<<

Contents 1ANoteofCaution1.1isPowerful,butnotyouronlyofdefe nse1.1.1LearnandUse 2Basicsfirst2.1RiskAnalysis2.2Kerckhoffs'sprinciple2.3PublicCrypt ography2.3.1LearnandUse2.4SSL2.4.1LearnandUse2.5AES 3PGP/GPG3.1InstallGPG3.1.1PGPPublicKeyservers3.2Importourkeys3.3 Encryptyourmessage3.3.1AutomaticUsing/Thunderbird3.3.1 .1LearnandUse3.3.2ManualEncryptionUsingCommandLines/TerminalsandGPG3 .4Keys3.5Links3.6LearnandUse 4VerifyingDownloads&Files:Hashing4.1FileChecksumInte grityVerifier4.2Hashtab&HashMyFiles4.3CheckingHasheson/Mac4. 4CheckingGPGDigitallySignedSoftwarePackageSignatures 5DiskEncryption5.1TrueCrypt5.1.1LearnandUse5.2FileVault5.3LUKS5.4T omb5.5LearnandUse 6SecureDataDeletion 7EncryptedMobileCommunications7.1Gibberbot7.2TextSecure7.3RedPhone7.4 Chatsecure 8ProtectedBrowsing8.18.1.1LearnandUse8.2TorBrowserBundle 8.3OnionbrowseroniOS8.4:TorOnAndroid8.5Orweb:Proxy+PrivacyBrow ser8.6Ghostery8.7LearnandUse 99.1Tor9.29.39.4 10SecureChat10.1Encryption10.210.3Deniability10.4Perfect forwardsecrecy10.5support10.5.1Native10.5.2Viaplugin10.5.3Pro xy10.5.4ChatLogFiles10.6LearnandUse 11Misc11.1TahoeLAFS11.1.1LearnandUse11.2Intrusiondetectionsystems11 .3IronKey11.4DistrRTgen 12SoftwareLibraries 13OperatingSystemandHostEnvironment13.1Homedirectoryencryption13.2Ful lDiskEncryption13.2.1Seealso13.3OperatingSystems13.3.1Linux:The AmnesicIncognitoLiveSystem13.3.2LibertéLinux13.3.3Whonix 14Email14.1WebsiteEmailers14.1.1SSLenabledservices14.1.2NonSSLservi ces 14.2EncryptedDropboxes14.2.1Privacybox.de 15DataLiberation15.1LearnandUse 16VirtualPrivateNetworks(VPNs)16.1MicrosoftPPTP16.1.1MicrosoftPPTPPro blems16.2OpenVPN16.3VPNinmeatspace16.4SSH16.5ExternalVPNguides/links :16.6LearnandUse 17Bitcoin17.1LearnandUse 18RFID 19RemoteDesktopsoftware19.1MicrosoftRDP19.2AppleRemoteDesktopARD 20VoiceoverIP20.1LearnandUse 21MobilePhones/Smartphones 22CounterSurveillance22.1LearnandUse 23LegalIssues23.1Australia23.2EuropeanUnion23.2.1Ireland23.2.1.1Decry ptionLaws23.2.2UnitedKingdom23.3UnitedStates 24OrganizationsandLegalSupport24.1ElectronicFrontierFoundation 25CoursesandEducation 26Wheretogoformoreinformation 27SomeRelevantQuotesfromandElsewhere 27.1SecurityHumour ANoteofCaution:Pleaseonlyaddresourcesandtoolstothispage.Inasmuchas anyonecaneditthiswiki,someskepticismiswarrantedâcrowdsourcinghasthedef ectsofitsvirtues!Forgood,concrete,peerreviewedadvice,werecommendthe ElectronicFrontierFoundation'stutorialsathttps://ssd.eff.org/Thatsaid,yo urprivacyisalreadymoreconfigurablethanyoumightthink... CryptographyisPowerful,butnotyouronlylineofdefense Thetheorybehindcryptographyissolidandproven,butsolidcryptowillfaili f: Implementedincorrectlyifthetoolclaimstohavecertaincryptoimplemented, theymaybetruthfulbuttheimplementationmaybeunsound.Trytousethetool sthathavealargeuserbaseandlargecommunitiestheyaregenerallysafer( butnotalways). Misusedencryptedafilebutdidn'tsecuredeletetheplaintext?Initiatedan SSLtunnelbutdidn'tverifytheremotecertificate?Usetopnotchcryptosoftw arebutdidn'tprotecttheOSorthephysicalcomputer?Itissoeasytomakemi stakes,doingitrightrequiresconsistency,vigilance,andamodicumofparanoi a.Assumethatyoudonotknow,learnallyoucan,thenuse.Carefully.Mistakes mayrenderyourstateoftheartcryptouselessagainstaknowledgeableadversa ry. Whyiscryptographydangerous?Becauseitcangiveyouafalsesenseofsecurity . Cometoacryptopartyandtalktoexperts,learnfromeachother,andcontinue tolearnovertime.Takeresponsibilityforyourcommunication,privacy,andsec urity.Don'tletanyonescareyououtofexperimentingandimplementingcrypto, butpleasebeawareittakestimeandefforttolearnthatcryptoisnecessary, butnotsufficent;itisnotapanacea. LearnandUse Video:EncrypttoLivefromCryptopartyBoston(Andrew)via@torproject Basicsfirst RiskAnalysis CommitteetoProtectJournalistsJournalistsSecurityGuideInformationSecuri tybyDannyOâBrienhopefullyaCryptoPartywillclearlyexplainmostofthesoftw areandtechniquesmentionedinthisguide. Youremphasisshouldbeonsimplicity.Thereâsnopointinsurroundingyourselfwith computersecuritythatyoudonâtuse,orthatfailstoaddressaweakerlinkelsewh ere.Takeadvantageofwhatyouknowwell:thepeoplewhoaremostlikelytotak eoffenseorotherwisetargetyourwork,andwhattheymaybeseekingtoobtain ordisrupt.Usethatknowledgetodeterminewhatyouneedtoprotectandhow. Askyourself:WhatinformationshouldIprotect?Whatdataisvaluabletomeor apotentialadversary?Itmightnotbewhatyouthinkofatfirst.Manyjournali stsfeelthatwhattheyaredoingislargelytransparent,andthattheyhavenot hingtohide.Butthinkaboutthedangerstosourcesiftheinformationtheyhav eprovidedtoyouwasmorewidelyknown.Whatmayseeminnocuouspersonalinform ationtoyoumightbeincriminatorytoothers. Kerckhoffs'sprinciple Kerckhoffs'sprincipleAshouldbesecureevenifeverythingabout thesystem,exceptthekey,ispublicknowledge. Thisprincipleshouldapplytoallofthetoolsandresourcesmentionedonthis page. PublicKeyCryptography PublicKeyCryptographyhasonlybecomepracticalwiththeuseofcomputers.It offersamathematicallysecurewayofsendingencryptedorfilesbetwee ncomputersandtheirusers,withoutnecessarilyhavingtosetupaseparateSec ureChannele.g.afacetofacemeeting,toagreeuponorexchangethesecretke ytothecryptographictheyareusingtoprotecttheprivacyoftheme ssageordatafromsnoopers. PublicKeyCryptographyalsooffersamethodofdetectingattemptsatforgeryth roughtheuseofDigitalSignatures. LearnandUse BBCsciencepresenterDrYanWongexplains(withoutmathematics)theprincipleo fhowAliceandBobcanuse"digitalpadlocks"toprotecttheirmessagesfrombe ingreadbyEdtheeavesdropperPublicKeyEncryptionvideoclip(3minutes) ThereisanexcellentvisualexplanationofDiffieHellmankeyexchangeonYouTu be. SSL SecureSocketLayerisamulticypherprotocolusedtocreateanencryptedconne ctionacrossthefromyourdevicetoadestination;itiswidely usedincommercialapplications.TheprecursortoTransportLayerSecurity(TLS ),manysystemswhichactuallyuseTLSanachronisticallyclaimthattheyareusi ngSSLinasmuchasitfarmorewidelyknown. Websitelinkswhichbeginwithhttps://signifytheuseofSSLorTLSencrypted sessions CheckhowwellapublicinternetwebserverisconfiguredforSSL/TLSviatheQ ualsysSSLLabsServerTest Bydefaultmostwebserverconfigurationsallowoldprotocolsandweakcryptograp hicciphers.SeetheServersidesecuritytweakspageforhowthiswasimproved forthiswebsitehttps://CryptoParty.orgrunningonanApachewebserver. TheQualsysSSLLabsServerTestscoreforCryptoParty.orgof"A"85isnowasg oodasmostinternetbankingwebsitesetc. ForMicrosoftIIS7.xonWindows2008orIIS6.xonWindows2003,thefreeNarta SoftwareIISCryptotoolwillallowyoutoconvenientlydisabletheweakSSLve r2protocolandtopickandordertheCipherSuites,toignoreweak40bitand 56bitkeylengthsandtoincludetheRC4algorithmtoresisttheBEASTmanint hemiddleattack,withouthavingtowadethroughthecomplexitiesofvariousReg istryKeysetc. AddingtheHTTPStrictTransportSecurityheaderwhichallowsthelatestversion sofbrowserslikeChrometoalwayschoosetheSSLencryptedversionofa website,againtoresistmaninthemiddleattacks: Windows2008IIS7.x Windows2003IIS6.x ApacheServersidesecuritytweaks TheDigitalCertificateFingerprintsforhttps://CryptoParty.orgare: SerialNo:000835C2 SHA1:13:10:16:5D:8E:19:3F:E9:58:A0:A5:D0:38:B1:BB:59:C8:75:B2:2C MD5:EF:07:FB:C6:AF:D9:CC:25:72:43:0A:05:B4:AB:14:65 Youcanchoosetotrustthecolourchangesinyourwebbrowsernavigationbaror othersymbolsandthelackofpopupwarningmessages,thatsignifya"good"SS L/TLSencryptedsessionconnectiontothewebsite.Alternatively,youcanchec ktheseCryptographicHashFingerprintsmanuallyeachtimeyouvisitthiswebsit e,e.g.inFirefoxonaWindowscomputer,rightmouseclickonthewebpage/Vi ewPageInfo/Security/ViewCertificate Iftheydonotmatchwhatyouareexpecting,donotenteranysensitivedataint oanywebforme.galoginusernameororyourcreditcarddetails,wit houtcheckingfurther. Youcanalsomakeuseofsay,aFirefoxwebbrowseraddonlikeCertificatePatro l,whichwillnotifyyouifthecurrentDigitalCertificatehaschangedsinceth eprevioustimeyouvisitedthewebsitethismaybeindicativeofamaninthe middlehijackattemptoritmaybeanormalrotationduecertificateexpiryor loadbalancingbetweendifferentcomputersonhighvolumewebsites. UsingSSLbynomeansguaranteesthatyourconnectionis"secure".Itonlyindic atesthattheconnectionisencryptedbetweenyouandtheserver,andifthecer tificatesystembehinditisnotmanipulated(whichhashappenedinthepast)th attheremoteserveriswhatitclaimsitis.TheuseofSSLdoesnotimplythat theremotewebsiteissecure(orthatyourcomputerissecure)."UsingSSLto deliverdatabetweenadesktopPCandatypicalwebsiteislikeusinganarmored cartodelivermoneyfromyoursockdrawertoapaperbagtapedunderaparkbe nch."AlanBatie(whoeverthatis). LearnandUse Video:"SSLandAuthentication"fromBostonCryptoparty(John)via@torproject AES TheAdvancedEncryptionStandardisapopularsymmetriccypher.Thismeansthat thekeyusedtoencrypttheinformationisthesameasthekeytodecryptit.AE Sisastandardformofencryptionforgovernmentsandlargeorganisations,and hasformedthebasisformanyotherderivative(suchasPGP,asdi scussedbelow). SymmetriccipherssuchasAESareusefulbecausetheyarefast,reliableandnon specific.AfileencryptedviaAEScanbesharedwidelyanddecryptedbyeveryon ewiththesamekey.Thisisinstarkcontrasttopublickeyencryptionmethods, whereencryptionistargetedtotheownerofaprivatekeyonly.Arealworlde xampleofthisapproachisthedistributionbyWikileaksofan"insurance"file, whichappearstobeAESencrypted.ThedistributionofthisfilemeansthatWik ileakshaveleverageovermorepowerfulenemies,astheycanreleaseasmallkey tounlockalarge,andpresumablyhighimpact,file. Isisnormalforpublickey(asymmetric)andsymmetricciphermethodstobecomb inedtotakeadvantageofthestrengthsofboth.InthepopularPGPencryptionf ormat,amessageorfileisencryptedfirstwithasymmetriccipher(usuallyAES ),andtheAESencryptionkeyisthenencryptedwiththerecipients'publickeys .TheencryptedAESkeyforeachrecipientisthenattachedtothemessageandt heentireblockcanbesent.BecauseAESisfasteratencryptinganddecrypting largefilesorbodiesoftext,thissavesconsiderabletimeandbandwidthcompar edtoencryptingentiremessageswithpublickeysanddistributingadifferentc opyofthemessagetoeachrecipient.Forrecipients,onlytheAESkeyneedsto bedecryptedwiththeprivatekey,savingtime,andtherestcanbedecryptedwi thAES;afastercipher. CipherssuchasAESareoftenalsousedforsessionencryptionbetweenclientso rservers,usingasimilarformat;first,asessionkeyissentviaasymmetric/p ublickeymethods,andthisisthereafterusedbybothparties(asa"sharedsec ret")toencryptanddecryptcommunications.Again,thissavesconsiderable widthandtimeoverpublickeyencryptingeverycommunicationsent. PGP/GPG PrettyGoodPrivacyisadataencryptionanddecryptioncomputerprogram.PGPis oftenusedforsigning,encryptinganddecryptingtexts,emails,files,direct ories,anddiskpartitionstoincreasethesecurityofemailcommunications.It wascreatedbyPhilZimmermannin1991. ItsvariantGNUPrivacyGuardisaGPLLicensedalternativetothePGPsuiteof cryptographicsoftware.GnuPGiscompliantwithRFC4880,whichisthecurrentI ETFstandardstrackspecificationofOpenPGP.CurrentversionsofPGP(andVerid is'Filecrypt)areinteroperablewithGnuPGandotherOpenPGPcompliantsystems. ApartoftheFreeSoftwareFoundation'sGNUsoftwareproject,GnuPGhasalsor eceivedmajorfundingfromtheGermangovernment. Seeminglyinordertoremaininteroperablewitholder,possiblyproprietarysoft ware,GnuPGstillallowssignaturesusinginsecurehasheslikeSHA1.Ifyoudon 'tknowwhatthismeans,sufficetosayit'sabadidea.Thereareinstructions heredetailinghowtofixthisafterinstallingGPG,sothatonlysecurehashes areused;thisprotectsyoufromothersfalsifyingmessagesinyourname,andis definitelyworthdoingifyouuseanysoftwarethatusesGPG,likeEnigmail.Th eandroidportofGnuPG,APG(below),doesnotseemtouseoutdatedmessagehash esandneedsnofurthertweakingtousesecurely(providedyoutrustthechannel throughwhichyoureceivedAPG,liketheAndroidPlayMarket). MultipleOperatingSystemsGNUPrivacyGuard AppleMacintoshGPGTools MicrosoftWindows AndroidAPGAndroidPrivacyGuard iOSoPenGP EnigmailpluginforMozillaThunderbirdEnigmail InstallGPG GNUPrivacyGuard,orGnuPG/GPGforshort,isanopensource,featurerichimple mentationofthepopularandwelltrustedOpenPGPstandardforpublickeyencryp tion.Thisistheformofencryptionmostoftenusedforemailbetweenindividua ls,andcanbeusedtosign,verify,encryptanddecryptanythingfromemailmes sagestofiles. GPGishighlyrecommended,butthedefaultsettingsaredesignedtobebackwards compatiblewithslowermovingproprietarysoftware,andusesomeinsecuresetti ngsthatshould(bynow)bephasedoutentirely.Thisbackwardscompatibilityis notnecessaryforCryptopartiers,whoareallhip,awesomepeopleusingthelat estinopensourcecryptography. ChiefamongtheproblemsisthedefaultusageoftheSHA1hashfamily,whichis bynowknowntobeinsecureandcanleadtosignaturefalsification,allowinga nattackertomakeitseemasifyouhavepersonallysignedandattestedtothe contentsofanarbitrary,perhapsmalicious,messageorprogram.Agoodguidefo rhowtomigrateaninstalledcopyofGPGtomoresecuremodernsettingsishere (forlinuxusers).Itshouldn'ttakemorethanaminuteintheTerminaltoperf ormthesechanges,anditwillvastlyimprovethesecurityofyourGPGencrypted messages(thisincludesmessagesencryptedwithGPGbasedcryptosuiteslikeEn igmailinThunderbird). ItisabsolutelyvitalthatyoucryptographicallyverifytheversionofGPGthat youinstall. OnGNU/Linuxsystems,thepackagemanagerdoesthisforyou.Youdon'tneedtow orryaboutit. OnWindowsandMac,youverylikelyneedtodownloadsomethingfromawebsite seethe#Linkssection.MakesurethatthewebaddressyoudownloaditfromisH TTPS,notHTTP. Manywebsitesprovidecryptographicchecksumsthatthemoretechnicallyinclined canusetoverifytheirdownloads.However,inmanycasesthisinformationisp rovidedviaHTTP,whichisnotsecure.Ifyoudecidetogodownthisroute,make surethatyourgetyourchecksumsinasecurewayaswell!Forexample,useHTT PSinsteadofHTTP,ifpossible. PGPPublicKeyservers PGPPublicKeyserversarecentraldirectoriesofpublishedPGP/GPGPublicKeys . TheyareusefulforfindingabackupcopyofaPGPPublicKey,especiallyifyou rmainwebsiteisunderDDoSorattackorhasbeenseizedbytheauthorities.Th eytheyshouldnotbereliedonastheonlymethodofdistributingsuchkeys,es peciallysinceanybodycanuploadaplausiblelookingPGPKey. Becauseofthisthreatofkeyfalsification,keysonkeyserversareoftenidenti fiedbytheir"Fingerprint",or"ID".Akeyfingerprintisatruncatedhashfunc tionofthepublickey,andisconsidereduniqueenoughtobeusedinverificati onofthekey.Thisisonlyusefulifyouknowthefingerprint/idoftherecipie nt'struekeywhensearchingforit,andthefingerprintmustalsobeverifieda fterdownloadingandimportingthekeyintotheappropriatesoftware.Mostgood keymanagementsoftwarewilllistthekeyfingerprint/idnexttoimportedkeys, allowingeasyverificationagainstthefingerprintgivenbytherecipient. ManyPublicPGPKeyserversarenetworkedtogether,soaPGP/GPGPublicKeysub mittedtooneofthem,willeventuallybepublishedonseveral(butnotall)of themautomatically.Thisisinkeepingwiththepopularmindsetthatapublicke yisbetteroffverypublic,sothatifsomeoneseeksakeyforarecipient,the yaremorelikelytoencounterthelegitimatekey,ratherthanapotentiallyfal sekey.Atworst,then,theywillencountertwokeys,andbeinspiredtoverify whichoneiscorrect. http://pgp.mit.edu/ http://pgp.unimainz.de http://keyserver2.pgp.com/ http://keyserver.ubuntu.com/ http://pool.skskeyservers.net/ Playthe6degreesofkeyseparationhttp://pgp.cs.uu.nl/ Importourkeys Beforesendingusemailforthefirsttime,youneedtoimportourkeys.Youonl yneedtodothisonceperemailaddress(percomputerthatyouwishtousetod otheencryption). Windows 16.1Keyserverconfiguration:selectOpenPGP,thenkeepthedefaultserver(hkp ://keys.gnupg.net)andsavewithoutmakingfurtherchanges.Youonlyneedtodo thisoneperinstallation;youcanskipitforanyotherfuturekeysthatyoune edtoimport. 16.2Searchandimportcertificatesfromcertificateservers:usetheappropriat eemailaddressfrom#Keys 11Certificateinspection:theappropriatefingerprintisgivenin#Keys MacOSX FollowthesameinstructionsasforGNU/Linuxbelow.TypeeachcommandintoaTe rminalwindow(/Applications/Utilities/Terminal),thenhitReturn.(Thedollars ignrepresentsthecommandpromptyou'llseeatthebeginningofanycommandlin e:don'ttypeitin.)IfyouneedfurtherinstructionsonusingtheTerminal,se etheHelpmenu,thisO'ReillyintroorGoogle. GNU/Linux Importfromakeyserver: $gpgsearchkeyskeyserverpgp.mit.eduOUR_EMAIL_ADDRESS Youmaygetaskedto"Enternumber(s),N)ext,orQ)uit>".Usuallythismeanspr ess1andenteri.e.thefirstkeyfound,whichshouldalsobetheonlykeyfo und. Encryptyourmessage Pleaseonlyencryptplaintext.Someofthemethodsheremaynotworkwithother formats,andit'ssaferforustoo.Thismeansthatifyouremailclientallows youtousegraphicalsmileyfaces,bold/italic/otherfonts,andotherprettytex tfeatures,it'sprobablybestnottousethese,andtotrytoswitchyouremail composewindowto"plaintext"ratherthanHTMLifyoucanfindasettingtodo so.InThunderbird,thesettingisfoundinthe"AccountSettings"Dialog,foun dinthe"Edit"menu:Gotothe"CompositionandAddressing"tabofthedesired account,anduncheck"ComposeMessagesinHTMLFormat". Emailencryptionisprimarilyawaytopreventpeoplebetweensenderandrecipie ntfromreadingthemail.However,youmayalsobeconcernedaboutpeopleaccess ingyourpersonalcomputer,eitherbyhackingintoitfromanetworkorbyphysi callyseizingthecomputerfromyouandforcingyoutodecryptthecontents(ass umingtheyareencryptedatall).Ifyou'reconcernedthatthismighthappen,th endon'tkeepcopiesofanyimportantyousendorreceiveinplaintext. Ifdraftinganemail,dosoinaprogramlikegedit(Linux)orNotepad(Windows) ,don'tsavethefileatanytime,andcopy/pastethetextdirectlyintotheenc ryptionschemeyouplantouse.Also,remembertoturnoffmessagedraftautosav ing,whichinmanycasesuploadsacopyofyourdraft,unencrypted,tothecentr alemailserver,defeatingthepurposeofencryptionentirely. Inallcases,emailSubject:linesareNOTencrypted.Don'tputsensitiveinform ationthere.Ifyoudon'tevenwanttorevealyouremailaddress,getafriendt osendit. Ifyouknowhowto,pleasecryptographicallysignyourmessageaswell!Thiswil lassureusthatyourmessagewastrulywrittenbyyou,andnotforged.Butthis hastheeffectofrevealingyouridentityaswell,soit'suptoyou. AutomaticEncryptionUsingEnigmail/Thunderbird Enigmailisa"frontend"forGnuPGthatoffersanicepluginlikeinterfacefor Thunderbird.Whenconfiguredcorrectly,itremovesmuchofthework/hassleofen cryptingemailtosupportedrecipients(i.e.thosewithkeypairs),andallowsyo utogetbacktothebusinessofcommunicatingwithareasonabledegreeofsecur ityinmind. However,Enigmailhasanumberofgotchasthatneedtobeconsideredwhensettin gitup.Forexample,youneedtosetEnigmailtoautomaticallyencryptemailto recipientswhoseemailaddresseshavematchingpublickeysinthelocalkeysto re;otherwiseitmayleaveituptoyoutoremembertocheck"encrypt"intheco mposewindow,whichiseasytoforget.YoucanalsosetupEnigmailtoautomatic allysignalloutgoingemail,oronlytosignwhenalsoencrypting;thisisupt oyou. Enigmail'ssecurityisdependentonGPGitself,andsoyouneedtoensureyourG PGinstallationissecure;seeaboveforinformationonthisprocess,which(at present)includeschangingsomesettingsthroughthecommandline/terminal;sorr ytonewusers,thisisseeminglythefaultoftheprevelantdistributorsofGPG fornotupdatingthesoftwaretomatchchangingsecuritythreats,andcan'tbe helped. OnekeyconsiderationwhensettingupEnigmailistochangethesettingsofthe emailclientitself,toturnoffdrafts.Thisisbecausetonormforremoteemai lmanagementthesedaysis"IMAP",asystemthatworksthroughsynchronisingrem otemailfolderswiththelocalclientandviceversa.Inotherwords,whenyour emailclientautomaticallysavesadraftofanemailyouarecomposingtoa"dr afts"folder(evenoneyouthinkyou'veonlymadelocally),oddsareit'supload ingthatunencrypteddraftdirectlytotheserver.So,bysimplyturningoffaut omaticmessagedraftinginThunderbird,youimproveyourprivacyandallowEnigm ailtoactasgatekeeperbetweenyouandthemailserver.You'llfindtheapprop riatesettingin"ThunderbirdSettings">Composition>General>"Autosaveevery XXMinutes".Justunchecktheoption,thenumberofminutesisthenirrelevant. LearnandUse Slides:"EncryptingEmailwithPGP/Enigmail/ThunderbirdâfromCryptoPartyLondon ManualEncryptionUsingCommandLines/TerminalsandGPG AssumingthatyouarenotusingagraphicalinterfacetoGnuPGsuchasEnigmail (fortheThunderbirdemailclient),youcanuseGPGintheTerminaloraWindows commandline,tomanuallyencryptyourfilesortoruncombinationsofGPGcomm andsasscriptsorbatchfiles. Windows 12Encryptingemails:shouldbefairlyselfexplanatory.Makesureyouhavealr eadyimportedtherightkey;seeprevioussection. N.B.evenexperiencedusersmakemistakeswiththeWindowscommandline,especia llyassomeGPGoptionsusedoubledashesandothersjustsingleones C:\Users\CryptoParty>gpg?|more willdisplaytheavailableoptions,onepageatatime. MacOSX FollowthesameinstructionsasforGNU/Linuxbelow.TypeeachcommandintoaTe rminalwindow(/Applications/Utilities/Terminal),thenhitReturn.(Thedollars ignrepresentsthecommandpromptyou'llseeatthebeginningofanycommandlin e:don'ttypeitin.)IfyouneedfurtherinstructionsonusingtheTerminal,se etheHelpmenu,thisO'ReillyintroorGoogle. GNU/Linux Thebestwayistorun: $gpgaerOUR_EMAIL_ADDRESS>OUTPUT_FILE Starttypingyourmessage.(Orrightclickand"Paste"fromtheclipboard.)When youaredone,pressCtrlDandtheprogramwillexit.Youwillfindtheencrypt edformofyourmessageinOUTPUT_FILE. Alternatively,youcandraftthemessageonyourcomputer(weprefer.txtplain textfiles),thenrunthis: $gpgaerOUR_EMAIL_ADDRESSINPUT_FILE ThiswillproduceanencryptedformofINPUT_FILEinINPUT_FILE.asc.Becareful though,theunencryptedformstillexistsinINPUT_FILE.Ifyouwanttodeletet his(i.e.ifyouareconcernedthatsomeonemayaccessyourlocalfilesystemwi thoutyourpermission),youcansecurelydeletethisfileinLinuxwiththeshre dcommand,likeso(theuoptioninShredmeans"removethefileafteryoushre dit";otherwise,thefileremainsasashreddedbunchofrandom1sand0s): $shreduINPUT_FILE N.B.thisisnotnecessarilytrueon,sayajournallingfilesystem(e.g.OSX)o ronmanyUSBflashmemorydeviceswhichusewearleveling.SeetheR esourcessectiononSecurelyDeletingdata. Keys Example:[email protected]Fingerprint:62FE7D6CA74FA35DA61C63DD0EBC8BDB31DE7 EF1 Thelast8charactersofthePGP/GPGFingerprintareoftenpublishedordispla yedasthePGPKeyIDe.g.31DE7EF1whichisusuallyenoughtodistinguishbetwe enentrieslistedonaPGPKeyServer.Fornohumanfriendlyreasonatall,some softwareinsistsonaprefixof0x,presumablytosignifyhexadecimaldata,lik ethis0x31DE7EF1 Links GPGhomepage SourceofthisHowtoonOccupyWiki.org GPGforWindows SHA1checksumisf619313cb42241d6837d20d24a814b81a1fe7f6d SHA256checksumisc8e1a45996456575649060a2fe17d1fc0e4d54d588636d3da743b11b2b9a4 4be directinsecureHTTPdownloadlink WearehostingthisviaHTTPSaswell. GPGToolsforMacOSX HTTPSdownloadpageyouwanttopickthetopmostonethatendswith".dmg"and not".dmg.sig". Mailinglists gnupguserslist Enigmailuserslist PGPNETPGP/inlinediscussion,encryptedlistwithanytopicfordiscussion,mes sagestolistusePGP/inlineonly. PGPMIMENETPGP/MIMEdiscussion,encryptedlistwithanytopicfordiscussion,me ssagestolistusePGP/MIMEonly. LearnandUse Video:"PGP/GnuPGKeyGenerationandUse"fromBostonCryptoparty(RossandKevi n)via@torproject VerifyingSoftwareDownloads&Files:Hashing Themainpurposeoffilehashingincontextofcryptoistoensurethata)thef ileyou'vedownloadedhasnotbeencorruptedduringtransferandb)thefileyou havedownloadedhasnotbeentamperedwithby,forexample,anthreatagentwis hingtoeavesdroponyouractivities.Filehashingalsomakesiteasiertoverif ythatonehasaparticularfileinone'spossessionbynothavingtomakethef ileavaileble,onlythehash;comparingthehashesissufficienttoproveauthen ticityandpossession. A'hash'isauniquenumbergeneratedusingapublishedalgorithmonaparticula rfile.Forexample,ifIhavefile1.txt,whichhasnotextinit,andIrunit throughahashing(formally,amessagedigest)algorithm,Iwillgetmathematica l_value_1.IfIthenaddtexttothefile,ithasnowchangedandifIhashita gainIwillgetadifferentresult,mathematical_value_2. Hashing,whichcanuseavarietyofmethods,suchasMD5andSHA1,iscommonlyu sedtocomparetwofilestoseeiftheyarethesame.Soifyouwantdownloada filefromtheInterwebbytubesandahashisprovided,afteryoudownloadityou canhashit,comparethetwovaluesandbecertainthatthefileiscomplete,un corruptedandunchanged. Asecurehashisahashalgorithmwhereitisthoughttobenighimpossibletod esignaninputtogetadesiredhashoutput,anditisthereforenighimpossible togeneratewhatisknownasahashcollisionbetweenanauthenticcopyofani nputandamodifiedform.Asanexample;ifoneweretoofferyouapieceofsof twarethatwassignedusinganinsecurehash(suchasMD5),itwouldbeeasyfor amaliciousagentbetweenyouandtheservertoprovidemalicioussoftwarewith acollidinghash;thatis,thehashoftheauthenticandmalicioussoftwareis thesame,sothesignatureseemstoverifythatthemalicioussoftwareislegiti mateaccordingtothedeveloper. Bycontrast,asecurehashingfunctionsuchasoneoftheSHA2familyoffuncti onsis,sofar,thoughttoberesistanttocollisionsandthereforeiscomputati onallyimpracticaltouseforthissortofattack.Anattackerwouldhavetoexp endunreasonable(read:hundredsofyearsofcomputerprocessing)computational powertofindavariantoftheirmaliciouscodethatgeneratedamatchinghasht oonewhichthedeveloperhassigned. BottomLine:DemandSHA2(i.e.SHA224,SHA256,SHA384,SHA512)orbetter.S HA1hashesaren'tentirelytrustworthyanymore,andMD5sumsareentirelyinsec ure,onlyusefulforverifyingunimportantdownloads(whichareseldomimportant enoughtohashcheckinthefirstplace). MicrosoftFileChecksumIntegrityVerifier WARNING:thisisclosedsourcesoftware,developerscannotseethesourcecode, butthatshouldnotmattertoomuch,ifitverifiesthesamechecksumsasother softwaredoes. MicrosoftFileChecksumIntegrityVerifierUsethistooltoensuretocompareth echecksumofthetoolyou'vedownloadedwiththepublisherschecksum.Ifthetw ovaluesdonotmatchthenthetoolshouldbetreatedascompromised. Hashtab&HashMyFiles TwootherusefulutilitiesareHashTabandHashMyFiles.Theseutilitiesaddex tratabstothefilepropertieswindowsaswellasanautomatedhashverificatio nfunction.HashMyFilesalsoallowstheusertocomputeandstoremessagedige stsforeveryfileonasystemtodetectwhetherornottheyhavechanged(andp ossiblytamperedwith). WARNING:thesearealsoclosedsourcesoftware,sodeveloperscannotseethesou rcecode,butthatshouldnotmattertoomuch,iftheyverifythesamechecksums asother,softwaredoes. CheckingHashesonLinux/Mac sha1sumandmd5sumareincludedinmostUnix/Linuxbasedoperatingsystems(incl udingMacOSX)Tousegoto'Terminal'inApplications>Utilities,navigatetothe fileyouwishtouseandtype'md5sum'where'filename'isthefilen ame,togetthemd5sum.Comparewithexpectedvaluesfromthesiteyoudownloade dfrom. CheckingGPGDigitallySignedSoftwarePackageSignatures TheTorProjecthasaclearexampleofhowandwhyyoushouldchecktheintegrit yoftheirsoftwarepackages,whichhavebeensignedusingGPGDigitalSignature s. Howtoverifysignaturesforpackages Itisworthnotingthatone(possiblymore)individualsontheInternethaveset upslightlydodgyTorBrowserBundlelookandsoundalikeprojectsonSourcefo rgeunderusernamesthatareeasytomistakeforthoseofknownTorProjectmemb ers.Beginningofdiscussionthread. DiskEncryption TrueCrypt TrueCryptisanontheflydiskencryptionsystem.Thesoftwareisfreelyavaila ble,runsonmultipleoperatingsystems,andisveryeasytolearnhowtouse.T rueCryptalsoplaysnicelywithdualbootsystems(suchasWindowsandLinux). TrueCryptoptionsincludeeitherfulldiskencryptionorthecreationofcryptog raphiccontainerfiles,whichmountasadditionaldrivevolumes.Thesefunctions arebynomeansmutuallyexclusive.Bydefaultsuchencryptedvolumesautomatic allydismountthemselves,e.g.whenyourscreensaverkicksinoryourcom putergoesintopowersavingsleepmode,andsoon. TrueCryptcanalsobeusedtoencryptUSBflashmemorysticksordigitalcamera ormobilephonememorycards.Thecaveatisthatitisalmostimpossibletoguar anteetosecurelywipeoroverwritethedatafromthesedevicesduetotheirwea rlevelingalgorithms.ThereforeyoushoulduseafreshUSBdevicetoreencrypt thedatawithanewsecretkey. TrueCryptalsoincludesafewoptionswhichtheoreticallyprovideplausibledeni abilitytotheuserânottoberecommendedifyouareseriouslyindangerofrubber hose,sinceyourtorturerswillnotnecessarilybelieveyouthatt herearenomorehiddenpartitionsapartfromtheonesyouhavealreadyrevealed tothem.Thatsaid,asof20082009neithertheBrazilianNationalInstituteof Criminology(NIC)northeAmericanFederalBureauofInvestigation(FBI)haveb eenabletocrackseveralharddrivesseizedfromofBrazilianbankerDantaswho wassuspectedoffinancialcrime.Furthermore,in2012the11thCircuitCourto fAppealsruledthatthataJohnDoeTrueCryptusercouldnotbecompelled(due toFifthAmendmentconcerns)todecryptseveralofhisharddrives.[1][2] LearnandUse Slides:"DiskEncryption(TrueCrypt)"fromCryptoPartyLondon Video:âTruecrypt"fromCryptoPartyBoston(Kevin)via@torproject FileVault Sinceversion10.6ofMacOSX,Applehaveoffereduserstheabilitytoencrypt thehomedirectoryoftheirsystem.Andfrom10.7onwards,FullDiskEncryption hasbeenanoption(technicallyreferredtoasFileVault2).EnablingFileVault requirestheusertohaveadminprivilegesonthecomputer,andwillpromptthe usertorestart.Atthenextboot,assoonastheuserlogsin,FileVaultwills tartdoingonlineencryptionofthemainsystemdrive.Otherdrivesconnectedto thecomputercanalsobeencryptedbyselectingtheminFinderandchoosing"En crypt"fromtheFilemenu. WhenenablingFileVault,inadditiontoadminusersbeingabletounlockthedri veatlogin,aRecoveryKeyisalsogenerated,withtheoptionofescrowingthis keywithApple.Ifyouchoosetodothat,you'llhavetoprovidevariousadditi onalsecurityquestions/answersalongwithyourAppleID. GiventheeaseofuseofFileVault,itshouldbealmostthefirstthingyoushou ldenableonsettingupanewMac.Unfortunately,itdoesn'tcurrentlyworkonR AIDdrives. AdetailedanalysisoftheinternalworkingsofFileVaultcanbefoundinInfilt ratetheVault,andadditionaldeploymentreadingcanbefoundatApple'sBestP ractices.(Notetheinvalidcertificateonthatwebserverâevenbigcompaniesfindi thardtokeepalltheircertificatesstraight!) LUKS LUKSistheLinuxsystemforencrypteddisks.Itcanbeselectedasaninstallo ptiononmostdistributions.(Availableinasofversion12.10).Thisis socalled"fulldiskencryption"thesystempromptsforapasswordatboot,an difyoudon'thaveit,youcan'tgetanythingfromtheharddrives.For orUbuntubasedserverswhichneedunattendedreboots,there'saprogramcalled Mandos. Tomb TofindoutaboutTombreadthisandthis LearnandUse "TheDogAteMyCryptoKeys"(WholeDiskEncryption)fromCryptoPartyLondon Video:"Truecrypt/LUKS,OTR,SecureVoIP/SIPw/,Bitcoin&dataliberation "fromCryptoPartyBoston(@ageis) SecureDataDeletion Astechnologyprogresses,itisgettinghardertoSecurelyDeletesensitivedata suchaslogoncredentialsorcryptographickeysetc. Supposethatyouwishtodestroyacopyofthesensitivedocumentsoremailsor logfilesetc.thatyouhaveonaparticularcomputer.Doingsoinahurry,when yourenemiesarebatteringdownyourdoor,isalmostimpossibletodoquicklyen ough,becausethedatastoragecapacityofmodernharddisksishuge. ThisisoneoftheadvantagesofusingEncryptedContainerFilesorWholeDiskE ncryptiononlyasmallCryptographicKeyringneedstobesecurelydeletedorp hysicallyremovedanddestroyed,toleavethebulkoftheencrypteddataunrecov erableforensically. ItcantakehoursordaysorweekstooverwritethemultiTerabytesizedharddi skswhicharecommontoday,withmultiplepassesofrandomdata,asspecifiedi nmanyoutdatedmilitaryandgovernmentstandards EraseropensourcesecuredeletionsoftwareforWindows,whichhelpfullyalso listsmanyofthesestandards. Exactlythesameproblemofthelengthoftimeittakestoeraseabigharddisk ,withmultiplepasses,isfacedbyusersofdbanorbuiltinLinuxutilitiesli keshred. AppleMacintoshOSXusersalsohavesomeSecureEraseoptionsbuiltine.g.Appl ications/UtilitiesanddoubleclickDiskUtility,thenselecttheVolume,then clicktheErasetab.Adialogboxwiththreeoptionsshouldappear:zeroout,7 passerase,and35passerase. However,ashasbeenshowninthepreCourtMartialhearingsoftheaccusedWiki LeakssourceBradleyManning,thequick"zeroout"optioni.e.onepassofzeros ,isnotsufficienttotroublestandarddigitalforensicstoolslikeEncase. ForATAharddisks,therearesecureerasecommandsbuiltintothediskcontroll erchipset,whichcansecurelyerasedatawithasinglepass,buteventhattake shoursratherthanminutesorsecondsonmodernharddisks. HowtoREALLYeraseaharddriveZDnetarticle SecureErasebyoneoftheinventorsoftheharddiskatCenterforMagneticRec ordingResearch(CMRR),UCSD(sponsoredoriginallybytheNSA) Whenitcomestoflashmemorydevices,thesetoaremeanttohavesecuredelete builtintothem,butithasbeenrecentlyshownthatthisdoesnotalwaysworka sclaimed.CMRRresearchershaverecentlybeenforensicallytestingsecureerasu reandrecoveryofalargevarietyofSolidStateDisks,withverymixedresults ReliablyErasingDatafromFlashBasedSolidStateDrives(.pdf) FlashMemoryisalsousedforremovablemedialikeUSBpendrives,digitalcamer aSDcardsandmobilephonemicroSDcards,mosttypesofwhichusewearleveling algorithmstospreadthelargebutlimitednumberread/writesthattheycantak e,withoutthedatablocksbeingpermanentlyburnedintoareadonlyfixedstate .ThismeansthatadeletionoroverwriteofaCryptographicKeyonsuchmediam aywellleaveallorpartofitstillforensicallyreadablebyequipmentwhicha ccessestheflashmemorycellsdirectly,beneaththeFlashAbstractionLayer(FA L)devicedriver,whichhidessuchlowleveloperationsfromthecomputerorcam eraormobilephoneoperatingsystem. Forthosepeoplewhoclaimthatallyouneedisa"bigmagnet"towipeaharddi sk,itcomesasashockwhentheydiscoverthatmany,especiallylaptopcompute rharddisks,nowhavequiteabitofFlashMemoryintheirdiskcontrollerbuff ers,whichisimpervioustomagneticfieldsandwhichhasagoodchanceofretai ningsensitivedata. UnlessyourCryptoPartyisbeingheldoutdoors,youshouldnottrytodemonstrat etheothertechniquefavouredbysomepeople,tosecurelydestroyharddisksi. e.Thermite EncryptedMobileCommunications N.B.MobilePhoneNetworkCDR(GSMCallDetailRecordsor3GPPChargingDetailR ecords)willstillshowyourcelllocation,whichnumbersyouarecommunicating with,howoften,forhowlongandhowmuchdataisbeingsentorreceived,regar dlessofanyencryptionApps.CommunicationsDatatrafficanalysiscanbeasint rusive,orsometimesmoreintrusive,thanbeingabletoreadorhearthecontent sofadataorvoicecall. Gibberbot GibberbotisasecurechatclientforAndroid,capableoffirewallandfilterci rcumvention,surveillanceblockingandendtoendencryption.ItworkswithGoog le,,anyJabberorXMPPserver,suchasOpenFireoreJabberD.UnlikeBl ackberryBBMâsbrokensinglekeysecurity,GibberbotusestheOfftheRecordencrypt ionstandardtoenabletrueverifiableendtoendencryptedcommunications.Iti sinteroperablewithOTRchatclientsonotherplatforms. TextSecure TextSecureforAndroidphonesencryptsyourtextmessagesonyourphone,andall owssendingencryptedmessagestootherphonesusingTextSecure.Unlessyousubm ityourpassphrase,thespooksonlyknowwhichpeoplehavesentmessages,nomor espying/retentionofmessagecontent. RedPhone RedPhoneProvidesEndToEndEncryptionForYourCalls,SecuringYourConversati onsSoThatNobodyCanListenIn.OnlyAvailableForAndroidSmartPhones Chatsecure ChatSecureforiOSisafree,opensource,encryptedmessagingapplicationthat uses'OfftheRecordprotocoltosecureacommunicationchannelove rXMPP(GoogleTalk,Jabber,etc)orOscar(AIM).Itisinteroperablewithsecur eclientsonotherplatforms. Note:sinceiOSisaclosed,proprietarysystem,itiswisetocreateaseparate keyforuseoniOSdevicesonly.Ifyou'rereallykeen,youcouldcreateasepa ratekeyforeachclient,deviceorsituation. PrivacyProtectedBrowsing Tor TorAnessentialtoolforbrowsing&,TorisavailableforM ac,Linux,andWindows(andforAndroiddevicesunderitsOrbotdistribution,an dforiOSdevicesastheOnionbrowser:seeentriesbelow).Inordertomakeyou rsurfingviaOnionRoutingassafeaspossible,youwillneedtochangeyourha bitsabit;fortunatelythewebsiteanditsareveryinformativeaboutyour optionsforenablinganonymityforyourselfand/orprovidingitfortheworlda tlarge.Thecommunitysupportisexcellent.(RunaTorrelaylongenough,andt heTorProjectshallgiveyouafreeTortshirt!)InAugust2012theElectronic FrontierFoundationawardedTheTorProjectaPioneerAward.[3] Youcanusethisvisualexplanationasateachingtoolwhenintroducingpeoplet oTorandhttps. CheckouttheTorDocumentation LearnandUse Video:"UsingTor"fromCryptoPartyBoston(AndrewandSteve)via@torproject HowtosetupanobfsproxyTorbridgeonDebianandUbuntuvia@torproject TorBrowserBundle Or,inotherwords,thebasicsyouneed,includingthebrowser.Onceinstalleda ndoperatedcorrectlythiswillallowyoutobrowsethewebusingTor.Itdoesn otprovideTorforotherapplicationssuchasIRCorchatclients(thesehaveto beconfiguredontheirown). VisittheTorBrowserBundlewebpageatTorProjectTorBrowserBundle: Beforeyoudownloadscrolldownandreadtheinstallationinstructionsforyour operatingsystem(inEnglish). Clickonthedownloadlinkforyouroperatingsystemandlanguageandfollowpro mpts. Ifyouarehavingproblems,scrolluptheTorProjectTorBrowserBundlepageto 'QuickvideosonhowtouseTBB' Tordoesnotprovide'anonymity'youhavetochangeyourbrowsinghabitsaswe ll.FormoreinformationonTorreadTor:Overview. OnionbrowseroniOS ThisappisaTorcapablebrowserforiPhone/iPad. Orbot:TorOnAndroid OrbotTheofficialportofTortoAndroid,OrbotwasoriginallydevelopedByThe TheGuardianProjectInSyncWithTheTorProjectOrbotonlyhasfullfunctional ityonrootedAndroidsmartphones,butisquiteeasytosetup. Orweb:Proxy+PrivacyBrowser OrwebWhenusedwiththeOrbotapp,thiswebbrowserprovidesenhancedprivacyf eaturesviatheToranonymitynetworkforallversionsofAndroidSmartPhones,u ptoICS4.x.DisablesJavascript,Flashandcookies,andhidesyourIPaddress (whichisonewaytodetermineyourlocation).Notethatnocurrentprivacyapp canhideyoursmartphone'sphysicallocationfromyourownmobilephonenetwork' scelltowerlocationtracking/triangulationtechnology,asthetelephonyinfras tructureisdistinctfromtheinternet'sowninfrastructure. OrwebWasOriginallyDevelopedByTheTheGuardianProjectInSyncWithTheTorP roject Ghostery Ghosteryisaprivacybrowserextensionwhichenablesyoutotrackthetrackers andtoconfiguretheplethoraofthirdpartyappsandscriptstowhichwebbrows ingisheir.Ghosteryrenderstheinvisiblewebvisiblebymakingtags,webbugs ,pixelsandbeaconsapparent.Ifyouwantselectedthirdpartiestoanalyzeyou rbrowsingdata,youmaydoso.Ifyouwanttoviewtheirprivacypolicies,now thatyoucanseewhotheyare,youmaydothataswell.Ghosteryisfreetodown load,quiteeasytosetup,andcanbequitetheeyeopener.Ghosteryscreenshot sYoutoocanoptintoprovidedataviaGhostRankfortheBetterBusinessBurea uandtheDirectMarketingAssociation! LearnandUse Protecttheprivacyandanonymityofvisitorstoyourwebsite(referredbyCrypt oPartyPhiladelphia(US). Darknets A""isanencryptedintranetoffiles,discussionfora,orhtmlpages,w hichisavailableonlytopersonsrunningthesoftwareorpartofasecretorre strictedusergroupwithinthatnetwork.Darknetsareoftenfriendtofriend,in whichcasesconnectionismediated/routedthroughtrustedpersons'connections( althoughcentral"trusted"serversareoftenprovidedbydefaultbythedevelope rs)(examplesofthis"F2F"approachareFreenetand),orarerouted throughanonymitytunnelsinanetworkofmutualdistrust,aninversionofthef riendtofriendphilosophywherenopersonisassignedtotaltrustoverauser's browsing(Tor). Tor Discussedabove,Torisananonymousbrowsingnetwork,butitsupportsaformof internaldarknetknownasTorHiddenServices.Thissystemattemptstoensuret hatnopersoncandeterminethelocationorIP/identityofthehiddenservicese rver,providedtheservice/serverissecure.Italsoallowsforfree"domain"ho sting,providedthatalonghashlikekeyendingin".onion"isanacceptablesu bstitutetoadotcomaddress.Manypopularwebsitesinthehackeroractivists ceneshavealternative.onionaddressesforaccessthroughTorincaseofDNSbl ockingorISPfilteringincertainplaces,ortoprovideamorerigorouslevelo fconnectionsecuritytovisitors. WithTorHiddenServicesthereisendtoendencryption,fromyourwebbrowser, etc.,throughthecloudofTorrouters,rightthroughtothefinalcomputerwhic hisrunningthehiddenserviceorservices,sothereisnoextrasecuritytobe gainedbyspecifyingaSSL/TLSlink,e.g.https://123456789012345.onion. Tribler Triblerisap2pfilesystemwithexpandingdevelopmentintodarknetsoc ialmediaandp2phostedcollaborativefiles.Triblersupportsallknownvideoa ndaudioformatsandcandealwithallTorrentsitesontheInternet.Clickand playfunctionality,whichenablesyoutobeginviewingimmediately,willshortly beextendedwiththeadditionofaLivefunctionforviewinglivechannelsorw ebcams.BetaAndroidaswellasLinux,WindowsandOS/X.Overonemilliondownlo adsandverystrongcommunityparticipation. i2p i2P(InvisibleInternetProject)isadarknetimplementationbuiltatopjava,wi thfullsupportforstreaming,anonymousfilesharing(),webserving, mailandmore.i2pisasecure,anonymousnetworkofferingarangeofservicesb ydefault.Resistanttocensorshipandmonitoring.HasanactiveIRCwhichyouc anaccessafterinstallingi2p@127.0.0.1,6668Pleaseseethecomparisonbetwe enTorandi2pfromi2p.Ingeneral,Torhashadmorepeerreviewthani2pandi slikelymoresecure. Freenet Freenetisajavabaseddistributeddarknetthatoperatesbestwhengivenalarg eamountofspacetoworkwith(from5GBto1TBormore).Thinkofitlikeagra ssrootsservice:themoredatayouallocate,thefasteryournodebecomes .UnlikeTor,staticwebsitescanbedistributedtothesedatastoresandpreserv edeveniftheauthorsgooffline.Websitesaremaintainedwithprivatekeysto maintainupdates.Withasecurityconcioussetup,youcangoasfarashavinga sessionbasedencrypteddatastoreandusingmultipletrustedconnectionstoreac htherestofthenetwork(likea"bridge"onTor,connectingtofriendsorfamil ybeforestrangers). FrostisabulletinboardstyleaddonforFreenetthatsupportstopicthreading andattachments. SecureChat OfftheRecord(OTR)Messagingallowsyoutohaveprivateconversationsoverins tantmessagingbyproviding: Encryption Nooneelsecanreadyourinstantmessages. Authentication Youareassuredthecorrespondentiswhoyouthinkitis. Deniability Themessagesyousenddonothavedigitalsignaturesthatarecheckablebyathi rdparty.Anyonecanforgemessagesafteraconversationtomakethemlooklike theycamefromyou.However,duringaconversation,yourcorrespondentisassure dthemessagesheseesareauthenticandunmodified. Perfectforwardsecrecy Ifyoulosecontrolofyourprivatekeys,nopreviousconversationiscompromise d. AvarietyofchatclientsareavailablewhichuseOTR. Clientsupport Native TheseclientssupportOfftheRecordMessagingoutofthebox. (MacOSX) (Unixlike),since(mICQ)0.5.4 (Crossplatform),since2.0 MCabber(Unixlike),since0.9.4 CenterIM(Unixlike),since4.22.2 Jitsi(Crossplatform) BitlBee(Crossplatform),since3.0(optionalatcompiletime) Gibberbot(Android) ChatSecure(iOS) Viaplugin ThefollowingclientsrequireaplugintouseOfftheRecordMessaging.Plugin supportallowsuseofOTRwithallofaclient'simplementedinstantmessagingp rotocols(e.g.OSCAR,XMPP,MSN,YIM/YMSGetc.). (Crossplatform),withapluginavailablefromtheOTRhomepageTempl ate:Citeweb (Unixlike),eitherwithathirdpartypluginTemplate:Citeweb or,sincetheadditionofKopeteOTRon12thofMarch2008,withtheversionof KopeteshippedwithKDE4.1.0andlaterreleases.Template:CitewebTemplate:Citeweb MirandaIM(MicrosoftWindows),withathirdpartypluginTemplate:Citeweb< /ref> Psi(Crossplatform),withathirdpartypluginandbuild,PsiPatchesandO TRPluginontfhberlin.deinPsi+WebsiteofthePsiDevelopperversio nPsi+nativeusable (MicrosoftWindows),withathirdpartypluginTemplate:Citeweb ,withathirdpartypluginTemplate:Citeweb ,withathirdpartypluginhttp://gajimotr.pentabarf.de/OTRpluginf orGajim Proxy ForthoseclientswhichhavenonativeOTRsupport,aGUIproxyisavailable.Th atmeansthatthemessagesaresenttotheproxyunencryptedandgetencryptedw hilethey"flow"throughthislocallyinstalledandrunningapplicationcalleda proxy.Currently,theproxyprovidedbytheOTRprojectsupportsonlytheOSCAR protocol,thusitcanbeusedfor.Mac,ICQ,Sametime,andAIM.TheOTRproxyi scapableofSOCKS5,HTTPS,andHTTP. ChatLogFiles SomeoftheChatClientslistedabovee.g.Adium,storeplaintext,unencryptedC hatLogs,oftenbydefault,evenwhentheOTR"security/privacy"pluginisin stalled. IfyouaretakingOTRprecautionstoprotectyourchatsfromsnoopersoverthew ireorovertheair,youshouldeitherdoublecheckthatyouhavemanuallyswitc hedoffChatSessionLogging,orensurethattheChatLogsyoudeliberatelyinte ndtokeeparecreatedonanencrypteddiskdriveorvolume(seetheDiskEncryp tionsectionabove),incaseyourcomputerislost,stolenorseized.Itisalso worthaskingthepersonyouarechattingwithiftheyareinadvertentlylogging thechatwiththeirChatClientsoftware. LearnandUse Slides:"PrivateConversationsoverInstantMessaging(OTR/Pidgin/Adium)fromCr yptoPartyLondon Video:"Truecrypt/LUKS,OTR,SecureVoIP/SIPw/Jitsi,Bitcoin&dataliberation "fromCryptoPartyBoston(@ageis) Misc TahoeLAFS TahoeLAFS(LeastAuthorityFileSystem)isaFreeandOpencloudstoragesystem .Itdistributesyourdataacrossmultipleservers.Evenifsomeoftheservers failoraretakenoverbyanattacker,theentirefilesystemcontinuestofuncti oncorrectly,includingpreservationofyourprivacyandsecurity. LearnandUse Howtosetupyourowndistributed,redundantandencryptedstoragegrid,inaf eweasystepsvia@AnonymousPress Intrusiondetectionsystems AIDE(AdvancedIntrusionDetectionEnvironment)isafileanddirectoryintegrit ychecker.Itcreatesafromtheregularexpressionrulesthatitfinds fromtheconfigfile(s).Oncethisdatabaseisinitializeditcanbeusedtove rifytheintegrityofthefiles.Ithasseveralmessagedigestalgorithms(seeb elow)thatareusedtochecktheintegrityofthefile.Alloftheusualfileat tributescanalsobecheckedforinconsistencies. IronKey Needanhardwareencrypted16GBUSBflashdrivethat'llselfdestructifaninco rrectpasswordisenteredaselectconsecutivenumberoftimes? Officialwebsite Flashdriveselection IronKeyarticle DistrRTgen DistrRTgenisadistributedrainbowtableprojectwhichrunsontheBOINCplatfo rm.Thegenerationofhugerainbowtablesenablessecurityexpertstoavoidweak cryptographichashfunctionsbyprovidingevidenceofsame. SoftwareLibraries LegionoftheBouncyCastle Jacksum GNUCryptoProject OperatingSystemandHostEnvironment Homedirectoryencryption UbuntuLinuxv8.04hasanoptiontosetupatransparentlyencryptedprivatedir ectoryinyourhomedirectory.LaterreleasesofUbuntuaddedanoptiontoencry ptyourentirehomedirectory,notjustaprivatesubdirectory.Whenyoulogin, youwillbepromptednotonlyforyourloginpassphrasebutyourpassphrasefor yourhomedirectory.Notethatthepresenceofyourfilesisnotobscured,only theirfilenamesandcontents.ThesystemusedtodothisiscalledEcryptFS,an ditusestheAES128algorithmbydefault.Ithasbeencomparedtointegrating GnuPGwithafilesystem.HereistheofficialUbuntudocumentation.Duetothe factthattherearestrongerandbetterdocumentedwholediskencryptionsubsyst emsavailableinLinux,theusermaywishtoconsiderinstallingtheentiresyst emtoaLUKSencryptedharddrive. Procedureformigratinganexistinghomedirectorytoanencryptedhomedirector y. FullDiskEncryption OnaLinuxoperatingsystemtheentirediskoradiskpartitioncanbeencrypted withcryptoLUKS OnWindowstheentirediskcanbeencryptedusingTrueCrypt.Anothergoodaltern ativeisDiskCryptor. OnMacOSX10.7and10.8thebuiltinsecurityfeatureFileVaultcanbeusedto encrypttheentirebootdrive.PreviousversionsofMacOSX(10.3to10.6)can encryptyouruserdirectory,butnotyourwholeharddrive.FileVaultisverye asytosetup(SystemPrefs>Security>FileVault>Turnon),soanyMacuserca nmakethisaroutinestep.(WhilethereisaportofTrueCryptforMacOSXitis notcapableoffulldiskencryption,onlyencryptedvolume(file)encryption.) Withfulldiskencryptionenabled,theoperatingsystemwillnotbootuntilapa ssphraseisentered.Documentsstoredonthesameencrypteddiskorpartitionwi llalsobeinacessiblewithoutthepassphrase.Fulldiskencryptionisanotherl ayerofsecurity,andcanbeusedincombinationwithhomedirectoryencryption andencryptedcontainers. Seealso ThemoredetailedDiskEncryptionsectionabove. OperatingSystems TailsLinux:TheAmnesicIncognitoLiveSystem TailsLinuxorTheAmnesicIncognitoLiveSystemisaliveLinuxdistributionde signedforpreservingprivacyandanonymity.ItisthenextiterationoftheInc ognitoLinuxDistribution.ItisbasedonDebianLinux,andusesIPtablestorou tealloutgoingtrafficthroughTor.TAILSisdesignedtobebootedasaliveCD orUSBandnodataisleftonlocalstoragemediaunlesstheuserexplicitlyco nfiguresthis.Italsowritesrandomdatatomemoryifitdetectsapoweroffto defendagainstthecoldbootattack. IfyouareinterestedinusingLinuxinamoregeneralwaythanTailsallows,pl easeseehttp://www.cryptoparty.org/wiki/Linux_Operating_Systems LibertéLinux LibertéLinuxisnotagenericliveLinuxdistributionwithanonymityfeatures.Its primaryfocusistoletyoucommunicate,stealthilyandsecurely,withotherpe opleinahostileenvironment.Here,hostileenvironmentisonewheresomeonere sourcefulseekstofindoutyouridentitybecauseofsomethingyoudo.Youmight beadissidentinanoppressiveIslamicregime,perhaps,oranantigovernment cellcoordinatorinChina.AhighlyrankedmoleintheUSintelligenceservice, passinginformationtohishandlerintheBelarusianembassy.Or,awhistleblow erinaninternationalpetroleumcorporation.Allthesepossibilitieshavesomet hingincommon:hightechnologicalcapacityoftheauthorityinplace,andwilli ngnesstousethiscapacitytofindoutwhoyouareinordertostopyou.Ofcou rse,youmightjustconsiderusingLibertébecauseyoudisliketheideaofabureau cratsomewheredecidingwhethersomethingyoudoonlineislegitimateornot.Yo uarewelcome. (Theaboveisawebsitesummary.) Whonix "Whonix(calledTorBOXoraosinpast)isananonymous,generalpurposeoperatin gsystembasedonVirtualBox,DebianGNU/LinuxandTor.ByWhonixdesign,IPan dDNSleaksareimpossible.Notevenmalwarewithrootrightscanfindouttheu ser'srealIP/location.ThisisbecauseWhonixconsistsoftwovirtualmachines. OnemachinesolelyrunsTorandactsasagateway,whichwecallWhonixGateway .Theothermachine,whichwecallWhonixWorkstation,isonacompletelyisolat ednetwork.OnlyconnectionsthroughTorarepossible."(Projectsummary) Email WebsiteEmailers Useaproxyorpubliccomputertousetheseservicessafely.Besttoencryptmes sageswiththerecipient'spublickey(perhapsusingZerobinwithaburnafterr eadingsetting). SSLenabledservices https://www.zetauploader.comAlittleshadybutworks.Attachmentsaresenta salink. http://jhiwjjlqpyawmpjx.onion/(onionlink)TorMailisaTorHiddenServicetha tallowsyoutosendandreceiveemailanonymously https://www.hushmail.comHushmailoffersprivate,securefreeemailaccounts.Em ailisencryptedandspam/virusscanned Edit:Notentirelysafe?https://en.wikipedia.org/wiki/Hushmail.Needmoreguys ,https://www.networkworld.com/community/blog/huntingemailserviceextremewish listprivacnotsure https://lavabit.com/ https://www.vmail.me/ NonSSLservices http://anonymailer.net/ http://anonymouse.org/anonemail.htmlRandomdelayupto12hours. http://sendemail.org/500characterlimit;sendsquickly;cutsoffthefirst letterofthemessagebody. http://deadfake.comFormattingissuesatlinebreaks. http://www.dropsend.com/Alittleintrusivefortherecipientbutallowsattac hments.Attachmentsdownloadedfromwebsitelink. EncryptedDropboxes Privacybox.de Privacybox.deprovidesnontracked(andalsoanonymous)contactforms.Itisrun primarilyforjournalists,bloggersandotherpublishers,butitisopenforot hersaswell.ItispoweredbytheGermanPrivacyFoundatione.V. Usesacombinationofencryptionandanonymizationtechniques,e.g.SSL/TLSencr yptedwebforms,TororI2P,GPGemailencryption;theservicepromisesnottok eeplogfiles,etc. Thesourcecodetothewebapplicationisavailablefordownloadandreview. DataLiberation Gotalotofyourpersonal/professionallifetiedupinoneemailaccount,inFa cebook,LinkedInorTwitter?AccordingtotheDataLiberationFront,everyonlin eserviceshouldofferyouaquickandeasywaytomoveyourdataelsewhere. Thisisbecomingincreasinglyimportant,aswelogmoreandmoreofourdaytod aylivesintoproprietarynetworks.Ifyouputitin,youneedtoknowhowtoge titout.Howdowedothat?Canwedothat? Who"owns"ourdata,includingmusic,videosandebooksweobtainbypressingth eBuybutton?Who"owns"allourphotos,homevideos,blogpostsandcomments?W henwecreatesomething,don'twehaverightsoverhowitisused? ThisiswhyyouneedtoreadtheToS(termsofservice,termsandconditions).T hisiswhycorporationsneedtostopmakingthedamnedthingslongenoughtocho keaelephant.Thisiswhyweneedtolookatdistributed,opensourceandpriva cyfriendlyalternativeslikeDiaspora. LearnandUse Video:"Truecrypt/LUKS,OTR,SecureVoIP/SIPw/Jitsi,Bitcoin&dataliberation "fromCryptoPartyBoston(@ageis) VirtualPrivateNetworks(VPNs) VirtualPrivateNetworks(VPNs)areatechnologyspecificallyforconnectingcom puters(orcomputernetworks)securelyacrosstheInternet.VPNseffectivelymak eanencryptedtunnelthroughwhichotherwiseunencryptednetworktrafficcantr ansitsecurely. VPNsaremostoftenusedforsecurelyconnectingtoalocalnetworkoroffice/wo rkplacenetworkfromaremotelocation. VPNservicesexist(oftencommercial)whichareoftenusedtoaccesstheInterne tfromaremotelocation,thiscanbeusefultocircumventgeoblockingrestricti ons(appearingtobeaccessingtheInternetfromtheUKtowatchiPlayerwhenon eisactuallyusingaUKbasedVPNfromelsewhere)orforcircumventingwebfilt ertechnologiesinthesameway.VPNscanalsobeusefulinthiswayforexamini ngyourownnetworkconnectionstotheInternetfromanoutsideperspective. MicrosoftPPTP MicrosoftbundlesPointtoPointTunnelingprotocolinwithitsWindowsoperatin gsystem.ItisofferedbymanycommercialVPNprovidersandisusedbylotsof organisationstoprovideremoteaccesstocorporatenetworksforhomeofficeor mobileusers. MicrosoftPPTPProblems ThereareseriousquestionsaboutthesecurityandencryptionofPPTP,eventhou ghitusesthestillsecureRC4streamcipheralgorithm.Theauthenticationpass phraseiseffectivelyonlysingleDES56bitencrypted(whichusedtobesecure enoughyearsago).Thiscannowbebruteforcedinafeasibletime,usingdistri butedcloudbasedcomputingresourcesi.einunderaday. "MicrosoftPPTPisverybroken,andthere'snorealwaytofixitwithouttaking thewholethingdownandstartingover.Thisisn'tjustoneproblem,butsixdi fferentproblems,anyoneofwhichbreakstheprotocol."BruceSchenier(1998 ) MoxieMarlnspikerecentlydemonstratedseriousproblemswiththeprimaryauthent icationmethodMSCHAPv2usedbyPPTP[4] N.B.YoumaystillchoosetousePPTPVPNconnectionswheretheyallowyoutoci rcumventcensorship,butthenuseanother,moresecureVPNtunnelmethod(e.g.O penVPNorTor)orencryptedhttps://webbrowsingsession,throughthePPTPtunn el. OpenVPN OpenVPNusesstrongencryptionandisalsoavailableasanoptionfromsomecom mercialVPNproviders. OpenVPNisalreadyatopicatsomepleaseaddresourceshere VPNappsforiOSwhichdon'trequirejailbreaking VPNExpress VPNFire AnAppStoresearchbringsupquiteafewVPNapps:checkratingsandfeaturesc arefully.Beawarethatmost,ifnotallVPNproviderswillchargeyoumoney(pe rmonthandamountofdata)fortheprivilege.;) VPNinmeatspace Ifyou'reshiftingsomethingotherthanelectronicdataaroundtheworld,youma yfinditappropriatetousearemailerormailforwardingservice.Again,this willcostyouabit,butitgetsyoupastsomeofthebarbedfenceswhichc ountries/corporationshaverecentlyerected. Ifyour(orothers')personalsafetyisatrisk,plancarefully,usingacombina tionofremailers,localpostalforwardingandcasual/courierdrops.Morecutou tscanbesafer,butsimpleisfaster.Lookatwhat'savailable. SSH SecureShell(SSH)canbeusedtoeffectivelycreateaVPNbetweentwocomputers .Thisisnotparticularlyuserfriendly,butispowerfullyflexibleandstrongl yencrypted. Note:likeyourPGPkeys,yourSSHkeysshouldbekeptinasafeplace.Theseke ysidentifyyou,somakesurenobodyelsegetstheirstickyhandsontheprivate partofeachkeypair.Ifyouleaveyourkeyslyingaround,someoneelsewilld riveoffwithyourcar,houseorcrucialdata.(Neverheardofmobilehomes?Mob iledata?Irestmycase.) OSX SSHKeychainisanappwhichmanagesandauthenticatesyourSSHkeys. SSHAgent"isagraphicalfrontendtosomeoftheOpenSSHtoolsincludedwithM acOSX.Specifically,itallowsyoutostartansshagent,generateidentities, andaddidentitiestoanagent.Additionally,itallowsyoutomakethesshage ntglobalsothat,e.g.,XcodecanuseittodoversioncontroloverSSH,andit hassomefunctionalitytosetupasecuretunnel."(fromthewebsite) iOS Withoutjailbreaking,thereiscurrentlynoterminalaccesstotheiDevice,but therearearangeofremoteuseappswhichallowyoutoestablishandmanagecon nectionstootherdevices(viaSSH,Telnet,VNCetc.).Hereareacoupleofexam ples: Terminus RapidSSH ExternalVPNguides/links: WhichVPNProvidersReallyTakeAnonymitySeriously? HowToMakeVPNsEvenMoreSecure HowtoChainVPNs LearnandUse Video:VPNsfromCryptopartyBoston(David)via@torproject Bitcoin Bitcoinisanalternativeandvirtualcurrency,obviatingtheneedtouseperson allyidentifyinginformation(e.g.creditcard,PayPalaccount)whenpayingfor goodsorservicesonline.Ifdonatingmoneytoagoodcause,orsendingmoneyto friendsorfamily,wouldbringthecorporate/governmentdownonyou,Bit coinprotectsyourprivacy.Bitcoinisnotdifficulttouse,andusingitdoesn otmakeyouacriminal(criminalsdrivecars,butthatdoesn'tmakecardriving acriminalact:Bitcoinisjustanothertool,sodrivecarefullyandspendyour Bitcoinswisely;)). LearnandUse Video:"Truecrypt/LUKS,OTR,SecureVoIP/SIPw/Jitsi,Bitcoin&dataliberation "fromCryptoPartyBoston(@ageis) RFID RFID(RadioFrequencyIDentification)isanearfieldtechnologyincreasinglyus edtotrackpeopleandproperty(intheeyesofthetrackers,thetwoappearto beindistinguishable).NFIDchipscanbeembeddedinIDcards,inmanydaytoda yobjects(e.g.paperorclothing)andunderthe.Thesechipscanbepassiv e,thusundetectablewithoutbeingtriggeredbythesetfrequency. CreditcardsandmultiticketscontainingRFIDchipscanbe"waved"pastascann ertopayforsomething.ToavoidsomeoneactivatingyourRFIDchipwithoutyour consent(e.g.whileit'sinyourpocket,topayforsomethingyoudon'treceive ),youcanblockaccesstothechipbyputtingitinsidebarriermaterial(fore xample,thatusedintheseRFIDsleeves).Ineffect,you're"jamming"theradio . TheOpenAMDProjectexploresthepotentialoflargescalehumantracking. RFIDiscurrentlybeingusedtotrackemployeesandstudents,includingminors. Althoughtrackingmayinitiallybedescribedas"optin",inlarge,regimentedw orkorlearningenvironmentsconsiderablepressureisplacedonpeopletoconfor m.Itisparticularlyworryingthatchildrenarebeingsocializedtoaccepttrac king(anditsegregiousinvasionofprivacy),whilenotunderstandingitsubiqui tyandhowthedatacanbeabused. VIDEO:Howtoblockand/orkillRFIDchips RemoteDesktopsoftware MicrosoftRDP Historyofvulnerabilities MicrosoftWindowscomputershavebuiltinsupportforRemoteDesktopProtocol(R DP)accessfromotherWindowscomputers.Thesesessionsare128bitencryptedwi ththeRC4encryptionalgorithm,butyouneedtobecarefulaboutcredentialste alingandmaninthemiddleattacks(commontoallremoteaccessschemes),so, ifpossible,youshouldrestrictittospecificIPaddressesthroughyourfirewa ll/router. BydefaultmembersoftheAdministratorsgroupontheremotecomputerareallowe dtoauthenticateviaRemoteDesktop,butthisisswitchedoffbydefaultonaw orkstation.Onserverse.g.Windows2008,RemoteDesktopisusuallyonbutbyde faultrestrictedtoNetworkLevelAuthentication.Youmightneedto"Allowconne ctionsfromcomputersrunninganyversionofRemoteDesktop(lesssecure)" ToaddextraUsers(surelyyouwerenotthinkingofconnectingoverthepublici nternetasAdministrator,wereyou?) Startbutton/Computerrightmouseclick/Properties/RemoteSettings tostarttheRemoteDesktopClient onWindows7Start/entermstscintheSearchprogramsandfilesboxoronol derversionsofWindowsStart/Run/mstsc EnterthefullDomainNameorIPaddressorWINSnameorNetBIOShostnameofthe remotecomputer EnteryourWindowscredentialsontheremotemachineinthe"DOMAIN\UserName"f ormatthenPassword(notethedirectionofthe"\"character,oftenthe"/"work saswellinWindows,butnotinthiscase) IftheremotecomputerisnotamemberofaDomain,youmayneedtoenter"HOSTN AME\User"toauthenticateasalocaluser. IfyouwanttocontrolaWindowsDesktopviaRDPfromaMacintoshthentheCoRD clientworkswell. AppleRemoteDesktopARD AppleRemoteDesktopARDisbuiltintoAppleMacintoshOSXcomputers. Priortoversion3,ARDencryptedonly,mouseeventsandkeystrokes,n otdesktopgraphics(orfiletransfers).ApplethereforerecommendedthatARDtr afficcrossingapublicnetworkshouldbetunnelledthroughaVPN,Version3now usesAES128bitencryption: AppleRemoteDesktopdownload VoiceoverIP AsteriskopensourcePABXetc. TherearealotofVoIPprovidersoutthere,varyinginqualityandhype,butth ebigquestion(apartfromCANYOUHEARME?)iswhetheryoucanencrypttheconv ersationatbothends.LookforVoIPclientsequippedwithencryptionstandards (ZRTP,SRTP)butmakesuretheconversationisencryptedbeforeitleavesyourd evice,notontheVoIPprovider'sserver(whichcanbedecidedlyshonky). ComparisonofVoIPappsfordifferentdevices (ZRTPintegrated),runsonOSX,LinuxandWindows Jitsi(ZRTPintegrated),FLOSSwithLGPLlicence,doesvoice,video,filetransf eranddesktopsharing:runsonOSX,Linux,WindowsandyoucanbuilditforFre eBSD Thefollowingserviceseitheraren'topensource,haverestrictions,oruseapa ymodel: KeyWeFREE!(SRTP),runsoniOSOffersafreeSIPserverforalimi tedtime VoIPOneClick(SRTP),runsoniOSFreeapptoapponly,offershal fwayencryptedapptophoneonpurchasedcredits. Bria(SRTP),softphonetousewithexistingVoIPservices,runsoniOSCosts$8.49+seperatevideo,text,andcodecpurchases. NotethatyoucanuseaVPNtoencryptVoIPconversations,butthismethodisda taheavy,soit'sonlysuitableforusewithfastconnections(i.e.notoncellu lar/mobilenetworks). LearnandUse Video:"Truecrypt/LUKS,OTR,SecureVoIP/SIPw/Jitsi,Bitcoin&dataliberation "fromCryptoPartyBoston(@ageis) MobilePhones/Smartphones CatcherCatcherbyKartsenNohl,anIMSICatcherdetectorusingOsmocomBB TheRulesofBeeping:ExchangingMessagesViaIntentional"MissedCalls"onMobi lePhonesbyJonathanDonner,TechnologyforEmergingMarketsGroup,MicrosoftR esearchIndia CounterSurveillance BigBrotheriswatchingyou,butthere'salotyoucandoaboutit.Protectyour privacyasabove.Recordanduploadabusivegovernment/corporatebehaviour.The rearesomeexcellentappsforkeepingtrackofwhat'shappeningtoyou,andmak ingsureotherpeopleknowwhenwronghasbeendone.Wehavemoreeyes,earsand voicesthantheydo.Usewhatyouhave. (ThankstoUtahLibertyWatchforsomeofthesuggestionsbelow.) OpenWatch(Android)fromtheOpenWatchProject CopRecorder(Android)(iOS)fromtheOpenWatchProject JustInTV(Android)(iOS)âbetterthanQik,becausethevideocan'tbedeletedwith outyouloggingin ScannerRadio(Android)(iOS) Trapster(Android)(iOS) HistoryEraser(Android) Whapee(iOS)âanonymouslocationbasedimage/videouploadwithtext CopWatch(iOS) iSpyCameras(iOS) NetworkCamera(iOS) HiddenSpyCam(iOS) LearnandUse Video:"CounterSurveillance"fromCryptoPartyBoston(DavidandAndrew)part1 part2via@savebradleyand@torproject LegalIssues Eachnationstatehasitsownlaws(andinternationaltreaties)regardingencryp tionandcommunicationsdata.Someofthesecanlegallyforceyoutoeitherhand overyourdecryptionkey(s)ortohandoverdecryptedplaintext.Otherlawsc anforcefixedline,mobilephoneandinternetserviceproviderstoretainthec ommunicationsdataofmillionsofinnocentpeople,forperiodsoftimeinexcess ofwhattheyneedforbusinesspurposes,whichthenputssuchdataatriskofa busebycorruptorunscrupulousprivilegedinsiders. Typicallysuchbigdatalawsarejustifiedforthelaudablepurposeofinvestiga tingseriouscrimesuchasterrorism,humantrafficking,sexuallyexploitivemat erialordrugssmuggling(someoftheFourHorsemenoftheInfopocalypse)butth eysoongetextendedtoroutinelycoveralltypesofcrime,nomatterhowtrivia l,andthenroutineactivity,whereupontheyimpingeoncivilsocityandthreate nfundamentalpoliticalandhumanrightsfreedomsaspartofanomnibusnational surveillancecomplex. Australia AustraliaiscurrentlyundergoingaNationalSecurityEnquiry,wherethegovernm entinsistsitneedstomakeourISPskeepallouronlinedatafortwoyears(th eAustralianFederalPoliceactuallysaidtheywouldpreferitbekept"indefini tely").Inotherwords,everydayuserswouldpayextraISPcoststohavetheirp ersonaldatastoredandmadeavailabletoanygovernmentagencyandanyEuropean government(includingthethinlydisguiseddictatorships).Inevitably(followin gthewellestablishedpatternofBigData),thispersonalinformationwouldbe leftintaxisorbusshelters,itwouldbehackedanditwouldbeabused. Everyphonecall,everyemail,everywebsiteyouvisit,everywordyousayinch at...theAustraliangovernmentwantsitandwantsyoutopaytoprovideit,app arentlyundertheassumptionthatourharmlessandlawabidingvastmajoritywil lsuddenlybecomecriminals.Oriseveryoneguiltybeforeproveninnocentnow?F orfurtherinfo,follow#ozlogand#NatSecInquiryonTwitterand/orseetheEFA (ElectronicFrontiersAustralia)site. ItshouldbenotedthattheAustralianGreensparty,theAustralianPirateparty ,theEFA,variouscivillibertiesorganizationsandmanyindividualshaverepre sentedusverywellatthisenquiry.Unfortunately,anythinglabelled(accuratel yornot)"nationalsecurity"justgetswavedthroughbythetwomainparties.A ndtheyaskwhysomanyAustralianvotersaredisillusionedwithpolitics... EuropeanUnion Ireland WebcensorshipisapparentlymorecommonthandirectsurveillanceinIrelandat present.OutofcourtsettlementsbyIRMA(IrishRecordedMusicAssociation)and Eircom,andothers,haveleadtowidespreadcensorshipofThePirateBay.A"st atutaryinstrument"wasusedbyTDSeanSherlockofEastCork(againstmassivep ublicoutcry)toplacecourtordercensorshipofwebsitesintothepoweroflobb yingbodies;thewordingwasveryloose,anditisnotclearifanyoversightwi llbeemployed.Itisalsonotclearwhethertherewillbearighttocontestor toseekrestitutionforfalsecensorship.Theordermakesnomentionofrequiri ngnoticeorwarningtobegiventositeoperators. GiventhatcensorshipiswidespreadattheDNSlevel,DNSrecordsareloggedat leastandcouldbefurtherinspected.Thereislittleevidenceofmoreconcerted effortsatsurveillanceasyet. UniquelyinEurope,Irelandisinasignificantpositionofpowerovermultinati onalcompaniessuchasGoogleandFacebook,whoestablishprimaryofficesinIre landtotakeadvantageofataxloopholeknownasthe"DutchIrishSandwich".A smallandunderfunded,butapparentlywellintentioned,officeknownasthe" aProtectionCommissioner"haspreviouslystruckblowstoprivacystandardsatm anycompanies,includingFacebook,whoflagrantlyabusecustomerprivacy.Citize nscanappealtotheDPCtotakeactiononcasesofperceivedinjusticeandpriv acyviolation,buttheofficehasfewresourcestodealwithallissuesunderth eirremit,andprimarilyfocuson"bigissues". DecryptionLaws TheElectronicCommerceAct2000(nr.27),whichwasenactedon19July2000,co ntainsadecryptionorderinarticle27(2)(c).Ajudgecanissueasearchwarr antiftherearereasonablegroundstosuspectanoffenceundertheActhasbeen committed.Suchawarrantauthorisesinvestigationofficers,amongotherthings ,"whenthethingseizedisorcontainsinformationoranelectroniccommunicati onthatcannotreadilybeaccessedorputintointelligibleform,torequirethe disclosureoftheinformationorelectroniccommunicationinintelligibleform" .Personsorpublicbodieswhofailorrefusetocomplyareguiltyofasummary offence(art.27(4)).(sourceCryptoLawSurvey) UnitedKingdom UnitedKingdomRegulationofInvestigatoryPowersAct2000PartIIIInvestigatio nofelectronicdataprotectedbyencryptionetc.penaltyofupto2yearsinpr isonorupto5yearsinprisonifthewords"nationalsecurity"or"childindec ency"areinvokedbytheinvestigatorsthroughaSection49notice.Thereisals oa"tippingoff"secrecypower,whichifinvoked,hasapenaltyofupto5year sinprisonfortellingsomeonethattheyarethesubjectofsuchaSection49n otice. RIPAPart1ChapterIIAcquisitionanddisclosureofcommunicationsdataisint heprocessofbeingextendedtocovernotonlydesignated,CommunicationsServic eProviders(regulatedtelephoneandinternetandpostaldeliverycompanies)but potentiallyeverywebclickinasearchenginelikeGoogle,allTwitterandFac eBookactivityorVoiceoverIPconversationetc.usingDeepPacketInspectionb lackboxesandfilters,onlyseensofarinrepressivedictatorships. OpenRightsGroupwikiontheCommunicationsDataBill N.B.thereareafewlegalloopholesinthisrepressivelegislation,whichUKCr yptoPartyexpertswillbeabletoadviseon. "U.K.LegalAspectsofCryptographyandAnonymity"(.ppt)(.pdf)(fromCryptoPar tyLondon) UnitedStates OrganizationsandLegalSupport ElectronicFrontierFoundation TheEFFisthepremiereAmericanadvocacygroupfordigitalrights.Chockfulof usefulinformationrangingfromproposedinternationaltreatiesandamicuscuriæbr iefswiththeUnitedStatesSupremeCourttowhetherthecopscansearchyoursm artphonewithoutawarrantandsurveillanceselfdefense.Highlyrecomended. CoursesandEducation Coursera:CryptographytaughtbyDanBoneh,27August2012to1October2012 JacobAppelbaum(Part1/2)DigitalAntiRepressionWorkshopApril262012 JacobAppelbaum(Part2/2)DigitalAntiRepressionWorkshopApril262012 KhanAcademy:JourneyintoCryptography Udacity:AppliedCryptography(cs387) Wheretogoformoreinformation TheEFFhassomeexcellentresourcesforthosestilltryingtogettheirheadar oundthingshere:https://ssd.eff.org/tech AgreatandverycompletetutorialonhowtousevarioustoolsisPeterGuttman' sepicslidedeckhttp://www.cs.auckland.ac.nz/~pgut001/tutorial/index.htmlFolk swhoarerunningamightwanttolookforthesetogetwhattheyne edforteachinghowtousecertainprograms. IfyouareinterestedinfoundationsAppliedCryptographybyBruceSchneierisa greatbooktoread. Ifyoucompletealltheexercisesonhttp://cryptoclass.orgyou'llreachapoin twhereyouhaveagoodideaofhowharditcanbetogetcryptoright. 1.Breakciphers...cryptoclasshassomegreatexercisesforthisalsoifyouf indyourselfaddictedtobreakingstuffhereare>100puzzles.Thereisafinel inebetweensecureandradicallyinsecure,you'lllearnaboutthisbymakingand breakingciphers. 2.Ifyouarethinkingofwritingyourownsoftware,byallmeansdo,makeitop ensourceandpreparetolearn.Butbewareofmakinggrandioseclaimsaboutsecu rityandtheDunningKrugereffect.Cryptoschemestakeyearstobeconsidered's ecure'.Combiningschemescanofteninteractinwaysthatweakenthetwosystems ,somecombinationsareoftenweakerthantheirparts. MiscLinks HowtoExitthe(.onionTorHiddenService) SecurityBasics(.onionTorHiddenService) SlideStackfromCryptoPartyPerthAU(incl.somegoodvisualintrosforbeginne rs) InternetSecurity101âtheevolvingCryptoPartyGuide(don'tpanic,andbringyour towel) SomeRelevantQuotesfromTwitterandElsewhere "BREAKING:"corruptednerds"citedasthereasonforsweepingexpansionofsurve illancepowershttp://aph.gov.au/live#CorruptedNerds"~@SenatorLudlam21/8/12 "Encryptyourdata,theCybercrimeBillhaspassed:http://bit.ly/TTq8bN#natsec inquiry#ozlog#cybercrime#corruptednerds"~@PiratePartyAu "ain'tnopartylikeacryptoappsinstallparty."~@m1k3y22/8/12 "IwantaHUGEMelbournecryptoparty!BYOdevices,beer,&music.Let'ssetat imeandplace:)Who'sin?"~@Asher_Wolf22/8/12 "12:29pmSenatepasses#CyberCrimeamendment7:19pm@m1k3yain'tnopartylikea cryptoappsinstallparty7:24pm@Asher_Wolf..#CryptoParty"~@mylespeterson 23/8/12 "AmItheonlyonethinking#cryptopartysoundslikesomethingscandalousteeng irlsaredoingthesedays?(&wouldn'titrockiftheydid?)"~@lex_is23/8/12 "Ain'tnopartylikea#cryptoparty'cuza#cryptopartydon'tMbqwR5+eqstXjRY5lw jkzo7qXVzSwVYJ82"~@quinnnorton24/8/12 "There'sa#CryptoPartyinmypants,butonlyAliceandBobareinvited"~@xntr ik25/8/12 SirHumphrey:"Canyoukeepasecret?" Bernard:"Ofcourse" SirHumphrey:"SocanI" YesMinister,episode1OpenGovernment,25thFebruary1980 "Surely,aswereflectontheconsequencesofthedigitalshiftfromadefaulto fforgettingtooneofperpetualmemory,weshouldbeseekingtorestore,asfar aspossible,theindividual'srightânotsimplytotheirprivacy,buttohavingthe righttodeletethatwhichtheyhavecreated,inthesamewayascanbedonein theanalogueworld."~ShadowCommunicationsMinisterMalcolmTurnbull "TheStreetfindsitsownusesforthingsusesthemanufacturersneverimagined ."~WilliamGibson SecurityHumour PresentationsortalksataCryptoPartyshould,ofcourse,beleavenedwithsome humour... SecurityHumour