Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-11 Thread Eugen Leitl
On Mon, Jun 10, 2013 at 10:27:33PM +0200, Guido Witmond wrote:

 The big deal is that now it's become impossible to believe the lies, and
 that you [Americans] are forced to accept the truth.

Reality check: https://twitter.com/_nothingtohide

http://www.people-press.org/2013/06/10/majority-views-nsa-phone-tracking-as-acceptable-anti-terror-tactic/

No further questions, your honor.
 
 And truth hurts! Especially when you want to believe the lies. Wanting
 to believe is easier than facing the truth, even when deep in your heart
 you've known the truth for a long time.
 
 Now is the time to come clear with your conscience, end this abusive
 relationship and kick the abusive partner out of your life. (ie: repeal
 the unjust laws.)

Realistically, we should be thankful for this brief
flash of interest (already waning) and use it to reignite
interest in stalled projects.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-11 Thread michael gurstein
Sad but I guess true, but there has been a huge amount of learning from this
particularly internationally and the reverberations on that will continue
and perhaps even grow for a very very long time.

M

-Original Message-
From: liberationtech-boun...@lists.stanford.edu
[mailto:liberationtech-boun...@lists.stanford.edu] On Behalf Of Eugen Leitl
Sent: Tuesday, June 11, 2013 6:21 AM
To: liberationtech@lists.stanford.edu
Subject: Re: [liberationtech] Boundless Informant: the NSA's secret tool to
track global surveillance data

On Mon, Jun 10, 2013 at 10:27:33PM +0200, Guido Witmond wrote:

 The big deal is that now it's become impossible to believe the lies, 
 and that you [Americans] are forced to accept the truth.

Reality check: https://twitter.com/_nothingtohide

http://www.people-press.org/2013/06/10/majority-views-nsa-phone-tracking-as-
acceptable-anti-terror-tactic/

No further questions, your honor.
 
 And truth hurts! Especially when you want to believe the lies. Wanting 
 to believe is easier than facing the truth, even when deep in your 
 heart you've known the truth for a long time.
 
 Now is the time to come clear with your conscience, end this abusive 
 relationship and kick the abusive partner out of your life. (ie: 
 repeal the unjust laws.)

Realistically, we should be thankful for this brief flash of interest
(already waning) and use it to reignite interest in stalled projects.
--
Too many emails? Unsubscribe, change to digest, or change password by
emailing moderator at compa...@stanford.edu or changing your settings at
https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] PRISM: NSA/FBI Internet data mining project

2013-06-11 Thread Eugen Leitl
- Forwarded message from Scott Weeks sur...@mauigateway.com -

Date: Mon, 10 Jun 2013 16:36:32 -0700
From: Scott Weeks sur...@mauigateway.com
To: na...@nanog.org
Subject: RE: PRISM: NSA/FBI Internet data mining project
Reply-To: sur...@mauigateway.com



Funny, sort of.  The guy was residing in Hawaii.  Apologies 
for the long URLs...

Report: NSA contract worker is surveillance source:
http://thegardenisland.com/news/state-and-regional/report-nsa-contract-worker-is-surveillance-source/article_2a88ec60-f99c-54a7-8c13-13f6852ccca6.html

Hawaii real estate agent: Snowden left on May 1:
http://thegardenisland.com/news/state-and-regional/hawaii-real-estate-agent-snowden-left-on-may/article_099ec0db-a823-56a0-8471-af8d7ef16e1b.html



funny as well!

NSA claims know-how to ensure no illegal spying:
http://thegardenisland.com/news/state-and-regional/nsa-claims-know-how-to-ensure-no-illegal-spying/article_ec623964-d23a-53c6-aeb0-14bf325a7f3c.html

scott


- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] OHM2013 Hacker Camp: Five Whistleblowing Lectures

2013-06-11 Thread Fabio Pietrosanti (naif)

Hi all,

this email just to notice that at OHM2013 Hacker's Camp 
http://ohm2013.org there will be several talks on Whistleblowing.
It's very interesting to note how Whistleblowing has become an hot-topic 
for hackers and digital hacktivism! :-)


We may need to organize a meeting other than those lectures to discuss 
among all various players and people interested on the topic.
Program (getting updated) https://ohm2013.org/site/program/ with a 
summary below:


Hermes Center: Digital Whistleblowing with GlobaLeaks

We'll introduce Digital Whistleblowing, how it's effectively used and 
adapted to different context: Investigative Journalism, Activism, 
Corporations and Governments. The new GlobaLeaks 0.2 software will be 
presented with a show case of design, security principle and tips on how 
to use it or hack it.


Volker: ADLeaks: A Secure Submission System for Online Whistleblowing 
Platforms


This talk covers the design and current state of implementation of a 
submission system for online whistleblowing platforms that is meant to 
provide anonymity against end-to-end traffic analysis.


Annie Machon: The three wars (terrorism, drugs, internet)

Based on her own experiences as an Intelligence Officer for MI5 (the UK 
domestic security service) and a whistleblower Annie Machon will talk 
about the relationships between the wars on 'terror', drugs and the 
internet.


Sander Venema: Howto Build a Whistleblower's Website: Maintaining Your 
Users' Privacy vs. Getting the Message Out


This talk is about the possible conflict between getting your message 
out there, and trying to maintain your site visitor's privacy. This talk 
will highlight some of the issues that need to be taken into 
consideration when building websites for whistleblowers with high 
security  privacy needs.


Dr Suelette Dreyfus: Whistleblowing in the Digital Age -- What the 
public thinks


How do different cultures perceive whistleblowing? This talk compares 
citizens' attitudes toward whistleblowing across several different 
countries. It will also reveal early results on public attitudes to 
using social media to blow the whistle, from the World Online 
Whistleblowing Survey. Finally it reviews some of the advances, proposed 
or actual, for whistleblowing laws in different countries.



--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-11 Thread Rich Kulawiec
On Mon, Jun 10, 2013 at 01:48:23PM -0700, x z wrote:
 @Rich, those are good movie scripts :-). But it does not work for 9 firms,
 and hundreds of execs all with diverse values and objectives.

Two responses.

hundreds?  Not necessary.  Not desirable, from the NSA's point of view,
either.  One person per firm would suffice, and they need not be an executive.
Surely you can't think for a moment that the NSA is incapable of placing
its own people on the datacenter staff of any major operation?

Second, how's this for a movie script?

(quoting myself)

 Ad I'd also, by the way, develop custom lookalike hardware.  (With
 the NSA's budget, this could be done with chump change.)  Who's going to
 open up a Cisco router and yank a board and look at it closely enough
 to figure out that it didn't come from Cisco?

Now quoting this (h/t to Rob Slade):


http://www.scribd.com/doc/95282643/Backdoors-Embedded-in-DoD-Microchips-From-China

This paper is a short summary of the first real world detection
of a backdoor in a military grade FPGA.  Using an innovative
patented technique we were able to detect and analyse in the
first documented case of its kind, a backdoor inserted into the
Actel/Microsemi ProASIC3 chips. The backdoor was found to exist
on the silicon itself, it was not present in any firmware loaded
onto the chip. Using Pipeline Emission Analysis (PEA), a
technique pioneered by our sponsor, we were able to extract
the secret key to activate the backdoor. This way an attacker
can disable all the security on the chip, reprogram crypto and
access keys, modify low-level silicon features, access unencrypted
configuration bitstream or permanently damage the device. Clearly
this means the device is wide open to intellectual property theft,
fraud, re-programming as well as reverse engineering of the design
which allows the introduction of a new backdoor or Trojan. Most
concerning, it is not possible to patch the backdoor in chips
already deployed, meaning those using this family of chips have
to accept the fact it can be easily compromised or it will have
to be physically replaced after a redesign of the silicon itself.

---rsk

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] OHM2013 Hacker Camp: Five Whistleblowing Lectures

2013-06-11 Thread phryk
On Tue, 11 Jun 2013 13:21:49 +0200
Fabio Pietrosanti (naif) li...@infosecurity.ch wrote:

 We may need to organize a meeting other than those lectures to
 discuss among all various players and people interested on the topic.

Maybe the Free Village[1] could accommodate a meeting like that, it
certainly sounds like the right place. This assumes, of course, that
there is enough space for everybody and whoever organizes that village
is willing to do so.


[1] https://ohm2013.org/wiki/Village:Free_Village
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Edward Snowden has gone missing

2013-06-11 Thread Rich Kulawiec

http://www.theatlanticwire.com/national/2013/06/where-is-edward-snowden/66072/

I'm reminded of this exchange, which I presume everyone on this
list is familiar with:

I'd like to go back to New York.

You have not much future there.  It will happen this way: you
may be walking, maybe the first sunny day of spring.  And a car
will slow beside you, and a door will open and someone you know,
even trust, will get out.  And he will smile, a becoming smile.
But he will leave open the car door and offer to give you a lift.

---rsk
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] OHM2013 Hacker Camp: Five Whistleblowing Lectures

2013-06-11 Thread Douwe Schmidt
Hey Fabio and others,

Our village Noisy Square (formely known as the Free Village or TA Pown OHM) is 
open for these kind of meetings. Parts of the village can be opened or closed 
to cater towards the privacy needs of participants in such meetings. Contact me 
for details. 

Anyone else interested in becoming part of this village; we'll have a call for 
participants ready this week and it will be send out on this list and others.

All the best,

Douwe Schmidt
-  -  -  -  -  -  -  -  -  -  - 
https://greenhost.nl - @greenhost - +31204890444 -  chat: 
do...@jabber.greenhost.nl
gpg: 8213 EE0B 65AF 926C 4A96 9BA2 4CC1 7E8E 84CC 39C5
-  -  -  -  -  -  -  -  -  -  -




On 11 6 2013, at 13:28, phryk in...@phryk.net wrote:

 On Tue, 11 Jun 2013 13:21:49 +0200
 Fabio Pietrosanti (naif) li...@infosecurity.ch wrote:
 
 We may need to organize a meeting other than those lectures to
 discuss among all various players and people interested on the topic.
 
 Maybe the Free Village[1] could accommodate a meeting like that, it
 certainly sounds like the right place. This assumes, of course, that
 there is enough space for everybody and whoever organizes that village
 is willing to do so.
 
 
 [1] https://ohm2013.org/wiki/Village:Free_Village
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-11 Thread Guido Witmond

On 11-06-13 12:21, Eugen Leitl wrote:

On Mon, Jun 10, 2013 at 10:27:33PM +0200, Guido Witmond wrote:


The big deal is that now it's become impossible to believe the lies, and
that you [Americans] are forced to accept the truth.


Reality check: https://twitter.com/_nothingtohide

http://www.people-press.org/2013/06/10/majority-views-nsa-phone-tracking-as-acceptable-anti-terror-tactic/

No further questions, your honor.


1st step to recovery is denial...



However, the question of Pew Research (in that second link) is not
fair: Which is more important?
 A. Investigate terrorist threats;
(or) B. Not intrude on privacy (of the general public)

There is a third choice:
C. Investigate terrorist threats AND not intrude on privacy (of the
general public). We pay you people $X Billion dollars to do so.


I tend to agree with Lauren Weinsteins opinion that it is rampant 
paranoia that lead us (the world) into this.

http://lauren.vortex.com/archive/001044.html



Realistically, we should be thankful for this brief
flash of interest (already waning) and use it to reignite
interest in stalled projects.


I am very grateful for mr Snowden and Greenwald to leak this. Now it is 
ok for EU-commissioner mrv Viviane Reding to state that privavcy isn't a 
luxury but a right.




Regards, Guido.

PS: Check out the background picture on that twitter-page, sheep!

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] [ipv6hackers] opportunistic encryption in IPv6

2013-06-11 Thread Eugen Leitl
- Forwarded message from Jim Small jim.sm...@cdw.com -

Date: Tue, 11 Jun 2013 01:02:54 +
From: Jim Small jim.sm...@cdw.com
To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com
Subject: Re: [ipv6hackers] opportunistic encryption in IPv6
Reply-To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com

Hi Owen,

  The fundamental challenge for encryption is key distribution and
 management:
  * How do I authenticate the intended recipient(s)?
 
 This is a traditional challenge with many traditional solutions, all of which 
 have
 tradeoffs, especially in M2M communications.
 
  * How do I distribute a key without letting anyone except the intended
 recipient(s) get it?
 
 DH pretty well solves this, no?

Yes and no.  DH is a good answer, but IKE/IPsec still requires pre-shared keys 
or RSA key pairs to start with.  So I think there would be some value in a 
keying system that allows some kind of controlled federation without having to 
depend on pre-shared keys, PKI, or DNSSec.

  * How do I manage the key to periodically change it while keeping it
 confidential?
 
 Again, DH with PFS makes this a solved problem AFAIK.

True - but only after the initial hurdle of having a pre-shared key or RSA key 
pair.
 
  * How do I notify the recipient if the key was compromised or is otherwise
 invalid?
 
 This doesn't seem all that hard so long as a rekey instruction is built into 
 the
 protocol. I believe that's already the case with IPSEC SAs, no?

Well - if we take DH, it's true once we've established a connection.  What 
about if we haven't?  Really the question I'm asking - if we have two 
independent parties, how do they validate each other without a trusted 3rd 
party?  Current options:
* pre-shared keys (but not scalable and keys tend to be weak to make it easy to 
share - keys are rarely if ever rotated)
* PKI - good but complex and as Moxie Marlinspike has demonstrated with others 
many flaws, abused by governments
* DNSSec - interesting one to watch but not really ready for wide spread use 
yet, needs greater adoption
* Manual/3rd party CA - possible if one party trusts the other or in a service 
provider scenario

Did I miss any viable wide spread options?  I know there are lots of 
theoretical ones but I'm talking about significantly deployed ones - say used 
by at least 1 million parties.

 Vs. this paper, I think that opportunistic IPSEC, ala Micr0$0ft's direct-
 connect or whatever they call it product is quite a bit more viable.
 It depends on AD as a PKI distribution mechanism for authentication.

DirectAccess is neat - but it's not exactly a break through.  DA is just a 
service based (aka UNIX/Linux daemon) IPv6 IPsec VPN with good provisioning and 
automatic IPv4 tunneling.  It's essentially a nice packaging of 
certificate-based IPsec leveraging Windows Active Directory provisioning.

There are some good ideas in this paper.  I just think there are some things 
missing - at least from my cursory reading of it.

--Jim


___
Ipv6hackers mailing list
ipv6hack...@lists.si6networks.com
http://lists.si6networks.com/listinfo/ipv6hackers

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] [ipv6hackers] opportunistic encryption in IPv6

2013-06-11 Thread Eugen Leitl
- Forwarded message from Mark Smith markzzzsm...@yahoo.com.au -

Date: Mon, 10 Jun 2013 21:10:06 -0700 (PDT)
From: Mark Smith markzzzsm...@yahoo.com.au
To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com
Subject: Re: [ipv6hackers] opportunistic encryption in IPv6
X-Mailer: YahooMailWebService/0.8.146.552
Reply-To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com





- Original Message -
 From: Jim Small jim.sm...@cdw.com
 To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com
 Cc: 
 Sent: Tuesday, 11 June 2013 11:02 AM
 Subject: Re: [ipv6hackers] opportunistic encryption in IPv6
 
 Hi Owen,
 
   The fundamental challenge for encryption is key distribution and
  management:
   * How do I authenticate the intended recipient(s)?
 
  This is a traditional challenge with many traditional solutions, all of 
 which have
  tradeoffs, especially in M2M communications.
 
   * How do I distribute a key without letting anyone except the intended
  recipient(s) get it?
 
  DH pretty well solves this, no?
 
 Yes and no.  DH is a good answer, but IKE/IPsec still requires pre-shared 
 keys 
 or RSA key pairs to start with.

Don't think so anymore.

Better-Than-Nothing Security: An Unauthenticated Mode of IPsec
http://tools.ietf.org/html/rfc5386


Don't know if there are any implementations available.
___
Ipv6hackers mailing list
ipv6hack...@lists.si6networks.com
http://lists.si6networks.com/listinfo/ipv6hackers

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] [ipv6hackers] opportunistic encryption in IPv6

2013-06-11 Thread Eugen Leitl

This thread is ending, so I will limit further distribution, explicitly
removing libtech.

- Forwarded message from Jim Small jim.sm...@cdw.com -

Date: Tue, 11 Jun 2013 04:27:33 +
From: Jim Small jim.sm...@cdw.com
To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com
Subject: Re: [ipv6hackers] opportunistic encryption in IPv6
Reply-To: IPv6 Hackers Mailing List ipv6hack...@lists.si6networks.com

Hi Mark,

The fundamental challenge for encryption is key distribution and
   management:
* How do I authenticate the intended recipient(s)?
* How do I distribute a key without letting anyone except the
  intended recipient(s) get it?
 
   DH pretty well solves this, no?
 
  Yes and no.  DH is a good answer, but IKE/IPsec still requires
  pre-shared keys or RSA key pairs to start with.
 
 Don't think so anymore.
 
 Better-Than-Nothing Security: An Unauthenticated Mode of IPsec
 http://tools.ietf.org/html/rfc5386

Thanks - I was not aware of that.  So BTNS is interesting - but it doesn't 
solve the above problems.  Per the RFC, BTNS doesn't authenticate peers.  It 
would seem that secure key distribution (maintain confidentiality, integrity, 
and authentication) remains a vexing problem.

Here's an interesting question more relevant to the list and the paper though - 
are IPv6 CGAs useful?  It seems like SeND is dead.  But does anyone on the list 
think that CGAs could provide a useful competitive advantage for IPv6 over 
IPv4?  Are these a useful building block?  One thing I wonder about is a 64 bit 
hash is pretty small - I wonder if that is sufficiently complex to provide 
security for the coming decade+?  PKI CAs using SCEP for enrollment/management 
work pretty well.  If you could get a key pair from DHCP or as a function of 
using a directory service, use it to generate a CGA, and then use that just for 
authentication it would already be fantastic.  Just being confident that an 
address is authentic and not spoofed is a huge improvement over the current 
state for Internet security.

Thoughts?
  --Jim


___
Ipv6hackers mailing list
ipv6hack...@lists.si6networks.com
http://lists.si6networks.com/listinfo/ipv6hackers

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Cryptocat: Translation Volunteers Needed

2013-06-11 Thread Nadim Kobeissi
On 2013-06-10, at 8:21 PM, Catherine Roy ecr...@catherine-roy.net wrote:

 On 10/06/2013 6:18 PM, Nadim Kobeissi wrote:
 Catherine,
 Opera is not shut out. It's simply difficult to develop for Opera due to 
 its limited browser extension API. Your email made it sound as if Cryptocat 
 had something against the Opera browser.
 
 My email is simply stating that Opera is shut out. How else should I 
 interpret this message : Cryptocat is not available for your browser.
 
 See screenshot : http://www.flickr.com/photos/zazie/9010759541/
 
 I sent you a message off-list to inquire about this and received no response.
 
 
 We have a ticket open for Opera compatibility in our code base. If you'd 
 like to, you can contribute to Cryptocat for Opera development here:
 https://github.com/cryptocat/cryptocat/issues/190
 
 I am not a developer. Must we all be developers to have a significant 
 influence on these types of issues ?

No, you can also repeatedly send me blandly demanding emails and then take the 
issue to the public when I don't answer immediately, and expect me to change 
Cryptocat's development roadmap to accommodate for you and the 1% that use a 
browser with a highly limited third-party development API.

Seriously, you're really frustrating.

NK

 
 Best regards,
 
 
 Catherine
 
 -- 
 Catherine Roy
 http://www.catherine-roy.net
 
 
 
 
 NK
 
 On 2013-06-10, at 6:10 PM, Catherine Roy ecr...@catherine-roy.net wrote:
 
 Congrats. But, as I asked in a private email to which I got not response, 
 is there any reason why Opera is shut out ?
 
 Best,
 
 
 Catherine
 
 -- 
 Catherine Roy
 http://www.catherine-roy.net
 
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptocat: Translation Volunteers Needed

2013-06-11 Thread Nadim Kobeissi

On 2013-06-11, at 7:31 AM, Eugen Leitl eu...@leitl.org wrote:

 On Mon, Jun 10, 2013 at 08:21:40PM -0400, Catherine Roy wrote:
 On 10/06/2013 7:37 PM, Travis McCrea wrote:
 Opera is being released now on Webkit, though I am sure you will still have 
 legacy opera users... I think you could put this issue a little further 
 down on your list.
 
 I guess using Cryptocat will also be further down my list.
 
 You will find that proprietary systems will receive less (frequently
 none) support. This is due to difficulties developing for proprietary
 systems, but also due to effective impossibility to varify
 security of proprietary systems. So open source is at a distinct
 advantage here.
 
 For an end user interested in secure communication it is always a
 good idea to pick the most supported platform. In case of browsers,
 that will be Firefox and Chromium (not Chrome), in that order of 
 precedence.
 
 In general, browsers have giant vulnerability surfaces, and should
 not be used for anything serious. A little security is a dangerous thing.

This has been getting a lot better very quickly, to a point where I'm 
optimistic about the future. Specifically I'm very excited about the situation 
with Chrome OS on Chromebooks. Chrome OS is currently (I believe) one of the 
most secure operating systems out there that still manages to be very highly 
functional and usable. That's why we make sure Cryptocat is specifically 
compatible and usable on it.

I would trust Cryptocat on a Chromebook more than Pidgin-OTR on 
Windows/Mac/Linux any day of the week. (Of course this is only my preference, 
but Pidgin-OTR's sheer number of un-patched 0days and lack of auditing is still 
a real issue.)

NK

 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptocat: Translation Volunteers Needed

2013-06-11 Thread Marcin de Kaminski

On Jun 11, 2013, at 4:07 PM, Nadim Kobeissi na...@nadim.cc wrote:

 On 2013-06-10, at 8:21 PM, Catherine Roy ecr...@catherine-roy.net wrote:
 
 On 10/06/2013 6:18 PM, Nadim Kobeissi wrote:
 Catherine,
 Opera is not shut out. It's simply difficult to develop for Opera due to 
 its limited browser extension API. Your email made it sound as if Cryptocat 
 had something against the Opera browser.
 
 My email is simply stating that Opera is shut out. How else should I 
 interpret this message : Cryptocat is not available for your browser.
 
 See screenshot : http://www.flickr.com/photos/zazie/9010759541/
 
 I sent you a message off-list to inquire about this and received no response.
 
 
 We have a ticket open for Opera compatibility in our code base. If you'd 
 like to, you can contribute to Cryptocat for Opera development here:
 https://github.com/cryptocat/cryptocat/issues/190
 
 I am not a developer. Must we all be developers to have a significant 
 influence on these types of issues ?
 
 No, you can also repeatedly send me blandly demanding emails and then take 
 the issue to the public when I don't answer immediately, and expect me to 
 change Cryptocat's development roadmap to accommodate for you and the 1% that 
 use a browser with a highly limited third-party development API.
 
 Seriously, you're really frustrating.
 
 NK


TOUCHÉ:

 Jake,
 I don't agree with x z (and rather agree with you), but I'm really tired of 
 just how aggressive and rude you always are on Libtech. And it doesn't appear 
 to just be towards me. I'm not the only person who feels like this.
 
 Even if you're right, tone your ego knob down already. Be nice. I can barely 
 read through threads anymore. Thank you.
 
 NK

:)

Best regards,
Marcin
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Building a encrypted mobile network

2013-06-11 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Anthony,

On 08/06/13 13:36, Anthony Papillion wrote:
 1. Location is a particularly thorny issue. Presentations at either
 HOPE or BlackHat demonstrated how easy it is to locate a mobile
 even if you're not the government with a massive budget and mad
 technology.
 
 Perhaps routing the network connection through Tor may suffice? But
 I don't think so as something doesn't 'feel' right about that.
 Thoughts?

Routing the call through Tor wouldn't conceal the phone's location
from the mobile network. The caller and callee would both have to use
cell towers to reach the Tor network, so their respective mobile
networks would still know their locations, and any hacks that can
currently be used to trick the mobile network into revealing a phone's
location would still work.

In theory you could conceal who calls whom from the mobile network by
routing the call through Tor. However, in order to be able to receive
calls, the callee would either have to maintain a constant connection
to Tor (draining her battery and data allowance) or ask some third
party with a constant connection to Tor to send her push notifications
of incoming calls, which she could then answer by connecting to Tor.
The third party would know when the callee was receiving incoming
calls, though not necessarily from whom.

Even this would reveal quite a lot of information to the mobile
network. Alice starts sending data at 12:34:56. Bob receives a push
notification at 12:34:57. Bob starts sending data at 12:34:58. Alice
and Bob both stop sending data at 12:44:58. The inference is pretty
clear: Alice called Bob at 12:34 and the call lasted ten minutes.

Concealing these patterns would require users to send and receive
dummy data even when they weren't sending or receiving calls, which
would drain their batteries and data allowances. It would be possible
to build such a system, but I don't think anyone would use it.

 2. Content is much easier to protect. My initial thought is to take
 a stock Android phone, replace the dialer with a SIP client capable
 of doing ZRTP, and customize the phone to tower communication so
 that all communication between the two is fully encrypted (and I
 don't mean the BS GSM encryption). Once the data gets on the
 network, it would be decrypted and calls would be connected.
 Content would be protected automatically when the user called ANY
 SIP device that supported ZRTP. Calls to PTSN would still be wide
 open.

It's not practical to use a custom protocol between the phone and the
tower - apart from the logistical issues of rolling out a new
protocol, carriers won't adopt a protocol that lacks lawful
intercept backdoors.

However, phone-to-tower encryption isn't needed if you have
phone-to-phone encryption, so I believe RedPhone does what you want
(but I haven't used it so I could be wrong).

Cheers,
Michael

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJRtzfsAAoJEBEET9GfxSfMcfoH/jPBVjyJCBKThYy/kN14ZcNX
pwaOzHdpZ+MxHKo919Exu2XUn9nIHlrGB1sqL9azsxss+m/bTgfc9iXVrOXQLhNb
8fif2PYacKgZ7eyrV1lFYesDXbcpgrRkFI7qJodc3ukfgZx87pmHmogXRGGpVvGy
cx7X/+tXBPqi84Sq2tDRcPdX7eDRXxjoE6DK0YG6f9+KN3aPLfoFCQZrnMUzqgcG
6zvJrpuCvSiH1Uk5UMbjDGMsXempFf5kDTbThOhYJG2Fi+kOw9cOlsFx0z2QB5Yf
0dSRrTHPYOIxA+JwI0pRxhCnEOC8SEWCmQVzpzEww8RvK2/k0x5ZFBERtetxiRg=
=irF4
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptocat: Translation Volunteers Needed

2013-06-11 Thread Brian Conley
Catherine, shut out is an active verb indicating intention, which is very
different from not available for which implies the potential to become
available, unlike shut out which ones a decision to not provide support.

That said Nadim, I do find increasing use of opera in areas of low
bandwidth such as Zimbabwe and Libya. It may only be 1% of total users but
might be a far larger percent of likely users or users you intend to reach.
That said I know nothing about the technical issues and assume u have
investigated them.

Brian
On Jun 11, 2013 2:19 AM, Catherine Roy ecr...@catherine-roy.net wrote:

 On 10/06/2013 6:18 PM, Nadim Kobeissi wrote:

 Catherine,
 Opera is not shut out. It's simply difficult to develop for Opera due
 to its limited browser extension API. Your email made it sound as if
 Cryptocat had something against the Opera browser.


 My email is simply stating that Opera is shut out. How else should I
 interpret this message : Cryptocat is not available for your browser.

 See screenshot : 
 http://www.flickr.com/photos/**zazie/9010759541/http://www.flickr.com/photos/zazie/9010759541/

 I sent you a message off-list to inquire about this and received no
 response.


  We have a ticket open for Opera compatibility in our code base. If you'd
 like to, you can contribute to Cryptocat for Opera development here:
 https://github.com/cryptocat/**cryptocat/issues/190https://github.com/cryptocat/cryptocat/issues/190


 I am not a developer. Must we all be developers to have a significant
 influence on these types of issues ?

 Best regards,


 Catherine

 --
 Catherine Roy
 http://www.catherine-roy.net




 NK

 On 2013-06-10, at 6:10 PM, Catherine Roy ecr...@catherine-roy.net
 wrote:

  Congrats. But, as I asked in a private email to which I got not
 response, is there any reason why Opera is shut out ?

 Best,


 Catherine

 --
 Catherine Roy
 http://www.catherine-roy.net


 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/**mailman/listinfo/**liberationtechhttps://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Cryptocat: Translation Volunteers Needed

2013-06-11 Thread Travis McCrea
To be honest, if you are not in a situation that needs cryptocat anyway, and 
Nadim doesn't make any money from you using cryptocat... and it means less 
hostile bug reports from you... why would he want you to?

No one is forced to use the program, yes, Opera might be used by people we 
would like to target but as said earlier Opera is coming out real soon with a 
new version that will be compatible. Why waste effort to support a legacy 
browser, when he could be focusing his time on making cryptocat better for 
everyone?

I don't speak for CryptoCat so don't use my words against them, I just don't 
really see why people are getting all agro. We are all on the same team.

Catherine Roy wrote:
 On 11/06/2013 10:07 AM, Nadim Kobeissi wrote:
 On 2013-06-10, at 8:21 PM, Catherine Roy ecr...@catherine-roy.net
 wrote:

 I am not a developer. Must we all be developers to have a
 significant influence on these types of issues ?
 No, you can also repeatedly send me blandly demanding emails and then
 take the issue to the public when I don't answer immediately, and
 expect me to change Cryptocat's development roadmap to accommodate
 for you and the 1% that use a browser with a highly limited
 third-party development API.

 Seriously, you're really frustrating.


 For the record, I sent you one very polite email off list 3 days ago
 to which you never replied. My 2 emails to this list were not blandly
 demanding either, they were simple and to the point. I do not think
 any of my messages warranted this type of reply. And neither did they
 warrant me being insulted off list by someone else from this list.

 Browser optimization is not something to take lightly and basically
 dismissing someone by telling them to go contribute code on github is
 not the best way to handle things either (like I said not everyone is
 a developer and users should be able to inquire about and request
 changes regardless). Indeed Opera is perhaps not the browser with the
 most market share globally (1.52% atm) but by effectively shutting it
 out, you are ignoring many eastern european countries, among other
 things.

 Anyhow, I do use other browsers out of necessity, including Chrome,
 Chromium and Firefox. But with such user/customer relations, I will
 not be going to the trouble of taking them out for your product.

 Best regards,


 Catherine

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] OHM2013 Hacker Camp: Five Whistleblowing Lectures

2013-06-11 Thread Griffin Boyce
Hi Fabio et al,

  My talk is about computer forensics, but many of the examples used are
specific to whistleblowing.  I will also be giving at least one short
workshop on document forensics specifically.

Keep an eye out for  Do You Want To Know A Secret: A Brief History of
Computer Forensics

  And I will be in Noisy Square as well, hacking on stuff and cooking
(though perhaps not in that space). =)

best,
Griffin Boyce

-- 
Just another hacker in the City of Spies.
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de

My posts, while frequently amusing, are not representative of the thoughts
of my employer.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Building a encrypted mobile network

2013-06-11 Thread Jonathan Wilkes





 From: Michael Rogers mich...@briarproject.org
To: liberationtech liberationtech@lists.stanford.edu 
Sent: Tuesday, June 11, 2013 10:45 AM
Subject: Re: [liberationtech] Building a encrypted mobile network
 

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Anthony,

On 08/06/13 13:36, Anthony Papillion wrote:
 1. Location is a particularly thorny issue. Presentations at either
 HOPE or BlackHat demonstrated how easy it is to locate a mobile
 even if you're not the government with a massive budget and mad
 technology.
 
 Perhaps routing the network connection through Tor may suffice? But
 I don't think so as something doesn't 'feel' right about that.
 Thoughts?

Routing the call through Tor wouldn't conceal the phone's location
from the mobile network. The caller and callee would both have to use
cell towers to reach the Tor network, so their respective mobile
networks would still know their locations, and any hacks that can
currently be used to trick the mobile network into revealing a phone's
location would still work.

In theory you could conceal who calls whom from the mobile network by
routing the call through Tor. However, in order to be able to receive
calls, the callee would either have to maintain a constant connection
to Tor (draining her battery and data allowance) or ask some third
party with a constant connection to Tor to send her push notifications
of incoming calls, which she could then answer by connecting to Tor.
The third party would know when the callee was receiving incoming
calls, though not necessarily from whom.

Even this would reveal quite a lot of information to the mobile
network. Alice starts sending data at 12:34:56. Bob receives a push
notification at 12:34:57. Bob starts sending data at 12:34:58. Alice
and Bob both stop sending data at 12:44:58. The inference is pretty
clear: Alice called Bob at 12:34 and the call lasted ten minutes.

Concealing these patterns would require users to send and receive
dummy data even when they weren't sending or receiving calls, which
would drain their batteries and data allowances. It would be possible
to build such a system, but I don't think anyone would use it.

I don't think it's out of the realm of possibility that somebody would have
a device running orbot with a (non-exit) relay that sits at home, plugged
in, running over wifi.  Or, some small plug computer with a headset
hookup that functions the same.  Or on their main machine that just runs
all the time.  All that's needed then is a mechanism to
leave a text message when the other person isn't at home (Torchat, maybe
Bitmessage, etc.).

It's reinventing old technology: the landline and the answering machine.
But users would avoid the new surveillance problems with metadata
leaking.  Whoever is planning the Restore the Fourth Amendment
project would certainly make use of such a system if it existed
and was usable.

-Jonathan
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Sean Cassidy
Hello all,

I have created a simple anonymity network that broadcasts all messages
to participants so that you cannot associate chatters.

https://bitbucket.org/scassidy/dinet

There is a simple sample client available, but you could write your
own client to build your own features atop the network.

http://projects.existentialize.com/dinet/client.html

Please let me know if you have any comments.

Sean
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Griffin Boyce
It would be a fairly simple task to review all of the chat information and
correlate call and response for all of the conversations.

~Griffin
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Steve Weis
Hi. I took a quick look while procrastinating at work and found a few
potential issues:

- What's up with this hard-coded
salthttps://bitbucket.org/scassidy/dinet/src/9f3afe465afb124367e03b63c6b63cba261e4edf/client/broadcast_client.c?at=master#cl-16
?
- Any specific reason you picked
CTRhttps://bitbucket.org/scassidy/dinet/src/9f3afe465afb124367e03b63c6b63cba261e4edf/client/broadcast_client.c?at=master#cl-88
?
- Use 
mlockhttps://bitbucket.org/scassidy/dinet/src/9f3afe465afb124367e03b63c6b63cba261e4edf/client/broadcast_client.c?at=master#cl-238
here?
I don't think that will help you if you run within a guest VM though.
- Buffer 
overflowhttps://bitbucket.org/scassidy/dinet/src/9f3afe465afb124367e03b63c6b63cba261e4edf/client/broadcast_client.c?at=master#cl-241on
password input
- Is this safe for non-terminated
stringshttps://bitbucket.org/scassidy/dinet/src/9f3afe465afb124367e03b63c6b63cba261e4edf/common.c?at=master#cl-41
?
- Why do you have this
checksumhttps://bitbucket.org/scassidy/dinet/src/9f3afe465afb124367e03b63c6b63cba261e4edf/client/broadcast_client.c?at=master#cl-112if
you just HMACed the ciphertext?
- HMAC verification is vulnerable to a timing
attackhttps://bitbucket.org/scassidy/dinet/src/9f3afe465afb124367e03b63c6b63cba261e4edf/client/broadcast_client.c?at=master#cl-129.
Since you're using CTR, it's that much easier to forge messages.
- There's no forward security.

This is by no means comprehensive. I've only been looking at a couple files.


On Tue, Jun 11, 2013 at 9:52 AM, Sean Cassidy sean.a.cass...@gmail.comwrote:

 Hello all,

 I have created a simple anonymity network that broadcasts all messages
 to participants so that you cannot associate chatters.

 https://bitbucket.org/scassidy/dinet

 There is a simple sample client available, but you could write your
 own client to build your own features atop the network.

 http://projects.existentialize.com/dinet/client.html

 Please let me know if you have any comments.

 Sean
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] [cryptopolitics] [cryptography] skype backdoor confirmation

2013-06-11 Thread Eugen Leitl
- Forwarded message from Adam Back a...@cypherspace.org -

Date: Tue, 11 Jun 2013 19:28:44 +0200
From: Adam Back a...@cypherspace.org
To: Ethan Heilman eth...@gmail.com
Cc: Crypto discussion list cryptogra...@randombit.net, New Cpunks List 
cryptopolit...@randombit.net
Subject: Re: [cryptopolitics] [cryptography] skype backdoor confirmation
User-Agent: Mutt/1.5.21 (2010-09-15)
Reply-To: New Cpunks List cryptopolit...@randombit.net

(I set the reply to to the cryptopolitics/new cypherpunk list).

It seems skype via PRISM/NSA api or intermediate server complying with a
FISA order they probably couldnt talk about if they wanted to, is recording
pretty much everything in skype channels, maybe narrowed only by
bandwidth. It doesnt seem that US citizens are particularly safe
either, though not
being from the US I'm even less than 51% assured anyway.  Great and 100%
full-on analysis for the rest of the world.

In fact it seems what is really going on is they record everything to
preserve ability for retro-active analysis, US  non-US.  According to EFF
in NSA terminology data isnt collected until its pulled from the NSA data
farm and analysed in some way.  Obvioulsy to other readers of the English
language, collected is when it hits the disk in NSA's Utah exabyte disk
farm.  So the 51% assurance I would think is actually that they havent yet
analysed your data (for US users), not that they didnt record it.

Curiously many journalists and commentators seem to be suffering from
repeated extremely naive failure to parse PR-speak.  They need to read more
from Binney and re-listen to Snowden.  You cant expect to reverse engineer
the architecture of something from a PR expert who is intentionally lying to
you.  (Lying is defined as an intent to mislead, and they lied to everyone
including the authors of the Patriot act, congress, the oversight
committees, etc.  Clapper calls it (actual TV interview quote) least
untruthful manner ie he didnt say anything directly untrue during his
previous successful attempts to mislead congress in congressional hearings.)


Anyway a small tidbit related to the pre-prism discussion of skype suspected
backdooring (and probably thats pretty much conclusive given the PRISM
disclosures):

This article says skype had handed over web browsing information:

http://www.guardian.co.uk/technology/2013/jun/11/uk-intelligence-requests-microsoft-data

But more than 7,000 British requests resulted in data being shared,
including names, addresses and browsing history showing a list of websites
visited by a Microsoft customer

So given the context being skype, I am thinking that we're just checking
for malware URL uploading is actually recorded and subject to supoena for
normal law enforcement, and mass storage/retro-active analysis by law
enforcement.  Probabl along with the rest of the IM stream.


Back to the PRISM saga, I think the NSA and echelon partners have
overstepped the mark massively and built a MONSTROSITY that may eventually
bring down democracy.  Its probably more fragile than people think; some
european democracies are relatively young, and civil unrest and dangerous
political voices seem to gain in times of extreme economic and political
stress as in greece (golden dawn neo-nazis).

No doubt the prime PRISM motivations were profit (defense contractors with
big lobbing influence in the post 9-11 world) plus a bit of national
security, chasing the odd bad guy.  But for proportionality in cost (the
number of people killed by terrorists is a tiny tiny risk for western
countries), and erosion of civil liberties (4th amendment to americans) this
is an outrage.  Many people died historically fighting to rid the world of
such facist governments.  We should not glibly build the means of
democracies downfall.  The most dangerous aspect is the secerecy - not only
do they want to collect the biggest dossier on everyone ever, they want to
do it in secret, with secret courts, secret legal interpretations, and gag
orders on those in industry forced to participate.  Secret laws are not
hallmarks of a democratic process.

Adam

On Thu, Jun 06, 2013 at 06:23:16PM -0400, Ethan Heilman wrote:
   From the new Washington Post Article
 
 According to a separate Users Guide for PRISM Skype Collection, that
 service can be monitored for audio when one end of the call is a
 conventional telephone and for any combination of audio, video,
 chat, and file transfers when Skype users connect by computer alone.
 Googles offerings include Gmail, voice and video chat, Google Drive
 files, photo libraries, and live surveillance of search terms.
___
cryptopolitics mailing list
cryptopolit...@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptopolitics

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 

Re: [liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Sean Cassidy
On Tue, Jun 11, 2013 at 10:10 AM, Griffin Boyce griffinbo...@gmail.com wrote:
 It would be a fairly simple task to review all of the chat information and
 correlate call and response for all of the conversations.

I disagree for several reasons.

First is that if the load on the network is high enough, conversations
can hide in the noise. This is helped by dummy message generation
either by clients or servers (preferably clients to protect against
attackers that can monitor every node).

Second is that this protocol is not necessarily one-to-one. It
naturally supports one-to-many, many-to-one, and many-to-many
messages. As these are not distinguished at the message layer, but
rather at the application layer, it would take some more sophisticated
analysis to determine the nature of the conversation.

Third is that prefix selection logic is entirely up to the client.
They can choose prefixes that vary with an encrypted pattern, or some
variant of that idea, to obfuscate where they are sending their
messages.

Sean


 ~Griffin

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Sean Cassidy
On Tue, Jun 11, 2013 at 10:29 AM, Steve Weis stevew...@gmail.com wrote:
 Hi. I took a quick look while procrastinating at work and found a few
 potential issues:

Thanks for taking a look. I'll be sure to incorporate your feedback.

 - What's up with this hard-coded salt?

Lack of love for the text client. I should just delete that code. The
primary user interface is the HTTP endpoint.

 - Any specific reason you picked CTR?

CTR is widely recommended. Cryptography Engineering specifically recommends it.

 - Use mlock here? I don't think that will help you if you run within a guest
 VM though.
 - Buffer overflow on password input

Absolutely true.

 - Is this safe for non-terminated strings?

Gah, must have missed that in my review.

 - Why do you have this checksum if you just HMACed the ciphertext?

This checksum is an important part of DiNet. Each packet comes with a
checksum that each router uses to verify the message integrity (not
authenticate, mind you) and to make sure it hasn't seen this message
before. As each router sends every packet it hasn't seen recently to
every machine that is connected to it, it is important to not re-send
data.

 - HMAC verification is vulnerable to a timing attack. Since you're using
 CTR, it's that much easier to forge messages.

I will have to look into this in my Javascript client as well. Do you
have any recommendations?

 - There's no forward security.

I am aware. This is a feature I would love to add to the Javascript client.


 This is by no means comprehensive. I've only been looking at a couple files.

Thanks for looking! I appreciate the feedback.

Sean



 On Tue, Jun 11, 2013 at 9:52 AM, Sean Cassidy sean.a.cass...@gmail.com
 wrote:

 Hello all,

 I have created a simple anonymity network that broadcasts all messages
 to participants so that you cannot associate chatters.

 https://bitbucket.org/scassidy/dinet

 There is a simple sample client available, but you could write your
 own client to build your own features atop the network.

 http://projects.existentialize.com/dinet/client.html

 Please let me know if you have any comments.

 Sean
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech



 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Tom Ritter
On 11 June 2013 13:42, Sean Cassidy sean.a.cass...@gmail.com wrote:
 On Tue, Jun 11, 2013 at 10:10 AM, Griffin Boyce griffinbo...@gmail.com 
 wrote:
 It would be a fairly simple task to review all of the chat information and
 correlate call and response for all of the conversations.

 I disagree for several reasons.

 First is that if the load on the network is high enough, conversations
 can hide in the noise. This is helped by dummy message generation
 either by clients or servers (preferably clients to protect against
 attackers that can monitor every node).

 Second is that this protocol is not necessarily one-to-one. It
 naturally supports one-to-many, many-to-one, and many-to-many
 messages. As these are not distinguished at the message layer, but
 rather at the application layer, it would take some more sophisticated
 analysis to determine the nature of the conversation.

 Third is that prefix selection logic is entirely up to the client.
 They can choose prefixes that vary with an encrypted pattern, or some
 variant of that idea, to obfuscate where they are sending their
 messages.


I haven't looked at your project much (sorry, I've added it to my list
though ;) )  - but Griffin is right to be paranoid first.  Depending
on the metadata available*, it is often possible to correlate messages
with some good amount of probability, even when it seems like a flood
of random messages.

I like the idea of shared inboxes, for all their faults, and will be
talking about faults and these types of correlation attacks at Defcon
this summer, targeting perhaps the largest shared inbox-based
anonymity project deployed:
https://www.defcon.org/html/defcon-21/dc-21-speakers.html#Ritter

-tom

*It's amusing that the focus of this (and my) analysis completely
discards looking at actual content, and focuses entirely on metadata.
Metadata, Metadata, Metadata. ;)
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Steve Weis
Comments inline...

On Tue, Jun 11, 2013 at 10:47 AM, Sean Cassidy sean.a.cass...@gmail.comwrote:

  - Any specific reason you picked CTR?
 CTR is widely recommended. Cryptography Engineering specifically
 recommends it.


The reason I ask is that this makes your IV-generation more critical than,
say, CBC, XTS, or other modes. If you have an IV collision, you'll leak
some message bits.

How big is the random nonce here, i.e. sizeof(dp.id.id) -
blenhttps://bitbucket.org/scassidy/dinet/src/9f3afe465afb124367e03b63c6b63cba261e4edf/client/broadcast_client.c?at=master#cl-84?
How are message IDs generated?


  - HMAC verification is vulnerable to a timing attack. Since you're using
   CTR, it's that much easier to forge messages.

 I will have to look into this in my Javascript client as well. Do you
 have any recommendations?


Use a timing-independent array
comparisonhttp://rdist.root.org/2010/01/07/timing-independent-array-comparison/.
It's an easy fix. I've made the same mistake before, which is why I always
look for it now.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Gregory Maxwell
On Tue, Jun 11, 2013 at 9:52 AM, Sean Cassidy sean.a.cass...@gmail.com wrote:
 I have created a simple anonymity network that broadcasts all messages
 to participants so that you cannot associate chatters.
 https://bitbucket.org/scassidy/dinet

See also: https://bitmessage.org/wiki/Main_Page

(I have some reservations about the design-as-of-last-I-looked:  The
round trip required to obtain the far-end's public key significantly
degrades the security properties— but they've been actively developing
it, so that may well have been fixed by now).
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] [cryptopolitics] [cryptography] skype backdoor confirmation

2013-06-11 Thread Pavol Luptak
On Tue, Jun 11, 2013 at 07:31:59PM +0200, Eugen Leitl wrote:
 democracies downfall.  The most dangerous aspect is the secerecy - not only
 do they want to collect the biggest dossier on everyone ever, they want to
 do it in secret, with secret courts, secret legal interpretations, and gag
 orders on those in industry forced to participate.  Secret laws are not
 hallmarks of a democratic process.

https://fbcdn-sphotos-a-a.akamaihd.net/hphotos-ak-prn1/943487_324377737694270_933715187_n.jpg

:)
-- 
__
[Pavol Luptak, Nethemba s.r.o.] [http://www.nethemba.com] [tel: +421905400542]
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Griffin Boyce
Sean Cassidy sean.a.cass...@gmail.com wrote:

 First is that if the load on the network is high enough, conversations
 can hide in the noise. This is helped by dummy message generation
 either by clients or servers (preferably clients to protect against
 attackers that can monitor every node).


  Unless I'm missing something (entirely possible): From your standpoint,
the ideal would be to hit a high enough rate that it makes real-time
analysis of content (by a human) impossible. By the time the service hit
that rate of chats, it will be nigh-unusable by people.  This is more or
less why chat channels (eg, IRC) were created in the first place.  And that
doesn't preclude outside observers from storing and correlating the chats.

~Griffin
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Sean Cassidy
On Tue, Jun 11, 2013 at 11:42 AM, Griffin Boyce griffinbo...@gmail.com wrote:
 Sean Cassidy sean.a.cass...@gmail.com wrote:

 First is that if the load on the network is high enough, conversations
 can hide in the noise. This is helped by dummy message generation
 either by clients or servers (preferably clients to protect against
 attackers that can monitor every node).


   Unless I'm missing something (entirely possible): From your standpoint,
 the ideal would be to hit a high enough rate that it makes real-time
 analysis of content (by a human) impossible. By the time the service hit
 that rate of chats, it will be nigh-unusable by people.  This is more or
 less why chat channels (eg, IRC) were created in the first place.  And that
 doesn't preclude outside observers from storing and correlating the chats.


This is mitigated (somewhat) by allowing the users to filter the
amount of messages they can receive by the length of the prefix they
specify. The shorter the prefix, the more messages and more
anonymous it becomes, but if bandwidth is a concern you can increase
your prefix length to lower your bandwidth consumption. The fixed
message size addresses this somewhat as well.

Sean

 ~Griffin

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Sean Cassidy
On Tue, Jun 11, 2013 at 11:13 AM, Gregory Maxwell gmaxw...@gmail.com wrote:
 On Tue, Jun 11, 2013 at 9:52 AM, Sean Cassidy sean.a.cass...@gmail.com 
 wrote:
 I have created a simple anonymity network that broadcasts all messages
 to participants so that you cannot associate chatters.
 https://bitbucket.org/scassidy/dinet

 See also: https://bitmessage.org/wiki/Main_Page

 (I have some reservations about the design-as-of-last-I-looked:  The
 round trip required to obtain the far-end's public key significantly
 degrades the security properties— but they've been actively developing
 it, so that may well have been fixed by now).

A friend of mine sent me this as well when I told him about it. My
main concern with Bitmessage is the size and complexity of the
protocol. My protocol is just a struct:

struct dinet_packet {
uint8_t id[16]; // prefix + random in the default client
uint8_t data[1024];
uint8_t checksum[32]; // SHA-256 checksum of the previous two
fields, to avoid flooding the network with duplicate packets
};

Should be easier to analyze and study, I would think.

Sean

 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Russia and PRISM?

2013-06-11 Thread Peter Bourgelais

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On second thought, disregard this.  Prizma is a fairly standard social
media analytics platform.  It has none of the features of PRISM that
have come out in the past week.

On 06/08/2013 05:52 PM, Peter Bourgelais wrote:

 Hello again libtech,

 First, sorry for replying out of thread again, I have different settings
 on this email and it shouldn't happen again.

 Late last year, I heard about a data mining system in use by the Russian
 authorities called Prizma. Here are some links, and Google Translate
 is your friend:

 http://www.forbes.ru/sobytiya/vlast/92590-kak-vlasti-chitayut-vashi-blogi-rassledovanie-forbes

 http://roem.ru/2012/08/16/prizma52924/

 http://www.mlg.ru/solutions/4executives/prizma/

 Anyone else want to speak to this?

 -Peter Bourgelais
 Tech Fellow
 AccessNow.org


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJRt4SqAAoJENkgSO8zvZYxCQ8IAJp4GSkglWrgkgbaB5rkVncL
TG3C3/LDhixVm74ECwn00/AtsJf7lLJQX6xwe+wUk2gc6U8SdbU2CyKsWfC8lUAA
sREtwP4+uW4RVNXXmy3UYmjae+sD2lmg7FaDRu7mS7PKo0+eZto/2qFEyFxFhRHO
cI76qhuo649getE8QRYXReb51vaWJqaxxwfE4pbxIfO7qTwJ/s9sy++jDYgrGumM
txgF6pxXATLpgypUjfE71yLsVG6fkdJhpEnKm+G5OdayvOYcmVD+LwbI7prPXaLs
U6AA/jscK6dEED6CiPYoCH5WVYA6s93eXPN8kSpT1jGpYPk6+O92UgXpNcqfG3k=
=rMgq
-END PGP SIGNATURE-

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Mike Perry
Steve Weis:
 Comments inline...
 
 On Tue, Jun 11, 2013 at 10:47 AM, Sean Cassidy 
 sean.a.cass...@gmail.comwrote:
 
   - Any specific reason you picked CTR?
  CTR is widely recommended. Cryptography Engineering specifically
  recommends it.

I was puzzled by this recommendation. CTR has several bad propeties that
can surprise you, and have bitten Tor as well.
 
 The reason I ask is that this makes your IV-generation more critical than,
 say, CBC, XTS, or other modes. If you have an IV collision, you'll leak
 some message bits.

Additionally to this, CTR allows bit-level maleability of the cleartext:
a bit flipped in a CTR cipherstream translates into a bit flipped in
the cleartext.

In fact, if there are regions of known cleartext (such as zeroes) the
adversary can do things like encode the originating IP in the cleartext
simply by XORing it into the cipherstream.

This property can cause problems if you perform any operations before
checking the MAC (like evaluating a weak CRC to decide to forward the
message or not).

CBC on the other hand causes a single ciphertext bitflip to scramble a
block of cleartext (16 or 32 bytes for 128bit vs 256bit) in an
unpredictable and key-dependent way.


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Internet blackout

2013-06-11 Thread Richard Brooks
Just finished interacting with people from a number
of countries worried about Internet blackouts being
used by their governments to help prevent reporting
of unpleasant truths, such as vote-rigging.

I discussed with them what Telecomics did for Egypt
and other Arab countries and what Commotion and
mesh-networking may provide. They were enthusiastic
about these possibilities, but disappointed when
I explained that this was not anything that could
be put in place proactively for the moment.

This lead me to start thinking about the possibility
of deploying something like Fidonet as a tool for
getting around Internet blackouts. Has anyone tried
something like that?

Was wondering if anyone was aware of other approaches
for mitigating this type of DoS.

-Richard
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptocat: Translation Volunteers Needed

2013-06-11 Thread Catherine Roy

On 11/06/2013 5:54 PM, Andy Isaacson wrote:
The amount of work you're demanding (and yes, your first public post 
did come across as, arguably, demanding; and you doubled down when 
Nadim pushed back)


I suggest you read my first email again. I did not demand anything. I 
asked why Opera was not supported. If someone had bothered to give me 
the reasons that you offered in your message instead of a) ignoring me, 
b) insulting me off-list, c) claiming that n% of users (roughly over 200 
million) was not worth the trouble and/or d) telling me to just 
contribute code (as if everyone can just do that in the real world), 
this discussion would likely have gone very differently.


I feel that this discussion has become quite off-topic and much too 
personal so I will not be commenting again on this subject. I am however 
available for discussions off-line, provided that they are respectful 
and constructive.


Best regards,


Catherine

--
Catherine Roy
http://www.catherine-roy.net

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptocat: Translation Volunteers Needed

2013-06-11 Thread Nadim Kobeissi
I would sincerely like to apologize to the LibTech community for this 
incredibly embarrassing episode.

NK

On 2013-06-11, at 6:56 PM, Catherine Roy ecr...@catherine-roy.net wrote:

 On 11/06/2013 5:54 PM, Andy Isaacson wrote:
 The amount of work you're demanding (and yes, your first public post did 
 come across as, arguably, demanding; and you doubled down when Nadim pushed 
 back)
 
 I suggest you read my first email again. I did not demand anything. I asked 
 why Opera was not supported. If someone had bothered to give me the reasons 
 that you offered in your message instead of a) ignoring me, b) insulting me 
 off-list, c) claiming that n% of users (roughly over 200 million) was not 
 worth the trouble and/or d) telling me to just contribute code (as if 
 everyone can just do that in the real world), this discussion would likely 
 have gone very differently.
 
 I feel that this discussion has become quite off-topic and much too personal 
 so I will not be commenting again on this subject. I am however available for 
 discussions off-line, provided that they are respectful and constructive.
 
 Best regards,
 
 
 Catherine
 
 -- 
 Catherine Roy
 http://www.catherine-roy.net
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Guardian reporter delayed e-mailing NSA source because crypto is a pain

2013-06-11 Thread Nadim Kobeissi
This story really solidifies why I believe that we need to make privacy 
technologies accessible to journalists, instead of simply focusing on the other 
way around.

Glenn Greenwald had to substantially delay his communications with Edward 
Snowden due to how inaccessible a lot of privacy and encryption software is to 
use.

Our main and primary goal at Cryptocat has been to focus on making encrypted 
communications accessible, easier to use and fun and attractive. We've always 
believed that accessibility is a security feature, and this idea is at the core 
of our project.

http://arstechnica.com/security/2013/06/guardian-reporter-delayed-e-mailing-nsa-source-because-crypto-is-a-pain/

NK
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Guardian reporter delayed e-mailing NSA source because crypto is a pain

2013-06-11 Thread Gregory Maxwell
On Tue, Jun 11, 2013 at 6:56 PM, Kate Krauss ka...@critpath.org wrote:
 It's really easy to use these tools if you already know how to do it.

I've been using PGP since 1994, if not earlier. In more recent times
it's become a regular part of my workflow in discussing security
critical bugs. I am a programmer and a computing expert.

I do not consider the tools easy to use at all but I understand their
importance and use them with other people who understand their
importance, _in spite_ of the fact that they are burdensome. I am
large unable to get people who do not understand their importance to
use them. Or even if I get them to use them once, because the tools
require an effort to use on an ongoing basis they do not use them
reliably.

The only shining ray of success I've experienced in this space is OTR,
and but my personal experience is that even that is failing as more
people move away from using pidgin and adium to chat systems which OTR
does not as easily integrate with.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Internet blackout

2013-06-11 Thread Eleanor Saitta
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2013.06.11 17.44, Richard Brooks wrote:
 This lead me to start thinking about the possibility of deploying
 something like Fidonet as a tool for getting around Internet
 blackouts. Has anyone tried something like that?

Not Fidonet, because the world has moved on, but Briar is designed
with a similar store-and-forward architecture as a delay-tolerant
messaging system with strong security guarantees, intended to work
across whatever transport is available in the moment for exactly this
kind of situation.  While we're a ways from being ready for use in any
kind of high-risk (or even low-risk-but-real) scenario, we've got an
early alpha out if you want to play with it.  We're also looking for
more help, especially from developers (Java; Android, Swing, JDBC,
concurrency, etc.); we're happy to mentor less-experienced developers.
 More info here: http://briar.sourceforge.net/get-involved.html. /ad

E.

- -- 
Ideas are my favorite toys.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iF4EAREIAAYFAlG3/sgACgkQQwkE2RkM0wpIyQD/d3gZhRQ7gfFOZwD5u5HnIK2H
HUVDJgIkIltdL3EmNTwA/RUgVH0i9w6v+5AjuWxHukljXsJgUoI8YmhXPzjoRLdg
=LOBj
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech