Brainstorm!
Feb. 10th, 2009 08:33 pm![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Prompted by a discussion with
bunnykitteh, who's good at prompting these kinds of things:
Imagine a Facebook and/or MySpace application aimed at organising flash mobs for political action (e.g., the kind of thing Anonymous might use to quickly notify members of imminent $cientology activity in a particular location). What features should it have? (Twitter gateway?)
(Note that with Facebook, especially, there are all kinds of interesting concerns with respect to privacy...)
![[livejournal.com profile]](https://www.dreamwidth.org/img/external/lj-userinfo.gif)
Imagine a Facebook and/or MySpace application aimed at organising flash mobs for political action (e.g., the kind of thing Anonymous might use to quickly notify members of imminent $cientology activity in a particular location). What features should it have? (Twitter gateway?)
(Note that with Facebook, especially, there are all kinds of interesting concerns with respect to privacy...)
(no subject)
Date: 2009-02-10 09:13 pm (UTC)What is it that the crypto is supposed to provide?
Depending on the answers you'll want completely different solutions:
- is it keeping eavesdroppers out before the flashmob happens? Short timespan, go for some sort of session key handling and AES or something like that.
- is it keeping eavesdroppers out afterwards as well? This will get tricky, depending on your paranoia levels and the timespans involved.
- is it verifying identities? Now we're talking the entire trustweb infrastructure. And here the Javascript key-generation will not do any good.
(no subject)
Date: 2009-02-10 09:20 pm (UTC)(no subject)
Date: 2009-02-11 12:53 am (UTC)Which, upon reflection, seems to be about 80% social engineering and less network security. The problem is, how do you identify who's a legitimate user?
(no subject)
Date: 2009-02-12 01:16 pm (UTC)Maybe a two layer system where you can consume information with a nominal login if any (keeps you and your devise Anon and not identified for prosecution) and a posting layer with much higher security?
(no subject)
Date: 2009-02-12 03:36 pm (UTC)Also got pointed earlier today at Heydt-Benjamin/Serjantov/Defend, "Nonesuch: a Mix Network with Sender Unobservability", WPES 2006, which I need to read more thoroughly but also looks promising.
(no subject)
Date: 2009-02-11 03:50 am (UTC)(no subject)
Date: 2009-02-11 03:57 am (UTC)Besides - if people are being tortured to divulge their Facebook passwords - what prevents The Authorities to request their secret keys while they're at it?
(no subject)
Date: 2009-02-11 04:09 am (UTC)And I think our coder in question is focused more on American protests where torture is (somewhat?) less of a concern.
I can haz securitee?
(no subject)
Date: 2009-02-11 04:13 am (UTC)(software engineering lesson #1: figure out what the project requirements are first!)
(no subject)
Date: 2009-02-11 04:24 am (UTC)(no subject)
Date: 2009-02-11 04:32 am (UTC)(no subject)
Date: 2009-02-11 04:38 am (UTC)