Re: [liberationtech] Bradley Manning's sentence: 35 years for exposing us to the truth

2013-08-21 Thread Mike Perry
Thus spake Tom O (winterfi...@gmail.com):

> To be honest, this was probably the best he could have hoped for.
> 
> He was facing 90. He got 35 with parole after 12.
> 
> It's shit, but not as shit as the other options.
> 
> If Snowden gets captured, you can bet he will be getting much much worse.

This would be really unfortunate, especially since by any objective
measure Snowden has been significantly more careful with what he's
allowed to be revealed than Manning was. Thankfully, public opinion also
seems to indicate that most people understand this effort on Snowden's
part, despite the media circus.

Even still, I am not in the "Snowden would get a fair trial in the US"
camp, either.

I am also worried by the fact that the lawlessness of the gangster
governments that most Western democracies have devolved into has
necessitated this whole insurance file business again. Let's hope at
least that bit works out better this time, for everyone involved.


-- 
Mike Perry
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] From Snowden's email provider. NSL???

2013-08-08 Thread Mike Perry
It is profoundly encouraging to see that people of such courage and
integrity as the Lavabit staff exist, and are willing to put everything
on the line to stand up against this madness.

David Johnson:
> https://lavabit.com/<https://mail.aljazeera.net/owa/redir.aspx?C=C-JjrgIYEEuVtop4L5ekkprZkHoJaNAI1emSTsdeFmPgXa3gmIunVE-6BLYJ-qLs7Uy3YNIHo0k.&URL=https%3a%2f%2flavabit.com%2f>
> 
> My Fellow Users,
> I have been forced to make a difficult decision: to become complicit in
> crimes against the American people or walk away from nearly ten years of
> hard work by shutting down Lavabit. After significant soul searching, I
> have decided to suspend operations. I wish that I could legally share with
> you the events that led to my decision. I cannot. I feel you deserve to
> know what’s going on--the first amendment is supposed to guarantee me the
> freedom to speak out in situations like this. Unfortunately, Congress has
> passed laws that say otherwise. As things currently stand, I cannot share
> my experiences over the last six weeks, even though I have twice made the
> appropriate requests.
> What’s going to happen now? We’ve already started preparing the paperwork
> needed to continue to fight for the Constitution in the Fourth Circuit
> Court of Appeals. A favorable decision would allow me resurrect Lavabit as
> an American company.
> This experience has taught me one very important lesson: without
> congressional action or a strong judicial precedent, I would _strongly_
> recommend against anyone trusting their private data to a company with
> physical ties to the United States.
> Sincerely,
> Ladar Levison
> Owner and Operator, Lavabit LLC
> Defending the constitution is expensive! Help us by donating to the Lavabit
> Legal Defense Fund
> here<https://mail.aljazeera.net/owa/redir.aspx?C=C-JjrgIYEEuVtop4L5ekkprZkHoJaNAI1emSTsdeFmPgXa3gmIunVE-6BLYJ-qLs7Uy3YNIHo0k.&URL=https%3a%2f%2fwww.paypal.com%2fcgi-bin%2fwebscr%3fcmd%3d_s-xclick%26hosted_button_id%3d7BCR4A5W9PNN4>
> .

> --
> Liberationtech list is public and archives are searchable on Google. Too many 
> emails? Unsubscribe, change to digest, or change password by emailing 
> moderator at compa...@stanford.edu or changing your settings at 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech


-- 
Mike Perry
--
Liberationtech list is public and archives are searchable on Google. Too many 
emails? Unsubscribe, change to digest, or change password by emailing moderator 
at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] What if Firefox adopts Tor as feature?

2013-08-08 Thread Mike Perry
You can't have any of these configurations without a browser to begin
with, and serious support from Mozilla would make a number of things
better for Tor users in any number of deployment configurations,
including (and perhaps especially) high security ones.

As for capacity and all of that, we've been consistently adding relays
and capacity, but our userbase has not grown proportionally. My belief
is that this is largely due to usability issues.

In short, I am excited by this news, and I look forward to improving our
communication and cooperation with Mozilla on this front.

Kyle Maxwell:
> I've no idea about the capacity, but I will say that, in a general
> sense, this is a relatively insecure method of using Tor. Recent
> events have highlighted this, naturally, but Tor works best as network
> infrastructure where "split tunnelling" (to borrow a term from VPN
> architecture) is not allowed. Perhaps if it were fully sandboxed such
> that all communications had to go through a proxy, a la Whonix.
> 
> On Thu, Aug 8, 2013 at 9:24 AM, Lazlo  wrote:
> > Firefox is flirting with idea the to adopt Tor as a feature [1,2]. This
> > could easily multiply [3] the number of daily users on the Tor network [4].
> > These daily users are not likely to add new capacity to the network. Is the
> > Tor network able to handle a sudden peak in usage (there is some
> > overcapacity [5]) without a hassle or is there action required?
> >
> > [1] https://twitter.com/BrendanEich/status/364265592112414720
> > [2] https://bugzilla.mozilla.org/show_bug.cgi?id=901614
> > [3]https://en.wikipedia.org/wiki/Usage_share_of_web_browsers#Summary_table
> > [4] https://metrics.torproject.org/users.html
> > [5] https://metrics.torproject.org/network.html#bandwidth
> > --
> > Liberationtech list is public and archives are searchable on Google. Too
> > many emails? Unsubscribe, change to digest, or change password by emailing
> > moderator at compa...@stanford.edu or changing your settings at
> > https://mailman.stanford.edu/mailman/listinfo/liberationtech
> 
> 
> 
> -- 
> @kylemaxwell
> --
> Liberationtech list is public and archives are searchable on Google. Too many 
> emails? Unsubscribe, change to digest, or change password by emailing 
> moderator at compa...@stanford.edu or changing your settings at 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech

-- 
Mike Perry
--
Liberationtech list is public and archives are searchable on Google. Too many 
emails? Unsubscribe, change to digest, or change password by emailing moderator 
at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] NSA's crypto city

2013-07-11 Thread Mike Perry
James S. Tyre:
> Oddly, a former NSA operative I know was, while still with NSA, the Mayor of 
> the nearby
> town in which he lived.  Perhaps his colleagues stuffed the ballot box for 
> him.  '-)

You kid, but this is not how this sort of manipulation would work. Even
with E-Voting being the sham that it is, as Kennedy (I think?) said,
"You can steal a close race, but you can't steal a landslide."

In reality, NSA operatives are more likely to use their power for
destroying/manipulating political opponents by obtaining information
that could be used against them. For well-documented historical
examples, just look at Nixon, Hoover, etc.

For a more recent example: I suspect it was more than mere coincidence
that allowed the Petraeus affair to be discovered.. Even if you are
disinclined to believe in conspiracy in that particular case, it serves
as a textbook example for how one could take down a high-ranking
political official who suddenly becomes "inconvenient", using
only inappropriately obtained information...



-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] The Tor Project is looking for a Lead Automation Engineer

2013-07-09 Thread Mike Perry
The Tor Project wants to deploy nightly builds and continuous
integration for as many of our key software components and platform
combinations as possible.  Your job would be build and deploy the
initial functional versions of a wide range of testing frameworks and
continuous integration systems.

This is a contract position. Candidates are expected to be capable of
taking the lead in selecting, deploying, and maintaining multiple
automation systems in several different programming languages.

Candidates should also be capable of reproducing bugs and writing new
reproduction test cases for one or more of the testing frameworks.
Eventually, we hope to add additional staff to assist in this project,
but to start, you will be expected to prioritize your own work such that
the most important tasks get attention first, without letting any
specific core component starve for attention.

