Lavabit founder wants to make “dark” e-mail secure by default

Ladar Levison is probably most well-known to Ars readers as the founder of the secure e-mail service Lavabit, which he shut down in mid-2013 in an effort to avoid being forced to comply with a US government demand to turn over users e-mails. But his latest project is a lot grander in scope than a single hosted e-mail service: Levison is attempting, with the aid of some fellow crypto-minded developers, to change e-mail at large and build encryption into its fundamental nature.

As one of the members of the Darkmail Technical Alliance, Levisonalong with Jon Callas, Mike Janke, and PGP designer Phil Zimmermannis working on a project collectively referred to as DIME, the Dark Internet Mail Environment. DIME will eventually take the form of a drop-in replacement for existing e-mail servers that will be able to use DMTP (the Dark Mail Transfer Protocol) and DMAP (Dark Mail Access Protocol) to encrypt e-mails by default.

Conceptually, DIME applies multiple layers of encryption to an e-mail to make sure that the actors at each stage of the e-mails journey from sender to receiver can only see the information about the e-mail that they need to see. The e-mails author and recipient both know who sent the message and where it was bound, but the authors e-mail server doesntit can only decrypt the part of the message containing the recipients e-mail server. The recipient e-mail server knows the destination server and the recipient, but it doesnt know the sender. So if you arrange the four steps in a line from left to rightauthor, origin server, destination server, and recipienteach step in the line is only aware of the identity of the entity directly to its left or right.

Making this work means relying on a federated key management system to handle the layers of encryption, since every entity in the DIME chain has to have its own public and private keypair to encrypt and decrypt the portions of the e-mail that it needs to be able to encrypt or decrypt. Levison envisions this working in somewhat the same manner as DNS, with each organization that uses DIME being the authoritative source for encryption keys for its servers and e-mail addresses. Levison has settled on DNSSEC as being the preferred method for holding a domains e-mail trust anchor, but DNSSECs poor adoption means the protocol will also allow the use of a root Certificate Authority-signed TLS certificate to validate keys.

Levison is doing the initial implementation of DIME using a fork of Lavabits Magma e-mail server, but the plan is to eventually have support for DIME in Postfix and other common Mail Transfer Agents. In e-mail terms, the DIME Magma-based server functions sort of like Exchange, combining the roles of Mail Transfer Agent and Mail Delivery Agent into a monolithic server. If a users e-mail client (the MUA, or Mail User Agent) doesnt support DIME, the spec allows the DIME server to transparently generate keys for the user and encrypt the users messages on their behalf.

"You update your MTA, you deploy this record into the DNS system, and at the very least all your users get end-to-end encryption where the endpoint is the server, Levison explained during a phone interview with Ars. And presumably more and more over time, more of them upgrade their desktop software and you push that encryption down to the desktop."

This optional mode wherein the e-mail servers transparently do the clients encryption for them, is called trustful mode and can either be a bridge for users to until they have a client program that fully supports DIME, or a way for large organizations with legal discovery or regulatory requirements to use DIME but still have access to their users e-mails as needed. It also provides a way for e-mail hosting companies to potentially deploy DIME for hosted accounts without having to worry about what mail clients their customers are using.

From an encryption perspective, DIME will allow some flexibility, while at the same time attempting to ensure some minimal level of security as part of the spec. The DIME toolset will mandate a base set of ciphers, and administrators setting up DIME can specify additional ciphers to use on top of that. According to Levison, DIME will use for ciphers a mandated baseline that I knew was secure, but make it easy to extend upon that." This will be done by encrypting the message components with whatever alternative encryption method the administrator prefers, and then wrapping each component in the mandatory encryption scheme on top of that.

Adoption of DIME by the IETF as a formal set of RFCs would go a long way toward the likelihood of DIME support appearing in other more common existing MTAs like Postfix, rather than requiring administrators to set up Magma in order to take advantage of DIME. To that end, Levison intends to begin circulating the projects specifications document among members of the IETF at the groups meeting this March as a preliminary step toward transforming DIME into a ratified set of standards.

For now, outside of the custom (and preproduction) fork of the Magma server used by Levison, DIME isnt yet fully available or implementable. There is a GitHub repository containing what Levison describes as pre-alpha libraries for DIME, and the team has assembled a 109-page specifications document, but the technology isnt yet in a state where it can be independently deployed and audited.

Continued here:
Lavabit founder wants to make “dark” e-mail secure by default

SeX Podcast 6,7,8,9,10 – Julian Assange sex assault, DON’T ASK DON’T TELL in military! – Video


SeX Podcast 6,7,8,9,10 - Julian Assange sex assault, DONT ASK DONT TELL in military!
SeX Podcast 6,7,8,9,10 - Julian Assange rape, SeX gifts, After Sex advise, DON #39;T ASK DON #39;T TELL 6. Timaree summarizes and gives her thoughts on the alleged s...

By: SeXy Erotic Radio Channel 2

Link:
SeX Podcast 6,7,8,9,10 - Julian Assange sex assault, DON’T ASK DON’T TELL in military! - Video

Sydney real estate agency begins accepting bitcoin

Sydney real estate agency Forsyth Real Estate has begun accepting virtual cryptocurrency bitcoin for house deposits and property advertising, through a partnership with Australian bitcoin payments provider CoinJar.

The 115-year-old real estate agency on Sydney's north shore said that it took on bitcoin to offer another avenue for online payment to the influx of international investors and expats entering the prominent Sydney market.

Forsyth managing director James Snodgrass said the agency had become a strong supporter of the bitcoin economy recently, as it allowed overseas transactions with less fees and exchange rate fluctuations.

"Prior to launching, we had discussions with our financial division who outlined the risks and opportunities of bitcoin and we were happy with our findings," he said.

Advertisement

But the director of Max Walls International Real Estate in Manly, Anthony Walls, said he was not convinced.

"I must tell you I'm very concerned about the bitcoin situation," Mr Walls said.

"I just don't need to deal with those [virtual currencies] and I don't need the grief."

Mr Walls was referring to the hacking of 850,000 bitcoins from the high-profile Mt Gox currency exchange worth about $US500 million ($548 million) earlier this month. The attack ruined Mt Gox, which was reportedly handling up to 70 per cent of the world's bitcoin transactions.

"I would need to be convinced and I'd want a whole team of lawyers sitting at the table signing off on it," Mr Walls said in response to whether he would ever accept bitcoin.

Read the original:
Sydney real estate agency begins accepting bitcoin

Edward Snowden documents show Malaysia is an Australia, US intelligence target

Edward Snowden: Gained access to high-classified documents using a web crawler. Photo: Getty Images

Malaysias political leadership is a priority intelligence target for the United States and Australia, according to top secret documents published by Germanys Der Spiegel magazine.

Former Malaysian Abdullah bin Haji Ahmad Badawi, who served as Malaysian prime minister from October 2003 to April 2009, is listed in an extract from the US National Security Agencys "Target Knowledge Base", a database designed to build up complete profiles of high priority intelligence targets.

Abdullah Badawis name appears in a list of eleven heads of government, including Germanys Angela Merkel, Syrias Bashar al-Assad, Belaruss Alexander Lukashenko, and former Colombian president Alvaro Uribe. The top secret briefing, created in 2009, indicates that the full list of targeted heads of foreign governments contained 122 names. The final name on the list is Yulia Tymoshenko, who was Ukrainian prime minister at the time.

According to Der Spiegel a National Security Agency search program codenamed "Nymrod" enables intelligence analysis to search the database to "find information relating to targets that would otherwise be tough to track down". Nymrod sifts through signals intelligence reports based on intercepted communications as well as transcripts of faxes, phone calls, and data collected from computer networks. Each of the names in the database is considered a "SIGINT target" with automated data processing making it possible to manage more than 3 million entries.

Advertisement

Part of the trove of highly classified documents leaked by former US intelligence contractor Edward Snowden, the secret briefing published by Der Spiegel also shows that intelligence on foreign leaders is shared between all "5-eyes" intelligence partners the United States, United Kingdom, Canada, Australia and New Zealand.

Former members of the Australian Parliament's joint intelligence committee have confirmed to Fairfax Media that the Malaysian government, political leadership and defence force have been long been targeted by Australia's electronic spy agency, the Australian Signals Directorate, and by the Australian Secret Intelligence Service.

Australia bugged Malaysia Cabinet ministers

Fairfax Media has been told that in the early 1990s Australian intelligence successfully eavesdropped on Malaysian Cabinet talks, recording highly uncomplimentary remarks by then Prime Minister Mahathir Mohammed about Indonesian President Suharto. A decade later parliamentary joint intelligence committee members were briefed on the Australian Signals Directorates access to Malaysian defence force communications, including interception of video conference channels used by Malaysia's defence chiefs.

More:
Edward Snowden documents show Malaysia is an Australia, US intelligence target