Re: [liberationtech] secure voice options for china?
From anecdotal experience: Running your own OpenVPN endpoint on a cloud provider like digitalocean* seems to work really well as long as you wrap the OpenVPN connection in something else like obfsproxy or stunnel. Theoretically if a commercial provider implemented something besides pure openvpn then that'd work as well. And if you want to roll your own node there is a set of ansiable scripts/playbooks called streisand at https://github.com/jlund/streisand, which includes a version of OpenVPN that proxies through an Stunnel connection. *Some slight issues arose with running on Digitalocean, the user's account was locked completely at first and wanted extensive identification to unlock(passport), and the speed from China to node hosted anywhere but Singapore or LA was extremely slow. A VM hosted in singapore also seemed to be randomly slow, even to stuff that was hosted in Singapore. -Andrew On Thu, Feb 12, 2015 at 2:13 PM, Nathan of Guardian nat...@guardianproject.info wrote: On Thu, Feb 12, 2015, at 11:45 AM, Tim Libert wrote: asking for a friend, can anybody suggest best ways to have a secure voice conversation with persons located in mainland china from outside china? threat model is interception by chinese authorities, other states/actors are not of significant concern. email alone is insufficient for task. 1) Setup a VPN of some sort to defend against traffic filtering and blocking. Tor doesn't work with streaming audio (UDP) so it isn't an option this case, but there are still viable VPN solutions out there (ExpressVPN and others detailed here: http://www.greycoder.com/best-vpn-china/) 2) Use something like Ostel (https://ostel.co/) service to have an end-to-end encryption audio and/or video call using Jitsi or CSipSimple (Android) or Linphone (iOS/Android): https://guardianproject.info/howto/callsecurely/ You might also try using Signal (iOS), Redphone (Android), or SilentCircle apps for mobile, but I am not completely up to date on how well they work at the moment. +n -- Nathan of Guardian nat...@guardianproject.info -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] secure voice options for china?
On Thu, Feb 12, 2015, at 11:45 AM, Tim Libert wrote: asking for a friend, can anybody suggest best ways to have a secure voice conversation with persons located in mainland china from outside china? threat model is interception by chinese authorities, other states/actors are not of significant concern. email alone is insufficient for task. 1) Setup a VPN of some sort to defend against traffic filtering and blocking. Tor doesn't work with streaming audio (UDP) so it isn't an option this case, but there are still viable VPN solutions out there (ExpressVPN and others detailed here: http://www.greycoder.com/best-vpn-china/) 2) Use something like Ostel (https://ostel.co/) service to have an end-to-end encryption audio and/or video call using Jitsi or CSipSimple (Android) or Linphone (iOS/Android): https://guardianproject.info/howto/callsecurely/ You might also try using Signal (iOS), Redphone (Android), or SilentCircle apps for mobile, but I am not completely up to date on how well they work at the moment. +n -- Nathan of Guardian nat...@guardianproject.info -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] secure voice options for china?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 02/12/2015 01:06 PM, Brian Behlendorf wrote: And this is why even people who care about their privacy still use Skype. Bad actors go to extraordinary, stupid lengths to restrict access and put surveillance measures in place. Hours rivalling that of Silicon Valley startups are spent fine tuning each and every last measure to make sure that almost nothing sneaks past. There is no magick wand that the other side of the game can wave to bypass them like a gentle breeze. Circumvention and counter-net.surveillance are hard, and if the other side doesn't bring its A game to match, it's just not going to happen. We may as well roll over and show our bellies. - -- The Doctor [412/724/301/703/415] [ZS] Developer, Project Byzantium: http://project-byzantium.org/ PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ It's better to burn out than it is to rust. -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJU3SjBAAoJED1np1pUQ8RkjwkP/1hJi2rJz8cZWBZudIf/zeRO qjrJB2ijVY+Rhy2e2rGqASLgByeI/49C0duwQK4Bnc8LxQnhJTQaf/6YRPeJavkW ebTZzGEqdCIBLVZL+DryP8rv09JzvEqdzqli64YluzphiigMl+jRqGJZCJaqiO6y MEQ1lzhkznvQlcl+Uso8+5lDPvmgBSkz6h3kltp8Za9ylcyQ0VNz81S+xslZrXV9 7MDHRjGwUvQxHTYH3vdPpEhkJER5y9oCq2at7GufvLC84lj23ytjvX80yzVr6S0v Lg2Wo6rGIf4lZK8AdKIwUupyQmAcEH2hL3UKkybfJut68gch2juFlb0yj/DLVorO 8v1Zv8dvSqQuIjk39iHo2aa1SeC1K9bXQLfCGUigpK18EHoWmvEb4N6lBmd+RJjJ QBAZmGLLHIO+h4wYTBwccObFMiYbzOKYq9yWP7IgqnVSC6h0C96hmes9aUMyjAhP utMF58NPYPRX/nF26vVLK4z0sfmEo4v2MFjz/TmfvVRt6vhiImROR5AG4qrXWDu6 pL0mKES8t/+0FHRBvVcdnrwt2EfqYeS1PRDZUPv0UTDaMWTnBUqtbrchp/FeFE5T a+Z9p2iTjlN4Cmi8ofngZBdGBqw0Q5O6g0TKBpE5HTiZdt/FVkQgwMLHbQiEUPnG vSdpWfb7g1LDvPqWSikh =TnYi -END PGP SIGNATURE- -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] secure voice options for china?
And this is why even people who care about their privacy still use Skype. Brian On Thu, 12 Feb 2015, Andrew Lewis wrote: From anecdotal experience: Running your own OpenVPN endpoint on a cloud provider like digitalocean* seems to work really well as long as you wrap the OpenVPN connection in something else like obfsproxy or stunnel. Theoretically if a commercial provider implemented something besides pure openvpn then that'd work as well. And if you want to roll your own node there is a set of ansiable scripts/playbooks called streisand at https://github.com/jlund/streisand, which includes a version of OpenVPN that proxies through an Stunnel connection. *Some slight issues arose with running on Digitalocean, the user's account was locked completely at first and wanted extensive identification to unlock(passport), and the speed from China to node hosted anywhere but Singapore or LA was extremely slow. A VM hosted in singapore also seemed to be randomly slow, even to stuff that was hosted in Singapore. -Andrew On Thu, Feb 12, 2015 at 2:13 PM, Nathan of Guardian nat...@guardianproject.info wrote: On Thu, Feb 12, 2015, at 11:45 AM, Tim Libert wrote: asking for a friend, can anybody suggest best ways to have a secure voice conversation with persons located in mainland china from outside china? threat model is interception by chinese authorities, other states/actors are not of significant concern. email alone is insufficient for task. 1) Setup a VPN of some sort to defend against traffic filtering and blocking. Tor doesn't work with streaming audio (UDP) so it isn't an option this case, but there are still viable VPN solutions out there (ExpressVPN and others detailed here: http://www.greycoder.com/best-vpn-china/) 2) Use something like Ostel (https://ostel.co/) service to have an end-to-end encryption audio and/or video call using Jitsi or CSipSimple (Android) or Linphone (iOS/Android): https://guardianproject.info/howto/callsecurely/ You might also try using Signal (iOS), Redphone (Android), or SilentCircle apps for mobile, but I am not completely up to date on how well they work at the moment. +n -- Nathan of Guardian nat...@guardianproject.info -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] secure voice options for china?
On Thu, 12 Feb 2015, The Doctor wrote: On 02/12/2015 01:06 PM, Brian Behlendorf wrote: And this is why even people who care about their privacy still use Skype. Bad actors go to extraordinary, stupid lengths to restrict access and put surveillance measures in place. Hours rivalling that of Silicon Valley startups are spent fine tuning each and every last measure to make sure that almost nothing sneaks past. There is no magick wand that the other side of the game can wave to bypass them like a gentle breeze. Circumvention and counter-net.surveillance are hard, and if the other side doesn't bring its A game to match, it's just not going to happen. We may as well roll over and show our bellies. Exactly. Which is why no one should feel satisfied with the answer that was given. Brian -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
[liberationtech] At Stanford Tonight: Cybersec Symposium
INVENTING THE FUTURE: CYBERSECURITY RESEARCH AND EDUCATION SYMPOSIUM Inventing the future: Cybersecurity research and education symposium [image: Print view] https://engineering.stanford.edu/print/node/38400A SYMPOSIUM HOSTED BY STANFORD UNIVERSITY AND THE WHITE HOUSE OFFICE OF SCIENCE AND TECHNOLOGY POLICY We rely on the digital infrastructure to conduct our personal, social and economic lives and will rely on it even more in the future. What research is needed to develop innovative technologies for consumer protection? What is the best way to deploy these advances and place them into widespread use? How do we build the required workforce that can support future cybersecurity? Join *John P. Holdren*, Assistant to the President for Science and Technology, and a panel of thought leaders and decision-makers as they discuss the promise of research and development for technologies supporting consumer protection and consider how industry, technology companies, government and academia can collaborate to enhance and leverage cybersecurity research and education. This event is being held in conjunction with the Feb. 13 White House Summit on Cybersecurity and Consumer Protection. *Thursday, February 127:00 - 9:00 p.m.Check-in begins at 6:15 p.m.Networking reception follows discussion* NVIDIA auditorium, Huang Engineering Center, Stanford University http://campus-map.stanford.edu/index.cfm?id=lat=37.4278795635lng=-122.17429865zoom=17srch=huang Parking in Parking Structure 2 http://campus-map.stanford.edu/index.cfm?id=lat=37.42820940344632lng=-122.1768153989zoom=17srch=parking%20structure%202 REGISTER HERE http://app.certain.com/profile/form/index.cfm?PKformID=0x20009299e21 Watch the webcast at news.stanford.edu/webcast or at engineering.stanford.edu Send questions and follow the event on Twitter @stanfordeng https://twitter.com/stanfordeng *SPEAKERS* *Introduction and Moderator* *Patricia Falcone*, Associate Director for National Security and International Affairs at the White House Office of Science and Technology Policy. *Opening remarks* *John P. Holdren*, Assistant to the President for Science and Technology, Director of the White House Office of Science and Technology Policy, and Co-Chair of the President's Council of Advisors on Science and Technology (PCAST). *PANELISTS* *Larry Kramer*, President of The William and Flora Hewlett Foundation, which provided funding to launch the Stanford Cybersecurity Initiative. Kramer was formerly the Richard E. Lang Professor of Law and Dean of Stanford Law School. *John Mitchell*, Mary and Gordon Crary Family Professor, Stanford School of Engineering; Professor of Computer Science, and Vice Provost for Teaching and Learning, Stanford University. *Parisa Tabriz* is Google’s Security Princess -- that's her official (and self-appointed) job title! She leads the Chrome Security team of hired hackers and is a contractor with the U.S. Digital Service. *Cynthia Dwork* is a Distinguished Scientist at Microsoft, specializing in private data analysis, foundations of cryptography, combating spam, complexity theory, web search, voting theory, distributed computing, and interconnection networks. https://engineering.stanford.edu/event/inventing-future-cybersecurity-research-education-symposium -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
Re: [liberationtech] Webcast - NetGain - Wed Feb 11 - Stronger Digital Society - Ford, Knight, MacArthur, Mozilla, Open Society #netgain
There of course are multiple ways to participate in Poplus, not just this one Hangout. Reaching people via YouTube streaming via Google Hangouts-on-Air is a supplement to the online group which encourages engagement via good old email: http://bit.ly/poplusgroup Also, in March, our regular two-way teleconference allows you to use the telephone to participate. No flash required. Are there ways to watch YouTube without flash? I thought there were. Steve Steven Clift - Executive Director, E-Democracy * Support E-Democracy. Pledge drive to raise $10,000 US: http://e-democracy.org/donate?ft - Only $890 to 2015 Goal On Wed, Feb 11, 2015 at 1:08 PM, Nathan of Guardian nat...@guardianproject.info wrote: On Wed, Feb 11, 2015, at 01:51 PM, John Sullivan wrote: Steven Clift cl...@e-democracy.org writes: NetGain - Working together for a stronger digital society - Conference Webcast Starts at 9:30 am Eastern US time - on Wed, Feb 11, 2015 Agenda, webcast, etc.: http://bit.ly/netgainwebcast Would love to watch, but apparently participating in discussion of about a stronger digital society requires proprietary Flash. Is there another stream? Definitely seems like a great opportunity to use something like Rhinobird (http://rhinobird.tv/), a Knight-funded open-source pure HTML5/WebRTC live streaming service https://beta.rhinobird.tv/ https://github.com/rhinobird +n -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu. -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.
[liberationtech] secure voice options for china?
asking for a friend, can anybody suggest best ways to have a secure voice conversation with persons located in mainland china from outside china? threat model is interception by chinese authorities, other states/actors are not of significant concern. email alone is insufficient for task. thanks. tim -- Liberationtech is public archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.