Ill tell you this much about him: He has soft eyes and a wonderful smile. Hes taller than me. Hes very good with computers. His accent in English is terrible. He likes his privacy.
In 2016, after several years of a simple and warm love affair, we hit a snag. We had decided to live together, and that I would emigrate to Europe. But to do this, we had to prove our relationship to the government. The instructions on how to do this skewed toward the modern forms of relationships: social media connections; emails; chats; pictures of the happy couple. He read through this, and showed it to me. We both laughed. Our relationship had left few traces in the digital world. We had none of these things.
We met a few years before at a drinks night for a hacker collective. A mutual friend introduced me by name, and him by handle. I liked him instantly. We chatted for a few moments, but I had to run. I set up a time to meet up with him later that weekend, and then missed it after falling ill.
Oh well, I thought, so much for that.
We bumped into each other a few weeks later on a public IRC channel, and I recognized his handle. IRC (Internet Relay Chat) is a massive chat system, like a command-line version of Slack. In fact, Slack is a fancy interface for IRC with added features, but no added privacy. An IRC server knows everything you say on it, just as the Slack servers do. I told him that Id still love to chat, but he warned me that he didnt come to IRC much. I gave him my Jabber address, and suggested that we continue our conversation privately. This time, we managed to chat.
Jabber is different from most chat protocols in that its decentralized. Theres no Jabber-the-company with only Jabber servers, like there is in the cases of Google or WhatsApp. This meant we could use servers run by whomever, in whichever country we liked. My only contact for this mysterious man (whom I hadnt been able to stop thinking about) was this Jabber address, which he had configured to refuse any unencrypted messages. Jabber itself doesnt encrypt messages, but another protocol called OTR (Off-The-Record) creates a layer of encryption inside other communication systems. It would be as if I called you, but the conversation were in a secret language only we knew. Someone could tap the line and listen, but they wouldnt understand us. OTR has another property, called Perfect Forward Secrecy. With Perfect Forward Secrecy, new encryption keys are created for every session, so that even if one is broken, its only broken that one time. It doesnt give an interloper any more access to messages in the future, or past. It would be as if when I called you, we invented a new language to communicate every time we spokea new language we both understood instantly, every time.
We started a conversation this wayintimate, privatein our textual world for two; its a conversation that is still going. Most Jabber clients are smart enough to realize that if youre encrypted, you dont want to log conversations, and that was our case as well. Those chats in the early days are gone. Some live in my memory, some in his, but most are as lost and fragmented as conversations in the rain.
I do remember I complained to him a lotabout journalism, sources, stories, writing; about trying to do something important. He always seemed to listen and care, in the strange body language that lives in chat pauses. He was sensible, positive, and encouraging. I remember that I told him I was frustrated with being a woman trying to write longform subjective journalism, and that I felt there was so much I wasnt socially allowed to do. He asked me about it more, and I listed out all the ways I felt my gender was limiting my writing. He was quiet for a moment, and then reposted my list to me in our chatbut as a to-do list. I looked at my computer and took a deep breath. I wanted to cry, but I also felt like it was time. I took that to-do list, and turned it into my final, longest, and best piece of journalism for Wired. But he doesnt remember this, and has to trust me that it happened. In an age in which every relationship is automatically documented, this one has remained ephemeral, contained in the shifting sands of our human memorythe way all relationships used to be.
I feel like what we keep in our minds is more important, he wrote to me over WhatsApp recently. The accuracy of it ismah. This is his disdain for this digital accuracy, and it captures something. Theres an obvious, almost legalistic veracity of moment-to-moment logging, but that loses a truth that the impressionism of memory catches better. I didnt fall in love with him word by word or sentence by sentence. I fell in love with him slowly and steadily through time, in the spaces between the words, held up by the words. Losing the words sometimes feels frustrating, but that forgetting also removes the scaffolding from a finished pasta past that was never really containable in a logfile.
As those first weeks stretched into months, he became my imaginary friend, the person who no one else knew was there. We spoke every day, usually on OTR, always encrypted. When we passed files using unencrypted file sharing programs and websites, wed first encrypt them with command line tools and share decryption passwords in our OTR chats.
These were not easy to use, and required long and esoteric commands, such as:
> openssl aes-256-cbc -a -salt -in for-you.mp3 -out for-you.mp3.enc
This meant that though our communications were on the open internet, they were just meaningless blobs of text without the password wed shared over chat. I read him poems into a microphone and sent them to him. I sent him pictures. I dont remember many specifics, and I cant look them up now, but I remember I loved it.
I wanted a way to communicate on the phone. We used TextSecure and RedPhone (which later became Signal). We sent pictures to each other usually me to him, and usually pictures of funny things Id seen in my day. I found myself in London, and jokingly (not at all jokingly) tried to get him to come visit me. He demurred, but countered that I could come visit him a bit later in Luxembourg. A few weeks later I was in Paris Gare de lEst, cash-bought ticket in hand, boarding an express train to the main station in Luxembourg City.
I still didnt know this mans legal name. I didnt even realize that Luxembourg was a different country. We had a lovely weekend. I told him, I want to show you a movie to help you understand my culture and my people, and I showed him a John Carpenters Big Trouble in Little China. We sat, side by side on a couch with a laptop balanced across our thighs, and watched it. He told me at the end that he liked it very much. We walked around the city in the daytime, sitting in parks and eating takeout food together. We talked about the internet, activism, journalism, and computers. By the end of the weekend I knew his name, but I still called him by his handleI was used to it.
Everything was still platonic, but I knew I didnt want it to be.
Several months later, we went together to Berlin. Standing on a friends balcony in the middle of the night, I asked if I could kiss him, and he said yes.
Not long after, I came to the attention of a media storm after being struck by a tragedy. My life imploded, and between grieving and dealing with media controversy, my days became a sickening tragicomedy I couldnt turn off. He became my refuge; his apartment became the only place I felt safe. He looked after me, made sure I was eating, held me, walked with me, and let me cry on him. At the moment when we might have become more public as a couple, he didnt want any part of my media ordeal. If a reporter calls me, I will be very mean with them, he told me. I laughed and agreed. I didnt want any part of it either. But when I was away, he was still with me, checking in over the encrypted links wed built. I dont remember much of that terrible time, but I remember the sense that he was there, quietly present, from thousands of miles away.
There are few pictures of us together. Very few were taken by us; neither of us are much for selfies. Those that do exist, we ask our friends to keep offline.
We know that the vague and soft anonymity of our relationship probably wont last forever. And I doubt there will ever be a surfeit of digital connections between us. Our phones trace the paths we walk together, existing in telecom databases (and more recently, in WhatsApps logfiles) long after weve moved on. Their cell tower and GPS logs are like a pair of maze paths with no walls, lines coming together and parting, and coming together again. But what we said on those walks is lost, even to us. Only the feelings, memories, and paths remain.
Those paths have traced across three continents now, traveling together, often visiting friends. We are not at all a secret couple. Our friends and communities know us as a couplewith something of an information security bent. Introducing him to my friends and family (first by handle, then later by name) has been one of my great joys. Im intensely proud of him, and still a bit giddy that I get to spend time with him.
My love affair has taught me that the age of data makes time solid in a way that it didnt used to be. I have a calendar and email archive that nails down the when/where/who of everything Ive done. I know when my kid was here; the last time I saw a friend in New York; exactly what my last email exchange with my mother was. Not so with my lover. Time is a softer thing for us. Sometimes it seems like hes always been there, sometimes it seems like were a brand new thing. Every other relationship in my life is more nailed down than this one.
Every time I look at an old mail, I feel weird, like I prefer the memory I have of a thing than the accurate recording, he told me.
He doesnt mean an email from me. We have never exchanged email.
Ill tell you a little more about him: He tolerates no nonsense. He expects clear and timely communication and honesty. He rarely sees the point of being subtle, especially on important matters. We make things plain to each other. Over the years, inside our little tunnels of encryption, we told our stories, explained ourselves to each other. We became quiet voices in each others minds. In the absence of a perfect record, we settled for trust.
So it was, in 2016, we had to document our relationship to the satisfaction of the modern nation-state. At the bottom of the government instructions for how we could do this, there was one old-fashioned option left to usletters from friends and family attesting to our love. So thats what we gathered.
One friend wrote in his letter:
Another wrote:
I dont know if anyone in the government actually read the lettersgovernments these days have a flawed love for metadata over actual informationbut we did. Having your friends and community testifying to your love beats all the selfies in the world.
Either way, I received my Carte de Sjour, the governments permission to live with my lover in Europe, and I moved to be with him.
In May of last year we went back to Berlin. I took him, naturally, to the Stasi museum. When we got to the directors old office, I took a deep breath and proposed to him. Instead of a ring, I gave him a USB key. (Bought with cash, and Im not telling you what was on it.)
He said yes.
Then he looked at me quizzically, and asked, Is this why youve been so nervous this week?
Yes! Its incredibly nerve-wracking! I said, and we went for coffee. So thats how it all happened.
But youll have to take my word for it.
Visit link:
Love in the Time of Cryptography - Backchannel
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]