the air gap machine using a one-way process.) 2. Install the minimum software set you need to do your job, and disable all operating system services that you won’t need. The less software you install, the less an attacker has available to exploit. I downloaded and installed OpenOffice, a PDF reader, a text editor, TrueCrypt, and BleachBit. That’s all. (No, I don’t have any inside knowledge about TrueCrypt, and there’s a lot about it that makes me suspicious. But for Windows full-disk encryption it’s that, Microsoft’s BitLocker, or Symantec’s PGPDisk — and I am more worried about large U.S. corporations being pressured by the NSA than I am about TrueCrypt.) 3. Once you have your computer configured, never directly connect it to the internet again. Consider physically disabling the wireless capability, so it doesn’t get turned on by accident. 4. If you need to install new software, download it anonymously from a random network, put it on some removable media, and then manually transfer it to the air gapped computer. This is by no means perfect, but it’s an attempt to make it harder for the attacker to target your computer. 5. Turn off all auto-run features. This should be standard practice for all the computers you own, but it’s especially important for an air-gapped computer. Agent.btz used autorun to infect U.S. military computers. 6. Minimize the amount of executable code you move onto the air-gapped computer. Text files are best. Microsoft Office files and PDFs are more dangerous, since they might have embedded macros. Turn off all macro capabilities you can on the air-gapped computer. Don’t worry too much about patching your system; in general, the risk of the executable code is worse than the risk of not having your patches up to date. You’re not on the internet, after all. 7.
Re: [liberationtech] Bruce Schneier on the good, old air gap
Perhaps not every device, but maybe just one device you use for reading encrypted mail and the like. It could be a Raspberry Pi you carry in a knapsack, or something. n On Oct 7, 2013, at 12:14, yersinia yersinia.spi...@gmail.com wrote: On Mon, Oct 7, 2013 at 5:16 PM, Eugen Leitl eu...@leitl.org wrote: http://www.wired.com/opinion/2013/10/149481/ Want to Evade NSA Spying? Don’t Connect to the Internet BY BRUCE SCHNEIER 10.07.13 6:30 AM Photo: Ariel Zambelich / WIRED; Illustration: Ross Patton / WIRED Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA. The advice I shared included using Tor, preferring certain cryptography over others, and using public-domain encryption wherever possible. I also recommended using an air gap, which physically isolates a computer or local network of computers from the internet. (The name comes from the literal gap of air between the computer and the internet; the word predates wireless networks.) But this is more complicated than it sounds, and requires explanation. Since we know that computers connected to the internet are vulnerable to outside hacking, an air gap should protect against those attacks. There are a lot of systems that use — or should use — air gaps: classified military networks, nuclear power plant controls, medical equipment, avionics, and so on. Osama Bin Laden used one. I hope human rights organizations in repressive countries are doing the same. Air gaps might be conceptually simple, but they’re hard to maintain in practice. The truth is that nobody wants a computer that never receives files from the internet and never sends files out into the internet. What they want is a computer that’s not directly connected to the internet, albeit with some secure way of moving files on and off. But every time a file moves back or forth, there’s the potential for attack. And air gaps have been breached. Stuxnet was a U.S. and Israeli military-grade piece of malware that attacked the Natanz nuclear plant in Iran. It successfully jumped the air gap and penetrated the Natanz network. Another piece of malware named agent.btz, probably Chinese in origin, successfully jumped the air gap protecting U.S. military networks. These attacks work by exploiting security vulnerabilities in the removable media used to transfer files on and off the air gapped computers. Bruce Schneier is a security technologist and author. His latest book is Liars and Outliers: Enabling the Trust Society Needs to Survive. Since working with Snowden’s NSA files, I have tried to maintain a single air-gapped computer. It turned out to be harder than I expected, and I have ten rules for anyone trying to do the same: 1. When you set up your computer, connect it to the internet as little as possible. It’s impossible to completely avoid connecting the computer to the internet, but try to configure it all at once and as anonymously as possible. I purchased my computer off-the-shelf in a big box store, then went to a friend’s network and downloaded everything I needed in a single session. (The ultra-paranoid way to do this is to buy two identical computers, configure one using the above method, upload the results to a cloud-based anti-virus checker, and transfer the results of that to the air gap machine using a one-way process.) 2. Install the minimum software set you need to do your job, and disable all operating system services that you won’t need. The less software you install, the less an attacker has available to exploit. I downloaded and installed OpenOffice, a PDF reader, a text editor, TrueCrypt, and BleachBit. That’s all. (No, I don’t have any inside knowledge about TrueCrypt, and there’s a lot about it that makes me suspicious. But for Windows full-disk encryption it’s that, Microsoft’s BitLocker, or Symantec’s PGPDisk — and I am more worried about large U.S. corporations being pressured by the NSA than I am about TrueCrypt.) 3. Once you have your computer configured, never directly connect it to the internet again. Consider physically disabling the wireless capability, so it doesn’t get turned on by accident. 4. If you need to install new software, download it anonymously from a random network, put it on some removable media, and then manually transfer it to the air gapped computer. This is by no means perfect, but it’s an attempt to make it harder for the attacker to target your computer. 5. Turn off all auto-run features. This should be standard practice for all the computers you own, but it’s especially important for an air-gapped computer. Agent.btz used autorun to infect U.S. military computers. 6. Minimize the amount of executable code you move onto the air-gapped computer. Text files are best. Microsoft Office files and PDFs are more dangerous, since they might have embedded macros. Turn off all macro
Re: [liberationtech] Bruce Schneier on the good, old air gap
On Mon, Oct 07, 2013 at 09:14:35PM +0200, yersinia wrote: I like Bruce much, i have read all of him, every book, mostly article, from years. But no normal person would follow these advice, all smartphones That advice is not exactly targeted towards Jane Doe. should be turned off, each tablet, and every pc should be turned in a Some people don't have mobile phones. Others leave them at home, or remove the power pack when it matters. anonyomous client of an anonymous network. Sure, who believe in the No. You just need to buy an offline machine, e.g. a used notebook. Separation by air gap was SOP in the intelligence community before virtualization allowed to separate trust compartments in one machine. I trust air gap much more than hypervisors. paranoiamodel definitely find comfort in these indications, for example i am one. But those who follow this model, really, are following it also not in only the cyberspace, but also in the real life, every day ? Really? Internet is I don't understand the problem. Bruce gave good basic opsec advice, what's the problem with following it up in practice but to tamper-proof against evil maid attacks? perhaps evil but perhaps also our world is not so a sane and secure place, sometime (or every time, depend). -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
[liberationtech] State beats NSA
Foreign Policy Magazine claims that US Dept of State trumps the NSA: http://thecable.foreignpolicy.com/posts/2013/10/04/not_even_the_nsa_can_crack_the_state_departments_online_anonymity_tool -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
[liberationtech] why this way to personal clouds is still unique and needed
Greetings, I just put online a new, updated explanation of why my proposal for a percloud (PERsonal/PERmanent/PEeR2peer cloud) alternative to centralized, anti-privacy social networks is, in my opinion, still unique, and what is the real reason for it at http://stop.zona-m.net/2013/10/the-real-problem-that-the-percloud-wants-to-solve-and-why-its-still-necessary/ EXECUTIVE SUMMARY: 1) I think mine is the ONLY short-term, feasible way to get the masses of average Internet users OUT of walled gardens while still working and feeling as a real and easy to use cloud service, while being a p2p federation of individually owned and used clouds, completely compatible with the rest of the current Internet 2) I will ONLY be able to work on it if I get enough funding, so please contribute if you can, and in any case please spread the word as much as possible! all details are in the post. Thanks! Marco F -- M. Fioretti http://mfioretti.com http://stop.zona-m.net Your own civil rights and the quality of your life heavily depend on how software is used *around* you -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] State beats NSA
Oh what fun. Not speaking for the Tor Project, but only speaking for up to 2007, and my own opinions, but I did comment. And, what I can say is, my opinions *do not* represent the opinions of everyone in the current project, but the public face of the project at inception as a c3 was pretty much shaped, in messaging, by me -- so I can speak regarding that first year and a bit, and the artist's original intent, as it were. And regardless of what neutrality the current project takes, I am an ideologue of sorts, if not a readily cubby-hole-able one by current categorization -- my history shows it, and there's no denying it. I was raised a political animal. And there have been changes no doubt -- not like I'm in daily communication. I will let the current folks speak to that or not. yrs, On Mon, Oct 7, 2013 at 6:25 PM, Richard Brooks r...@acm.org wrote: Foreign Policy Magazine claims that US Dept of State trumps the NSA: http://thecable.foreignpolicy.com/posts/2013/10/04/not_even_the_nsa_can_crack_the_state_departments_online_anonymity_tool -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu. -- Shava Nerad shav...@gmail.com -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] why this way to personal clouds is still unique and needed
On Mon, Oct 7, 2013 at 4:07 PM, M. Fioretti mfiore...@nexaima.net wrote: I just put online a new, updated explanation of why my proposal for a percloud (PERsonal/PERmanent/PEeR2peer cloud) alternative to centralized, anti-privacy social networks is, in my opinion, still unique, and what is the real reason for it at http://stop.zona-m.net/2013/10/the-real-problem-that-the-percloud-wants-to-solve-and-why-its-still-necessary/ The first thing that came to mind reading your response to What about those other projects? was Camlistore: http://camlistore.org/ -- Tony Arcieri -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.