Re: [liberationtech] US State Dept Discourages Using Technology to Promote Democracy, Human Rights, and Citizen Engagement in Ukraine?

2013-03-22 Thread David Golumbia
the key word people seem to be missing is unless: it says don't apply *unless
your application meets the program objectives*. it is therefore
encouraging, not discouraging, applications. as a RFP posted on state.gov,
it doesn't make much sense to think State is discouraging applications.
They appear to have updated the page almost immediately to avoid confusion;
it now reads Proposals must demonstrate awareness of similar USG-supported
programming in Ukraine and how the proposed program would complement
ongoing efforts. http://www.state.gov/j/drl/p/206488.htm


On Thu, Mar 21, 2013 at 3:04 PM, Yosem Companys compa...@stanford.eduwrote:

 Fostering Civic Engagement in Ukraine (approximately $500,000
 available): DRL’s objective is to support the role of civil society in
 policy formation and enhancing accountability and responsiveness of
 government officials in Ukraine. The program will support civil
 society to foster an inclusive and participatory democratic system of
 government and hold politicians and public officials more accountable
 to constituents. In order to foster more unity among civil society
 efforts, the program should support post-election advocacy on areas of
 policy formation and implementation such as ongoing efforts related to
 elections and election law reform; freedom of assembly legislation;
 and/or reversing legislation restricting the rights of vulnerable or
 marginalized populations. The program should also examine how well
 existing laws are implemented and help civil society ensure that
 citizens can use official institutions and mechanisms to exercise
 their rights. Program activities could include, but are not limited
 to: support for activities to encourage debate and advocacy by
 citizens and civil society organizations, small grants to civil
 society for monitoring and/or advocacy activities, creating regional
 civil society partnerships to increase civil society unity on advocacy
 efforts, or connecting Ukrainian civil society with their counterparts
 in one or more countries in the region through NGO-to-NGO exchanges
 and mentoring in order to take advantage of shared post-communist and
 transition experiences. Successful proposals will demonstrate a strong
 knowledge of civil society in Ukraine and an established ability to
 work with regional civil society groups.

 DRL strongly discourages health, technology, or science- related
 projects unless they have an explicit component related to the
 requested program objectives listed above.

 http://www.state.gov/j/drl/p/206488.htm
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




-- 
David Golumbia
dgolum...@gmail.com
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] US State Dept Discourages Using Technology to Promote Democracy, Human Rights, and Citizen Engagement in Ukraine?

2013-03-22 Thread Katy P
My guess is that since money is already allocated for tech, they wanted to
ensure that programs that weren't tech focused had some funds too.

(Just a guess).


On Fri, Mar 22, 2013 at 7:19 AM, Shava Nerad shav...@gmail.com wrote:

 Evgeny got to them. ;)

 More seriously, does anyone have digital divide info - cultural and
 financial - on Ukraine?  Tech is not the solution for all cultures.

 Beer is the correct solution for some.  A thousand cups of tea for others.

 Maybe State knows something we don't?

 Like:

 ---
 INTERNET
 Ukraine suffers digital divide - study
 Tuesday 22 March 2011 | 15:40 CET | News
 There is still a significant difference in household internet access
 across Ukraine, according to a study by GfK Ukraine. Internet penetration
 was just 12 percent in rural areas in Q4 2010, reports BizLigaNet. The
 figure rises to 25 percent in towns with a population below 50,000 and 38
 percent of households in cities with more than 500,000 residents.


 http://www.telecompaper.com/news/ukraine-suffers-digital-divide-study--793094

 yrs,
 

 Shava Nerad
 shav...@gmail.com
 On Mar 21, 2013 3:04 PM, Yosem Companys compa...@stanford.edu wrote:

 Fostering Civic Engagement in Ukraine (approximately $500,000
 available): DRL’s objective is to support the role of civil society in
 policy formation and enhancing accountability and responsiveness of
 government officials in Ukraine. The program will support civil
 society to foster an inclusive and participatory democratic system of
 government and hold politicians and public officials more accountable
 to constituents. In order to foster more unity among civil society
 efforts, the program should support post-election advocacy on areas of
 policy formation and implementation such as ongoing efforts related to
 elections and election law reform; freedom of assembly legislation;
 and/or reversing legislation restricting the rights of vulnerable or
 marginalized populations. The program should also examine how well
 existing laws are implemented and help civil society ensure that
 citizens can use official institutions and mechanisms to exercise
 their rights. Program activities could include, but are not limited
 to: support for activities to encourage debate and advocacy by
 citizens and civil society organizations, small grants to civil
 society for monitoring and/or advocacy activities, creating regional
 civil society partnerships to increase civil society unity on advocacy
 efforts, or connecting Ukrainian civil society with their counterparts
 in one or more countries in the region through NGO-to-NGO exchanges
 and mentoring in order to take advantage of shared post-communist and
 transition experiences. Successful proposals will demonstrate a strong
 knowledge of civil society in Ukraine and an established ability to
 work with regional civil society groups.

 DRL strongly discourages health, technology, or science- related
 projects unless they have an explicit component related to the
 requested program objectives listed above.

 http://www.state.gov/j/drl/p/206488.htm
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech


 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Privacy, data protection questions

2013-03-22 Thread Andrew Haeg
We're in the late prototype phase for Groundsourcehttp://groundsourcing.com,
a mobile data collection and engagement platform -- designed for
journalists, researchers, NGO's and others to use to gather first-hand
knowledge. We've used the prototype to validate the need for the
platform, and now privacy  data protection have moved front and center as
we ramp up for a beta phase later this spring/summer.

We've had some early discussions with the Tor Project about protecting
journalists using the platform in countries with repressive regimes (down
the road). We're also looking into using Wickr for encrypting
communications. In the short term, we need advisors who can help guide our
decisions around privacy and personal data collection  protection.

Let me know if you're interested in helping us navigate these issues. I'd
be happy to demo the platform for anyone who's interested -- and I am also
beginning the search for a CTO/technical co-founder to lead on these and
other tech/strategic decisions.

We're looking for people who share our mission to put human experience and
unmet needs at the heart of storytelling and decision-making, while giving
sources control over the data that they share and their level of
engagement.

Comment here, or email me personally if you want to follow up.

Best,

Andrew Haeg
http://www.linkedin.com/in/andrewhaeg
@andrewhaeg
@groundsourcing
612.501.0690
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] US State Dept Discourages Using Technology to Promote Democracy, Human Rights, and Citizen Engagement in Ukraine?

2013-03-22 Thread Jillian C. York
I just really don't see why this is a big deal.  So State's funding
priorities for tech stuff aren't about those subjects.  So what?

On Fri, Mar 22, 2013 at 3:46 PM, Katy P katyca...@gmail.com wrote:

 My guess is that since money is already allocated for tech, they wanted to
 ensure that programs that weren't tech focused had some funds too.

 (Just a guess).


 On Fri, Mar 22, 2013 at 7:19 AM, Shava Nerad shav...@gmail.com wrote:

 Evgeny got to them. ;)

 More seriously, does anyone have digital divide info - cultural and
 financial - on Ukraine?  Tech is not the solution for all cultures.

 Beer is the correct solution for some.  A thousand cups of tea for others.

 Maybe State knows something we don't?

 Like:

 ---
 INTERNET
 Ukraine suffers digital divide - study
 Tuesday 22 March 2011 | 15:40 CET | News
 There is still a significant difference in household internet access
 across Ukraine, according to a study by GfK Ukraine. Internet penetration
 was just 12 percent in rural areas in Q4 2010, reports BizLigaNet. The
 figure rises to 25 percent in towns with a population below 50,000 and 38
 percent of households in cities with more than 500,000 residents.


 http://www.telecompaper.com/news/ukraine-suffers-digital-divide-study--793094

 yrs,
 

 Shava Nerad
 shav...@gmail.com
 On Mar 21, 2013 3:04 PM, Yosem Companys compa...@stanford.edu wrote:

 Fostering Civic Engagement in Ukraine (approximately $500,000
 available): DRL’s objective is to support the role of civil society in
 policy formation and enhancing accountability and responsiveness of
 government officials in Ukraine. The program will support civil
 society to foster an inclusive and participatory democratic system of
 government and hold politicians and public officials more accountable
 to constituents. In order to foster more unity among civil society
 efforts, the program should support post-election advocacy on areas of
 policy formation and implementation such as ongoing efforts related to
 elections and election law reform; freedom of assembly legislation;
 and/or reversing legislation restricting the rights of vulnerable or
 marginalized populations. The program should also examine how well
 existing laws are implemented and help civil society ensure that
 citizens can use official institutions and mechanisms to exercise
 their rights. Program activities could include, but are not limited
 to: support for activities to encourage debate and advocacy by
 citizens and civil society organizations, small grants to civil
 society for monitoring and/or advocacy activities, creating regional
 civil society partnerships to increase civil society unity on advocacy
 efforts, or connecting Ukrainian civil society with their counterparts
 in one or more countries in the region through NGO-to-NGO exchanges
 and mentoring in order to take advantage of shared post-communist and
 transition experiences. Successful proposals will demonstrate a strong
 knowledge of civil society in Ukraine and an established ability to
 work with regional civil society groups.

 DRL strongly discourages health, technology, or science- related
 projects unless they have an explicit component related to the
 requested program objectives listed above.

 http://www.state.gov/j/drl/p/206488.htm
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings
 at https://mailman.stanford.edu/mailman/listinfo/liberationtech


 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech



 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




-- 
US: +1-857-891-4244 | NL: +31-657086088
site:  jilliancyork.com http://jilliancyork.com/* | *
twitter: @jilliancyork* *

We must not be afraid of dreaming the seemingly impossible if we want the
seemingly impossible to become a reality - *Vaclav Havel*
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Microsoft Releases 2012 Law Enforcement Requests Report

2013-03-22 Thread Cynthia Wong
The glossary indicates the reporting only covers criminal law enforcement 
matters, so it probably excludes national security requests.  Another thing to 
ask for in future iterations, given Google's precedent on NSLs.  




//
Cynthia M. Wong
Senior Researcher on the Internet
Business  Human Rights Division
Human Rights Watch




-Original Message-
From: liberationtech-boun...@lists.stanford.edu 
[mailto:liberationtech-boun...@lists.stanford.edu] On Behalf Of Dan Auerbach
Sent: Thursday, March 21, 2013 4:14 PM
To: liberationtech@lists.stanford.edu
Subject: Re: [liberationtech] Microsoft Releases 2012 Law Enforcement Requests 
Report

On 03/21/2013 10:37 AM, Jacob Appelbaum wrote:
 Joseph Lorenzo Hall:
  
  
  On Thu Mar 21 12:27:47 2013, Jacob Appelbaum wrote:
  Joseph Lorenzo Hall:
  Two things seem particularly interesting: apparently zero 
  requests for content were fulfilled for Skype and the 
  associated FAQ [1] says CALEA (the US law that mandates intercept 
  capability) does not apply to Skype.
  That seems particularly encouraging to me.
 
  The FAQ is also interesting in that the non-content question 
  mentions location but then only lists state, country and ZIP 
  code as fields provided (I don't know how MSFT would have 
  access to precise geolocation, but that doesn't appear to be 
  something they provide). Also the NSL reporting in the FAQ is binned 
  in terms of thousands of NSLs...
  so in 2009 they report receiving 0-999 NSLs and in 2010 
  1000-1999 NSLs (hard to tell if that was just one more NSL or a bunch).
 
 
  I don't agree with that reading of the report. There is likely a 
  lot of word-smithing here - for example, Does Skype include 
  SkypeIn and SkypeOut or just Peer to Peer video, text and storage 
  of (other) meta-data? Does CALEA happen on the Skype side of 
  things or on the PTSN/VoIP service side of Skype{In,Out}? My 
  guess is the latter rather than the former.
  
  Ok, I certainly agree there is probably a lot of wordsmithing here. 
  CALEA certainly applies to PSTN interconnection but then presumably 
  law enforcement would just go to the phone company which has 
  CALEA-compliant switching hardware there. (I think.)
  
  Also, note that Microsoft Provided Guidance to Law Enforcement 
  - so when they say they didn't provide content, did they provide 
  the credentials? If so, the guidance could have allowed the Law 
  Enforcement to simply login and restore the account data. Or 
  perhaps merely disclosing a key?
  
  They certainly don't describe what that means, which is strange 
  because for a transparency report with quantitative data, one would 
  want to bound what the categories of quantitative data are! I would 
  hope that MSFT would consider providing ciphertext and session keys 
  as providing content and increment the zeros in that column, but 
  there's no definitive statement in all of this that I can see which 
  would support that.
 I wrote to them and asked these questions, as well as a few others.

 What other questions should we pose to them, I wonder?
Reading quickly through the documents, there seems to be no information about 
US FISA court orders, so that might be something to ask them about. I am 
concerned about the possibility that FISA is being abused to access large 
swaths of user data (esp given FAA provisions and secret interpretation of 
section 215 of Patriot Act). You could suggest general rounded numbers for FISA 
like for NSLs. Doubt you'll get any info, though.

That said, kudos to MS for releasing this info and to people for pushing them 
on Skype!

--
Dan Auerbach
Staff Technologist
Electronic Frontier Foundation
d...@eff.org
415 436 9333 x134

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Please Vote on Reply to Question

2013-03-22 Thread Mike Fischer
Hi Yosem,

I vote for reply to all / the list.   I can't believe that security 
geeks can't discipline themselves to take half a second to think about who they 
are replying to.   The openness of the reply all default is refreshing.  

Mike


On Mar 21, 2013, at 5:10 AM, Guido Witmond wrote:

 Dear Yosem,
 
 I vote for reply-to-poster.
 
 Your message really points out the problem: You ask us to connect to you, 
 however, the reply button replies to the list.
 
 
 My 2cts. Guido Witmond.
 
 
 
 On 03/21/2013 02:17 AM, Yosem Companys wrote:
 Dear Liberationtech list subscribers,
 
 Several of you have petitioned to change Liberationtech mailing list's
 default reply to option from reply-to-all to reply-to-poster.
  Given the debate (see links below), we have decided to put the issue
 up for a vote:
 
  * Do you want replies to Liberationtech list messages directed to
reply-to-all or reply-to-poster?
 
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Microsoft Releases 2012 Law Enforcement Requests Report

2013-03-22 Thread Cynthia Wong
RU and CN are a glaring absence, which will skew the overall compliance rates.  

In previous iterations of Google's report, they declined to report numbers from 
China because of concerns that the government would designate that data a state 
secret (heavily punishable).  However, given that the Skype data reports on 
both China and Russia, that doesn't seem to be the justification here?  


//
Cynthia M. Wong
Senior Researcher on the Internet
Business  Human Rights Division
Human Rights Watch



-Original Message-
From: liberationtech-boun...@lists.stanford.edu 
[mailto:liberationtech-boun...@lists.stanford.edu] On Behalf Of Eric S Johnson
Sent: Thursday, March 21, 2013 9:49 PM
To: 'liberationtech'
Subject: Re: [liberationtech] Microsoft Releases 2012 Law Enforcement Requests 
Report

 I wrote to them and asked these questions, as well as a few others.
 
 What other questions should we pose to them, I wonder?

Why are RU and CN (most glaringly) absent from the first chart enumerating the 
number (and type) of requests by country? It's hard to believe those countries' 
security services have no interest in (non-Skype) Microsoft data.
Is MS defining those countries as having no legal standing to request MS data, 
and therefore any requests from them would be rejected out-of-hand?

We provide SSL encryption for Microsoft services and Skype-Skype calls on our 
full client (for full function computers) are encrypted on a peer-to-peer 
basis; however, no communication method is 100% secure. For example ... users 
of the Skype thin client (used on smartphones, tablets and other hand-held 
devices) route communications over a wireless or mobile provider network.
--Is the implication that the Skype clients used on smartphones don't 
provide the same end-to-end encrypted-by-session-specific-keys level of 
security that the Skype for Windows client does?

Skype received 4,713 requests from law enforcement. ... Skype produced no 
content in response to these requests.
--It's hard to believe that LEAs never validly requested a record of a 
Skype user's IM sessions. Perhaps LEAs don't know those data exist?

Best,
Eric

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Microsoft Releases 2012 Law Enforcement Requests Report

2013-03-22 Thread Nadim Kobeissi
Regarding SSL, hasn't Skype claimed in the past that the conversations are
encrypted client-to-client, as in, even from Microsoft or Skype itself?

If I'm right and my memory serves well, then it's striking that they only
mentioned SSL in this report.


NK


On Fri, Mar 22, 2013 at 11:49 AM, Cynthia Wong wo...@hrw.org wrote:

 RU and CN are a glaring absence, which will skew the overall compliance
 rates.

 In previous iterations of Google's report, they declined to report numbers
 from China because of concerns that the government would designate that
 data a state secret (heavily punishable).  However, given that the Skype
 data reports on both China and Russia, that doesn't seem to be the
 justification here?


 //
 Cynthia M. Wong
 Senior Researcher on the Internet
 Business  Human Rights Division
 Human Rights Watch



 -Original Message-
 From: liberationtech-boun...@lists.stanford.edu [mailto:
 liberationtech-boun...@lists.stanford.edu] On Behalf Of Eric S Johnson
 Sent: Thursday, March 21, 2013 9:49 PM
 To: 'liberationtech'
 Subject: Re: [liberationtech] Microsoft Releases 2012 Law Enforcement
 Requests Report

  I wrote to them and asked these questions, as well as a few others.
 
  What other questions should we pose to them, I wonder?

 Why are RU and CN (most glaringly) absent from the first chart enumerating
 the number (and type) of requests by country? It's hard to believe those
 countries' security services have no interest in (non-Skype) Microsoft data.
 Is MS defining those countries as having no legal standing to request MS
 data, and therefore any requests from them would be rejected out-of-hand?

 We provide SSL encryption for Microsoft services and Skype-Skype calls on
 our full client (for full function computers) are encrypted on a
 peer-to-peer basis; however, no communication method is 100% secure. For
 example ... users of the Skype thin client (used on smartphones, tablets
 and other hand-held devices) route communications over a wireless or mobile
 provider network.
 --Is the implication that the Skype clients used on smartphones
 don't provide the same end-to-end encrypted-by-session-specific-keys level
 of security that the Skype for Windows client does?

 Skype received 4,713 requests from law enforcement. ... Skype produced no
 content in response to these requests.
 --It's hard to believe that LEAs never validly requested a record
 of a Skype user's IM sessions. Perhaps LEAs don't know those data exist?

 Best,
 Eric

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Microsoft Releases 2012 Law Enforcement Requests Report

2013-03-22 Thread Eugen Leitl
On Fri, Mar 22, 2013 at 12:08:42PM -0400, Nadim Kobeissi wrote:
 Regarding SSL, hasn't Skype claimed in the past that the conversations are
 encrypted client-to-client, as in, even from Microsoft or Skype itself?

Why is it relevant what they claimed? You can't check it, so why
spend any time on guessing, while you could be running a system
where you would *know for sure*.
 
 If I'm right and my memory serves well, then it's striking that they only
 mentioned SSL in this report.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Microsoft Releases 2012 Law Enforcement Requests Report

2013-03-22 Thread Nadim Kobeissi
Eugen,
Of course you're right, and I've made that specific argument about
closed-source crypto many times before. But it's still interesting since
we're trying to glean as much information as possible from that report
here, which is a first for Skype.


NK


On Fri, Mar 22, 2013 at 12:16 PM, Eugen Leitl eu...@leitl.org wrote:

 On Fri, Mar 22, 2013 at 12:08:42PM -0400, Nadim Kobeissi wrote:
  Regarding SSL, hasn't Skype claimed in the past that the conversations
 are
  encrypted client-to-client, as in, even from Microsoft or Skype itself?

 Why is it relevant what they claimed? You can't check it, so why
 spend any time on guessing, while you could be running a system
 where you would *know for sure*.

  If I'm right and my memory serves well, then it's striking that they only
  mentioned SSL in this report.
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Please Vote on Reply to Question

2013-03-22 Thread R. Jason Cronk

Can I vote reply-to-null? That would prevent all mishaps.

Seriously though, this presents an interesting display of the trade-offs 
between privacy risks and convenience of use.  Given that the purpose of 
the list is to perpetuate an ongoing discussion, the convenience of 
replying to the entire list seems to outweigh the risk of revealing 
private information.  Optimally, the from header should say 
liberationtech with a inline note at the top identifying the author is. 
This would reduce (though not eliminate) the risk of someone 
misidentifying the intended recipient of their reply. I don't think the 
list software supports such configuration though.


Just as a point of analysis, I've seen distribution lists that were 
intended to be one way (i.e. a few authorized individuals may send out 
messages) but were configured wrong such that replies not only were sent 
to the list, but the list allowed anybody, not just authorized 
individuals, to post. Contextually, this is much different, and the 
analysis would weigh in favor of making such a list reply to sender, not 
reply to all.  However, in those cases, the problem results from a 
misconfiguration not a failure to weight the risks.


My vote reply-to-list.


*R. Jason Cronk, Esq., CIPP/US*
/Privacy Engineering Consultant/, *Enterprivacy Consulting Group* 
enterprivacy.com


 * phone: (828) 4RJCESQ
 * twitter: @privacymaverick.com
 * blog: http://blog.privacymaverick.com

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] US State Dept Discourages Using Technology to Promote Democracy, Human Rights, and Citizen Engagement in Ukraine?

2013-03-22 Thread David Golumbia
the whole thing is not a big deal, but i will risk repeating myself: the
original comment on this list overlooked the phrase  *unless they have an
explicit component related to the requested program objectives listed above*,
and this is actually a solicitation *for *proposals, not an effort to
discourage them. The original discourage comment was just trying to
ensure that proposals were area- and program-specific. State has already
modified the page to make this clear, perhaps in reaction to comments such
as the original one on this list: http://www.state.gov/j/drl/p/206488.htm.
It's now clear that there is no intent to discourage applications.


On Fri, Mar 22, 2013 at 11:36 AM, Jillian C. York jilliancy...@gmail.comwrote:

 I just really don't see why this is a big deal.  So State's funding
 priorities for tech stuff aren't about those subjects.  So what?



-- 
David Golumbia
dgolum...@gmail.com
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] US State Dept Discourages Using Technology to Promote Democracy, Human Rights, and Citizen Engagement in Ukraine?

2013-03-22 Thread Yosem Companys
I assumed the same.  It's just an odd caveat in the context of US
State Department's public relations drive about innovation.

On Fri, Mar 22, 2013 at 7:46 AM, Katy P katyca...@gmail.com wrote:
 My guess is that since money is already allocated for tech, they wanted to
 ensure that programs that weren't tech focused had some funds too.

 (Just a guess).


 On Fri, Mar 22, 2013 at 7:19 AM, Shava Nerad shav...@gmail.com wrote:

 Evgeny got to them. ;)

 More seriously, does anyone have digital divide info - cultural and
 financial - on Ukraine?  Tech is not the solution for all cultures.

 Beer is the correct solution for some.  A thousand cups of tea for others.

 Maybe State knows something we don't?

 Like:

 ---
 INTERNET
 Ukraine suffers digital divide - study
 Tuesday 22 March 2011 | 15:40 CET | News
 There is still a significant difference in household internet access
 across Ukraine, according to a study by GfK Ukraine. Internet penetration
 was just 12 percent in rural areas in Q4 2010, reports BizLigaNet. The
 figure rises to 25 percent in towns with a population below 50,000 and 38
 percent of households in cities with more than 500,000 residents.


 http://www.telecompaper.com/news/ukraine-suffers-digital-divide-study--793094

 yrs,
 

 Shava Nerad
 shav...@gmail.com

 On Mar 21, 2013 3:04 PM, Yosem Companys compa...@stanford.edu wrote:

 Fostering Civic Engagement in Ukraine (approximately $500,000
 available): DRL’s objective is to support the role of civil society in
 policy formation and enhancing accountability and responsiveness of
 government officials in Ukraine. The program will support civil
 society to foster an inclusive and participatory democratic system of
 government and hold politicians and public officials more accountable
 to constituents. In order to foster more unity among civil society
 efforts, the program should support post-election advocacy on areas of
 policy formation and implementation such as ongoing efforts related to
 elections and election law reform; freedom of assembly legislation;
 and/or reversing legislation restricting the rights of vulnerable or
 marginalized populations. The program should also examine how well
 existing laws are implemented and help civil society ensure that
 citizens can use official institutions and mechanisms to exercise
 their rights. Program activities could include, but are not limited
 to: support for activities to encourage debate and advocacy by
 citizens and civil society organizations, small grants to civil
 society for monitoring and/or advocacy activities, creating regional
 civil society partnerships to increase civil society unity on advocacy
 efforts, or connecting Ukrainian civil society with their counterparts
 in one or more countries in the region through NGO-to-NGO exchanges
 and mentoring in order to take advantage of shared post-communist and
 transition experiences. Successful proposals will demonstrate a strong
 knowledge of civil society in Ukraine and an established ability to
 work with regional civil society groups.

 DRL strongly discourages health, technology, or science- related
 projects unless they have an explicit component related to the
 requested program objectives listed above.

 http://www.state.gov/j/drl/p/206488.htm
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech


 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech



 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Please Vote on Reply to Question

2013-03-22 Thread Julian Oliver
..on Fri, Mar 22, 2013 at 12:21:54PM -0400, R. Jason Cronk wrote:
 Can I vote reply-to-null? That would prevent all mishaps.
 
 Seriously though, this presents an interesting display of the
 trade-offs between privacy risks and convenience of use.  Given that
 the purpose of the list is to perpetuate an ongoing discussion, the
 convenience of replying to the entire list seems to outweigh the
 risk of revealing private information.  Optimally, the from header
 should say liberationtech with a inline note at the top identifying
 the author is. This would reduce (though not eliminate) the risk of
 someone misidentifying the intended recipient of their reply. I
 don't think the list software supports such configuration though.
 
 Just as a point of analysis, I've seen distribution lists that were
 intended to be one way (i.e. a few authorized individuals may send
 out messages) but were configured wrong such that replies not only
 were sent to the list, but the list allowed anybody, not just
 authorized individuals, to post. Contextually, this is much
 different, and the analysis would weigh in favor of making such a
 list reply to sender, not reply to all.  However, in those cases,
 the problem results from a misconfiguration not a failure to weight
 the risks.

Don't people simply need to take responsibility for noting where and to whom
they are sending their emails? Reply-to-sender seems like a very odd default on
a mailing list - more so if implemented to 'protect us from ourselves'.  If I
want to reply to the sender, I will do so, but by default I expect when
subscribed to a mailing list I'm there for the open discussion. 

Society is risky!

Cheers,

-- 
Julian Oliver
http://julianoliver.com
http://criticalengineering.org
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] US State Dept Discourages Using Technology to Promote Democracy, Human Rights, and Citizen Engagement in Ukraine?

2013-03-22 Thread David Golumbia
I have now twice pointed out that this perception is a misreading of the
document. They are simply trying to cut down on the number of inappropriate
applications using very standard language. the original cut-and-paste
obscured where the phrase appears on the page, but it is still followed by
the exact phrase you quoted: unless they have an explicit component
related to the requested program objectives listed above. If technology
projects have an explicit component related to the program, they are NOT
discouraged from applying. There is no story here. There is a lot of other
qualifying information in the additional information block. The entire
block of information appears to be repeated in all of their RFPs. I've
pasted it in below. It suggests they get a lot of applications that don't
read the RFP carefully. I repeat: there is no story here at all.

Projects that have a strong academic, research, conference, or dialogue
 focus will not be deemed competitive. DRL strongly discourages health,
 technology, or science- related projects unless they have an explicit
 component related to the requested program objectives listed above.
 Projects that focus on commercial law or economic development will be rated
 as non-competitive. Cost sharing is strongly encouraged, and cost sharing
 contributions should be outlined in the proposal budget and budget
 narrative.



On Fri, Mar 22, 2013 at 12:33 PM, Yosem Companys compa...@stanford.eduwrote:

 I assumed the same.  It's just an odd caveat in the context of US
 State Department's public relations drive about innovation.

 On Fri, Mar 22, 2013 at 7:46 AM, Katy P katyca...@gmail.com wrote:
  My guess is that since money is already allocated for tech, they wanted
 to
  ensure that programs that weren't tech focused had some funds too.
 
  (Just a guess).
 
 
  On Fri, Mar 22, 2013 at 7:19 AM, Shava Nerad shav...@gmail.com wrote:
 
  Evgeny got to them. ;)
 
  More seriously, does anyone have digital divide info - cultural and
  financial - on Ukraine?  Tech is not the solution for all cultures.
 
  Beer is the correct solution for some.  A thousand cups of tea for
 others.
 
  Maybe State knows something we don't?
 
  Like:
 
  ---
  INTERNET
  Ukraine suffers digital divide - study
  Tuesday 22 March 2011 | 15:40 CET | News
  There is still a significant difference in household internet access
  across Ukraine, according to a study by GfK Ukraine. Internet
 penetration
  was just 12 percent in rural areas in Q4 2010, reports BizLigaNet. The
  figure rises to 25 percent in towns with a population below 50,000 and
 38
  percent of households in cities with more than 500,000 residents.
 
 
 
 http://www.telecompaper.com/news/ukraine-suffers-digital-divide-study--793094
 
  yrs,
  
 
  Shava Nerad
  shav...@gmail.com
 
  On Mar 21, 2013 3:04 PM, Yosem Companys compa...@stanford.edu
 wrote:
 
  Fostering Civic Engagement in Ukraine (approximately $500,000
  available): DRL’s objective is to support the role of civil society in
  policy formation and enhancing accountability and responsiveness of
  government officials in Ukraine. The program will support civil
  society to foster an inclusive and participatory democratic system of
  government and hold politicians and public officials more accountable
  to constituents. In order to foster more unity among civil society
  efforts, the program should support post-election advocacy on areas of
  policy formation and implementation such as ongoing efforts related to
  elections and election law reform; freedom of assembly legislation;
  and/or reversing legislation restricting the rights of vulnerable or
  marginalized populations. The program should also examine how well
  existing laws are implemented and help civil society ensure that
  citizens can use official institutions and mechanisms to exercise
  their rights. Program activities could include, but are not limited
  to: support for activities to encourage debate and advocacy by
  citizens and civil society organizations, small grants to civil
  society for monitoring and/or advocacy activities, creating regional
  civil society partnerships to increase civil society unity on advocacy
  efforts, or connecting Ukrainian civil society with their counterparts
  in one or more countries in the region through NGO-to-NGO exchanges
  and mentoring in order to take advantage of shared post-communist and
  transition experiences. Successful proposals will demonstrate a strong
  knowledge of civil society in Ukraine and an established ability to
  work with regional civil society groups.
 
  DRL strongly discourages health, technology, or science- related
  projects unless they have an explicit component related to the
  requested program objectives listed above.
 
  http://www.state.gov/j/drl/p/206488.htm
  --
  Too many emails? Unsubscribe, change to digest, or change password by
  emailing moderator at compa...@stanford.edu or changing your settings
 at
  

[liberationtech] National Security Letters (NSLs) - in case you missed this

2013-03-22 Thread Yosem Companys
https://www.noisebridge.net/pipermail/noisebridge-discuss/2013-March/035200.html

Thu Mar 21 09:15:36 UTC 2013

NSLs were still alive and kicking up until a week of so ago, when the
EFF's successful ruling was announced. The EFF has let me know that
the ruling only stands for 90 days and that there is a possibility the
ruling will be rescinded after that upon appeal. So, we are not safe
yet. I was in contact with the EFF this month regarding the issue.
They referred me to some lawyers, but basically, the advice to me in
general has been is that no digital information is protected from
snooping unless it is stored in your home and encrypted. But even
then, I am told that silent black bag jobs (tampering your home
electronic devices) are a possibility if you are labeled a threat to
national security.

Here is some feedback I can share, since I am a rare person to have
realized the snooping was in effect while it was occurring. I also got
confirmation of this due to lack of a confidentiality requirement when
multiple agents attempted to visit me in person and called me on the
phone. They wanted to follow-up after their many months of snooping
revealed that I was not in fact a terrorist -- simply a security
researcher that had identified vulnerabilities of a North American
utility company. After half a year of working with the utility
company, they did nothing to protect my own data, so I went online to
blow the whistle about the company being breached and all user data
(including home addresses and names) being compromised. With this
vulnerability, someone could effectively find your home address /
phone / name on account no matter where you lived in North America,
since you are required to provide this when receiving utility service.
To my knowledge, the companies involved have still not gone public
with this information.

Some things the Secret Service did to snoop on me that you should also
be aware of, and some feedback follow:

* SS served Google with an NSL to obtain my account information.

* Around January, upon logging into the Google account, Google showed
a strange NOTICE message asking me to accept the terms of usage of my
account. This was odd, because in a decade of being a Google user, I
had never seen this. I am told that this is Google's way of telling
you without telling you that you have been served an NSL. Google, by
law, is not allowed to tell you about the NSL, but they definitely are
within their right to ask you to accept their TOS upon login. This is
the tell that everyone here should be aware of. If you see this, you
are likely being monitored.

* My Google account was being operated by someone else, despite
utilizing 2-step and very strong passwords. This may have been limited
to a Google Chat 0day, unpublished vulnerability, or a Google
backdoor. My chat contacts said I was online when I was not online or
had messaged them, when I had not.

* I received multiple emails from shady individuals asking me to
provide / sell 0day. Some were in poor English. I presume this may
have been a baiting tactic to get me on some technicality. I did not
sell any 0day nor did I accept their request to help them with
whatever they were seeking in terms of shady deals.

* One of my encrypted Desktop home Linux computers was mysteriously
wiped upon my return from a trip. The RAID array was 'corrupted'.

* People I know started getting strange calls from random numbers at
odd hours. I wonder if this was some attempt to exploit remote
listening flaws in some phones, but I am justly paranoid.

* Someone opened mail / packages at my physical residence to reveal
the contents inside. This was very odd and not something that ever
happens. It occurred at least twice to my knowledge.

* Local police were posted outside my residence the morning I received
numerous calls from SS agents.

* SS confirmed over the phone that they monitored my Google account,
after I told them I knew they were. At first, they would not tell me
they did and denied it. The agent actually said Google should not
have told you that. When I asked how many other online accounts they
monitored, the agent refused to let me know the details. When asked if
they monitored my financial / banking / health records, they said the
surveillance was limited to electronic records. I presume this
includes my ISP, Google, phone, any accounts signed up via Google
(third-party registration / account emails give it away), etc.

* I was told that my security research activities are a legal grey
area, but that the investigation was being closed. The SS said that
the data they have on me is safe and will be destroyed after some
expiration period. I vehemently expressed my distrust that it would
be held securely or destroyed.

For your background, I have been on the other side of such requests,
as the person providing data to the Secret Service field agents
before. These people don't understand technology and don't understand
what they are asking for many 

Re: [liberationtech] US State Dept Discourages Using Technology to Promote Democracy, Human Rights, and Citizen Engagement in Ukraine?

2013-03-22 Thread Griffin Boyce

 DRL strongly discourages health, technology, or science- related
 projects unless they have an explicit component related to the
 requested program objectives listed above.


I read that as please stop applying for grants that aren't really related
to your project, but I could be wrong on the intent.

~Griffin
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] US State Dept Discourages Using Technology to Promote Democracy, Human Rights, and Citizen Engagement in Ukraine?

2013-03-22 Thread Yosem Companys
David, you have indeed pointed it out twice.  But it's still
inconsistent for the US State Department to carry out a public
relations campaign that gives the impression that it's adding a
technology component to all its work and then issue RFPs that
strongly discourage technology projects from applying unless they
have an explicit component related to the requested program
objectives.

I understand it's standard language. But, presumably, everyone who
applies will have the program objective in mind, whether they are
tech-oriented or not, so why even bother with the caveat?

Also, the language does not disprove Katy's suggestion that the caveat
may be there to ensure non-technology projects get support.  One way
to test whether this is indeed the case is to see whether RFPs issued
prior to the public relations campaign lacked that caveat.

In any case, I suspect whoever wrote this standard language likely did
not put as much thought into crafting the language as we are analyzing
it.

Best,

Yosem

On Fri, Mar 22, 2013 at 9:46 AM, David Golumbia dgolum...@gmail.com wrote:
 I have now twice pointed out that this perception is a misreading of the
 document. They are simply trying to cut down on the number of inappropriate
 applications using very standard language. the original cut-and-paste
 obscured where the phrase appears on the page, but it is still followed by
 the exact phrase you quoted: unless they have an explicit component related
 to the requested program objectives listed above. If technology projects
 have an explicit component related to the program, they are NOT discouraged
 from applying. There is no story here. There is a lot of other qualifying
 information in the additional information block. The entire block of
 information appears to be repeated in all of their RFPs. I've pasted it in
 below. It suggests they get a lot of applications that don't read the RFP
 carefully. I repeat: there is no story here at all.

 Projects that have a strong academic, research, conference, or dialogue
 focus will not be deemed competitive. DRL strongly discourages health,
 technology, or science- related projects unless they have an explicit
 component related to the requested program objectives listed above. Projects
 that focus on commercial law or economic development will be rated as
 non-competitive. Cost sharing is strongly encouraged, and cost sharing
 contributions should be outlined in the proposal budget and budget
 narrative.



 On Fri, Mar 22, 2013 at 12:33 PM, Yosem Companys compa...@stanford.edu
 wrote:

 I assumed the same.  It's just an odd caveat in the context of US
 State Department's public relations drive about innovation.

 On Fri, Mar 22, 2013 at 7:46 AM, Katy P katyca...@gmail.com wrote:
  My guess is that since money is already allocated for tech, they wanted
  to
  ensure that programs that weren't tech focused had some funds too.
 
  (Just a guess).
 
 
  On Fri, Mar 22, 2013 at 7:19 AM, Shava Nerad shav...@gmail.com wrote:
 
  Evgeny got to them. ;)
 
  More seriously, does anyone have digital divide info - cultural and
  financial - on Ukraine?  Tech is not the solution for all cultures.
 
  Beer is the correct solution for some.  A thousand cups of tea for
  others.
 
  Maybe State knows something we don't?
 
  Like:
 
  ---
  INTERNET
  Ukraine suffers digital divide - study
  Tuesday 22 March 2011 | 15:40 CET | News
  There is still a significant difference in household internet access
  across Ukraine, according to a study by GfK Ukraine. Internet
  penetration
  was just 12 percent in rural areas in Q4 2010, reports BizLigaNet. The
  figure rises to 25 percent in towns with a population below 50,000 and
  38
  percent of households in cities with more than 500,000 residents.
 
 
 
  http://www.telecompaper.com/news/ukraine-suffers-digital-divide-study--793094
 
  yrs,
  
 
  Shava Nerad
  shav...@gmail.com
 
  On Mar 21, 2013 3:04 PM, Yosem Companys compa...@stanford.edu
  wrote:
 
  Fostering Civic Engagement in Ukraine (approximately $500,000
  available): DRL’s objective is to support the role of civil society in
  policy formation and enhancing accountability and responsiveness of
  government officials in Ukraine. The program will support civil
  society to foster an inclusive and participatory democratic system of
  government and hold politicians and public officials more accountable
  to constituents. In order to foster more unity among civil society
  efforts, the program should support post-election advocacy on areas of
  policy formation and implementation such as ongoing efforts related to
  elections and election law reform; freedom of assembly legislation;
  and/or reversing legislation restricting the rights of vulnerable or
  marginalized populations. The program should also examine how well
  existing laws are implemented and help civil society ensure that
  citizens can use official institutions and mechanisms to exercise
  their rights. Program 

Re: [liberationtech] National Security Letters (NSLs) - in case you missed this

2013-03-22 Thread Andy Isaacson
For the record, I do not think that the poster of this message is a
reliable narrator, and I regret that this is being put about as a
noisebridge document.  It's present on the Noisebridge webserver
merely because it was sent to a public mailing list which is
automatically archived.

The so-called ToS tell is obviously not a reliable indicator of NSL
activity, and most of his evidence is similarly questionable.  I do
believe that this individual was interviewed by law enforcement as a
follow-on to his full-disclosure posts about security weaknesses in US
utility company systems, but the rest of the story seems weak.

There's a pretty strong cultural tradition at Noisebridge of treating
even fairly outlandish claims with a modicum of tongue-in-cheek respect
(although like all rules it's observed mostly in the breach, and
trolling and mockery rule the day).  Please read my posts in that
archive thread with that in mind.

Yosem, I'm disappointed that you forwarded this to libtech without an
editorial caution.

-andy

On Fri, Mar 22, 2013 at 10:00:19AM -0700, Yosem Companys wrote:
 https://www.noisebridge.net/pipermail/noisebridge-discuss/2013-March/035200.html
 
 Thu Mar 21 09:15:36 UTC 2013
 
 NSLs were still alive and kicking up until a week of so ago, when the
 EFF's successful ruling was announced. The EFF has let me know that
 the ruling only stands for 90 days and that there is a possibility the
 ruling will be rescinded after that upon appeal. So, we are not safe
 yet. I was in contact with the EFF this month regarding the issue.
 They referred me to some lawyers, but basically, the advice to me in
 general has been is that no digital information is protected from
 snooping unless it is stored in your home and encrypted. But even
 then, I am told that silent black bag jobs (tampering your home
 electronic devices) are a possibility if you are labeled a threat to
 national security.
 
 Here is some feedback I can share, since I am a rare person to have
 realized the snooping was in effect while it was occurring. I also got
 confirmation of this due to lack of a confidentiality requirement when
 multiple agents attempted to visit me in person and called me on the
 phone. They wanted to follow-up after their many months of snooping
 revealed that I was not in fact a terrorist -- simply a security
 researcher that had identified vulnerabilities of a North American
 utility company. After half a year of working with the utility
 company, they did nothing to protect my own data, so I went online to
 blow the whistle about the company being breached and all user data
 (including home addresses and names) being compromised. With this
 vulnerability, someone could effectively find your home address /
 phone / name on account no matter where you lived in North America,
 since you are required to provide this when receiving utility service.
 To my knowledge, the companies involved have still not gone public
 with this information.
 
 Some things the Secret Service did to snoop on me that you should also
 be aware of, and some feedback follow:
 
 * SS served Google with an NSL to obtain my account information.
 
 * Around January, upon logging into the Google account, Google showed
 a strange NOTICE message asking me to accept the terms of usage of my
 account. This was odd, because in a decade of being a Google user, I
 had never seen this. I am told that this is Google's way of telling
 you without telling you that you have been served an NSL. Google, by
 law, is not allowed to tell you about the NSL, but they definitely are
 within their right to ask you to accept their TOS upon login. This is
 the tell that everyone here should be aware of. If you see this, you
 are likely being monitored.
 
 * My Google account was being operated by someone else, despite
 utilizing 2-step and very strong passwords. This may have been limited
 to a Google Chat 0day, unpublished vulnerability, or a Google
 backdoor. My chat contacts said I was online when I was not online or
 had messaged them, when I had not.
 
 * I received multiple emails from shady individuals asking me to
 provide / sell 0day. Some were in poor English. I presume this may
 have been a baiting tactic to get me on some technicality. I did not
 sell any 0day nor did I accept their request to help them with
 whatever they were seeking in terms of shady deals.
 
 * One of my encrypted Desktop home Linux computers was mysteriously
 wiped upon my return from a trip. The RAID array was 'corrupted'.
 
 * People I know started getting strange calls from random numbers at
 odd hours. I wonder if this was some attempt to exploit remote
 listening flaws in some phones, but I am justly paranoid.
 
 * Someone opened mail / packages at my physical residence to reveal
 the contents inside. This was very odd and not something that ever
 happens. It occurred at least twice to my knowledge.
 
 * Local police were posted outside my residence the morning I received
 numerous 

Re: [liberationtech] US State Dept Discourages Using Technology to Promote Democracy, Human Rights, and Citizen Engagement in Ukraine?

2013-03-22 Thread David Golumbia
I assume you are referring to this March 5 press release?
http://www.state.gov/r/pa/prs/ps/2013/03/205666.htm

the earliest open RFP on State's website is from Feb 15 and includes the
same language, which appears on every other currently-open RFP:
http://www.state.gov/j/drl/p/204850.htm

I have some experience with both governmental and foundation grantsmaking,
and in both cases something between many and a majority of applications
completely omit one or more major, explicit requirements clearly stated in
the RFP, creating a fair amount of hassle and administrative overhead for
the grantsmakers. boilerplate language insisting on the formal requirements
is standard for this reason (and still does not drastically reduce the
number of inappropriate applications). this does not read to me in any way
to actually be discouraging health, science, or technology proposals.


On Fri, Mar 22, 2013 at 1:26 PM, Yosem Companys compa...@stanford.eduwrote:

 David, you have indeed pointed it out twice.  But it's still
 inconsistent for the US State Department to carry out a public
 relations campaign that gives the impression that it's adding a
 technology component to all its work and then issue RFPs that
 strongly discourage technology projects from applying unless they
 have an explicit component related to the requested program
 objectives.

 I understand it's standard language. But, presumably, everyone who
 applies will have the program objective in mind, whether they are
 tech-oriented or not, so why even bother with the caveat?

 Also, the language does not disprove Katy's suggestion that the caveat
 may be there to ensure non-technology projects get support.  One way
 to test whether this is indeed the case is to see whether RFPs issued
 prior to the public relations campaign lacked that caveat.

 In any case, I suspect whoever wrote this standard language likely did
 not put as much thought into crafting the language as we are analyzing
 it.

 Best,

 Yosem

 On Fri, Mar 22, 2013 at 9:46 AM, David Golumbia dgolum...@gmail.com
 wrote:
  I have now twice pointed out that this perception is a misreading of the
  document. They are simply trying to cut down on the number of
 inappropriate
  applications using very standard language. the original cut-and-paste
  obscured where the phrase appears on the page, but it is still followed
 by
  the exact phrase you quoted: unless they have an explicit component
 related
  to the requested program objectives listed above. If technology projects
  have an explicit component related to the program, they are NOT
 discouraged
  from applying. There is no story here. There is a lot of other qualifying
  information in the additional information block. The entire block of
  information appears to be repeated in all of their RFPs. I've pasted it
 in
  below. It suggests they get a lot of applications that don't read the RFP
  carefully. I repeat: there is no story here at all.
 
  Projects that have a strong academic, research, conference, or dialogue
  focus will not be deemed competitive. DRL strongly discourages health,
  technology, or science- related projects unless they have an explicit
  component related to the requested program objectives listed above.
 Projects
  that focus on commercial law or economic development will be rated as
  non-competitive. Cost sharing is strongly encouraged, and cost sharing
  contributions should be outlined in the proposal budget and budget
  narrative.
 
 
 
  On Fri, Mar 22, 2013 at 12:33 PM, Yosem Companys compa...@stanford.edu
  wrote:
 
  I assumed the same.  It's just an odd caveat in the context of US
  State Department's public relations drive about innovation.
 
  On Fri, Mar 22, 2013 at 7:46 AM, Katy P katyca...@gmail.com wrote:
   My guess is that since money is already allocated for tech, they
 wanted
   to
   ensure that programs that weren't tech focused had some funds too.
  
   (Just a guess).
  
  
   On Fri, Mar 22, 2013 at 7:19 AM, Shava Nerad shav...@gmail.com
 wrote:
  
   Evgeny got to them. ;)
  
   More seriously, does anyone have digital divide info - cultural and
   financial - on Ukraine?  Tech is not the solution for all cultures.
  
   Beer is the correct solution for some.  A thousand cups of tea for
   others.
  
   Maybe State knows something we don't?
  
   Like:
  
   ---
   INTERNET
   Ukraine suffers digital divide - study
   Tuesday 22 March 2011 | 15:40 CET | News
   There is still a significant difference in household internet access
   across Ukraine, according to a study by GfK Ukraine. Internet
   penetration
   was just 12 percent in rural areas in Q4 2010, reports BizLigaNet.
 The
   figure rises to 25 percent in towns with a population below 50,000
 and
   38
   percent of households in cities with more than 500,000 residents.
  
  
  
  
 http://www.telecompaper.com/news/ukraine-suffers-digital-divide-study--793094
  
   yrs,
   
  
   Shava Nerad
   shav...@gmail.com
  
   On Mar 21, 2013 

Re: [liberationtech] National Security Letters (NSLs) - in case you missed this

2013-03-22 Thread Yosem Companys
Great to hear your perspective, and I'm sorry you're disappointed.
But that's why we have discussion lists.

Best,

Yosem



On Fri, Mar 22, 2013 at 10:30 AM, Andy Isaacson a...@hexapodia.org wrote:
 For the record, I do not think that the poster of this message is a
 reliable narrator, and I regret that this is being put about as a
 noisebridge document.  It's present on the Noisebridge webserver
 merely because it was sent to a public mailing list which is
 automatically archived.

 The so-called ToS tell is obviously not a reliable indicator of NSL
 activity, and most of his evidence is similarly questionable.  I do
 believe that this individual was interviewed by law enforcement as a
 follow-on to his full-disclosure posts about security weaknesses in US
 utility company systems, but the rest of the story seems weak.

 There's a pretty strong cultural tradition at Noisebridge of treating
 even fairly outlandish claims with a modicum of tongue-in-cheek respect
 (although like all rules it's observed mostly in the breach, and
 trolling and mockery rule the day).  Please read my posts in that
 archive thread with that in mind.

 Yosem, I'm disappointed that you forwarded this to libtech without an
 editorial caution.

 -andy

 On Fri, Mar 22, 2013 at 10:00:19AM -0700, Yosem Companys wrote:
 https://www.noisebridge.net/pipermail/noisebridge-discuss/2013-March/035200.html

 Thu Mar 21 09:15:36 UTC 2013

 NSLs were still alive and kicking up until a week of so ago, when the
 EFF's successful ruling was announced. The EFF has let me know that
 the ruling only stands for 90 days and that there is a possibility the
 ruling will be rescinded after that upon appeal. So, we are not safe
 yet. I was in contact with the EFF this month regarding the issue.
 They referred me to some lawyers, but basically, the advice to me in
 general has been is that no digital information is protected from
 snooping unless it is stored in your home and encrypted. But even
 then, I am told that silent black bag jobs (tampering your home
 electronic devices) are a possibility if you are labeled a threat to
 national security.

 Here is some feedback I can share, since I am a rare person to have
 realized the snooping was in effect while it was occurring. I also got
 confirmation of this due to lack of a confidentiality requirement when
 multiple agents attempted to visit me in person and called me on the
 phone. They wanted to follow-up after their many months of snooping
 revealed that I was not in fact a terrorist -- simply a security
 researcher that had identified vulnerabilities of a North American
 utility company. After half a year of working with the utility
 company, they did nothing to protect my own data, so I went online to
 blow the whistle about the company being breached and all user data
 (including home addresses and names) being compromised. With this
 vulnerability, someone could effectively find your home address /
 phone / name on account no matter where you lived in North America,
 since you are required to provide this when receiving utility service.
 To my knowledge, the companies involved have still not gone public
 with this information.

 Some things the Secret Service did to snoop on me that you should also
 be aware of, and some feedback follow:

 * SS served Google with an NSL to obtain my account information.

 * Around January, upon logging into the Google account, Google showed
 a strange NOTICE message asking me to accept the terms of usage of my
 account. This was odd, because in a decade of being a Google user, I
 had never seen this. I am told that this is Google's way of telling
 you without telling you that you have been served an NSL. Google, by
 law, is not allowed to tell you about the NSL, but they definitely are
 within their right to ask you to accept their TOS upon login. This is
 the tell that everyone here should be aware of. If you see this, you
 are likely being monitored.

 * My Google account was being operated by someone else, despite
 utilizing 2-step and very strong passwords. This may have been limited
 to a Google Chat 0day, unpublished vulnerability, or a Google
 backdoor. My chat contacts said I was online when I was not online or
 had messaged them, when I had not.

 * I received multiple emails from shady individuals asking me to
 provide / sell 0day. Some were in poor English. I presume this may
 have been a baiting tactic to get me on some technicality. I did not
 sell any 0day nor did I accept their request to help them with
 whatever they were seeking in terms of shady deals.

 * One of my encrypted Desktop home Linux computers was mysteriously
 wiped upon my return from a trip. The RAID array was 'corrupted'.

 * People I know started getting strange calls from random numbers at
 odd hours. I wonder if this was some attempt to exploit remote
 listening flaws in some phones, but I am justly paranoid.

 * Someone opened mail / packages at my physical residence to reveal
 

Re: [liberationtech] National Security Letters (NSLs) - in case you missed this

2013-03-22 Thread Griffin Boyce
On Fri, Mar 22, 2013 at 1:30 PM, Andy Isaacson a...@hexapodia.org wrote:

 The so-called ToS tell is obviously not a reliable indicator of NSL
 activity, and most of his evidence is similarly questionable.


  I'm not sure there's any reliable way to determine whether an account is
under NSL or other gagged search request.  But the idea that your account
is (or might be) surveilled is certainly something that can weigh on one's
mind.

  Classic example: my twitter account's direct messages suddenly started
having the wrong timestamp on them last May, and the timing seemed suspect
for reasons I won't bore the list with.  This only appeared on DMs from
specific people with specific political ties.  The thought crossed my mind
that it was under an NSL -- and seemed especially likely given that there
are seemingly so many out there.  After talking to a good friend with some
insight, the chance that it was the case was put somewhere between Possible
and Likely.  Nowhere near guaranteed, but also not a paranoid fever dream
;-P

  The bug cleared up after almost a year, but only after submitting an
information request to Twitter about it. Their response was that they would
tell me if my account data had been requested. Unless they were gagged.

  Was my account under NSL? It's not something easily determined, but more
likely it was simply a pervasive twitter bug. As for the political angle,
the majority of my followers are interested in that specific political
topic, and coincidence is not unlikely.  But it just goes to show you that
these situations tend to be very tenuous and have a lot of curious emotions
attached to them.

  It might seem flippant to say, but I honestly wouldn't worry too much
about whether an account has been targeted.  I prefer to focus on overall
security.  While metadata *is* data itself, using encryption in email and
chat, and opting for services which may be less-easily targeted is better
than sitting around worrying about it.

  Just my $0.02.

best,
Griffin Boyce
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Microsoft Releases 2012 Law Enforcement Requests Report

2013-03-22 Thread Nick Daly
On Fri, Mar 22, 2013 at 10:49 AM, Cynthia Wong wo...@hrw.org wrote:

 Why are RU and CN (most glaringly) absent from the first chart
 enumerating the number (and type) of requests by country? It's hard to
 believe those countries' security services have no interest in
 (non-Skype) Microsoft data.  Is MS defining those countries as having
 no legal standing to request MS data, and therefore any requests from
 them would be rejected out-of-hand?

I actually read it as those countries have made no specific requests
and that the missing surveillance is already accounted for in the normal
operation of the system, such that no formal requests were necessary.
At least, that's how I interpret that statement in light of the
Businessweek-Skype article [0], which says, in part:

The surveillance feature in TOM-Skype, which has 96 million users in
China, scans messages for specific words and phrases.  When the
program finds a match, it sends a copy of the offending missive to a
TOM-Skype server, along with the account’s username, time and date
of transmission, and whether the message was sent or received by the
user, Knockel’s research shows.  Whether that information is then
shared with the Chinese government is unknown.

Yes, the article's talking about Skype, but if a service as popular as
Skype includes such features, it's probably imprudent to assume that
other MS services act differently, especially when there's a blatant
hole in the data: there's no way Skype, with that feature enabled,
could've turned over only 6 conversations, so I'm forced to disbelieve
both sets of numbers.

I make this statement under the assumption that Businessweek would be
competent enough publish only independently-verifiable claims on the
first page of such a sensitive article.  If Businessweek is a bunch of
lunkheads, then I may have to revise my opinions and suspicions.

Nick

0: 
http://www.businessweek.com/articles/2013-03-08/skypes-been-hijacked-in-china-and-microsoft-is-o-dot-k-dot-with-it
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Call for Proposals: International Summit for Community Wireless Networks 2013

2013-03-22 Thread Dan Staples
Are you passionate about using technology to improve your community? Do
you want to help expand access to affordable Internet? Are you an
advocate for open technology, ICT4D or community-owned infrastructure?

If so, then we invite to you to participate in this year's International
Summit for Community Wireless Networks (IS4CWN)
http://2013.wirelesssummit.org/. The Summit will take place in
Berlin on October 2-4, 2013.

IS4CWN is a gathering of technology experts, policy analysts,
on-the-ground specialists, and researchers working on state-of-the-art
community broadband projects across the globe. Above all, IS4CWN is a
community of communities, and the annual summit serves as an opportunity
to share ideas and challenges, discuss policy issues, and coordinate
research and development efforts.

The 2013 Summit theme is community. In the past decade -- which included
the founding of Freifunk http://start.freifunk.net/, the birth of the
International Summit for Community Wireless Networks, and the genesis of
major projects including Commotion https://commotionwireless.net/ and
CONFINE http://confine-project.eu/ -- the community wireless movement
has expanded substantially in both size and visibility.

But where do we go from here? How can we take the movement to the next
level in terms of technological advancement, community engagement, and
diversity? We encourage our speakers, workshop leaders, and participants
to think big this year and help us grow our community of communities.

Interested? Head on over to www.WirelessSummit.org
http://www.wirelesssummit.org/.
Registration is open and forms to submit workshop proposals and
request travel funding are available. Early registrants will receive a
50% discount.

Potential topics include: using wireless for social justice, rural
broadband frameworks, technical developments in mesh networking,
spectrum policy, training communities in technical skills, case studies
of networks, challenges of corporate monopolies, and much more.

This year's Summit is committed to having a diversity of voices and
experience, and we're looking to have a lot of new faces in the room.
Community networks encompass a whole range of social, political and
technical challenges, so technical knowledge is definitely not required.

Access to technology and technical knowledge has been historically
inequitable and remains so to this day. Recognizing this, the
International Summit for Community Wireless Networks aspires to include
participants and speakers from a broad range of backgrounds and
experiences. We seek and welcome diversity in order to reflect the
communities that wireless networks can and should serve, cultivating
expertise, creativity, and innovation. Please join us in creating an
environment of respect, equity, and accessibility at all levels of
Summit involvement.

-- 
Dan Staples

Open Technology Institute
https://commotionwireless.net

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] skype

2013-03-22 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 03/22/2013 05:23 AM, Joseph Lorenzo Hall wrote:
 
 
 On 3/21/13 9:36 PM, Michael Carbone wrote:
 Anyone looked into the reports that Skype leaks your IP address? 
 Apparently you do not have to interact with the person whose
 location you are interested in to be able to get their IP
 address.
 
 I think this is (still) the vulnerability Kieth Ross and his team
 at NYU-Poly found a few years ago... last I talked to him this
 particular flaw was still exploitable and hadn't been fixed:

That is definitely true. Basically, you can get the IP address the
account last logged in from. Do a search for 'Skype Resolver' and
you'll find a bunch of services that do this.

Here's one:
http://www.anonware.net/index.php?page=resolver

Put in the Skype username. If it fails, try again as it sometimes
messes up the first time. Apparently, Microsoft has not fixed this yet.

Anthony



-BEGIN PGP SIGNATURE-
Comment: Need my public key? http://bit.ly/Y91VgY
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=zsvv
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] skype

2013-03-22 Thread Andreas Bader
Anthony Papillion:
 On 03/22/2013 05:23 AM, Joseph Lorenzo Hall wrote:
 
 
 On 3/21/13 9:36 PM, Michael Carbone wrote:
 Anyone looked into the reports that Skype leaks your IP
 address? Apparently you do not have to interact with the person
 whose location you are interested in to be able to get their
 IP address.
 
 I think this is (still) the vulnerability Kieth Ross and his
 team at NYU-Poly found a few years ago... last I talked to him
 this particular flaw was still exploitable and hadn't been
 fixed:
 
 That is definitely true. Basically, you can get the IP address the 
 account last logged in from. Do a search for 'Skype Resolver' and 
 you'll find a bunch of services that do this.
 
 Here's one: http://www.anonware.net/index.php?page=resolver
 
 Put in the Skype username. If it fails, try again as it sometimes 
 messes up the first time. Apparently, Microsoft has not fixed this
 yet.

Is this the same Script Kiddie Hack that was available for IQC a few
years ago? Don't you think that will solve itself?

Andreas
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] skype

2013-03-22 Thread Anthony Papillion
On 03/22/2013 02:21 PM, Andreas Bader wrote:
 Anthony Papillion:
 On 03/22/2013 05:23 AM, Joseph Lorenzo Hall wrote:


 On 3/21/13 9:36 PM, Michael Carbone wrote:
 Anyone looked into the reports that Skype leaks your IP
 address? Apparently you do not have to interact with the person
 whose location you are interested in to be able to get their
 IP address.

 I think this is (still) the vulnerability Kieth Ross and his
 team at NYU-Poly found a few years ago... last I talked to him
 this particular flaw was still exploitable and hadn't been
 fixed:

 That is definitely true. Basically, you can get the IP address the 
 account last logged in from. Do a search for 'Skype Resolver' and 
 you'll find a bunch of services that do this.

 Here's one: http://www.anonware.net/index.php?page=resolver

 Put in the Skype username. If it fails, try again as it sometimes 
 messes up the first time. Apparently, Microsoft has not fixed this
 yet.
 
 Is this the same Script Kiddie Hack that was available for IQC a few
 years ago? Don't you think that will solve itself?

Possibly. I've not read up on the details of it yet. But, regardless, it
does show that Skype leaks information that could be used in an attack.

How did it solve itself with ICQ?

Anthony

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] skype

2013-03-22 Thread Andreas Bader
Anthony Papillion:
 On 03/22/2013 02:21 PM, Andreas Bader wrote:
 Anthony Papillion:
 On 03/22/2013 05:23 AM, Joseph Lorenzo Hall wrote:


 On 3/21/13 9:36 PM, Michael Carbone wrote:
 Anyone looked into the reports that Skype leaks your IP
 address? Apparently you do not have to interact with the person
 whose location you are interested in to be able to get their
 IP address.

 I think this is (still) the vulnerability Kieth Ross and his
 team at NYU-Poly found a few years ago... last I talked to him
 this particular flaw was still exploitable and hadn't been
 fixed:

 That is definitely true. Basically, you can get the IP address the 
 account last logged in from. Do a search for 'Skype Resolver' and 
 you'll find a bunch of services that do this.

 Here's one: http://www.anonware.net/index.php?page=resolver

 Put in the Skype username. If it fails, try again as it sometimes 
 messes up the first time. Apparently, Microsoft has not fixed this
 yet.

 Is this the same Script Kiddie Hack that was available for IQC a few
 years ago? Don't you think that will solve itself?
 
 Possibly. I've not read up on the details of it yet. But, regardless, it
 does show that Skype leaks information that could be used in an attack.
 
 How did it solve itself with ICQ?
I will say it in an easy way:
ICQ realized that they fucked up and fixed it.
Don't know how, but they got it.
But that happened 3 or 4 years before now.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] skype

2013-03-22 Thread Anthony Papillion
On 03/22/2013 02:34 PM, Andreas Bader wrote:

 Is this the same Script Kiddie Hack that was available for IQC a few
 years ago? Don't you think that will solve itself?

 Possibly. I've not read up on the details of it yet. But, regardless, it
 does show that Skype leaks information that could be used in an attack.

 How did it solve itself with ICQ?
 I will say it in an easy way:
 ICQ realized that they fucked up and fixed it.
 Don't know how, but they got it.
 But that happened 3 or 4 years before now.

Well, I certainly hope Microsoft realizes they 'fucked up' and follows
ICQ's lead. We'll see, I suppose.

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] skype

2013-03-22 Thread Joseph Lorenzo Hall


On 3/22/13 3:21 PM, Andreas Bader wrote:
 
 Is this the same Script Kiddie Hack that was available for IQC a few
 years ago? Don't you think that will solve itself?

Not familiar with that hack...

This one essentially omits a few steps of the Skype client handshake and
the IP address is sent to the attacker without any notice to the target
Skype user. This is one reason I only keep skype on when I'm using it
and then make sure VPN before launching it.

best, Joe

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] skype

2013-03-22 Thread Anthony Papillion
On 03/22/2013 03:25 PM, Joseph Lorenzo Hall wrote:
 
 
 On 3/22/13 3:21 PM, Andreas Bader wrote:

 Is this the same Script Kiddie Hack that was available for IQC a few
 years ago? Don't you think that will solve itself?
 
 Not familiar with that hack...
 
 This one essentially omits a few steps of the Skype client handshake and
 the IP address is sent to the attacker without any notice to the target
 Skype user. This is one reason I only keep skype on when I'm using it
 and then make sure VPN before launching it.

One thing to note is that this 'hack' gives the *last* IP that the user
logged in from (which, of course, might be the current IP if the user is
currently logged in). The user doesn't have to be logged in for it to
work. I just resolved mine and it gave me my IP address but I haven't
been logged on in two days.

Anthony

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Crypho

2013-03-22 Thread R. Jason Cronk

Anybody know the people who are doing this?  http://www.crypho.com/

It's still in beta, so I'm assuming they are working out bugs prior to 
releasing the code which they say they will do. See 
http://www.crypho.com/faq.html



 Is it Open-Source?

   Yes! We are reviewing the source code for release. It will be
   available under an OSI approved license in the near future.





*R. Jason Cronk, Esq., CIPP/US*
/Privacy Engineering Consultant/, *Enterprivacy Consulting Group* 
enterprivacy.com


 * phone: (828) 4RJCESQ
 * twitter: @privacymaverick.com
 * blog: http://blog.privacymaverick.com

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Crypho

2013-03-22 Thread Cooper Quintin
I had a chance to try out crypho a couple of weeks ago at a demo they
put on at noisebridge.  I have some concerns about it, namely the
delivery of crypto code over javascript without any sort of verification
of it's authenticity (via browser plugin, etc.), since this point has
already been discussed to death on this list however, I do not wish to
re-open that debate.
I managed to find a couple of javascript injection attacks in the beta
already, though the developer assures me that they are working on fixing
all the bugs right now, still the lack of attention to basic web
security at such an early stage is concerning.
That aside it seems okay, though I have some worries about side channel
attacks and the fact that it hasn't been peer reviewed as far as I can
tell yet.
It does seem like an interesting project though, with some smart people
behind it. I am looking forward to seeing the code once they open source it.

Cooper Quintin
PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA

On 03/22/2013 01:48 PM, R. Jason Cronk wrote:
 Anybody know the people who are doing this?  http://www.crypho.com/
 
 It's still in beta, so I'm assuming they are working out bugs prior to
 releasing the code which they say they will do. See
 http://www.crypho.com/faq.html
 
 
   Is it Open-Source?
 
 Yes! We are reviewing the source code for release. It will be
 available under an OSI approved license in the near future.
 
 
 
 
 
 *R. Jason Cronk, Esq., CIPP/US*
 /Privacy Engineering Consultant/, *Enterprivacy Consulting Group*
 enterprivacy.com
 
   * phone: (828) 4RJCESQ
   * twitter: @privacymaverick.com
   * blog: http://blog.privacymaverick.com
 
 
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] skype

2013-03-22 Thread Andreas Bader
Anthony Papillion:
 On 03/22/2013 03:25 PM, Joseph Lorenzo Hall wrote:


 On 3/22/13 3:21 PM, Andreas Bader wrote:

 Is this the same Script Kiddie Hack that was available for IQC a few
 years ago? Don't you think that will solve itself?

 Not familiar with that hack...

 This one essentially omits a few steps of the Skype client handshake and
 the IP address is sent to the attacker without any notice to the target
 Skype user. This is one reason I only keep skype on when I'm using it
 and then make sure VPN before launching it.
 
 One thing to note is that this 'hack' gives the *last* IP that the user
 logged in from (which, of course, might be the current IP if the user is
 currently logged in). The user doesn't have to be logged in for it to
 work. I just resolved mine and it gave me my IP address but I haven't
 been logged on in two days.
 
 Anthony
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 

Here in Europe IPs mostly change every 24h. Some need more time.
If you are quick enough the IP change is no problem.

Andreas
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Crypho

2013-03-22 Thread Nadim Kobeissi
How is this any different from Cryptocat?


NK


On Fri, Mar 22, 2013 at 4:59 PM, Cooper Quintin
coo...@radicaldesigns.orgwrote:

 I had a chance to try out crypho a couple of weeks ago at a demo they
 put on at noisebridge.  I have some concerns about it, namely the
 delivery of crypto code over javascript without any sort of verification
 of it's authenticity (via browser plugin, etc.), since this point has
 already been discussed to death on this list however, I do not wish to
 re-open that debate.
 I managed to find a couple of javascript injection attacks in the beta
 already, though the developer assures me that they are working on fixing
 all the bugs right now, still the lack of attention to basic web
 security at such an early stage is concerning.
 That aside it seems okay, though I have some worries about side channel
 attacks and the fact that it hasn't been peer reviewed as far as I can
 tell yet.
 It does seem like an interesting project though, with some smart people
 behind it. I am looking forward to seeing the code once they open source
 it.

 Cooper Quintin
 PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA

 On 03/22/2013 01:48 PM, R. Jason Cronk wrote:
  Anybody know the people who are doing this?  http://www.crypho.com/
 
  It's still in beta, so I'm assuming they are working out bugs prior to
  releasing the code which they say they will do. See
  http://www.crypho.com/faq.html
 
 
Is it Open-Source?
 
  Yes! We are reviewing the source code for release. It will be
  available under an OSI approved license in the near future.
 
 
 
 
 
  *R. Jason Cronk, Esq., CIPP/US*
  /Privacy Engineering Consultant/, *Enterprivacy Consulting Group*
  enterprivacy.com
 
* phone: (828) 4RJCESQ
* twitter: @privacymaverick.com
* blog: http://blog.privacymaverick.com
 
 
 
  --
  Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Crypho

2013-03-22 Thread Brian Conley
Crypho is a team collaboration tool, comparable to Basecamp and Yammer. It
provides a real-time persistent team chat, collaborative document editing
and file sharing. Unlike comparable tools, all data is encrypted before
leaving the browser, with encryption keys held only by the team members. It
is impossible for anyone without the keys to decrypt your data.

collaborative document editing and file sharing.

that's how, no?

B

On Fri, Mar 22, 2013 at 2:03 PM, Nadim Kobeissi na...@nadim.cc wrote:

 How is this any different from Cryptocat?


 NK


 On Fri, Mar 22, 2013 at 4:59 PM, Cooper Quintin coo...@radicaldesigns.org
  wrote:

 I had a chance to try out crypho a couple of weeks ago at a demo they
 put on at noisebridge.  I have some concerns about it, namely the
 delivery of crypto code over javascript without any sort of verification
 of it's authenticity (via browser plugin, etc.), since this point has
 already been discussed to death on this list however, I do not wish to
 re-open that debate.
 I managed to find a couple of javascript injection attacks in the beta
 already, though the developer assures me that they are working on fixing
 all the bugs right now, still the lack of attention to basic web
 security at such an early stage is concerning.
 That aside it seems okay, though I have some worries about side channel
 attacks and the fact that it hasn't been peer reviewed as far as I can
 tell yet.
 It does seem like an interesting project though, with some smart people
 behind it. I am looking forward to seeing the code once they open source
 it.

 Cooper Quintin
 PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA

 On 03/22/2013 01:48 PM, R. Jason Cronk wrote:
  Anybody know the people who are doing this?  http://www.crypho.com/
 
  It's still in beta, so I'm assuming they are working out bugs prior to
  releasing the code which they say they will do. See
  http://www.crypho.com/faq.html
 
 
Is it Open-Source?
 
  Yes! We are reviewing the source code for release. It will be
  available under an OSI approved license in the near future.
 
 
 
 
 
  *R. Jason Cronk, Esq., CIPP/US*
  /Privacy Engineering Consultant/, *Enterprivacy Consulting Group*
  enterprivacy.com
 
* phone: (828) 4RJCESQ
* twitter: @privacymaverick.com
* blog: http://blog.privacymaverick.com
 
 
 
  --
  Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech



 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




-- 



Brian Conley

Director, Small World News

http://smallworldnews.tv

m: 646.285.2046

Skype: brianjoelconley
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Crypho

2013-03-22 Thread R. Jason Cronk

Nadim,

The only major difference I see (assuming you're asking about the 
product and not the threats Cooper lays out) is the persistence. It 
appears you can set up projects and store encrypted data on their 
servers. This certainly opens you up to other threats but I don't see it 
serving the same market as CryptoCat, namely it's going after a business 
audience that just doesn't want Google having all their files/chats/etc 
in the clear on some server somewhere whereas my take on CryptoCat is 
that it facilitates secure non-persistent multiparty chat.


Oh, and the two factor authentication is interesting for login is 
interesting.


Jason


On 3/22/2013 5:03 PM, Nadim Kobeissi wrote:

How is this any different from Cryptocat?


NK


On Fri, Mar 22, 2013 at 4:59 PM, Cooper Quintin 
coo...@radicaldesigns.org mailto:coo...@radicaldesigns.org wrote:


I had a chance to try out crypho a couple of weeks ago at a demo they
put on at noisebridge.  I have some concerns about it, namely the
delivery of crypto code over javascript without any sort of
verification
of it's authenticity (via browser plugin, etc.), since this point has
already been discussed to death on this list however, I do not wish to
re-open that debate.
I managed to find a couple of javascript injection attacks in the beta
already, though the developer assures me that they are working on
fixing
all the bugs right now, still the lack of attention to basic web
security at such an early stage is concerning.
That aside it seems okay, though I have some worries about side
channel
attacks and the fact that it hasn't been peer reviewed as far as I can
tell yet.
It does seem like an interesting project though, with some smart
people
behind it. I am looking forward to seeing the code once they open
source it.

Cooper Quintin
PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA

On 03/22/2013 01:48 PM, R. Jason Cronk wrote:
 Anybody know the people who are doing this? http://www.crypho.com/

 It's still in beta, so I'm assuming they are working out bugs
prior to
 releasing the code which they say they will do. See
 http://www.crypho.com/faq.html


   Is it Open-Source?

 Yes! We are reviewing the source code for release. It will be
 available under an OSI approved license in the near future.





 *R. Jason Cronk, Esq., CIPP/US*
 /Privacy Engineering Consultant/, *Enterprivacy Consulting Group*
 enterprivacy.com http://enterprivacy.com

   * phone: (828) 4RJCESQ
   * twitter: @privacymaverick.com http://privacymaverick.com
   * blog: http://blog.privacymaverick.com



 --
 Too many emails? Unsubscribe, change to digest, or change
password by emailing moderator at compa...@stanford.edu
mailto:compa...@stanford.edu or changing your settings at
https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password
by emailing moderator at compa...@stanford.edu
mailto:compa...@stanford.edu or changing your settings at
https://mailman.stanford.edu/mailman/listinfo/liberationtech




--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech



*R. Jason Cronk, Esq., CIPP/US*
/Privacy Engineering Consultant/, *Enterprivacy Consulting Group* 
enterprivacy.com


 * phone: (828) 4RJCESQ
 * twitter: @privacymaverick.com
 * blog: http://blog.privacymaverick.com

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] skype

2013-03-22 Thread Anthony Papillion
On 03/22/2013 04:03 PM, Andreas Bader wrote:
 
 Here in Europe IPs mostly change every 24h. Some need more time.
 If you are quick enough the IP change is no problem.

ISP's usually store the IP's they have assigned to customers for a
certain period of time. Even if your IP changes, there is an entry in a
database somewhere that notes what your IP was.  At the very least,
knowing your IP denotes what ISP you're on and (depending on how large
your ISP is) your locale.

I'm not trying to argue with you here. I just think it's a pretty big
deal that *anyone* can get your IP.



--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] US State Dept Discourages Using Technology to Promote Democracy, Human Rights, and Citizen Engagement in Ukraine?

2013-03-22 Thread Jillian C. York
Yes, that's a longer version of my first comment.
On Mar 22, 2013 5:29 PM, David Golumbia dgolum...@gmail.com wrote:

 the whole thing is not a big deal, but i will risk repeating myself: the
 original comment on this list overlooked the phrase  *unless they have
 an explicit component related to the requested program objectives listed
 above*, and this is actually a solicitation *for *proposals, not an
 effort to discourage them. The original discourage comment was just
 trying to ensure that proposals were area- and program-specific. State has
 already modified the page to make this clear, perhaps in reaction to
 comments such as the original one on this list:
 http://www.state.gov/j/drl/p/206488.htm. It's now clear that there is no
 intent to discourage applications.


 On Fri, Mar 22, 2013 at 11:36 AM, Jillian C. York 
 jilliancy...@gmail.comwrote:

 I just really don't see why this is a big deal.  So State's funding
 priorities for tech stuff aren't about those subjects.  So what?



 --
 David Golumbia
 dgolum...@gmail.com

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Crypho

2013-03-22 Thread Cooper Quintin
Nadim,
It seems like Cryptocat has a browser plugin, which I though offers more
security than just delivering js straight from the server to the
browser.  I am incorrect in my assumption?
The other difference between this and Cryptocat is, as Jason mentioned,
the fact that it uses strong authentication, where Cryptocat is more
oriented toward anonymity and privacy.
For what it's worth, I would prefer to use Cryptocat over Crypho for
most of the use cases I am interested in.

Cooper Quintin
PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA

On 03/22/2013 02:03 PM, Nadim Kobeissi wrote:
 How is this any different from Cryptocat?
 
 
 NK
 
 
 On Fri, Mar 22, 2013 at 4:59 PM, Cooper Quintin
 coo...@radicaldesigns.org mailto:coo...@radicaldesigns.org wrote:
 
 I had a chance to try out crypho a couple of weeks ago at a demo they
 put on at noisebridge.  I have some concerns about it, namely the
 delivery of crypto code over javascript without any sort of verification
 of it's authenticity (via browser plugin, etc.), since this point has
 already been discussed to death on this list however, I do not wish to
 re-open that debate.
 I managed to find a couple of javascript injection attacks in the beta
 already, though the developer assures me that they are working on fixing
 all the bugs right now, still the lack of attention to basic web
 security at such an early stage is concerning.
 That aside it seems okay, though I have some worries about side channel
 attacks and the fact that it hasn't been peer reviewed as far as I can
 tell yet.
 It does seem like an interesting project though, with some smart people
 behind it. I am looking forward to seeing the code once they open
 source it.
 
 Cooper Quintin
 PGP Key ID: 75FB 9347 FA4B 22A0 5068 080B D0EA 7B6F F0AF E2CA
 
 On 03/22/2013 01:48 PM, R. Jason Cronk wrote:
  Anybody know the people who are doing this?  http://www.crypho.com/
 
  It's still in beta, so I'm assuming they are working out bugs prior to
  releasing the code which they say they will do. See
  http://www.crypho.com/faq.html
 
 
Is it Open-Source?
 
  Yes! We are reviewing the source code for release. It will be
  available under an OSI approved license in the near future.
 
 
 
 
 
  *R. Jason Cronk, Esq., CIPP/US*
  /Privacy Engineering Consultant/, *Enterprivacy Consulting Group*
  enterprivacy.com http://enterprivacy.com
 
* phone: (828) 4RJCESQ
* twitter: @privacymaverick.com http://privacymaverick.com
* blog: http://blog.privacymaverick.com
 
 
 
  --
  Too many emails? Unsubscribe, change to digest, or change password
 by emailing moderator at compa...@stanford.edu
 mailto:compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change password
 by emailing moderator at compa...@stanford.edu
 mailto:compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Disturbing

2013-03-22 Thread Doug Schuler

This is one way to register a complaint: http://capwiz.com/fabbs/home/

Are there others?

BTW, what about other social sciences?  Just political science??

-- Doug

On Mar 21, 2013, at 7:55 AM, Yosem Companys wrote:

 WASHINGTON, March 20, 2013 /PRNewswire-USNewswire/ -- The following is being 
 released by the American Political Science Association:
 (Logo: http://photos.prnewswire.com/prnh/20120604/DC18511LOGO-b )
 This afternoon, the United States Senate delivered a devastating blow to the 
 integrity of the scientific process at the National Science Foundation (NSF) 
 by voting for the Coburn Amendment to the Continuing Appropriations Act of 
 2013.
 Senator Coburn (R-OK) submitted an amendment (SA 65, as modified) to the 
 Mikulski-Shelby Amendment (SA 26) to H.R. 933 (Full-Year Continuing 
 Appropriations Act of 2013).  The amendment places unprecedented restriction 
 on the national research agenda by declaring the political science study of 
 democracy and public policy out of bounds.  The amendment allows only 
 political science research that promotes national security or the economic 
 interests of the United States. 
 Adoption of this amendment is a gross intrusion into the widely-respected, 
 independent scholarly agenda setting process at NSF that has supported our 
 world-class national science enterprise for over sixty years.
 The amendment creates an exceptionally dangerous slippery slope.  While 
 political science research is most immediately affected, at risk is any and 
 all research in any and all disciplines funded by the NSF.  The amendment 
 makes all scientific research vulnerable to the whims of political pressure. 
 Adoption of this amendment demonstrates a serious misunderstanding of the 
 breadth and importance of political science research for the national 
 interest and its integral place on the nation's interdisciplinary scientific 
 research agenda. 
 Singling out any one field of science is short-sighted and misguided, and 
 poses a serious threat to the independence and integrity of the National 
 Science Foundation.
 And shackling political science within the national science agenda is a 
 remarkable embarrassment for the world's exemplary democracy.
 For the latest in political science research in the news, follow us on 
 Facebook and Twitter.  
 About the American Political Science Association
 Founded in 1903, the American Political Science Association is the leading 
 professional organization for the study of political science and serves more 
 than 15,000 members in over 80 countries. With a range of programs and 
 services for individuals, departments and institutions, APSA brings together 
 political scientists from all fields of inquiry, regions, and occupational 
 endeavors within and outside academe in order to expand awareness and 
 understanding of politics.
 SOURCE American Political Science Association
 
 
 RELATED LINKS
 http://www.apsanet.org --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

Douglas Schuler
doug...@publicsphereproject.org

--
Public Sphere Project
 http://www.publicsphereproject.org/

Liberating Voices!  A Pattern Language for Communication Revolution (project) 
 http://www.publicsphereproject.org/patterns/lv

Liberating Voices!  A Pattern Language for Communication Revolution (book)
 http://mitpress.mit.edu/catalog/item/default.asp?ttype=2tid=11601





--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Privacy, data protection questions

2013-03-22 Thread Rich Kulawiec
On Fri, Mar 22, 2013 at 09:58:17AM -0500, Andrew Haeg wrote:
 We're in the late prototype phase for Groundsourcehttp://groundsourcing.com,
 a mobile data collection and engagement platform -- designed for
 journalists, researchers, NGO's and others to use to gather first-hand
 knowledge. We've used the prototype to validate the need for the
 platform, and now privacy  data protection have moved front and center as
 we ramp up for a beta phase later this spring/summer.
 
 We've had some early discussions with the Tor Project about protecting
 journalists using the platform in countries with repressive regimes (down
 the road). We're also looking into using Wickr for encrypting
 communications. In the short term, we need advisors who can help guide our
 decisions around privacy and personal data collection  protection.

Ok.  Here's some advice.  You're not going to like it. ;-)  Sorry.
But better now than later, when lives are on the line.

I'd like to ask you to open a web browser and use your favorite
search engine to search for:

mobile malware epidemic
smartphone malware
android malware
windows phone malware

and similar.

Then I'd like you to explain how you propose to keep all those mobile
phones secure in the face of routine malware, let alone targeted and
custom malware crafted by hostile governments who would very much like
all those journalists and researchers and NGOs you mentioned to STFU
because they're saying and reporting and doing things those
governments find...disturbing.

Forget all the other security and privacy issues for a moment (some of
which I touched on in a previous list message [1]): how, EXACTLY, do you
propose to keep those phones from being infested just like a gazillion
other phones already are or will be real soon now?

Because once those endpoints are compromised, all the crafty routing and
anonymization and encryption layers you could possibly put in place aren't
going to matter very much.  And those endpoints WILL be compromised
(probably much sooner than you think) because they're going to be in the
hands of journalists and researchers and NGOs, *not* in the hands of
paranoid clueful paranoid diligent (did I mention paranoid?) geeks.

Oh, sure, someone sufficiently knowledgeable, cautious, etc.
can probably keep *one* phone secure.  Just like someone with those
qualities might be able to keep a single Windows system secure.  There are
people on this list who are capable of both of those things.  But dozens?
Hundreds?  Thousands?  Being carried around all over the place by
their owners?

There's not a chance in hell.  None.  This is not a solved problem in
computing.  Nor is there even a hint of a twitch of a notion of a
suggestion of a whisper that it will be solved anytime soon.

It's not even solved for people who've stacked the deck in their favor
(e.g., those who have the luxury of centralized control) let alone for
those who are allowing end users to connect their own.  And most of them
aren't painting big targets on their chests, they're just caught up in
the general crossfire...unlike *your* users, who are self-nominating to be
on the business end of some very serious attention from some very determined,
clueful and nasty people -- people who probably *already* have been
working on building or buying custom malware for phones because of course
that's what any prudent adversary with sufficient resources would be
doing just about now.

Yeah, okay, so I'm making the point at your expense, and I don't really
mean to do that, so I'll make it in the more general case: look, people,
unless you can produce a plan -- and more than that, a plan that's been
proven in the field to work -- for keeping, let's say, a population of, oh,
a thousand independent scattered phones free of malware, then you CAN'T
deploy your whizbang singing dancing smartphone app because it's going to
be promptly undermined.  Any government worthy of the term oppressive
is going to 0wn each and every phone of interest and is going to install
trackers, spyware, keystroke loggers, and whatever else occurs to them,
and you're not going to stop them.  At best, you might figure out that
this is happening after-the-fact and remediate some of them...until they
go back out in the field and get infested again.  Lather, rinse, repeat.

Not to put too fine a point on it (but I suppose I will anyway):

If someone else can run arbitrary code on your computer,
it's not YOUR computer any more. [2]

The phone may be in a journalist's hand or it may be in a researcher's
pocket, but it's not theirs.  *Not any more*.

Which means that your liberation app, the one that you designed and
developed and sweated over, the one that your user is trusting to
send and receive sensitive information, the one that's connecting
to a backend through umpteen layers of encryption and obfuscation
and misdirection and whatever...is now running on the 

Re: [liberationtech] Privacy, data protection questions

2013-03-22 Thread Brian Conley
Nose to the grindstone Andrew. Use Rich's email to remind you this is hard,
but its still worth doing.

Also remember you aren't going to solve these problems, but you may make it
easier for people who want to act.

Lastly, if Rich is really getting you down, click this link:

http://2.bp.blogspot.com/-w7WBItj9rgA/UCv2vNYVuhI/AW0/U1yNrdmndV8/s1600/haters_gonna_hate3.jpg

That said, do speak to Nathan Freitas, Harlo Holmes, Hans Christoph-Steiner
and others at the Guardian Project, and Bryan Nunez, et al at Witness about
Informacam, IOCipher, and other steps they're taking to solve some of these
problems.

Don't just innovate, collaborate.

I'd also like to talk to you about our work on StoryMaker an app to allow
individuals to produce compelling stories and publish them via Tor among
other features.

cheers

Brian

On Fri, Mar 22, 2013 at 3:50 PM, Rich Kulawiec r...@gsp.org wrote:

 On Fri, Mar 22, 2013 at 09:58:17AM -0500, Andrew Haeg wrote:
  We're in the late prototype phase for Groundsource
 http://groundsourcing.com,
  a mobile data collection and engagement platform -- designed for
  journalists, researchers, NGO's and others to use to gather first-hand
  knowledge. We've used the prototype to validate the need for the
  platform, and now privacy  data protection have moved front and center
 as
  we ramp up for a beta phase later this spring/summer.
 
  We've had some early discussions with the Tor Project about protecting
  journalists using the platform in countries with repressive regimes (down
  the road). We're also looking into using Wickr for encrypting
  communications. In the short term, we need advisors who can help guide
 our
  decisions around privacy and personal data collection  protection.

 Ok.  Here's some advice.  You're not going to like it. ;-)  Sorry.
 But better now than later, when lives are on the line.

 I'd like to ask you to open a web browser and use your favorite
 search engine to search for:

 mobile malware epidemic
 smartphone malware
 android malware
 windows phone malware

 and similar.

 Then I'd like you to explain how you propose to keep all those mobile
 phones secure in the face of routine malware, let alone targeted and
 custom malware crafted by hostile governments who would very much like
 all those journalists and researchers and NGOs you mentioned to STFU
 because they're saying and reporting and doing things those
 governments find...disturbing.

 Forget all the other security and privacy issues for a moment (some of
 which I touched on in a previous list message [1]): how, EXACTLY, do you
 propose to keep those phones from being infested just like a gazillion
 other phones already are or will be real soon now?

 Because once those endpoints are compromised, all the crafty routing and
 anonymization and encryption layers you could possibly put in place aren't
 going to matter very much.  And those endpoints WILL be compromised
 (probably much sooner than you think) because they're going to be in the
 hands of journalists and researchers and NGOs, *not* in the hands of
 paranoid clueful paranoid diligent (did I mention paranoid?) geeks.

 Oh, sure, someone sufficiently knowledgeable, cautious, etc.
 can probably keep *one* phone secure.  Just like someone with those
 qualities might be able to keep a single Windows system secure.  There are
 people on this list who are capable of both of those things.  But dozens?
 Hundreds?  Thousands?  Being carried around all over the place by
 their owners?

 There's not a chance in hell.  None.  This is not a solved problem in
 computing.  Nor is there even a hint of a twitch of a notion of a
 suggestion of a whisper that it will be solved anytime soon.

 It's not even solved for people who've stacked the deck in their favor
 (e.g., those who have the luxury of centralized control) let alone for
 those who are allowing end users to connect their own.  And most of them
 aren't painting big targets on their chests, they're just caught up in
 the general crossfire...unlike *your* users, who are self-nominating to be
 on the business end of some very serious attention from some very
 determined,
 clueful and nasty people -- people who probably *already* have been
 working on building or buying custom malware for phones because of course
 that's what any prudent adversary with sufficient resources would be
 doing just about now.

 Yeah, okay, so I'm making the point at your expense, and I don't really
 mean to do that, so I'll make it in the more general case: look, people,
 unless you can produce a plan -- and more than that, a plan that's been
 proven in the field to work -- for keeping, let's say, a population of, oh,
 a thousand independent scattered phones free of malware, then you CAN'T
 deploy your whizbang singing dancing smartphone app because it's going to
 be promptly undermined.  Any government worthy of the term oppressive
 is going to 0wn 

[liberationtech] Fwd: USAID/Humanity United Tech Challenge for Atrocity Prevention

2013-03-22 Thread Sam King
-- Forwarded message --
From: Mia Newman newman@gmail.com
Date: Tue, Mar 19, 2013 at 7:15 AM
Subject: USAID/Humanity United Tech Challenge for Atrocity Prevention
To: Sam King samk...@cs.stanford.edu


Hi Sam,

Not sure if you remember me, but we talked when I was president of Stanford
STAND for the past few years, and I also remember seeing you around at
LibTech seminars. I'm now working on a Gardner fellowship from the Haas
Center for the year at a foundation called Humanity United, which works on
anti-genocide and anti-human trafficking around the world. One of the
projects I've been working on is called the Tech Challenge for Atrocity
Prevention http://www.thetechchallenge.org. The Tech Challenge is a
prize-based challenge that hopes to spark new interdisciplinary
partnerships and new thinking on the application of technological solutions
to daunting problems in conflict situations. It seems like something
totally up your alley, especially because of your work with Code the
Change. I really hope you're interested in participating, but even if not
please feel free to forward widely - we're hoping to spread the word as
much as possible, especially outside the traditional human rights community.

To let you know where we are now: our second and final round formally
launched in early March. Three challenges are now open, soliciting
excellent proposals to compete for prizes of up to $10,000. The open
challenges are:

   - The MODEL http://www.thetechchallenge.org/#!model Challenge: to
   model conflict situations to determine community-level risk of violence
   (TopCoder) - *Geared toward technical coders and data modelers
   interested in applying their skills to conflict datasets. The challenge is
   composed of two stages: first to discover data and then to model it. *
   - The COMMUNICATE
http://www.thetechchallenge.org/#!communicateChallenge: to
facilitate on-the-ground communication among communities
   affected by conflict (Innocentive) - *Ideal for a wide audience with
   varying backgrounds to apply their experience and creativity to overcome
   the challenge of secure two-way communication.*
   - The ALERT http://www.thetechchallenge.org/#!alert Challenge: to
   develop improved methods of gathering and verifying information from
   hard-to-access conflict areas (OpenIDEO) - *This platform was
   specifically selected to channel empathy, ideation, and analysis to help
   communities in conflict inform the wider world about their situation. With
   its multi-stage process, a new part of the challenge is opening every few
   weeks, and we encourage you to continue to revisit the site. *

It would be great if you could pass along this email to anyone you think
might be interested in participating! Feel free to contact me with
questions or comments, and you can also check our
FAQhttp://www.thetechchallenge.org/faqs/Tech_Challenge_for_Atrocity_Prevention_-_FAQ.pdffor
more information.

Thanks, and hope you're doing well!
Mia
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] US State Dept Discourages Using Technology to Promote Democracy, Human Rights, and Citizen Engagement in Ukraine?

2013-03-22 Thread Jillian C. York
I think that means they discourage them *for applying for those grants*.
 Which is meh, but not really a big deal.

On Thu, Mar 21, 2013 at 8:04 PM, Yosem Companys compa...@stanford.eduwrote:

 Fostering Civic Engagement in Ukraine (approximately $500,000
 available): DRL’s objective is to support the role of civil society in
 policy formation and enhancing accountability and responsiveness of
 government officials in Ukraine. The program will support civil
 society to foster an inclusive and participatory democratic system of
 government and hold politicians and public officials more accountable
 to constituents. In order to foster more unity among civil society
 efforts, the program should support post-election advocacy on areas of
 policy formation and implementation such as ongoing efforts related to
 elections and election law reform; freedom of assembly legislation;
 and/or reversing legislation restricting the rights of vulnerable or
 marginalized populations. The program should also examine how well
 existing laws are implemented and help civil society ensure that
 citizens can use official institutions and mechanisms to exercise
 their rights. Program activities could include, but are not limited
 to: support for activities to encourage debate and advocacy by
 citizens and civil society organizations, small grants to civil
 society for monitoring and/or advocacy activities, creating regional
 civil society partnerships to increase civil society unity on advocacy
 efforts, or connecting Ukrainian civil society with their counterparts
 in one or more countries in the region through NGO-to-NGO exchanges
 and mentoring in order to take advantage of shared post-communist and
 transition experiences. Successful proposals will demonstrate a strong
 knowledge of civil society in Ukraine and an established ability to
 work with regional civil society groups.

 DRL strongly discourages health, technology, or science- related
 projects unless they have an explicit component related to the
 requested program objectives listed above.

 http://www.state.gov/j/drl/p/206488.htm
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




-- 
US: +1-857-891-4244 | NL: +31-657086088
site:  jilliancyork.com http://jilliancyork.com/* | *
twitter: @jilliancyork* *

We must not be afraid of dreaming the seemingly impossible if we want the
seemingly impossible to become a reality - *Vaclav Havel*
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Online Certificate Course in Organizing and OpenGov (April 15 - May 10)

2013-03-22 Thread Nick Martin
Hi LiberationTech Folks!

My colleagues and I at TechChange have decided to offer another round of
our online certificate course on *Digital Organizing and Open
Government* (course
description included below). The course will run from April 15th - May
10th.

We've got an amazing line-up of guest experts but are looking for a few
more. If you're interested in speaking in the class or sharing case studies
from your work then let us know. We're also looking to fill a few more
seats so feel free to circulate to your colleagues.

Here's a one-minute animation about the course: http://vimeo.com/6575

For those that are less familiar with TechChange http://techchange.org/ we
offer online certificate courses on our dedicated platform using a number
of techniques including social learning, game mechanics, animation,
interactive simulations, and more. We're also looking to do a lot more work
in animation so if anyone is interested in having their message or content
animated then let us know.

Cheers,
Nick

***

*TC104: Digital Organizing and Open Government (April 15th - May 10th)*
http://techchange.org/online-courses/global-innovations-for-digital-organizing/

Technological innovation is transforming civil society organization and
creating new opportunities for government accountability. This four-week
online professional development certificate course will evaluate case
studies where new technologies have been used for activism and what factors
and contexts are most influential on outcomes. It will also provide
participants with strategies for maximizing the impact of new media and
train them in the effective use of analysis and message management tools.

*Speakers:*

   - Kaushal Jhalla, World Bank
   - Linda Raftree, Plan International, USA
   - Barak Hoffman, Georgetown University

*Topics  Tech:*

   - Communicating Online: Social Media Analytics and Outreach
   - Simple Tools for Big Data: Sunlight Labs and Accountable Congress
   - Building an Engaged Public: CrowdHall and Online Discussions
   - Open Government Partnerships and Local Connections: How to Open Your
   Government

*Cost:*
Full course cost: $445
Register before March 26th: $395
Use liberationtech as a discount code: $345

*Apply now: *
http://techchange.org/online-courses/global-innovations-for-digital-organizing/

-- 
Nicholas Carl Martin
President
TechChange
web: http://techchange.org
twitter: @ncmart
(240)-505-2324
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Please Vote on Reply to Question

2013-03-22 Thread Katherine Maher
Reply to all.

On Thu, Mar 21, 2013 at 8:38 PM, Enrique Piraces pira...@hrw.org wrote:

  Reply to all.

  Best,
 Enrique Piracés
 Human Rights Watch
 https://www.hrw.org
 https://www.twitter.com/epiraces

  On Mar 20, 2013, at 9:17 PM, Yosem Companys wrote:

  Dear Liberationtech list subscribers,

  Several of you have petitioned to change Liberationtech mailing list's
 default reply to option from reply-to-all to reply-to-poster.  Given
 the debate (see links below), we have decided to put the issue up for a
 vote:

- Do you want replies to Liberationtech list messages directed to
reply-to-all or reply-to-poster?

  Please vote by submitting your preference to me by 11.59 pm PST
 on Sunday, March 24, 2013.  Any votes received after this date and time
 will not be counted.

  Thanks,

  Yosem
 One of your moderators

  PS  To read a summary of the advantages and disadvantages of
 reply-to-all, click on the corresponding links below:

- Reply-to-all considered useful:
http://marc.merlins.org/netrants/reply-to-useful.html
- Reply-to-all considered harmful:
http://www.unicom.com/pw/reply-to-harmful.html

  If you'd like to read the entire debate on the Liberationtech list,
 please click on the links below:


 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03767.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03768.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03769.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03771.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03772.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03773.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03774.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03775.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03776.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03777.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03778.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03779.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03780.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03781.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03782.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03783.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03788.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03789.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03790.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03791.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03799.html
 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03801.html

  --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech



 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




-- 
*Katherine R. Maher*

katherine.ma...@gmail.com
@krmaher https://www.twitter.com/krmaher

US: +1 203 858 7316
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Please Vote on Reply to Question

2013-03-22 Thread Lina Srivastava
Reply to all.

On Fri, Mar 22, 2013 at 9:55 AM, Katherine Maher
katherine.ma...@gmail.comwrote:

 Reply to all.

 On Thu, Mar 21, 2013 at 8:38 PM, Enrique Piraces pira...@hrw.org wrote:

  Reply to all.

  Best,
 Enrique Piracés
 Human Rights Watch
 https://www.hrw.org
 https://www.twitter.com/epiraces

  On Mar 20, 2013, at 9:17 PM, Yosem Companys wrote:

  Dear Liberationtech list subscribers,

  Several of you have petitioned to change Liberationtech mailing list's
 default reply to option from reply-to-all to reply-to-poster.  Given
 the debate (see links below), we have decided to put the issue up for a
 vote:

- Do you want replies to Liberationtech list messages directed to
reply-to-all or reply-to-poster?

  Please vote by submitting your preference to me by 11.59 pm PST
 on Sunday, March 24, 2013.  Any votes received after this date and time
 will not be counted.

  Thanks,

  Yosem
 One of your moderators

  PS  To read a summary of the advantages and disadvantages of
 reply-to-all, click on the corresponding links below:

- Reply-to-all considered useful:
http://marc.merlins.org/netrants/reply-to-useful.html
- Reply-to-all considered harmful:
http://www.unicom.com/pw/reply-to-harmful.html

  If you'd like to read the entire debate on the Liberationtech list,
 please click on the links below:


 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03767.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03768.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03769.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03771.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03772.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03773.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03774.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03775.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03776.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03777.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03778.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03779.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03780.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03781.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03782.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03783.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03788.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03789.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03790.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03791.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03799.html

 http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg03801.html

  --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech



 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




 --
 *Katherine R. Maher*

 katherine.ma...@gmail.com
 @krmaher https://www.twitter.com/krmaher

 US: +1 203 858 7316

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




-- 
Lina Srivastava
--
linasrivastava.com  |  twitter http://twitter.com/lksriv  |
linkedinhttp://www.linkedin.com/in/linasrivastava
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] US State Dept Discourages Using Technology to Promote Democracy, Human Rights, and Citizen Engagement in Ukraine?

2013-03-22 Thread Shava Nerad
Evgeny got to them. ;)

More seriously, does anyone have digital divide info - cultural and
financial - on Ukraine?  Tech is not the solution for all cultures.

Beer is the correct solution for some.  A thousand cups of tea for others.

Maybe State knows something we don't?

Like:

---
INTERNET
Ukraine suffers digital divide - study
Tuesday 22 March 2011 | 15:40 CET | News
There is still a significant difference in household internet access across
Ukraine, according to a study by GfK Ukraine. Internet penetration was just
12 percent in rural areas in Q4 2010, reports BizLigaNet. The figure rises
to 25 percent in towns with a population below 50,000 and 38 percent of
households in cities with more than 500,000 residents.

http://www.telecompaper.com/news/ukraine-suffers-digital-divide-study--793094

yrs,


Shava Nerad
shav...@gmail.com
On Mar 21, 2013 3:04 PM, Yosem Companys compa...@stanford.edu wrote:

 Fostering Civic Engagement in Ukraine (approximately $500,000
 available): DRL’s objective is to support the role of civil society in
 policy formation and enhancing accountability and responsiveness of
 government officials in Ukraine. The program will support civil
 society to foster an inclusive and participatory democratic system of
 government and hold politicians and public officials more accountable
 to constituents. In order to foster more unity among civil society
 efforts, the program should support post-election advocacy on areas of
 policy formation and implementation such as ongoing efforts related to
 elections and election law reform; freedom of assembly legislation;
 and/or reversing legislation restricting the rights of vulnerable or
 marginalized populations. The program should also examine how well
 existing laws are implemented and help civil society ensure that
 citizens can use official institutions and mechanisms to exercise
 their rights. Program activities could include, but are not limited
 to: support for activities to encourage debate and advocacy by
 citizens and civil society organizations, small grants to civil
 society for monitoring and/or advocacy activities, creating regional
 civil society partnerships to increase civil society unity on advocacy
 efforts, or connecting Ukrainian civil society with their counterparts
 in one or more countries in the region through NGO-to-NGO exchanges
 and mentoring in order to take advantage of shared post-communist and
 transition experiences. Successful proposals will demonstrate a strong
 knowledge of civil society in Ukraine and an established ability to
 work with regional civil society groups.

 DRL strongly discourages health, technology, or science- related
 projects unless they have an explicit component related to the
 requested program objectives listed above.

 http://www.state.gov/j/drl/p/206488.htm
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech