Re: [liberationtech] Quick Guide to Alternatives

2013-06-22 Thread Rich Kulawiec
On Tue, Jun 18, 2013 at 11:30:00AM +0200, Julian Oliver wrote:
> It'd be also good to add GNU/Linux however. [...[

And the BSD family, notably OpenBSD -- whose development is led in
large part by one of my favorite curmudgeons.  (As I've said elsewhere,
some of the people working on OpenBSD are nit-picking, anal-retentive,
pedantic, intolerant, fanatical, insistent, demanding and relentless:
in other words, the perfect people to be crafting an operating system.)

> Use of open source applications alone is an insufficient measure against
> snooping today, IMO. 

True.  Open source OS/applications are necessary -- but not sufficient.

---rsk
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Quick Guide to Alternatives

2013-06-18 Thread Karl Fogel
Moritz Bartl  writes:
>On 17.06.2013 21:06, micah wrote:
>> Do you have any suggestions for what Riseup can do to resolve that
>> concern for you? I don't disagree with you, I'm just curious about
>> solutions here.
>
>I am happy to repeat myself, since the issues I have with Riseup have
>not been addressed so far.
>
>Tactical Tech should not be recommending Riseup, and Riseup only,
>without stressing that you *always* have to trust the operators and the
>systems behind them, and at least mention some alternatives to Riseup. A
>longer article should also discuss that Gmail is probably better
>security-wise than some random open source installation. In the end it
>depends on your threat model, right?
>
>Anyway:
>
>#1 There was a point in time when Riseup purposely decided to stop
>pushing decentralization. A lot of work was and is put into features
>that are *not* documented properly and not easily available to replicate.
>
>#2 As an example, the website states "minimal logging". What the hell is
>"minimum logging" other than marketing speech? Why don't you tell you're
>users what you are logging, up to the last byte? Especially when you
>provide a sensitive service like email, extra care should be put in the
>documentation and specification of logging policies. And by that I mean
>down to the config files of the syslog daemon.

Riseup makes a more specific promise than just "minimal logging".  They
say: "We do not log your IP address" and some other things, at
https://help.riseup.net/en/about-us .  It's not the "up to the last
byte" you're asking for above, but it's more specific than just "minimal
logging".

>#3 How hard is it to be transparent about money and sponsors? There's
>some big money behind Riseup now, and you guys should be very open about
>the sources.

Surprisingly hard.

It's actually a fair bit of work to maintain up-to-date donor pages,
especially when you have some donors who want to remain anonymous and
other donors who want to be listed under a name slightly different from
the one they donated under, etc... I'm not saying this is the reason
Risup isn't showing that information.  But the answer to your direct
question is: "surprisingly hard".  (Speaking from abundant personal
experience, running one US non-profit organization and being on the
board of another.)

There's an opportunity cost to maintaining that information publicly.
Whoever takes on the task gives up something else they could be doing --
something that might be more interesting and feel more productive to
them.

"Volunteers are surely standing by", and all that :-).
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Quick Guide to Alternatives

2013-06-18 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 17/06/13 18:13, Anne Roth wrote:
> We have compiled this 'Quick Guide to Alternatives', based on
> Security in-a-box and more.
> 
> https://alternatives.tacticaltech.org

Hi Anne,

Thanks for making this resource available.

The descriptions of RedPhone and Ostel seem a bit inconsistent - or
maybe I don't understand the distinction that's being made.

"RedPhone ... encrypts voice communication data sent between two
devices that run this application. However it also becomes easier to
analyze the traffic it produces and trace it back to you, through your
mobile number. RedPhone uses a central server, which is a point of
centralization and thus puts RedPhone in a powerful position (of
having control over some of this data)."

"When using CSipSimple, you never directly communicate with your
communication partner, instead all your data is routed through the
Ostel server. This makes it much harder to trace your data and find
out who you are talking to. Additionally, Ostel doesn't retain any of
this data, except the account data that you need to log in."

It sounds like you're saying the use of a central server is a
disadvantage for RedPhone but an advantage for Ostel - which may be
true, but I don't understand why.

