I think we need to define the list of requirements before suggesting solutions; Freenet is unsuitable for the problem case in a number of ways, but it's counterproductive to reason from a position of making a given solution fit.
--Len. On Wed, 22 Dec 2010, Tony Arcieri wrote: > I thought Freenet covered the sort of use cases that publishing "leaked" > info needs, but from the attention I've seen given to Freenet in the > aftermath of Wikileaks, it seems like it doesn't have enough resources right > now. Maybe if everyone who was currently hosting a Wikileaks mirror was > instead hosting a Freenet node... > > On Wed, Dec 22, 2010 at 11:44 AM, Len Sassaman < > len.sassa...@esat.kuleuven.be> wrote: > >> Greetings, p2p-hacker folks, >> >> This list seems to be the most direct spiritual successor to the >> cypherpunks list, which is where I'd want to raise this issue if it still >> existed. >> >> As most of you are undoubtedly aware, the sudden surge in attention >> Wikileaks has gained in the last months have resulted in at least half a >> dozen imitation "leaks" sites -- from OpenLeaks, founded by former >> Wikileaks staff who have different ideas on how such a site should >> operate, to regional whistle-blower and transparency sites such as >> Brusselsleaks, Balkanleaks, Pirateleaks.cz, etc. >> >> Let me first state I think that this is absolutely a good thing -- in >> principle. Relying on a single initiative such as Wikileaks both gives way >> too much power to the organization in question, and makes it a >> high-profile target. The rise of independant leak publishers decentralizes >> the fundamental service these sites provide, and brings attention back to >> the content of their publications rather than the personalities of the >> individuals involved. >> >> It's also problematic for a number of reasons: firstly, reputation. Who is >> BrusselsLeaks? Why should a whistleblower trust that the operators of that >> site have his/her interests in mind? What's to say they're not an >> initiative of an intelligence agency? I'm not sure there's anything to be >> done about that, except wait and let these other players earn their own >> reputation capital. >> >> However, it's painfully clear to me that a number of these sites don't >> have the first clue when it comes to technological measures they should be >> taking to protect their sources. E.g., BrusselsLeaks is running their >> operation with Wordpress and Hushmail -- hardly a hardened solution. >> >> Wikileaks has had four years and the input of top network security >> experts, cryptographers, p2p-hackers, and cypherpunks, to create a system >> hardened against predictable threats. It's quite likely that had Bradley >> Manning not made the mistake of "confessing" to a government snitch posing >> as a journalist, he'd not be in jail today. Wikileaks, according to what I >> can gather from press reports and comments from people involved, as well >> as examining their site, relies on a Tor Hidden Service setup for >> receiving submissions. That alone is hardly enough to protect the site >> from attacks on the anonymity of its sources, the integrity and security >> of its site, or its network presense, but already requires a level of >> technical sophistication that is lacking in most of these "copy-cat" >> sites. >> >> I'd like to see us come up with an easy-to-deploy solution for launching a >> leaks site with the security considerations addressed, perhaps in the form >> of a "soft appliance" distribution, but first we need a basic requirements >> document. What are the technical security requirements of such a service? >> >> Off the top of my head, I think we can divide this into three parts: >> >> 1. General site security. The website/servers need to be resistant to >> compromise, and also need to be prepared for the same. The credibility of >> Wikileaks would be severely damaged if an attacker were able to, for >> example, introduce fake diplomatic cables to the cache of documents >> waiting to be released, so that the Wikileaks staff inadvertantly >> published false information. So in addition to protecting against >> breakins, the system needs to be designed to maintain data integrity in >> the face of compromise. >> >> 2. Source protection. The site needs to provide a means for whistleblowers >> to contact the site operators, discuss issues, and submit documents in an >> anonymous manner. Wikileaks solves this with Tor, though there might be >> other ways. We need a clearly defined threat model to build against, and >> must keep in mind that usability is a security concern -- we have to >> assume that the whistleblowers are not geeks, and the site operators may >> not be, either. >> >> 3. Censorship resistance. If 2. brings to mind Tor, 3. brings to mind the >> Eternity Service. In this model, the publisher does not need to be >> anonymous, but the data needs to be authenticated and the service >> distributed. The CouchDB-based mirrors of the Afghanistan War Diaries >> provide a promising first-attempt; to be successful, these sites need to >> be able to leverage jurisdictional arbitrage and distributed hosting to >> resist network denial of service attacks and legal attacks aimed at >> taking their sites offline, as well as data corruption attacks aimed at >> invalidating the material by attacking its credibility with the >> introduction of false documents, etc. >> >> 3.a. would be a way for third-parties to obtain the material provided by >> these services in an anonymous fashion; I see this as lower priority than >> the other issues, but still something to think about. >> >> My goal here is to develop a formal, realistic model for the operation of >> a legitimate journalistic whistle-blower material clearinghouse. I'm >> basically proposing we replicate in public, with peer-review, the process >> I assume Wikileaks itself has undergone for the design of their system. >> Let's identify the likely attacks and attack vectors for given >> adversaries, compose a solution based on available technology, and >> assemble it in as easily deployable a manner as possible. >> >> Who else is interested? Let's get this discussion rolling. >> >> >> Best, >> >> Len >> _______________________________________________ >> p2p-hackers mailing list >> p2p-hackers@lists.zooko.com >> http://lists.zooko.com/mailman/listinfo/p2p-hackers >> > > > > -- > Tony Arcieri > Medioh! Kudelski > _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers