[liberationtech] [SPAM:###] Re: [SPAM:###] Re: Google Unveils Tools to Access Web From Repressive Countries | TIME.com

Sacha van Geffen sacha at greenhost.nl
Tue Oct 22 07:22:04 PDT 2013


On 22-10-13 09:02, Shava Nerad wrote:
> uproxy.org <http://uproxy.org> -- it looks phenomenally like psiphon,
> actually. I got referred to this page through Amanda Walker from Google
> who says (carefully not speaking for anyone at Google) it's open source
> (eventually) developed by U Washington.  
> 
> Has anyone heard of this at all?  I pointed Ron Deibert at it -- I
> thought he'd find it fascinating if he hadn't heard about it. ;]
> 

It sounds more like Lantern to me... seeing the involvement of brave new
software and use of the google social graph.


> quoth Amanda:
> 
>     So, Google isn't "rolling out a proxy network".  uProxy was
>     developed at the University of Washington; they plan to release
>     source under the Apache 2 license (so you don't *have* to trust
>     anyone).  It's a peer to peer proxy system, not a centralized one
>     that goes through Google (or anyone else).
> 
> 
>     http://uproxy.org/
> 
> 
> Except of course, it goes through whomever your penpal is.
> 
> Here's a summary of the early rollout of Psiphon:
>  http://www.ethanzuckerman.com/blog/2007/01/31/ron-deibert-on-the-history-and-future-of-psiphon/
> (I was at this talk ;)  
> 
> Hugely popular was 80,000 users, and there were growing pains then and
> thereafter (this is not a criticism -- it's expected).  Will Google be
> happy with their announcement when users freak at people proxying KP
> through their penpal invites?  Because inevitably, people will want to
> adopt activists from overseas and some will be not quite what they expect.
> 
> Will League of Legends-like matchmaking lobbies emerge to broker
> connections, rather much defeating the personal friend aspect for the
> less clueful?  And who will um take advantage?  Will penpals in the US
> report back to Teheran for example?  I mean, I'm likely preaching to the
> crowd, right?
> 
> But Jared Cohen and Eric Schmidt's book reads like a post ironic
> Innocents Abroad.  It opens with the bald statement that the Internet is
> one of the few things humans have created that they do not fully
> understand.  
> 
> If you reduce "things" to generalizations such as "religion,"
> "government," "community," "war," and so on, I suppose they may be
> right.  We have not fully come to grips with the Internet as a special
> case of "mass media," and we can not possibly come to a comprehensive
> consensus on that.  The subject matter changes faster than any consensus
> could be expressed/reached -- to the universal relief of bloggers, and
> of academics seeking publication and junkets to conferences.
> 
> These are the people who are, with great sanguine big-dog enthusiasm,
> pushing this out.  I wish I felt confident we could keep the tail
> wagging from breaking the tea service.  Could be fine.  Makes me
> nervous.  Just sayin...
> 
> You don't have to distrust Google per se to wonder if they are wise, or
> have domain expertise in all things.  
> 
> Being big and rich does not buy you wisdom to know what you don't know.
>  This is a lesson of empire/monarchy, even benevolent empire, even
> benevolent monarchy -- it relies on the discretion of one entity, one
> ego and often the people around that entity will not or can not get a
> word in to say, "No. Just no." 
> 
> Carnegie knew all about libraries, but he didn't know so much about
> maintaining earthen dams
> (http://www.jaha.org/FloodMuseum/clubanddam.html)  You can't know
> everything.  People can still die.
> 
> So there are my late night ponderings...
> 
> yrs,
> 
> 
> On Tue, Oct 22, 2013 at 1:36 AM, Roger Dingledine <arma at mit.edu
> <mailto:arma at mit.edu>> wrote:
> 
>     On Mon, Oct 21, 2013 at 10:25:48AM -0700, Yosem Companys wrote:
>     > The most ambitious product launch is uProxy, a new Web browser
>     > extension that uses peer-to-peer technology to let people around the
>     > world provide each other with a trusted Internet connection.
> 
>     It's a shame that designs like this still blur the line so much between
>     "censorship-resistant transport" and "proxy back-end."
> 
>     If these folks have a cool "we use xmpp through google's servers to
>     reach the proxy" transport, wouldn't it be even better if they publish
>     that part, in a modular way, so other tools (like vpn providers, or Tor)
>     can reuse that transport if they want to get its properties?
> 
>     And in the other direction, if their users want some more security
>     properties on the proxy side, wouldn't it be better if their volunteers
>     could choose to glue this transport onto some other back-end (like vpn
>     providers, or Tor)?
> 
>     We've been making great progress lately in the academic world at having
>     researchers split the problem so the transport can focus on being
>     hard to
>     block and then the proxy side can focus on providing whatever security
>     properties it wants. In the Tor world we call it pluggable transports,
>     but the engineers here will recognize the term 'modularity'.
> 
>     > ?It?s completely encrypted and there?s
>     > no way for the government to detect what?s happening because it just
>     > looks like voice traffic or chat traffic.
> 
>     Can somebody remind me of the State Dept quote, long ago, about
>     Haystack? That was a different guy though right? And surely this time
>     they're doing it right, with a comprehensive design document and threat
>     model, open source, etc before the publicity splash?
> 
>     To aim for a more productive tone, I'd like to echo what Eric said
>     but with a crucially different slant: the more *reuable and testable
>     components*, the merrier. The key is to grow the space in terms of
>     how we
>     understand what works, what doesn't work anymore (or never did), and
>     what
>     options we have for making mash-ups of these components. Otherwise it's
>     just yet another brief flame with its big publicity push, no
>     well-written
>     code behind it, no change to our understanding of how to solve the
>     problem / what problems to solve, and no re-usable parts left behind.
> 
>     --Roger
> 
>     --
>     Liberationtech is public & archives are searchable on Google.
>     Violations of list guidelines will get you moderated:
>     https://mailman.stanford.edu/mailman/listinfo/liberationtech.
>     Unsubscribe, change to digest, or change password by emailing
>     moderator at companys at stanford.edu <mailto:companys at stanford.edu>.
> 
> 
> 
> 
> -- 
> 
> Shava Nerad
> shava23 at gmail.com <mailto:shava23 at gmail.com>
> 
> 


-- 

Greenhost - Sustainable Hosting
T: +31204890444
info at greenhost.nl
https://greenhost.nl/

A digital signature can be attached to this e-mail,
you need opengpg software to verify it. see:
http://tinyurl.com/openpgp-manual

Key fingerprint = 4F15 CE56 36AB A1C2 0D81  BE10 E12B B435 F2D5 2E48



More information about the liberationtech mailing list