maradydd: (Default)
[personal profile] maradydd
Prompted by a discussion with [livejournal.com profile] bunnykitteh, who's good at prompting these kinds of things:

Imagine a Facebook and/or MySpace application aimed at organising flash mobs for political action (e.g., the kind of thing Anonymous might use to quickly notify members of imminent $cientology activity in a particular location). What features should it have? (Twitter gateway?)

(Note that with Facebook, especially, there are all kinds of interesting concerns with respect to privacy...)

(no subject)

Date: 2009-02-10 08:50 pm (UTC)
From: [identity profile] maradydd.livejournal.com
I think strong encryption with PGP keys would be more of a necessity!

Oh, now that's a neat idea -- though, hrm, the first question that pops to mind is how to go about generating keys for folks who don't have 'em and don't know how to do so. Client-side implementation (e.g. in Javascript) that saves the private half of the keypair in a cookie or a text file? What about people who use more than one machine?

I suspect there's some primitive that would be more useful here than PGP proper; perhaps [livejournal.com profile] enochsmiles, [livejournal.com profile] sjmurdoch or [livejournal.com profile] tshb will pipe up.

(no subject)

Date: 2009-02-10 09:13 pm (UTC)
michiexile: (Default)
From: [personal profile] michiexile
The central question here probably is _why_ do you want PGP, or strong encryption?

What is it that the crypto is supposed to provide?

Depending on the answers you'll want completely different solutions:
- is it keeping eavesdroppers out before the flashmob happens? Short timespan, go for some sort of session key handling and AES or something like that.
- is it keeping eavesdroppers out afterwards as well? This will get tricky, depending on your paranoia levels and the timespans involved.
- is it verifying identities? Now we're talking the entire trustweb infrastructure. And here the Javascript key-generation will not do any good.

(no subject)

Date: 2009-02-10 09:20 pm (UTC)
From: [identity profile] maradydd.livejournal.com
I'm rather skeptical of the whole notion of the web of trust these days, but yeah, these are all good points. Thus the open "what features are desired?" question to start with.

(no subject)

Date: 2009-02-11 12:53 am (UTC)
ext_74: Baron Samadai in cat form (Default)
From: [identity profile] siliconshaman.livejournal.com
Hmm..I think the primary need would be have some means of preventing the flashmob from being hijacked or monitored by the authorities. This has happened at least once to my knowledge. There was protest about Tibet in London recently that the police 'jacked and changed the route so the protesters marched into a trap.

Which, upon reflection, seems to be about 80% social engineering and less network security. The problem is, how do you identify who's a legitimate user?

(no subject)

Date: 2009-02-12 01:16 pm (UTC)
From: [identity profile] bigby.livejournal.com
FlashMobs require people. one alternate is a twitter/*chan hybrid with no security other than everything being wide open. (remove the persistence of messages to prevent snooping?) Handshaking becomes a social and content function as does any persistent identity for Anon.

Maybe a two layer system where you can consume information with a nominal login if any (keeps you and your devise Anon and not identified for prosecution) and a posting layer with much higher security?

(no subject)

Date: 2009-02-12 03:36 pm (UTC)
From: [identity profile] maradydd.livejournal.com
I can do sender/receiver unlinkability to twitter/*chan no problem. Cf. Matthias Bauer, "New Covert Channels in HTTP", WPES 2003. The more I think about it, the more I think that trusting the sender ends up being a social problem, but I'm going to keep chewing on it.

Also got pointed earlier today at Heydt-Benjamin/Serjantov/Defend, "Nonesuch: a Mix Network with Sender Unobservability", WPES 2006, which I need to read more thoroughly but also looks promising.

(no subject)

Date: 2009-02-11 03:50 am (UTC)
From: [identity profile] bunnykitteh.livejournal.com
Political activists in some parts of the world are being tortured to get their Facebook passwords, if that tells you anything.

(no subject)

Date: 2009-02-11 03:57 am (UTC)
michiexile: (Default)
From: [personal profile] michiexile
Yeah, I respect the need to establish security around political protest. My point was that PGP is NOT a magic wand that you wave and automatically get Teh Securitee! - you need to actually figure out WHAT you want to do, which specific functions you want your crypto to do, and first when you have a clear idea of all your requirements it's useful to discuss specific program packages, specific protocols and specific algorithms.

Besides - if people are being tortured to divulge their Facebook passwords - what prevents The Authorities to request their secret keys while they're at it?

(no subject)

Date: 2009-02-11 04:09 am (UTC)
From: [identity profile] bunnykitteh.livejournal.com
LOL oh totally.

And I think our coder in question is focused more on American protests where torture is (somewhat?) less of a concern.

I can haz securitee?

(no subject)

Date: 2009-02-11 04:13 am (UTC)
From: [identity profile] maradydd.livejournal.com
I am focused more on America, true, but that's no reason not to do it right the first time. Happily, this LJ is a good convergence point for some of the brightest minds in computer security today...

(software engineering lesson #1: figure out what the project requirements are first!)

(no subject)

Date: 2009-02-11 04:24 am (UTC)
From: [identity profile] bunnykitteh.livejournal.com
Mai project requirez a full buffet and dancing boyz!

(no subject)

Date: 2009-02-11 04:32 am (UTC)
michiexile: (Default)
From: [personal profile] michiexile
/me pulls off a decent solo charleston routine

(no subject)

Date: 2009-02-11 04:38 am (UTC)

(no subject)

Date: 2009-02-11 12:56 am (UTC)
ext_74: Baron Samadai in cat form (Default)
From: [identity profile] siliconshaman.livejournal.com
You're right...the problem is more 'how do you maintain anonymity and verify who's a legitimate user.'

I have no idea how to do that.

(no subject)

Date: 2009-02-11 01:48 am (UTC)
From: [identity profile] enochsmiles.livejournal.com
Scratch the first part. How do you verify who is a legitimate user, period?

(no subject)

Date: 2009-02-11 03:58 am (UTC)
michiexile: (Default)
From: [personal profile] michiexile
And once you have a way to verify legitimacy, how do you make sure that the police Hijackers don't look legitimate?

(no subject)

Date: 2009-02-11 04:09 am (UTC)
From: [identity profile] maradydd.livejournal.com
I think this is the part where [livejournal.com profile] enochsmiles or [livejournal.com profile] ephermata or [livejournal.com profile] allonymist or [livejournal.com profile] sjmurdoch or [livejournal.com profile] tshb hits us over the head with papers that I, at least, should have read already.

(You have an excuse, you're a topologist. I came at security from formal language theory, that's my problem.)

(no subject)

Date: 2009-02-11 04:14 am (UTC)
michiexile: (Default)
From: [personal profile] michiexile
I used to be a salaried cryptographer. One major reason I'm throwing myself into this debate and dropping buzzwords as I go.

(no subject)

Date: 2009-02-11 04:16 am (UTC)
From: [identity profile] maradydd.livejournal.com
Oh. Well then. We should formalize what the actual problem is. It looks to me like a zero-knowledge proof of legitimate usership -- which, as [livejournal.com profile] enochsmiles pointed out, has the zeroth-step problem of who constitutes a legitimate user to start with.

(no subject)

Date: 2009-02-12 12:48 am (UTC)
From: [identity profile] jrtom.livejournal.com
Agreed that the actual problem is not yet specified. Stronger, even: we haven't yet specified the users' requirements (from which we will derive the problems that need to be solved, etc.).

That is: there's a whole thread here which seems to be suggesting that there will be privacy guarantees and possibly identity verification measures...but nothing specific.

(Which is fine, this started out as you asking for possible features; I'm just suggesting that we may want to back up a bit.)

(no subject)

Date: 2009-02-12 12:40 am (UTC)
From: [identity profile] jrtom.livejournal.com
First, define "legitimate". Then we can start to take a hack at the problem.

(I'm not being snarky, really. Actually I suspect that once we define "legitimate" we may be most of the way to a solution.)

Profile

maradydd: (Default)
maradydd

September 2010

S M T W T F S
   1234
567891011
12131415 161718
19202122232425
26 27282930  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags