[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:00.00,0:00:09.83,Default,,0000,0000,0000,,{\i1}silent 31C3 preroll{\i0} Dialogue: 0,0:00:09.83,0:00:12.99,Default,,0000,0000,0000,,{\i1}Laura and Jacob silently on stage{\i0}\N{\i1}audio/video playback starts{\i0} Dialogue: 0,0:00:12.99,0:00:16.22,Default,,0000,0000,0000,,Announcing person in video: Give\Na warm welcome to General Alexander! Dialogue: 0,0:00:16.22,0:00:20.94,Default,,0000,0000,0000,,{\i1}video starts all over again,\Nnow at its titles{\i0} Dialogue: 0,0:00:20.94,0:00:24.16,Default,,0000,0000,0000,,Announcing person in video: Give\Na warm welcome to General Alexander! Dialogue: 0,0:00:24.16,0:00:29.92,Default,,0000,0000,0000,,{\i1}video:{\i0}{\i1}applause{\i0} Dialogue: 0,0:00:29.92,0:00:34.54,Default,,0000,0000,0000,,Alexander: Thanks!\NCan you hear me? Dialogue: 0,0:00:34.54,0:00:37.04,Default,,0000,0000,0000,,Question: So does the NSA\Nreally keep a file on everyone? Dialogue: 0,0:00:37.04,0:00:39.42,Default,,0000,0000,0000,,Alexander: So many things you could\Nsay are funny but I think this requires Dialogue: 0,0:00:39.42,0:00:43.83,Default,,0000,0000,0000,,a very serious answer. First:\NNo, we don’t, absolutely not. Dialogue: 0,0:00:43.83,0:00:46.67,Default,,0000,0000,0000,,And anybody who’d tell you that\Nwe’re keeping files or dossiers Dialogue: 0,0:00:46.67,0:00:49.76,Default,,0000,0000,0000,,on the American people:\NNo, that’s not true. Dialogue: 0,0:00:49.76,0:00:54.30,Default,,0000,0000,0000,,And I will tell you that those who would\Nwant to weave the story, that we have Dialogue: 0,0:00:54.30,0:00:59.22,Default,,0000,0000,0000,,millions or hundreds of millions of\Ndossiers on people is absolutely false. Dialogue: 0,0:00:59.22,0:01:09.68,Default,,0000,0000,0000,,{\i1}title with music\N“Reconstructing Narratives”{\i0} Dialogue: 0,0:01:09.68,0:01:20.77,Default,,0000,0000,0000,,{\i1}audio/video playback stops{\i0} Dialogue: 0,0:01:20.77,0:01:23.68,Default,,0000,0000,0000,,Jacob Appelbaum: That’s the first time\NI can remember not being wiretapped! Dialogue: 0,0:01:23.68,0:01:33.74,Default,,0000,0000,0000,,{\i1}Laura laughs{\i0}\N{\i1}laughter and applause{\i0} Dialogue: 0,0:01:33.74,0:01:38.82,Default,,0000,0000,0000,,Okay, well, it’s really a great\Nhonor to be back, and it’s Dialogue: 0,0:01:38.82,0:01:41.42,Default,,0000,0000,0000,,really one of the greatest pleasures\Nof my life to be on stage with Laura, Dialogue: 0,0:01:41.42,0:01:45.82,Default,,0000,0000,0000,,who is one of the most fearless,\Nfantastic journalists… Dialogue: 0,0:01:45.82,0:01:54.32,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:01:54.32,0:01:58.83,Default,,0000,0000,0000,,…and we are here today\Nto tell you a few things. Dialogue: 0,0:01:58.83,0:02:03.74,Default,,0000,0000,0000,,I am an American by birth\Nand post-nationalist, I suppose, Dialogue: 0,0:02:03.74,0:02:08.42,Default,,0000,0000,0000,,by an accident of history. I’m\Nhere now working as a journalist Dialogue: 0,0:02:08.42,0:02:12.55,Default,,0000,0000,0000,,and Laura is working as a journalist.\NAnd I’ll let her introduce herself. Dialogue: 0,0:02:12.55,0:02:16.14,Default,,0000,0000,0000,,Laura Poitras: So, I’ve been working\Nthe last years, trying to document Dialogue: 0,0:02:16.14,0:02:20.17,Default,,0000,0000,0000,,the “War on Terror” and to understand\Nit from a human perspective Dialogue: 0,0:02:20.17,0:02:25.08,Default,,0000,0000,0000,,and how we can understand it differently,\Nif we understand its impact on people. Dialogue: 0,0:02:25.08,0:02:28.51,Default,,0000,0000,0000,,And today, what Jacob and\NI want to do is to talk about Dialogue: 0,0:02:28.51,0:02:33.33,Default,,0000,0000,0000,,how the narratives that\Nwe’ve been told are false, Dialogue: 0,0:02:33.33,0:02:37.79,Default,,0000,0000,0000,,and how we can construct new narratives\Nthat are based on objective facts. Dialogue: 0,0:02:37.79,0:02:40.78,Default,,0000,0000,0000,,Jacob: I think in some way some of\Nthe things we are saying will be Dialogue: 0,0:02:40.78,0:02:44.25,Default,,0000,0000,0000,,‘preaching to the choir’, because it is\Nthrough this community, that we have, Dialogue: 0,0:02:44.25,0:02:48.28,Default,,0000,0000,0000,,in fact, found some of the truths,\Nthat we will talk about today. Dialogue: 0,0:02:48.28,0:02:54.54,Default,,0000,0000,0000,,And the CCC to me is like home, so… Dialogue: 0,0:02:54.54,0:03:00.68,Default,,0000,0000,0000,,{\i1}laughter and applause{\i0} Dialogue: 0,0:03:00.68,0:03:05.25,Default,,0000,0000,0000,,And so, if it wasn’t for the CCC and\Nyour material support I don’t believe Dialogue: 0,0:03:05.25,0:03:08.51,Default,,0000,0000,0000,,that it would be possible for us to be\Nhere today. So, thank you all very much Dialogue: 0,0:03:08.51,0:03:12.16,Default,,0000,0000,0000,,for the large conspiracy that the German\Npeople and the international community Dialogue: 0,0:03:12.16,0:03:15.02,Default,,0000,0000,0000,,have brought.\N{\i1}some laughter in the audience{\i0} Dialogue: 0,0:03:15.02,0:03:19.07,Default,,0000,0000,0000,,We have just now simultaneously\Npublished on DER SPIEGEL’s website Dialogue: 0,0:03:19.07,0:03:23.26,Default,,0000,0000,0000,,two very large stories which we think will\Nbe of great interest, which we will take Dialogue: 0,0:03:23.26,0:03:27.01,Default,,0000,0000,0000,,a little bit of time to explain.\NBut if you go to spiegel.de Dialogue: 0,0:03:27.01,0:03:31.37,Default,,0000,0000,0000,,you will see two stories.\NOne is about cryptography Dialogue: 0,0:03:31.37,0:03:37.56,Default,,0000,0000,0000,,and one is about… the CIA.\NAnd about JPEL and NATO. Dialogue: 0,0:03:37.56,0:03:40.79,Default,,0000,0000,0000,,And this is very important, these stories\Nbeing published at the same time, Dialogue: 0,0:03:40.79,0:03:45.02,Default,,0000,0000,0000,,we very much want to thank DER SPIEGEL\Nand the colleagues who are in this room, Dialogue: 0,0:03:45.02,0:03:48.25,Default,,0000,0000,0000,,Andy Müller-Maguhn, Aaron Gibson\Nand a number of other people, Dialogue: 0,0:03:48.25,0:03:50.74,Default,,0000,0000,0000,,Marcel Rosenberg and Holger Stark… Dialogue: 0,0:03:50.74,0:03:58.73,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:03:58.73,0:04:02.44,Default,,0000,0000,0000,,We, as some background, have\Nbeen working on these stories Dialogue: 0,0:04:02.44,0:04:06.46,Default,,0000,0000,0000,,really for a long time.\NThe crypto story, I would say, Dialogue: 0,0:04:06.46,0:04:10.18,Default,,0000,0000,0000,,it’s something we’ve wanted to do for\Nalmost a year and a half, if not more. Dialogue: 0,0:04:10.18,0:04:13.15,Default,,0000,0000,0000,,And really, if you think about the\Ninvestigations in the Cypherpunks movement Dialogue: 0,0:04:13.15,0:04:17.65,Default,,0000,0000,0000,,we’ve really wanted to have some of\Nthese answers for about 15 or 20 years. Dialogue: 0,0:04:17.65,0:04:20.61,Default,,0000,0000,0000,,Some of the answers are good and some\Nof the answers are not so fantastic. Dialogue: 0,0:04:20.61,0:04:24.91,Default,,0000,0000,0000,,I guess, it depends on where you stand.\NBut we hope that, by bringing this to you, Dialogue: 0,0:04:24.91,0:04:28.19,Default,,0000,0000,0000,,that it is really in the public interest.\NAnd that the public here is interested Dialogue: 0,0:04:28.19,0:04:32.19,Default,,0000,0000,0000,,and that you will take it to other places.\NThat you will really take action, based on Dialogue: 0,0:04:32.19,0:04:37.03,Default,,0000,0000,0000,,what you see. Whether it is traditional\Naction, whether it is civil disobedience, Dialogue: 0,0:04:37.03,0:04:40.94,Default,,0000,0000,0000,,whether it’s FOIAs, whether it’s\Nsomething else, who knows, we hope Dialogue: 0,0:04:40.94,0:04:44.07,Default,,0000,0000,0000,,that you will feel empowered\Nby the end of this talk. Dialogue: 0,0:04:44.07,0:04:46.88,Default,,0000,0000,0000,,Laura: And I’d just like to say\Nthat if anyone wants to open up Dialogue: 0,0:04:46.88,0:04:49.77,Default,,0000,0000,0000,,their laptops and look at some of\Nthe documents that we’ve published Dialogue: 0,0:04:49.77,0:04:53.16,Default,,0000,0000,0000,,we won’t be offended at all and,\Nin fact, will be happy. I think it will Dialogue: 0,0:04:53.16,0:04:55.68,Default,,0000,0000,0000,,contribute to your experience\Nof the talk today. Dialogue: 0,0:04:55.68,0:04:59.86,Default,,0000,0000,0000,,Voice from audience: Laura,\Nit’s ‘/international’ on spiegel.de Dialogue: 0,0:04:59.86,0:05:04.45,Default,,0000,0000,0000,,Jacob: Great, ‘spiegel.de/international’\NAnd for everyone who can’t be here, Dialogue: 0,0:05:04.45,0:05:08.39,Default,,0000,0000,0000,,streaming, remember if the stream cuts out\Nand you never see us again, it was murder! Dialogue: 0,0:05:08.39,0:05:14.01,Default,,0000,0000,0000,,{\i1}Laura and audience laughing, some applause{\i0} Dialogue: 0,0:05:14.01,0:05:17.96,Default,,0000,0000,0000,,Laura: So, one of the ways\Nthat the ‘War on Terror’ works Dialogue: 0,0:05:17.96,0:05:21.85,Default,,0000,0000,0000,,– and the way that war works in general –\Nis how people are de-humanized Dialogue: 0,0:05:21.85,0:05:31.50,Default,,0000,0000,0000,,and reduced to numbers. This is a short\Nvideo that I filmed about Guantanamo. Dialogue: 0,0:05:31.50,0:06:38.40,Default,,0000,0000,0000,,{\i1}video with serious music{\i0} Dialogue: 0,0:06:38.40,0:06:42.68,Default,,0000,0000,0000,,Laura: That was a video that I made\Nabout a former prisoner of Guantanamo. Dialogue: 0,0:06:42.68,0:06:49.50,Default,,0000,0000,0000,,His name was Adnan Latif. He\Nwas sent to Guantanamo in 2012. Dialogue: 0,0:06:49.50,0:06:54.93,Default,,0000,0000,0000,,And this is how he came home. He\Nwas on hunger strike for many years Dialogue: 0,0:06:54.93,0:06:59.22,Default,,0000,0000,0000,,before he died. And what\Nwas most shocking to me Dialogue: 0,0:06:59.22,0:07:05.65,Default,,0000,0000,0000,,is watching what happens when he returns\Nhome and that he’s listed as a number. Dialogue: 0,0:07:05.65,0:07:09.90,Default,,0000,0000,0000,,And that his family had to witness that.\NThat that was a person who they were Dialogue: 0,0:07:09.90,0:07:13.92,Default,,0000,0000,0000,,seeing for the first time in many\Nyears, who is reduced to a number. Dialogue: 0,0:07:13.92,0:07:17.74,Default,,0000,0000,0000,,So today, what we’re publishing\Nwith DER SPIEGEL is looking at Dialogue: 0,0:07:17.74,0:07:23.14,Default,,0000,0000,0000,,how that process works.\NAnd it involves NATO’s JPEL kill list Dialogue: 0,0:07:23.14,0:07:30.20,Default,,0000,0000,0000,,that is being used in Afghanistan\Nto target people for targeted killings. Dialogue: 0,0:07:30.20,0:07:34.68,Default,,0000,0000,0000,,We’re publishing along that some\Nnarratives of particular people Dialogue: 0,0:07:34.68,0:07:39.65,Default,,0000,0000,0000,,who are on the kill list. One\Nparticular case was a man Dialogue: 0,0:07:39.65,0:07:45.51,Default,,0000,0000,0000,,who was given the code\Nname “Object Doody”. Dialogue: 0,0:07:45.51,0:07:50.56,Default,,0000,0000,0000,,He was targeted for killing,\Nor for assassination. Dialogue: 0,0:07:50.56,0:07:55.80,Default,,0000,0000,0000,,A British Apache helicopter\Nthat was code named “Ugly 50” Dialogue: 0,0:07:55.80,0:08:01.42,Default,,0000,0000,0000,,was sent to kill him. This was on\Na day that the visibility was poor, Dialogue: 0,0:08:01.42,0:08:04.76,Default,,0000,0000,0000,,and they missed him and they\Nshot a child and his father. Dialogue: 0,0:08:04.76,0:08:08.82,Default,,0000,0000,0000,,The child was killed immediately,\Nthe father was wounded. Dialogue: 0,0:08:08.82,0:08:16.24,Default,,0000,0000,0000,,The helicopter looped back\Naround and killed its target. Dialogue: 0,0:08:16.24,0:08:20.44,Default,,0000,0000,0000,,Jacob: Right. So, part of what we are\Nhoping to do here, just to make it Dialogue: 0,0:08:20.44,0:08:26.21,Default,,0000,0000,0000,,perfectly clear, is to expose information\Nthat people say doesn’t exist, with Dialogue: 0,0:08:26.21,0:08:30.86,Default,,0000,0000,0000,,a couple of goals. And one of those\Ngoals, to be very clear about it, Dialogue: 0,0:08:30.86,0:08:34.43,Default,,0000,0000,0000,,– even though this, I suppose, tilts\Nme a little bit on the activist side Dialogue: 0,0:08:34.43,0:08:38.60,Default,,0000,0000,0000,,of journalism – is to stop the\Nkilling. That is an explicit goal Dialogue: 0,0:08:38.60,0:08:43.22,Default,,0000,0000,0000,,with this publication. The British\NGovernment and the American Government Dialogue: 0,0:08:43.22,0:08:46.52,Default,,0000,0000,0000,,– in various different ways NATO as well –\Nthey say, that these kind of things Dialogue: 0,0:08:46.52,0:08:50.12,Default,,0000,0000,0000,,really don’t exist. That they don’t\Nhappen this way. Any they talk about Dialogue: 0,0:08:50.12,0:08:56.68,Default,,0000,0000,0000,,the killing of people in a very…\Nlet’s say ‘mechanical fashion’. Dialogue: 0,0:08:56.68,0:08:59.93,Default,,0000,0000,0000,,Usually they say this evidence doesn’t\Nexist, but the evidence does exist. Dialogue: 0,0:08:59.93,0:09:05.64,Default,,0000,0000,0000,,And, in fact, there are lists with\Nnames, just endless names. Dialogue: 0,0:09:05.64,0:09:09.18,Default,,0000,0000,0000,,And those people, in various different\Nways, are graded. They’re graded Dialogue: 0,0:09:09.18,0:09:13.18,Default,,0000,0000,0000,,with regard to the political consequence\Nof those people being killed. As well as Dialogue: 0,0:09:13.18,0:09:18.14,Default,,0000,0000,0000,,some very small spreadsheet and on\Nthat spreadsheet, there’s a small box, Dialogue: 0,0:09:18.14,0:09:25.01,Default,,0000,0000,0000,,and that box explains their crimes.\NNext to that, there’s a Dollar figure Dialogue: 0,0:09:25.01,0:09:28.67,Default,,0000,0000,0000,,for a potential reward. And maybe there’s\Na restriction. Sometimes it says something Dialogue: 0,0:09:28.67,0:09:34.18,Default,,0000,0000,0000,,like “kinetic action prohibited”. For\Nexample. That’s because, by default, Dialogue: 0,0:09:34.18,0:09:38.92,Default,,0000,0000,0000,,“kinetic action” is not prohibited.\NThat is because these are lists of names Dialogue: 0,0:09:38.92,0:09:44.10,Default,,0000,0000,0000,,of people to be found and to be\Nmurdered. And so of these lists… Dialogue: 0,0:09:44.10,0:09:48.23,Default,,0000,0000,0000,,we have an excerpt of these\Nlists, being published today. Dialogue: 0,0:09:48.23,0:09:53.77,Default,,0000,0000,0000,,And the goal of publishing this is\Nto show what needs to be done. Dialogue: 0,0:09:53.77,0:09:58.00,Default,,0000,0000,0000,,So these lists have redactions\Nand the goal is that SPIEGEL, Dialogue: 0,0:09:58.00,0:10:03.50,Default,,0000,0000,0000,,along with hopefully others, will help\Nus to continue to work to uncover Dialogue: 0,0:10:03.50,0:10:07.55,Default,,0000,0000,0000,,not only the fate of these people on these\Nlists whose names are redacted, but also Dialogue: 0,0:10:07.55,0:10:11.72,Default,,0000,0000,0000,,the fate of people who are not yet on\Nthese kinds of lists. Maybe to move Dialogue: 0,0:10:11.72,0:10:16.24,Default,,0000,0000,0000,,to a world in which we don’t have lists\Nfor, what I would call, assassinations. Dialogue: 0,0:10:16.24,0:10:20.48,Default,,0000,0000,0000,,And that’s what SPIEGEL calls it as well.\NThis is not, as some people would say, Dialogue: 0,0:10:20.48,0:10:28.89,Default,,0000,0000,0000,,a “Joint Prioritized Effects List”. This\Nis an assassination program. And I think, Dialogue: 0,0:10:28.89,0:10:32.60,Default,,0000,0000,0000,,personally, that it is inappropriate for\Ndemocratic societies to have them and Dialogue: 0,0:10:32.60,0:10:37.10,Default,,0000,0000,0000,,when they deny that they have them, we’d\Nlike to prove them wrong and publish them. Dialogue: 0,0:10:37.10,0:10:39.56,Default,,0000,0000,0000,,And so that is, what we have done today. Dialogue: 0,0:10:39.56,0:10:52.90,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:10:52.90,0:10:58.27,Default,,0000,0000,0000,,Now, an important detail\Nof this is: In the story, Dialogue: 0,0:10:58.27,0:11:03.33,Default,,0000,0000,0000,,the very specific story that is told in\Nthe SPIEGEL piece, as Laura mentioned, Dialogue: 0,0:11:03.33,0:11:06.81,Default,,0000,0000,0000,,there is an Apache helicopter. And\Nthat helicopter attempted to engage Dialogue: 0,0:11:06.81,0:11:10.80,Default,,0000,0000,0000,,with a so-called “legitimate target”. And\Npart of what we hope to drive home Dialogue: 0,0:11:10.80,0:11:16.18,Default,,0000,0000,0000,,is this notion of legitimacy\Nand targeting. In this case, Dialogue: 0,0:11:16.18,0:11:20.58,Default,,0000,0000,0000,,there is a value, that is assigned to\Na person. And that value is a number, Dialogue: 0,0:11:20.58,0:11:26.00,Default,,0000,0000,0000,,which includes the number of people who\Nare not the target, that can be killed Dialogue: 0,0:11:26.00,0:11:29.36,Default,,0000,0000,0000,,in service of killing that person!\NThat is completely innocent people, Dialogue: 0,0:11:29.36,0:11:33.42,Default,,0000,0000,0000,,who are allowed to be killed entirely. And Dialogue: 0,0:11:33.42,0:11:38.35,Default,,0000,0000,0000,,depending on the number there may be\Na call back to base or to a higher command. Dialogue: 0,0:11:38.35,0:11:43.56,Default,,0000,0000,0000,,But the number isn’t 1 before they have\Nto make that call. They have discretion. Dialogue: 0,0:11:43.56,0:11:49.35,Default,,0000,0000,0000,,And in this case a child was killed with\Na Hellfire missile. And why is that? Dialogue: 0,0:11:49.35,0:11:52.89,Default,,0000,0000,0000,,Because technology mediates this\Ntype of killing and that technology is Dialogue: 0,0:11:52.89,0:11:57.82,Default,,0000,0000,0000,,not as precise as people would say.\NAnd so we have today published Dialogue: 0,0:11:57.82,0:12:05.67,Default,,0000,0000,0000,,the storyboard of this objective “Doody”,\Nwhich is the name, D-O-O-D-Y. Dialogue: 0,0:12:05.67,0:12:09.15,Default,,0000,0000,0000,,That storyboard tells this and\Nexplains that a child was killed Dialogue: 0,0:12:09.15,0:12:12.49,Default,,0000,0000,0000,,with a Hellfire missile in service of\Nkilling someone else. And Laura Dialogue: 0,0:12:12.49,0:12:21.01,Default,,0000,0000,0000,,can explain what this person\Ndid to ‘deserve’ to be killed. Dialogue: 0,0:12:21.01,0:12:25.21,Default,,0000,0000,0000,,Laura: I mean, actually, what I wanted\Nto transition to is looking at Dialogue: 0,0:12:25.21,0:12:29.18,Default,,0000,0000,0000,,actually the fact… the narrative is, that\Nthe government or governments are Dialogue: 0,0:12:29.18,0:12:33.72,Default,,0000,0000,0000,,targeting people, who are suspected\Nof something. And in fact Dialogue: 0,0:12:33.72,0:12:38.43,Default,,0000,0000,0000,,what we learned, is that they’re targeting\Npeople based on as little information Dialogue: 0,0:12:38.43,0:12:43.18,Default,,0000,0000,0000,,as their telephone number, or a voice\Nrecognition. And they’re using those Dialogue: 0,0:12:43.18,0:12:48.72,Default,,0000,0000,0000,,as methods to target and kill people.\NOne of the things, that we’ve learned Dialogue: 0,0:12:48.72,0:12:53.34,Default,,0000,0000,0000,,through the disclosures by Edward\NSnowden is that they’re targeting people Dialogue: 0,0:12:53.34,0:12:57.95,Default,,0000,0000,0000,,not just in war zones but internationally.\NThey’re targeting us for surveillance Dialogue: 0,0:12:57.95,0:13:04.83,Default,,0000,0000,0000,,all over the world. And…\Nthis is a video of a target. Dialogue: 0,0:13:04.83,0:13:13.15,Default,,0000,0000,0000,,{\i1}audio/video playback starts{\i0}\NMan: This is the highest level! (in German) Dialogue: 0,0:13:13.15,0:13:17.26,Default,,0000,0000,0000,,Ali Fares: Mh-mh! Dialogue: 0,0:13:17.26,0:13:20.43,Default,,0000,0000,0000,,Netcologne, [inaudible], Teliast… Dialogue: 0,0:13:20.43,0:13:27.20,Default,,0000,0000,0000,,Oh my god, it’s so good documented! Dialogue: 0,0:13:27.20,0:13:31.73,Default,,0000,0000,0000,,That are most of the\Nrouters that I actually know. Dialogue: 0,0:13:31.73,0:13:41.85,Default,,0000,0000,0000,,Office, plied sky (?), and… Dialogue: 0,0:13:41.85,0:13:44.24,Default,,0000,0000,0000,,Man: This is an engineer?\NAli: Yes. Dialogue: 0,0:13:44.24,0:13:47.53,Default,,0000,0000,0000,,Man: Engineer, engineer, engineer, engineer…\NAli: Oh, yeah. Dialogue: 0,0:13:47.53,0:13:53.49,Default,,0000,0000,0000,,Man: …engineer, engineer.\NThis is you? Dialogue: 0,0:13:53.49,0:14:03.81,Default,,0000,0000,0000,,Ali: Yes.\N{\i1}audio/video playback stops{\i0} Dialogue: 0,0:14:03.81,0:14:08.55,Default,,0000,0000,0000,,Jacob: So what you just saw there\Nwas “Engineers from Stellar”, and Dialogue: 0,0:14:08.55,0:14:13.69,Default,,0000,0000,0000,,that is a fantastic name for a company\Nthat gets compromised. It is important Dialogue: 0,0:14:13.69,0:14:19.84,Default,,0000,0000,0000,,to understand the notion of targeting\Nwith regard to why a target Dialogue: 0,0:14:19.84,0:14:25.39,Default,,0000,0000,0000,,considered legitimate in some cases can\Nhave this notion of collateral damage. Dialogue: 0,0:14:25.39,0:14:29.64,Default,,0000,0000,0000,,Now in the case of Stellar or in the case\Nof Belgacom, which Laura revealed Dialogue: 0,0:14:29.64,0:14:35.10,Default,,0000,0000,0000,,with DER SPIEGEL, what we learn\Nis that it isn’t actually the case Dialogue: 0,0:14:35.10,0:14:39.58,Default,,0000,0000,0000,,that a terrorist is involved\Nwith Belgacom or with Stellar. Dialogue: 0,0:14:39.58,0:14:44.60,Default,,0000,0000,0000,,It is that a kind of neo-colonialism\Nis taking place in the digital era, Dialogue: 0,0:14:44.60,0:14:49.48,Default,,0000,0000,0000,,wherein the colonies, the networks,\Nthat they do not have through coercion Dialogue: 0,0:14:49.48,0:14:54.91,Default,,0000,0000,0000,,of the state or through other surveillance\Npractices, they have to be compromised. Dialogue: 0,0:14:54.91,0:14:59.84,Default,,0000,0000,0000,,And those become targets and they\Nbecome legitimate targets in theory Dialogue: 0,0:14:59.84,0:15:04.59,Default,,0000,0000,0000,,and in actuality, because of it’s\Nusefulness. Because of the leverage Dialogue: 0,0:15:04.59,0:15:10.05,Default,,0000,0000,0000,,that it provides against a speculative\Ntarget, someday in the future. That is, Dialogue: 0,0:15:10.05,0:15:13.57,Default,,0000,0000,0000,,these networks become compromised\Nin service of being able to compromise Dialogue: 0,0:15:13.57,0:15:19.63,Default,,0000,0000,0000,,future networks and other people, just\Nbecause they can. They set out to do that. Dialogue: 0,0:15:19.63,0:15:23.65,Default,,0000,0000,0000,,And so Stellar is an example of such a\Nthing. And to be able to confront victims Dialogue: 0,0:15:23.65,0:15:29.28,Default,,0000,0000,0000,,this way, to show them that they’re\Ncompromised helps us to understand, Dialogue: 0,0:15:29.28,0:15:34.09,Default,,0000,0000,0000,,helps us to show that in fact we are\Ndirectly, and indirectly impacted Dialogue: 0,0:15:34.09,0:15:39.64,Default,,0000,0000,0000,,by these types of activities. And when\Nwe think about this kind of targeting Dialogue: 0,0:15:39.64,0:15:45.89,Default,,0000,0000,0000,,we have to understand the scale.\NAnd this scale is sort of incredible. Dialogue: 0,0:15:45.89,0:15:52.22,Default,,0000,0000,0000,,The budget for targeted\Nexploitation, for the NSA, Dialogue: 0,0:15:52.22,0:15:57.18,Default,,0000,0000,0000,,not speaking at all about the GCHQ,\Nor the Defense Signals Directorate folks Dialogue: 0,0:15:57.18,0:16:02.59,Default,,0000,0000,0000,,over in Australia,\Nthere’s so much money, Dialogue: 0,0:16:02.59,0:16:06.77,Default,,0000,0000,0000,,when you look at the offensive warfare,\Nthat for 2013 alone there was Dialogue: 0,0:16:06.77,0:16:12.21,Default,,0000,0000,0000,,650 million Dollars spent\Non the GENIE program. Dialogue: 0,0:16:12.21,0:16:15.43,Default,,0000,0000,0000,,And the GENIE program is their\Noffensive Cyber War program, Dialogue: 0,0:16:15.43,0:16:20.05,Default,,0000,0000,0000,,as they call it themselves, in which they\Nbuild backdoors, like UNITEDRAKE Dialogue: 0,0:16:20.05,0:16:25.64,Default,,0000,0000,0000,,and STRAITBIZZARE and other tools like\NRegin, which you know as one of the tools, Dialogue: 0,0:16:25.64,0:16:29.86,Default,,0000,0000,0000,,I hope, that has been used in\NBelgacom and in other places. Dialogue: 0,0:16:29.86,0:16:33.93,Default,,0000,0000,0000,,So they target places like Stellar and\NBelgacom, but they also target places Dialogue: 0,0:16:33.93,0:16:39.30,Default,,0000,0000,0000,,like the European Union. In that\Ncase, the EU takes the place Dialogue: 0,0:16:39.30,0:16:42.94,Default,,0000,0000,0000,,of a terrorist. That is: they are the\Ngoal. They aren’t compromising Dialogue: 0,0:16:42.94,0:16:46.90,Default,,0000,0000,0000,,the EU’s networks just because\Nsomeone interesting might show up, Dialogue: 0,0:16:46.90,0:16:51.71,Default,,0000,0000,0000,,they are compromising the EU’s\Nnetworks, because the EU is Dialogue: 0,0:16:51.71,0:16:55.80,Default,,0000,0000,0000,,the equivalent to a terrorist to them. And\Nthey wish to have leverage and control. Dialogue: 0,0:16:55.80,0:16:59.32,Default,,0000,0000,0000,,Because that’s what surveillance is in\Nthis context. It’s exploitation of systems, Dialogue: 0,0:16:59.32,0:17:03.08,Default,,0000,0000,0000,,where they leverage access to that\Nsystem, or whichever systems that they Dialogue: 0,0:17:03.08,0:17:07.72,Default,,0000,0000,0000,,have access to, to get more access,\Nto have more control. Either politically Dialogue: 0,0:17:07.72,0:17:13.47,Default,,0000,0000,0000,,or technologically or both.\NWhich ties of course into economics. Dialogue: 0,0:17:13.47,0:17:20.10,Default,,0000,0000,0000,,Now, in the case of GENIE 650 million\NDollars is quite a great deal of money. Dialogue: 0,0:17:20.10,0:17:26.23,Default,,0000,0000,0000,,But for 2017 the projected budget\Nfor GENIE is a billion Dollars. Dialogue: 0,0:17:26.23,0:17:31.06,Default,,0000,0000,0000,,This is just the beginning of what\Nwe see. And these civilian targets Dialogue: 0,0:17:31.06,0:17:34.73,Default,,0000,0000,0000,,or these governmental targets that are\Nbeing targeted in continental Europe, Dialogue: 0,0:17:34.73,0:17:38.57,Default,,0000,0000,0000,,they’re not alone. It is actually\Nhappening all around the world. Dialogue: 0,0:17:38.57,0:17:42.31,Default,,0000,0000,0000,,And these compromises, they happen\Nin service of mass surveillance. Dialogue: 0,0:17:42.31,0:17:46.74,Default,,0000,0000,0000,,Whenever they don’t have the ability to\Nmass-surveil a system they implant systems Dialogue: 0,0:17:46.74,0:17:51.02,Default,,0000,0000,0000,,along the way in order to surveil\Nwhat goes in and out of them. Dialogue: 0,0:17:51.02,0:17:56.50,Default,,0000,0000,0000,,Systems are even used as what are called\N‘Diodes’. And Diodes are essentially Dialogue: 0,0:17:56.50,0:18:02.59,Default,,0000,0000,0000,,another term which we see the Canadians\Nuse. Operational Relay Boxes or ORBs. Dialogue: 0,0:18:02.59,0:18:06.18,Default,,0000,0000,0000,,Anybody here that used to be a black hat,\NI know there are no more black hats here, Dialogue: 0,0:18:06.18,0:18:12.04,Default,,0000,0000,0000,,it’s all legitimate, but… except\Nfor that guy, in the front… Dialogue: 0,0:18:12.04,0:18:16.45,Default,,0000,0000,0000,,Everybody knows what you use those boxes\Nfor: You use them to jump from one network Dialogue: 0,0:18:16.45,0:18:20.08,Default,,0000,0000,0000,,to another network, so that when\Nsomething is traced back it traces back Dialogue: 0,0:18:20.08,0:18:23.17,Default,,0000,0000,0000,,to that machine. In the case of the\NCanadian Service they themselves Dialogue: 0,0:18:23.17,0:18:26.98,Default,,0000,0000,0000,,talk about, a couple of times a year,\Ncompromising as many systems as they can Dialogue: 0,0:18:26.98,0:18:31.02,Default,,0000,0000,0000,,in non-Five-Eyes countries, in order to\Nensure that they have as many operational Dialogue: 0,0:18:31.02,0:18:37.04,Default,,0000,0000,0000,,relay boxes as they need for the\Ncoming year. These diodes mean Dialogue: 0,0:18:37.04,0:18:42.05,Default,,0000,0000,0000,,that when a system does a thing, it is\Nabsolutely not the case that we can say Dialogue: 0,0:18:42.05,0:18:45.35,Default,,0000,0000,0000,,the person who has purchased\Nthat system is responsible for it. Dialogue: 0,0:18:45.35,0:18:49.11,Default,,0000,0000,0000,,It is their official doctrine, in fact,\Nto use other people’s computers Dialogue: 0,0:18:49.11,0:18:53.81,Default,,0000,0000,0000,,for their hacking. And that’s important,\Nwhen we now consider, that they have Dialogue: 0,0:18:53.81,0:18:59.66,Default,,0000,0000,0000,,– in 2017 projected – a goal of\Nhaving a billion Dollars to do that. Dialogue: 0,0:18:59.66,0:19:04.53,Default,,0000,0000,0000,,When we look at how that bounces out with\NDefense that is – not at all – balanced. Dialogue: 0,0:19:04.53,0:19:10.98,Default,,0000,0000,0000,,In fact, it is tilted entirely\Ntowards Offensive Warfare. Dialogue: 0,0:19:10.98,0:19:14.70,Default,,0000,0000,0000,,Laura: I was wondering, how many\Npeople in the room have gone online Dialogue: 0,0:19:14.70,0:19:17.24,Default,,0000,0000,0000,,to look at some of the\Ndocuments that we released. Dialogue: 0,0:19:17.24,0:19:20.56,Default,,0000,0000,0000,,Jacob: Anyone? Hey, nice.\NLaura: Alright. Dialogue: 0,0:19:20.56,0:19:25.02,Default,,0000,0000,0000,,Jacob: Fantastic! So in\Nthe future, that is to say Dialogue: 0,0:19:25.02,0:19:30.15,Default,,0000,0000,0000,,in approximately 3 weeks, we plan to\Nrelease, along with some of our colleagues Dialogue: 0,0:19:30.15,0:19:34.09,Default,,0000,0000,0000,,at SPIEGEL, and other people who\Nare helping out, more information Dialogue: 0,0:19:34.09,0:19:38.55,Default,,0000,0000,0000,,about specific malware, specific\Ncases in which it’s used Dialogue: 0,0:19:38.55,0:19:42.24,Default,,0000,0000,0000,,and details about information sharing\Nwith regard to the malware in terms of Dialogue: 0,0:19:42.24,0:19:45.32,Default,,0000,0000,0000,,how it’s harvested. We’re thinking\Nprobably in the second week of January Dialogue: 0,0:19:45.32,0:19:49.23,Default,,0000,0000,0000,,for that malware story. And we\Nwanted to make sure to get it right Dialogue: 0,0:19:49.23,0:19:54.55,Default,,0000,0000,0000,,and we wanted people to focus on\Nthe specifics of the NATO kill lists Dialogue: 0,0:19:54.55,0:19:59.78,Default,,0000,0000,0000,,and to focus on cryptography.\NWe thought, well, people here Dialogue: 0,0:19:59.78,0:20:03.48,Default,,0000,0000,0000,,in the audience would be able to handle\Nall three, the rest of the world just Dialogue: 0,0:20:03.48,0:20:07.76,Default,,0000,0000,0000,,isn’t ready for it yet. So we had\Nto take a little bit of a pause. So Dialogue: 0,0:20:07.76,0:20:13.94,Default,,0000,0000,0000,,more of the malware details will be\Nreleased in about 3 weeks. Now for me, Dialogue: 0,0:20:13.94,0:20:17.86,Default,,0000,0000,0000,,one of the things that has, I would\Nsay for my entire adult life been Dialogue: 0,0:20:17.86,0:20:21.50,Default,,0000,0000,0000,,very interesting to me and before\Nmy adult life started, was a system Dialogue: 0,0:20:21.50,0:20:23.83,Default,,0000,0000,0000,,known as Echelon. Anybody\Nhere remember that system? Dialogue: 0,0:20:23.83,0:20:26.35,Default,,0000,0000,0000,,{\i1}‘Woohoow’, and laughter{\i0} Dialogue: 0,0:20:26.35,0:20:29.08,Default,,0000,0000,0000,,{\i1}jokingly:{\i0} That’s the guy that built it!\N{\i1}more laughter{\i0} Dialogue: 0,0:20:29.08,0:20:33.51,Default,,0000,0000,0000,,I would guess… maybe not,\Nsorry, I don’t want to… trying to Dialogue: 0,0:20:33.51,0:20:37.55,Default,,0000,0000,0000,,snitch jacket you there… But Dialogue: 0,0:20:37.55,0:20:42.18,Default,,0000,0000,0000,,I think it’s to me extremely\Nimportant to hear about these Dialogue: 0,0:20:42.18,0:20:46.80,Default,,0000,0000,0000,,kinds of things, that sound totally crazy.\NLike the CIA torture report, for example. Dialogue: 0,0:20:46.80,0:20:50.90,Default,,0000,0000,0000,,That started out as a conspiracy [theory].\NAnd now we know, that America’s Dialogue: 0,0:20:50.90,0:20:56.44,Default,,0000,0000,0000,,official policy with the CIA was rape,\Nanal rehydration. Those were Dialogue: 0,0:20:56.44,0:21:01.38,Default,,0000,0000,0000,,conspiracy theories which\Nwe now know to be facts. Dialogue: 0,0:21:01.38,0:21:06.63,Default,,0000,0000,0000,,So Echelon, the rumour of Echelon was\Nthis notion of planetary surveillance. Dialogue: 0,0:21:06.63,0:21:11.40,Default,,0000,0000,0000,,And of course it was Duncan Campbell who\Nbrought this forward in an European Union Dialogue: 0,0:21:11.40,0:21:17.39,Default,,0000,0000,0000,,report. He, in fact, very clearly outlined\Nthe interception capabilities Dialogue: 0,0:21:17.39,0:21:23.88,Default,,0000,0000,0000,,of the U.S. Government and others.\NNow, it is hard to actually imagine Dialogue: 0,0:21:23.88,0:21:29.62,Default,,0000,0000,0000,,planetary surveillance, on a scale, let’s\Nsay, your home, and how your home Dialogue: 0,0:21:29.62,0:21:34.41,Default,,0000,0000,0000,,fits into your city, and your city how it\Nfits into a country, and the whole world. Dialogue: 0,0:21:34.41,0:21:38.86,Default,,0000,0000,0000,,And all of that being monitored.\NBut what we found is that Dialogue: 0,0:21:38.86,0:21:42.85,Default,,0000,0000,0000,,during the Crypto Wars we thought that we\Nhad won. We thought that we had a way, Dialogue: 0,0:21:42.85,0:21:46.97,Default,,0000,0000,0000,,really, to change things. We thought that\Nwith cryptography we would be able Dialogue: 0,0:21:46.97,0:21:52.26,Default,,0000,0000,0000,,to change the entire balance. Even if\Nsomething like planetary surveillance Dialogue: 0,0:21:52.26,0:21:55.51,Default,,0000,0000,0000,,would have come about. And so when\NDuncan Campbell released his reports Dialogue: 0,0:21:55.51,0:21:59.75,Default,,0000,0000,0000,,about Echelon in the very early 21st\Ncentury I think a lot of people weren’t Dialogue: 0,0:21:59.75,0:22:03.95,Default,,0000,0000,0000,,as concerned about it as they should\Nhave been. And shortly after that Dialogue: 0,0:22:03.95,0:22:09.23,Default,,0000,0000,0000,,the ‘War on Terror’ really got\Noff to a very, very big start. Dialogue: 0,0:22:09.23,0:22:13.97,Default,,0000,0000,0000,,It turns out that we weren’t as concerned\Nas we should have been in the right areas. Dialogue: 0,0:22:13.97,0:22:18.27,Default,,0000,0000,0000,,And we I think can say now, that the first\NCrypto Wars were not won and in fact Dialogue: 0,0:22:18.27,0:22:22.71,Default,,0000,0000,0000,,the first Crypto Wars were probably\N– if anything – lost, or they’re still Dialogue: 0,0:22:22.71,0:22:29.72,Default,,0000,0000,0000,,going on now. If we were to delineate that\Nand we were to talk about as an example, Dialogue: 0,0:22:29.72,0:22:33.22,Default,,0000,0000,0000,,the second Crypto Wars, what we would\Nfind is what has actually been happening Dialogue: 0,0:22:33.22,0:22:38.59,Default,,0000,0000,0000,,behind the scenes, and, thanks to Edward\NSnowden we actually have a great deal Dialogue: 0,0:22:38.59,0:22:43.53,Default,,0000,0000,0000,,of answers that we would\Nprobably not have otherwise. Dialogue: 0,0:22:43.53,0:22:55.73,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:22:55.73,0:23:01.28,Default,,0000,0000,0000,,Now, it is important to understand\Nthat the context of this Dialogue: 0,0:23:01.28,0:23:08.52,Default,,0000,0000,0000,,is the notion that everyone is suspicious.\NThat we live now in a world of total, Dialogue: 0,0:23:08.52,0:23:12.82,Default,,0000,0000,0000,,absolute surveillance which sometimes\Nmisses a thing, here or there. Dialogue: 0,0:23:12.82,0:23:15.94,Default,,0000,0000,0000,,But this is the goal: Collect it all!\NThat’s General Alexander’s notion. Dialogue: 0,0:23:15.94,0:23:20.76,Default,,0000,0000,0000,,When he talks about his notion\Ne.g. about dossiers it’s a trick. Dialogue: 0,0:23:20.76,0:23:24.73,Default,,0000,0000,0000,,It’s a rhetorical trick. Because what he\Nmeans to say is that now dossiers Dialogue: 0,0:23:24.73,0:23:29.92,Default,,0000,0000,0000,,are dynamic. And that this information is\Nnot stored on lists, written down like in, Dialogue: 0,0:23:29.92,0:23:33.25,Default,,0000,0000,0000,,let’s say, the 50s. Rather they’re\Nstored in databases that dynamically Dialogue: 0,0:23:33.25,0:23:37.70,Default,,0000,0000,0000,,will generate a list based on a query\Nfrom an analyst. “Give me every person Dialogue: 0,0:23:37.70,0:23:42.77,Default,,0000,0000,0000,,that went to this website at this time”.\NAnd it of course expands, the notion is Dialogue: 0,0:23:42.77,0:23:47.02,Default,,0000,0000,0000,,that somehow this will only be used\Nagainst terrorists. But what is a terrorist, Dialogue: 0,0:23:47.02,0:23:52.06,Default,,0000,0000,0000,,in this case? In some cases it actually\Nincludes people who are merely involved Dialogue: 0,0:23:52.06,0:23:57.98,Default,,0000,0000,0000,,in drugs, and part of that has been\Npublished as part of the JPEL kill lists. Dialogue: 0,0:23:57.98,0:24:02.66,Default,,0000,0000,0000,,That is to say: people who are definitely\Nnot terrorists, but who are otherwise Dialogue: 0,0:24:02.66,0:24:07.85,Default,,0000,0000,0000,,interesting targets, so there’s a sort of\N“bleed over”, and so we see the same thing Dialogue: 0,0:24:07.85,0:24:11.58,Default,,0000,0000,0000,,with surveillance and cryptography: It\Nwas for exceptional targets and now it is Dialogue: 0,0:24:11.58,0:24:18.34,Default,,0000,0000,0000,,for everyone. And so cryptography came\Nas a liberator. And that was the idea. Dialogue: 0,0:24:18.34,0:24:22.88,Default,,0000,0000,0000,,But just as we showed a little bit ago,\Nwith STELLAR where they targeted engineers Dialogue: 0,0:24:22.88,0:24:28.18,Default,,0000,0000,0000,,specifically to have access to the\Ninfrastructure, so, too, we find Dialogue: 0,0:24:28.18,0:24:34.13,Default,,0000,0000,0000,,that for cryptography they sabotage\Ncritical infrastructure. We found, in fact, Dialogue: 0,0:24:34.13,0:24:37.31,Default,,0000,0000,0000,,so many different interesting things that Dialogue: 0,0:24:37.31,0:24:41.71,Default,,0000,0000,0000,,it’s actually hard to talk about\Nit in only half an hour of time. Dialogue: 0,0:24:41.71,0:24:45.69,Default,,0000,0000,0000,,Laura: I’d like to just say, as one of\Nthe journalists who’s been publishing Dialogue: 0,0:24:45.69,0:24:49.56,Default,,0000,0000,0000,,on the documents I think that one of the\Nmost both important stories and the Dialogue: 0,0:24:49.56,0:24:53.70,Default,,0000,0000,0000,,most unsatisfying stories was the\NBULLRUN story that was published Dialogue: 0,0:24:53.70,0:24:57.53,Default,,0000,0000,0000,,by The New York Times, and the Guardian,\Nand ProPublica. Because it did warn us Dialogue: 0,0:24:57.53,0:25:01.51,Default,,0000,0000,0000,,of how the NSA was\Nattacking critical infrastructure Dialogue: 0,0:25:01.51,0:25:06.17,Default,,0000,0000,0000,,to make the internet insecure, and\Nyet it didn’t tell us any specifics of Dialogue: 0,0:25:06.17,0:25:09.02,Default,,0000,0000,0000,,what they meant by that. And this is\Nsomething that I think frustrated Dialogue: 0,0:25:09.02,0:25:12.08,Default,,0000,0000,0000,,many people in the audience, and so… Dialogue: 0,0:25:12.08,0:25:16.16,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:25:16.16,0:25:19.42,Default,,0000,0000,0000,,And so the reporting\Nthat Jake’s been doing Dialogue: 0,0:25:19.42,0:25:21.95,Default,,0000,0000,0000,,along with Aaron Gibson\Nand other people… Dialogue: 0,0:25:21.95,0:25:24.77,Default,,0000,0000,0000,,Jacob: Christian (?)…\Nthere in the audience. Dialogue: 0,0:25:24.77,0:25:28.13,Default,,0000,0000,0000,,Laura: … is to dig in and to find out\Nwhat those specifics are so that we can Dialogue: 0,0:25:28.13,0:25:33.58,Default,,0000,0000,0000,,actually warn people about what is safe\Nand what’s not safe in cryptography. Dialogue: 0,0:25:33.58,0:25:37.75,Default,,0000,0000,0000,,Jacob: So, we have, let’s say, a little\Nfree time we’re gonna talk about this… Dialogue: 0,0:25:37.75,0:25:41.88,Default,,0000,0000,0000,,but I’d like to do some surveys: Who here\Nuses PPTP? And don’t laugh at them Dialogue: 0,0:25:41.88,0:25:45.62,Default,,0000,0000,0000,,when they raise their hand, let\Nthem be honest… who uses it? Dialogue: 0,0:25:45.62,0:25:47.22,Default,,0000,0000,0000,,One guy!\N{\i1}laughter{\i0} Dialogue: 0,0:25:47.22,0:25:50.30,Default,,0000,0000,0000,,Ok, well, good news to this audience…\Nstop doing that, we’re gonna tell you why Dialogue: 0,0:25:50.30,0:25:55.53,Default,,0000,0000,0000,,in a second. {\i1}Laura laughs{\i0}\NWho here uses IPSEC? Dialogue: 0,0:25:55.53,0:26:00.38,Default,,0000,0000,0000,,With a pre-shared key?\NFantastic… Dialogue: 0,0:26:00.38,0:26:03.26,Default,,0000,0000,0000,,Stop doing that too…\N{\i1}laughter{\i0} Dialogue: 0,0:26:03.26,0:26:06.73,Default,,0000,0000,0000,,Raise your hand if you use SSH! Dialogue: 0,0:26:06.73,0:26:08.96,Default,,0000,0000,0000,,{\i1}even louder laughter{\i0}\N{\i1}Laura laughs{\i0} Dialogue: 0,0:26:08.96,0:26:14.49,Default,,0000,0000,0000,,Guess what…\N{\i1}laughter, slight applause{\i0} Dialogue: 0,0:26:14.49,0:26:19.05,Default,,0000,0000,0000,,In the documents that we’re publishing\Ntoday we are showing in fact a series Dialogue: 0,0:26:19.05,0:26:24.56,Default,,0000,0000,0000,,of systems that, if we\Nunderstand them correctly… Dialogue: 0,0:26:24.56,0:26:29.66,Default,,0000,0000,0000,,I wonder if I should say my next sentence…\NI say this only as myself and not as Laura. Dialogue: 0,0:26:29.66,0:26:34.75,Default,,0000,0000,0000,,I’d be surprised if some building weren’t\Nburning, frankly. But… the NSA claims Dialogue: 0,0:26:34.75,0:26:40.29,Default,,0000,0000,0000,,to have databases for decryption, or an\Nattack orchestration for PPTP and IPSEC, Dialogue: 0,0:26:40.29,0:26:48.71,Default,,0000,0000,0000,,which is not so surprising at all, but\Nalso for SSL and TLS, and… for SSH. Dialogue: 0,0:26:48.71,0:26:53.33,Default,,0000,0000,0000,,They have specific slides where they talk\Nabout the Debian weak number generation. Dialogue: 0,0:26:53.33,0:26:59.55,Default,,0000,0000,0000,,This is not that. For what we can tell\Nthey have separate programs for that. Dialogue: 0,0:26:59.55,0:27:03.88,Default,,0000,0000,0000,,So they of course have a way through the\Ncryptographic exploitation services, Dialogue: 0,0:27:03.88,0:27:07.96,Default,,0000,0000,0000,,crypto-analysis exploitation services, to\Ndo certain decrypts. Now, they say: Dialogue: 0,0:27:07.96,0:27:13.46,Default,,0000,0000,0000,,“We stress: potential!”. It seems to be\Nthere’s a pattern. And the pattern is Dialogue: 0,0:27:13.46,0:27:19.19,Default,,0000,0000,0000,,things that are done entirely in software,\Nin particular, those things as long as Dialogue: 0,0:27:19.19,0:27:23.69,Default,,0000,0000,0000,,there’s a good random number generator,\Nand especially if it is Free Software, Dialogue: 0,0:27:23.69,0:27:28.82,Default,,0000,0000,0000,,what we find is that it seems to stand\Nthe test of time. That doesn’t mean Dialogue: 0,0:27:28.82,0:27:33.34,Default,,0000,0000,0000,,that it always will, because we found\Na couple of things. One of the things Dialogue: 0,0:27:33.34,0:27:37.46,Default,,0000,0000,0000,,is that we found that they log the\Ncipher texts, and that they wait. Dialogue: 0,0:27:37.46,0:27:42.23,Default,,0000,0000,0000,,Sometimes to break it with brute-force, so\Nwe are also revealing today the location Dialogue: 0,0:27:42.23,0:27:46.61,Default,,0000,0000,0000,,of the two large supercomputers: That is\Nat Oak Ridge National Laboratories and at Dialogue: 0,0:27:46.61,0:27:52.42,Default,,0000,0000,0000,,Fort Meade, for a program called LONGHAUL.\NThe LONGHAUL I suppose as they Dialogue: 0,0:27:52.42,0:27:58.98,Default,,0000,0000,0000,,have named it appropriately, is for their\Nlong haul approach. Combined with things Dialogue: 0,0:27:58.98,0:28:03.37,Default,,0000,0000,0000,,like the massive data repository, or the\NMission Data Center, the Mission Data Dialogue: 0,0:28:03.37,0:28:08.61,Default,,0000,0000,0000,,repository in places like Bluffdale, Utah.\NThey plan and do store the cipher texts Dialogue: 0,0:28:08.61,0:28:12.68,Default,,0000,0000,0000,,of an unbelievable number of connections.\NWhen you make an SSL / TLS connection Dialogue: 0,0:28:12.68,0:28:19.48,Default,,0000,0000,0000,,the GCHQ keeps statistics. The Canadian\NCSE keeps statistics. They seem to log Dialogue: 0,0:28:19.48,0:28:25.44,Default,,0000,0000,0000,,metadata about the handshake in terms of\NTCP/IP, but also in terms of SSL and TLS Dialogue: 0,0:28:25.44,0:28:29.73,Default,,0000,0000,0000,,for the actual protocols. That is to say,\Nthey store the cryptographic handshakes, Dialogue: 0,0:28:29.73,0:28:35.39,Default,,0000,0000,0000,,and in some cases for specific selected\Ndata they take the entire flow. Now, Dialogue: 0,0:28:35.39,0:28:40.07,Default,,0000,0000,0000,,we have found claims that are kind\Nof amazing: in the case of BULLRUN Dialogue: 0,0:28:40.07,0:28:43.48,Default,,0000,0000,0000,,the New York Times and the Guardian,\Nand the rest of the collaborating Dialogue: 0,0:28:43.48,0:28:48.12,Default,,0000,0000,0000,,news organizations have often\Nleft out important details. Dialogue: 0,0:28:48.12,0:28:51.70,Default,,0000,0000,0000,,One of the important details which I find\Nto be the most shocking and upsetting Dialogue: 0,0:28:51.70,0:28:57.67,Default,,0000,0000,0000,,is that the British alone by\N2010 – was it? – had 832 people Dialogue: 0,0:28:57.67,0:29:04.62,Default,,0000,0000,0000,,right into their BULLRUN program. That is\N832 people knew about their backdooring Dialogue: 0,0:29:04.62,0:29:09.53,Default,,0000,0000,0000,,and sabotage of crypto, just\Nin the British Service alone. Dialogue: 0,0:29:09.53,0:29:13.59,Default,,0000,0000,0000,,And each of the Five-Eyes countries\Nruns a similar program, like that. Dialogue: 0,0:29:13.59,0:29:17.68,Default,,0000,0000,0000,,With potentially similar numbers of\Npeople right into those programs. Dialogue: 0,0:29:17.68,0:29:21.78,Default,,0000,0000,0000,,They say something like: “3 people\Ncan keep a secret if 2 are dead”. Dialogue: 0,0:29:21.78,0:29:27.16,Default,,0000,0000,0000,,How about 832 British men? I’m not\Nsure that that’s a really good bet. Dialogue: 0,0:29:27.16,0:29:31.55,Default,,0000,0000,0000,,And these guys have bet the farm on it.\NThat is to say, they have slides and Dialogue: 0,0:29:31.55,0:29:35.64,Default,,0000,0000,0000,,presentations and intercepts where\Nthey decrypt SSL, where they discuss Dialogue: 0,0:29:35.64,0:29:39.55,Default,,0000,0000,0000,,decrypting SSL at a scale starting in\Nthe tens of thousands, moving into the Dialogue: 0,0:29:39.55,0:29:43.59,Default,,0000,0000,0000,,hundreds and millions of thousands.\NHundreds of thousands, and millions, and Dialogue: 0,0:29:43.59,0:29:48.11,Default,,0000,0000,0000,,then into billions, actually. For TLS\Nand SSL they actually have statistics Dialogue: 0,0:29:48.11,0:29:53.46,Default,,0000,0000,0000,,on the order of billions. Of all the\Nmajor websites that everyone here Dialogue: 0,0:29:53.46,0:29:58.21,Default,,0000,0000,0000,,probably has used at one\Npoint or another in their life. Dialogue: 0,0:29:58.21,0:30:04.01,Default,,0000,0000,0000,,So, in the case of the Canadian Services\Nthey even monitored ‘Hockeytalk’, Dialogue: 0,0:30:04.01,0:30:07.44,Default,,0000,0000,0000,,to give you and idea about this. And they\Ntalk about it in terms of ‘warranted’ Dialogue: 0,0:30:07.44,0:30:11.86,Default,,0000,0000,0000,,collection, and special source\Ncollection, and encrypted traffic Dialogue: 0,0:30:11.86,0:30:16.95,Default,,0000,0000,0000,,indeed does stand out. They have\Nprograms like QUICKANT, which is a Dialogue: 0,0:30:16.95,0:30:21.45,Default,,0000,0000,0000,,specific way of interfacing with\Na program called FLYING PIG. Dialogue: 0,0:30:21.45,0:30:25.87,Default,,0000,0000,0000,,FLYING PIG is an SSL/TLS database,\Nit’s a knowledge database, Dialogue: 0,0:30:25.87,0:30:30.04,Default,,0000,0000,0000,,and QUICKANT seems to be what’s called\Na “Query Focused Data Set”. They try Dialogue: 0,0:30:30.04,0:30:35.53,Default,,0000,0000,0000,,to use that, from what we can tell,\Nfor doing low latency de-anonymization. Dialogue: 0,0:30:35.53,0:30:40.20,Default,,0000,0000,0000,,Some of the documents we’re releasing\Ntoday will explain some of their failures. Dialogue: 0,0:30:40.20,0:30:43.57,Default,,0000,0000,0000,,Now, I think it’s important to be\Ncautious about this because they have Dialogue: 0,0:30:43.57,0:30:48.74,Default,,0000,0000,0000,,many compartments for their data,\Nthat is to say they very clearly Dialogue: 0,0:30:48.74,0:30:52.97,Default,,0000,0000,0000,,have ways of keeping secrets even from\Nthemselves. But one of the things we found, Dialogue: 0,0:30:52.97,0:30:56.96,Default,,0000,0000,0000,,and that we’re publishing today also,\Nis a FISA intercept. And to the best Dialogue: 0,0:30:56.96,0:31:01.26,Default,,0000,0000,0000,,of my knowledge, and I think that this is\Ntrue, no one has ever published one Dialogue: 0,0:31:01.26,0:31:05.74,Default,,0000,0000,0000,,of these before. So, this is the basis for\Nwhat you would call ‘parallel construction’, Dialogue: 0,0:31:05.74,0:31:09.03,Default,,0000,0000,0000,,actually, where they gather Intelligence\Nand then they say, “whatever you do, Dialogue: 0,0:31:09.03,0:31:12.88,Default,,0000,0000,0000,,don’t use this in lawful investigation,\Ndon’t use this in a court, Dialogue: 0,0:31:12.88,0:31:18.08,Default,,0000,0000,0000,,it’s not evidence. But by the way,\Nhere it is”. So we’re publishing Dialogue: 0,0:31:18.08,0:31:23.25,Default,,0000,0000,0000,,one of those today and we have\Nsome, well, moderately good news. Dialogue: 0,0:31:23.25,0:31:27.35,Default,,0000,0000,0000,,In looking at these, what we have\Nfound is that they consistently break Dialogue: 0,0:31:27.35,0:31:31.13,Default,,0000,0000,0000,,various different types of encryption.\NSo if you’re mailing around a Microsoft Dialogue: 0,0:31:31.13,0:31:34.97,Default,,0000,0000,0000,,.doc document that’s password protected\Nthere’s a good chance that they Dialogue: 0,0:31:34.97,0:31:40.04,Default,,0000,0000,0000,,send it to LONGHAUL using a thing\Ncalled ISLANDTRANSPORT and then that, Dialogue: 0,0:31:40.04,0:31:45.55,Default,,0000,0000,0000,,if it can, through brute-force, is\Ndecrypted. And it is the case Dialogue: 0,0:31:45.55,0:31:49.49,Default,,0000,0000,0000,,that, when they do this decryption,\Nthey send it back and they include Dialogue: 0,0:31:49.49,0:31:53.82,Default,,0000,0000,0000,,the decrypted information in the FISA\Ntranscript. They do this for .rar files, Dialogue: 0,0:31:53.82,0:31:58.10,Default,,0000,0000,0000,,they do this for .doc files, they do this\Nfor a bunch of different systems. But we Dialogue: 0,0:31:58.10,0:32:01.18,Default,,0000,0000,0000,,don’t want to focus on what’s broken\Nbecause The New York Times and Dialogue: 0,0:32:01.18,0:32:04.92,Default,,0000,0000,0000,,The Guardian and other places have\Nalready sort of said “everything is fucked”. Dialogue: 0,0:32:04.92,0:32:08.28,Default,,0000,0000,0000,,We wanted to try to\Nmake it a positive talk! Dialogue: 0,0:32:08.28,0:32:17.76,Default,,0000,0000,0000,,{\i1}laughter and applause{\i0} Dialogue: 0,0:32:17.76,0:32:23.93,Default,,0000,0000,0000,,And… so I think Laura here is just\Ngoing to be able to show you in fact… Dialogue: 0,0:32:23.93,0:32:26.81,Default,,0000,0000,0000,,Laura: If it will play… Dialogue: 0,0:32:26.81,0:32:34.67,Default,,0000,0000,0000,,Jacob: Just drag it over… the other way… Dialogue: 0,0:32:34.67,0:32:39.57,Default,,0000,0000,0000,,So we wanted to show you… who here\Nhas heard about PRISM? Everyone? Dialogue: 0,0:32:39.57,0:32:42.22,Default,,0000,0000,0000,,What does that mean to you? It doesn’t\Nmean anything, right? We just know Dialogue: 0,0:32:42.22,0:32:45.62,Default,,0000,0000,0000,,that it’s some massive surveillance\Nprogram. We wanted to show you what Dialogue: 0,0:32:45.62,0:32:53.52,Default,,0000,0000,0000,,one of those PRISM records actually\Nlooks like which, in itself is, I think… Dialogue: 0,0:32:53.52,0:32:56.47,Default,,0000,0000,0000,,Laura: Sorry.\NJacob: It’s okay. Dialogue: 0,0:32:56.47,0:33:00.66,Default,,0000,0000,0000,,…it’s a rather unexciting document, except\Nfor the fact that we get to show it to you. Dialogue: 0,0:33:00.66,0:33:04.92,Default,,0000,0000,0000,,Which is great. [to Laura:]\NI think if you escape for the… Dialogue: 0,0:33:04.92,0:33:14.89,Default,,0000,0000,0000,,Laura: …escape out of here? Dialogue: 0,0:33:14.89,0:33:18.95,Default,,0000,0000,0000,,Jacob: There it is. Hey FBI, fuck you! Dialogue: 0,0:33:18.95,0:33:29.78,Default,,0000,0000,0000,,{\i1}laughter and applause{\i0} Dialogue: 0,0:33:29.78,0:33:33.27,Default,,0000,0000,0000,,So I take great pleasure in being able to\Nsay that this couldn’t have happened Dialogue: 0,0:33:33.27,0:33:42.63,Default,,0000,0000,0000,,without Laura!\N{\i1}cheers and applause{\i0} Dialogue: 0,0:33:42.63,0:33:48.05,Default,,0000,0000,0000,,But if you look here you see\N‘SIGAD US-984XN’. That’s PRISM! Dialogue: 0,0:33:48.05,0:33:53.62,Default,,0000,0000,0000,,And this is your dossier for PRISM.\N{\i1}some shouts from audience{\i0} Dialogue: 0,0:33:53.62,0:33:57.41,Default,,0000,0000,0000,,From audience: “O3”, “Larger!”\NLaura: Yeah. Dialogue: 0,0:33:57.41,0:34:00.47,Default,,0000,0000,0000,,{\i1}audience laughs{\i0}\N{\i1}document on screen is zoomed in{\i0} Dialogue: 0,0:34:00.47,0:34:05.14,Default,,0000,0000,0000,,{\i1}audience goes: “Aaaah!”{\i0}\N{\i1}cheers and applause{\i0} Dialogue: 0,0:34:05.14,0:34:08.48,Default,,0000,0000,0000,,And if you’re wondering about the\Nredactions, it’s all Andy Müller-Maguhn. Dialogue: 0,0:34:08.48,0:34:12.73,Default,,0000,0000,0000,,{\i1}slight laughter{\i0}\NShouted from audience: Fuck you!! Dialogue: 0,0:34:12.73,0:34:15.29,Default,,0000,0000,0000,,{\i1}Jacob laughs{\i0} Dialogue: 0,0:34:15.29,0:34:19.66,Default,,0000,0000,0000,,Jacob: Here’s the good news! The FBI\Nregularly lies to the American Public. Dialogue: 0,0:34:19.66,0:34:22.29,Default,,0000,0000,0000,,And to the rest of the world.\NThen they say they’re ‘going dark’. Dialogue: 0,0:34:22.29,0:34:25.90,Default,,0000,0000,0000,,What we found in the study of these\NFISA intercepts is that basically Dialogue: 0,0:34:25.90,0:34:31.06,Default,,0000,0000,0000,,no one uses cryptography. And basically\Neveryone that uses cryptography is broken, Dialogue: 0,0:34:31.06,0:34:37.63,Default,,0000,0000,0000,,except for – well, let’s say –\N2 things. Thing No.1 is OTR. Dialogue: 0,0:34:37.63,0:34:48.82,Default,,0000,0000,0000,,{\i1}big applause and cheers{\i0} Dialogue: 0,0:34:48.82,0:34:51.60,Default,,0000,0000,0000,,Very important to go with it is you’ll\Nnotice that there’s some metadata. Dialogue: 0,0:34:51.60,0:34:54.99,Default,,0000,0000,0000,,And it’s just metadata. But as the U.S.\NGovernment has said in public, they Dialogue: 0,0:34:54.99,0:35:00.70,Default,,0000,0000,0000,,kill people with metadata. So up there\Nyou’ll see that, I believe this was Yahoo, Dialogue: 0,0:35:00.70,0:35:03.50,Default,,0000,0000,0000,,is that right, Andy?\N{\i1}Andy M.-M. answers from audience{\i0} Dialogue: 0,0:35:03.50,0:35:07.88,Default,,0000,0000,0000,,Yeah, I think… it could be Gmail, or could\Nbe Yahoo, I forgot which one this one is. Dialogue: 0,0:35:07.88,0:35:11.35,Default,,0000,0000,0000,,We’re releasing, you know, enough\Nfor you to figure it out on your own. Dialogue: 0,0:35:11.35,0:35:15.12,Default,,0000,0000,0000,,Hopefully this isn’t you, if so, I’m\Nsorry we redacted your information. Dialogue: 0,0:35:15.12,0:35:18.100,Default,,0000,0000,0000,,Cause if it was me I wouldn’t want it to\Nbe redacted. But you’ll see that it’s Dialogue: 0,0:35:18.100,0:35:24.17,Default,,0000,0000,0000,,a user name, IP address as well as\Na time and a date. And you also see Dialogue: 0,0:35:24.17,0:35:28.65,Default,,0000,0000,0000,,other IP addresses associated with it. Those\Nare used for selector-based surveillance. Dialogue: 0,0:35:28.65,0:35:32.57,Default,,0000,0000,0000,,Which if you haven’t been following along\Nat home it means that they can take Dialogue: 0,0:35:32.57,0:35:35.77,Default,,0000,0000,0000,,that information, put it into other\Ndatabases, and the things like XKeyscore, Dialogue: 0,0:35:35.77,0:35:40.90,Default,,0000,0000,0000,,and pull up other information that will be\Nrelated. But most importantly here is, Dialogue: 0,0:35:40.90,0:35:45.62,Default,,0000,0000,0000,,you see what is essentially a chat log. As\Nif it had been created on your computer. Dialogue: 0,0:35:45.62,0:35:50.98,Default,,0000,0000,0000,,Now, don’t log – it’s rude. They did it\Nfor you anyway. And what you see is Dialogue: 0,0:35:50.98,0:35:55.45,Default,,0000,0000,0000,,“OC – No decrypt available for\Nthis OTR encrypted message”. Dialogue: 0,0:35:55.45,0:36:00.46,Default,,0000,0000,0000,,In other documents we see them saying\N“cryptographic exploitation services”. Dialogue: 0,0:36:00.46,0:36:06.59,Default,,0000,0000,0000,,“We can’t decrypt it, it’s off the\Nrecord”. Quite a nice endorsement! Dialogue: 0,0:36:06.59,0:36:12.84,Default,,0000,0000,0000,,And what we have also found is\Nthat they do the same thing for PGP. Dialogue: 0,0:36:12.84,0:36:23.72,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:36:23.72,0:36:28.22,Default,,0000,0000,0000,,Now in other cases they do decrypt the\Nmessages. So instead of telling you Dialogue: 0,0:36:28.22,0:36:32.95,Default,,0000,0000,0000,,about everything “It’s broken!”\Nwhat we wanted to do is to suggest: Dialogue: 0,0:36:32.95,0:36:37.77,Default,,0000,0000,0000,,“Look at the composition of OTR, find\NIan Goldberg who’s here somewhere, Dialogue: 0,0:36:37.77,0:36:41.57,Default,,0000,0000,0000,,ask him to review your cryptographic\Nprotocol”. Maybe don’t – he’s probably Dialogue: 0,0:36:41.57,0:36:47.82,Default,,0000,0000,0000,,already overwhelmed. But Snowden said\Nthis in the very beginning. He said: Dialogue: 0,0:36:47.82,0:36:50.85,Default,,0000,0000,0000,,“Cryptography, when properly implemented,\Nis one of the few things that you can Dialogue: 0,0:36:50.85,0:36:56.55,Default,,0000,0000,0000,,rely upon”. And he’s right. And we\Nsee this. This is the message. Dialogue: 0,0:36:56.55,0:37:01.32,Default,,0000,0000,0000,,These things are not to be used in legal\Nproceedings. And yet here we see them Dialogue: 0,0:37:01.32,0:37:06.04,Default,,0000,0000,0000,,anyway. And what we see is that even\Nthere, in the most illegal of settings, Dialogue: 0,0:37:06.04,0:37:11.50,Default,,0000,0000,0000,,essentially, they can’t decrypt it. Now the\Nsad part is that not everyone is using it. Dialogue: 0,0:37:11.50,0:37:14.72,Default,,0000,0000,0000,,But the good news is that when you use it,\Nit appears to work. When you verify Dialogue: 0,0:37:14.72,0:37:18.57,Default,,0000,0000,0000,,the fingerprint, e.g. We didn’t find\Nevidence of them doing active attacks Dialogue: 0,0:37:18.57,0:37:22.71,Default,,0000,0000,0000,,to do man-in-the-middle attacks. But\Nthat’s easy to solve. OTR allows you Dialogue: 0,0:37:22.71,0:37:28.22,Default,,0000,0000,0000,,to authenticate. PGP and Gnu-PG allow\Nyou to verify the fingerprint. We did find Dialogue: 0,0:37:28.22,0:37:32.38,Default,,0000,0000,0000,,evidence of them having databases, filled\Nwith cryptographic keys, that were pilfered Dialogue: 0,0:37:32.38,0:37:37.94,Default,,0000,0000,0000,,from routers, and compromising machines.\NSo rotate your keys frequently, Dialogue: 0,0:37:37.94,0:37:42.87,Default,,0000,0000,0000,,use protocols that are ephemeral. They\Nthemselves find that they are blinded Dialogue: 0,0:37:42.87,0:37:47.73,Default,,0000,0000,0000,,when you use properly implemented\Ncryptography. So Gnu-PG Dialogue: 0,0:37:47.73,0:37:53.19,Default,,0000,0000,0000,,– Werner Koch I think is in the audience –\NGnu-PG and OTR are 2 things that Dialogue: 0,0:37:53.19,0:37:57.72,Default,,0000,0000,0000,,actually stop the spies from\Nspying on you, with PRISM. Dialogue: 0,0:37:57.72,0:38:01.91,Default,,0000,0000,0000,,{\i1}applause, some cheers{\i0} Dialogue: 0,0:38:01.91,0:38:09.70,Default,,0000,0000,0000,,Laura: {\i1}to Jake{\i0} Would you mind if I ask…\Nfor a volunteer to … computers …? Dialogue: 0,0:38:09.70,0:38:13.95,Default,,0000,0000,0000,,Jacob: So, we have some other really\Ngood news. And that good news Dialogue: 0,0:38:13.95,0:38:21.14,Default,,0000,0000,0000,,is this: There are… in some of the\Nslides that are being released Dialogue: 0,0:38:21.14,0:38:24.12,Default,,0000,0000,0000,,a matrix – not ‘the Matrix’\Nthat you’re hoping for – Dialogue: 0,0:38:24.12,0:38:26.17,Default,,0000,0000,0000,,{\i1}laughter{\i0} Dialogue: 0,0:38:26.17,0:38:31.86,Default,,0000,0000,0000,,but we can talk about that program later\N{\i1}laughter{\i0} Dialogue: 0,0:38:31.86,0:38:39.00,Default,,0000,0000,0000,,I’m not even joking. But…\N{\i1}laughter{\i0} Dialogue: 0,0:38:39.00,0:38:43.34,Default,,0000,0000,0000,,There are some other things. One of the\Nthings that they talk about in this matrix Dialogue: 0,0:38:43.34,0:38:48.51,Default,,0000,0000,0000,,is, what’s hard, and what’s easy.\NAnd in the case of ‘Hard’ Dialogue: 0,0:38:48.51,0:38:55.18,Default,,0000,0000,0000,,they describe Redphone, and that means\NSignal, the program by Christine Corbett Dialogue: 0,0:38:55.18,0:39:02.83,Default,,0000,0000,0000,,and Moxy Marlinspike as ‘catastrophic’.\N{\i1}applause{\i0} Dialogue: 0,0:39:02.83,0:39:07.13,Default,,0000,0000,0000,,They say: “Tails and Tor – catastrophic”. Dialogue: 0,0:39:07.13,0:39:15.68,Default,,0000,0000,0000,,{\i1}cheers and applause{\i0} Dialogue: 0,0:39:15.68,0:39:19.08,Default,,0000,0000,0000,,So what that really means is that we\Nnow understand some things that Dialogue: 0,0:39:19.08,0:39:24.12,Default,,0000,0000,0000,,they have trouble with. And how they\Nwill take action to try to sabotage it Dialogue: 0,0:39:24.12,0:39:27.30,Default,,0000,0000,0000,,is clear. They will try to sabotage the\NRandom Number Generators like they did Dialogue: 0,0:39:27.30,0:39:31.79,Default,,0000,0000,0000,,with Dual_EC_DRBG. They will\Ntry to sabotage the platforms. Dialogue: 0,0:39:31.79,0:39:35.90,Default,,0000,0000,0000,,They will try to force companies to be\Ncomplicit. I think the German word is Dialogue: 0,0:39:35.90,0:39:40.39,Default,,0000,0000,0000,,‘Gleichschaltung’. You’re all familiar:\Nwith that? That is the process that is Dialogue: 0,0:39:40.39,0:39:45.43,Default,,0000,0000,0000,,happening now in America. With these\Ncrypto programs. That’s what PRISM is. Dialogue: 0,0:39:45.43,0:39:49.41,Default,,0000,0000,0000,,PRISM is when companies would like\Nto fight against it. And that’s not to Dialogue: 0,0:39:49.41,0:39:53.37,Default,,0000,0000,0000,,call them ‘victims’, most of them are\Nwilling. This is still what they’re Dialogue: 0,0:39:53.37,0:39:56.64,Default,,0000,0000,0000,,forced into. That is the legal regime.\NAnd it is when you take responsibility Dialogue: 0,0:39:56.64,0:40:00.20,Default,,0000,0000,0000,,using the strong crypto that you can\Nset that in a different direction. Dialogue: 0,0:40:00.20,0:40:04.17,Default,,0000,0000,0000,,Those companies actually can’t really\Nprotect you. They are, in fact, Dialogue: 0,0:40:04.17,0:40:11.11,Default,,0000,0000,0000,,secretly in some cases, and sometimes\Nwillingly, complicit in that. And, so Dialogue: 0,0:40:11.11,0:40:15.57,Default,,0000,0000,0000,,if you use Redphone and Signal, if you\Nuse something like Tor, and Gnu-PG Dialogue: 0,0:40:15.57,0:40:20.27,Default,,0000,0000,0000,,with a properly sized key – don’t\Nuse like a 768 bit RSA key Dialogue: 0,0:40:20.27,0:40:24.28,Default,,0000,0000,0000,,or something stupid like that…\NIf you use OTR, Dialogue: 0,0:40:24.28,0:40:29.83,Default,,0000,0000,0000,,if you use jabber.ccc.de – buy that guy\Nwho runs that a beer, by the way – Dialogue: 0,0:40:29.83,0:40:30.77,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:40:30.77,0:40:35.39,Default,,0000,0000,0000,,if you use these things in concert\Ntogether, you blind them. Dialogue: 0,0:40:35.39,0:40:37.88,Default,,0000,0000,0000,,So this is the good news. And the\Ndocuments that support this Dialogue: 0,0:40:37.88,0:40:42.50,Default,,0000,0000,0000,,are online. We have some other bad\Nnews, though. There exists a program Dialogue: 0,0:40:42.50,0:40:47.12,Default,,0000,0000,0000,,which they call ‘TUNDRA’. TUNDRA – it’s\Nnot exactly clear what the details are. Dialogue: 0,0:40:47.12,0:40:52.86,Default,,0000,0000,0000,,But they say that they have a handful\Nof crypto-analytic attacks on AES. Dialogue: 0,0:40:52.86,0:40:56.95,Default,,0000,0000,0000,,Obviously they can’t break AES, or\Nthey would be able to break OTR. Dialogue: 0,0:40:56.95,0:41:01.04,Default,,0000,0000,0000,,But what it suggests is that they\Nhave a conflict of interest. Dialogue: 0,0:41:01.04,0:41:04.51,Default,,0000,0000,0000,,Well, they’re both supposed\Nto protect our information Dialogue: 0,0:41:04.51,0:41:08.86,Default,,0000,0000,0000,,and, of course, to exploit it. If they\Nhave attacks against AES, much like Dialogue: 0,0:41:08.86,0:41:12.48,Default,,0000,0000,0000,,if they have attacks against SSH as they\Nclaim in the Caprius database, Dialogue: 0,0:41:12.48,0:41:16.68,Default,,0000,0000,0000,,in that program then it shows that\Nconflict of interest runs very deep. Dialogue: 0,0:41:16.68,0:41:19.69,Default,,0000,0000,0000,,Against our critical infrastructure.\NAgainst the most important systems Dialogue: 0,0:41:19.69,0:41:25.15,Default,,0000,0000,0000,,that exist. Protect our data. And it\Nshows a sort of hegemonic arrogance. Dialogue: 0,0:41:25.15,0:41:28.67,Default,,0000,0000,0000,,And that arrogance is to suggest that\Nthey’ll always be on top. I had Dialogue: 0,0:41:28.67,0:41:32.64,Default,,0000,0000,0000,,the misfortune of meeting General\NAlexander, quite recently. In Germany. Dialogue: 0,0:41:32.64,0:41:39.28,Default,,0000,0000,0000,,And after failing to have him arrested,\Nwhich was a funny story in itself, Dialogue: 0,0:41:39.28,0:41:43.77,Default,,0000,0000,0000,,I asked him what he thought he was doing.\NAnother person there stood up and said: Dialogue: 0,0:41:43.77,0:41:48.55,Default,,0000,0000,0000,,“What about who comes after you next?” And\Nhe didn’t quite understand the question. Dialogue: 0,0:41:48.55,0:41:53.13,Default,,0000,0000,0000,,But his answer was pretty eerie: He\Nsaid: “Nobody comes after us next”. Dialogue: 0,0:41:53.13,0:41:56.53,Default,,0000,0000,0000,,{\i1}faint laughter{\i0} Dialogue: 0,0:41:56.53,0:42:00.35,Default,,0000,0000,0000,,“Thousand-year Reich”. That is\Nexactly what he was saying. And Dialogue: 0,0:42:00.35,0:42:03.92,Default,,0000,0000,0000,,when I confronted him about accountability\Nfor things like kill lists, and crypto Dialogue: 0,0:42:03.92,0:42:07.85,Default,,0000,0000,0000,,he said that he was just\Nfollowing orders. Literately. Dialogue: 0,0:42:07.85,0:42:11.83,Default,,0000,0000,0000,,{\i1}laughter and some applause{\i0} Dialogue: 0,0:42:11.83,0:42:16.56,Default,,0000,0000,0000,,So. Now we know what blinds\Nthem. And we understand Dialogue: 0,0:42:16.56,0:42:20.45,Default,,0000,0000,0000,,what they do with things when they’re\Nnot blinded. Their politics include Dialogue: 0,0:42:20.45,0:42:24.66,Default,,0000,0000,0000,,assassinations but it doesn’t just\Nend there. It includes torture, Dialogue: 0,0:42:24.66,0:42:29.65,Default,,0000,0000,0000,,it includes kidnapping. It includes buying\Npeople. And then sending their bodies home Dialogue: 0,0:42:29.65,0:42:35.32,Default,,0000,0000,0000,,with a number. Instead of a name.\NIt includes de-humanizing them. Dialogue: 0,0:42:35.32,0:42:39.36,Default,,0000,0000,0000,,So we want to encourage everyone here to\Nfeel empowered with this knowledge, Dialogue: 0,0:42:39.36,0:42:45.28,Default,,0000,0000,0000,,which is a little difficult. But, Werner\NKoch, are you in the room? Dialogue: 0,0:42:45.28,0:42:47.71,Default,,0000,0000,0000,,{\i1}positive{\i0}\NCould you stand up? Dialogue: 0,0:42:47.71,0:42:53.09,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:42:53.09,0:42:56.86,Default,,0000,0000,0000,,Stay, stand there, just\Nstay, stand there! Dialogue: 0,0:42:56.86,0:43:01.51,Default,,0000,0000,0000,,Laura: Stay up, stand up!\NJacob: And Ian Goldberg, Dialogue: 0,0:43:01.51,0:43:03.51,Default,,0000,0000,0000,,are you in the room?\NI’m sorry to do this… Dialogue: 0,0:43:03.51,0:43:11.98,Default,,0000,0000,0000,,There is Ian!\N{\i1}ongoing applause{\i0} Dialogue: 0,0:43:11.98,0:43:15.41,Default,,0000,0000,0000,,…and Christine Corbett…\NChristine Corbett, are you in the room? Dialogue: 0,0:43:15.41,0:43:18.67,Default,,0000,0000,0000,,From Signal?\NLaura: Stay… keep standing! Dialogue: 0,0:43:18.67,0:43:23.93,Default,,0000,0000,0000,,Jacob: Stand up! Stand up!\N{\i1}applause{\i0} Dialogue: 0,0:43:23.93,0:43:29.72,Default,,0000,0000,0000,,These people, without even knowing it,\Nwithout even trying, they beat them! Dialogue: 0,0:43:29.72,0:43:47.22,Default,,0000,0000,0000,,{\i1}cheers and strong applause{\i0} Dialogue: 0,0:43:47.22,0:43:56.50,Default,,0000,0000,0000,,Laura: So,… Dialogue: 0,0:43:56.50,0:44:00.47,Default,,0000,0000,0000,,don’t sit down guys! So,\Nlast night I screened my film Dialogue: 0,0:44:00.47,0:44:03.50,Default,,0000,0000,0000,,“Citizenfour” here, and there were some\Nquestions, and somebody asked Dialogue: 0,0:44:03.50,0:44:10.22,Default,,0000,0000,0000,,what can they do to support the work that\NSnowden has done, and the journalists. Dialogue: 0,0:44:10.22,0:44:13.22,Default,,0000,0000,0000,,And actually what I should have said\Nand I didn’t say in the moment is that Dialogue: 0,0:44:13.22,0:44:17.91,Default,,0000,0000,0000,,actually everybody should fund the work\Nthat you guys do. And I mean that, Dialogue: 0,0:44:17.91,0:44:22.63,Default,,0000,0000,0000,,because, literally, my work would not be\Npossible without the work that you do. Dialogue: 0,0:44:22.63,0:44:27.59,Default,,0000,0000,0000,,So I would like it if everybody in this\Nroom when they leave here in the next week Dialogue: 0,0:44:27.59,0:44:31.04,Default,,0000,0000,0000,,to reach out and fund these projects.\NBecause without these projects Dialogue: 0,0:44:31.04,0:44:38.26,Default,,0000,0000,0000,,the journalism that Glenn and I, and Jake\Nhave done would literally not be possible. Dialogue: 0,0:44:38.26,0:44:49.53,Default,,0000,0000,0000,,{\i1}strong applause, some cheers{\i0} Dialogue: 0,0:44:49.53,0:44:58.51,Default,,0000,0000,0000,,And… Dialogue: 0,0:44:58.51,0:45:02.13,Default,,0000,0000,0000,,Jacob: Just to be clear, since this video\Nwill definitely be played at a grand jury Dialogue: 0,0:45:02.13,0:45:06.01,Default,,0000,0000,0000,,against the both of us, I wanna make\Nit perfectly clear that defense Dialogue: 0,0:45:06.01,0:45:10.41,Default,,0000,0000,0000,,of the U.S. Constitution is the Supreme\Ndefense, your honor! And, secondly, Dialogue: 0,0:45:10.41,0:45:13.42,Default,,0000,0000,0000,,that those gentlemen had nothing\Nto do with any of this at all! Dialogue: 0,0:45:13.42,0:45:16.48,Default,,0000,0000,0000,,{\i1}laughter, some applause{\i0} Dialogue: 0,0:45:16.48,0:45:21.02,Default,,0000,0000,0000,,So, now, hold your applause, I’m sorry.\NI mean – they deserve it forever. Dialogue: 0,0:45:21.02,0:45:24.82,Default,,0000,0000,0000,,If it wasn’t for them we definitely would\Nnot have made it here today. So it is Dialogue: 0,0:45:24.82,0:45:29.03,Default,,0000,0000,0000,,Free Software. For freedom, literately,\Nas Richard Stallman talks about it. Dialogue: 0,0:45:29.03,0:45:32.70,Default,,0000,0000,0000,,Empowered, with strong mathematics,\Nproperly implemented Dialogue: 0,0:45:32.70,0:45:37.32,Default,,0000,0000,0000,,that made this possible. It is not\Nhopeless. It is, in fact, the case Dialogue: 0,0:45:37.32,0:45:40.94,Default,,0000,0000,0000,,that resistance is possible. And, in fact,\NI think the CCC… If I have learned Dialogue: 0,0:45:40.94,0:45:45.30,Default,,0000,0000,0000,,one lesson from the Chaos\NComputer Club and this community – Dialogue: 0,0:45:45.30,0:45:50.38,Default,,0000,0000,0000,,it’s that it’s mandatory. That we have\Na duty to do something about these things. Dialogue: 0,0:45:50.38,0:45:54.59,Default,,0000,0000,0000,,And we can do something about it.\NSo what we need to recognize, Dialogue: 0,0:45:54.59,0:45:58.74,Default,,0000,0000,0000,,and what I hope that we can bring\Nto you is that there is great risk, Dialogue: 0,0:45:58.74,0:46:02.18,Default,,0000,0000,0000,,for Laura, in particular. In making\Nthese kinds of things possible. Dialogue: 0,0:46:02.18,0:46:05.56,Default,,0000,0000,0000,,But that we are in it together.\NWhen Julian and I gave a talk Dialogue: 0,0:46:05.56,0:46:08.91,Default,,0000,0000,0000,,with Sarah Harrison last year, and we\Ntalked about “Sysadmins of the world, Dialogue: 0,0:46:08.91,0:46:13.41,Default,,0000,0000,0000,,uniting” we didn’t just mean\Nsysadmins. We meant: Dialogue: 0,0:46:13.41,0:46:17.82,Default,,0000,0000,0000,,recognize your class interests, and\Nunderstand that this is the community Dialogue: 0,0:46:17.82,0:46:22.98,Default,,0000,0000,0000,,that you are a part of. At least a small\Npart of. And that we’re in it together. Dialogue: 0,0:46:22.98,0:46:27.89,Default,,0000,0000,0000,,We need people like Christine Corbett,\Nworking on Signal. We need people Dialogue: 0,0:46:27.89,0:46:32.57,Default,,0000,0000,0000,,like Ian Goldberg breaking protocols and\Nbuilding things like OTR. And Werner Koch. Dialogue: 0,0:46:32.57,0:46:36.77,Default,,0000,0000,0000,,We need Adam Langley building things\Nlike Pond. But we need everybody to do Dialogue: 0,0:46:36.77,0:46:41.01,Default,,0000,0000,0000,,whatever they can to help with these\Nthings. It requires everyone; and Dialogue: 0,0:46:41.01,0:46:45.20,Default,,0000,0000,0000,,every skill is valuable to contribute to\Nthat. From all the people that work on Tor Dialogue: 0,0:46:45.20,0:46:50.26,Default,,0000,0000,0000,,to people that work on Debian. That work\Non free software, for freedom, literately. Dialogue: 0,0:46:50.26,0:46:55.33,Default,,0000,0000,0000,,So what we wanted to do was to say that we\Nshould align with these class interests. Dialogue: 0,0:46:55.33,0:46:58.92,Default,,0000,0000,0000,,And that we should recognize them. And\Nthat we should work together to do that. Dialogue: 0,0:46:58.92,0:47:03.34,Default,,0000,0000,0000,,And it is this community who can help\Nto really change things in the rest Dialogue: 0,0:47:03.34,0:47:06.64,Default,,0000,0000,0000,,of the world. Because it is in fact only\Nthis community and some of the people Dialogue: 0,0:47:06.64,0:47:11.53,Default,,0000,0000,0000,,in this room, and around the world to tie\Nin to it, that have blinded these people! Dialogue: 0,0:47:11.53,0:47:15.85,Default,,0000,0000,0000,,Everyone else seems to have\Neither gone complicitly; Dialogue: 0,0:47:15.85,0:47:19.56,Default,,0000,0000,0000,,or they have designed it\Nincompetently and broken, Dialogue: 0,0:47:19.56,0:47:23.87,Default,,0000,0000,0000,,and it is not good. So that\Nis important to recognize. Dialogue: 0,0:47:23.87,0:47:28.05,Default,,0000,0000,0000,,Every person, if you are here you are\Nout of a small set of people in the world, Dialogue: 0,0:47:28.05,0:47:32.25,Default,,0000,0000,0000,,use that power wisely. Help these people\Nto do that. And that will help us all Dialogue: 0,0:47:32.25,0:47:35.100,Default,,0000,0000,0000,,to continue. Not only to reveal these\Nthings but to fundamentally shift Dialogue: 0,0:47:35.100,0:47:41.14,Default,,0000,0000,0000,,and change that. For everyone, for the\Nwhole planet. Without any exception. Dialogue: 0,0:47:41.14,0:47:44.77,Default,,0000,0000,0000,,So, on that note we’d like\Nto take some questions!? Dialogue: 0,0:47:44.77,0:47:46.29,Default,,0000,0000,0000,,Laura: Yeah! Dialogue: 0,0:47:46.29,0:48:01.74,Default,,0000,0000,0000,,{\i1}strong applause and cheers{\i0} Dialogue: 0,0:48:01.74,0:48:05.13,Default,,0000,0000,0000,,{\i1}Herald waving at the speakers\Nto approach stage center{\i0} Dialogue: 0,0:48:05.13,0:48:16.95,Default,,0000,0000,0000,,{\i1}standing ovations{\i0} Dialogue: 0,0:48:16.95,0:48:22.05,Default,,0000,0000,0000,,{\i1}Herald gently pushing the\Nspeakers to stage center{\i0} Dialogue: 0,0:48:22.05,0:48:48.38,Default,,0000,0000,0000,,{\i1}continued standing ovations{\i0} Dialogue: 0,0:48:48.38,0:49:01.74,Default,,0000,0000,0000,,Laura: Thank you!\N{\i1}continued standing ovations{\i0} Dialogue: 0,0:49:01.74,0:49:04.74,Default,,0000,0000,0000,,Jacob: Wow!\NHerald: So, everybody who has a question Dialogue: 0,0:49:04.74,0:49:09.60,Default,,0000,0000,0000,,please stand in front of\None of the 6 microphones Dialogue: 0,0:49:09.60,0:49:14.30,Default,,0000,0000,0000,,that are in this room, and,\NSignal Angel? Are you there? Dialogue: 0,0:49:14.30,0:49:18.52,Default,,0000,0000,0000,,Signal Angel: Yeah, I’m here!\NHerald: Are there questions from the internet? Dialogue: 0,0:49:18.52,0:49:22.51,Default,,0000,0000,0000,,Signal Angel: Yeah, so the first one would\Nbe: What should we do about SSH now? Dialogue: 0,0:49:22.51,0:49:25.82,Default,,0000,0000,0000,,{\i1}laughter{\i0}\N{\i1}Laura laughs{\i0} Dialogue: 0,0:49:25.82,0:49:28.07,Default,,0000,0000,0000,,Jacob: Well,\N{\i1}to Laura:{\i0} shall I? Dialogue: 0,0:49:28.07,0:49:32.12,Default,,0000,0000,0000,,Laura: Yeah.\NJacob: I wanna be clear. Dialogue: 0,0:49:32.12,0:49:36.86,Default,,0000,0000,0000,,We don’t understand, we only know what\Nthey claim. And I don’t wanna hide that Dialogue: 0,0:49:36.86,0:49:41.20,Default,,0000,0000,0000,,and say that they didn’t claim anything.\NBut they do have claim. They claim Dialogue: 0,0:49:41.20,0:49:46.26,Default,,0000,0000,0000,,it as potential. What I would say is:\Nwhat about these NIST curves? Dialogue: 0,0:49:46.26,0:49:51.43,Default,,0000,0000,0000,,What about NIST-anything? The documents\Nthat we’ve released specifically talk Dialogue: 0,0:49:51.43,0:49:55.08,Default,,0000,0000,0000,,about something that’s very scary.\NThey say that it is Top Secret, Dialogue: 0,0:49:55.08,0:49:59.12,Default,,0000,0000,0000,,in a classification guide, that the\NNSA and the CIA work together Dialogue: 0,0:49:59.12,0:50:02.87,Default,,0000,0000,0000,,to subvert standards. And we even released\Nas part of the story an example of them Dialogue: 0,0:50:02.87,0:50:08.18,Default,,0000,0000,0000,,going – the NSA, that is –\Nto an IETF meeting Dialogue: 0,0:50:08.18,0:50:12.36,Default,,0000,0000,0000,,to enhance surveillance\Nwith regard to Voice-over-IP. Dialogue: 0,0:50:12.36,0:50:16.95,Default,,0000,0000,0000,,They’re literally amongst us. So\Nwhat do we do? First, find them. Dialogue: 0,0:50:16.95,0:50:20.01,Default,,0000,0000,0000,,Second, stop them!\N{\i1}mumbles and faint applause{\i0} Dialogue: 0,0:50:20.01,0:50:23.54,Default,,0000,0000,0000,,Question: Thank you!\NHerald: Microphone 2, please! Dialogue: 0,0:50:23.54,0:50:26.18,Default,,0000,0000,0000,,Question: Can you talk about, do you\Nplan on releasing the source material, Dialogue: 0,0:50:26.18,0:50:29.24,Default,,0000,0000,0000,,eventually? Or will it always be redacted? Dialogue: 0,0:50:29.24,0:50:33.100,Default,,0000,0000,0000,,Jacob: Well, some of this is already\Nout right now, without redactions. Dialogue: 0,0:50:33.100,0:50:37.72,Default,,0000,0000,0000,,With the exception of\Nvery few sets of redactions. Dialogue: 0,0:50:37.72,0:50:41.48,Default,,0000,0000,0000,,For agent’s names, and things where\Nlegally… we will go to prison. I mean, Dialogue: 0,0:50:41.48,0:50:43.63,Default,,0000,0000,0000,,I’m not adverse to that.\NBut I’d like to wait a while. Dialogue: 0,0:50:43.63,0:50:46.44,Default,,0000,0000,0000,,{\i1}laughter{\i0} Dialogue: 0,0:50:46.44,0:50:48.52,Default,,0000,0000,0000,,Question: What about\Nin 15..20 year’s time? Dialogue: 0,0:50:48.52,0:50:51.51,Default,,0000,0000,0000,,Laura: Yeah, I mean, I think there\Nare 2 questions there as how to… Dialogue: 0,0:50:51.51,0:50:54.39,Default,,0000,0000,0000,,scaling (?) the reporting. But I agree,\Nit needs to happen. And I think Dialogue: 0,0:50:54.39,0:50:57.71,Default,,0000,0000,0000,,it’s a valid criticism. I need to do more\Nof it. I think certain things, I think, Dialogue: 0,0:50:57.71,0:51:01.45,Default,,0000,0000,0000,,will… I would say should continue to\Nbe redacted, at least for the short term. Dialogue: 0,0:51:01.45,0:51:03.96,Default,,0000,0000,0000,,Which I think is like there are a lot of\Nnames, you know, e-mail addresses, Dialogue: 0,0:51:03.96,0:51:07.15,Default,,0000,0000,0000,,phone numbers. All these kinds of\Nspecifics, I think, we’ll continue to redact. Dialogue: 0,0:51:07.15,0:51:10.91,Default,,0000,0000,0000,,And then we’re working on scaling.\NI haven’t really had time to think about Dialogue: 0,0:51:10.91,0:51:14.44,Default,,0000,0000,0000,,15 years from now. So, but of\Ncourse, I think at some point Dialogue: 0,0:51:14.44,0:51:18.30,Default,,0000,0000,0000,,this questions-of-names becomes\Nless of an issue. But I do here Dialogue: 0,0:51:18.30,0:51:20.89,Default,,0000,0000,0000,,the criticism that we need\Nto be doing more publishing! Dialogue: 0,0:51:20.89,0:51:25.44,Default,,0000,0000,0000,,Jacob: If we live that long! I hope\Nyou’ll help us! {\i1}Laura laughs{\i0} Dialogue: 0,0:51:25.44,0:51:28.77,Default,,0000,0000,0000,,Next question?\NHerald: Next question from the internet, please! Dialogue: 0,0:51:28.77,0:51:32.12,Default,,0000,0000,0000,,Signal Angel: So how reliable\Nis this source on OTR, Dialogue: 0,0:51:32.12,0:51:35.56,Default,,0000,0000,0000,,can that be verified with\Na second source, somehow? Dialogue: 0,0:51:35.56,0:51:38.87,Default,,0000,0000,0000,,Jacob: Well, I think that’s\Na really good question. Dialogue: 0,0:51:38.87,0:51:42.56,Default,,0000,0000,0000,,From what we know, cryptographically,\NOTR which has been analyzed Dialogue: 0,0:51:42.56,0:51:46.40,Default,,0000,0000,0000,,by a number of people hasn’t been broken. Dialogue: 0,0:51:46.40,0:51:49.70,Default,,0000,0000,0000,,And what it appears to be the\Ncase in these FISA intercepts, Dialogue: 0,0:51:49.70,0:51:54.18,Default,,0000,0000,0000,,alone, that is one set of things. Where\Nthey produce one set of evidence Dialogue: 0,0:51:54.18,0:51:58.70,Default,,0000,0000,0000,,from one set of people. And there are\Nother documents, from a different section, Dialogue: 0,0:51:58.70,0:52:03.52,Default,,0000,0000,0000,,from different agencies, that essentially\Nsay something completely the same. Dialogue: 0,0:52:03.52,0:52:09.39,Default,,0000,0000,0000,,That is: Everything we see seems\Nto support that. And I would say Dialogue: 0,0:52:09.39,0:52:13.18,Default,,0000,0000,0000,,maybe Julian is not the best\Nexample of how great OTR is. Dialogue: 0,0:52:13.18,0:52:17.60,Default,,0000,0000,0000,,But I think I am. I rely on it every day\Nfor almost all of my communications. Dialogue: 0,0:52:17.60,0:52:22.05,Default,,0000,0000,0000,,And I feel pretty confident, combined\Nwith this, as well as talking with people Dialogue: 0,0:52:22.05,0:52:26.21,Default,,0000,0000,0000,,in the Intelligence community\Nwho actually use OTR, and PGP, Dialogue: 0,0:52:26.21,0:52:30.41,Default,,0000,0000,0000,,amazingly enough. So I feel\Npretty good about it. And Dialogue: 0,0:52:30.41,0:52:34.96,Default,,0000,0000,0000,,the most important part is that they don’t\Nhave super powers. They have backdoors. Dialogue: 0,0:52:34.96,0:52:39.59,Default,,0000,0000,0000,,E.g. I really would encourage people\Nto look at the Cavium (?) hardware. Dialogue: 0,0:52:39.59,0:52:43.46,Default,,0000,0000,0000,,I don’t really know why. But it seems\Nto be that they’re obsessed with this. Dialogue: 0,0:52:43.46,0:52:46.92,Default,,0000,0000,0000,,And you can look at the documents and\Nyou can see that. Look at the hardware. Dialogue: 0,0:52:46.92,0:52:51.06,Default,,0000,0000,0000,,Crypto hardware. And imagine that it’s\Ncompromised. They spend tens of millions Dialogue: 0,0:52:51.06,0:52:54.74,Default,,0000,0000,0000,,of Dollars to backdoor these things. And\Nthey work with agencies around the world Dialogue: 0,0:52:54.74,0:52:59.33,Default,,0000,0000,0000,,to make that happen. So, would make\Nsense that OTR would be safe, actually. Dialogue: 0,0:52:59.33,0:53:02.52,Default,,0000,0000,0000,,It doesn’t interface with any hardware.\NAnd it would make sense because the math Dialogue: 0,0:53:02.52,0:53:08.86,Default,,0000,0000,0000,,seems to be good. And it seems to be vetted.\NAnd that seems to be their weakness. Dialogue: 0,0:53:08.86,0:53:13.54,Default,,0000,0000,0000,,Question: Thanks.\NHerald: Number 4, please! Dialogue: 0,0:53:13.54,0:53:16.47,Default,,0000,0000,0000,,Question: Hello. I have… actually, it may\Nbe a little odd question. But I wanted Dialogue: 0,0:53:16.47,0:53:22.01,Default,,0000,0000,0000,,to ask it anyway. Regarding the\Nterm ‘War on Terror’ in general. Dialogue: 0,0:53:22.01,0:53:26.77,Default,,0000,0000,0000,,Because all of these things, the\NTorture Report, the NSA spying, Dialogue: 0,0:53:26.77,0:53:31.47,Default,,0000,0000,0000,,is all being done in the name of\Nthe ‘War on Terror’. Even though Dialogue: 0,0:53:31.47,0:53:35.32,Default,,0000,0000,0000,,we know a number of the people who were\Ntortured were innocent and were in no way Dialogue: 0,0:53:35.32,0:53:41.62,Default,,0000,0000,0000,,terrorists. We know torture does not\Nwork as an interrogation method. Dialogue: 0,0:53:41.62,0:53:45.38,Default,,0000,0000,0000,,And we know a vast majority of the people\Nwho are being spied on are completely Dialogue: 0,0:53:45.38,0:53:50.33,Default,,0000,0000,0000,,innocent and did nothing wrong. And\NI wanted to know whether maybe we might Dialogue: 0,0:53:50.33,0:53:54.69,Default,,0000,0000,0000,,actually be inadvertently lending (?) an\Namount of credibility to the whole thing Dialogue: 0,0:53:54.69,0:53:59.76,Default,,0000,0000,0000,,by using the term\N‘War on Terror’ in the first place. Dialogue: 0,0:53:59.76,0:54:02.56,Default,,0000,0000,0000,,Laura: Yeah, I mean, actually, I think…\NRight, we’re talking about ‘Reconstructing Dialogue: 0,0:54:02.56,0:54:05.58,Default,,0000,0000,0000,,Narratives’, and that’s maybe one we\Nshould binoc (?). This is really the Dialogue: 0,0:54:05.58,0:54:09.97,Default,,0000,0000,0000,,‘War on pretty much Everyone’.\NAnd so, I agree with that. Dialogue: 0,0:54:09.97,0:54:13.74,Default,,0000,0000,0000,,I think… and I stopped using it for\Na long time. I think that I began Dialogue: 0,0:54:13.74,0:54:17.70,Default,,0000,0000,0000,,re-using it, I think,\Nwhen nothing changed. Dialogue: 0,0:54:17.70,0:54:20.40,Default,,0000,0000,0000,,And, in fact, I think I was one of those\Npeople who thought things were changed Dialogue: 0,0:54:20.40,0:54:23.30,Default,,0000,0000,0000,,under Obama. And there would be some\Naccountability, like if you torture people Dialogue: 0,0:54:23.30,0:54:27.50,Default,,0000,0000,0000,,you’re held accountable for torturing\Npeople. And then there didn’t. So, Dialogue: 0,0:54:27.50,0:54:30.71,Default,,0000,0000,0000,,yeah, I agree, we need a new term for that\Nto describe… Mainly, (?) some people are Dialogue: 0,0:54:30.71,0:54:35.51,Default,,0000,0000,0000,,calling it the ‘Endless War’, which\NI hope is that isn’t actually true. Dialogue: 0,0:54:35.51,0:54:39.05,Default,,0000,0000,0000,,But I do think that that’s a term that Dialogue: 0,0:54:39.05,0:54:44.16,Default,,0000,0000,0000,,comes with the narrative\Nof the Government. Dialogue: 0,0:54:44.16,0:54:47.35,Default,,0000,0000,0000,,Jacob: I think, because I’ve been living in\NGermany for a while I actually don’t use Dialogue: 0,0:54:47.35,0:54:50.100,Default,,0000,0000,0000,,the ‘War on Terror’ as a sentence,\Never. I say ‘Imperialist War’. Dialogue: 0,0:54:50.100,0:54:54.36,Default,,0000,0000,0000,,Because that’s what it is. It’s Imperialist\Nwar. And it’s an Imperialist war on you, Dialogue: 0,0:54:54.36,0:54:58.45,Default,,0000,0000,0000,,as a person, your liberties. It’s not\Nabout privacy. It’s about choice. Dialogue: 0,0:54:58.45,0:55:02.35,Default,,0000,0000,0000,,It’s about dignity. It’s about agency.\NAnd of course, I mean these guys Dialogue: 0,0:55:02.35,0:55:06.52,Default,,0000,0000,0000,,are murderers and rapists. We\Nshouldn’t dignify them. I mean they’re Dialogue: 0,0:55:06.52,0:55:10.30,Default,,0000,0000,0000,,absolutely awful. The Torture Report\Nreally shows that. But it doesn’t matter Dialogue: 0,0:55:10.30,0:55:15.36,Default,,0000,0000,0000,,that torture doesn’t work. That’s like\N– as is often said – you know this notion Dialogue: 0,0:55:15.36,0:55:20.54,Default,,0000,0000,0000,,like, what (?) is slavery economically\Nviable? Who fucking cares? It’s slavery! Dialogue: 0,0:55:20.54,0:55:29.71,Default,,0000,0000,0000,,{\i1}applause{\i0}\NQuestion: Thank you! Dialogue: 0,0:55:29.71,0:55:32.29,Default,,0000,0000,0000,,Herald: Number 1, please! Dialogue: 0,0:55:32.29,0:55:35.89,Default,,0000,0000,0000,,Question: Do you think, since it’s\Nkind of obvious, that we should reject, Dialogue: 0,0:55:35.89,0:55:41.13,Default,,0000,0000,0000,,or mostly reject, the projects that are\Ninfluenced by Governmental Institutions Dialogue: 0,0:55:41.13,0:55:45.86,Default,,0000,0000,0000,,like NIST? Do you have any\Ninformation to how they react Dialogue: 0,0:55:45.86,0:55:50.33,Default,,0000,0000,0000,,when they see that you use\Nsmaller projects like e.g. Paths (?) Dialogue: 0,0:55:50.33,0:55:56.77,Default,,0000,0000,0000,,to encrypt your harddrive,\Nand some odd crypto scheme? Dialogue: 0,0:55:56.77,0:56:00.05,Default,,0000,0000,0000,,Jacob: Well, one of the things\Nwe found is that Truecrypt, e.g. Dialogue: 0,0:56:00.05,0:56:04.18,Default,,0000,0000,0000,,withstands what they’re trying to do.\NAnd they don’t like it. I really wonder Dialogue: 0,0:56:04.18,0:56:08.74,Default,,0000,0000,0000,,if someone could figure out why Truecrypt\Nshut down. That would be really interesting. Dialogue: 0,0:56:08.74,0:56:15.85,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:56:15.85,0:56:19.88,Default,,0000,0000,0000,,I can also tell you that after I met\NGeneral Alexander, and I told him Dialogue: 0,0:56:19.88,0:56:23.59,Default,,0000,0000,0000,,to go fuck himself as hard as\Npossible with a chainsaw… Dialogue: 0,0:56:23.59,0:56:29.47,Default,,0000,0000,0000,,{\i1}whoohoo’s, cheers and applause{\i0} Dialogue: 0,0:56:29.47,0:56:32.19,Default,,0000,0000,0000,,I hope he’s watching this video!\N{\i1}laughter{\i0} Dialogue: 0,0:56:32.19,0:56:37.45,Default,,0000,0000,0000,,He actually went to, let’s say my\Nemployer who shall remain anonymous Dialogue: 0,0:56:37.45,0:56:42.66,Default,,0000,0000,0000,,{\i1}someone in the audience laughs{\i0}\Nand, … sorry Roger! Dialogue: 0,0:56:42.66,0:56:45.78,Default,,0000,0000,0000,,{\i1}laughter{\i0}\N…and my understanding is they also Dialogue: 0,0:56:45.78,0:56:49.93,Default,,0000,0000,0000,,went to our funders, and said:\N“What’s this guy? What’s he doing?”, Dialogue: 0,0:56:49.93,0:56:54.74,Default,,0000,0000,0000,,you know, and they tried to pressure. And\Nmy employer, who shall remain anonymous, Dialogue: 0,0:56:54.74,0:56:59.05,Default,,0000,0000,0000,,did not cave. But, yeah,\Nthey exert pressure! Dialogue: 0,0:56:59.05,0:57:07.46,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:57:07.46,0:57:10.48,Default,,0000,0000,0000,,Herald: Another question\Nfrom the internet, please! Dialogue: 0,0:57:10.48,0:57:16.61,Default,,0000,0000,0000,,Signal Angel: Yeah, so, these files\Nare pretty shocking, or revealing. Dialogue: 0,0:57:16.61,0:57:19.40,Default,,0000,0000,0000,,Were they part of the stuff that\Ncame out in summer last year? Dialogue: 0,0:57:19.40,0:57:24.63,Default,,0000,0000,0000,,And where was the bottleneck?\NWhy do they come out now? Dialogue: 0,0:57:24.63,0:57:26.15,Default,,0000,0000,0000,,Jacob: Oh that’s a question for you! Dialogue: 0,0:57:26.15,0:57:29.67,Default,,0000,0000,0000,,Laura: Yeah! So in this case Dialogue: 0,0:57:29.67,0:57:33.99,Default,,0000,0000,0000,,this was a number of reasons. One is Dialogue: 0,0:57:33.99,0:57:37.36,Default,,0000,0000,0000,,that we’ve been slowed\Nto scale the reporting. Dialogue: 0,0:57:37.36,0:57:40.51,Default,,0000,0000,0000,,And it was also the case\Nthat some of the files Dialogue: 0,0:57:40.51,0:57:43.60,Default,,0000,0000,0000,,I personally didn’t have\Naccess to, during that time Dialogue: 0,0:57:43.60,0:57:47.54,Default,,0000,0000,0000,,when the story actually first\Ncame out. And then also Dialogue: 0,0:57:47.54,0:57:54.49,Default,,0000,0000,0000,,just the time of reporting and\Nresearching the documents. Dialogue: 0,0:57:54.49,0:57:57.24,Default,,0000,0000,0000,,Herald: Number 3, please! Dialogue: 0,0:57:57.24,0:58:01.07,Default,,0000,0000,0000,,Question: Thanks for the talk! It was\Ngreat! I support totally the idea that Dialogue: 0,0:58:01.07,0:58:06.52,Default,,0000,0000,0000,,we need strong crypto. And I think that Dialogue: 0,0:58:06.52,0:58:08.84,Default,,0000,0000,0000,,strong crypto needs also support,\Nand we should all use it. But I think Dialogue: 0,0:58:08.84,0:58:12.39,Default,,0000,0000,0000,,strong crypto is not the whole\Nanswer to the political situation Dialogue: 0,0:58:12.39,0:58:15.23,Default,,0000,0000,0000,,that we have. And I think… Dialogue: 0,0:58:15.23,0:58:21.26,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:58:21.26,0:58:25.86,Default,,0000,0000,0000,,…I think that this community of\Nhackers and nerds needs to build Dialogue: 0,0:58:25.86,0:58:29.65,Default,,0000,0000,0000,,stronger ties with political movements\Nand be part of political movements. Dialogue: 0,0:58:29.65,0:58:33.81,Default,,0000,0000,0000,,I know you are, and I think that\Nwe can’t solve the political dilemma Dialogue: 0,0:58:33.81,0:58:37.33,Default,,0000,0000,0000,,with just strong crypto. So we need both. Dialogue: 0,0:58:37.33,0:58:45.54,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:58:45.54,0:58:47.66,Default,,0000,0000,0000,,Herald: And another\Nquestion from the internet! Dialogue: 0,0:58:47.66,0:58:50.95,Default,,0000,0000,0000,,No more questions from the\Ninternet. So, number 3, please! Dialogue: 0,0:58:50.95,0:58:54.83,Default,,0000,0000,0000,,Question: Yes, thank you also very much\Nfor the talk. I want to ask a question Dialogue: 0,0:58:54.83,0:58:58.88,Default,,0000,0000,0000,,about Citizenfour, and especially the\Nending, of Citizenfour, where there’s Dialogue: 0,0:58:58.88,0:59:05.08,Default,,0000,0000,0000,,a strong suggestion that army base here\Nin Germany, called Ramstein is essential Dialogue: 0,0:59:05.08,0:59:10.71,Default,,0000,0000,0000,,in these killings that you addressed\Ntonight. What would be your… like, Dialogue: 0,0:59:10.71,0:59:15.52,Default,,0000,0000,0000,,are you gonna give more information\Nthat’s not just suggestional? And Dialogue: 0,0:59:15.52,0:59:20.32,Default,,0000,0000,0000,,what would you want, like, especially\Nthis audience to engage in? Dialogue: 0,0:59:20.32,0:59:24.47,Default,,0000,0000,0000,,Laura: I mean, so, there is gonna\Nbe more reporting on that topic Dialogue: 0,0:59:24.47,0:59:29.22,Default,,0000,0000,0000,,that I’m working with, and my colleague\NJeremy Scahill, at the Intercept. Dialogue: 0,0:59:29.22,0:59:32.74,Default,,0000,0000,0000,,And unfortunately I can’t say more\Nthan that, other than, we will be Dialogue: 0,0:59:32.74,0:59:36.44,Default,,0000,0000,0000,,coming out with more information that\Nwill go beyond what you see in the film. Dialogue: 0,0:59:36.44,0:59:41.55,Default,,0000,0000,0000,,So, for sure. And it deals with\Nhow Ramstein is part of the Dialogue: 0,0:59:41.55,0:59:44.71,Default,,0000,0000,0000,,infrastructure and architecture\Nof communication. Dialogue: 0,0:59:44.71,0:59:47.15,Default,,0000,0000,0000,,Jacob: Shut it down! Shut it down! Dialogue: 0,0:59:47.15,0:59:53.26,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:59:53.26,0:59:56.18,Default,,0000,0000,0000,,Herald: Number 5, please! Dialogue: 0,0:59:56.18,1:00:00.34,Default,,0000,0000,0000,,Question: Is there a minimum key length\Nthat you would consider unsafe? Dialogue: 0,1:00:00.34,1:00:03.01,Default,,0000,0000,0000,,Jacob: Yeah, so, actually I’m glad you\Nasked that question. I was sort of hoping Dialogue: 0,1:00:03.01,1:00:06.26,Default,,0000,0000,0000,,someone will do that. Okay. So. There are\Nsome documents from the GCHQ Dialogue: 0,1:00:06.26,1:00:09.77,Default,,0000,0000,0000,,where they talk about their super\Ncomputing resources. And, Dialogue: 0,1:00:09.77,1:00:15.93,Default,,0000,0000,0000,,about 3 years ago they were\Ntalking about 640 bit keys Dialogue: 0,1:00:15.93,1:00:20.08,Default,,0000,0000,0000,,being something that they sort of casually\Ntake care of. Now at the same time that Dialogue: 0,1:00:20.08,1:00:24.50,Default,,0000,0000,0000,,that was happening Arjen Lenstra\Nhad, I think, factored 768 bit, Dialogue: 0,1:00:24.50,1:00:29.12,Default,,0000,0000,0000,,and it took, what was it, Alex?\N3 years? On a bunch… Dialogue: 0,1:00:29.12,1:00:32.88,Default,,0000,0000,0000,,{\i1}listens to answer from audience{\i0}\NYear and a half! So, I think pretty much Dialogue: 0,1:00:32.88,1:00:37.04,Default,,0000,0000,0000,,anything less than 1024 [bit] is a bad\Nidea. There are other documents Dialogue: 0,1:00:37.04,1:00:41.35,Default,,0000,0000,0000,,where they specifically say, if\Nit’s 1024 bit RSA, it’s a problem. Dialogue: 0,1:00:41.35,1:00:44.62,Default,,0000,0000,0000,,But you need to think about it,\Nnot about what they can do today. Dialogue: 0,1:00:44.62,1:00:47.26,Default,,0000,0000,0000,,First of all they have different\Ncompartments. One of those compartments Dialogue: 0,1:00:47.26,1:00:51.29,Default,,0000,0000,0000,,obviously is dedicated to any maths\Nthat they’ve got that speed that up. Dialogue: 0,1:00:51.29,1:00:54.68,Default,,0000,0000,0000,,But another point is that because of\Nthings like the massive data repository Dialogue: 0,1:00:54.68,1:00:58.09,Default,,0000,0000,0000,,– the mission data repository of\NBluffdale, Utah – you’re not encrypting Dialogue: 0,1:00:58.09,1:01:03.23,Default,,0000,0000,0000,,for today. I mean, you are! But you’re\Nalso encrypting for 50 years from today. Dialogue: 0,1:01:03.23,1:01:07.05,Default,,0000,0000,0000,,So, personally, I use 4096 bit\NRSA keys, and I store them Dialogue: 0,1:01:07.05,1:01:10.33,Default,,0000,0000,0000,,on a hardware token, which\Nhopefully doesn’t have a backdoor. Dialogue: 0,1:01:10.33,1:01:14.53,Default,,0000,0000,0000,,But I trust Werner [Koch]. That’s\Nthe best I can do, unfortunately. Dialogue: 0,1:01:14.53,1:01:17.03,Default,,0000,0000,0000,,Which is pretty good. But…\N{\i1}laughter{\i0} Dialogue: 0,1:01:17.03,1:01:22.01,Default,,0000,0000,0000,,But I think e.g. that the best key sizes, Dialogue: 0,1:01:22.01,1:01:25.11,Default,,0000,0000,0000,,you need to think about them in terms of\Nwhat you’re actually doing; and how long. Dialogue: 0,1:01:25.11,1:01:29.31,Default,,0000,0000,0000,,And then think about composition. That is…\Nit’s not just about encrypting something Dialogue: 0,1:01:29.31,1:01:32.87,Default,,0000,0000,0000,,with, like, a 4096 bit RSA key.\NAlso make it hard for them to target you Dialogue: 0,1:01:32.87,1:01:36.67,Default,,0000,0000,0000,,for surveillance in the\Nfirst place. So, e.g. Dialogue: 0,1:01:36.67,1:01:39.94,Default,,0000,0000,0000,,when you can, use systems where\Nyou can composite (?) with Tor. Use things Dialogue: 0,1:01:39.94,1:01:42.89,Default,,0000,0000,0000,,that are totally ephemerally keyed. So\Nthey can’t break in, steal the key and Dialogue: 0,1:01:42.89,1:01:47.28,Default,,0000,0000,0000,,decrypt things in retrospect. Make it\Nreally hard for them to make it valuable. Dialogue: 0,1:01:47.28,1:01:51.32,Default,,0000,0000,0000,,There’s an economic point to that\Ncollection as well as a mathematical point. Dialogue: 0,1:01:51.32,1:01:54.59,Default,,0000,0000,0000,,Actually they sort of balance each other\Nout. So anyway, don’t use small key lengths. Dialogue: 0,1:01:54.59,1:01:59.71,Default,,0000,0000,0000,,And maybe also consider looking at the\Nwork that DJB and Tanja have been doing, Dialogue: 0,1:01:59.71,1:02:04.91,Default,,0000,0000,0000,,about Elliptic Curves stuff.\NAnd I think, really look to them! Dialogue: 0,1:02:04.91,1:02:07.93,Default,,0000,0000,0000,,But these guys [=NSA] aren’t special.\NThey don’t have super powers. Dialogue: 0,1:02:07.93,1:02:10.88,Default,,0000,0000,0000,,But when you use things that\Nare closed-source software… Dialogue: 0,1:02:10.88,1:02:14.47,Default,,0000,0000,0000,,I mean, Richard Stallman was really right.\NI mean, I know that it pains some of you Dialogue: 0,1:02:14.47,1:02:17.47,Default,,0000,0000,0000,,to know that. But he was really right.\N{\i1}laughter{\i0} Dialogue: 0,1:02:17.47,1:02:20.01,Default,,0000,0000,0000,,And he deserves a lot of love for that! Dialogue: 0,1:02:20.01,1:02:29.51,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,1:02:29.51,1:02:32.34,Default,,0000,0000,0000,,Free software, with software\Nimplementations with large keys. Dialogue: 0,1:02:32.34,1:02:35.96,Default,,0000,0000,0000,,That’s what you want. And when you can:\Nprotocols that allow for ephemeral keying, Dialogue: 0,1:02:35.96,1:02:39.12,Default,,0000,0000,0000,,or where they have forward secrecy.\NThings like Pond, things like OTR, Dialogue: 0,1:02:39.12,1:02:43.42,Default,,0000,0000,0000,,things like Redphone and Signal.\NAnd GnuPG. GnuPG has the caveat (?) that Dialogue: 0,1:02:43.42,1:02:46.15,Default,,0000,0000,0000,,if they ever get into your system later\Nthey can of course decrypt other messages. Dialogue: 0,1:02:46.15,1:02:51.57,Default,,0000,0000,0000,,So you have to consider all that. Not just\Nkey size. And GnuPG has safe defaults. Dialogue: 0,1:02:51.57,1:02:54.74,Default,,0000,0000,0000,,So if you’re choosing key sizes,\Nhopefully you’re using that. Dialogue: 0,1:02:54.74,1:02:58.21,Default,,0000,0000,0000,,Libraries like Salt also\Nmake safe choices. So, Dialogue: 0,1:02:58.21,1:03:02.61,Default,,0000,0000,0000,,hopefully that answers your question and\Nyou use strong crypto in the future. Dialogue: 0,1:03:02.61,1:03:05.84,Default,,0000,0000,0000,,Herald: So thank you very\Nmuch for the talk. Thank you! Dialogue: 0,1:03:05.84,1:03:08.100,Default,,0000,0000,0000,,I saw a lot of people being\Nshocked in that room. Dialogue: 0,1:03:08.100,1:03:13.92,Default,,0000,0000,0000,,A lot of tears of, I think,\Nproudness and hope. Dialogue: 0,1:03:13.92,1:03:18.47,Default,,0000,0000,0000,,I saw… that gives me a really good\Nfeeling. So thank you for the talk. Dialogue: 0,1:03:18.47,1:03:20.84,Default,,0000,0000,0000,,Give them a very warm applause! Dialogue: 0,1:03:20.84,1:03:34.50,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,1:03:34.50,1:03:37.57,Default,,0000,0000,0000,,{\i1}silent postroll titles{\i0} Dialogue: 0,1:03:37.57,1:03:45.82,Default,,0000,0000,0000,,{\i1}Subtitles created by c3subtitles.de\Nin the year 2017. Join, and help us!{\i0}