Protonmail Subpoena Us Crime
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A History of End-To-End Encryption and the Death of PGP
25/05/2020 A history of end-to-end encryption and the death of PGP Hey! I'm David, a security engineer at the Blockchain team of Facebook (https://facebook.com/), previously a security consultant for the Cryptography Services of NCC Group (https://www.nccgroup.com). I'm also the author of the Real World Cryptography book (https://www.manning.com/books/real-world- cryptography?a_aid=Realworldcrypto&a_bid=ad500e09). This is my blog about cryptography and security and other related topics that I Ûnd interesting. A history of end-to-end encryption and If you don't know where to start, you might want to check these popular the death of PGP articles: posted January 2020 - How did length extension attacks made it 1981 - RFC 788 - Simple Mail Transfer Protocol into SHA-2? (/article/417/how-did-length- extension-attacks-made-it-into-sha-2/) (https://tools.ietf.org/html/rfc788) (SMTP) is published, - Speed and Cryptography the standard for email is born. (/article/468/speed-and-cryptography/) - What is the BLS signature scheme? (/article/472/what-is-the-bls-signature- This is were everything starts, we now have an open peer-to-peer scheme/) protocol that everyone on the internet can use to communicate. - Zero'ing memory, compiler optimizations and memset_s (/article/419/zeroing-memory- compiler-optimizations-and-memset_s/) 1991 - The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations The US government introduces the 1991 Senate Bill 266, (/article/461/the-9-lives-of-bleichenbachers- which attempts to allow "the Government to obtain the cat-new-cache-attacks-on-tls- plain text contents of voice, data, and other implementations/) - How to Backdoor Di¸e-Hellman: quick communications when appropriately authorized by law" explanation (/article/360/how-to-backdoor- from "providers of electronic communications services di¸e-hellman-quick-explanation/) and manufacturers of electronic communications - Tamarin Prover Introduction (/article/404/tamarin-prover-introduction/) service equipment". -
Battle of the Clipper Chip - the New York Times
Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp... https://nyti.ms/298zenN Battle of the Clipper Chip By Steven Levy June 12, 1994 See the article in its original context from June 12, 1994, Section 6, Page 46 Buy Reprints VIEW ON TIMESMACHINE TimesMachine is an exclusive benefit for home delivery and digital subscribers. About the Archive This is a digitized version of an article from The Times’s print archive, before the start of online publication in 1996. To preserve these articles as they originally appeared, The Times does not alter, edit or update them. Occasionally the digitization process introduces transcription errors or other problems; we are continuing to work to improve these archived versions. On a sunny spring day in Mountain View, Calif., 50 angry activists are plotting against the United States Government. They may not look subversive sitting around a conference table dressed in T-shirts and jeans and eating burritos, but they are self-proclaimed saboteurs. They are the Cypherpunks, a loose confederation of computer hackers, hardware engineers and high-tech rabble-rousers. The precise object of their rage is the Clipper chip, offically known as the MYK-78 and not much bigger than a tooth. Just another tiny square of plastic covering a silicon thicket. A computer chip, from the outside indistinguishable from thousands of others. It seems 1 of 19 11/29/20, 6:16 PM Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp.. -
Zfone: a New Approach for Securing Voip Communication
Zfone: A New Approach for Securing VoIP Communication Samuel Sotillo [email protected] ICTN 4040 Spring 2006 Abstract This paper reviews some security challenges currently faced by VoIP systems as well as their potential solutions. Particularly, it focuses on Zfone, a vendor-neutral security solution developed by PGP’s creator, Phil Zimmermann. Zfone is based on the Z Real-time Transport Protocol (ZRTP), which is an extension of the Real-time Transport Protocol (RTP). ZRTP offers a very simple and robust approach to providing protection against the most common type of VoIP threats. Basically, the protocol offers a mechanism to guarantee high entropy in a Diffie- Hellman key exchange by using a session key that is computed through the hashing several secrets, including a short authentication string that is read aloud by callers. The common shared secret is calculated and used only for one session at a time. However, the protocol allows for a part of the shared secret to be cached for future sessions. The mechanism provides for protection for man-in-the-middle, call hijack, spoofing, and other common types of attacks. Also, this paper explores the fact that VoIP security is a very complicated issue and that the technology is far from being inherently insecure as many people usually claim. Introduction Voice over IP (VoIP) is transforming the telecommunication industry. It offers multiple opportunities such as lower call fees, convergence of voice and data networks, simplification of deployment, and greater integration with multiple applications that offer enhanced multimedia functionality [1]. However, notwithstanding all these technological and economic opportunities, VoIP also brings up new challenges. -
MEMO. Nº. 52/2017 – SCOM
00100.096648/2017-00 MEMO. nº. 52/2017 – SCOM Brasília, 21 de junho de 2017 A Sua Excelência a Senhora SENADORA REGINA SOUSA Assunto: Ideia Legislativa nº. 76.334 Senhora Presidente, Nos termos do parágrafo único do art. 6º da Resolução do Senado Federal nº. 19 de 2015, encaminho a Vossa Excelência a Ideia Legislativa nº. 76.334, sob o título de “Criminalização Da Apologia Ao Comunismo”, que alcançou, no período de 09/06/2017 a 20/06/2017, apoiamento superior a 20.000 manifestações individuais, conforme a ficha informativa em anexo. Respeitosamente, Dirceu Vieira Machado Filho Diretor da Secretaria de Comissões Senado Federal – Praça dos Três Poderes – CEP 70.165-900 – Brasília DF ARQUIVO ASSINADO DIGITALMENTE. CÓDIGO DE VERIFICAÇÃO: CE7C06D2001B6231. CONSULTE EM http://www.senado.gov.br/sigadweb/v.aspx. 00100.096648/2017-00 ANEXO AO MEMORANDO Nº. 52/2017 – SCOM - FICHA INFORMATIVA E RELAÇÃO DE APOIADORES - Senado Federal – Praça dos Três Poderes – CEP 70.165-900 – Brasília DF ARQUIVO ASSINADO DIGITALMENTE. CÓDIGO DE VERIFICAÇÃO: CE7C06D2001B6231. CONSULTE EM http://www.senado.gov.br/sigadweb/v.aspx. 00100.096648/2017-00 Ideia Legislativa nº. 76.334 TÍTULO Criminalização Da Apologia Ao Comunismo DESCRIÇÃO Assim como a Lei já prevê o "Crime de Divulgação do Nazismo", a apologia ao COMUNISMO e seus símbolos tem que ser proibidos no Brasil, como já acontece cada vez mais em diversos países, pois essa ideologia genocida causou males muito piores à Humanidade, massacrando mais de 100 milhões de inocentes! (sic) MAIS DETALHES O art. 20 da Lei 7.716/89 estabeleceu o "Crime de Divulgação do Nazismo": "§1º - Fabricar, comercializar, distribuir ou veicular, símbolos, emblemas, ornamentos, distintivos ou propaganda que utilizem a cruz suástica ou gamada, para fins de divulgação do nazismo. -
Transnationality, Morality, and Politics of Computing Expertise
UNIVERSITY OF CALIFORNIA Los Angeles Transnationality, Morality, and Politics of Co!"#ting Ex"ertise A dissertation s#%!i&ed in partial satis action o t'e re(#ire!ents for t'e degree )octor o P'iloso"'y in Anthro"ology %y L#is Feli"e Rosado M#rillo *+,- . Co"yright by L#is Feli"e Rosado M#rillo 2+,- A/STRACT OF T0E DISSERTATION Transnationality, Morality, and Politics o Co!"#ting E$"ertise %y L#is Feli"e Rosado M#rillo )octor o P'iloso"'y in Anthro"ology Uni1ersity o Cali ornia, Los Angeles, 2+,- Pro essor C'risto"'er M2 Kelty, C'air In this dissertation I e$amine t'e alterglo%alization o co!"#ter e$"ertise 5it' a oc#s on t'e creation o "olitical, econo!ic, !oral, and tec'nical ties among co!"#ter tec'nologists 5'o are identi6ed %y "eers and sel 7identi y as 8co!"#ter 'ac9ers2: ;e goal is to in1estigate 'o5 or!s o collaborati1e 5or9 are created on a local le1el alongside glo%al "ractices and disco#rses on co!"#ter 'ac9ing, linking local sites 5it' an e!ergent transnational do!ain o tec'nical e$c'ange and "olitical action. In order to ad1ance an #nderstanding o the e$"erience and "ractice o 'ac9ing %eyond its !ain axes o acti1ity in <estern Euro"e and the United States, I descri%e and analy4e "ro=ects and career trajectories o program!ers, engineers, and hac9er acti1ists w'o are ii !e!%ers o an international networ9 o co!!#nity s"aces called 8'ac9ers"aces: in the Paci6c region. -
Pgpfone Pretty Good Privacy Phone Owner’S Manual Version 1.0 Beta 7 -- 8 July 1996
Phil’s Pretty Good Software Presents... PGPfone Pretty Good Privacy Phone Owner’s Manual Version 1.0 beta 7 -- 8 July 1996 Philip R. Zimmermann PGPfone Owner’s Manual PGPfone Owner’s Manual is written by Philip R. Zimmermann, and is (c) Copyright 1995-1996 Pretty Good Privacy Inc. All rights reserved. Pretty Good Privacy™, PGP®, Pretty Good Privacy Phone™, and PGPfone™ are all trademarks of Pretty Good Privacy Inc. Export of this software may be restricted by the U.S. government. PGPfone software is (c) Copyright 1995-1996 Pretty Good Privacy Inc. All rights reserved. Phil’s Pretty Good engineering team: PGPfone for the Apple Macintosh and Windows written mainly by Will Price. Phil Zimmermann: Overall application design, cryptographic and key management protocols, call setup negotiation, and, of course, the manual. Will Price: Overall application design. He persuaded the rest of the team to abandon the original DOS command-line approach and designed a multithreaded event-driven GUI architecture. Also greatly improved call setup protocols. Chris Hall: Did early work on call setup protocols and cryptographic and key management protocols, and did the first port to Windows. Colin Plumb: Cryptographic and key management protocols, call setup negotiation, and the fast multiprecision integer math package. Jeff Sorensen: Speech compression. Will Kinney: Optimization of GSM speech compression code. Kelly MacInnis: Early debugging of the Win95 version. Patrick Juola: Computational linguistic research for biometric word list. -2- PGPfone Owner’s -
Are Cookie Banners Indeed Compliant with the Law? Cristiana Santos, Nataliia Bielova, Célestin Matte
Are cookie banners indeed compliant with the law? Cristiana Santos, Nataliia Bielova, Célestin Matte To cite this version: Cristiana Santos, Nataliia Bielova, Célestin Matte. Are cookie banners indeed compliant with the law?: Deciphering EU legal requirements on consent and technical means to verify compli- ance of cookie banners. Technology and Regulation, Tilburg University, 2020, 2020, pp.91-135. 10.26116/TECHREG.2020.009. hal-02875447v2 HAL Id: hal-02875447 https://hal.inria.fr/hal-02875447v2 Submitted on 23 Sep 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Are cookie banners indeed compliant with the law? Deciphering EU legal requirements on consent and technical means to verify compliance of cookie banners Cristiana Santos, Nataliia Bielova, Célestin Matte Inria, France [email protected] [email protected] [email protected] Abstract In this paper, we describe how cookie banners, as a consent mechanism in web applications, should be designed and implemented to be compliant with the ePrivacy Directive and the GDPR, defining 22 legal requirements. While some are provided by legal sources, others result from the domain expertise of computer scientists. We perform a technical assessment of whether technical (with computer science tools), manual (with a human operator) or user studies verification is needed. -
Indicators of Compromise Associated with Onepercent Group Ransomware
TLP: WHITE The following information is being provided by the FBI, with no guarantees or 23 AUG 2021 warranties, for potential use at the sole discretion of recipients in order to protect against cyber threats. This data is provided to help cyber security Alert Number professionals and system administrators guard against the persistent malicious CU-000149-MW actions of cyber actors. This FLASH was coordinated with DHS-CISA. WE NEED YOUR HELP! This FLASH has been released TLP: WHITE. Subject to standard copyright rules, If you find any of TLP: WHITE information may be distributed without restriction. these indicators on your networks, or have related Indicators of Compromise Associated with OnePercent information, please contact Group Ransomware www.fbi.gov/con Summary tact-us/field- offices The FBI has learned of a cyber-criminal group who self identifies as the *Note: By reporting “OnePercent Group” and who have used Cobalt Strike to perpetuate any related ransomware attacks against US companies since November 2020. OnePercent information to the Group actors compromise victims through a phishing email in which an FBI, you are assisting in sharing attachment is opened by the user. The attachment’s macros infect the system information that with the IcedID1 banking trojan. IcedID downloads additional software to include allows the FBI to track malicious Cobalt Strike. Cobalt Strike moves laterally in the network, primarily with actors and PowerShell remoting. coordinate with private industry OnePercent Group actors encrypt the data and exfiltrate it from the victims’ and the United systems. The actors contact the victims via telephone and email, threatening to States Government to prevent future release the stolen data through The Onion Router (TOR) network and clearnet, intrusions and unless a ransom is paid in virtual currency. -
CSCI-UA.9480 Introduction to Computer Security
CSCI-UA.9480 Introduction to Computer Security Session 2.3 Designing Secure Network Systems Prof. Nadim Kobeissi Goals of today’s class. A look into some secure network systems: ● WireGuard: a modern VPN. ● A critical look at ProtonMail, a secure email service. WireGuard is an example of a well-designed secure network application. ProtonMail is an example of a badly designed network application. CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi 2 WireGuard Following slides are by Jason A. 2.3a Donenfeld, author of WireGuard. CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi 3 What is WireGuard? ▪ Layer 3 secure network tunnel for IPv4 and IPv6. ▪ Opinionated. Only layer 3! ▪ Designed for the Linux kernel ▪ Slower cross platform implementations also. ▪ UDP-based. Punches through firewalls. ▪ Modern conservative cryptographic principles. ▪ Emphasis on simplicity and auditability. ▪ Authentication model similar to SSH’s authenticated_keys. ▪ Replacement for OpenVPN and IPsec. ▪ Grew out of a stealth rootkit project. ▪ Techniques desired for stealth are equally as useful for tunnel defensive measures. Security Design Principle 1: Easily Auditable OpenVPN Linux XFRM StrongSwan SoftEther WireGuard 116,730 LoC 119,363 LoC 405,894 LoC 329,853 LoC 3,771 LoC Plus OpenSSL! Plus StrongSwan! Plus XFRM! Less is more. Security Design Principle 1: Easily Auditable WireGuard 3,771 LoC IPsec SoftEther OpenVPN (XFRM+StrongSwan) 329,853 LoC 119,363 419,792 LoC LoC Security Design Principle 2: Simplicity of Interface ▪ WireGuard presents a normal network interface: # ip link add wg0 type wireguard # ip address add 192.168.3.2/24 dev wg0 # ip route add default via wg0 # ifconfig wg0 … # iptables –A INPUT -i wg0 … /etc/hosts.{allow,deny}, bind(), … ▪ Everything that ordinarily builds on top of network interfaces – like eth0 or wlan0 – can build on top of wg0. -
Data Ethics (Former Journalist)
DATAETHICS Nanna H Bach Pia Thomassen Pernille Tranberg Lili The Lazy Cocker Advisor in data ethics (former journalist) Author of 6 books incl FAKE IT (2012) and DataEthics - The New Competitive Advantage (2016) Co-founder of the ThinkDoTank DataEthics.eu Pernille Tranberg Privacy Tech findx.com adblockfast Cliqz FakeNameGenerator.com disconnect.me Hushfile startpage.com Protonmail wire.com IBVPN.COM TOR OPERA Consumers/Citizens ➤ 7 of 10 worried about their data ➤ Have started to ACT on their worry. E.g. w adblockers, 1 of 3 Europeans lie about their data (the younger the better) ➤ We trust the regulated and distrust those tracking us: social media, search, news ➤ We understand the value of our data and want control ➤ Convenience rules! But there is a creepiness limit Sources: datatilsynet.no Eurobarometer on DataProtection 2015, Symantec State of Privacy 2015, Erhvervsstyrelsen/IDA 2015 , Ctrl-Shift Sept 2016, Danmarks Statistik 2017, McKinsey Comscore Jan 2017 We are with data where we were with the environment in the beginning of 1960s The New Green digital mistrust Political & Commercial Manipulation Price discrimination or differentiaton Pay-as-you-behave ➤ Not based on solidarity or for the better of society ➤ It gives the employer or insurance company a lot of power over individuals who is responsible? Government ➤ enforce the law Companies & Institutions ➤ promote the new market ➤ create digital trust with data for privacy tech and data ethics ethics ➤ give customers control over ➤ be a role model own data shared responsibility ➤ Innovate w Privacy by Design Individuals ➤ digital selfdefense ➤ demand it from gov ➤ chose ethical alternatives Definition DATA ETHICS is responsible and sustainable use of personal data. -
The People Who Invented the Internet Source: Wikipedia's History of the Internet
The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced. -
0137135599 Sample.Pdf
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 [email protected] For sales outside the United States, please contact: International Sales [email protected] Visit us on the Web: www.informit.com/aw Library of Congress Cataloging-in-Publication Data: Abelson, Harold. Blown to bits : your life, liberty, and happiness after the digital explosion / Hal Abelson, Ken Ledeen, Harry Lewis. p. cm. ISBN 0-13-713559-9 (hardback : alk. paper) 1. Computers and civilization. 2. Information technology—Technological innovations. 3. Digital media. I. Ledeen, Ken, 1946- II. Lewis, Harry R. III. Title. QA76.9.C66A245 2008 303.48’33—dc22 2008005910 Copyright © 2008 Hal Abelson, Ken Ledeen, and Harry Lewis All rights reserved.