Re: [liberationtech] Wicker: D??j?? vu all over again

2014-06-21 Thread Sandy Harris
On Thu, Jun 12, 2014 at 8:19 AM, Rich Kulawiec  wrote:

> On Tue, Jun 10, 2014 at 10:08:26AM -0700, Yosem Companys wrote:

>> The mention of NDAs by the Wickr founder makes it a non-starter. Their web
>> site doesn't have any download link for the source files, nor mention of
>> open source, but they do mention patent pending technology. How do they
>> expect anyone to trust closed source, proprietary technology to be secure?
>
> Nobody should trust closed source, ever.  No matter the reputation of those
> behind it, no matter how sincere they appear to be: if it's not open source,
> it's fraud.
>
> Once again, I'll refer folks to:
>
> 
> https://mailman.stanford.edu/pipermail/liberationtech/2013-February/006964.html
>
> and the rather longer and more explanatory:
>
> 
> https://mailman.stanford.edu/pipermail/liberationtech/2013-March/007499.html
>
> Wickr (and anything like it) can be, should be, and must be immediately
> and permanently dismissed with prejudice.

Those links are very good, especially the 2nd. One reference for the
general principle involved is:
http://en.citizendium.org/wiki/Kerckhoffs%27_Principle
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Tech equivalent of Physicians for Social Responsibility?

2013-10-15 Thread Sandy Harris
ACM (assoc for Computing Machinery) are one of the oldest and I think
still the largest professional society in the field. They have many
SIGs (special interest groups). Try this one:
http://www.sigcas.org/

Also try IEEE http://www.ieee.org/index.html

I went to one Computers, Freedom & Privacy (CFP) conference and it was
great. Both geeks with some social awareness and lawyers or political
types with some technical understanding seem to be rather rare types,
and this is distinctly unfortunate. That conference had quite a few of
both.
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] FW: What the IETF is thinking about Prism these days..

2013-09-27 Thread Sandy Harris
On Fri, Sep 27, 2013 at 11:55 AM, michael gurstein  wrote:

>  Title   : Prismatic Reflections
>Author(s)   : Brian Carpenter
>
>Filename:
> draft-carpenter-prismatic-reflections-00.txt

There is at least one other similar draft:
http://www.ietf.org/id/draft-hallambaker-prismproof-req-00.txt
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] Random number generation being influenced - rumors

2013-09-07 Thread Sandy Harris
Andy Isaacson  wrote:

> So, I put a lot of credence in distrusting HWRNG black box
> implementations.  But unfortunately we need a lot more reliable entropy.
> A fully open source, nothing up my sleeve hardware entropy source would
> be a huge improvement.

At least one has been available for a decade or more:
http://www.av8n.com/turbid/paper/turbid.htm

The paper here discusses several that at least get close:
ftp://ftp.cs.sjtu.edu.cn:990/sandy/maxwell/
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] scrambler

2013-08-30 Thread Sandy Harris
Michael Hicks  wrote:

> Thank you so much we appreciate your opinion and facts. would you have any
> recommendations?

Start by reading up on one-time pads.

Probably the best source is Marcus Ranum's FAQ:
http://www.ranum.com/security/computer_security/papers/otp-faq/

Another, partly my writing:
http://en.citizendium.org/wiki/One-time_pad

>> The author doesn't understand how to construct one-time pads, and flouts
>> the most important rule of using them. Avoid this software like the
>> plague.

Right.

Also, even if you get the OTP part of it right, there are still problems.

One is that the system gives no protection against traffic analysis,
collection & use of what has being called metadata in recent news
stories.

Another is that, while an OTP system is provably perfectly secure
against simple eavesdropping, it is inherently vulnerable to a
rewrite attack:
http://en.citizendium.org/wiki/Stream_cipher#Rewrite_attacks

Finally, there are a whole lot of questions about things like how
you generate the random numbers, how a customer can be
sure his java app is not tampered with, etc. Quickly perusing
your web site, I do not see answers for those.
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] SMS questions

2013-08-28 Thread Sandy Harris
Richard Brooks  wrote:

> If anyone with an understanding
> of SMS, SMS web interfaces, and/or related security issues
> would be willing to point me in the right direction
> (or discuss potential issues) I (and by extension
> they) would be grateful.

SMS is basically insecure. Others in the thread have given
good advice, which you should heed, but here's my take
on it in case a slightly different perspective is also useful.

The basic problem is that all SMS messages go through
servers which may be monitored. In many countries the
service providers are under direct government control.
Anywhere else, it may be possible for government to
acquire access with some combination of appeals to
patriotism, legal (or in some places extra-legal) threats,
and promises of rewards such as government
contracts,

There are plenty of examples of actual monitoring.
During the SARS scare, people in Beijing were
arrested for "spreading rumors" via SMS. In the US,
the NSA has monitoring equipment in AT&T offices:
https://www.eff.org/nsa/hepting

It gets worse. The US has a Communications
Assistance to Law Enforcement Act (CALEA)
that basically makes it illegal for anyone to sell
phone switches without wiretap capability in the
US. As a result nearly all such switches have
the capability built in. That includes the switches
that various nasty regimes buy.

Then there are a whole range of other attacks
possible against phone systems. Trojan horse
programs can take over a smartphone to record
things like passwords or even use the phone's
mike to bug whatever room the phone is in.
Bogus cell phone towers (in the back of a
KGB, NSA or whoever van) can locate a phone
with great accuracy. Those are just two that
have been reported as commercially available;
there are likely more I don't know about.
-- 
Liberationtech is a public list whose archives are searchable on Google. 
Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] safe-mail.net

2013-07-20 Thread Sandy Harris
On Wed, Jul 17, 2013 at 1:03 AM, A.Chukin  wrote:

> Some of my current partners use safe-mail.net for secure messaging.
> Does any of you have any information about maintainers and what is you
> opinion about security of this mail service ??

Based on 5 minutes looking at the web site, I see no reason to trust it.

"  Using SSL (Secure Socket Layer), which is a component of all
current browsers, for all data transmissions and strong proprietary
encryption for server security, it offers the highest possible
protection for all email communications and file attachments.

The SSL encryption itself is generally thought to be secure, but it
relies on X.509 certificates to identify the players so anyone who can
subvert the certificate infrastructure can easily conduct a man-in-the
-middle attack. If I can give you a bogus cert that says my machine is
safe-mail.net, you will send me your not-yet-encrypted data, I save a
copy and send it on to safenet.

This is a real threat, at least against some enemies. Common browsers
currently trust several hundred Certificate Authorities (CAs). Some
have been subverted; a Dutch one was hacked & credentials stolen there
used by the Iranian government to attack dissidents. Others having
admitted selling bogus certs that let corporate IT monitor employees.
Several are controlled by governments I'm not inclined to trust:
China, Syria, 

Then there is:
" and strong proprietary encryption for server security,

That sets off alarm bells; basically "strong proprietary encryption"
is an oxymoron. There's a link earlier in the thread to a Wikipedia
explanation. Here's a different link to much the same thing:
http://en.citizendium.org/wiki/Kerckhoffs%27_Principle

This claim is worrying in two ways. First, it indicates that their
system has not been published and independently analyzed, so it should
not be trusted. Second, it shows that they are either ignorant of or
ignoring a basic principle that has been well--known in the field for
100-odd years, so they should not be relied on to have designed their
system well.

Even if their proprietary encryption is secure, the encryption is done
on their machines and they hold the keys. How safe is that? Not very
if you are trying to protect against government agents who might show
up with a warrant, or appeals to patriotism, just threats. Or if you
are involved in high-stakes litigation where the opponent might use
private detectives and large bribes. If they find a safe-mail system
administrator who will co-operate, they read all your correspondence.

The correct solution is end-to-end encryption such as PGP; encrypt on
the sender's machine and decrypt on the receiver's. Even that is
easily breakable if one of the machines involved has been subverted
(downloaded a trojan horse or someone broke in and installed a key
loggger or ...) and it does not stop someone like the NSA from seeing
who you are talking to, but except for that it appears secure.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Metadata Cleanup trough File Format Convertion?

2013-07-20 Thread Sandy Harris
Fabio Pietrosanti (naif)  wrote:

> i've been thinking about the topic of metadata cleanup of files from an
> implementation point of view.
>
> Regardless the consideration whether it's something useful or not for a
> Whistleblowing platform (GlobaLeaks),

In general, it is. To be responsible, any such platform must at
least look at anything they are going to release and consider
whether some of it needs to be redacted. Metadata needs
to be considered in that process.

There are cases, though, where metadata indicating the
source of a document is critical to evaluating it. Consider
a document that purports to give US policy on targeting
for drone strikes. Does it come from a field commander?
Or Washington? Pentagon? CIA? President's office?
Or is it, say, analysis by the Pakistani government? Or
just speculation by some journalist?
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] WeChat

2013-07-20 Thread Sandy Harris
Sarah Lai Stirland  wrote:

> Hi everyone -- I'm curious as to whether anyone on here has used WeChat,
> what they think of it, ...

I would not use any Chinese software if security is a concern. See for
example:
http://www.businessweek.com/articles/2013-03-08/skypes-been-hijacked-in-china-and-microsoft-is-o-dot-k-dot-with-it

There are some products from credible people available.

Free, open source software for secure online chat, but (last I looked)
not voice or video:
http://www.cypherpunks.ca/otr/

A commercial service offering the lot -- email, voice. ... -- and running
on smart phones:
https://silentcircle.com/
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Fwd: A hacker's guide to Amsterdam

2013-07-20 Thread Sandy Harris
Jens Christian Hillerup  wrote:

> ... So I'll be coming to Amsterdam ...
>
> I'm looking for suggestions for things to see that might be of interest for
> hackers -- small or large, well-known or obscure.

Have a look at these sites:
http://hippies.waag.org/
http://www.hippiesfromhell.org/
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] One time pad Management system?

2013-07-19 Thread Sandy Harris
Paul Elliott  wrote:

> Given a secure communications channel for key exchange,
> OTPs are absolutely unbreakable.

Against some attacks, yes. However, unless authentication
is used as well, they have absolutely no resistance to a
rewrite attack:

http://en.citizendium.org/wiki/Stream_cipher#Rewrite_attacks

--
Who put a stop payment on my reality check?
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Random number generator failure in Rasperri Pis?

2013-07-19 Thread Sandy Harris
KheOps  wrote:

> Just came accross this article, apparently showing the bad quality of
> the hardware RNG in Raspberri Pi devices.
>
> http://scruss.com/blog/2013/06/07/well-that-was-unexpected-the-raspberry-pis-hardware-random-number-generator/

I agree with other posters; you are misreading an article that
says the hardware generator on the Pi seems OK.

I have implemented something that can provide an alternative
or a supplement if necessary, Documentation describes some
other choices as well:

ftp://ftp.cs.sjtu.edu.cn:990/sandy/maxwell/
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech