Radical Technology Collective Asymmetric Warfare Against the Surveillance State
Total Page:16
File Type:pdf, Size:1020Kb
Radical Technology Collective Asymmetric Warfare Against the Surveillance State Asymmetric Warfare ● Our idea of Asymmetric Warfare: Expend less cost for more damage The Surveillance State - Past ● Middlebourough Talking T! "ilot "rogram# $%%& The Surveillance State - Future ● "olice forces all over the '( )ill manned aircraft from a national fleet# according to *ome Office plans+ ,ast month it )as revealed that modified military aircraft drones )ill carry out surveillance on everyone from protesters and antisocial motorists to fly-tippers# and )ill be in place in time for the $%.$ Olympics+ ● http://)))+)ired+co+uk/ne)s/archive/$%.%-%$/.%/future-police-meet-the-uk0$&s-armed-robot-drones On Software Freedom ● 1ree Soft)are is a matter of liberty# not price+ ● 1ree Soft)are provides the user certain essential freedoms: ● 1reedom to use ● 1reedom to study/modify ● 1reedom to share ● 1ree Soft)are is both more secure# and more compatible )ith anarchist ideals+ Talk Outline ● 2ata at 3est ● 2ata in Motion ● onclusion: Standing Orders for Asymmetric Warfighters Securing Data at Rest Password Security ● "ass)ords are human ● 4ood "ass)ords: ● Are phrases ● *ave a )ide character set ● Tips for remembering "assphrases ● 5uotes ● 3eplace letters )ith upper-case letters# numbers# or punctuation ● "ass)ord lists 6 secured by a 7master pass)ord8 Secure Deletion ● Even after deleting a file# it still exists on your hard disk and can be recovered+ Implementing Secure eletion ● Windo)s: ● Sdelete 9from Microsoft Sysinternals: ● Eraser "ortable 9from "ortableApples ● Apple: ● 1inder ; Secure Empty Trash ● 4<'/,inux ● T* =s srm ● 4<' shred ● wipe Backu"s ● Should be off-site 9not on the same hard drive: and encrypted ● >ou should back up anything you )ould )ant after getting raided/struck by lighting Im"lementing Backu"s ● Microsoft Windo)s: ● ?uilt-in backup tool into encrypted store ● Amanda ● Apple OS @: ● ?uilt-in backup tool into encrypted store ● Amanda ● 4<'/,inux: ● duplicity and 2eAa-2up Distributed Data Stores ● ,ike backing up to the BnternetC ● Bf there=s something that A<=T be deleted# the best )ay to back it up is to share it )ith everyone+ ● Bf it=s private# you can encrypt it and distribute the key later+ Implementing Distributed Data Stores ● ?itTorrent 9deluge-torrent+org: ● 1reenet 9freenetproAect+org: ● Dust sharing files 97sneakernet8: Encry"tion ● 1ile encryption ● 2irectory encryption ● 1ull/Whole 2isk Encryption File Encry"tion ● Microsoft Windo)s: ● Toucan 9portableapps+com/apps: ● Apple OS @: ● EEE ● 4<'/,inux ● 4<' "rivacy 4uard ● All "latforms: ● Truecrypt 9truecrypt+org: ● &Fip Directory Encry"tion ● Microsoft Windo)s: ● 1ilesystem Encryption 9right-click directory;properties and check 7encrypt8: ● Apple OS @: ● Apple 1ile!ault ● 4<'/,inux ● encfs ● Ecryptfs 9built into 'buntu: ● Truecrypt Whole isk Encry"tion ● 4<'/,inux ● Bnstaller option in 'buntu 9select 7encrypted ,!M8: ● Apple OS @: ● EEE ● Microsoft Windo)s ● Truecrypt ● ?it,ocker 9non-free: Securing Data in Motion Data in Motion ● ommunications ● Email ● Bnstant Messaging ● Transmitted 2ata ● Web bro)sing Service Providers Friendly Service Providers ● 3iseup ollective 9riseup+net: ● Activix 9activix+org: ● !arious 7hacker-friendly8/8)areF- friendly8 offshore hosts ● >ouC 'ou are the friendliest service provider of all ● We must )ork to)ards an Bnternet )here communications is not mediated by 7service providers8# but is direct ● This makes us autonomous ● autonomo+us Data in Motion ● What you=re talking A?O'T ● Who you=re talking TO What you're talking about ● Encryption Systems ● Web - *TT"S ● 7httpsevery)here8 addon from E11 for 1irefox ● BM 6 OT3 ● Adium for OS @ ● "idgin and "idgin-OT3 for 4<'/,inux and Windo)s ● Email 6 Open"4" ● Thunderbird G Enigmail G 4<' "rivacy 4uard Who you're talking to ● 4eneral "urpose ● Tor 6 AnonymiFing net)ork overlay ● Email ● Mixminion/Mixmaster – perfectprivacy+de ● On )andles ● 2etective )ork is )hat the cops are best at ● 'se handles not connected )ith you at all ● 3andomly generated names are better Conclusion: Standing Orders Standing Order #1: Default Deny Standing Order #2: Some is better than none Standing Order #+, the Network Effect .et In Touch ● rtcHriseup+net ● https://)e+riseup+net/radtechcol ● http://groups+fsf+org/)iki/4roup:3T ● apt-get install anarchism .