Tuesday 13 August 2013

More encrypted email services shut down

2 Encrypted Email Services Shut Down to Avoid NSA Snooping
Two encrypted email services shut down on Thursday, citing concerns related to NSA surveillance and government requests for user data.


10 August, 2013


Private communications startup Silent Circle preemptively shut down its encrypted email service on Thursday evening, an unexpected move that came just a few hours after Lavabit, another encrypted email provider, allegedly used by Edward Snowden, decided to close doors rather than comply with a national security-related investigation.

"We see the writing on the wall, and we have decided that it is best for us to shut down Silent Mail now," wrote Silent Circle's CTO and cryptographer Jon Callas on the company's blog, after explicitly pointing to Lavabit's earlier decision. "We have not received subpoenas, warrants, security letters, or anything else by any government, and this is why we are acting now."

Silent Circle, a startup founded by former U.S. Navy Seal Mike Janke, and well-known cryptographer Philip Zimmermann (pictured above), provides encrypted phone calls, text messages and video calls for $10 a month.

In a phone interview with Mashable on Friday, Janke said they had been thinking about this decision for a while, but Lavabit's announcement gave them the final push to not only close down the service, but to also wipe the servers and destroy them, removing "every and all traces of email in the entire architecture," he said.

The main reason behind their decision, however, is that even encrypted email isn't completely safe, he said.

"Email is fundamentally broke," Janke said, explaining that even perfectly encrypted emails leak metadata — the sender's IP address, the subject of the email, the time it was sent and received. "All those things are really, really sensitive information that governments can use to pinpoint and track you, and know who you're communicating with and where you're at and what time."

Janke said that 50% of Silent Circle's total users, though he declined to give a specific number, used the encrypted email service. Most of them, according to Janke, were supportive of the company's decision. And although Janke admits the action was abrupt and without prior warning, it had to be because many Silent Circle users are government employees around the world or people that might have been targets.

"If we send an email saying, 'in 12 hours we're shutting off email,'" Janke said, "it doesn't take but a half hour for a government agency to send you a National Security Letter."

Despite the current service being effectively destroyed, Janke revealed they're working on a fully encrypted and peer-to-peer email service which could be unveiled in the next few months.

A few hours before Silent Circle's decision, Lavabit had announced it was suspending its service.

" I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations," wrote Lavabit's founder Ladar Levison.

The reasons behind Levison's decision are as yet unclear, though his full statement hints that he is under gag order following an unspecified request from the U.S government. (Levison didn't respond to Mashable's requests for comment.)

CNET reporter Declan McCullagh speculated on his Google Plus page that the reason might have been that the FBI served Lavabit with an order to intercept Snowden's, or other users', passwords.

The two companies' surprising decisions do appear to be ideologically motivated, but they are business decisions as well. Both Lavabit's and Silent Circle's business models are built on the promise of private communications and their advertised inability to comply with surveillance orders. Hence, it makes a lot of sense from a business perspective to fight government snooping. "If we turned evil, then you're still covered," Phil Zimmerman told Mashable in a previous interview, alluding to the value of protecting user data at any cost.

"Lavabit and Silent Circle's extraordinary behavior demonstrate not only their principles, but that they understand the business they're in," wrote computer scientist Matt Blaze on Twitter.

CryptoCat, a browser-based encrypted chat service, also announced it would do the same if necessary.

If we receive a surveillance or backdoor order that we are unable to legally fight, we will shut down Cryptocat rather than implement it.

In an email to The Guardian's Glenn Greenwald, Snowden praised Lavabit's decision, and warned about the dangers of forcing companies to shut down to protect their users.

"America cannot succeed as a country where individuals like Mr. Levison have to relocate their businesses abroad to be successful. Employees and leaders at Google, Facebook, Microsoft, Yahoo, Apple, and the rest of our Internet titans must ask themselves why they aren't fighting for our interests the same way small businesses are."

Will other companies have to do the same thing Silent Circle and Lavabit did? In his statement, Levison finished with a dire warning.

"This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would _strongly_ recommend against anyone trusting their private data to a company with physical ties to the United States."





Meshnet activists rebuilding the internet from scratch
Worried about the NSA snooping on your email? Maybe you need to start creating your own personal internet



8 August, 2013


THE internet is neither neutral nor private, in case you were in any doubt. The US National Security Agency can reportedly collect nearly everything a user does on the net, while internet service providers (ISPs) move traffic according to business agreements, rather than what is best for its customers. So some people have decided to take matters into their own hands, and are building their own net from scratch.


Across the US, from Maryland to Seattle, work is underway to construct user-owned wireless networks that will permit secure communication without surveillance or any centralised organisation. They are known as meshnets and ultimately, if their designers get their way, they will span the country.
Dan Ryan is one of the leaders of the Seattle Meshnet project, where sparse coverage already exists thanks to radio links set up by fellow hackers. Those links mean that instead of communicating through commercial internet connections, meshnetters can talk to each other through a channel that they themselves control.
Each node in the mesh, consisting of a radio transceiver and a computer, relays messages from other parts of the network. If the data can't be passed by one route, the meshnet finds an alternative way through to its destination. Ryan says the plan is for the Seattle meshnet to extend its coverage by linking up two wireless nodes across Lake Union in downtown Seattle. And over the country at the University of Maryland, Baltimore County, student Alexander Bauer is hoping to build a campus meshnet later this year. That will give his fellow students an alternative communications infrastructure to the internet.
While these projects are just getting off the ground, a mesh network in Catalonia, Spain, is going from strength to strength. Guifi was started in the early 2000s by Ramon Roca, an Oracle employee who wanted broadband at his rural home. The local network now has more than 21,000 wireless nodes, spanning much of Catalonia. As well as allowing users to communicate with each other, Guifi also hosts web servers, videoconferencing services and internet radio broadcasts, all of which would work if the internet went down for the rest of the country.
So successful is the community model that Guifi is now building physical fibre-optic links to places like hospitals and town halls where it can help carry the heaviest traffic.
Earlier this month, the General Hospital in the Catalan town of Gurb was wired up to Guifi with a fibre-optic link, and cable is being rolled out into the nearby town of Calldetenes too.
In the US, people can generally already get online with relative ease, so meshnets there are less about facilitating access and more about security, privacy and net neutrality – the idea that ISPs should treat all traffic equally, and not charge more for certain types.
After the extent of the NSA's clandestine PRISM program was revealed, privacy advocates like the Electronic Frontier Foundation urged users to start using relatively simple email encryption programs like Pretty Good Privacyand GNU Privacy Guard. But even those can be daunting to set up. A better idea would be a decentralised network that relies on encryption by default.

This is the case with Hyperboria, the virtual layer that underpins meshnet efforts in the US. Hyperboria is a virtual meshnet because it runs through the existing internet, but is purely peer-to-peer. This means people who use it exchange information with others directly over a completely encrypted connection, with nothing readable by any centralised servers.
When physical meshnet nodes like those in Maryland and Seattle are set up, existing Hyperboria connections can simply be routed through them. At the moment, Hyperboria offers a blogging platform, email services, and even forums similar to reddit.
Encryption is the starting point. Computer researcher Caleb James DeLisle wrote software called cjdns which allows the Seattle Meshnet nodes to use Hyperboria and keep all communications between them encrypted. Instead of letting other computers connect to you through a shared IP address which anyone can use, cjdns only lets computers talk to one other after they have verified each other cryptographically. That means there is no way anyone can be intercepting your traffic.

The Seattle Meshnet has just completed a successful crowdfunding campaign for meshboxes – routers that come preloaded with the cjdns software needed to join Hyperboria. Users will just plug the routers into their existing internet connection and be ready to go on the virtual meshnet – or a local physical meshnet when one becomes available.
Some form of encryption is already in use across much of the internet, but to be useful it has to be ubiquitous. Web services like Gmail, for example, let you log in using an encrypted connection. But when you send an email it leaves Google's encrypted garden and hits the open web in clear text for anyone to read. With Hyperboria's peer-to-peer connections, every single link in the chain of communication is fully encrypted. Intermediaries that handle traffic cannot even see what kind of traffic it is, let alone read any email. Use the purpose-built hyperboria.name email service, and your communication becomes untraceable.
Instead of a few established players building network infrastructure, DeLisle wants anyone to be able to do it. For him, decentralised internet access in the hands of the people is just a start. The services they use must be decentralised, too. "If people continue to use Facebook, they will continue to be spied on, that's just the reality of the world."
This article appeared in print under the headline "Let's start the net again"


Into the darknet



Visions of a decentralised internet come with a seedier side – the darknet. One way to access it is through the anonymising routing service Tor, which lets a user find hidden web pages that have .onion addresses, rather than IP addresses. But anonymisation like this can facilitate otherwise unacceptable activities. Illegal drug market, Silk Road can only be accessed using its .onion address. But Alexander Bauer, who works on a meshnet in Maryland thinks meshnets are less likely to carry this content. Any website that can successfully run on a meshnet must be socially acceptable to every peer they connect with, making it less attractive for child pornographers or websites like Silk Road.
"That's why we don't think the network will be taken over by child porn. You have to have someone accept what's on your node in order for them to pass your traffic around," he says.


No comments:

Post a Comment

Note: only a member of this blog may post a comment.