Cheers,
Michael

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJRwFjzAAoJEBEET9GfxSfMWc0IAJmTnY1IXKNkCKnj7P68ei0D
D9n4dlo6ZJ/yEIxYKoaji+bnFDuPVE5flkf1B58LqyIKxUOBds0XzLVmjDKGwrWZ
vv9Jna6Ic07isFvJPyoq4zpjfKRspIfCRHmZVyOkCbnuh3takMz74q3BibtI6Izu
STTVg3Fkw2fhfhQ0DSUEvU07s8rzBNwK4CNoikyxG9xF9ZwtlVLzOq5G0R9xoed8
0GxiJAzjCwLJm6saCkqHBilw4b0ky9JBNS/6hsZoXrY8v/Ps8CrNACcjkEHbH45O
mDd5vgNMDkI3pcKnoz7QUztRoi8KxE4YiGRzT6XKE7Mwb84ZW8OcumkuXQcJkaQ=
=FELY
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Quick Guide to Alternatives

2013-06-18 Thread Julian Oliver
..on Mon, Jun 17, 2013 at 07:13:08PM +0200, Anne Roth wrote:
> Hi,
> 
> Tactical Tech has been getting a lot of questions lately on what to do
> to avoid being spied on - like probably most everyone on this list.
> 
> We have compiled this 'Quick Guide to Alternatives', based on Security
> in-a-box and more.
> 
> https://alternatives.tacticaltech.org
> 
> 
> In addition we try to keep 'Me and My Shadow' up to date with
> information about how we leave digital shadows and what can be done to
> reduce them: https://myshadow.org/ - also a topic that seems to matter
> more these days, also to people who so far tended to be members of the
> 'nothing to hide' and 'but it's so convenient' clubs.

Great list.

It'd be also good to add GNU/Linux however. It's an open source (inspectable) OS
made with the public interest in mind, rather than the strategic ambitions of a
sole proprietor. 

Use of open source applications alone is an insufficient measure against
snooping today, IMO. The operating system is a tangible and known point of
vulnerability, from keyloggers to auto-updaters and the unnegotiable pushing of
metadata over proprietary channels, such as iTunes.

Both Apple and Microsoft have been shown to collaborate with the NSA. Microsoft
has been found to alert government clients as to security flaws in their
operating systems long before publicly releasing a fix. There's no reason Apple
doesn't do the same, as if its track record for timely patching wasn't poor
enough. 

An important sub-theme of this whole debacle is that it's simply unrealistic to
trust that a corporation will defend basic human rights, especially when coerced
by a government or their own craving for profit.

Cheers,

-- 
Julian Oliver
http://julianoliver.com
http://criticalengineering.org
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Quick Guide to Alternatives

2013-06-17 Thread Moritz Bartl
On 17.06.2013 21:06, micah wrote:
> Do you have any suggestions for what Riseup can do to resolve that
> concern for you? I don't disagree with you, I'm just curious about
> solutions here.

I am happy to repeat myself, since the issues I have with Riseup have
not been addressed so far.

Tactical Tech should not be recommending Riseup, and Riseup only,
without stressing that you *always* have to trust the operators and the
systems behind them, and at least mention some alternatives to Riseup. A
longer article should also discuss that Gmail is probably better
security-wise than some random open source installation. In the end it
depends on your threat model, right?

Anyway:

#1 There was a point in time when Riseup purposely decided to stop
pushing decentralization. A lot of work was and is put into features
that are *not* documented properly and not easily available to replicate.

#2 As an example, the website states "minimal logging". What the hell is
"minimum logging" other than marketing speech? Why don't you tell you're
users what you are logging, up to the last byte? Especially when you
provide a sensitive service like email, extra care should be put in the
documentation and specification of logging policies. And by that I mean
down to the config files of the syslog daemon.

#3 How hard is it to be transparent about money and sponsors? There's
some big money behind Riseup now, and you guys should be very open about
the sources.

