Re: [liberationtech] OTRon: Chrome extension for end-to-end FB chat encryption

2014-01-29 Thread Jens Christian Hillerup
On Tue, Jan 28, 2014 at 10:43 PM, Omar Rizwan omar.riz...@gmail.com wrote:

 Haven't spread it widely yet or made it easy to install, I'm looking
 for feedback both on how well it works (it needs some more testing and
 does have some functionality bugs -- you may be blocked from FB chat
 for a few minutes if it goes wrong!), how easy it is to use, and on
 the general approach.


Disclaimer: I haven't read the source, tried the extension or otherwise
gotten to know about this tool other than reading OP.

The reason I'm writing anyway is that this is important to know generally.
Facebook records the text in text fields even before they're submitted [1].
Therefore, if this tool relies on Facebook's own text fields (or anything
within the DOM, really), they can completely circumvent this OTR
implementation. The right way to do this would be to spawn something out of
the reach of Facebook JS. That means, spawning a separate chat window in
the context of the extension, or use window.prompt in either context (the
contents of a window.prompt cannot be read before the OK button is pressed).

JC

[1]
http://www.slate.com/articles/technology/future_tense/2013/12/facebook_self_censorship_what_happens_to_the_posts_you_don_t_publish.html
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

[liberationtech] Fwd: A hacker's guide to Amsterdam

2013-07-19 Thread Jens Christian Hillerup
-- Forwarded message --
From: Jens Christian Hillerup j...@hillerup.net
Date: Jul 19, 2013 11:12 AM
Subject: A hacker's guide to Amsterdam
To: Hackerspaces General Discussion List disc...@lists.hackerspaces.org
Cc:

... So I'll be coming to Amsterdam on the 27th of July, following the
UbiCrypt summer school on reverse engineering in Germany (anyone going?
let's hook up!) I plan on showing up at the OHM site a few days in advance
to help with the build-up etc, but that still leaves me with two or three
days in A'dam.

I'm looking for suggestions for things to see that might be of interest for
hackers -- small or large, well-known or obscure. I've not been in
Amsterdam for ten years, so my knowledge of the city is close to nil.
Technical stuff, DIY stuff, urban exploration stuff, graffiti stuff and
hackerspaces is my deal. If anyone has suggestions (or even a place to
crash), I'm all ears!

Thanks,
JC
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] DecryptoCat

2013-07-04 Thread Jens Christian Hillerup
On Thu, Jul 4, 2013 at 11:36 AM, KheOps khe...@ceops.eu wrote:

 Just came accross this:
 http://tobtu.com/decryptocat.php


Eep!

It seems like the saying given enough eyeballs, all bugs are shallow has
become obsolete, huh? Peer review is an integral part to developing secure
cryptography implementations, but unfortunately this fundamentally crashes
with the hacker mantra of just do it. It's a shame that this project did
not get this kind of attention until after people started relying on
it---that could have saved a lot of people from a lot of shouting in any
case.

So what do we do about this? Opening the source code as an argument for
security no longer suffices. How can we raise money for rigid and
independent quality assurance of software that in this case is designed to
potentially saving lives? And how can we make sure that this money flows
into the fund and out to the QAers on a regular basis?

I don't know, sadly, but I'd love to discuss it.

JC
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] AdLeaks - a whistleblowing platform

2013-06-23 Thread Jens Christian Hillerup
We designed the AdLeaks system to work with partners who embed AdLeaks ads
or AdLeaks bugs into their web pages. Our ads contain code that encrypts an
empty message with the AdLeaks public key and sends the ciphertext back to
AdLeaks. This happens on all users' web browsers. A whistleblower's browser
substitutes the ciphertext with encrypted parts of a disclosure. The
protocol ensures that an adversary who can eavesdrop on the network
communication cannot distinguish between the transmissions of regular
browsers and those of whistleblowers' browsers. AdLeaks ads are
authenticated so that a whistleblower's browser can tell them apart from
other code. Consequently, whistleblowers never have to navigate to any
particular site to communicate with AdLeaks once our ads are sufficiently
widespread.

http://www.adleaks.org/how.html
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] AdLeaks - a whistleblowing platform

2013-06-23 Thread Jens Christian Hillerup
Quickly noting that I'm not affiliated with AdLeaks, just passing on the
information.

On Sun, Jun 23, 2013 at 1:56 PM, Andrea St and...@gmail.com wrote:

 it sounds different from globaleaks project. Am i right?


Yes. GlobaLeaks seeks to establish an open-source version of the submission
system of Wikileaks such that any and everyone can make their own leaks
site. The core development team of GlobaLeaks is also on this list, so I'll
let them describe it further.

This project, on the other hand, cleverly uses how every internet user is
exposed to ads on a daily basis. The people designing some web page with
ads (say a news site) can then choose to make it sort-of AdLeaks-boosted.
For a regular visitor to the news site, their browser will encrypt a block
of red herring data (no content of interest), but if a whistleblower
comes by they have the chance to encrypt not red herring but the content
that they want to leak. The thing is that an adversary that is able to
monitor the traffic to the news site will not be able to distinguish
between leaks and noise, since it won't have the decryption key. In short:
having *all* visitors to the site encrypt and submit *something* is the
novelty in this approach.

JC
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Secure and Cheap Provider in Sweden or Iceland?

2013-06-14 Thread Jens Christian Hillerup
On Thu, Jun 13, 2013 at 8:51 PM, Lorenzo Franceschi Bicchierai 
lorenzo...@gmail.com wrote:

 In lieu of the recent NSA leaks, I'm going to transfer my website to a new
 provider in either Sweden or Iceland (because well, you never know).
 Griffin Boyce suggested I use moln.is, do you guys have any other
 suggestion? Any other kind of advice?


I've heard good stuff about greenqloud.com. Not only are they in Iceland,
but they seem to have a pretty good environmental observance, if you value
that.

JC
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Stop promoting Skype

2013-06-07 Thread Jens Christian Hillerup
On Fri, Jun 7, 2013 at 9:23 AM, Nadim Kobeissi na...@nadim.cc wrote:

 STOP PROMOTING THE INTERNET


Stop promoting 'murica. And help me test and develop my project
escapetools that is meant for taking out your data from services like
GMail and saving them in a way that can be used in infrastructure
coorporatives like fripost.org.

http://github.com/jchillerup/escapetools

JC

PS: This email was (sadly) brought to you all by GMail.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Secure, inexpensive hosting of activist sites

2013-04-21 Thread Jens Christian Hillerup
On Thu, Apr 18, 2013 at 10:45 PM, Hisham almiraatb...@gmail.com wrote:

 Activists whose sites come under attack struggle to find cheap solutions
 to keep their websites safely guarded. Many of them are looking for
 secure, inexpensive hosting. I've come across many such cases, from
 Senegal, to Zambia to Egypt to Morocco. Some of them ask for temporary hosting
 to be able to stay online until they can stand on their feet again.

 I'd be grateful if someone could help with this one. Are there secure and
 inexpensive solutions out there?


There's also NearlyFreeSpeech.net if you're OK with US companies. They are
cheap. They do charge for traffic, though, but stack it with CloudFlare as
Nadim pointed out and you're good, even in case of DDoS.

JC
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] SUBSCRIPTION

2013-04-02 Thread Jens Christian Hillerup
On Tue, Apr 2, 2013 at 7:30 PM, Mark Gleicher mgle...@gmail.com wrote:

 HELP. I would like to know how I would unsubscribe.


Hi Mark,

Please follow the instructions in the end of this mail (and all other mails
on this list)

Best,
JC
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Fwd: You are awesome, Treat yourself to a love one

2013-03-31 Thread Jens Christian Hillerup
On Sun, Mar 31, 2013 at 11:21 AM, Andreas Bader
andreas.ba...@nachtpult.dewrote:

 How could that happen??
 This Email Adress is existing since a week or two and is only used for
 trusted contacts and Libtech/Drones List!


The liberationtech archives are publicly available.
https://mailman.stanford.edu/pipermail/liberationtech/

JC
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Efficient digital one-way communication

2013-03-04 Thread Jens Christian Hillerup
On Mon, Mar 4, 2013 at 4:40 PM, Michael Rogers mich...@briarproject.org wrote:
 Last year I spent some time playing with audio encoding of data for
 transmission over handheld radios. The state of the art here is dialup
 modems - on a good day they can get 56,000 bits per second over a
 channel designed for voice, but that requires advanced modulation and
 error correction techniques. The radio hams have packet radio (AX.25
 and APRS) running at 1,200-9,600 bps over long distances using simple
 modulation and no error correction. Some early home computers used
 audio cassettes for storage (300-1,200 bps, CUTS or Kansas City Standard).

Nice information, thanks. Would it be wrong to assume larger data
rates to be attainable on an FM link than over the telephone line?
For music etc. FM has far superior sound quality in any case.

 If you want to support purely one-way communication (no acks), you'll
 need to forward error correct the data. Hamming codes and parity
 checks are simple to implement but they'll eat a lot of your
 bandwidth; Reed-Solomon codes are more bandwidth-efficient but also
 more complex.

Yes, I thought of that too in September. Luckily I've taken courses in
abstract algebra and error-correcting codes at my university; I think
I'd be able to write a working RS implementation from my theory books.

Another thing I didn't tell in my first mail is that I've been wanting
to design a protocol for metadata, too, since it doesn't really make
sense to decode and save half files anyway. It would also make it
possible to send the file names and file sizes beforehand so the
receiver can know how much of the file s/he has already received.

And yes, I want this to be truly one-way -- no acks. The idea is that
I want the receiving end to need as little hardware as possible: one
FM radio and one computer with a sound card (and this software). The
sender obviously has access to an FM transmitter (or whatever becomes
the sound carrier). This modulation algorithm should not provide
authenticity of the sender, instead cryptographic signing of the data
should happen at higher levels of the stack.

 Some Java code for modulation, framing and error correction is here if
 you're interested:

 http://briar.git.sf.net/git/gitweb.cgi?p=briar/sandpit;a=tree;f=src/net/sf/briar/sandpit/modem
 http://briar.git.sf.net/git/gitweb.cgi?p=briar/sandpit;a=tree;f=src/net/sf/briar/sandpit/fec

Thanks a lot! I'll have a look at it soon.

JC
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Efficient digital one-way communication

2013-03-04 Thread Jens Christian Hillerup
Whoops, we're drifting off-list. I've included the relevant parts (and
committed a stereo fix to the main repo that fixes the bug from my
second mail).

On Mon, Mar 4, 2013 at 6:46 PM, Kurtiss Hare kurt...@gmail.com wrote:
 Also, couldn't having a large frequency span be challenging to carry
 over FM? I should probably grok
 http://en.wikipedia.org/wiki/Frequency_modulation before discussing
 that detail further.

 My naive model of the idea here is to consider the number of audibly
 distinct (and computationally discernible) instruments capable of delivery
 through FM. For a given note, each one has a distinct overtone series which
 lends it a unique timbre. Depending on the sophistication of your decoder, I
 would think the number of euphonic sounding configurations to be quite high.

Well, instruments get their timbre from the *weighting* of the
overtones, not their existence or non-existence. I'm concerned that if
we go into the game of actually weighting these overtones (rather than
just choosing whether they should be there or not), decoding becomes
too difficult. We're already spanning three octaves as it is, so
they'd definitely need to have less amplitude than the fundamentals.
I'll do some experiments when I get the time...

JC
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Efficient digital one-way communication

2013-03-04 Thread Jens Christian Hillerup
On Mon, Mar 4, 2013 at 7:26 PM, Don Marti dma...@zgp.org wrote:
 begin Jens Christian Hillerup quotation of Mon, Mar 04, 2013 at 06:53:05PM 
 +0100:

 Whoops, we're drifting off-list. I've included the relevant parts (and
 committed a stereo fix to the main repo that fixes the bug from my
 second mail).

 DTMF uses two pitches at a time -
   http://en.wikipedia.org/wiki/Dual-tone_multi-frequency_signaling

 Chords might be a way to get more information in.

Yes, and then I can scrap the stereo encoding again. I'd rather have
it optional than required. And I agree, it would make more sense to
pick eight notes and use them as a bitmap. We'd face the same problems
as we did before with the harmonies, but that problem does not get any
bigger or smaller so I don't see the point in not implementing it.

Idea: parity information in the overtones? Not applicable if we go
with Reed-Solomon codes, though.

JC
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Efficient digital one-way communication

2013-03-03 Thread Jens Christian Hillerup
Hi,

One thing I've been thinking a lot about recently is how to make
digital one-way communication feasible for activists, sort of sending
digital information to the broad public. I believe that FM is a good
medium for this because the transmitters are cheap and everybody has a
radio. Hook up the radio to your sound card, and demodulate the audio
back into data, and there you go.

I did a quick hack back in September, called modulera [1]. The idea is
to exploit how pentatonic polyphony always sounds good, regardless of
the notes picked (as long as they're within the scale). The way it
works is that it takes three octaves of some pentatonic scale (in this
case F# major), and silence. This gives 16 different notes. Split up a
byte into two nibbles and you get your two tones. I realize this
approach has a way too low bitrate, but I like the aesthetic in having
the modulated data also be easy on the ears. For any real use, this
would likely need to be scrapped to increase bitrate. Feel free to try
the script, though! I've included the output of the script modulating
itself.

I basically just wanted to throw it out here. Does anybody have
experience in modulating data? Has this kind of digital one-way
communication been done in an activist setting before? Does it make
sense to kick off a project aimed at creating a easily usable system
capable of modulating and demodulating data at modest bitrates
(15KB/s)?

JC

[1] https://github.com/jchillerup/modulera
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Efficient digital one-way communication

2013-03-03 Thread Jens Christian Hillerup
On Sun, Mar 3, 2013 at 3:25 PM, Jens Christian Hillerup
j...@hillerup.net wrote:
 I did a quick hack back in September, called modulera [1]. The idea is
 to exploit how pentatonic polyphony always sounds good, regardless of
 the notes picked (as long as they're within the scale). The way it
 works is that it takes three octaves of some pentatonic scale (in this
 case F# major), and silence. This gives 16 different notes. Split up a
 byte into two nibbles and you get your two tones.

Oh, and before anyone notices, there is currently no way of telling
the ordering the nibbles at demodulation time. Also 0xAA = 0xA0 =
0x0A. As I said, this is (for now) just a toy; there are certainly
things that need to be addressed.

JC
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] // The 'Kill Packet' - feedback wanted //

2013-02-25 Thread Jens Christian Hillerup
On Mon, Feb 25, 2013 at 7:37 PM, Julian Oliver jul...@julianoliver.com wrote:
 Consider the case one has volatile data on a remote machine that needs to be
 removed as fast and as discretely as possible. The last thing you want to be
 doing is whipping out the laptop and logging in via SSH, an SFTP browser etc 
 and
 manually deleting that data. Rather, it would be more convenient to just hit a
 single button on your phone or click a single icon that sends a network packet
 to the server, triggering a script that proceeds to delete your data and/or 
 back
 it up to another trusted server.


I think this project is roughly what you're looking for:

https://github.com/qnrq/panic_bcast

JC
--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] // The 'Kill Packet' - feedback wanted //

2013-02-25 Thread Jens Christian Hillerup
On Mon, Feb 25, 2013 at 8:11 PM, Julian Oliver jul...@julianoliver.com wrote:
 Very nice! I would see this as a companion project as it doesn't quite do the
 same thing - it's whole disk focused rather than on deletion of directories
 themselves (which could be followed with a reboot cycle and killing the 
 journal
 on EXT3/4).

I agree it's not exactly what you requested, but it is rather easily patchable:

https://github.com/qnrq/panic_bcast/blob/master/panic_bcast.py#L79-L84

At least you have the communications thing written for you.

JC
--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptography super-group creates unbreakable encryption

2013-02-07 Thread Jens Christian Hillerup
On Thu, Feb 7, 2013 at 11:41 AM, Andreas Bader noergelpi...@hotmail.de wrote:
 Notionally there is no unbreakable encryption.
 Practically there is a unbreakable encryption (AES, SHA-3); our
 standarts are more than adequate.
 The risk with encryptions is more the possibility of a hardware hack.
 Or a bad guy beating the shit out of you with a 5 Dollar Wrench until
 you tell him the password.
 In real life no one will use a super computer to break our hardcore
 encrypted harddrives.

I think Nadim was being sarcastic. I'm also eager to see what comes
from this. I too think it's rather odd that these supposedly
respectable cryptographers are so blatantly ignoring Kirchoff's
principle.

Quickly skimmed the article; it seems that you have to trust them to
*actually* encrypt your stuff on your phone before storing it on their
servers. As with so many others, it'd behoove them to put their code
where their mouths are; I don't mind them making money off of this,
but at least they should stop leveraging their big names in the
industry to get a lot of media attention around them selling
snake-oil.

JC
--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptography super-group creates unbreakable encryption

2013-02-07 Thread Jens Christian Hillerup
On Thu, Feb 7, 2013 at 5:34 PM, scarp sc...@tormail.org wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512

 Jens Christian Hillerup:
 Hear-hear. They don't need to open-source their software to
 convince me, as long as they are open about their protocol at
 least.

 And what if there's a second set of decryption master keys? You're
 willing to trust them because they say We're famous guys, we won't do
 anything bad, and plus we hate naughty governments.

No, I think we agree. I meant by protocol that it'd be possible for me
to create a client for the service from scratch (maybe even the server
part, too, but not strictly needed), i.e. I get to choose the
encryption key(s), etc. Sorry for the misunderstanding.

JC
--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech