Return to Video

https:/.../Free_software_for_freedom%2C_surveillance_and_you.webm

  • 0:01 - 0:08
    It's really awkward to talk directly into a camera. I spend most of my life trying to avoid surveillance, so...
  • 0:08 - 0:12
    I'm sorry to say I can't be with you in person, so we'll have to do with this video feed.
  • 0:12 - 0:18
    Basically, I guess if John has given a good intro, and I suspect that he has,
  • 0:18 - 0:21
    then you understand that the situation is a little precarious for me,
  • 0:21 - 0:27
    and returning to the U.S. at the moment for me due to my journalistic work with Der Speigel is a little difficult.
  • 0:27 - 0:29
    So I split my life into two basic parts.
  • 0:29 - 0:36
    One is that I work as a free software developer, and generally as a free software advocate, with the Tor project.
  • 0:36 - 0:41
    It's also the case that I work with Der Spiegel, and also as a freelance journalist with several other
  • 0:41 - 0:45
    publications, and lately I've spent my time doing research into the NSA's surveillance.
  • 0:45 - 0:50
    I've interviewed Edward Snowden, and I've published basically a bunch of information.
  • 0:50 - 0:56
    Stuff that previously we used to think was paranoid crazy-talk, and now we learned that the paranoid crazy-talkers
  • 0:56 - 1:04
    were not paranoid enough. So I guess for me the goal of this conversation, if we could call it that
  • 1:04 - 1:11
    when I'm just talking directly into a camera awkwardly, is that I wanted to say that the people that are writing free software
  • 1:11 - 1:16
    are actually writing the future. It's a little awkward to say that, but it's true.
  • 1:16 - 1:21
    As an example, I use a free software laptop. It's an X60
  • 1:21 - 1:27
    and this laptop is, as far as I can tell, about as free as you can get a laptop.
  • 1:27 - 1:33
    It has coreboot, it has Debian GNU/Linux, it is not using any binary blobs,
  • 1:33 - 1:38
    it is, to the best of my ability, liberated from proprietary software.
  • 1:38 - 1:44
    It's pretty good, but it's also many years old, and it's also the case that it's very difficult to
  • 1:44 - 1:49
    do forensics on a machine like this to know if it has been compromised.
  • 1:49 - 1:52
    It is the case, though, that I can do that at all because of free software.
  • 1:52 - 1:58
    It's possible to begin to build something secure with free software, where I can verify
  • 1:58 - 2:03
    and build things from source, where I can look at the source to see exactly what an attacker might try to do
  • 2:03 - 2:06
    with the programs that are running on my computer.
  • 2:06 - 2:10
    So the four freedoms here are incredibly important, especially for the work that I'm doing.
  • 2:10 - 2:15
    Now, given the difficulty of setting up this webstream, I think it's clear that I've done a pretty good
  • 2:15 - 2:19
    job of making sure there's no microphones. I removed the microphone from this laptop for example,
  • 2:19 - 2:24
    until I plugged another one in. I've done a pretty good job of that. But it turns out that
  • 2:24 - 2:29
    this is actually really hard for people who have never programmed in C,
  • 2:29 - 2:33
    or for people that do not really understand how to program their home computer
  • 2:33 - 2:40
    and beam themselves into the future. So, part of what I wanted to do was to inspire some people today to think about
  • 2:40 - 2:47
    what they can do to make this problem of mass surveillance, for example, something that
  • 2:47 - 2:51
    is different. That is, something where there isn't so much hopelessness.
  • 2:51 - 3:02
    It's a little strange, because I feel like, for many years, the free software community is the only one that has really cared about privacy.
  • 3:02 - 3:09
    The free software community builds decentralized or federated solutions and works really on
  • 3:09 - 3:14
    solving problems of the four freedoms, but how those four freedoms touch the rest of our lives.
  • 3:14 - 3:21
    And so, when I think about what's possible, I think the main problem right now is usability.
  • 3:21 - 3:28
    So, in this regard, to set up this stream, which is broadcasting over Tor, or if you connect to the Tor hidden service
  • 3:28 - 3:34
    which I've also set up, you can watch this video directly, without knowing my location.
  • 3:34 - 3:42
    That was so difficult to set up that it took me the better part of the day to actually accomplish that.
  • 3:42 - 3:47
    It's not that GStreamer is a bad piece of software, it's just that it's extremely complicated.
  • 3:47 - 3:54
    A simple user interface, for example, would have made a world of difference, such that people who are using other
  • 3:54 - 3:59
    video streaming solutions, such as proprietary solutions like the NSA PRISM partner Skype,
  • 3:59 - 4:04
    those people might choose something else. If this was integrated into Debian GNU/Linux,
  • 4:04 - 4:10
    and all you needed to do was download Tails or to install Debian, then it would be the case that you could very easily
  • 4:11 - 4:16
    convince people to do it securely, in a decentralized fashion. That's something that at the moment,
  • 4:16 - 4:23
    I think, is very far away. If it takes me the better part of the day, that means that it will take Glenn Greenwald an infinite amount of time.
  • 4:23 - 4:29
    It will probably never happen, actually, with all due respect to Glenn. When the software is so complicated, it turns out
  • 4:29 - 4:35
    that he'll choose something that's less complicated. And so usability is a fundamentally important way
  • 4:35 - 4:40
    that we can ensure that users will basically care about the four freedoms, because once everything
  • 4:40 - 4:44
    they do is working well in free software, why would they choose proprietary software?
  • 4:44 - 4:51
    Usually it is the case that they won't. In fact, there are many people who are Tails users, but they have to switch to
  • 4:51 - 4:55
    proprietary systems, they feel, for the usability of something like Skype.
  • 4:55 - 5:01
    So, I mean, why? What's going on that all of these things are necessary?
  • 5:01 - 5:04
    I suppose you've all heard the bad news.
  • 5:04 - 5:10
    And the bad news is that the Internet is under, essentially, total surveillance.
  • 5:10 - 5:15
    And what I mean by that is not, let's say, the traditional version of surveillance,
  • 5:15 - 5:19
    where you have a person, and the person is inspecting things, it's looking at things, it's taking notes.
  • 5:19 - 5:26
    Rather, the mass surveillance that is happening now is in the form of deep packet inspection.
  • 5:26 - 5:31
    Now, all around the world, there exists a series of systems that are run by the National Security Agency,
  • 5:31 - 5:38
    GCHQ, CSE, DSD, and other agencies. Those are just the ones we could call "friendly" agencies,
  • 5:38 - 5:43
    if you can call mass surveillance friendly, but you could say it's a kind of social concern, so let's say
  • 5:43 - 5:49
    that they're friendly. Then there's the rest of the world, and what's happening with those systems.
  • 5:49 - 5:53
    We don't know a lot about the rest of the world's systems, but thanks to the courage of Edward Snowden,
  • 5:53 - 5:56
    we do, for example, understand a great deal about the NSA's surveillance.
  • 5:56 - 6:00
    And one of the things that we understand is that it violates the Fourth Amendment.
  • 6:00 - 6:05
    At least on its face it seems clear that it is an unreasonable search and a seizure.
  • 6:05 - 6:11
    That is, it takes data from the Internet, sometimes through fiber optic splitters, things like Glimmerglass-related devices,
  • 6:11 - 6:17
    where they copy information from fiber optic lines onto another line. It then inspects the data,
  • 6:17 - 6:23
    that is, it has seized the data and then it, I believe, unreasonably searches through the data.
  • 6:23 - 6:30
    It does this looking for selectors. So, for example, if you happen to be Chancellor Merkel, that is the German Chancellor,
  • 6:30 - 6:36
    you would have had your phone number as one of those selectors, and anytime any flow of traffic passed by one of these
  • 6:36 - 6:44
    sensors—that is the turbine, turmoil, turbulence architecture of sensors—your data would be selected,
  • 6:44 - 6:51
    and that selection would ensure that your data flows that are associated with that would be recorded forever.
  • 6:51 - 6:55
    So if you know about the Bluffdale, Utah complex, you'll know for example that
  • 6:55 - 7:01
    the NSA is building very large computation centers, not just for attacking cryptographic systems,
  • 7:01 - 7:07
    but also for recording data that they cannot currently attack, in hopes that when that encrypted data
  • 7:07 - 7:13
    is interesting to them, or when they have a cryptographic breakthrough, they'll be able to do something
  • 7:13 - 7:17
    with data that previously was just noise to them. So this tells us a couple things.
  • 7:17 - 7:21
    One of the things that it tells us is that we are in a lot of trouble.
  • 7:21 - 7:27
    There are proprietary software solutions which, according to some of the documents leaked by Edward Snowden
  • 7:27 - 7:31
    and published by Glenn Greenwald, there are proprietary software companies that are
  • 7:31 - 7:36
    what are called SIGINT enabled. That is to say that they believe that when they sell you a security product
  • 7:36 - 7:40
    that it's somehow not false advertising to have willingly broken the system.
  • 7:40 - 7:47
    So that's a really serious problem. It tells us, for example, that proprietary software definitely has backdoors.
  • 7:47 - 7:52
    Unfortunately Glenn did not release the name of that company, or the companies that are involved,
  • 7:52 - 7:58
    but it should be extremely obvious that, if you were to guess, you probably wouldn't guess incorrectly.
  • 7:58 - 8:03
    And if you were to guess, you would probably understand that it's not a free software product.
  • 8:03 - 8:09
    That is, if you look at free software, you can find the problems. If someone were to add a backdoor,
  • 8:09 - 8:15
    while it might not always be obvious if they're very sneaky about it, it is significantly more difficult
  • 8:15 - 8:21
    to add a backdoor to a free software project than it is to add one to a proprietary hardware or software device.
  • 8:21 - 8:28
    So, when we start to see that our security solutions are actually not security solutions overall,
  • 8:28 - 8:34
    one of the things we'll notice is that it's not just the NSA or GCHQ that will be exploiting these systems.
  • 8:34 - 8:41
    It's actually lots of different people. So for example, now that you guys know about the Dual EC DRBG backdoor,
  • 8:41 - 8:46
    there is a very good chance that someone in the audience is working on attacking it and breaking it.
  • 8:46 - 8:54
    And if you happen to have, for example, copies of traffic that were encrypted with that, as the seed for
  • 8:54 - 8:57
    the random number generator, you may be able to exploit it.
  • 8:57 - 9:02
    So this is ultimately a kind of security by obscurity, in hopes that by adding this backdoor, only the good guys,
  • 9:02 - 9:08
    allegedly, they will be the only ones to break it. In reality, it doesn't work that way.
  • 9:08 - 9:13
    So we have a sort of tension here between signals intelligence and communication security.
  • 9:13 - 9:18
    On the one hand, we have signals intelligence collecting as much data as we can
  • 9:18 - 9:22
    from those aforementioned deep packet inspection systems. And on the other side, we have
  • 9:22 - 9:28
    communications security tools which allegedly are protecting us, but it turns out some of them are SIGINT-enabled.
  • 9:28 - 9:35
    So what is there to be done about this? It seems quite clear to me that free software and free hardware,
  • 9:35 - 9:41
    that is free and open hardware, where things are freely specified, where it's possible for you to fab your own hardware
  • 9:41 - 9:45
    in a factory of your choosing, in a country of your choosing, with parts of your choosing,
  • 9:45 - 9:50
    where you can verify them, that is clearly the right direction to go.
  • 9:50 - 9:55
    Because it is not just, let's say, again, so-called legitimate authorities that are doing this.
  • 9:55 - 10:02
    It's probably a lot of other people as well. We just happen to know there is absolutely, for certain, one set of people
  • 10:02 - 10:08
    that are doing it. And so free software in particular has given, I would say, some leverage.
  • 10:08 - 10:14
    That is, it has allowed regular people to be able to communicate securely in a time of
  • 10:14 - 10:20
    complete and total mass surveillance. So, for example, things that work: cryptography does
  • 10:20 - 10:25
    actually work. If it is not signals intelligence-enabled, that is SIGINT-enabled,
  • 10:25 - 10:33
    it is the case that the mathematics behind DSA, RSA, Diffie–Hellman, those seem to not be broken when you
  • 10:33 - 10:38
    use appropriate key sizes. That's very good news, because in an age of mass surveillance,
  • 10:38 - 10:47
    the only thing that stops the surveillance is making the surveillance worthwhile. That is, if it's extremely
  • 10:47 - 10:54
    valuable for everyone to spy, they will spy. If it's a lot of noise, if the searching for selectors doesn't work,
  • 10:54 - 11:02
    it changes the game significantly. At the moment, not every single byte of data is recorded forever.
  • 11:02 - 11:08
    There is clearly some attempts to do that, and that is something that we need to cope with.
  • 11:08 - 11:12
    From a cryptographic perspective, we need to think about it, I think, on the hundred-year crypto timeline.
  • 11:12 - 11:16
    This is something that Zooko has been working on and I think is a really good idea.
  • 11:16 - 11:24
    But we have to imagine that all of the things we do are being recorded for all time, and with that, we need to react appropriately.
  • 11:24 - 11:30
    So if you, for example, work on a free software chat client, it should have off-the-record messaging built into it.
  • 11:30 - 11:35
    If, for example, you build a web browser, it should be compatible with the Tor network. It should not be
  • 11:35 - 11:41
    compatible, for example, with the proprietary Flash player first. Unfortunately, on balance, what we see
  • 11:41 - 11:47
    is that people are often more concerned with making things work with Flash than with allegedly
  • 11:47 - 11:53
    paranoic tools like the Tor project and all of its software, like the Tor network. This, I think, is
  • 11:53 - 11:58
    kind of sad, but I think that we can turn this around and change it, and we need to look at the crypto
  • 11:58 - 12:04
    that we actually use. So, for example, for a Jabber server, it should be using forward secret crypto.
  • 12:04 - 12:09
    So, if you have TLS, it should be used in a forward secret mode. Because it isn't just passive surveillance,
  • 12:09 - 12:15
    though that is a very core and serious thing, it's also active surveillance. The turbulence architecture that
  • 12:15 - 12:22
    I mentioned, I detailed a little bit in my reporting at the 30C3 and also in Der Spiegel at the end of last year.
  • 12:22 - 12:27
    And what we see is those selectors that I mentioned before, let's say your phone number or your email
  • 12:27 - 12:31
    address... I wish I could see the audience because I'd ask you to raise your hand, and say "how many
  • 12:31 - 12:38
    of you are sysadmins?" Obviously some of you are, someone raised their hand. So the NSA is probably
  • 12:38 - 12:42
    targetting you, if you're a system administrator for any system that is interesting.
  • 12:42 - 12:49
    And it is the case that if you were to have some credentials for an interesting network, and you are
  • 12:49 - 12:55
    being targeted, one of the ways that you will be targeted is that you will be targeted by an analyst who looks
  • 12:55 - 13:00
    for selectors. They look for your federated logins, they look for your centralized logins, they look for
  • 13:00 - 13:06
    all kinds of information, and it is the case that they program this, essentially, into a targeting system.
  • 13:06 - 13:10
    And that targeting system will automatically attack you. It will do man-in-the-middle attacks,
  • 13:10 - 13:15
    it will do man-on-the-side attacks. It appears that they have certificate authority resources so that
  • 13:15 - 13:19
    they can do man-in-the-middle attacks on SSL, which tells us that we really need to work on things like
  • 13:19 - 13:28
    TACK and SSL cert pinning, that's very important. If, for example, we notice though, crypto changes
  • 13:28 - 13:33
    the way the selector-based surveillance can even function. If, for example, you note that all of my traffic
  • 13:33 - 13:38
    right now is going through the Tor network, and in many cases people, three people at the moment, are connected
  • 13:38 - 13:44
    to the Tor hidden service for this video feed, there is no possibility for selector-based injection.
  • 13:44 - 13:50
    That is, it's just TLS traffic, the network distinguisher is pretty close to normalized across
  • 13:50 - 13:55
    all Debian Tor users that are doing what I'm doing, which I admit, there's probably five of us in the world,
  • 13:55 - 14:02
    but, you know, that changes the fundamental trade-off. That is, doing the selector-based surveillance
  • 14:02 - 14:08
    will have less of a return than it previously did, or will require more targeting. And this is where anonymity comes into play.
  • 14:08 - 14:13
    If you have anonymity, it becomes significantly more difficult for someone to target you.
  • 14:13 - 14:19
    It's not impossible, of course, but it's... Well okay, maybe it's more than five people.
  • 14:19 - 14:24
    I've got a little lag here from the IRC channel, but apparently there are a few Debian users that route
  • 14:24 - 14:35
    their traffic over Tor in the audience, I hope? But if we see the anonymity benefit there, there's of course
  • 14:35 - 14:42
    a downside, you know? When you have these systems, they're laggy sometimes, they're not always really seamless to work together,
  • 14:42 - 14:49
    it takes a lot of specialized knowledge, again. And this returns me sort of to the key point, which is about usability.
  • 14:49 - 14:54
    So one of the things that I've seen when looking through documents for this research is that
  • 14:54 - 15:00
    usability and security is the worst nightmare of a signals intelligence agency. So for example,
  • 15:00 - 15:08
    Tech Secure and RedPhone, by Moxie Marlinspike, those pieces of software really make the life of
  • 15:08 - 15:14
    someone doing these kinds of attacks hell. At the very least, it means that they have to take what was once a passive thing,
  • 15:14 - 15:20
    where they could silently record data on everyone, and they can essentially now no longer do that.
  • 15:20 - 15:25
    They have to either attack his systems, which they probably will at some point, if they haven't already,
  • 15:25 - 15:31
    or they have to attack each end user's system. So this means that once we start to deploy this widely,
  • 15:31 - 15:39
    for everyone, it changes the balance, where mass surveillance becomes less and less economically useful for these attackers.
  • 15:39 - 15:44
    And that's important, because again, even if you think the NSA is sent from heaven, if you believe in heaven,
  • 15:44 - 15:50
    you have to understand that they're not the only people out there, doing these kinds of things.
  • 15:50 - 15:56
    So every time, for example, an American businessman or -woman goes traveling somewhere,
  • 15:56 - 16:03
    that person is effectively targeted for signals intelligence collection. Now sometimes it's not always
  • 16:03 - 16:07
    targeted in the literal selector sense, but they're using systems that are SIGINT-enabled.
  • 16:07 - 16:12
    Now whether or not the phone companies know is an interesting discussion. Most of them do. Most of them
  • 16:12 - 16:20
    go along willingly, but the key thing is that, on balance, when you travel abroad, you basically are
  • 16:20 - 16:24
    subject to the whims of all the countries where you are traveling, obviously.
  • 16:24 - 16:28
    Those whims may be significantly more harsh, they may have different economic interests,
  • 16:28 - 16:33
    they almost certainly have different political and legal and economic interests than what you might like.
  • 16:33 - 16:40
    If you're a free software developer, and you're not an American citizen, for example, you are a target, almost certainly.
  • 16:40 - 16:44
    If you are a system administrator, you are a target, almost certainly.
  • 16:44 - 16:49
    And it doesn't even matter if you're an American citizen, really, though there is a slight distinction about that.
  • 16:49 - 16:54
    I think that in the near future, we'll learn that that distinction is largely bogus.
  • 16:54 - 17:00
    Sorry for the bad news, but... I guess it's sort of important to tie these things together.
  • 17:00 - 17:06
    So, free software and free hardware, they can potentially bring some solutions into play, but it's
  • 17:06 - 17:12
    not exactly clear how we get there. So for example, if you're a system administrator, you probably have a SIM card in your phone.
  • 17:12 - 17:17
    This SIM card is, without a doubt, a piece of proprietary software and proprietary hardware
  • 17:17 - 17:24
    that then plugs into another piece of proprietary hardware, almost always, and that runs proprietary software.
  • 17:24 - 17:30
    And those are actually described, some of those cell phone systems are actually described as master and slave systems,
  • 17:30 - 17:38
    where the master CPU is in fact the proprietary one and it enslaves the free software CPU, which is often Android, which is not always
  • 17:38 - 17:42
    free to begin with. But if we were to say that in an ideal world you had the most free cell phone,
  • 17:42 - 17:49
    you'll probably still have a baseband, which is proprietary software, with a SIM card that is proprietary software and proprietary hardware.
  • 17:49 - 17:56
    So as you're doing your job, even if you have all free software for your laptop, for example, you have this
  • 17:56 - 18:02
    unfortunate conundrum where, to do the basic work that you need to do, you are completely surrounded
  • 18:02 - 18:07
    by proprietary hardware and proprietary software. Now, the NSA has toolkits that they can deploy
  • 18:07 - 18:14
    into those SIM cards, and into the basebands, not just as a matter of exploitation but actually in some cases by design.
  • 18:14 - 18:19
    Some SIM cards, for example, allow you to add an app to the SIM card without even having
  • 18:19 - 18:25
    a cryptographic key or even exploiting the device, just sending a well-formed message will actually do this.
  • 18:25 - 18:30
    Carson Noll, without realizing it, rediscovered this and he showed this at the CCC.
  • 18:30 - 18:39
    It's almost identical to things that we showed in the Der Spiegel reporting from last year that I discussed at the 30C3.
  • 18:39 - 18:45
    I gave a talk there that was called "To Protect and Infect, Part 2," and I don't want to rehash too much
  • 18:45 - 18:50
    of that talk, but I would really encourage all of you to watch it, because I basically talk about the technical details.
  • 18:50 - 18:55
    And the technical details are important, because in a democracy, for us to be able to understand what it is
  • 18:55 - 18:59
    that we're consenting to, we need to have some concept of what it is we're talking about.
  • 18:59 - 19:05
    Unfortunately the laws are not so great, and from what I can tell, some people have even called
  • 19:05 - 19:09
    for my prosecution as a result of showing and discussing these things.
  • 19:09 - 19:13
    Now, that went through very careful editorial control at Der Spiegel, so I don't feel too threatened by it,
  • 19:13 - 19:18
    but it's an important point that people don't want you to understand how the machines that control you and
  • 19:18 - 19:22
    surveil you work. They don't want you to be able to change the way that those things work,
  • 19:22 - 19:28
    because it is about power. It's about controlling you, it's about controlling your machines, and it's about
  • 19:28 - 19:33
    ensuring that those people stay in control over you and your devices, should they wish it.
  • 19:33 - 19:38
    So, in a democracy I think it's fundamentally important for us to understand how the machines work,
  • 19:38 - 19:44
    to understand how the power works, to understand what the dynamics are, to make sure that these
  • 19:44 - 19:47
    devices, for example, how they're being subverted, that we understand it.
  • 19:47 - 19:54
    For example, when we understand that exploitation often leads to hoarding of bugs, that means we understand
  • 19:54 - 20:01
    that people are letting us stay in a vulnerable state so as to be able to exploit us.
  • 20:01 - 20:07
    But many people may find those bugs and exploit us, so it is not nearly a simple thing where we say
  • 20:07 - 20:14
    we cede some of our autonomy so that people will be able to do their job. You know, the local policeman needs
  • 20:14 - 20:19
    to do their job, cooperate with them, for example. Because it is every local policeman on the planet.
  • 20:19 - 20:23
    It is every intelligence officer on the planet, with enough of a budget or the technical know-how,
  • 20:23 - 20:29
    who will be able to exploit those things. So on balance, it seems very clear that we want to build secure systems
  • 20:29 - 20:35
    and not make that trade-off, because we can never actually ensure that the people who are doing this
  • 20:35 - 20:41
    are acting in our best interest, are democratically in a position of authority that is legitimate,
  • 20:41 - 20:46
    if, you know, you bear with me here and we say there is some authority that is legitimate...
  • 20:46 - 20:52
    I know it's a free software crowd, so I like to think that some of you there apt-get install anarchism
  • 20:52 - 20:57
    from time to time. But it's very important to understand that that balance is something which is not
  • 20:57 - 21:03
    a part of the discussion, and a big part of ensuring that it's not a part of the discussion is to try to hide the details.
  • 21:03 - 21:08
    And so for me, I think it's very important to bring out the details. It's very important to show that they use
  • 21:08 - 21:14
    continuous wave generators bounced against reflectors that they've installed after stealing your mail.
  • 21:14 - 21:19
    Do we want to live in a world where these people steal our mail? And where they take our laptops
  • 21:19 - 21:24
    when we buy them online and add devices to them? I don't want to live in that world.
  • 21:24 - 21:30
    I like to think that people that work on free software not only don't want to live in that world, they are actively
  • 21:30 - 21:34
    working to ensure that everyone on the planet can choose to live in a different world.
  • 21:34 - 21:46
    To get back to the point, things like the Milkymist, Novena, coreboot, these are on a spectrum of free
  • 21:46 - 21:53
    hardware to, as we go down the line, free software-enabled proprietary hardware.
  • 21:53 - 22:00
    Now, I use an X60 with coreboot and I removed almost all of the hardware I don't need.
  • 22:00 - 22:05
    I try, for example, to get rid of anything that would need a binary blob. I think I've done that.
  • 22:05 - 22:11
    This laptop, I think, only has one binary blob left, and that's in the embedded controller for the keyboard.
  • 22:11 - 22:16
    I sometimes use an external keyboard that doesn't have that, although obviously that keyboard has some
  • 22:16 - 22:23
    binary firmware device inside of it. Hopefully not remotely flashable. As far as I can tell, that's the case.
  • 22:23 - 22:31
    Systems like the Novena, made by Bunnie, I think, are the future. That is, he has built almost entirely,
  • 22:31 - 22:37
    as much as is possible at the moment, an open hardware device based on an ARM CPU, where you can fab this
  • 22:37 - 22:46
    device, where you can very easily, if you are a hardware person, modify it, and you can fab this
  • 22:46 - 22:52
    changed device. So that, I think, is critical. There's still a proprietary CPU, but there's a trade-off to be
  • 22:52 - 23:00
    made here. So in this case, the Freescale CPU that he included is pretty fast, it's a quad-core CPU, and it
  • 23:00 - 23:04
    has a hardware random number generator. Who knows if it's SIGINT-enabled, hopefully not.
  • 23:04 - 23:09
    If we see this, we see that it is significantly better than, for example, the ThinkPad that's sitting in front
  • 23:09 - 23:13
    of me where we don't know the designer, we don't know their intentions, we don't know for example if
  • 23:13 - 23:20
    the Intel microcode, if it can be updated remotely by someone who has the key that isn't Intel.
  • 23:20 - 23:25
    Probably, would be my guess, if they understand the format, if they can add backdoors, which, if they understand
  • 23:25 - 23:30
    the way the microcode works and they have the key, then of course they can do all of those things.
  • 23:30 - 23:35
    So there are some architectural changes in the Novena which I think are pretty spectacular for that.
  • 23:35 - 23:41
    If we go all the way, I see something like the Milkymist, which for a time I used instead of as a video mixer
  • 23:41 - 23:53
    but as a machine for running screen and irssi. And it actually is a FPGA device where the CPU itself is
  • 23:53 - 24:03
    free software. Unfortunately the tools for synthesizing the FPGA, those are not free. We lack free software tools
  • 24:03 - 24:09
    for those things, as well. And we really, really, really need free software tools for all of these things,
  • 24:09 - 24:17
    and we need free hardware platforms to build on top of. Without that, it's very difficult for us to secure our systems.
  • 24:17 - 24:22
    I think that it's critical to do that. And there are some people that are doing that.
  • 24:22 - 24:27
    So lekernel, the guy who's working on the Milkymist, and some of these other free hardware devices,
  • 24:27 - 24:33
    I think he really needs support, and I think it would be great, because his devices are the kinds of devices
  • 24:33 - 24:37
    where you can do forensics on it, but you can also prevent adversarial forensics.
  • 24:37 - 24:42
    That is, you can program your device to self-destruct, but you can also check to see if someone has changed
  • 24:42 - 24:49
    the bootloader, if someone has changed the VHDL output, you can actually verify these things.
  • 24:49 - 24:55
    Novena is much the same. I've been working on making Debian GNU/Linux run really well on it.
  • 24:55 - 25:05
    I actually have a Novena here in front of me, with the little helpful Intel sticker, but that's just as a joke,
  • 25:05 - 25:11
    because there's no intel inside with free hardware and free software, if we do our jobs correctly.
  • 25:11 - 25:20
    So, I'd like to think that this is a good start, but the only thing that makes this useful is, of course, the free software on top of it.
  • 25:20 - 25:26
    So in this sense, I think that Debian GNU/Linux is very important. I think lots of things, like Trisquel, for example,
  • 25:26 - 25:32
    are very important. And we need to work on making those systems usable. I think the GNOME project
  • 25:32 - 25:37
    has done a very excellent job with that. There are a few things about it that drive me crazy, but mostly
  • 25:37 - 25:45
    just because I've been using computers long enough to have bad habits, so I think that that's a sort of humbling experience.
  • 25:45 - 25:53
    The Tails operating system, which is a derivative of Debian, is set up in such a way that you don't
  • 25:53 - 25:58
    need to understand anything about anonymity, you don't need to understand anything about security and privacy.
  • 25:58 - 26:03
    It comes with a chat client that has off-the-record messaging by default. Everything is configured
  • 26:03 - 26:11
    to work over Tor by default. This is great. This helps us with this paradigm shift of privacy by policy to privacy by design.
  • 26:11 - 26:16
    Now, there are a couple of problems that still exist. Even if you have Tails, even if you find it usable,
  • 26:16 - 26:22
    which it isn't, in my opinion... It's much more usable than all of these things were before Tails, but it's
  • 26:22 - 26:29
    a progression. If we take a step and we go further and further down the line, one of the things we'll note
  • 26:29 - 26:34
    is that there isn't an easy wizard for setting up, for example, a chat account that just works.
  • 26:34 - 26:42
    Where you can just easily send a message. Where it's not hard. As an example, I installed Jitsi on this laptop,
  • 26:42 - 26:48
    and at the bottom of the screen you see "surveillance_target@jit.si". You can, of course,
  • 26:48 - 26:56
    ask me questions via OTR if you want here, and if you'd like to, you'll note that it is, of course,
  • 26:56 - 27:04
    using OTR, it is also using SSL/TLS... well, it's TLS 1.0, I think, to connect there.
  • 27:04 - 27:12
    You'll note that it's essentially... it's like an email address. That is pretty good, and I think we may have
  • 27:12 - 27:17
    to sit with that for a while, while we work on coming up with different naming systems.
  • 27:17 - 27:22
    Zooko's triangle, if you haven't heard of it, I would recommend you look it up on the Wikipedia,
  • 27:22 - 27:27
    it's definitely the case that we have some hard problems to try to tackle.
  • 27:27 - 27:35
    Skype, for example, is really easy for people to use, and they do use it because they have probably purchased
  • 27:35 - 27:40
    every webcam in the world, and then they've made it work with every piece of software and hardware
  • 27:40 - 27:46
    combination that they could get their hands on. And they also solved the problem of making it as simple
  • 27:46 - 28:00
    as adding, for example, one username and password, and then forever just keeping that identifier.
  • 28:00 - 28:06
    And then you just have to simply say, "Hey, I'm Alice at, I'm Bob at" and it's really easy to use.
  • 28:06 - 28:12
    For example, if Jitsi had a setup wizard, where it automatically generated your OTR keys and it
  • 28:12 - 28:17
    automatically did everything that needed to be done and it added you to their server, but it also allowed
  • 28:17 - 28:23
    you to configure a secondary server, that would be fantastic. It would mean that you could just download
  • 28:23 - 28:30
    Jitsi and it would work. If it forced OTR, even better. Those kinds of things are really simple changes
  • 28:30 - 28:35
    that really would make a world of difference. And since Jitsi works on other platforms other than pure
  • 28:35 - 28:40
    free software platforms, it can even be used as a kind of gateway crypto system.
  • 28:40 - 28:46
    So, I think that kind of stuff becomes very important, because once you have something like Tails
  • 28:46 - 28:50
    and you have something like Jitsi and you put them together, you still have that last step.
  • 28:50 - 28:58
    And that last step is a hard one. But we're really close. In looking through and understanding some of
  • 28:58 - 29:03
    the things that I've been looking at and studying with regard to the technology, and I said this before,
  • 29:03 - 29:10
    usability and security are absolutely critical. But I also mentioned before the active attackers.
  • 29:10 - 29:19
    So one of the issues that we see is that these active attackers are actually pretty good, right?
  • 29:19 - 29:24
    So if you have a longterm cryptographic key but you don't use it correctly, that is, you encrypt all your
  • 29:24 - 29:30
    traffic in a non-forward secret way, you have a pretty serious problem, which is that these people will
  • 29:30 - 29:36
    break into the computer and actually take the key so that they can decrypt traffic, or to impersonate you.
  • 29:36 - 29:40
    So we do need to come up with some notions about, for example, ratcheting.
  • 29:40 - 29:46
    So Tech Secure, which Moxie Marlinspike has been working on for many years now, it has this notion
  • 29:46 - 29:52
    of forward secrecy as well as future secrecy. I think that we need to think about some of the stuff that he's
  • 29:52 - 30:00
    been working on to make this kind of system usable. Adam Langley, who is probably, I would say, one of the
  • 30:00 - 30:06
    great living cypherpunks right now, he has written a system called Pond. I've worked a little bit on the key
  • 30:06 - 30:11
    agreement system PANDA, where we dynamically meet by using a shared secret.
  • 30:11 - 30:17
    That kind of a system is really important. It changes the game from "you're totally surveilled, but maybe
  • 30:17 - 30:22
    you have PGP email if you're lucky," or "you're totally surveilled, but maybe you have OTR if you've had
  • 30:22 - 30:32
    a proper chat client for it." And basically it switches it, so everything goes over Tor, everything goes to a server,
  • 30:32 - 30:40
    that server only sees a delayed set of messages. That kind of system is really a significantly different way of
  • 30:40 - 30:45
    doing communications, and it's not so different from email in some ways. But it's different in the ways that
  • 30:45 - 30:51
    are really important. So that, however, is completely useless without a usable interface,
  • 30:51 - 30:58
    without having it be deployed, without teaching people things. So as an example, when you teach
  • 30:58 - 31:02
    a journalist something—one of the things that I've found is almost impossible to do is to teach journalists—
  • 31:02 - 31:07
    but if you teach journalists something, you want to teach them one or two things that you absolutely
  • 31:07 - 31:12
    impress on them that they must do. So for example, verifying an OTR fingerprint is one of the things
  • 31:12 - 31:17
    that I impress on every journalist that I work with. And that's actually my litmus test.
  • 31:17 - 31:24
    If they cannot use Tor and OTR and Jabber together, I don't work with them, because they can't maintain
  • 31:24 - 31:33
    confidentiality, authenticity, any kind of integrity in a digital sense. And that, for me, is important.
  • 31:33 - 31:38
    But it's also the case that I spend a lot of time teaching people how to build Tails disks, or building
  • 31:38 - 31:44
    Tails disks for them, or getting a special laptop and then setting that up for them and then adding Tails to
  • 31:44 - 31:52
    that system, or a Debian GNU/Linux setup. And it would be nice if it was as simple as "just use Trisquel."
  • 31:52 - 31:59
    If it was as simple as "buy a laptop from this vendor and it's all free software enabled."
  • 31:59 - 32:02
    Now there are some vendors that do it, and the problem of interdiction, which I mentioned before,
  • 32:02 - 32:07
    where they steal mail and change things, that's a serious problem. So we really need to make sure
  • 32:07 - 32:14
    that these things are available in regular stores where regular people go. That makes targeting, again, much harder.
  • 32:14 - 32:22
    I have a couple of other things before I start to take questions, but I think that the real key stuff that
  • 32:22 - 32:28
    we need to consider is that we need verifiability. So for example, reproducible builds, things like Gitian,
  • 32:28 - 32:34
    which is what we're doing for the Tor browser, that's very critical because anytime you build software for
  • 32:34 - 32:40
    anyone, you are a target. Especially if the person you build software for is themselves a target.
  • 32:40 - 32:48
    So, for example, we can imagine that with this three- or two-hop-out idea of targeting, we know that it's possible
  • 32:48 - 32:53
    for someone to target a sysadmin because the sysadmin is interesting, but it follows that if the
  • 32:53 - 32:58
    sysadmin is really good, and a lot of people in the free software community are really good with securing
  • 32:58 - 33:03
    their systems, those people will be targeted by targeting their operating system vendor.
  • 33:03 - 33:09
    So, for example, we know that Debian has been compromised in the past. We have to make it so that
  • 33:09 - 33:15
    compromising Debian is not only detected, but that it doesn't make sense to do that.
  • 33:15 - 33:22
    So if, for example, you were to think about this from the Gitian perspective, if we have anonymized
  • 33:22 - 33:29
    builders that are regularly building packages and reporting those results, it will allow us to see if
  • 33:29 - 33:35
    someone has changed a package on the server, it'll allow us to tell if that piece of software has been tampered with.
  • 33:35 - 33:40
    We need to have a kind of binary verification process which, at the moment, we don't really have a
  • 33:40 - 33:45
    binary verification process. Some people use proprietary software like IDA Pro to reverse engineer
  • 33:45 - 33:52
    this, some people try to disassemble or decompile the software to see if it matches what they thought,
  • 33:52 - 33:57
    but that's usually a hand process. We need to automate some of those things, and we need to
  • 33:57 - 34:02
    do it in a way where people are able to report back to the community anything that they see, basically in
  • 34:02 - 34:08
    real time, that is problematic. So for the Tor browser, I actually have a machine that builds with Gitian,
  • 34:08 - 34:15
    and if it ever builds a hash that doesn't match what I would expect, then it alerts me.
  • 34:15 - 34:20
    And it alerts me in a way such that it just looks like any other person downloading the source code,
  • 34:20 - 34:27
    so it's harder to target, and it is the case that it verifies signatures where I've verified the keys in person.
  • 34:27 - 34:33
    So I think that's pretty good, I think it works relatively well, but that doesn't scale.
  • 34:33 - 34:40
    And right now, it's a one-off. So we really, really need to consider this as a reality.
  • 34:40 - 34:47
    We need that also for devices. For example, if I buy a hardware device and the NSA adds something to it,
  • 34:47 - 34:54
    what has happened? Right? Well, usually, they've won. That's a really serious problem.
  • 34:54 - 35:00
    And it's not just the NSA, it's anybody who can steal mail, and especially at scale. Right?
  • 35:00 - 35:05
    Computers go through customs. Free software might not always go through customs, but computers do.
  • 35:05 - 35:09
    And that's where the state's advantage is often used against people in a way that they don't understand
  • 35:09 - 35:16
    and certainly wouldn't consent to. And so we need to have a way, really, and this sounds kind of outlandish,
  • 35:16 - 35:20
    but let's go for outlandish. We need a way to be able to X-ray our hardware and compare it with
  • 35:20 - 35:28
    a known good state. And with no binary blobs, it becomes a little bit possible. A little more possible for
  • 35:28 - 35:32
    us to make sure that the systems we're carrying around are not just bugs for an oppressor.
  • 35:32 - 35:39
    They're not just systems to be used against us. Now, I know that that's a tall order, but the GNU project itself
  • 35:39 - 35:46
    is a tall order. And so we need to move towards free systems: free hardware and free software systems for freedom.
  • 35:46 - 35:51
    Because really, it would be very difficult to maintain freedom and liberty in the future,
  • 35:51 - 35:57
    and even, I think, to keep our democracies in a world of mass surveillance. Especially if all of our devices
  • 35:57 - 36:02
    are the thing that is oppressing us, or that are acting as an oppressor.
  • 36:02 - 36:06
    In the past it was the case that you had a neighbor, and the neighbor maybe received some benefits.
  • 36:06 - 36:11
    Now the changes are different. Now people report on each other as a matter of, you know, fun.
  • 36:11 - 36:16
    For society. With Facebook, for example. Well, what happens when the Philip K. Dick nightmare is not
  • 36:16 - 36:23
    just worrying about every person spying on you, but what if it becomes every thing that's spying on you?
  • 36:23 - 36:27
    Part of the way that I deal with this is I literally remove the physical microphones from my computers,
  • 36:27 - 36:33
    because I know that it is almost impossible to secure machines such that a really powerful, well-funded
  • 36:33 - 36:39
    adversary could enable them again. So that is not really something that scales.
  • 36:39 - 36:44
    But we can think about it when we build free software laptops, we should make sure that there is an LED
  • 36:44 - 36:50
    that if the microphone is powered up, the LED is on. Just the same way with a camera, but not as badly-designed
  • 36:50 - 37:00
    as most cameras. I guess probably now, we should probably take some questions, given the timing.
  • 37:00 - 37:09
    Is there anybody that wants to ask a question? If so, we're in #libreplanet on OFTC, because OFTC allows
  • 37:09 - 37:13
    me to use Tor to connect to their IRC network, which I'm very thankful for.
  • 37:13 - 37:17
    I would be happy to take some questions, and I know that some of you have contacted me on Jabber.
  • 37:17 - 37:27
    So you can of course, you can of course ask me questions. The first question says, "What is, in your opinion,
  • 37:27 - 37:34
    the most important technology for journalists to learn?" You know, it depends on what kind of journalist.
  • 37:34 - 37:40
    I tend to think that the key technology for people to understand is not a specific technology,
  • 37:40 - 37:47
    but rather the philosophy of free software. I mean, Richard Stallman, who is one of the most brilliant people to have ever lived,
  • 37:47 - 37:54
    really hit the nail on the head when he talks about free software not as a matter of cost but as a matter of freedom.
  • 37:54 - 38:00
    And I think that when people understand that power dynamic, when they understand the tradeoffs they're really making,
  • 38:00 - 38:05
    they'll change the pieces of software that they use. And hopefully, by the time they make that choice,
  • 38:05 - 38:12
    that software will be usable, so that when you use Jitsi, for example, it does not allow non-OTR conversations.
  • 38:12 - 38:19
    Or when you make a video call, it doesn't allow the user, basically, to make an unencrypted stream
  • 38:19 - 38:23
    without jumping through hoops. By default it is secure. By default is privacy by design.
  • 38:23 - 38:30
    And so, if people are going to learn one specific tool, I feel like we're sort of failing.
  • 38:30 - 38:37
    I think, as Schneier is often quoted as saying, privacy and security is a process, not a product.
  • 38:37 - 38:44
    Maybe he only said that about security, but let's modify it a little bit. Right? Liberty is also a process,
  • 38:44 - 38:50
    it's not a product. So journalists need to learn about the world around them, but that's for every person as well.
  • 38:50 - 38:54
    And so when we want every person to have this, we need to make sure that the devices and the software that we use
  • 38:55 - 39:01
    actually enable that by default. The next question is, "How useful is a SHA-256 sum
  • 39:01 - 39:11
    for checking software binary zip integrity checking?" My feeling is that hash functions are not going to be the weakest point.
  • 39:11 - 39:20
    But if you would like, you can take the approach that Debian takes. When you upload a package, it has MD5, SHA-1, and SHA-256,
  • 39:20 - 39:26
    and then you do a GnuPG signature over that. Now I use, because of the fact that I'm certain there are
  • 39:26 - 39:35
    people that are trying to attack my systems, I use this, which is unfortunately not completely free. But it is a GnuPG smart card.
  • 39:35 - 39:42
    And that GnuPG smart card, I also don't leave it plugged into my system very often, and I usually use it on an offline machine
  • 39:42 - 39:46
    so someone has to break into my house to be able to even begin to mount an attack on the smart card.
  • 39:46 - 39:54
    But that, I think, is really the way to go about it. It's not just about hashing, it's also about ensuring that you compose
  • 39:54 - 39:59
    those hashes into a system that makes some kind of sense. But again, in this case with Debian,
  • 39:59 - 40:04
    when you hash the files and you upload them, the binaries I built on my system are the ones that Debian gives out to users.
  • 40:04 - 40:11
    Is that really what we want? I think that's a bad idea. What if my system has been compromised, right?
  • 40:11 - 40:17
    We don't want that binary going out. And there's some work on changing that. But if we think about it just in terms of hash functions,
  • 40:17 - 40:22
    I think we'll rarely find the hash function is the issue. Obviously there are some things, like MD5, that are just hopelessly broken,
  • 40:22 - 40:29
    so we should be moving towards things that are not hopelessly broken, but it's difficult, because a lot of our standardization agencies,
  • 40:29 - 40:38
    they're not very good at their job, in my opinion. Right? When NIST collaborates with the NSA willingly or unwillingly,
  • 40:38 - 40:45
    wittingly or unwittingly, I think we have a problem. So we should look for diversity in this, and not just choose one thing,
  • 40:45 - 40:49
    but choose a few things that make it significantly harder for someone to attack any single thing.
  • 40:49 - 40:57
    And as far as average users being able to verify software, I think this is a really tough problem.
  • 40:57 - 41:04
    Basically, the real issue is a bootstrapping problem. We need to make sure that operating systems have some notion
  • 41:04 - 41:11
    about actual integrity of packages. And that's a really difficult problem to solve because many people start with a
  • 41:11 - 41:18
    proprietary software platform, like Microsoft Windows or Mac OSX, and those platforms, they do not respect peoples' liberty.
  • 41:18 - 41:23
    And naturally, they don't want to help you to move to a new platform that respects your liberty.
  • 41:23 - 41:31
    So, in a free software world though, we should be able to have packages that do have verifiability in the operating system,
  • 41:31 - 41:37
    as well as in the packages. That is, that are signed, that are hashed properly, that have some notion of the web of trust,
  • 41:37 - 41:43
    or something that replaces it, plus a user interface that makes sense. And that's a really difficult one.
  • 41:43 - 41:51
    Snowden calls it the "Greenwald test". And I think that that's a good test, actually. As someone who actually
  • 41:51 - 41:58
    asked Glenn to use a bash shell on Tails and showed him how to use a bunch of command line tools,
  • 41:58 - 42:07
    allow me to elucidate how important that test is. Jesus Christ, that is a serious test. It's really, really, really hard to get
  • 42:07 - 42:13
    Glenn to use those tools securely. But it shouldn't be. In fact, every time that a user can't figure something out,
  • 42:13 - 42:19
    we should say to ourselves that we have failed. Not seriously, but we should say to ourselves that we have failed,
  • 42:19 - 42:22
    and we should try to succeed where we have failed before.
  • 42:22 - 42:28
    I have another question here: "What are the bare minimum fundamentals we should teach the general public
  • 42:28 - 42:35
    when advocating privacy?" Well, I tend to think that the bare fundamental is that we're not talking about privacy, actually.
  • 42:35 - 42:40
    We're talking about autonomy, we're talking about dignity, and we're talking about our liberty.
  • 42:40 - 42:46
    Privacy is merely one of the manifestations of this. So, for example, when people say that they don't have anything to hide,
  • 42:46 - 42:53
    it's not about hiding things. It's about having a private sphere in which to think about things before you reveal what you have decided.
  • 42:53 - 42:59
    Where you don't have to reveal the process by which you make a decision. But also, where you get to choose.
  • 42:59 - 43:04
    It's not that, for example, I have nothing to hide underneath this great Cyberpeace t-shirt,
  • 43:04 - 43:10
    but it should be me that actually chooses if I should take it off. And so, for example, right now since I understand
  • 43:10 - 43:16
    there are sixty people watching this webstream, I'm going to keep it on. And that is, when we talk about privacy,
  • 43:16 - 43:23
    in a sense when we say that privacy is dead, what we're hearing is our modern generation saying that liberty is dead.
  • 43:23 - 43:28
    And I don't like that. So I refuse to say that privacy is dead when people really mean liberty.
  • 43:28 - 43:33
    And I think it is important that we reject that notion, and we should talk about how we should have a right to autonomy,
  • 43:33 - 43:40
    we should have a right to express solidarity, we should have the ability to be able to, in the case of free software and free hardware,
  • 43:40 - 43:46
    have devices that actually empower us and that we understand how they work. And we should be able to be secure, end-to-end secure.
  • 43:46 - 43:58
    So, I've got a couple other ones. Oh, wow, joeyh! One of my favorite Debian developers of all time, that's incredible.
  • 43:58 - 44:02
    I feel honored that you're asking me a question. "Should Debian work towards integrating Tor more?"
  • 44:02 - 44:10
    Yes. So I'm a new Debian developer, it took me ten years, because I'm slow at becoming a Debian developer.
  • 44:10 - 44:18
    But I'm error@debian.org, and I'm super happy to help anybody to be able to integrate Tor and anonymity software
  • 44:18 - 44:26
    by default into Debian. As an example, I have a transparent Tor network that I use to be able to ensure that I can
  • 44:26 - 44:32
    install Debian on new machines without my Internet service provider being targeted by the NSA or other people.
  • 44:32 - 44:39
    I also run a Tor mirror on the Tor hidden service, as well, and a Debian mirror on the Tor hidden service as well,
  • 44:39 - 44:44
    so that I can install packages on these systems without having to worry about basically being attacked.
  • 44:44 - 44:51
    Even if a Debian developer FTP Master's key is compromised. So that a targeted attack is significantly harder.
  • 44:51 - 44:58
    As you can imagine, that's not very usable for regular people, and as you can also imagine, it probably doesn't work very well.
  • 44:58 - 45:05
    So yeah, we should make it so that a Debian user can say, "help! I'm a target of surveillance, and I'd like to be
  • 45:05 - 45:09
    able to use free software without being tampered with." And that would be great if we could make Debian,
  • 45:10 - 45:16
    if we could make Debian more friendly to that. Because basically we, for a long time, have lived in a world of privilege,
  • 45:16 - 45:22
    where we thought we were exempt from the power dynamics of the world. And I think one of the things we will learn,
  • 45:22 - 45:27
    especially with Debian, is that that isn't the case. And the more international a team is, the more the legal authorities
  • 45:27 - 45:35
    of intelligence agencies suggest that they are fair targets. So, that also extends to the users. So I'd love to make that happen.
  • 45:35 - 45:46
    And, yeah, wow. It's incredible to be able to talk to you guys here. Probably the only group of people that really can make these changes, right?
  • 45:46 - 45:52
    I mean, there are other free software people around the world other than the ones in this room, but it's really critical to understand the role
  • 45:52 - 45:55
    that you guys play. And that all of us play, together.
  • 45:55 - 46:14
    I have a couple of other questions here. Helican asks, "Do you think the time is right for a free hardware FreedomBox
  • 46:14 - 46:22
    with Tor built in, and do you have any news on the FreedomBox front?" Well, I was very depressed about some of the discussions
  • 46:22 - 46:31
    around FreedomBox for a while, where I felt like people were taking anonymity as a sort of, like a luxury good.
  • 46:31 - 46:37
    And they felt like we didn't need Tor, or something like that. Now, obviously, I work on Tor and I'm paid to work on Tor,
  • 46:37 - 46:43
    so I feel like it's a conflict of interest for me to say this, but yeah, I think we of course need to do that.
  • 46:43 - 46:49
    At the same time, the reason that I work on Tor is because I really believe it. I think Tor has probably saved my life a couple of times
  • 46:49 - 46:56
    every month for the last several years, from military dictatorships to other places where I've traveled.
  • 46:56 - 47:02
    So I think it's critical to make that possible. So as an example, this device I held up here, this Novena board,
  • 47:02 - 47:15
    well, as you can tell, the basic idea is to have a device that is free hardware and free software that, you know, gives you
  • 47:15 - 47:21
    exactly what you've just asked for. And that's in fact what I have. That device, when I plug it in, it sets up a wireless network
  • 47:21 - 47:31
    that transparently routes people through Tor, and it also sets up a Tor relay so that it will relay traffic for the rest of the network.
  • 47:31 - 47:38
    And it's entirely powered by free software with no proprietary software at all. I think that that is, yeah,
  • 47:38 - 47:42
    I think that's a good thing to do, and that's what I've been spending my time doing lately. If you want to help with that, it would be great.
  • 47:42 - 47:47
    And if we can get the FreedomBox to adopt the Novena board, I think that that is great. I think we should try to raise
  • 47:47 - 47:55
    a million dollars for Bunnie so that we have a free hardware solution, or open hardware solution, that actually is usable,
  • 47:55 - 48:00
    that's fast, that doesn't support a company that doesn't care about our liberty, but instead supports a developer
  • 48:00 - 48:04
    who really does care about our liberty and about our freedom.
  • 48:04 - 48:12
    The next question from Malapart is, "Is .onion today what SSL was in the mid-90s?"
  • 48:12 - 48:26
    I really hope not for a whole bunch of reasons. So the next question... ah. So someone in the audience wants me to elucidate
  • 48:26 - 48:33
    on the link between anarchism and free software ideology and goals. I think that it's important
  • 48:33 - 48:39
    to not focus too much on that, in particular because I think that sometimes talking about anarchist philosophy alienates people,
  • 48:39 - 48:46
    because they think that anarchism is the same as complete chaos, or synonymous with violence.
  • 48:46 - 48:51
    And so I'd like to sidestep that and say if you apt-get install anarchism, literally, that's the Debian package,
  • 48:51 - 48:56
    you can read about the philosophical texts of anarchism. But the basic idea of anarchism is about mutual aid,
  • 48:56 - 49:03
    it's about solidarity, it's about respect for human rights, it's about the same things that the free software movement are about.
  • 49:03 - 49:08
    But there's a lot of propaganda out there about the notion of democracy, in fact, in the form of anarchy.
  • 49:08 - 49:15
    And that's unfortunate, actually. And I think we can change that. One of the ways that we can change that
  • 49:15 - 49:21
    is to actually have propaganda of the deed. In this case, making free software and free software available
  • 49:21 - 49:26
    to everyone means that people understand the fundamental tenets of anarchist philosophy
  • 49:26 - 49:29
    in their everyday life, and they don't have to learn about the philosophy too much
  • 49:29 - 49:34
    to be enabled by it. And if they want to, they can learn about it. I think that's a very powerful way
  • 49:34 - 49:39
    to make that happen, because it's very easy, for example, to talk about it philosophically,
  • 49:39 - 49:45
    but until you have a tangible thing, it's not really clear. That is, when we didn't have an anonymity network,
  • 49:45 - 49:50
    and people said, "Well, do you really need anonymity?" you would make a different choice than
  • 49:50 - 49:55
    if you have an anonymity network and it will be taken away from you if someone says "do you need anonymity?"
  • 49:55 - 50:00
    and you say no. So when you say yes, and it's there, and it's tangible, it changes it.
  • 50:00 - 50:06
    And the same is true for anarchist philosophy, and the same is true, I think, for free software and free hardware.
  • 50:06 - 50:10
    And especially when these things work together, they actually help us to build autonomous communities,
  • 50:10 - 50:16
    they help us to build secure systems across hostile networks. I think that that's very powerful,
  • 50:16 - 50:21
    and I think that the way to get people to care about that is actually to show them that.
  • 50:21 - 50:26
    People care a lot more about connecting now that it's easy to do. It wouldn't have been a relevant question
  • 50:26 - 50:30
    thirty years ago in the way that it is a relevant question now. So the freedom to connect,
  • 50:30 - 50:34
    the freedom of free hardware and free software, these tie fundamentally into anarchist goals.
  • 50:34 - 50:37
    I'd really encourage people to look up the works of Emma Goldman, for example.
  • 50:37 - 50:43
    I think she's one of the greatest feminists to have ever lived, though most people don't know who she is.
  • 50:43 - 50:50
    And if you looked at the Wikipedia page, for a time there was no mention of her on "Important feminists of the twentieth century",
  • 50:50 - 50:56
    I think is the page I was looking at. I think that is a bit of a shame, but I also think that that's, you know,
  • 50:56 - 51:01
    an easy thing to reconcile with reality if people go and they look it up and they study about it.
  • 51:01 - 51:08
    So hopefully people will install that Debian package and otherwise learn about that if they are interested in it,
  • 51:08 - 51:14
    but really, I think, getting people to have the values that are embodied in that is just as important if not more important.
  • 51:14 - 51:20
    The next question is "What about those countries that are completely blocking projects like Tor?
  • 51:20 - 51:27
    What should we do to help people in those countries?" I tend to think not in terms of charity,
  • 51:27 - 51:32
    or helping people, but rather in terms of solidarity. So, the Tor project, for example,
  • 51:32 - 51:39
    is not having a war with China, right? China often does not respect its citizens' autonomy,
  • 51:39 - 51:43
    and blocks its access to the Tor network. One thing that would be helpful would be to
  • 51:43 - 51:49
    make it so that, by default, a lot of applications use Tor so that the so-called collateral damage,
  • 51:49 - 51:53
    though I'm loathe to use that term, becomes higher and higher, becomes more difficult.
  • 51:53 - 51:59
    And also, such that people start to use what are called pluggable transports, like the obfuscated proxy obfs3.
  • 51:59 - 52:05
    The proxy actually, right now, is not blocked in China. It becomes a sort of cat and mouse game,
  • 52:05 - 52:11
    but it may be the case that as we build more difficult-to-classify protocols, as applications understand
  • 52:11 - 52:15
    that sometimes the Internet does not respect your autonomy and wants to tamper with it,
  • 52:15 - 52:22
    that will be something that will change the dynamic about how that blocking and that arms race works.
  • 52:22 - 52:30
    We have another project, ooni.torproject.org, that's the Open Observatory of Network Interference,
  • 52:30 - 52:36
    or we used to call it Open Open Net. That is a free software tool that we've been working on
  • 52:36 - 52:40
    for several years now, to be able to look at censorship and surveillance. You know,
  • 52:40 - 52:46
    censorship is a second-order effect of surveillance, so this tool, while at the moment not the most usable tool,
  • 52:46 - 52:51
    it actually allows you to diagnose, understand, and share the data. So one thing that can really make a big difference
  • 52:51 - 52:58
    in these topics is to actually share the data. Right? Once we start to study and understand these things,
  • 52:58 - 53:03
    especially the techniques of censorship and surveillance, it allows us to change not only how the networks work,
  • 53:03 - 53:08
    but how societies work around those networks. So, I think studying that can be useful.
  • 53:08 - 53:13
    If you want to be a Google Summer of Code, I know that's kind of ironic, but if you want to be a
  • 53:13 - 53:16
    Google Summer of Code student to work on one of these projects with the Tor project,
  • 53:16 - 53:22
    I think we still have another day to apply for that, though I'm not totally sure about that deadline.
  • 53:22 - 53:28
    If you just want to come hack on free software with us at the Tor project, we have a bunch of projects that are like that.
  • 53:28 - 53:38
    Some other questions. It looks like... Yes, the Novena router does not have AMT, that's right,
  • 53:38 - 53:44
    so it does not have a built-in backdoor, which is, I think, nice. At least not one that we know about.
  • 53:51 - 53:58
    Any other questions here? Ah, I see, there's like twenty. Alright.
  • 54:01 - 54:06
    "Could you please elaborate on the idea or concept that it is required a critical mass of privacy-minded users
  • 54:06 - 54:12
    to create enough obfuscation for making discovery schemes like Tor network node spying to be unlikely?"
  • 54:12 - 54:18
    I don't think we're going to make it unlikely for spying to take place. What we need to do is change
  • 54:18 - 54:26
    the economic balance, and that may allow us to move into a world where mass surveillance of our intentional communications
  • 54:26 - 54:34
    are much too expensive to do for everyone. And this is important, because if you have a phone,
  • 54:34 - 54:41
    and you make a phone call, people think of surveillance and conceptualize surveillance as surveilling your call,
  • 54:41 - 54:45
    but there's all the unintentional data that you leave behind. All the towers you visit, and so on.
  • 54:45 - 54:52
    That stuff is also, unfortunately, a huge target of mass surveillance. So even if everyone's using
  • 54:52 - 54:56
    something like RedPhone, we still have these little spy devices in our pockets.
  • 54:56 - 55:00
    Even if it's free software enabled, the networks themselves are harmful to privacy.
  • 55:00 - 55:05
    That said, we do need a lot of people using this stuff, because the more people that are using it,
  • 55:05 - 55:11
    the more likely it is that it will stick around. If it's just people like Edward Snowden, Julian Assange,
  • 55:11 - 55:15
    Glenn Greenwald, Laura Poitras, or myself using it, yeah, I mean, that's a problem.
  • 55:15 - 55:22
    Not only do we stick out on the network, we have, well, basically it makes it much easier to target,
  • 55:22 - 55:29
    and it also makes it possible for people to try to ban that technology, whether that's by DPI or by legal methods.
  • 55:29 - 55:39
    That is a really serious problem. Okay, I think that we should wrap up here soon, it sounds like.
  • 55:39 - 55:49
    If there are any other questions, I will take them, but otherwise I think I'm going to end the stream.
  • 55:49 - 55:55
    If you'd like to hack on free software with us, and anonymity-related stuff, I'd be happy to talk with you.
  • 55:55 - 56:02
    I will never use this Jabber address again, so that your social graph is not tainted by mine.
  • 56:02 - 56:08
    If anybody wants to send me an email, you can send a mail to jacob@torproject.org,
  • 56:08 - 56:15
    or if you'd like to, for example, chat with me on IRC, I'm ioerror in #libreplanet for now.
  • 56:15 - 56:20
    Thank you so much for the honor and privilege of speaking with you, I'm really sorry that I cannot
  • 56:20 - 56:24
    set foot in my own country right now, to be able to speak with you in person. But thanks to
  • 56:24 - 56:30
    free software, I am able to speak with you. So, thank you so much for making that possible,
  • 56:30 - 56:34
    especially to all of the free software developers in the room that actually made that possible.
  • 56:34 - 56:40
    Thank you, very much for your time, and I hope to meet some of you again, someday, in real life.
  • 56:40 - 56:43
    And remember: if not, it was murder.
Title:
Video Language:
English

English subtitles

Revisions