Re: [liberationtech] Ethiopia criminalizes Skype?

2012-06-17 Thread Alex Comninos
Seeing as Addis is the seat of the African Union, there are two scenarios
here:

1. Business as usual at The African Union will be severely impaired.
2. This will be unevenly implemented, with expatriates and AU officials
informally exempt.
On 15 Jun 2012 20:18, David Johnson da...@bostonreview.net wrote:

 http://www.techcentral.co.za/ethiopia-criminalises-skype/32723/

 Ethiopia’s state-owned Internet service provider, the Ethiopian
 Telecommunication Corporation (Ethio-Telcom), has begun performing
 deep-packet inspection of all Internet traffic in the country. The
 country’s government recently ushered in new legislation that criminalises
 the use of services such as Skype, Google Talk and other forms of Internet
 phone calling. ...

 --

 David V. Johnson
 Web Editor
 Boston Review
 Website: http://www.bostonreview.net

 Twitter: http://twitter.com/BostonReview
 Tumblr: http://bostonreview.tumblr.com

 Mailing Address:
 San Francisco Writers' Grotto
 490 2nd Street, 2nd Fl.
 San Francisco, CA 94107

 Cell: (917)903-3706



 ___
 liberationtech mailing list
 liberationtech@lists.stanford.edu

 Should you need to change your subscription options, please go to:

 https://mailman.stanford.edu/mailman/listinfo/liberationtech

 If you would like to receive a daily digest, click yes (once you click
 above) next to would you like to receive list mail batched in a daily
 digest?

 You will need the user name and password you receive from the list
 moderator in monthly reminders. You may ask for a reminder here:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

 Should you need immediate assistance, please contact the list moderator.

 Please don't forget to follow us on http://twitter.com/#!/Liberationtech

___
liberationtech mailing list
liberationtech@lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click yes (once you click above) 
next to would you like to receive list mail batched in a daily digest?

You will need the user name and password you receive from the list moderator in 
monthly reminders. You may ask for a reminder here: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech

[liberationtech] Chinese preparing for a Autonomous Internet ?

2012-06-17 Thread Fabio Pietrosanti (naif)
Hi all,

i wanted to notice that there is a new internet draft in IETF that
should make us think on the chinese government respect strategies to
internet governance issues.

DNS Extension for Autonomous Internet(AIP)
https://tools.ietf.org/html/draft-diao-aip-dns-00

This proposal by China Telecom, China Mobile  Guangdong Commercial
College propose.

Even if we know that root servers are very well distributed across the
world / countries trough a collaborative system, chinese see this as a
central control.

From Introduction on Root DNS:
  But its central control
   method is not suitable to autonomy and scalability and can't keep up
   with the fast development of Internet. To national internet network,
   owning its independent root DNS server and realize autonomy in
   Internet is a problem not only for the cost but also for the
   technical difficulty. It is almost impossible in current DNS
   architecture.

From AIP DNS Architecture:
  In order to realize the transition from Internet to Autonomous
   Internet, each partition of current Internet should first realize
   possible self-government and gradually reduce its dependence on the
   foreign domain names, such as COM, NET et al.

So basically the chinese play is not of being part of a collaborative
internet, but driving strategically the direction to become an
independent island in the world.

-naif
___
liberationtech mailing list
liberationtech@lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click yes (once you click above) 
next to would you like to receive list mail batched in a daily digest?

You will need the user name and password you receive from the list moderator in 
monthly reminders. You may ask for a reminder here: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech


Re: [liberationtech] Silent Circle? Re: AES-encyrpted telephony in Iran?

2012-06-17 Thread L. Aaron Kaplan

On Jun 16, 2012, at 3:51 PM, Frank Corrigan wrote:

 This seems relevant, building on Phil Zimmerman's Zfone/ZRTP  PGP.
 

Some time ago I rand into Jitsi.org - it is an interesting start but I had some 
issues with stability.

Aaron.





signature.asc
Description: Message signed with OpenPGP using GPGMail
___
liberationtech mailing list
liberationtech@lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click yes (once you click above) 
next to would you like to receive list mail batched in a daily digest?

You will need the user name and password you receive from the list moderator in 
monthly reminders. You may ask for a reminder here: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech

[liberationtech] IPv6 good for anonymity

2012-06-17 Thread Walid AL-SAQAF alkasir admin
Hi all,

You may have read about the recent outcry by FBI and DEA warning that IPv6
could shield criminals from police as i makes tracing electronic addresses
'more difficult'.

See:
http://news.cnet.com/8301-1009_3-57453738-83/fbi-dea-warn-ipv6-could-shield-criminals-from-police/

 If this is true, isn't this what we want (i.e., more privacy)? On the
other hand, I read somewhere that China was among the first nations to
fully deployed IPv6 due to its ability to track traffic as IP addresses
would be assigned to people just like national ID numbers are assigned to
every individual.

Are we supposed to be more concerned or glad that we are slowly moving to
IPv6 ?

Sincerely,

Walid

-

Walid Al-Saqaf
Founder  Administrator
alkasir for mapping and circumventing cyber censorship
https://alkasir.com walid.al-sa...@oru.se
___
liberationtech mailing list
liberationtech@lists.stanford.edu

Should you need to change your subscription options, please go to:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

If you would like to receive a daily digest, click yes (once you click above) 
next to would you like to receive list mail batched in a daily digest?

You will need the user name and password you receive from the list moderator in 
monthly reminders. You may ask for a reminder here: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Should you need immediate assistance, please contact the list moderator.

Please don't forget to follow us on http://twitter.com/#!/Liberationtech

Re: [liberationtech] IPv6 good for anonymity

2012-06-17 Thread Walid AL-SAQAF alkasir admin
Dear Seth,

Thank you for this tremendously helpful summary of the the situation 
potentials associated with IPv6. Your 'blog post' is enlightening,
worrying, but also giving hope at the same time.

One could conclude is that -like any technology- it is the service
providers and users who would decide whether to use it for the good or bad
of netizens. In the case of China, static assignment of IP pools to users
could indeed be deployed to track users' online actions. But I assume that
usage of privacy tools such as Tor could be helpful in limiting
surveillance in such situations.

It appears that one cannot predict how things will evolve. Let's wait and
see but be ready for how ISPs and governments would deal with the ongoing
migration to IPv6.

All the best.

Sincerely,

Walid

-

Walid Al-Saqaf
Founder  Administrator
alkasir for mapping and circumventing cyber censorship
https://alkasir.com walid.al-sa...@oru.se


On Sun, Jun 17, 2012 at 9:58 PM, Seth David Schoen sch...@eff.org wrote:

 Walid AL-SAQAF alkasir admin writes:

  Are we supposed to be more concerned or glad that we are slowly moving to
  IPv6 ?

 I think the effect of IPv6 on privacy is complicated; it depends on how
 addresses are allocated.  It depends on what ISPs do and on what users do.

 There's one debate about whether people will bother to keep such detailed
 records of which ISPs are using which IP addresses once IP addresses are
 more plentiful.  With IP addresses less scarce, there may be a reduced
 incentive to keep careful records about delegations of address space, and
 more willingness to grant delegations casually and easily.  In that case,
 it may be more difficult bureaucratically to figure out who or where some
 Internet users are.  You can see some discussion of this in this current
 thread on NANOG:

 http://mailman.nanog.org/pipermail/nanog/2012-June/049300.html

 See also

 https://en.wikipedia.org/wiki/SWIP

 Apart from that, there are at least seven potential effects on privacy:

 - The original addressing scheme for IPv6 suggested using individual
  devices' MAC addresses as (the basis for) the lower-order 64 bits of
  the public IP address.  This is catastrophic for privacy because
  then you can recognize and track individual devices all around the
  world, like an indelible cross-site cookie for each device.  (What's
  more, if you seize the device, you can confirm that it was the actual
  device that was used to send some particular communications at some
  point in the past.)  However, we don't have to use this scheme for
  assigning IP addresses.  It depends on how our individual operating
  systems are configured, and it's unlikely that ISPs or anyone could
  somehow force us to use the privacy-invasive style.

 - Having plentiful IP addresses means that we don't have to use network
  address translation (NAT) anymore, at least not for IP address
  scarcity reasons.  This could actually be bad for privacy because
  there is less ambiguity about which user of a network was responsible
  for particular communications; NAT can create ambiguity from the
  outside world's point of view about who at a particular institution
  actually sent some network traffic, and if we get rid of NAT, we
  reduce that uncertainty.

 - Having plentiful IP addresses means that ISPs could choose to give
  end-users more dynamic IP addresses, without re-use.  It's easier
  to imagine using highly ephemeral IP addresses, like using a new
  source address for each and every connection (!) or having one's
  home network address change every day or every hour.  In that case,
  it would be harder to make associations between users or to track
  users based on their IP addresses.

 - On the other hand, ISPs could also choose to give end-users more
  static IP addresses, making it relatively easier to profile or
  recognize users over time.

 - With more plentiful public IP addresses, it would be easier and
  for more people to start to run publicly-useful proxy services
  like Tor entry nodes.  It will also be somewhat harder for
  censors to enumerate and block secret bridge-style proxy nodes
  ahead of time because it will be far more difficult to port-scan
  the larger address space.  (It was traditionally thought to be
  impossible, but there is a paper showing it may not be impossible
  in practice.)

 - With reduced use of NAT, we could more easily implement more
  things as pure peer-to-peer services, with less intermediation.
  This is good for users' privacy against service providers and
  potentially bad for users' privacy against each other.  For
  example, if you make an intermediated VoIP call, the service
  provider learns your approximate location from your IP address,
  but the other party to the call doesn't.  If you make a more
  disintermediated VoIP call, no service provider learns this
  information, but the other party can learn it.

 - Many network monitoring and logging systems aren't yet correctly