-- 
Moritz Bartl
https://www.torservers.net/
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Quick Guide to Alternatives

2013-06-17 Thread Jonathan Wilkes





 >From: Jonathan Wilkes 
>To: micah ; liberationtech 
> 
>Sent: Monday, June 17, 2013 5:16 PM
>Subject: Re: [liberationtech] Quick Guide to Alternatives
 
Here's the much more articulate version of what I wrote:
http://www.schneier.com/blog/archives/2013/06/more_on_feudal.html
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Quick Guide to Alternatives

2013-06-17 Thread Jonathan Wilkes





 >From: micah 
>To: Jonathan Wilkes ; liberationtech 
>; liberationtech 
> 
>Sent: Monday, June 17, 2013 3:06 PM
>Subject: Re: [liberationtech] Quick Guide to Alternatives
 

>Jonathan Wilkes  writes:

>> Finally, the user of riseup must trust the description of their service on 
>> the website to be true because it is a form of
>> privacy by policy.  If joining it is to be anything other than practicing 
>> the bad habit of trusting implicitly something you
>> read on a list on the internet, you need to know and trust someone from the 
>> internet security/privacy world who can vouch
>> for the security of the system based on their own human trust relationship 
>> with someone who runs riseup (or is closely
>> connected to it).  If you're a human rights worker and you have such a 
>> relationship with a security/privacy expert, you'd
>> do better to pay them for some tutoring sessions on seting up and using one 
>> or more of the following: ssh, Tor, Tor + ssh,
>> torchat, and possibly otr + pidgin and help them develop a working 
>> experience about what the threats are to their privacy in
>> those instances.

>I happen to know and trust someone who can vouch for the security of the
system due to my human trust relationship with someone who runs riseup.

>Do you have any suggestions for what Riseup can do to resolve that
concern for you? I don't disagree with you, I'm just curious about
solutions here.

Doing your computations on someone else's computer and expecting
privacy is a bad mix, regardless of whether that computer is running
well-configured free software or not.  That goes for Google and
Riseup, though I do think using the server of someone you personally
trust is making the best of bad options.

Going further than making the best of bad options, here's a suggestion:
what about leveraging this trust they built among individuals and groups
to start a program of helping set up something like this for people:

http://yunohost.org/

It's surely less secure/robust than Riseup's servers in its current state,
but all the work and patches they make regarding logging/etc. which you
mention below would then go to strengthen a system that gives privacy
by design.  Plus Riseup doesn't have to host any data, encrypted or
otherwise for that particular person-- just a nice friendly interface for
pointing their email address at the location of the box.

Then when someone comes along and codes up a Tor plugin, or NAT
traversal stuff, or even some exciting new end-to-end encrypted messaging
system, instead of doing the old privacy-vs-convenience dance, you'd have
users contacting whatever privacy Jedi they know and trust, asking them if
they think it's ok to click the button to install that plugin.  (Or doing 
whatever
audit from whoever they want to pay to look directly at the system they're
running and using, and tell them whether its configured correctly.)

-Jonathan

> I think Riseup has done a few things to try to close that gap. One has
been a long term building up of trust among individuals and groups,
which spreads out through recommendations by those people to
others. Riseup people being involved in various forms of activism (from
counter globalization movement organizing, to indymedia, to occupy and
other much less well known, or hyper local activist efforts) has been
one way that has happened. In various ways Riseup has been involved in
defending, or fighting for the freedoms that Riseup tries to protect,
sometimes that has come in the form of legal battles that Riseup has
either joined or been subjected to, coalitions that Riseup has joined,
or campaigns that Riseup has participated in. In other cases it comes
technically through publishing documentation, guides, howtos and writing
patches and software that embody the various political principles that
Riseup tries to adhere to (such as privacy and log anonymization
patches, or social networking software, etc.). Another way is active
involvement in free software, Debian in particular. Contributing to that
ecosystem because the political ideals are harmonious makes a lot of
sense for an organization that is actually trying to fulfill its stated
'policies'.



micah--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Quick Guide to Alternatives

2013-06-17 Thread Andrés Leopoldo Pacheco Sanfuentes
Micah,

What does Riseup do? I joined a list for the "budding"  Texas Pirate
Party, and it was hosted on it.

I think the best promotion is "to preach by example" or, in a way I
like more for the humor of it all, "to eat your own dog food," and
from your statement, it looks like you guys do just that! Great!

However, when it comes to "security" and "privacy," I worry about the
false sense of protection activists could get from resorting to
"alternative, secure solutions,"  since I do believe that the best
premise any serious activist should have is that there's no "Privacy"
and/or "Security"  on the Internet: not in the era of "uncountable
computrons" that render any protection moot for those that want to
find out, who are always "the bad guys."
Best Regards | Cordiales Saludos | Grato,

Andrés L. Pacheco Sanfuentes

+1 (817) 271-9619


On Mon, Jun 17, 2013 at 2:06 PM, micah  wrote:
> Jonathan Wilkes  writes:
>
>> Finally, the user of riseup must trust the description of their service on 
>> the website to be true because it is a form of
>> privacy by policy.  If joining it is to be anything other than practicing 
>> the bad habit of trusting implicitly something you
>> read on a list on the internet, you need to know and trust someone from the 
>> internet security/privacy world who can vouch
>> for the security of the system based on their own human trust relationship 
>> with someone who runs riseup (or is closely
>> connected to it).  If you're a human rights worker and you have such a 
>> relationship with a security/privacy expert, you'd
>> do better to pay them for some tutoring sessions on seting up and using one 
>> or more of the following: ssh, Tor, Tor + ssh,
>> torchat, and possibly otr + pidgin and help them develop a working 
>> experience about what the threats are to their privacy in
>> those instances.
>
> I happen to know and trust someone who can vouch for the security of the
> system due to my human trust relationship with someone who runs riseup.
>
> Do you have any suggestions for what Riseup can do to resolve that
> concern for you? I don't disagree with you, I'm just curious about
> solutions here.
>
> I think Riseup has done a few things to try to close that gap. One has
> been a long term building up of trust among individuals and groups,
> which spreads out through recommendations by those people to
> others. Riseup people being involved in various forms of activism (from
> counter globalization movement organizing, to indymedia, to occupy and
> other much less well known, or hyper local activist efforts) has been
> one way that has happened. In various ways Riseup has been involved in
> defending, or fighting for the freedoms that Riseup tries to protect,
> sometimes that has come in the form of legal battles that Riseup has
> either joined or been subjected to, coalitions that Riseup has joined,
> or campaigns that Riseup has participated in. In other cases it comes
> technically through publishing documentation, guides, howtos and writing
> patches and software that embody the various political principles that
> Riseup tries to adhere to (such as privacy and log anonymization
> patches, or social networking software, etc.). Another way is active
> involvement in free software, Debian in particular. Contributing to that
> ecosystem because the political ideals are harmonious makes a lot of
> sense for an organization that is actually trying to fulfill its stated
> 'policies'.
>
> micah
>
> --
> Too many emails? Unsubscribe, change to digest, or change password by 
> emailing moderator at compa...@stanford.edu or changing your settings at 
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Quick Guide to Alternatives

2013-06-17 Thread micah
Jonathan Wilkes  writes:

> Finally, the user of riseup must trust the description of their service on 
> the website to be true because it is a form of
> privacy by policy.  If joining it is to be anything other than practicing the 
> bad habit of trusting implicitly something you
> read on a list on the internet, you need to know and trust someone from the 
> internet security/privacy world who can vouch
> for the security of the system based on their own human trust relationship 
> with someone who runs riseup (or is closely
> connected to it).  If you're a human rights worker and you have such a 
> relationship with a security/privacy expert, you'd
> do better to pay them for some tutoring sessions on seting up and using one 
> or more of the following: ssh, Tor, Tor + ssh,
> torchat, and possibly otr + pidgin and help them develop a working experience 
> about what the threats are to their privacy in
> those instances.

I happen to know and trust someone who can vouch for the security of the
system due to my human trust relationship with someone who runs riseup.

Do you have any suggestions for what Riseup can do to resolve that
concern for you? I don't disagree with you, I'm just curious about
solutions here.

I think Riseup has done a few things to try to close that gap. One has
been a long term building up of trust among individuals and groups,
which spreads out through recommendations by those people to
others. Riseup people being involved in various forms of activism (from
counter globalization movement organizing, to indymedia, to occupy and
other much less well known, or hyper local activist efforts) has been
one way that has happened. In various ways Riseup has been involved in
defending, or fighting for the freedoms that Riseup tries to protect,
sometimes that has come in the form of legal battles that Riseup has
either joined or been subjected to, coalitions that Riseup has joined,
or campaigns that Riseup has participated in. In other cases it comes
technically through publishing documentation, guides, howtos and writing
patches and software that embody the various political principles that
Riseup tries to adhere to (such as privacy and log anonymization
patches, or social networking software, etc.). Another way is active
involvement in free software, Debian in particular. Contributing to that
ecosystem because the political ideals are harmonious makes a lot of
sense for an organization that is actually trying to fulfill its stated
'policies'.

micah
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Quick Guide to Alternatives

2013-06-17 Thread Jonathan Wilkes





 >From: Anne Roth 
>To: "liberationtech@lists.stanford.edu"  
>Sent: Monday, June 17, 2013 1:13 PM
>Subject: [liberationtech] Quick Guide to Alternatives
 

>Hi,

>Tactical Tech has been getting a lot of questions lately on what to do
to avoid being spied on - like probably most everyone on this list.

>We have compiled this 'Quick Guide to Alternatives', based on Security
in-a-box and more.

>https://alternatives.tacticaltech.org


Quick critique of one of the entries:


1) "Many commercial email providers, such as Google or Yahoo, collect a huge 
amount of user information which can be handed over to third parties from 
advertising companies to 
governments. Furthermore, some do not offer users an encrypted 
connection (known as HTTPS or SSL) by default, meaning that emails are 
sent in 'plain text' and readable by malicious hackers, Internet Service 
Providers, and others with access to the networks as they travel 
between users' devices and the email provider's servers."

Change
"Furthermore, some do not offer users an encrypted 
connection (known as HTTPS or SSL) by default"
to
"Google's Gmail  offers users an encrypted 
connection (known as HTTPS or SSL) by default but others do not,"

2) "Riseup is a collective organization 
dedicated to  providing private and secure email and hosting services 
for individuals  and organisations committed to political and social 
justice."
I'll hold off on a suggestion for #2, but do keep in mind that you're going to 
get views from non-technical people who will
read "secure email" and "https" above and think, "Hey, that's like what I use 
to log in to my bank, so obviously I want to
use a service that that keeps my messages that secure when they get sent _over_ 
_the_ _internet_."  They join Riseup and
can now breathe a sigh of relief as they send "secure" email to all their 
friends at gmail.com, or wherever.  Oops.

Also, notice that the problem actually gets worse when you tell users that 
Gmail offers https by default.  Either they
just use gmail, or they think sending a message from "secure" riseup to 
"secure" gmail keeps their data secure.  Neither is
true, and to actually gain any meaningful control over who can read their 
messages they still have to use Enigmail or
similar software.

Finally, the user of riseup must trust the description of their service on the 
website to be true because it is a form of
privacy by policy.  If joining it is to be anything other than practicing the 
bad habit of trusting implicitly something you
read on a list on the internet, you need to know and trust someone from the 
internet security/privacy world who can vouch
for the security of the system based on their own human trust relationship with 
someone who runs riseup (or is closely
connected to it).  If you're a human rights worker and you have such a 
relationship with a security/privacy expert, you'd
do better to pay them for some tutoring sessions on seting up and using one or 
more of the following: ssh, Tor, Tor + ssh,
torchat, and possibly otr + pidgin and help them develop a working experience 
about what the threats are to their privacy in
those instances.

-Jonathan
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] Quick Guide to Alternatives

2013-06-17 Thread Anne Roth
Hi,

Tactical Tech has been getting a lot of questions lately on what to do
to avoid being spied on - like probably most everyone on this list.

We have compiled this 'Quick Guide to Alternatives', based on Security
in-a-box and more.

https://alternatives.tacticaltech.org


In addition we try to keep 'Me and My Shadow' up to date with
information about how we leave digital shadows and what can be done to
reduce them: https://myshadow.org/ - also a topic that seems to matter
more these days, also to people who so far tended to be members of the
'nothing to hide' and 'but it's so convenient' clubs.

Anne

-- 

http://about.me/annalist
http://pgp.mit.edu:11371/pks/lookup?op=vindex&search=0x7689407F942951E2
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech