Re: [liberationtech] Privacy, data protection questions

2013-03-27 Thread Rich Kulawiec
On Tue, Mar 26, 2013 at 04:24:33PM -0700, Brian Conley wrote:
 I generally read most of your comments on this list as I find
 them insightful, however in this case, I was struck by your
 entirely hostile attitude.

You're misreading exasperation and frustration as anger, and you're
still focused on style rather than substance.  If you think I'm wrong
(and of course I might be) then make the case.  Show me how someone
can keep (let's say) a 1000-phone population in the field secure when
there's an adversary actively trying to make them otherwise.

---rsk
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Privacy, data protection questions

2013-03-27 Thread Andrew Haeg
Hi Brian, Rich: Thanks for engaging me (and one another) here. I take no
umbrage at Rich's line of argumentation. In fact, having been a lurker and
occasional poster here for several months now, I am well aware there are
(as Rich put it) paranoid clueful paranoid diligent (did I mention
paranoid?) geeks in our midst and expected a passionate response of some
kind. If I were easily put off by criticism, I wouldn't be doing this.

But I will say that while I'm not deeply technical, I'm acutely aware of
what I don't know. Which is why, for now, we're avoiding many of the
pitfalls you point out. Right now, we're building solely for SMS and voice
delivery of simple surveys, and aggregating that data to build profiles of
respondents. Nothing need be installed on the phone.

I will bookmark this thread as we start to think about smartphone apps, but
for all the reasons you raise, it may be a non-starter in places with
nosey, repressive regimes.

The privacy questions I have right now have to do with partitioning the DB
in such a way that a malevolent hacker, or personal info digger, couldn't
crack into our system and in one fell swoop make off with a trove of mobile
#'s + the personal info of the person connected to that number.

Whoever I bring on as CTO/technical co-founder I will expect to shape these
decisions.

I appreciate the feedback.

- Andrew



On Mon, Mar 25, 2013 at 12:57 PM, Brian Conley bri...@smallworldnews.tvwrote:

 Rich,

 Mostly I'm taking issue with your nonconstructive demeanor. I've not seen
 you take the Guardian Project to task for trying to solve some of the same
 problems. I've not seen you take Tor project or Whisper Systems to task.
 You have essentially shat on someone's head who is taking a risk by being
 open and asking for feedback.

 As this is a LIST that numerous people have mentioned is beneficial to
 them as a place for discussion one might expect common courtesy to
 prevail. I know that is not the general tendency on the internet, where
 trolls abound.

 Perhaps we could all try to be a bit less trollish, and perhaps more
 gnomish.  I would present Steve Weis' critical, yet cordial response to
 Crypho on another thread as a good example:

 Hi Yiorgis. The ways of asserting the authenticity of served
 [JavaScript] always reduce to trusted code executing on the client. You
 need to trust whatever is authenticating the served application. You can't
 get around it.

 This approach always ends up with either trusting the service or running
 client-side code. The former is a perfectly fine business model and the
 standard for almost all web apps, but you can't make the claim that the
 government and our staff cannot access your data. It's simply not true,
 and not just because there might be incidental bugs you're working on
 fixing. It's fundamentally untrue.

 I appreciate the challenge you are trying to tackle and understand that
 delivering client-side code across all browsers and platforms is a
 non-starter for an early startup. If it were an easy problem, we wouldn't
 be having this discussion. I wish you luck in solving it.

 Regards,

 Brian

 On Mon, Mar 25, 2013 at 5:52 AM, Rich Kulawiec r...@gsp.org wrote:

 On Fri, Mar 22, 2013 at 04:29:38PM -0700, Brian Conley wrote:
  Nose to the grindstone Andrew. Use Rich's email to remind you this is
 hard,
  but its still worth doing.

 I've read this multiple times and I still have no idea how your remarks
 relate to what I wrote in re the (in)security of smartphones, the
 resulting pervasive malware epidemic and the subsequent serious
 architectural problems for application developers, including but not
 limited to this one.  (serious architectural problems == you're
 building on enemy territory, this probably won't end well)

 Neither coffee nor scotch (both applied liberally) have yielded any
 enlightenment, so I must now ask: Whiskey Tango Foxtrot, Over?

 ---rsk
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




 --



 Brian Conley

 Director, Small World News

 http://smallworldnews.tv

 m: 646.285.2046

 Skype: brianjoelconley



 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Privacy, data protection questions

2013-03-26 Thread Rich Kulawiec
On Mon, Mar 25, 2013 at 10:57:10AM -0700, Brian Conley wrote:
 Mostly I'm taking issue with your nonconstructive demeanor.

Clearly you have no idea how I write when I'm being nonconstructive. ;-)

Think equal proportions Kingsfield[1], Vader, Snape.  Season to taste with
HST and Mencken, serve at full boil.

 I've not seen you take the Guardian Project to task for trying to
 solve some of the same problems. I've not seen you take Tor project or
 Whisper Systems to task.

(a) There aren't enough hours in the day to provide extensive (security
or other) critiques of everything that comes across here.   And there
are other people whose expertise in certain areas dwarfs mine, so
until/unless I close the gap, I'll defer to them.  Also I think I should
occasionally STFU and listen.

So I respond on-list when I feel that I have something useful to say,
*usually* (but not always) when I think that has applicability beyond the
particular topic-of-the-moment.  Hence my comments in re Silent Circle,
which are far more about the inherent insecurity of closed source
software than about the specifics of Silent Circle itself -- most of
which I didn't pay any attention to because I think they're irrelevant.
And speaking of applicability beyond the topic-of-the-moment:

(b) If you read my message carefully you'll notice that I did in fact
explicitly point out that while I was using this particular project as
an example, it's by no means the only one facing the exact same issue.
Building a secure smartphone app is presently equivalent to trying
to put the roof on a house whose foundation is sinking into quicksand
and whose main floor is on fire.

So what constructive thing could I possibly say?  The entire smartphone
ecosystem is rotten to the core: the OS vendors care far more about
advertising than privacy and security [2].  Well, and they care a lot
about paying attorneys so that they can all sue each other. [3]  The app
markets are loaded with malware, spyware, adware, and crap.  And more
crap.  Also: still more crap.  Users will download and run any shiny thing
they see, doubly so if it purports to enhance their social experience --
much to the delight of the scammers and spammers running those operations.
Telcos are happy to turn user tracking/surveillance/etc. into profit
centers.  Governments want every scrap of data they can get from carriers
and there's now an entire subindustry for software that extracts data
from locked phones.

D'ya think if I asked them very nicely and politely they'd all stop?

*crickets*

There is NOTHING constructive to be done here.  It's not a fixable
situation at the moment or for the forseeable future.  The *only* thing
to do, as far as I can tell, is to stop pretending it's otherwise and
stop laboring under the delusion that smartphone apps have a chance in
hell of being secure in mass deployment scenarios.

(c) So to re-emphasize the more general point: no smartphone apps,
UNLESS you can produce a viable, workable, scalable, defensible plan
to keep the phones secure in the field.  Otherwise your app, whatever
it does, and however nifty it is, is probably going to be undercut from
the moment it's installed...or very soon thereafter, as soon as one or
two governments your users are annoying decide to deploy countermeasures.
(I think it's fair to say that, to a first approximation, the tempo
and scale of their response will be proportional to the adoption
rate and annoyance level.  Thus: the better your app and the more people
that use it, the sooner you should expect the backlash.)

And they don't *have* to crack your app if they 0wn the phones it runs on.

(I sure wouldn't.  Too much work.  Very tedious.  Better to just hijack the
phone, install a keystroke logger et.al., and compromise *all* the apps.)

(d) I don't think you [generic you] can come up with that plan (above)
and execute it.  I think you have no shot whatsoever.  But if you want
to take a crack at proving me wrong: be my guest.  I will be very surprised
but happy if you succeed.  I may even buy you beers.  Good beers.

(e) I *know* this is real unhappy news.  Sorry.  I didn't write the
cruddy smartphone software.  I didn't write the malware.  I didn't create
the situation.  I'm just pointing it out.  And yes, I know it would be
much nicer to just go on creating app after app and rolling them out
and pretending this problem doesn't exist, but ermmm...I think far more
unpleasant things than mere words on a screen will happen if lots of
people start betting their freedom and/or their lives on the security of
their smartphones/apps.

(f) And on that point (pretending), let me share with you one of the most
valuable pieces of guidance that I've ever read.  I have it printed out
and taped above where I'm working right now.  I think for many of the
projects and initiatives discussed here, it's terrific advice.  So even
if you think my analysis here isn't worth a load of fetid dingo's kidneys,
well, at least there's this:


Re: [liberationtech] Privacy, data protection questions

2013-03-26 Thread Brian Conley
Rich, the point is simple, let me put it into a formula:

(civility + relevant advice) / length = degree to which people consider
your advice

My point is that you clearly have a lot of the second piece of this
formula, however your lack of the prior piece, and the lack of many people
on this list (myself included at times!) leads to us wasting our breath and
carpal tunnels, because the degree to which people are likely to consider
are advice is inversely proportional to our lack of civility.

Your second email is generally much increased in civility, but, frankly, I
didn't read all of it.

I understand smartphones are a disaster, but I also understand that
government surveillance has many of its own critical flaws. The capability
to do something technically is not the same as the ability to execute it
bureaucratically, socially, or practically.

Finally, I do look forward to your advice. I generally read most of your
comments on this list as I find them insightful, however in this case, I
was struck by your entirely hostile attitude.

It's clear you have a chip on your shoulder about this stuff, maybe because
you are angry people are getting funding for things you see as stupid or
fundamentally flawed, maybe for another reason, quite frankly all i care
about is how your attitude impacts my day.

Brian

On Tue, Mar 26, 2013 at 4:12 PM, Rich Kulawiec r...@gsp.org wrote:

 On Mon, Mar 25, 2013 at 10:57:10AM -0700, Brian Conley wrote:
  Mostly I'm taking issue with your nonconstructive demeanor.

 Clearly you have no idea how I write when I'm being nonconstructive. ;-)

 Think equal proportions Kingsfield[1], Vader, Snape.  Season to taste with
 HST and Mencken, serve at full boil.

  I've not seen you take the Guardian Project to task for trying to
  solve some of the same problems. I've not seen you take Tor project or
  Whisper Systems to task.

 (a) There aren't enough hours in the day to provide extensive (security
 or other) critiques of everything that comes across here.   And there
 are other people whose expertise in certain areas dwarfs mine, so
 until/unless I close the gap, I'll defer to them.  Also I think I should
 occasionally STFU and listen.

 So I respond on-list when I feel that I have something useful to say,
 *usually* (but not always) when I think that has applicability beyond the
 particular topic-of-the-moment.  Hence my comments in re Silent Circle,
 which are far more about the inherent insecurity of closed source
 software than about the specifics of Silent Circle itself -- most of
 which I didn't pay any attention to because I think they're irrelevant.
 And speaking of applicability beyond the topic-of-the-moment:

 (b) If you read my message carefully you'll notice that I did in fact
 explicitly point out that while I was using this particular project as
 an example, it's by no means the only one facing the exact same issue.
 Building a secure smartphone app is presently equivalent to trying
 to put the roof on a house whose foundation is sinking into quicksand
 and whose main floor is on fire.

 So what constructive thing could I possibly say?  The entire smartphone
 ecosystem is rotten to the core: the OS vendors care far more about
 advertising than privacy and security [2].  Well, and they care a lot
 about paying attorneys so that they can all sue each other. [3]  The app
 markets are loaded with malware, spyware, adware, and crap.  And more
 crap.  Also: still more crap.  Users will download and run any shiny thing
 they see, doubly so if it purports to enhance their social experience --
 much to the delight of the scammers and spammers running those operations.
 Telcos are happy to turn user tracking/surveillance/etc. into profit
 centers.  Governments want every scrap of data they can get from carriers
 and there's now an entire subindustry for software that extracts data
 from locked phones.

 D'ya think if I asked them very nicely and politely they'd all stop?

 *crickets*

 There is NOTHING constructive to be done here.  It's not a fixable
 situation at the moment or for the forseeable future.  The *only* thing
 to do, as far as I can tell, is to stop pretending it's otherwise and
 stop laboring under the delusion that smartphone apps have a chance in
 hell of being secure in mass deployment scenarios.

 (c) So to re-emphasize the more general point: no smartphone apps,
 UNLESS you can produce a viable, workable, scalable, defensible plan
 to keep the phones secure in the field.  Otherwise your app, whatever
 it does, and however nifty it is, is probably going to be undercut from
 the moment it's installed...or very soon thereafter, as soon as one or
 two governments your users are annoying decide to deploy countermeasures.
 (I think it's fair to say that, to a first approximation, the tempo
 and scale of their response will be proportional to the adoption
 rate and annoyance level.  Thus: the better your app and the more people
 that use it, the sooner you should 

Re: [liberationtech] Privacy, data protection questions

2013-03-25 Thread Rich Kulawiec
On Fri, Mar 22, 2013 at 04:29:38PM -0700, Brian Conley wrote:
 Nose to the grindstone Andrew. Use Rich's email to remind you this is hard,
 but its still worth doing.

I've read this multiple times and I still have no idea how your remarks
relate to what I wrote in re the (in)security of smartphones, the
resulting pervasive malware epidemic and the subsequent serious
architectural problems for application developers, including but not
limited to this one.  (serious architectural problems == you're
building on enemy territory, this probably won't end well)

Neither coffee nor scotch (both applied liberally) have yielded any
enlightenment, so I must now ask: Whiskey Tango Foxtrot, Over?

---rsk
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Privacy, data protection questions

2013-03-25 Thread Brian Conley
Rich,

Mostly I'm taking issue with your nonconstructive demeanor. I've not seen
you take the Guardian Project to task for trying to solve some of the same
problems. I've not seen you take Tor project or Whisper Systems to task.
You have essentially shat on someone's head who is taking a risk by being
open and asking for feedback.

As this is a LIST that numerous people have mentioned is beneficial to them
as a place for discussion one might expect common courtesy to prevail. I
know that is not the general tendency on the internet, where trolls abound.

Perhaps we could all try to be a bit less trollish, and perhaps more
gnomish.  I would present Steve Weis' critical, yet cordial response to
Crypho on another thread as a good example:

Hi Yiorgis. The ways of asserting the authenticity of served
[JavaScript] always reduce to trusted code executing on the client. You
need to trust whatever is authenticating the served application. You can't
get around it.

This approach always ends up with either trusting the service or running
client-side code. The former is a perfectly fine business model and the
standard for almost all web apps, but you can't make the claim that the
government and our staff cannot access your data. It's simply not true,
and not just because there might be incidental bugs you're working on
fixing. It's fundamentally untrue.

I appreciate the challenge you are trying to tackle and understand that
delivering client-side code across all browsers and platforms is a
non-starter for an early startup. If it were an easy problem, we wouldn't
be having this discussion. I wish you luck in solving it.

Regards,

Brian

On Mon, Mar 25, 2013 at 5:52 AM, Rich Kulawiec r...@gsp.org wrote:

 On Fri, Mar 22, 2013 at 04:29:38PM -0700, Brian Conley wrote:
  Nose to the grindstone Andrew. Use Rich's email to remind you this is
 hard,
  but its still worth doing.

 I've read this multiple times and I still have no idea how your remarks
 relate to what I wrote in re the (in)security of smartphones, the
 resulting pervasive malware epidemic and the subsequent serious
 architectural problems for application developers, including but not
 limited to this one.  (serious architectural problems == you're
 building on enemy territory, this probably won't end well)

 Neither coffee nor scotch (both applied liberally) have yielded any
 enlightenment, so I must now ask: Whiskey Tango Foxtrot, Over?

 ---rsk
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




-- 



Brian Conley

Director, Small World News

http://smallworldnews.tv

m: 646.285.2046

Skype: brianjoelconley
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Privacy, data protection questions

2013-03-22 Thread Andrew Haeg
We're in the late prototype phase for Groundsourcehttp://groundsourcing.com,
a mobile data collection and engagement platform -- designed for
journalists, researchers, NGO's and others to use to gather first-hand
knowledge. We've used the prototype to validate the need for the
platform, and now privacy  data protection have moved front and center as
we ramp up for a beta phase later this spring/summer.

We've had some early discussions with the Tor Project about protecting
journalists using the platform in countries with repressive regimes (down
the road). We're also looking into using Wickr for encrypting
communications. In the short term, we need advisors who can help guide our
decisions around privacy and personal data collection  protection.

Let me know if you're interested in helping us navigate these issues. I'd
be happy to demo the platform for anyone who's interested -- and I am also
beginning the search for a CTO/technical co-founder to lead on these and
other tech/strategic decisions.

We're looking for people who share our mission to put human experience and
unmet needs at the heart of storytelling and decision-making, while giving
sources control over the data that they share and their level of
engagement.

Comment here, or email me personally if you want to follow up.

Best,

Andrew Haeg
http://www.linkedin.com/in/andrewhaeg
@andrewhaeg
@groundsourcing
612.501.0690
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Privacy, data protection questions

2013-03-22 Thread Rich Kulawiec
On Fri, Mar 22, 2013 at 09:58:17AM -0500, Andrew Haeg wrote:
 We're in the late prototype phase for Groundsourcehttp://groundsourcing.com,
 a mobile data collection and engagement platform -- designed for
 journalists, researchers, NGO's and others to use to gather first-hand
 knowledge. We've used the prototype to validate the need for the
 platform, and now privacy  data protection have moved front and center as
 we ramp up for a beta phase later this spring/summer.
 
 We've had some early discussions with the Tor Project about protecting
 journalists using the platform in countries with repressive regimes (down
 the road). We're also looking into using Wickr for encrypting
 communications. In the short term, we need advisors who can help guide our
 decisions around privacy and personal data collection  protection.

Ok.  Here's some advice.  You're not going to like it. ;-)  Sorry.
But better now than later, when lives are on the line.

I'd like to ask you to open a web browser and use your favorite
search engine to search for:

mobile malware epidemic
smartphone malware
android malware
windows phone malware

and similar.

Then I'd like you to explain how you propose to keep all those mobile
phones secure in the face of routine malware, let alone targeted and
custom malware crafted by hostile governments who would very much like
all those journalists and researchers and NGOs you mentioned to STFU
because they're saying and reporting and doing things those
governments find...disturbing.

Forget all the other security and privacy issues for a moment (some of
which I touched on in a previous list message [1]): how, EXACTLY, do you
propose to keep those phones from being infested just like a gazillion
other phones already are or will be real soon now?

Because once those endpoints are compromised, all the crafty routing and
anonymization and encryption layers you could possibly put in place aren't
going to matter very much.  And those endpoints WILL be compromised
(probably much sooner than you think) because they're going to be in the
hands of journalists and researchers and NGOs, *not* in the hands of
paranoid clueful paranoid diligent (did I mention paranoid?) geeks.

Oh, sure, someone sufficiently knowledgeable, cautious, etc.
can probably keep *one* phone secure.  Just like someone with those
qualities might be able to keep a single Windows system secure.  There are
people on this list who are capable of both of those things.  But dozens?
Hundreds?  Thousands?  Being carried around all over the place by
their owners?

There's not a chance in hell.  None.  This is not a solved problem in
computing.  Nor is there even a hint of a twitch of a notion of a
suggestion of a whisper that it will be solved anytime soon.

It's not even solved for people who've stacked the deck in their favor
(e.g., those who have the luxury of centralized control) let alone for
those who are allowing end users to connect their own.  And most of them
aren't painting big targets on their chests, they're just caught up in
the general crossfire...unlike *your* users, who are self-nominating to be
on the business end of some very serious attention from some very determined,
clueful and nasty people -- people who probably *already* have been
working on building or buying custom malware for phones because of course
that's what any prudent adversary with sufficient resources would be
doing just about now.

Yeah, okay, so I'm making the point at your expense, and I don't really
mean to do that, so I'll make it in the more general case: look, people,
unless you can produce a plan -- and more than that, a plan that's been
proven in the field to work -- for keeping, let's say, a population of, oh,
a thousand independent scattered phones free of malware, then you CAN'T
deploy your whizbang singing dancing smartphone app because it's going to
be promptly undermined.  Any government worthy of the term oppressive
is going to 0wn each and every phone of interest and is going to install
trackers, spyware, keystroke loggers, and whatever else occurs to them,
and you're not going to stop them.  At best, you might figure out that
this is happening after-the-fact and remediate some of them...until they
go back out in the field and get infested again.  Lather, rinse, repeat.

Not to put too fine a point on it (but I suppose I will anyway):

If someone else can run arbitrary code on your computer,
it's not YOUR computer any more. [2]

The phone may be in a journalist's hand or it may be in a researcher's
pocket, but it's not theirs.  *Not any more*.

Which means that your liberation app, the one that you designed and
developed and sweated over, the one that your user is trusting to
send and receive sensitive information, the one that's connecting
to a backend through umpteen layers of encryption and obfuscation
and misdirection and whatever...is now running on the 

Re: [liberationtech] Privacy, data protection questions

2013-03-22 Thread Brian Conley
Nose to the grindstone Andrew. Use Rich's email to remind you this is hard,
but its still worth doing.

Also remember you aren't going to solve these problems, but you may make it
easier for people who want to act.

Lastly, if Rich is really getting you down, click this link:

http://2.bp.blogspot.com/-w7WBItj9rgA/UCv2vNYVuhI/AW0/U1yNrdmndV8/s1600/haters_gonna_hate3.jpg

That said, do speak to Nathan Freitas, Harlo Holmes, Hans Christoph-Steiner
and others at the Guardian Project, and Bryan Nunez, et al at Witness about
Informacam, IOCipher, and other steps they're taking to solve some of these
problems.

Don't just innovate, collaborate.

I'd also like to talk to you about our work on StoryMaker an app to allow
individuals to produce compelling stories and publish them via Tor among
other features.

cheers

Brian

On Fri, Mar 22, 2013 at 3:50 PM, Rich Kulawiec r...@gsp.org wrote:

 On Fri, Mar 22, 2013 at 09:58:17AM -0500, Andrew Haeg wrote:
  We're in the late prototype phase for Groundsource
 http://groundsourcing.com,
  a mobile data collection and engagement platform -- designed for
  journalists, researchers, NGO's and others to use to gather first-hand
  knowledge. We've used the prototype to validate the need for the
  platform, and now privacy  data protection have moved front and center
 as
  we ramp up for a beta phase later this spring/summer.
 
  We've had some early discussions with the Tor Project about protecting
  journalists using the platform in countries with repressive regimes (down
  the road). We're also looking into using Wickr for encrypting
  communications. In the short term, we need advisors who can help guide
 our
  decisions around privacy and personal data collection  protection.

 Ok.  Here's some advice.  You're not going to like it. ;-)  Sorry.
 But better now than later, when lives are on the line.

 I'd like to ask you to open a web browser and use your favorite
 search engine to search for:

 mobile malware epidemic
 smartphone malware
 android malware
 windows phone malware

 and similar.

 Then I'd like you to explain how you propose to keep all those mobile
 phones secure in the face of routine malware, let alone targeted and
 custom malware crafted by hostile governments who would very much like
 all those journalists and researchers and NGOs you mentioned to STFU
 because they're saying and reporting and doing things those
 governments find...disturbing.

 Forget all the other security and privacy issues for a moment (some of
 which I touched on in a previous list message [1]): how, EXACTLY, do you
 propose to keep those phones from being infested just like a gazillion
 other phones already are or will be real soon now?

 Because once those endpoints are compromised, all the crafty routing and
 anonymization and encryption layers you could possibly put in place aren't
 going to matter very much.  And those endpoints WILL be compromised
 (probably much sooner than you think) because they're going to be in the
 hands of journalists and researchers and NGOs, *not* in the hands of
 paranoid clueful paranoid diligent (did I mention paranoid?) geeks.

 Oh, sure, someone sufficiently knowledgeable, cautious, etc.
 can probably keep *one* phone secure.  Just like someone with those
 qualities might be able to keep a single Windows system secure.  There are
 people on this list who are capable of both of those things.  But dozens?
 Hundreds?  Thousands?  Being carried around all over the place by
 their owners?

 There's not a chance in hell.  None.  This is not a solved problem in
 computing.  Nor is there even a hint of a twitch of a notion of a
 suggestion of a whisper that it will be solved anytime soon.

 It's not even solved for people who've stacked the deck in their favor
 (e.g., those who have the luxury of centralized control) let alone for
 those who are allowing end users to connect their own.  And most of them
 aren't painting big targets on their chests, they're just caught up in
 the general crossfire...unlike *your* users, who are self-nominating to be
 on the business end of some very serious attention from some very
 determined,
 clueful and nasty people -- people who probably *already* have been
 working on building or buying custom malware for phones because of course
 that's what any prudent adversary with sufficient resources would be
 doing just about now.

 Yeah, okay, so I'm making the point at your expense, and I don't really
 mean to do that, so I'll make it in the more general case: look, people,
 unless you can produce a plan -- and more than that, a plan that's been
 proven in the field to work -- for keeping, let's say, a population of, oh,
 a thousand independent scattered phones free of malware, then you CAN'T
 deploy your whizbang singing dancing smartphone app because it's going to
 be promptly undermined.  Any government worthy of the term oppressive
 is going to 0wn