For more details, including information on how to apply, see the job
posting:
https://www.torproject.org/about/jobs-lead-automation.html.en


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] abuse control for Tor exit nodes

2013-06-28 Thread Mike Perry
Tom Ritter:
> On 27 June 2013 05:07, Rich Kulawiec  wrote:
> > [ Okay, so I have a long-winded response to this.  It's possible that
> > eventually I'll wander somewhere near a point. ;-) ]
> > ...
> > ...
> > My suggestion (and this is based on many other kinds of operations
> > since I've never run a Tor exit node) is to do what everyone should
> > do for every operation: use a bidirectional default-deny firewall.
> > Then punch holes in it as necessary to permit desired traffic.  Use netflows
> > to detect and squash things like brute-force attacks.  (In other
> > words, if you observe a serious spike in outbound ssh connection attempts,
> > then someone is using your node, and possibly others, to conduct an ssh
> > brute-force attack.  Rate-limit it.  Or just block it for a while.)
> > Another highly useful technique is rate-limiting based on passive
> > OS fingerprinting of the source: one application is to provide
> > severely limited SMTP bandwidth to anything fingerprinting as Windows.
> > Another is to use the Team Cymru bogon list.  And still another is
> > to use the Spamhaus DROP list, since nothing good can happen by permitting
> > traffic to/from those network ranges.
> >
> > The "pf" firewall in various BSD distributions is a good choice
> > for implementing all this.  It also has the useful feature of being
> > rather resource-frugal: it's quite impressive how an old/slow box
> > running it can gracefully handle large traffic volumes.
> 
> 
> This is a very well written argument, thank you.  I'd love to see more
> discussion around the ethics of "Should I" or "Shouldn't I" put in
> (non-logging) abuse filtering on exit nodes.  Someone can always
> disguise abuse.  An intelligent DoS attack on an SSL website couldn't
> be detected by an exit node operator.  But, just as moving SSH off
> port 22 really honest-to-god does eliminate 99% of the crap you'd get
> otherwise, maybe there are similar cheap wins to be had on Exit Nodes.
>  While there are legitimate reasons to send sqlmap through Tor, I'm
> currently thinking if you actually want to test something,
> legitimately, through Tor, using sqlmap - you should be prepared to
> deal with exit blocking.  Exit blocking that could eliminate 50%, 80%,
> 95% of the crap.  I'd love to see people debate this back and forth
> more and tease out arguments for and against.
> 
> On the practical side of things, a couple questions.
> Blacklisting connects *to* the spamhaus list, and other known spammers
> (as an exit operator) would really only shut down control channels,
> no?.  Similarly, if you're an entry node, you could block connections
> *from*... but if spammers on the spamhaus blocklist were actually
> using Tor... well, they wouldn't *be on the blocklist*.  I could
> always be wrong, but I don't see this making big wins.
> 
> Shutting down SSH brute forcing would be cool.  I've joked with my
> friends "There are so many interesting thing in the world, and I have
> no little time to learn them all.  I have to prioritize. So I decided
> to skip iptables and use a wrapper (shorewall)."Do you have, or
> know of, any simple writeups for doing that, or some of the more
> complicated suggestions?

This argument comes up every so often on tor-relays.

Censorship filters, IDS systems, and rate limiting firewalls don't
belong on Tor exits anymore than they belong on the core routers of the
Internet. They belong on the leaves. Censor yourself, not others.

Imagine what would happen if the core routers of the Internet "detected"
"abuse" with even 99% accuracy (1% false positive rate). The Internet
would cease to function, due to the base rate fallacy and the relative
infrequency of actual abuse:
https://en.wikipedia.org/wiki/Base_rate_fallacy

The same math applies to Tor exits.

-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] abuse control for Tor exit nodes

2013-06-27 Thread Mike Perry
nsider that every
> single dollar/euro/yen they ever make comes from someone paying
> the price for others' negligence.
> 
> And they're making billions upon billions.
>
> Consider, for example, that companies like Cloudflare and Prolexic
> probably *would not exist* if it weren't for the ongoing epidemic
> of abuse.

The price of being on the Internet is also securing your own systems
from attack, and that is why these companies are successful.

This is not a flaw, it is a feature that prevents the net from
installing censorship systems and "Security Firewalls" and disconnect
mandates at the hierarchy level, which again would be a disaster and
would invite a new age of oppression onto the Internet.

> Here's another way to phrase that fundamental ethic, also borrowing a
> line from popular culture:
> 
>   "The needs of the many outweigh the needs of the few."

This quote bothers me too, but I am not adept enough at philosophy to
get into its specific flaws.

I'm sure that someone more adept at philosophy can point out the failure
modes of strict dogmatic Utilitarian thinking like this, and illustrate
the ways that it can hinder many forms of progress that necessarily
start with the few before spreading to the many.

> No matter how big my operation or your operation or anyone's operation
> becomes, it will always be "the few" when compared to the rest of the
> Internet: "the many".  No single operation is ever more important than
> all operations.  Not mine, not yours, not Google, not Reddit, not anything.
> 
> I did say I'd try to get near a point.  Alright, here goes: if you
> run anything, including a Tor exit node, then you are personally,
> fully responsible for all abuse sourced from that operation.  Which
> means that you are responsible for figuring out how to detect it
> and stuff a sock in it.  Maybe that's easy.  Maybe that's hard.
> Doesn't matter: it's still your responsibility.  You signed up for
> it, you implicitly agreed to it, when you plugged *your* operation
> into *our* Internet.

Yes. All of my points are not to say that new systems like Tor shouldn't
endeavor to provide people with some options for dealing with it as it
hits their leaf nodes -- up to a point. Tor for example provides DNSRBLs
and exit lists that can be queried and used in security systems and rate
limiting firewalls that are in place on the leaf ends already.

I've also been spending whatever spare cycles I can to try to design
application-layer abuse rate limiting systems for Tor that would make it
easy for websites and other providers to reduce spam and content abuse
in the easiest way possible for them -- because doing so just makes
sense for Tor. Providing such systems will serve as an alternative to
prevent the knee-jerk reaction of simply using our exit list to ban all
Tor nodes (which is sadly quite common).
 

-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] DuckDuckGo vs Startpage [was: Help test Tor Browser]

2013-06-26 Thread Mike Perry
The Doctor:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> On 06/24/2013 09:16 PM, Daniel Sieradski wrote:
> > Has there ever been any effort to create an open source search
> > engine that is entirely transparent in both its software and
> > practices? (dmoz.org
> doesn't count!)
> 
> ...YaCY?
> 
> http://yacy.de/

YaCY and other FOSS engines (in a sibling thread someone mentioned
another that I already forgot) are also something that I will accept
search plugins for the Omnibox, but their result quality, index depth,
and crawl frequency are no match for either StartPage or DDG.


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] DuckDuckGo vs Startpage

2013-06-26 Thread Mike Perry
Jacob Appelbaum:
> Mike Perry:
> > In terms of data confidentiality and integrity though, I think it is
> > probably true that the Tor hidden service trust root is much stronger
> > than the browser CA trust root, even given the 80bit name hash and
> > RSA-1024 sized keys (which probably are roughly equivalent to each other
> > in strength for most purposes).
> > 
> 
> I think it also changes how people might begin to start attacking a user
> - it is not as easy as just throwing up a Tor node, allow and exit and
> running some general tools.
> 
> > However, Mozilla is working on supporting cert pinning for https, which
> > we should pick up in Tor Browser in the next few months. Basically, all
> > we have to do after that is pin our search provider's actual leaf
> > certificate in Tor Browser itself, and the https usecase becomes both
> > stronger than the hidden service case in terms of data confidentiality
> > and integrity to the actual search engine (who knows what happens after
> > that, of course), and roughly 4X faster...
> > 
> 
> However - Tor will not protect users after the exit node - so if there
> are libnss bugs, the exit or things beyond it may tamper with it. The
> attack surface is smaller for Tor HS users, I think.
> 
> > 
> > Still, despite all of this, I still think hidden services have an
> > important roll to play in Tor. The search engines of today just aren't
> > the proper use case for them right now.
> > 
> 
> I'd like to see an omnibox search that allows people to choose - I would
> especially like it if that one was totally unfiltered, even for porn or
> other thought crime.

Good points. While I am against having the default be 4X slower just for
this, I will happily merge omnibox .src files for both the hidden
service version of DDG and an unfiltered StartPage if anyone provides
them and put them in order right after vanilla StartPage and DDG
engines.

-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] DuckDuckGo vs Startpage

2013-06-26 Thread Mike Perry
Nick:
> Quoth Mike Perry:
> > > > Hidden service circuits require ~4X as many Tor router traversals
> > > > as normal Tor exit circuits to set up, and unlike normal Tor exit
> > > > circuits, they are often *not* prebuilt. Once they are set up, they
> > > > still require 2X as many Tor router traversals end-to-end as normal
> > > > circuits. You could easily circle the globe several times to issue
> > > > a single search query.
> > > > 
> > > > And all this is to use the Tor hidden service's 80bit-secure hash 
> > > > instead of an https cert, along with all of the other issues with
> > > > Tor Hidden Services that have accumulated over the past decade due
> > > > to the lack of time for maintenance on Tor's part? I am not
> > > > convinced.
> > > 
> > > This is good to know -- don't promote hidden service versions of
> > > websites (including DDG) when they have an https version, as hidden
> > > services are broken as of now.
> > 
> > Right. However, hidden services are still useful in narrow
> > circumstances, even as janky as they are. I think their most compelling
> > usecase is as fully internal TCP-style application endpoints, not as
> > authentication mechanisms for services that already exist on the
> > surveilled Internet, and use it for their communications.
> 
> But don't hidden services have the advantage that as there is no 
> exit node, the adversary controlling the entry and exit node problem 
> goes away? Or am I misunderstanding. I see that in this case the tor 
> connection to the website is not likely to be the weak point anyway, 
> but I'd be keen to know if I've got this wrong.

If you're talking about attacks as strong as end-to-end correlation,
then it turns out hidden services have similar weaknesses on that order.
There are a number of points where the adversary can inject themselves
either to observe or manipulate hidden service circuit construction.

For some recent examples of that, see
http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf.

Some of those attacks are quite powerful indeed (and many of them allow
the adversary to choose their own nodes for observation!) and it will
take Tor at least a full stable release cycle or more to fix them...


In terms of data confidentiality and integrity though, I think it is
probably true that the Tor hidden service trust root is much stronger
than the browser CA trust root, even given the 80bit name hash and
RSA-1024 sized keys (which probably are roughly equivalent to each other
in strength for most purposes).

However, Mozilla is working on supporting cert pinning for https, which
we should pick up in Tor Browser in the next few months. Basically, all
we have to do after that is pin our search provider's actual leaf
certificate in Tor Browser itself, and the https usecase becomes both
stronger than the hidden service case in terms of data confidentiality
and integrity to the actual search engine (who knows what happens after
that, of course), and roughly 4X faster...


Still, despite all of this, I still think hidden services have an
important roll to play in Tor. The search engines of today just aren't
the proper use case for them right now.


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] DuckDuckGo vs Startpage

2013-06-24 Thread Mike Perry
Michael Carbone:
> On 06/24/2013 10:00 PM, Mike Perry wrote:
> > IxQuick has so far successfully negotiated with Google against
> > outright banning us. Google sees a spike in IxQuick traffic every
> > time we increase StartPage's prominence in TBB, and this does not
> > go unnoticed by Google.
> > 
> > Unfortunately, Google's knee-jerk reaction to each increase so far
> > is to argue harder in favor of banning all Tor users from both
> > Startpage and Google, so we'll have to wait and see how this plays
> > out...
> > 
> > Backchannel like that (and direct-channel refusals to work with
> > Tor) really makes you wonder about Google's commitment to privacy
> > and the freedom of access to information.
> 
> Very interesting. I don't know the backchannel relationships but I'd
> guess Google's decision to allow or not allow Tor users doesn't depend
> on the levels of traffic they get from StartPage from TBB front page.

Well, that's not exactly how it works directly, but the effect is the
same. I was simplifying the explanation for the purposes of brevity,
and because I was basically a 3rd party to this pressure who was not
present during the actual negotiation.

However, near as I can tell, the actual mechanism of the pressure is
both economic and service-level. Google isn't transparent about what it
pays for ad revenue and what it allows for API key volume, and they
simply pay less ad revenue and/or ban your API key if they don't like
your query flow for whatever reason. They also call you up and start
asking questions if your volume suddenly increases, and sometimes just
shut off your API key at random (and when they do this, StartPage has to
ban Tor users, which has happened each time we've featured them in a
more easily accessible way in TBB so far).

Google is also unwilling to work with us to deploy rate limiting
solutions, even if Tor were to develop them for them. I've tried
numerous times through multiple channels over the past 5 (five!) years
now to get some level of agreement to support various alternative and
less intrusive rate limiting mechanisms based on proof of work, blind
signatures, and other schemes instead of SMS and Captcha, so that Tor
could turn around and try to find a sponsor to build it, but the only
response we can get is "Abuse rate limiting is hard, and Google is the
best in the world at it! You can't mess with success!"

It is very frustrating, but I also feel like if we stop trying to use
any flavor of Google results entirely, we lose the ability to signal to
them how many people care about Tor.

> >> Just trying to rationally explain it.
> > 
> > I would not rationally use the hidden service version in lieu of
> > https by default.
> > 
> > As I alluded to through my questioning of the https backend link to
> > Bing, the transit path from Tor to DDG is not the weakest link in
> > an already-https search engine.
> 
> Okay, so this seems to be the sticking point? Using the !g bang syntax
> they route Google requests through DDG (so you can search Google if
> you want, even though they don't seem to rely on Google for their own
> index). Is that reroute different than what Ixquick does? I don't
> know. For the index itself, I wasn't able to find anything on the
> technical connection between DDG and their index sources.

g! is just a redirect. There is no privacy there.
 
> Apparently the founder of DDG is interested in getting an external
> audit, so this might be the type of issue that could solve? He was
> looking for external audit recommendations as of two days ago (
> https://duck.co/topic/we-have-to-talk-about-ddgs-honesty#2846901487421
> ). I'd ping him @yegg or y...@alum.mit.edu with some recs.

Sure. I don't think this stuff is rocket science. There are probably
several people on this list that could help him figure out how to make
stuff end-to-end encrypted for front end and backend, excluding his
actual servers, and help him certify and promote that claim.

I am after a bigger monster, though.

> > Further, claims that the performance is the same or similar are
> > not rigorous.
> > 
> > Hidden service circuits require ~4X as many Tor router traversals
> > as normal Tor exit circuits to set up, and unlike normal Tor exit
> > circuits, they are often *not* prebuilt. Once they are set up, they
> > still require 2X as many Tor router traversals end-to-end as normal
> > circuits. You could easily circle the globe several times to issue
> > a single search query.
> > 
> > And all this is to use the Tor hidden service's 80bit-secure hash 
> > instead of an https cert, along with all of the other issues with
>

Re: [liberationtech] DuckDuckGo vs Startpage [was: Help test Tor Browser]

2013-06-24 Thread Mike Perry
Michael Carbone:
> On 06/24/2013 08:20 PM, Mike Perry wrote:
> > I've had a number of people tell me that they vouch for DuckDuckGo.
> > What does this even mean? Nobody seems to be capable of rationally
> > explaining it.
> > 
> > Have you inspected their datacenter/server security? Have you
> > audited their logging mechanisms?
> 
> The data center thing is a non-sequitur -- no third-party service has
> this type of the transparency. My understanding is that you don't need
> to trust these service providers to use them anonymously as they are
> friendly to Tor and no scripts/cookies/etc -- hence the difficulties
> you mention later on with Bing & Google. So it doesn't split either
> way between StartPage or DDG. They are equivalent in not allowing
> personal audits of their servers.

I was questioning where the "vouching" comes from. "Vouch" is a pretty
strong word -- it typically suggests that you are laying down your
reputation on the line to support someone or something else, either by
oath or by evidence.

My general point is that DuckDuckGo seems to have a lot of appeal behind
it, causing many people to endorse it in extreme ways without any
supporting evidence.

I want to understand where that support is coming from. As you point
out, the two engines seem largely identical from the perspective of
third party "vouching"/audits wrt privacy.

> > Note that I don't vouch for StartPage. I merely think that
> > StartPage provides superior search results to DDG.
> 
> Since this is the only criterion you base your choice of search engine
> on, then perhaps StartPage is the way to go for you. If I were to
> argue for DDG, I would point to its much more friendly user
> interface/experience (including the html version) and the great !bang
> syntax. Maybe it also provides better results for "mainstream" things
> as you alluded, I don't know. But there's certainly nothing wrong with
> appealing to mainstream folks, this is TBB after all.
> 
> I think these are the reasons why it is gaining a lot of users (
> https://duckduckgo.com/traffic.html ). Either way, users will be able
> to choose the other search engine in the omnibox as you mention.

That's great! I am glad they are succeeding, and hopefully are in no
danger of going away!
 
> > Every time Tor tries to start a conversation with either Google or 
> > Microsoft on these two topics, they both give us a litany of
> > excuses as to why fixing the situation is a "hard problem", even
> > after we present potential cost-effective engineering solutions to
> > both problems.
> > 
> > For this reason, the loss of either DDG or Startpage would scare
> > the shit out of me, but right now, neither one has done enough for
> > Tor to warrant the default search position**, and since StartPage
> > tends to index more of the deep web faster, it is my opinion we
> > should stick with them as the top position, and have DDG in
> > second.
> > 
> > ** Sure, DuckDuckGo runs a hidden service, and also one of the
> > slowest Tor relays on the network (rate limited to 50KB/sec or
> > less), but it is quite debatable as to if either of these things
> > are actually helpful to Tor. In fact, such a slow Tor relay
> > probably harms Tor performance more than helps (in the rare event
> > that you actually happen to select it).
> 
> The hidden service is a plus, no? They seem to be trying at least,
> does Ixquick have either? Maybe it'd be good to reach out to DDG about
> their relay.

IxQuick has so far successfully negotiated with Google against outright
banning us. Google sees a spike in IxQuick traffic every time we
increase StartPage's prominence in TBB, and this does not go unnoticed
by Google.

Unfortunately, Google's knee-jerk reaction to each increase so far is to
argue harder in favor of banning all Tor users from both Startpage and
Google, so we'll have to wait and see how this plays out...

Backchannel like that (and direct-channel refusals to work with Tor)
really makes you wonder about Google's commitment to privacy and the
freedom of access to information.

> Just trying to rationally explain it.

I would not rationally use the hidden service version in lieu of https
by default.

As I alluded to through my questioning of the https backend link to Bing,
the transit path from Tor to DDG is not the weakest link in an
already-https search engine.

Further, claims that the performance is the same or similar are not
rigorous.

Hidden service circuits require ~4X as many Tor router traversals as
normal Tor exit circuits to set up, and unlike normal Tor exit circuits,
they are often *not* prebuilt. Once they are set up, they sti

[liberationtech] DuckDuckGo vs Startpage [was: Help test Tor Browser]

2013-06-24 Thread Mike Perry
Nadim Kobeissi:
> I'd just like to add that I'm a DuckDuckGo user myself and that I can
> definitely vouch for the service.

I've had a number of people tell me that they vouch for DuckDuckGo. What
does this even mean? Nobody seems to be capable of rationally explaining
it.

Have you inspected their datacenter/server security? Have you audited
their logging mechanisms?

Does DuckDuckGo even have an https channel to Bing on the back end?


Note that I don't vouch for StartPage. I merely think that StartPage
provides superior search results to DDG.

In fact, I wish both companies the best of luck business-wise, and I'm
happy to have both of them at the two top positions in TBB's omnibox.

This is because right now, there are only two ways to get https web
search results over Tor. Microsoft allows Tor, but has officially
refused to support https directly for Bing. Google regularly bans Tor
nodes entirely, often without the possibility of even entering a Captcha
or using a valid Gmail account (both of which are non-starters for a
default engine of course, but would be better than status quo).

Every time Tor tries to start a conversation with either Google or
Microsoft on these two topics, they both give us a litany of excuses as
to why fixing the situation is a "hard problem", even after we present
potential cost-effective engineering solutions to both problems.

For this reason, the loss of either DDG or Startpage would scare the
shit out of me, but right now, neither one has done enough for Tor to
warrant the default search position**, and since StartPage tends to
index more of the deep web faster, it is my opinion we should stick with
them as the top position, and have DDG in second.


** Sure, DuckDuckGo runs a hidden service, and also one of the slowest
Tor relays on the network (rate limited to 50KB/sec or less), but it is
quite debatable as to if either of these things are actually helpful to
Tor. In fact, such a slow Tor relay probably harms Tor performance more
than helps (in the rare event that you actually happen to select it).


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Help test the new Tor Browser!

2013-06-24 Thread Mike Perry
Mike Perry:
> Jacob Appelbaum:
> > Jillian C. York:
> > > +1
> > > 
> > > 
> > > On Mon, Jun 24, 2013 at 2:38 PM, Cooper Quintin
> > > wrote:
> > > 
> > >> Start page also allows you to generate a url that has certain settings,
> > >> for example this one (
> > >> https://startpage.com/do/mypage.pl?prf=c2a9ee9b20d61e980b6f6cce7026bc91
> > >> )has safe search turned off and no caching for video and image search
> > >> results turned on.  It could be useful to put something like this in Tor
> > >> Browser to avoid search filtering.
> > 
> > It would be great if this was the default home page. I'd certainly be
> > happier with that as the default search engine.
> 
> I don't have anything against porn, and do I strongly believe we should
> make it easy for people to search for whatever they want (hence right
> now, I like the idea of adding a "Startpage (unfiltered)" omnibox item
> rather than changing the default), but I am not sure that I like the
> idea of exposing people to porn who are not looking for it. I worry that
> changing the default *might* do this.

In fact it does do this. Queries for "female condom help", "female
condom use", "female condom pictures", "female condom videos" return
increasing numbers of porn results with the query without filters. With
the filters in place, they return no porn, only instructional material,
diagrams, and pictures.

I think it is reasonable to expect that a number of sexual education
and potentially even sexual abuse topics will have similar results.

> Two things could tip the scales in my mind either way about the default:
> 
> 1. Can anyone provide concrete examples where the image and/or video
> filters of Startpage/Google (I think Startpage just uses Google's
> filters) have inadvertently censored material that is not porn, and this
> error has persisted uncorrected for a significant period of time?
> 
> I think it is important to weigh this against people being provided with
> porn results if they are not actually looking for porn -- which is an
> important issue of consent, IMO. I am sure there are many Muslim users
> of TBB who do not want to see porn at all, and merely want free access
> to information. The possibility of subjecting those people to porn
> potentially against their will weighs on me a bit..
> 
> 
> 2. The converse is that making people in the Islamic world who *are*
> looking for porn potentially signal this via their omnibox choice isn't
> a great option either, since that choice can leak to disk. I don't think
> it is fair to allow these people to potentially subject themselves to
> government persecution via this choice. :/
> 
> 
> I am open to suggestions on how to balance these concerns.

Still am, but I also want to point out that there is also the "Do
Nothing" option: DuckDuckGo is our second omnibox choice, and it is not
hard to switch to it to get unfiltered porn results without signaling
that you are looking for such material...


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Help test the new Tor Browser!

2013-06-24 Thread Mike Perry
Jacob Appelbaum:
> Jillian C. York:
> > +1
> > 
> > 
> > On Mon, Jun 24, 2013 at 2:38 PM, Cooper Quintin
> > wrote:
> > 
> >> Start page also allows you to generate a url that has certain settings,
> >> for example this one (
> >> https://startpage.com/do/mypage.pl?prf=c2a9ee9b20d61e980b6f6cce7026bc91
> >> )has safe search turned off and no caching for video and image search
> >> results turned on.  It could be useful to put something like this in Tor
> >> Browser to avoid search filtering.
> 
> It would be great if this was the default home page. I'd certainly be
> happier with that as the default search engine.

I don't have anything against porn, and do I strongly believe we should
make it easy for people to search for whatever they want (hence right
now, I like the idea of adding a "Startpage (unfiltered)" omnibox item
rather than changing the default), but I am not sure that I like the
idea of exposing people to porn who are not looking for it. I worry that
changing the default *might* do this.


Two things could tip the scales in my mind either way about the default:

1. Can anyone provide concrete examples where the image and/or video
filters of Startpage/Google (I think Startpage just uses Google's
filters) have inadvertently censored material that is not porn, and this
error has persisted uncorrected for a significant period of time?

I think it is important to weigh this against people being provided with
porn results if they are not actually looking for porn -- which is an
important issue of consent, IMO. I am sure there are many Muslim users
of TBB who do not want to see porn at all, and merely want free access
to information. The possibility of subjecting those people to porn
potentially against their will weighs on me a bit..


2. The converse is that making people in the Islamic world who *are*
looking for porn potentially signal this via their omnibox choice isn't
a great option either, since that choice can leak to disk. I don't think
it is fair to allow these people to potentially subject themselves to
government persecution via this choice. :/


I am open to suggestions on how to balance these concerns.



-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Help test the new Tor Browser!

2013-06-24 Thread Mike Perry
Cooper Quintin:
> The default engine was Google for a while until Mike Perry and I changed
> it.  We chose StartPage over DDG because while both being privacy aware,
> start page had more relevant search results.  However these days I
> personally find that DDG's results are often more relevant than start
> page. 

I find StartPage/Google immensely superior to Duckduckgo/Bing when
searching the "long tail" of technical material (which I do frequently).

This has always been the case, and has not changed these days, or ever.

One example: Try querying both engines for "deterministic builds" and
compare what you find on the front page of each. By result 10,
DuckDuckGo starts rambling about free will, philosophy, and life
planning. Startpage on the other hand, actually already includes this
very thread in the first page results.

I am curious which types of queries people perceive DuckDuckGo/Bing to
be better at. Is it only better if you're searching for hoodies, movies,
video games, and other mainstream things?

> They also have a page that does not require cookies or JS at
> https://duckduckgo.com/html/

I am not aware of any JS or cookie requirement via StartPage either, and
Startpage allows you to generate your own URL with the safesearch
features disabled (so you do not need cookies). You can then create a
keyword search for this URL.

I am not sure if we want to make that our default search option, but
I might be convinced to merge a third omnibox dropdown for it.


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Bush-Era Whistleblower Claims NSA Ordered Wiretap Of Barack Obama In 2004

2013-06-21 Thread Mike Perry
phryk:
> I have to admit, I find that rather amusing. I wonder if this is
> actually true and if it might change Obamas opinion on the surveillance
> machine. And if it does, how will he try to hide the obvious hypocrisy?

I used to think there was a possibility that surveillance would capture
our politicians through blackmail/etc. After seeing more and more of
these releases, I am becoming convinced that this *already happened*.

If they didn't capture Obama in this 2004 operation, capturing him later
wouldn't be terribly difficult. NSA: "You're the first black US
President, and you want to *dismantle* the domestic surveillance
operation that might prevent an assassination attempt on you or your
family by some moron redneck lunatic? Sure would be a shame if something
were to happen to you after that..."

I sure can understand his hesitance in the face of such a threat. I
don't envy him, that's for sure :/.
 
> Actually I have to say that I'm beginning to see the whole phenomenon
> developing around Snowdens leaks with a good dose of gallows humor.
> 
> It's kind of slapstick-y that every time someone of the US government
> tries to justify all the surveillance, there seem to be three new
> stories popping up that elaborate on all the stuff they actually do;
> some of which even directly contradicts what those apologists claim.

I have noticed this pattern too. I think Snowden and his handlers at the
Guardian have a far more sophisticated PR and release timing strategy
than anyone has given them credit for (I'm referring to various
rumblings about their release of material at the end of the week,
questioning the value of the release of intel on US hacking, etc).

If there is to be a journalistic award for this work, it should not be
for any one story. The whole arc is magnificently directed.


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] NSA is very likely storing all encrypted communications it is intercepting

2013-06-21 Thread Mike Perry
gt; That encryption exception is just one of many outlined in the document,
> > which
> > > also allows NSA to give the FBI and other law enforcement any data from
> > an
> > > American if it contains “significant foreign intelligence” information or
> > > information about a crime that has been or is about to be committed.
> > > Americans’ data can also be held if it’s “involved in the unauthorized
> > > disclosure of national security information” or necessary to “assess a
> > > communications security vulnerability.” Other “inadvertently acquired”
> > data
> > > on Americans can be retained up to five years before being deleted.
> > >
> > > “Basically we’re in a situation where, if the NSA’s filters for
> > > distinguishing between domestic and foreign information stink, it gives
> > them
> > > carte blanche to review those communications for evidence of crimes that
> > are
> > > unrelated to espionage and terrorism,” says Kevin Bankston, a director
> > of the
> > > Free Expression Project at the Center For Democracy and Technology. “If
> > they
> > > don’t know where you are, they assume you’re not a US person. The
> > default is
> > > that your communicatons are unprotected.”
> > >
> > > All of those exceptions seem to counter recent statements made by NSA
> > and FBI
> > > officials who have argued that any collection of Americans’ data they
> > perform
> > > is strictly limited by the Foreign Intelligence Surveillance Act (FISA)
> > > Court, a special judiciary body assigned to oversea the National Security
> > > Agency. “We get great oversight by all branches of government,” NSA
> > director
> > > Alexander said in an on-stage interview at the Aspen Institute last year.
> > > “You know I must have been bad when I was a kid. We get supervised by the
> > > Defense Departmnet, the Justice Department the White House, by Congress…
> > and
> > > by the [FISA] Court. So all branches of government can see that what
> > we’re
> > > doing is correct.”
> > >
> > > But the latest leaked document bolsters a claim made by Edward Snowden,
> > the
> > > 29-year-old Booz Allen contractor who has leaked a series of top secret
> > NSA
> > > documents to the media after taking refuge in Hong Kong. In a live Q&A
> > with
> > > the public Monday he argued that NSA analysts often make independent
> > > decisions about surveillance of Americans not subject to judicial review.
> > > “The reality is that…Americans’ communications are collected and viewed
> > on a
> > > daily basis on the certification of an analyst rather than a warrant,”
> > > Snowden wrote. “They excuse this as ‘incidental’ collection, but at the
> > end
> > > of the day, someone at NSA still has the content of your communications.”
> > >
> > > However, the leaked document doesn’t exactly paint Snowden’s picture of a
> > > random NSA analyst determining who is surveilled. The guidelines do state
> > > that exceptions have to be “specifically” approved by the “Director (or
> > > Acting Director) of NSA…in writing.”
> > >
> > > Just how much actual surveillance the NSA’s exception for Americans’
> > > encrypted data allows also remains unclear. The Center for Democracy and
> > > Technology’s Kevin Bankston points out that a previously leaked slide
> > from an
> > > NSA presentation makes reference to programs called FAIRVIEW and BLARNEY,
> > > which are described as “collection of communications on fiber cables and
> > > infrastructure as data flows past.”
> > >
> > > If the NSA is in fact tapping the Internet’s network infrastructure,
> > > Thursday’s leaked guidelines suggest it might be allowed to collect and
> > > retain all data protected with the common Web encryption Secure Sockets
> > > Layer, (SSL) used for run-of-the-mill private communications like the Web
> > > email offered by Google and Microsoft, social networking services like
> > > Twitter and Facebook, and online banking sites. “If they’re tapping at
> > the
> > > [network] switches and they take full allowance of this ability to retain
> > > data, that could mean they’re storing an enormous amount of SSL traffic,
> > > including things like Gmail traffic,” Bankston says.
> > >
> > > In other words, privacy advocates may be facing a nasty Catch-22: Fail to
> > > encrypt your communications, and they’re vulnerable to any eavesdrop

Re: [liberationtech] Deterministic builds and software trust

2013-06-20 Thread Mike Perry
Jonathan Wilkes:
>  >From: Mike Perry 
> > [...]
> 
> > This is where deterministic builds come in: any individual can use our
> > anonymity network to download our source code, verify it against public
> > signed, audited, and mirrored git repositories, and reproduce our builds
> > exactly, without being subject to such targeted attacks. If they notice
> > any differences, they can alert the public builders/signers, hopefully
> > using a pseudonym or our anonymous trac account.
> >
> > This also will eventually allow us to create a number of auxiliary
> > authentication mechanisms for our packages, beyond just trusting the
> > offline build machine and the gpg key integrity.
> 
> Interesting.  Questions:
> 
> 1) I'd imagine in your case that a large portion of
> users aren't going to want to compile the software, and it seems at
> least like they could still be good citizens by verifying the binaries
> they download against what a random sampling of mirrors say they
> should look like.  Is there a tool out there they can use to do this?

Right. First, let me say just to make this fully clear: not everybody
needs to compile their own bundles to protect against attack. This isn't
security-through-self-compilation a-la Gentoo.

You only need to compile a bundle if you suspect either nobody else in
the world is privately verifying the bundles (and right now, you might
be correct), *or* if you suspect the GPG keys are compromised and you
specifically are being fed targeted, fake-signed bundles that none of
the private verifiers actually see.


However, I would still like to mitigate even these targeted attacks.
Here's my thoughts so far:

The immediate plan is to publish the full set of detached GPG signatures
for all of the matching public builds to start, so that we at least
require multikey compromise to mount the targeted fake bundle+fake
signature attack. Hopefully at least one of the builders will use a
hardware GPG signing token, to make such theft harder. (It's on my TODO
list to figure that out for my own keys..)

Later, as I alluded to in that next paragraph, we can do
defense-in-depth things like place a URL that lists the approved
official bundle hashes along with a SHA256SUM for that URL's contents in
the Tor Consensus document (which is also a multikey signed document
using offline keys and yearly signing key rotation).

We can also verify the consensus document hash itself (including the
package URL+hash) with a "double Ben Laurie" multipath+notary and/or
multisigned hashtree check...

I would like to do all of these things (especially the "double Ben
Laurie" backup Tor Consensus verification, because I don't really think
we should trust the consensus keys fully as we do now), but there's also
a lot of other things to do at Tor first. Who knows what shiny new
explosion of doom will distract me next. It's an exciting place to work!

> 2) Do you use Tor's git version id (the hash) for the
> release as the random seed string?  Seems like that would be a
> good precedent to set in case other projects start using this
> method, too.

Not sure exactly what you're asking here.

For GCC's -frandom-seed, we just use "tor" as the string. I'm not aware
of any reason why that seed needs to ever change (my understanding is
that it is only used for symbol mangling to avoid static/namespace
collisions).

We also include the full set of git hashes, version tags, and input
source hashes in the bundles themselves, so you know exactly what went
into your bundle if you want to try to match it at a later date...


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Deterministic builds and software trust [was: Help test Tor Browser!]

2013-06-18 Thread Mike Perry
Jacob Appelbaum:
> Hi,
> 
> I'm really excited to say that Tor Browser has had some really important
> changes. Mike Perry has really outdone himself - from deterministic
> builds that allow us to verify that he is honest to actually having
> serious usability improvements. 

First, thanks for the praise, Jake!

But: I've been meaning to clarify this "honesty" point for a few days
now, and Cooper's similar statement in another thread about security
being all about trust reminded me of it.

I actually disagree with the underlying assumptions of both points.

I didn't spend six agonizing weeks (and counting) getting deterministic
builds to work for Tor Browser to prove that I was honest or
trustworthy. I did it because I don't believe that software development
models based on single party trust can actually be secure against
serious adversaries anymore, given the current trends in computer
security and "cyberwar".

For the past several years, we've been seeing a steady increase in the
weaponization, stockpiling, and the use of exploits by multiple
governments, and by multiple *areas* of multiple governments. This
includes weaponized exploits specifically designed to "bridge the air
gap", by attacking software/hardware USB stacks, disconnected Bluetooth
interfaces, disconnected Wifi interfaces, etc. Even if these exploits
themselves don't leak (ha!), the fact that they are known to exist means
that other parties can begin looking for them.


In this brave new world, without the benefit of anonymity to protect
oneself from such targeted attacks, I don't believe it is possible to
keep a software-based GPG key secure anymore, nor do I believe it is
possible to keep even an offline build machine secure from malware
injection anymore, especially against the types of adversaries that Tor
has to contend with.

This means that software development has to evolve beyond the simple
models of "Trust my gpg-signed apt archive from my trusted build
machine", or even projects like Debian going to end up distributing
state-sponsored malware in short order.

This is where deterministic builds come in: any individual can use our
anonymity network to download our source code, verify it against public
signed, audited, and mirrored git repositories, and reproduce our builds
exactly, without being subject to such targeted attacks. If they notice
any differences, they can alert the public builders/signers, hopefully
using a pseudonym or our anonymous trac account.

This also will eventually allow us to create a number of auxiliary
authentication mechanisms for our packages, beyond just trusting the
offline build machine and the gpg key integrity.


I believe it is important for Tor to set an example on this point, and I
hope that the Linux distributions will follow in making deterministic
packaging the norm. (Don't despair: it probably won't take 6 weeks per
package. Firefox is just a bitch).

Otherwise, I really don't think we'll have working computers left in
5-10 years from now :/.


I hope to write a longer blog post about this topic on the Tor Blog in
the next couple weeks, discussing the dangers of exploit weaponization
and the threats it poses to software engineering and software
distribution. I'm still mulling over the exact focus and if I should
split the two ideas apart, or combine them into one post...


Ideas and comments welcome!


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Help test the new Tor Browser!

2013-06-17 Thread Mike Perry
It looks like Mozilla hit a similar bug some years ago:
https://bugzilla.mozilla.org/show_bug.cgi?id=595364

While in compatibility mode, can you try setting one or both of these to
'true' in about:config:

  gfx.direct2d.disabled
  layers.acceleration.disabled

Then try without XP compatibility mode, and see if one or both allow you
to run without crashes?


Masayuki Hatta:
> Hi,
> 
> Some findings on this issue.
> 
> 0) Setting compatibility mode to "Windows XP (Service Pack 3)" makes it
> work!
> 
> 1) I tried it on two machines, both don't have NVidia.(both have Intel HD
> Graphics 4000)
> 
> 2) sfc /verifyonly couldn't find any discrepancy.
> 
> Hope it helps.
> 
> Best regards,
> MH
> 
> 
> 
> 2013/6/18 Mike Perry 
> 
> > Mike Perry:
> > > Kody Leonard:
> > > > I get the same error on Windows 7 Ultimate 64-bit. It will run when
> > Windows
> > > > XP is selected under Compatibility mode.   I had the same issue with
> > other
> > > > languages.  This is logged in the event viewer when it doesn't run
> > as-is:
> > > >
> > > > Faulting application name: firefox.exe, version: 17.0.6.0
> > > > Faulting module name: d2d1.dll, version: 6.2.9200.16492
> > > > Exception code: 0xc005
> > > > Faulting application path: C:\XX\Tor
> > > > Browser\FirefoxPortable\App\Firefox\firefox.exe
> > > > Faulting module path: C:\Windows\system32\d2d1.dll
> > >
> > > Do you happen to have an Nvidia video card by any chance?
> > >
> > > This crash seems to be happening on only a select number of x64 Win7
> > > installs (and none of them are developer machines -- which are also x64
> > > Win7), and I am trying to figure out what the common denominator is.
> >
> > Another option is to run cmd.exe as Administrator (right click) and run
> > 'sfc /verifyonly' to check if any of your dlls (including d2d1.dll) are
> > out of date/damaged/replaced by alternate vendor versions.
> >
> >
> >
> > --
> > Mike Perry
> >
> > --
> > Too many emails? Unsubscribe, change to digest, or change password by
> > emailing moderator at compa...@stanford.edu or changing your settings at
> > https://mailman.stanford.edu/mailman/listinfo/liberationtech
> >
> 
> 
> 
> -- 
> Masayuki Hatta
> Assistant Professor, Faculty of Economics and Management, Surugadai
> University, Japan
> 
> http://about.me/mhatta
> 
> mha...@gnu.org  / mha...@debian.org / mha...@opensource.jp /
> hatta.masay...@surugadai.ac.jp

> --
> Too many emails? Unsubscribe, change to digest, or change password by 
> emailing moderator at compa...@stanford.edu or changing your settings at 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Help test the new Tor Browser!

2013-06-17 Thread Mike Perry
Mike Perry:
> Kody Leonard:
> > I get the same error on Windows 7 Ultimate 64-bit. It will run when Windows
> > XP is selected under Compatibility mode.   I had the same issue with other
> > languages.  This is logged in the event viewer when it doesn't run as-is:
> > 
> > Faulting application name: firefox.exe, version: 17.0.6.0
> > Faulting module name: d2d1.dll, version: 6.2.9200.16492
> > Exception code: 0xc005
> > Faulting application path: C:\XX\Tor
> > Browser\FirefoxPortable\App\Firefox\firefox.exe
> > Faulting module path: C:\Windows\system32\d2d1.dll
> 
> Do you happen to have an Nvidia video card by any chance?
> 
> This crash seems to be happening on only a select number of x64 Win7
> installs (and none of them are developer machines -- which are also x64
> Win7), and I am trying to figure out what the common denominator is.

Another option is to run cmd.exe as Administrator (right click) and run
'sfc /verifyonly' to check if any of your dlls (including d2d1.dll) are
out of date/damaged/replaced by alternate vendor versions.



-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Help test the new Tor Browser!

2013-06-17 Thread Mike Perry
Kody Leonard:
> I get the same error on Windows 7 Ultimate 64-bit. It will run when Windows
> XP is selected under Compatibility mode.   I had the same issue with other
> languages.  This is logged in the event viewer when it doesn't run as-is:
> 
> Faulting application name: firefox.exe, version: 17.0.6.0
> Faulting module name: d2d1.dll, version: 6.2.9200.16492
> Exception code: 0xc005
> Faulting application path: C:\XX\Tor
> Browser\FirefoxPortable\App\Firefox\firefox.exe
> Faulting module path: C:\Windows\system32\d2d1.dll

Do you happen to have an Nvidia video card by any chance?

This crash seems to be happening on only a select number of x64 Win7
installs (and none of them are developer machines -- which are also x64
Win7), and I am trying to figure out what the common denominator is.

 
> Kody
> 
> 
> On Mon, Jun 17, 2013 at 6:14 PM, Masayuki Hatta  wrote:
> 
> > Hi,
> >
> > I tried torbrowser-install-3.0-alpha-1_en-US.exe on Windows 7 Home Premium
> > 64bit (Japan edition), but it doesn't run at all.  Installation went well,
> > but double-clicking on "Start Tor Browser" icon doesn't start things off,
> > nothing happens (seems trying something for a while, but crashes
> > silently).  Is this known problem or am I the only one? I have two 64bit
> > Win7 machines, and suffer from the same problem.  Things from the current
> > tor-browser-2.3.25-8_en-US.exe is working nicely for a long time, so I
> > guess something wrong in the new Tor Browser Launcher...
> >
> > Please let me know if there's something I can try.
> >
> > Best regards,
> > MH
> >
> >
> > 2013/6/17 Jacob Appelbaum 
> >
> >> Hi,
> >>
> >> I'm really excited to say that Tor Browser has had some really important
> >> changes. Mike Perry has really outdone himself - from deterministic
> >> builds that allow us to verify that he is honest to actually having
> >> serious usability improvements. I really mean it - the new TBB is
> >> actually awesome. It is blazing fast, it no longer has the sometimes
> >> confusing Vidalia UI, it is now fast to start, it now has a really nice
> >> splash screen, it has a setup wizard - you name it - nearly everything
> >> that people found difficult has been removed, replaced or improved.
> >> Hooray for Mike Perry and all that helped him!
> >>
> >> Here is Mike's email:
> >>
> >>  https://lists.torproject.org/pipermail/tor-talk/2013-June/028440.html
> >>
> >> Here is the place to download it:
> >>
> >>  https://people.torproject.org/~mikeperry/tbb-3.0alpha1-builds/official/
> >>
> >> Please test it and please please tell us how we might improve it!
> >>
> >> All the best,
> >> Jacob
> >> --
> >> Too many emails? Unsubscribe, change to digest, or change password by
> >> emailing moderator at compa...@stanford.edu or changing your settings at
> >> https://mailman.stanford.edu/mailman/listinfo/liberationtech
> >>
> >>
> >
> >
> > --
> > Masayuki Hatta
> > Assistant Professor, Faculty of Economics and Management, Surugadai
> > University, Japan
> >
> > http://about.me/mhatta
> >
> > mha...@gnu.org  / mha...@debian.org / mha...@opensource.jp /
> > hatta.masay...@surugadai.ac.jp
> >
> > --
> > Too many emails? Unsubscribe, change to digest, or change password by
> > emailing moderator at compa...@stanford.edu or changing your settings at
> > https://mailman.stanford.edu/mailman/listinfo/liberationtech
> >

> --
> Too many emails? Unsubscribe, change to digest, or change password by 
> emailing moderator at compa...@stanford.edu or changing your settings at 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] FT: Companies scramble for consumer data (personal data are so cheap... why bother to protect them)

2013-06-16 Thread Mike Perry
Does all this really mean that if we can just create a system for
privately paying parties ~$0.25, their services will actually be *more*
profitable to run than in the current age of dataveilance?

The major problem is of course that micropayment is currently neither
private nor seamless... So in addition to your money, you also *still*
have to pay with your PII *and* your time..


P.S. Amusingly I couldn't actually read the article below because of a
paywall + "give us your PII" signup click-through.


Yosem Companys:
> From: Toon Vanagt 
> 
> I stumbled on this FT article with 'volume pricing' for personal data and a 
> convenient estimation tool: 
> http://www.ft.com/cms/s/0/f0b6edc0-d342-11e2-b3ff-00144feab7de.html#axzz2W5QWgUuR
> 
> Basically, if you're a millionaire, your personal data is worth about $ 0.123 
> (if you're not, you start at: $ 0.007).
> 
> The FT has build an interactive data value estimation tool. For example by 
> adding ADHD to my profile I gained a stunning $ 0.200. Consider it extra 
> money for 'salting data set' :)
> 
> 3 Quick thoughts:
> 
> "The Financial Times will not collect, store or share the data users input 
> into the calculator." Despite this disclaimer I wonder what the FT really 
> does with the harvested data on its web servers or considered the risk of 
> 'leaking logs'? At the end of their 'game', I'm invited to share my private 
> 'data worth' on Twitter, which exposes how much Marketers would pay 
> approximately for your data: and conveniently allows third parties to 
> identify me... When linked with their identifiable FT subscriber profile, 
> there's no need for a tweet to link the results to a person. 
> Check https://twitter.com/search?q=%23FTdataworth&src=typd <- public search 
> result. Great for marketeers. Also has the potential to reverse engineer 
> profiles.. 
> Prices in the article & calculator seem very low and suggest that your 
> 'personal data' are not really valuable to companies in a consumer society  
> That is if you're not obese, don't subscribe to a gym, don't own a plane... 
> Due to competition the broker prices are said to trending towards 
> 'worthless'.. Data brokers seem to suggest we should not bother to protect 
> something of so little economic value...
> 
> Let me know if my reading between the lines is wrong.
> 
> Does anybody know about a personal data value calculator that is not based on 
> broker volume pricing, but reveals how much companies pay for qualified leads 
> in different industries (mortgage, insurance, cruise travel, fitness, car 
> test drive, hotel booking,...) The outcome of such an 'intent cast valuator' 
> would be much higher and more of an economic incentive to raise awareness of 
> data value.
> 
> Cheers,
> 
> @Toon

> --
> Too many emails? Unsubscribe, change to digest, or change password by 
> emailing moderator at compa...@stanford.edu or changing your settings at 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] New Anonymity Network for Short Messages

2013-06-11 Thread Mike Perry
Steve Weis:
> Comments inline...
> 
> On Tue, Jun 11, 2013 at 10:47 AM, Sean Cassidy 
> wrote:
> 
> > > - Any specific reason you picked CTR?
> > CTR is widely recommended. Cryptography Engineering specifically
> > recommends it.

I was puzzled by this recommendation. CTR has several bad propeties that
can surprise you, and have bitten Tor as well.
 
> The reason I ask is that this makes your IV-generation more critical than,
> say, CBC, XTS, or other modes. If you have an IV collision, you'll leak
> some message bits.

Additionally to this, CTR allows bit-level maleability of the cleartext:
a bit flipped in a CTR cipherstream translates into a bit flipped in
the cleartext.

In fact, if there are regions of known cleartext (such as zeroes) the
adversary can do things like encode the originating IP in the cleartext
simply by XORing it into the cipherstream.

This property can cause problems if you perform any operations before
checking the MAC (like evaluating a weak CRC to decide to forward the
message or not).

CBC on the other hand causes a single ciphertext bitflip to scramble a
block of cleartext (16 or 32 bytes for 128bit vs 256bit) in an
unpredictable and key-dependent way.


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Crypho

2013-06-08 Thread Mike Perry
zooko:

> On Tue, Mar 26, 2013 at 09:24:13AM +0100, Yiorgis Gozadinos wrote:
> > 
> > Assuming there is a point of reference for js code, some published instance 
> > of the code, that can be audited and verified by others that it does not 
> > leak. The point then becomes: "Is the js I am running in my browser the 
> > same as the js that everybody else is?". 
> > Like you said, it comes down to the trust one can put in the verifier.
> > A first step could be say for instance a browser extension, that compares a 
> > hash of the js with a trusted authority. The simplest version of that would 
> > be a comparison of a hash with a hash of the code on a repo.
> > Another (better) idea, would be if browser vendors would take up the task 
> > (say Mozilla for instance) and act as the trusted authority and built-in 
> > verifier. Developers would sign their code and the browser would verify.
> > Finally, I want to think there must be a way for users to broadcast some 
> > property of the js they received. Say for example the color of a hash. Then 
> > when I see blue when everyone else is seeing pink, I know there is 
> > something fishy. There might be a way to even do that in a decentralised 
> > way, without having to trust a central authority.
> 
> Dear Yiorgis:
> 
> I think this is a promising avenue for investigation. I think the problem is
> that people like you, authors of user-facing apps, know what the problem is
> that you want to solve, but you can't solve it without help from someone else,
> namely the authors of web browsers.
> 
> With help from the web browser, this problem would be at least partly 
> solvable.
> There is no reason why this problem is more impossible to solve for apps
> written in Javascript and executed by a web browser than for apps written in a
> language like C# and executed by an operating system like Windows.
> 
> Perhaps the next step is to explain concisely to the makers of web browsers
> what we want.
> 
> Ben Laurie has published a related idea:
> 
> http://www.links.org/?p=1262

Now this is interesting. Had not seen that link before.

I wonder how that above 2012 Ben Laurie would get along with this
slightly more vintage 2011 Ben Laurie, who discounts not only the
hashtree concept, but any attempt to secure it with computation as well:
http://www.links.org/?p=1183

The problem is, 2012 Ben Laurie's system is obviously quite easy to
censor and manipulate if the adversary has any sort of active traffic
capabilities in terms of showing custom extensions of the hash chain (ie
malware) to targeted individuals.

2011 Ben Laurie's "Efficient Distributed Currency", on the other hand,
suggests a Tor-like multiparty signing protocol to avoid these issues:
http://www.links.org/files/distributed-currency.pdf

But if we assume the worst, the 2011 model Ben Laurie is weak to an
adversary such as the NSA that might compromise his datacenter
computers (or keys) behind his back.

However, 2012 Ben Laurie could detect this compromise by the NSA if it
was reasonably hard to add new, fake entries to the hash tree, if
clients kept history, and if he had multiple authenticated network
perspectives on the hash tree (ie notaries).

Can't both Ben Laurie's just get along? ;)


To bring us back to Earth:

The core problem with the website-as-an-app JS model is that *every* JS
code download from the server is not only authenticated only by the
abysmal CA trust root, but that insecure/malicious versions of the
software can also be easily targeted *specifically* to your account by
the webserver (or by the CA mafia) at any time without informing you in
any way.

But, the really scary situation we now face is that many of us have
accounts on app stores capable of delivering updates *right now* that
have the same type of targeted capabilities. In fact, in my opinion, all
app stores that exist today are just as unsafe for delivering crypto
software as website-based solutions are :/.


I think I still agree that the takeaway is that it's better to create
situations where you only have to do a heavyweight "double Ben Laurie"
PKI+notary+hashtree+PoW all-in-one-check *once* upon initial download,
to establish a trust root with the software provider themselves, rather
than regularly trusting an intermediary appstore, webserver, and/or 
CA trust root.

Once that initial strong check is done (and you've either run the
malware or you haven't), then the software can update using its own
strong signature authentication. In the case of paid/proprietary
software, proof of purchase from the client should be based upon
blind-signatures/ZKPs instead of unique account credentials.

But like, really nobody in the world is doing any of this, are they?


-- 
Mike Perry
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] issilentcircleopensourceyet.com

2012-11-11 Thread Mike Perry
Thus spake Maxim Kammerer (m...@dee.su):

> On Wed, Nov 7, 2012 at 3:17 AM, Griffin Boyce  wrote:
> > Has anyone asked Tim Berners-Lee about child pornography lately? Cell
> > phones are used by drug dealers, and my dicing knife doubles as a deadly
> > weapon. There's a world of difference between the inventor's intended
> > use and those secondary uses.
> 
> How are these ramifications in any way relevant to the conflict of
> interest analogy I have made? Pointing out the obvious fact that Tor
> hidden services are most popular in drug dealing and pedophilia
> circles gets someone's panties in a twist, and the supposedly factual
> “Tor users” page containing mostly upgraded old promotional writeup
> [1] conflicts with the official party line? Fine, let's look at
> something recent and authoritative,

In various venues, you keep claiming that the Tor Project is somehow
blinded by its own propaganda, as if by some form of conspiracy or
cultural phenomena. My claim, in contrast, is that you want us to fight
political battles you know we're going to lose (which was/is a common
tactic of our own American intelligence agencies to get what they want).

Perhaps we can just agree to disagree here, and each reserve our
documentation/presentation preferences for our own respective projects,
rather than endlessly chasing each other around, each accusing the other
of some kind of dangerous bias (and one that pales in comparison to the
source+documentation issues brought up in this thread)?

After all, the Tor Project could also employ some sock puppets to follow
you around various forums asking why you don't feature any testimonials
from child pornographers on your own Liberate Linux's page[1]..


To bring this back to the original thread topic, the Tor Project's
documentation presentation choices are in stark contrast to
closed-source (and worse: closed-spec!) security software.

In the context of complaining about propaganda, we do explain our
reasoning for the adblocker design choice and the differences between
our target vs actual userbase in numerous, readily available sources of
documentation, including but not limited to our design documentation,
and our FAQ.

> Thus spake Mike Perry [2]:
> > I am deeply opposed to shipping an always-on universal adblocker with
> > the default TBB. I think it would be political suicide in terms of
> > accomplishing our goals with acceptance of Tor users by sites, lobbying
> > for private browsing origin changes, and convincing the world that
> > privacy by design is possible without resorting to filtering schemes
> > and/or DNT-style begging.
> 
> So here you have it: an employee of the non-profit Tor project admits
> to producing an inferior product due to political reasons.

Ooh, another pet-peeve. That's two troll-strikes in one mail, Mr.
Maximum Camera... What the hell, though. It's a slow Sunday.

Everybody keeps telling me that unless we ship Tor Browser with a set of
magical regular expressions/filters, it can't possibly be private or
secure. Yet when I ask directly[2] (in that same thread you cited and
elsewhere), nobody seems to be able to tell me why regular expression
filters would actually defend against dedicated tracker adversaries at
all, let alone do so in a way that is more effective than simply
removing the vectors for third party tracking in the first place.

In fact, it would appear that even so-called "privacy-oriented" filters
such as EasyPrivacy and Ghostery can only manage to block ~80% of sites
that visibly set third party cookies[3]. To me, this is a pretty obvious
indicator that adblock filters are totally unfit for addressing even the
most obvious and visible culprits engaged in third party tracking.


1. http://dee.su/liberte
2. https://lists.torproject.org/pipermail/tor-talk/2012-November/026357.html
3. https://www.stanford.edu/~jmayer/papers/trackingsurvey12.pdf. See Fig 3, pg12


-- 
Mike Perry
--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] The Tor Project has funding for a Firefox developer

2012-08-03 Thread Mike Perry
The Tor Project is looking for a Firefox developer as a contractor
position likely starting in October and going through Q1 2013, with the
possibility of later in 2013 and beyond. There may also be a possibility
for part-time work prior to October. This would be a telecommuting
position, with collaboration happening primarily over IRC and email.

The purpose of our browser is to build a private-by-design reference
implementation of "Do Not Track", but through the alteration of
browser behavior and without the need for regulation or begging:
https://www.torproject.org/projects/torbrowser/design/#privacy
https://blog.torproject.org/blog/improving-private-browsing-modes-do-not-track-vs-real-privacy-design

Your job would be to work on that Firefox-based browser as a developer.
This includes triaging, diagnosing, and fixing bugs; looking for and
resolving web privacy issues; responding on short notice to security
issues; and working collaboratively with coworkers and volunteers on
implementing new features and web behavior changes. You'd also be
reviewing other people's code, designs, and academic research papers,
and looking for ways to improve upon them.

For information on how to apply and what to send in with your
application, please see the job posting:
https://www.torproject.org/about/jobs-browserhacker.html.en



-- 
Mike Perry
___
liberationtech mailing list
liberationtech@lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click "yes" (once you click above) 
next to "would you like to receive list mail batched in a daily digest?"

You will need the user name and password you receive from the list moderator in 
monthly reminders. You may ask for a reminder here: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech