[HacktionLab] BULLRUN & NSA. An Interesting Read
penguin
penguin at riseup.net
Sat Sep 14 12:23:31 UTC 2013
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hi Zoe
Picking up on your second point, https://techtoolsforactivism.org/ was
an attempt to do this (esp. Help Using the Tools). A few people, some
of which are on this list, put in together in the pre-Snowden times.
It's not perfect, (partly because people lack time (especially given
that there are so many applications and services that have privacy &
security implications), partly cos there's no such thing as an
'average bod' so it's always hard to know where to pitch things, and
other reasons).
However, in the post-Snowden epoch (if I may be so bold) there's some
talk about refreshing and updating the site & accompanying leaflet.
What would be really useful is for people that consider themselves as
non-experts to pop over to https://techtoolsforactivism.org/ and
provide feedback on what they understood, what they didn't, and what
else they'd like to see on the site.
Cheers
G
On 13/09/13 19:53, Zoe Young wrote:
> This seems to be serious and important stuff, good info for your
> average bod to have. Thank you.
>
> I still don't know what to DO though.
>
> Where is the super simple, highly circulable, easy for anyone to
> use..
>
> 1. graphic or other sexy summary of the info below, plus
>
> 2. entry point for your average bod, in a couple of clicks and a
> sign up, "to use a VPN, make sure you control both endpoints, and
> that the VPS you set up for this is at a small provider in a
> country outside of you local 'landlords' reach.'?
>
> Looking fwd to seeing them in use, won't they be more use than a
> million demos in support of Snowden etc?
>
> Cheers
>
> Z
>
>
>
> On 07/09/2013 14:04, Sikes wrote:
>> HAI
>>
>> The bottomline so far:
>>
>> Snowden leaked a document showing a roadmap to how the NSA wants
>> to have SSL/TLS broken 'soon', on how they have talked different
>> software and service providers to put exploitable weaknesses in
>> crypto products and how they have compromised '30 VPNs', aiming
>> at 300.
>>
>> commented about amongst others on:
>> https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html
>>
>>
>>
It cannot be excluded, but there is little indication that they have
>> successfully attacked SSL/TLS on the level of math&algorythm.
>> Again, like very often in cryptoland, that weakness is the
>> collusion of the providers of actual implementations.
>>
>> In other words:
>>
>> - Yes they can read you 'encrypted' gmail/facebook stuff, but
>> not because encryption is so weak, but because google/facebook
>> gives them access. That's what Snowdens first revelations already
>> yielded. Same thing might count for the provider of VPN/S
>> services, but it's by provider really.
>>
>> - The more of the (crypto) infrastructure you run yourselves,
>> the safer communication will be. Real end-to-end encryption (e.g
>> GPGed email with private keys stored on your respective devices,
>> you reading a website via https on a server hosted by a friend,
>> or a VPS you run there) is not really compromised.
>>
>> The fact that 2 encryption providers in the US (Silent circle,
>> Lavabit:
>> http://thenextweb.com/insider/2013/08/09/silent-circle-follows-lavabit-in-closing-its-encrypted-email-service-because-it-cannot-be-secure/
>>
>>
) closed down, hinting that installing a backdoor was about to be
>> forced upon them, gives a good indication of what really might be
>> the matter. If the NSA/GHCQ would really have broken SSL or PGP,
>> they would never have asked those for a backdoor.
>>
>> Same thing here:
>> http://boingboing.net/2013/09/06/uk-censorwall-bans-vpns.html .
>> Why would they ban Ipredator, if snooping on a VPN was so easy ?
>>
>> So to be 'safer':
>>
>> Ditch you gmail/yahoo/facebook/<insertbigbrandhere> accounts or
>> at least sanitize them to the point that these channels only are
>> used to communicate public(able) information, _and_ stop using
>> your real names.
>>
>> If you want to use a VPN, make sure you control both endpoints,
>> and that the VPS you set up for this is at a small provider in a
>> country outside of you local 'landlords' reach.
>>
>> kizziz IAH
>>
>>
>>
>>
>>
>>
>>
>> ________________________________ fighting for your digital
>> rights: https://gnu.org/ (A)
>>
>>
>> On Sat, 7 Sep 2013, Martin (Crypt) wrote:
>>
>>> I'm just amazed people are supprised at all about this. We've
>>> had the NSA insert a backdoor into windows, and we had several
>>> articles as far back as 2007, including this:
>>> http://www.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115
>>>
>>>
>>>
>>>
All point to this kind of activity, so it should come as no supprise
>>> really. It all adds up to yet another reason to use open
>>> standards and open source software. This isn't a perfect
>>> solution to protect yourself, but its a lot better than
>>> commercial packages where the NSA can easily influence the
>>> developers to put the backdoors in. In an open development
>>> community this is a lot harder.
>>>
>>>
>>>
>>> On Sat, Sep 7, 2013 at 9:50 AM, Chris <greenbean at riseup.net>
>>> wrote: This article contains leaked information about the
>>> NSA's BULLRUN project
>>>
>>> " two facts must remain top secret: that NSA makes
>>> modifications to commercial encryption software and devices "to
>>> make them exploitable", and that NSA "obtains cryptographic
>>> details of commercial cryptographic information security
>>> systems through industry relationships"."
>>>
>>>
>>> http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
>>>
>>>
>>>
_______________________________________________
>>> HacktionLab mailing list HacktionLab at lists.aktivix.org
>>> https://lists.aktivix.org/mailman/listinfo/hacktionlab
>>>
>>>
>>>
>>>
>>
>>
>> _______________________________________________ HacktionLab
>> mailing list HacktionLab at lists.aktivix.org
>> https://lists.aktivix.org/mailman/listinfo/hacktionlab
>
>
>
> _______________________________________________ HacktionLab mailing
> list HacktionLab at lists.aktivix.org
> https://lists.aktivix.org/mailman/listinfo/hacktionlab
>
- --
penguin
GPG key: http://tiny.cc/gpg-key
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQIcBAEBCAAGBQJSNFUlAAoJEJZb6mLZ7ehDlugP/RZfoDdJXUFAqrd/ULnuvHOx
EWJT6Lb6OXjvFQOWEFkK118DkHxaB58AUeO8UHRvDBE1iyWabyWSnImBNoBDKUBw
moxOay0/dMzbaEaD1FhEWHc03uo41+H+4KNNjmk7UhWxiO9G856C3dFQibo8elzu
SgJeYL9dYGYD+BKF/ck3MUbTFQsKp7iA7KuBZfYEfMxQFSltHcDhMnrnA/3bUziZ
y3W26sAjNlZkM/iGk/NfQIeOGylajtyzOFplh8lp4mpJTyqxtYIlO/PBPBIUS+CQ
1CQZz+ecIZLysXgvPQ2m36oiUL5i8S/p5tHD9BhH0kX2koSmzeL5BV1Lbt8l/bab
enz5zd+5/hAS0pzU6uBHKIaqU1r+dBDVE1kjSkYwl1j/dbK3rmZoyjxqMq1bdzjN
I0q/Lm7GZHU1Rtcv6b7kM7KibfkLIj/O+plCCexT1b79Qr/LDhegJzKD/J7vIjc6
dKpvqYCs6vFKd2CHxWLMc8zTIE86EnOm52KA94ZM6qNHcW1Sd1j5py/NQP16m/v4
XGJZg77IWAUzFT2Vwh45btSdWQuYfDIvfoKpV4EWVC/ZVZe57Bg/vIx8g18z7Xq8
onSrYmaThsoYse4yaYFe6+ZHFvnAqA8KNsWCldD3Pv7RK8807PxMeEv/X/m1LyOX
P2foUKikZ7YP7WMFpLzQ
=7ueb
-----END PGP SIGNATURE-----
More information about the HacktionLab
mailing list