"All the world's a stage we pass through." - R. Ayana

Monday, 18 February 2013

The Threat of Silence: Meet the groundbreaking new encryption app set to revolutionize privacy and freak out the feds

The Threat of Silence
Meet the groundbreaking new encryption app set to revolutionize privacy and freak out the feds.


For the past few months, some of the world’s leading cryptographers have been keeping a closely guarded secret about a pioneering new invention. Today, they’ve decided it’s time to tell all.

Back in October, the startup tech firm Silent Circle ruffled governments’ feathers with a “surveillance-proof” smartphone app to allow people to make secure phone calls and send texts easily. Now, the company is pushing things even further—with a groundbreaking encrypted data transfer app that will enable people to send files securely from a smartphone or tablet at the touch of a button. (For now, it’s just being released for iPhones and iPads, though Android versions should come soon.) That means photographs, videos, spreadsheets, you name it—sent scrambled from one person to another in a matter of seconds.

“This has never been done before,” boasts Mike Janke, Silent Circle’s CEO. “It’s going to revolutionize the ease of privacy and security.”

True, he’s a businessman with a product to sell—but I think he is right.

The technology uses a sophisticated peer-to-peer encryption technique that allows users to send encrypted files of up to 60 megabytes through a “Silent Text” app. The sender of the file can set it on a timer so that it will automatically “burn”—deleting it from both devices after a set period of, say, seven minutes. Until now, sending encrypted documents has been frustratingly difficult for anyone who isn’t a sophisticated technology user, requiring knowledge of how to use and install various kinds of specialist software. What Silent Circle has done is to remove these hurdles, essentially democratizing encryption. It’s a game-changer that will almost certainly make life easier and safer for journalists, dissidents, diplomats, and companies trying to evade state surveillance or corporate espionage. Governments pushing for more snooping powers, however, will not be pleased.

By design, Silent Circle’s server infrastructure stores minimal information about its users. The company, which is headquartered in Washington, D.C., doesn’t retain metadata (such as times and dates calls are made using Silent Circle), and IP server logs showing who is visiting the Silent Circle website are currently held for only seven days. The same privacy-by-design approach will be adopted to protect the security of users’ encrypted files. When a user sends a picture or document, it will be encrypted, digitally “shredded” into thousands of pieces, and temporarily stored in a “Secure Cloud Broker” until it is transmitted to the recipient. Silent Circle, which charges $20 a month for its service, has no way of accessing the encrypted files because the “key” to open them is held on the users’ devices and then deleted after it has been used to open the files. Janke has also committed to making the source code of the new technology available publicly “as fast as we can,” which means its security can be independently audited by researchers.

The cryptographers behind this innovation may be the only ones who could have pulled it off. The team includes Phil Zimmermann, the creator of PGP encryption, which is still considered the standard for email security; Jon Callas, the man behind Apple’s whole-disk encryption, which is used to secure hard drives in Macs across the world; and Vincent Moscaritolo, a top cryptographic engineer who previously worked on PGP and for Apple. Together, their combined skills and expertise are setting new standards—with the results already being put to good use.

According to Janke, a handful of human rights reporters in Afghanistan, Jordan, and South Sudan have tried Silent Text’s data transfer capability out, using it to send photos, voice recordings, videos, and PDFs securely. It’s come in handy, he claims: A few weeks ago, it was used in South Sudan to transmit a video of brutality that took place at a vehicle checkpoint. Once the recording was made, it was sent encrypted to Europe using Silent Text, and within a few minutes, it was burned off of the sender’s device. Even if authorities had arrested and searched the person who transmitted it, they would never have found the footage on the phone. Meanwhile, the film, which included location data showing exactly where it was taken, was already in safe hands thousands of miles away—without having been intercepted along the way—where it can eventually be used to build a case documenting human rights abuses.

One of the few people to have tested the new Silent Circle invention is Adrian Hong, the managing director of Pegasus Strategies, a New York-based consulting firm that advises governments, corporations, and NGOs. Hong was himself ensnared by state surveillance in 2006 and thrown into a Chinese jail after getting caught helping North Korean refugees escape from the regime of the late Kim Jong Il. He believes that Silent Circle’s new product is “a huge technical advance.” In fact, he says he might not have been arrested back in 2006 “if the parties I was speaking with then had this [Silent Circle] platform when we were communicating.”

But while Silent Circle’s revolutionary technology will assist many people in difficult environments, maybe even saying lives, there’s also a dark side. Law enforcement agencies will almost certainly be seriously concerned about how it could be used to aid criminals. The FBI, for instance, wants all communications providers to build in backdoors so it can secretly spy on suspects.

Silent Circle is pushing hard in the exact opposite direction—it has an explicit policy that it cannot and will not comply with law enforcement eavesdropping requests. Now, having come up with a way not only to easily communicate encrypted but to send files encrypted and without a trace, the company might be setting itself up for a serious confrontation with the feds. Some governments could even try to ban the technology.

Janke is bracing himself for some “heat” from the authorities, but he’s hopeful that they’ll eventually come round. The 45-year-old former Navy SEAL commando tells me he believes governments will eventually realize that “the advantages are far outweighing the small ‘one percent’ bad-intent user cases.” One of those advantages, he says, is that “when you try to introduce a backdoor into technology, you create a major weakness that can be exploited by foreign governments, hackers, and criminal elements.”

If governments don’t come round, though, Silent Circle’s solution is simple: The team will close up shop and move to a jurisdiction that won’t try to force them to comply with surveillance.

Mike Janke.
 Silent Circle CEO Mike Janke
Courtesy of Silent Circle

“We feel that every citizen has a right to communicate,” Janke says, “the right to send data without the fear of it being grabbed out of the air and used by criminals, stored by governments, and aggregated by companies that sell it.”

The new Silent Circle encrypted data transfer capability is due to launch later this week, hitting Apple’s App Store by Feb. 8. Expect controversy to follow.

This article arises from Future Tense, a collaboration among Arizona State University, the New America Foundation, and Slate. Future Tense explores the ways emerging technologies affect society, policy, and culture. To read more, visit the Future Tense blog and the Future Tense home page.

From Slate @ http://www.slate.com/articles/technology/future_tense/2013/02/silent_circle_s_latest_app_democratizes_encryption_governments_won_t_be.single.html

Hands On With Kim Dotcom’s New Mega:

This Service Could Dismantle Copyright Forever


by Mario Aguilar

…This service might look like it's just another online storage locker like Dropbox or Google Drive. (Update: It's live.) But it's way more than that. Mega is a weapon aimed straight at copyright rights holders. It's maybe the most private, invincible file-sharing service of all time.

When you first sign in, you see (instead of a big red button coyly promising to change the world) a simple drag-and-drop upload tool. A Mega upload tool.

Hands On With Kim Dotcom's New Mega: This Service Could Dismantle Copyright Forever

From there, you're immediately prompted to agree to terms and conditions. Our resident lawyer told us they're not very well written, but in essence, they absolve Mega for any liability whatsoever for and naughty things you might do with the service. Smart Move, Kim.

Hands On With Kim Dotcom's New Mega: This Service Could Dismantle Copyright Forever

After agreeing, you arrive at your Cloud Drive—the file manager where all of your everything lives. When you select one of your files or folders to upload you realize how fast this thing is. I went ahead and uploaded Metallica's Kill Em All in just a few minutes.

From there, with a single right-click, I can generate a download link for the album. And then I can send it to whoever I want. It's Megaupload with a file manager.

Hands On With Kim Dotcom's New Mega: This Service Could Dismantle Copyright Forever

So what's to stop Mega from going down just the way Megaupload did? Mega's privacy, which is a no-foolin' stroke of genius. See, all of your files are encrypted locally before they're uploaded, so Mega has no idea what anything is. It could be family photos or work documents, or an entire discography of your favorite band. Poof: online and easy to share. And importantly, Mega doesn't have the decryption key necessary to get in. See? It's a masterstroke of copyright subversion.

Hands On With Kim Dotcom's New Mega: This Service Could Dismantle Copyright Forever

To explain further, Mega's terms say that nobody can access your stuff without your personal decryption key. And they don't have it. Only you do. The company does, however, stipulate in the privacy policy that they might cooperate with law enforcement. But big deal; what are they going to turn over? When Twitter and Facebook cooperate with the authorities, they have access to your data. All Mega has is an encrypted file, and that's its ultimate protection.

Hands On With Kim Dotcom's New Mega: This Service Could Dismantle Copyright Forever

So why is this a copyright killer? Well, actually, it's way way more than a copyright killer; it enables the most private data exchanges of any online service available to the public. Prying eyes will have a hard time getting to them.

That's important because the private exchange of your data has always been a huge problem with online services. Take Google for example: Big G sometimes complies with requests to hand over your data—the data you thought was private. Google does it because it can be compelled to do so, and because it has access. Conversely, if authorities wanted to compel Kim Dotcom and company to hand over your data, they wouldn't be able to do it. And getting other information out of Mega—like the technical details about how its keys work—is legally problematic, to say the least. But what we do know is that it's a super clever way for Mega to protect itself from you.

Hands On With Kim Dotcom's New Mega: This Service Could Dismantle Copyright Forever

So now two very big questions remain, and we can't answer them from simply demoing the site. The first, is how secure is Mega? Can hackers break in? Can the FBI?

The second question, is what are Kim Dotcom's future plans for this service? He's provided a vague roadmap for what lies ahead, but we can't be sure. We're looking forward to hearing what Kim Dotcom has to say at the launch press conference at 2:30AM EST Sunday morning. We'll be there, red-eyed and struggling to write coherently.

Additional reporting by Melissa Ulto who is a writer for MIPJournal.
From Gizmodo @ http://gizmodo.com/5977163/hands-on-with-kim-dotcoms-new-mega-this-service-could-dismantle-copyright-forever?popular=true

For more information about the surveillance society see http://nexusilluminati.blogspot.com/search/label/surveillance%20society  
- See ‘Older Posts’ at the end of each section

You Can Help This Unique Independent Site's Author Survive
Donate any amount and receive at least one New Illuminati eBook!
please press the button -

Xtra Image –http://resistancestudies.org/wp-content/Telecomix-Crypto.png

For further enlightening information enter a word or phrase into the random synchronistic search box @ http://nexusilluminati.blogspot.com

And see

 New Illuminati on Facebook - https://www.facebook.com/the.new.illuminati

New Illuminati Youtube Channel - http://www.youtube.com/user/newilluminati/feed

The Her(m)etic Hermit - http://hermetic.blog.com

The Prince of Centraxis - http://centraxis.blogspot.com (Be Aware! This link leads to implicate & xplicit concepts & images!)

This site is published under Creative Commons Fair Use Copyright (unless an individual item is declared otherwise by copyright holder) – reproduction for non-profit use is permitted & encouraged, if you give attribution to the work & author - and please include a (preferably active) link to the original along with this notice. Feel free to make non-commercial hard (printed) or software copies or mirror sites - you never know how long something will stay glued to the web – but remember attribution! If you like what you see, please send a small but heartfelt donation or leave a comment – and thanks for reading this far…

Live long and prosper!

From the New Illuminati – http://nexusilluminati.blogspot.com

No comments:

Post a Comment

Add your perspective to the conscious collective