[liberationtech] How to make the Internet secure
Karl Semich
gmkarl at gmail.com
Fri Feb 3 13:23:12 PST 2017
Hi Rich,
What you describe here sounds exciting to me. I am very interested in communication solutions that prioritize all of sneakernet, encryption, and conventional use.
I was wondering if you know of any modern sneakernet resources, or up-and-coming systems which support this? Right now I'm basically using git-annex for everything.
- Karl
Sent from my iPhone
> On Feb 3, 2017, at 9:04 AM, Rich Kulawiec <rsk at gsp.org> wrote:
>
>
> Many of these kinds of proposals are wonderfully thought out BUT
> they presume underlying network infrastructure that (a) exists
> (b) has sufficient performance (c) is not heavily censored/blocked
> (d) is not heavily monitored/surveilled.
>
> The problem with that, as everyone here probably knows all too well,
> is that those assumptions are often not true. In some places, they're
> less and less true by the day.
>
> So assume a country where connections from/to the outside world are
> thoroughly blocked and heavily monitored, and where the ISPs are compelled
> by the government to record and store data/metadata about everything
> their users do. Assume a country where VPNs and Tor are illegal
> and/or are red flags to surveillance agencies. Assume a country which
> will shut down its Internet connection and/or its internal ISPs if
> it wants to. (These are plausible assumptions to make because in
> some cases, they're already true.)
>
> So even if all connections are encrypted, that won't suffice: the
> endpoints won't be able to connect. Even if they can, that won't suffice,
> because it'll leave a very suspicious metadata trail. Even if that's
> avoidable, the end-to-end performance will be terrible. Even if that's
> acceptable, synchronous and direct communications will always be far
> more dangerous than asynchronous and indirect communications because
> it facilitates traffic analysis. Even if that's acceptable, none of
> it will work when the network's unplugged.
>
> For these kinds of proposals to be viable under adverse circumstances --
> which are the circumstances where they NEED to be viable -- they need to
> be able to work over highly intermittent/slow connections (e.g., ad hoc
> connections that don't traverse any ISP's broadband infrastructure)
> and over sneakernet.
>
> *Especially* over sneakernet: I think that's an absolute must-have.
>
> For example:
>
> 1. Mail queue written onto a USB stick or memory card or similar.
> 2. It's smuggled into a location.
> 3. It's plugged into a system which delivers the queue locally
> and/or via wifi and/or bluetooth.
> 4. Same system collects traffic going the other way, then
> 2 and 1 are reversed.
>
> This is a model somewhat like Usenet in the days of UUCP connections
> over dialup -- with the wrinkle that we didn't have to commit queues to
> 9-track tape and physically transport them very often. But an awful
> lot of mail will fit on a 2G memory chip -- and that can be concealed
> in almost anything. In slightly less hostile circumstances, a USB stick
> or portable drive could hold far more. And just as once upon a time we
> were admonished to "never undestimate the bandwidth of a station wagon
> full of tapes" we should not underestimate the bandwidth of a backpack
> full of drives. Heck, a single one would easily suffice to transport
> hundreds of newspapers' worth of news plus photos plus audio plus video
> (in) and to transport an equivalent amount of text, audio, video,
> photos, etc. (out).
>
> (As a site note, let me note that there's also good reason to think
> about the Usenet flooding model, because it makes traffic analysis
> difficult: everything is delivered to everyone. I wrote a proposal
> a few years back to leverage Usenet news plus encryption to create a
> highly asynchronous, indirect communications method that would suffice
> to get email and news in/out of countries with NO external connectivity.
> Plus: almost all the software already exists, it's well-understood and
> mature, it scales indefinitely, works over intermittent and slow links,
> works over sneakernet. Minus: arguably inefficient, somewhat vulnerable
> to DoS, requires rethinking duplicate detection problem.)
>
> If you'd like a contemporary use case for this: Cameroon.
>
> I am, by the way -- and this is a nod to your preamble about
> incrementalists and absolutists -- firmly in the middle. There are a
> number of things that we're doing (and have been doing) that we need
> to stop doing immediately, and some things we don't do that we need to
> start doing yesterday. That's the absolutist part. The incrementalist
> part says that we should not be tinkering with machinery that has proven
> itself to be very robust in the face of determined attacks *unless*
> the replacement parts we have in mind can demonstrate that they'll be
> just as resilient. For instance, I'm highly dubious about JSON email,
> which I think is far more likely to introduce gratuitous complexity,
> creeping featurism, and horrible code bloat -- and thus massive security
> and privacy issues -- than anything else.
>
> ---rsk
> --
> Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at companys at stanford.edu.
More information about the liberationtech
mailing list