Re: [liberationtech] Crowdsourcing in Policy-Making: The Impact of Blended Expert

2013-09-28 Thread fiorella de cindio
for those who cannot attend this seminar and the other scheduled in
October and after, it would be great to have the podcast and/or slides
available online.

thanks
-- fiorella de cindio

liberationtech liberationtech@lists.stanford.edu writes:
Crowdsourcing in Policy-Making: The Impact of Blended Expertise on
Law-Making Process  

When: October 3, 2013 / 4:30 p.m. - 6:00 p.m.

Host: Center for Democracy, Development, and the Rule of LawCDDRL Seminar
Series 

Featuring: Tanja Aitamurto, Stanford University

Location: Wallenberg Hall, 450 Serra Mall, Building 160, Stanford, CA
94305-2055

More: [
http://r20.rs6.net/tn.jsp?e=0015E8HU5E8sGA-MRkqyHr7rVtXtCsSDYbsznDEP1klu4KVddtGprajH1aW9JBz-c9QEYetPVnpaViiMCMYvW8tKQxkzFBNJ79aJkhWtDNKZFTVQ0hWYHHnqQBjOAcQIMFXNayD1iJvE1Zn9ADZNPFZiEUJRCaGbeiE0GCebBvQoZqmtnPWAhhTAzxyoeGBAkOZ-V2g65r7o1BfOVSalIWJLhgYPZ
Gz1suEDZAJQFupWJDhdKVYL0v6CsUAtBXHtC7fWzHSKJrbXi8= ]Website

-- 
Liberationtech is public  archives are searchable on Google. Violations
of list guidelines will get you moderated:
https://mailman.stanford.edu/mailman/listinfo/liberationtech.
Unsubscribe, change to digest, or change password by emailing moderator
at compa...@stanford.edu.


==
Fiorella De Cindio
associate professor
University of Milan
Computer Science Department
via Comelico 39/41
I20135 MILANO (Italy)
tel. +39-02-5031 6288 (direct) 6327 (lab)
email: fiorella.decin...@unimi.it
http://eng.di.unimi.it/ecm/home/research/milan-laboratories/civic-informatics-laboratory

-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


[liberationtech] Chokepoint Project News - DNShonest + World Bank

2013-09-28 Thread i...@chokepointproject.net

  
  

  

  


Chokepoint Project News : 28/9/13

Hello all,

Please allow us to take a few moments of your time and show you
what weve been up to. Dont worry, you have NOT been registered
anywhere and will NOT have to do anything to never hear from us
again. (More about that at the end of this text.)

We have been making steady progress behind the scenes and are
very happy to finally be able to show off some of our hard work:


DNShonest

We have integrated the DNShonest remote


  DNS probing tool created by Joss Wright
of the Oxford Internet Institute into Chokepoint Projects
Structured Human Rights Analytics platform.

This allows us to do a number of things :

1. See for each Domain Name Server if it lies about the domains
we ask it about.

2. See which Autonomous Systems contain DNS servers that lie
about domains

3. See who owns the Autonomous Systems that contain lying DNS
systems


This iteration is testing a small set of domain servers (200) in
China for replies given to a small set of domains (180). We are
running the probe every hour which results in a little less than
18000 queries. The results are then tested for suspicious
replies, which in turn are tested for states of lying,
probably lying and maybe lying. From these results
statistics are generated which are visualized on our public
dashboard.

Country page :
  https://beta.chokepointproject.net/country/CN?show=2013-09-21
Worldmap : https://beta.chokepointproject.net/




Lying is a big claim, and in this case it explicitly means that
a reply given by a domain name server is not the reply it should
give. We have tried to avoid false positives as much as
possible, and first identifying suspicious replies, after which
additional probes aid in determining if something is a lie or
not.

More information is available at https://beta.chokepointproject.net/about


Worldbank :

In this release we also show a visualization of a selection of
Worlbank data, this is intended primarily to provide some basic
contextual insight into the country for which data is presented.
In the case of China, the internet usage in 2011 (most recent
Worldbank statistic) was 38.4% of the country. In the context of
the DNShonest results this means that 61.6% of the Chinese
population is unaffected by these lying DNS servers. Of course
the internet usage will have increased somewhat over the past 21
months, so this conclusion should not be seen as representative
of the current situation.




Whats next? 

Well, a lot. First of all, we will start rolling this out to all
countries and increase both the number of servers tested and the
numbers of domains tested. Additionally, we can already see
improvements to the dashboard visualizations that should be
made.


Thanks

Many thanks are in order for the Internet
  Protection Lab who provided some sorely needed funding out
of a donation made by the Dutch .nl registrar SIDN. 


If you like our work so far, please consider throwing a
little funding our way. Any amount, no matter how large will
help us build more, faster and shinier tools (and pay the rent
on our cardboard box sub-basement walk-downs.) https://chokepointproject.net/donate/


About this mail :

Please note that this mail is NOT a newsletter (yet). You have
NOT been registered anywhere by us. You are receiving this mail
because you probably met one of our team somewhere in the world
and handed out your card. If you WANT to receive updates from us
in the future, please subscribe here https://chokepointproject.net/newsletter/.
Do nothing and you will never hear from us again. (Not through
this medium at least)


For more information :

email i...@chokepointproject.net
website https://chokepointproject.net/
follow us on twitter https://twitter.com/ChokePointP


  

  

-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 

Re: [liberationtech] Crowdsourcing in Policy-Making: The Impact ofBlended Expert

2013-09-28 Thread Tanja Aitamurto
Hi Fiorella, I'll probably publish the slides on Slideshare after the
preso. I don't know if there will be a podcast, will check that out
Thanks for your interest!
best,
Tanja


On Sat, Sep 28, 2013 at 1:05 AM, fiorella de cindio 
fiorella.decin...@unimi.it wrote:

  [image: Boxbe] https://www.boxbe.com/overview This message is eligible
 for Automatic Cleanup! (fiorella.decin...@unimi.it) Add cleanup 
 rulehttps://www.boxbe.com/popup?url=https%3A%2F%2Fwww.boxbe.com%2Fcleanup%3Ftoken%3DyVl4i6OkojufjywbdiaE73vpxZ48qS75rGiAlYJTm%252FLaGxRPyzcnKTj85HmITZrO2k15Dnvyv6ba9GNYOmhm1hVrVo5xccZhncDD%252FASOuw4%252BCbYwEJSIiEqVygRWQV29UWsGk9IzHrC2QBigko99PA%253D%253D%26key%3Drp3m%252F4hSz2WxKpgflz6%252FgiDXxHwg%252BeMF1e1xeuGnMKc%253Dtc_serial=15258469124tc_rand=132810255utm_source=stfutm_medium=emailutm_campaign=ANNO_CLEANUP_ADDutm_content=001|
  More
 infohttp://blog.boxbe.com/general/boxbe-automatic-cleanup?tc_serial=15258469124tc_rand=132810255utm_source=stfutm_medium=emailutm_campaign=ANNO_CLEANUP_ADDutm_content=001

 for those who cannot attend this seminar and the other scheduled in
 October and after, it would be great to have the podcast and/or slides
 available online.

 thanks
 -- fiorella de cindio

 liberationtech liberationtech@lists.stanford.edu writes:
 Crowdsourcing in Policy-Making: The Impact of Blended Expertise on
 Law-Making Process
 
 When: October 3, 2013 / 4:30 p.m. - 6:00 p.m.
 
 Host: Center for Democracy, Development, and the Rule of LawCDDRL Seminar
 Series
 
 Featuring: Tanja Aitamurto, Stanford University
 
 Location: Wallenberg Hall, 450 Serra Mall, Building 160, Stanford, CA
 94305-2055
 
 More: [
 
 http://r20.rs6.net/tn.jsp?e=0015E8HU5E8sGA-MRkqyHr7rVtXtCsSDYbsznDEP1klu4KVddtGprajH1aW9JBz-c9QEYetPVnpaViiMCMYvW8tKQxkzFBNJ79aJkhWtDNKZFTVQ0hWYHHnqQBjOAcQIMFXNayD1iJvE1Zn9ADZNPFZiEUJRCaGbeiE0GCebBvQoZqmtnPWAhhTAzxyoeGBAkOZ-V2g65r7o1BfOVSalIWJLhgYPZ
 Gz1suEDZAJQFupWJDhdKVYL0v6CsUAtBXHtC7fWzHSKJrbXi8= ]Website
 
 --
 Liberationtech is public  archives are searchable on Google. Violations
 of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech.
 Unsubscribe, change to digest, or change password by emailing moderator
 at compa...@stanford.edu.


 ==
 Fiorella De Cindio
 associate professor
 University of Milan
 Computer Science Department
 via Comelico 39/41
 I20135 MILANO (Italy)
 tel. +39-02-5031 6288 (direct) 6327 (lab)
 email: fiorella.decin...@unimi.it

 http://eng.di.unimi.it/ecm/home/research/milan-laboratories/civic-informatics-laboratory

 --
 Liberationtech is public  archives are searchable on Google. Violations
 of list guidelines will get you moderated:
 https://mailman.stanford.edu/mailman/listinfo/liberationtech.
 Unsubscribe, change to digest, or change password by emailing moderator at
 compa...@stanford.edu.




-- 
www.tanjaaitamurto.com

Studying the Open X at Stanford: crowdsourcing, crowdfunding, open
innovation, open data.
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] SaferScript (Rough draft)

2013-09-28 Thread Scott Arciszewski
Hey LiberationTech,

I was going to try to polish this idea and develop it, but it's probably
better
off being developed by people with experience developing Firefox addons
and/or
who understand PKI in-and-out. Also, due to complications in my own life, I
do
not have the time or energy to invest in such an undertaking.

I've previously shared this with Micah Lee of the EFF and his friend
Garrett.

This is just a very rough draft. If anyone wants to take this up as a FOSS
project, feel free; I only ask that Taylor and I be mentioned somewhere in
the
credits.


  ___  _   _   _
 / |  / _|/ | (_) | |
| (___   __ _| |_ ___ _ _| (___   ___ _ __ _ _ __ | |_
 \___ \ / _` |  _/ _ \ '__\___ \ / __| '__| | '_ \| __|
 ) | (_| | ||  __/ |  ) | (__| |  | | |_) | |_
|_/ \__,_|_| \___|_| |_/ \___|_|  |_| .__/ \__|
| |
|_| (The name is
negotiable)
___
\
;
 \  Making Javascript Safer, Preventing XSS
Payloads   ;
  \   @voodooKobra (Scott
Arciszewski) ;
   \  Further suggestions by @DefuseSec (Taylor
Hornby);

\__;

WHAT IS IT?
  An optional way to configure only digitally signed Javascript for websites
  set up to use it.

COMPONENTS
  o Browser plugin (Firefox at first, eventually Chrome  Opera?)
  o Netbeans plugin (for developers)
  o CLI Program (integrates with gnupg) for the server
  o Source file on the server
  o Publicly accessible whitelist file
  o Network of notaries which audit the signed whitelists to detect abuse

_

 | The Browser Plugin
\__
 |
|
 | For security-conscious users, the SaferScript browser plugin would
request |
 | a whitelist of .js files (and their sha256 checksums), which should
be |
 | signed by the developer's GPG private
key. |
 |
|
 | (Note: In case SHA-256 is ever broken it needs to be able to support
other |
 | hash functions, such as the SHA-3 family, Whirlpool, and
RIPEMD.)  |
 |
|
 | If we do not know the public key, we will request it from the server
and   |
 | check with notaries that the user trusts that they see the same key.
If|
 | the website has been queried before, the notary will also compare
the  |
 | public key it received with the one
archived.  |
 |
|
 | The code will then verify the signature of the whitelist. If it
matches,   |
 | then each .js file will be downloaded and their checksums will be
verified |
 | before they are loaded into memory. If any of their checksums
doesn't  |
 | match, then that .js file is not loaded and the user is
notified.  |
 |
|
 | For public key verification, The browser will then send an SHA-256
digest  |
 | of the whitelist to a notary. If the notary does not have a record of
that |
 | whitelist, our network will request the whitelist and compare the
digest   |
 | with the one submitted by the user. If it doesn't match, the user
is   |
 | notified and they fail back to a copy that was signed and stored in
the|
 | public
record. |
 |
|
 | If the signature matches but it is an updated version of the
Javascript|
 | (and the notary has cached a copy of the same whitelist), the user will
be |
 | notified of the change and asked if they wish to examine the
differences   |
 | between the old version and the new version. (This can be turned off
for   |
 | non-tech-savvy users; all changes that any user experiences should
be  |
 | mirrored on the notaries, assuming they have opted
in.)|
 |
|
 | No other Javascript will load. Even inline function calls (onClick=
etc) |
 | will have to be rewritten as $(#objectID).click( function() {
});|
 |
|
 | If the GPG signature doesn't match, NO Javascript will load for the
entire |
 | domain until the developer updates the signed whitelist with new
checksums |
 | and an updated
signature.  |
 |
|
 | Two further levels of paranoia will also be available: If a .css file
is   |
 | specified in the whitelist, no other stylesheet changes (outside of
those  |
 | made by trusted Javascript) will be registered. Additionally, if a
.png,   |
 | .jpg, .gif (etc) file is listed, all other images will be
blacklisted. |
 | These paranoid modes are entirely optional and suited to
self-contained|
 | apps rather than content portals that depend on user-generated
content.|
 |
|
 | Notaries are selected when a user 

Re: [liberationtech] SaferScript (Rough draft)

2013-09-28 Thread Scott Arciszewski
That is /ugly/ as heck. Sorry.

https://defuse.ca/b/MQrZXLiE - link valid for 6 months


On Sat, Sep 28, 2013 at 8:28 PM, Scott Arciszewski kobrasre...@gmail.comwrote:

 Hey LiberationTech,

 I was going to try to polish this idea and develop it, but it's probably
 better
 off being developed by people with experience developing Firefox addons
 and/or
 who understand PKI in-and-out. Also, due to complications in my own life,
 I do
 not have the time or energy to invest in such an undertaking.

 I've previously shared this with Micah Lee of the EFF and his friend
 Garrett.

 This is just a very rough draft. If anyone wants to take this up as a FOSS
 project, feel free; I only ask that Taylor and I be mentioned somewhere in
 the
 credits.


 
   ___  _   _   _
  / |  / _|/ | (_) | |
 | (___   __ _| |_ ___ _ _| (___   ___ _ __ _ _ __ | |_
  \___ \ / _` |  _/ _ \ '__\___ \ / __| '__| | '_ \| __|
  ) | (_| | ||  __/ |  ) | (__| |  | | |_) | |_
 |_/ \__,_|_| \___|_| |_/ \___|_|  |_| .__/ \__|
 | |
 |_| (The name is
 negotiable)

 ___
 \
 ;
  \  Making Javascript Safer, Preventing XSS
 Payloads   ;
   \   @voodooKobra (Scott
 Arciszewski) ;
\  Further suggestions by @DefuseSec (Taylor
 Hornby);

 \__;

 WHAT IS IT?
   An optional way to configure only digitally signed Javascript for
 websites
   set up to use it.

 COMPONENTS
   o Browser plugin (Firefox at first, eventually Chrome  Opera?)
   o Netbeans plugin (for developers)
   o CLI Program (integrates with gnupg) for the server
   o Source file on the server
   o Publicly accessible whitelist file
   o Network of notaries which audit the signed whitelists to detect abuse

 _

  | The Browser Plugin
 \__
  |
 |
  | For security-conscious users, the SaferScript browser plugin would
 request |
  | a whitelist of .js files (and their sha256 checksums), which should
 be |
  | signed by the developer's GPG private
 key. |
  |
 |
  | (Note: In case SHA-256 is ever broken it needs to be able to support
 other |
  | hash functions, such as the SHA-3 family, Whirlpool, and
 RIPEMD.)  |
  |
 |
  | If we do not know the public key, we will request it from the server
 and   |
  | check with notaries that the user trusts that they see the same key.
 If|
  | the website has been queried before, the notary will also compare
 the  |
  | public key it received with the one
 archived.  |
  |
 |
  | The code will then verify the signature of the whitelist. If it
 matches,   |
  | then each .js file will be downloaded and their checksums will be
 verified |
  | before they are loaded into memory. If any of their checksums
 doesn't  |
  | match, then that .js file is not loaded and the user is
 notified.  |
  |
 |
  | For public key verification, The browser will then send an SHA-256
 digest  |
  | of the whitelist to a notary. If the notary does not have a record of
 that |
  | whitelist, our network will request the whitelist and compare the
 digest   |
  | with the one submitted by the user. If it doesn't match, the user
 is   |
  | notified and they fail back to a copy that was signed and stored in
 the|
  | public
 record. |
  |
 |
  | If the signature matches but it is an updated version of the
 Javascript|
  | (and the notary has cached a copy of the same whitelist), the user will
 be |
  | notified of the change and asked if they wish to examine the
 differences   |
  | between the old version and the new version. (This can be turned off
 for   |
  | non-tech-savvy users; all changes that any user experiences should
 be  |
  | mirrored on the notaries, assuming they have opted
 in.)|
  |
 |
  | No other Javascript will load. Even inline function calls (onClick=
 etc) |
  | will have to be rewritten as $(#objectID).click( function() {
 });|
  |
 |
  | If the GPG signature doesn't match, NO Javascript will load for the
 entire |
  | domain until the developer updates the signed whitelist with new
 checksums |
  | and an updated
 signature.  |
  |
 |
  | Two further levels of paranoia will also be available: If a .css file
 is   |
  | specified in the whitelist, no other stylesheet changes (outside of
 those  |
  | made by trusted Javascript) will be registered. 

Re: [liberationtech] SaferScript (Rough draft)

2013-09-28 Thread Griffin Boyce
  Have you considered putting your notes and code somewhere online, such
as GitHub?  It would be a lot easier to get feedback and make public
changes there.

~Griffin

Scott Arciszewski wrote:
 That is /ugly/ as heck. Sorry.

 https://defuse.ca/b/MQrZXLiE - link valid for 6 months


 On Sat, Sep 28, 2013 at 8:28 PM, Scott Arciszewski
 kobrasre...@gmail.com mailto:kobrasre...@gmail.com wrote:

 Hey LiberationTech,

 I was going to try to polish this idea and develop it, but it's
 probably better
 off being developed by people with experience developing Firefox
 addons and/or
 who understand PKI in-and-out. Also, due to complications in my
 own life, I do
 not have the time or energy to invest in such an undertaking.

 I've previously shared this with Micah Lee of the EFF and his
 friend Garrett.

 This is just a very rough draft. If anyone wants to take this up
 as a FOSS
 project, feel free; I only ask that Taylor and I be mentioned
 somewhere in the
 credits.


-- 
Cypherpunks write code not flame wars. --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de

My posts are my own, not my employer's.

-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] SaferScript (Rough draft)

2013-09-28 Thread Scott Arciszewski
I'm giving the idea away. I don't have any code written, just that rough
draft. I was hoping to get feedback and suggestions from a few people so I
could make a solid idea, then move forward with making it a reality, but
life's demands are getting in the way of ambition.

Feel free to post it where ever you'd like. I'll probably copy  paste it
to pastebin and a few other places for the sake of keeping it accessible.

Have you considered putting your notes and code somewhere online, such
as GitHub?  It would be a lot easier to get feedback and make public
changes there.

~Griffin
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] Snowden for the Sakharov Prize

2013-09-28 Thread Yosem Companys
From: Erik JOSEFSSON erik.josefs...@europarl.europa.eu

Dear all,

It takes time for the political machinery in the European Parliament to
process Snowden's revelations.

If you want to help speed that process up, please consider to tweet,
mail and blog about the nomination of Snowden for the Sakharov Prize.

*The decisive vote on candidates is on Monday 30 September.***

Article19 article:
http://www.article19.org/join-the-debate.php/111/view/

DFRI letter to MEPs:
http://article.gmane.org/gmane.org.user-groups.dfri/765

Private tweet:
https://twitter.com/erikjosefsson/status/383502328407400449

Best regards.

//Erik

--
Erik Josefsson
Advisor on Internet Policies
Greens/EFA Group
http://www.greens-efa.eu/36-details/josefsson-erik-138.html
GSM: *+32484082063*
BXL: PHS 04C075 TEL: +3222832667
SBG: WIC M03005 TEL: +33388173776
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.