[Kopimism] Fwd: [liberationtech] Group Thinks Anonymity Should Be Baked Into the Internet Itself

eddan.com eddan at sudoroom.tv
Fri Nov 29 17:33:23 PST 2013


Do the doctrines of Kopimism cover the sanctity of anonymity?

> From: Eugen Leitl <eugen at leitl.org>
> Date: November 29, 2013 at 11:47:48 AM EST
> To: tor-talk at lists.torproject.org, Liberation Technologies <liberationtech at lists.stanford.edu>, cypherpunks at al-qaeda.net, doctrinezero at zerostate.is
> Subject: [liberationtech] Group Thinks Anonymity Should Be Baked Into the Internet Itself
> Reply-To: liberationtech <liberationtech at lists.stanford.edu>
> 
> 
> http://www.technologyreview.com/news/521856/group-thinks-anonymity-should-be-baked-into-the-internet-itself/
> 
> Group Thinks Anonymity Should Be Baked Into the Internet Itself
> 
> Following NSA surveillance revelations, talks advance on making the
> privacy-protecting tool Tor an Internet standard.
> 
> By David Talbot on November 26, 2013
> 
> WHY IT MATTERS
> 
> Published reports suggest that Internet traffic is widely spied upon by the
> NSA and other government agencies.
> 
> The Internet’s main engineers have asked the architects of Tor—networking
> software designed to make Web browsing private—to consider turning the
> technology into an Internet standard.
> 
> If widely adopted, such a standard would make it easy to include the
> technology in consumer and business products ranging from routers to apps.
> This would, in turn, allow far more people to browse the Web without being
> identified by anyone who might be spying on Internet traffic.
> 
> If the discussions bear fruit, it could lead to the second major initiative
> of the Internet Engineering Task Force (IETF) in response to the mass
> surveillance by the National Security Administration. Already the IETF is
> working to encrypt more of the data that flows between your computer and the
> websites you visit (see “Engineers Plan a Fully Encrypted Internet”).
> 
> Collaborating with Tor would add an additional layer of security and privacy.
> When Tor is successfully used, the websites you visit don’t know the true
> address and location of your computer, and anyone watching traffic from your
> computer wouldn’t know where you’re browsing—a distinct layer of protection
> that goes beyond encrypting your communications.
> 
> Stephen Farrell, a computer scientist at Trinity College, Dublin, believes
> that forging Tor into a standard that interoperates with other parts of the
> Internet could be better than leaving Tor as a separate tool that requires
> people to take special action to implement. “I think there are benefits that
> might flow in both directions,” he says. “I think other IETF participants
> could learn useful things about protocol design from the Tor people, who’ve
> faced interesting challenges that aren’t often seen in practice. And the Tor
> people might well get interest and involvement from IETF folks who’ve got a
> lot of experience with large-scale systems.”
> 
> Andrew Lewman, executive director of Tor, says the group is considering it.
> “We’re basically at the stage of ‘Do we even want to go on a date together?’
> It’s not clear we are going to do it, but it’s worth exploring to see what is
> involved. It adds legitimacy, it adds validation of all the research we’ve
> done,” he says. On the other hand, he adds: “The risks and concerns are that
> it would tie down developers in rehashing everything we’ve done, explaining
> why we made decisions we made. It also opens it up to being weakened,” he
> says, because third-party companies implementing Tor could add their own
> changes.
> 
> The IETF is an informal organization of engineers that changes Internet code
> and operates by rough consensus. Internet service providers, companies, and
> websites aren’t required to implement any standards the IETF issues. And even
> if security standards are implemented, they may not be widely deployed. For
> example, years ago the IETF created a standard for encrypting Web traffic
> between your computer and the websites you visit. Although this standard,
> HTTPS, is built into most software for serving Web pages and browsing the
> Web, only banks, e-commerce sites, and a number of big websites like Google
> and Facebook have elected to actually use it. The IETF hopes to make such
> encryption the default for a future Web communications standard known as HTTP
> 2.0.
> 
> The Tor Project is a nonprofit group that receives government and private
> funding to produce its software, which is used by law enforcement agencies,
> journalists, and criminals alike. The technology originally grew out of work
> by the U.S. Naval Research Laboratory aimed at protecting military users (see
> “Dissent Made Safer”).
> 
> When someone installs Tor on his computer and takes other precautions, it
> supplies that computer with a directory of relays, or network points, whose
> owners have volunteered to handle Tor traffic. Tor then ensures that the
> user’s traffic takes extra steps through the Internet. At each stop, the
> previous computer address and routing information get freshly encrypted,
> meaning the final destination sees only the address of the most recent relay,
> and none of the previous ones.
> 
> Leaks by Edward Snowden, a former NSA contractor, suggest that circumventing
> Tor was one of the NSA’s goals, and that the agency had had some success (see
> “Anonymity Network Tor Needs a Tune-up to Protect Users from Surveillance”).
> “We are about 10 people, and have multibillion dollar agencies trying to
> break our technology,” Lewman says.
> -- 
> Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at companys at stanford.edu.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sudoroom.org/pipermail/kopimism/attachments/20131129/55cdb00c/attachment.html>


More information about the Kopimism mailing list