Radical Technology Collective Asymmetric Warfare Against the Surveillance State

Radical Technology Collective Asymmetric Warfare Against the Surveillance State

Radical Technology Collective Asymmetric Warfare Against the Surveillance State Asymmetric Warfare ● Our idea of Asymmetric Warfare: Expend less cost for more damage The Surveillance State - Past ● Middlebourough Talking T! "ilot "rogram# $%%& The Surveillance State - Future ● "olice forces all over the '( )ill manned aircraft from a national fleet# according to *ome Office plans+ ,ast month it )as revealed that modified military aircraft drones )ill carry out surveillance on everyone from protesters and antisocial motorists to fly-tippers# and )ill be in place in time for the $%.$ Olympics+ ● http://)))+)ired+co+uk/ne)s/archive/$%.%-%$/.%/future-police-meet-the-uk0$&s-armed-robot-drones On Software Freedom ● 1ree Soft)are is a matter of liberty# not price+ ● 1ree Soft)are provides the user certain essential freedoms: ● 1reedom to use ● 1reedom to study/modify ● 1reedom to share ● 1ree Soft)are is both more secure# and more compatible )ith anarchist ideals+ Talk Outline ● 2ata at 3est ● 2ata in Motion ● onclusion: Standing Orders for Asymmetric Warfighters Securing Data at Rest Password Security ● "ass)ords are human ● 4ood "ass)ords: ● Are phrases ● *ave a )ide character set ● Tips for remembering "assphrases ● 5uotes ● 3eplace letters )ith upper-case letters# numbers# or punctuation ● "ass)ord lists 6 secured by a 7master pass)ord8 Secure Deletion ● Even after deleting a file# it still exists on your hard disk and can be recovered+ Implementing Secure eletion ● Windo)s: ● Sdelete 9from Microsoft Sysinternals: ● Eraser "ortable 9from "ortableApples ● Apple: ● 1inder ; Secure Empty Trash ● 4<'/,inux ● T* =s srm ● 4<' shred ● wipe Backu"s ● Should be off-site 9not on the same hard drive: and encrypted ● >ou should back up anything you )ould )ant after getting raided/struck by lighting Im"lementing Backu"s ● Microsoft Windo)s: ● ?uilt-in backup tool into encrypted store ● Amanda ● Apple OS @: ● ?uilt-in backup tool into encrypted store ● Amanda ● 4<'/,inux: ● duplicity and 2eAa-2up Distributed Data Stores ● ,ike backing up to the BnternetC ● Bf there=s something that A<=T be deleted# the best )ay to back it up is to share it )ith everyone+ ● Bf it=s private# you can encrypt it and distribute the key later+ Implementing Distributed Data Stores ● ?itTorrent 9deluge-torrent+org: ● 1reenet 9freenetproAect+org: ● Dust sharing files 97sneakernet8: Encry"tion ● 1ile encryption ● 2irectory encryption ● 1ull/Whole 2isk Encryption File Encry"tion ● Microsoft Windo)s: ● Toucan 9portableapps+com/apps: ● Apple OS @: ● EEE ● 4<'/,inux ● 4<' "rivacy 4uard ● All "latforms: ● Truecrypt 9truecrypt+org: ● &Fip Directory Encry"tion ● Microsoft Windo)s: ● 1ilesystem Encryption 9right-click directory;properties and check 7encrypt8: ● Apple OS @: ● Apple 1ile!ault ● 4<'/,inux ● encfs ● Ecryptfs 9built into 'buntu: ● Truecrypt Whole isk Encry"tion ● 4<'/,inux ● Bnstaller option in 'buntu 9select 7encrypted ,!M8: ● Apple OS @: ● EEE ● Microsoft Windo)s ● Truecrypt ● ?it,ocker 9non-free: Securing Data in Motion Data in Motion ● ommunications ● Email ● Bnstant Messaging ● Transmitted 2ata ● Web bro)sing Service Providers Friendly Service Providers ● 3iseup ollective 9riseup+net: ● Activix 9activix+org: ● !arious 7hacker-friendly8/8)areF- friendly8 offshore hosts ● >ouC 'ou are the friendliest service provider of all ● We must )ork to)ards an Bnternet )here communications is not mediated by 7service providers8# but is direct ● This makes us autonomous ● autonomo+us Data in Motion ● What you=re talking A?O'T ● Who you=re talking TO What you're talking about ● Encryption Systems ● Web - *TT"S ● 7httpsevery)here8 addon from E11 for 1irefox ● BM 6 OT3 ● Adium for OS @ ● "idgin and "idgin-OT3 for 4<'/,inux and Windo)s ● Email 6 Open"4" ● Thunderbird G Enigmail G 4<' "rivacy 4uard Who you're talking to ● 4eneral "urpose ● Tor 6 AnonymiFing net)ork overlay ● Email ● Mixminion/Mixmaster – perfectprivacy+de ● On )andles ● 2etective )ork is )hat the cops are best at ● 'se handles not connected )ith you at all ● 3andomly generated names are better Conclusion: Standing Orders Standing Order #1: Default Deny Standing Order #2: Some is better than none Standing Order #+, the Network Effect .et In Touch ● rtcHriseup+net ● https://)e+riseup+net/radtechcol ● http://groups+fsf+org/)iki/4roup:3T ● apt-get install anarchism .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    32 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us