Privacy Activist Still Needs $299,697 To Fund His Kickstarter To Webcast Every Moment Of His Life

While some have responded to reports of NSA spying and advertising tracking our every click online by increasing their privacy through encryption, Tor, and Bitcoin, one Arizona professor is going down a very different path. This self-described anti-privacy activist is hoping the public will donate a staggering $300,000 to help him live without privacy for an entire year by live streaming every moment of that year (yes, even peeing and having sex).

Noah Dyer launched a Kickstarter on August 1, asking for $300,000 to buy cameras, pay eight employees to film him for a year, and pay for hosting and streaming online for the world to see. So far, things dont look good. With 13 days to go, Dyer has only raised $303 from 26 supporters, many of whom he says are friends. He still needs to raise a whopping $299,697.

Noah Dyer, Courtesy of facebook

Dyers stunt is certainly not a new idea. Im reminded of the TV show Big Brother, except Dyers the only contestant in the game. Dyer is both the instigator and subject of his own Truman Show-esque experiment. Dyers project is shorter-term and less academic than MyLifeBits, a Microsoft research project digitizing the life of computer scientist Gordon Bell.

Dyer admits hes struggling to pair the stunt with the intellectual musing that motivated the project. I know that Im doing a stunt and creating sensationalism, and I also understand that its an intelligent issue, he says. I always knew that I needed people who disagreed with me to give a buck. I need people who are, like, this is stupid to still give a dollar to prove me wrong.

No one seems particularly motivated by the thought of proving him wrong (or the thought of creepily observing him for a year). Beyond funding, the logistics of the project are still up in the air. This kind of video project is new to Dyer, and there will be a lot of technical coordination required to keep video streaming for an entire year. Dyers four childrenages 11, 9, 7, and 6have agreed to participate in the project but still want a way to communicate with him privately on occasion. As a professor, Dyer has to (somewhat ironically) protect the privacy of his students while conducting this anti-privacy experiment.

Dyers motivation for the project stem from the belief that the government has too much power over the people today and too much information that it doesnt disclose. But Dyer believes regaining privacy is a losing battle. With the level of technology we have and the level of trust it requires, I dont think any true notion of privacy exists, he says. There will always people who can turn it on its head.

Instead, Dyer thinks we would be better off if privacy didnt exist at all, once people got over their fear of being judged. On the business side, Dyer believes innovation would flourish in a world where advantage will be maintained not by secrecy but by executing flawlessly.

The world Dyer describes sounds like the setting for a great piece of science fiction. He has a point about how difficult it is to achieve privacy in the digital age, but achieving no privacy would be far more difficult than his task of raising almost $300,000 in just under two weeks, and likely impossible.

Additionally, by choosing to broadcast his own life, Dyer is actually taking control of his own privacy. Rather than wondering if someone might have access to his information, Dyer is deciding exactly how he wants to share it. The limits of the projectfor example, Dyers thoughts will still be privateallow him to choose exactly how much he is comfortable sharing with the world, which is exactly what people want when they ask for privacy.

Read the original:
Privacy Activist Still Needs $299,697 To Fund His Kickstarter To Webcast Every Moment Of His Life

This Android Shield Could Encrypt Apps So Invisibly You Forget It’s There

In the post-Snowden era, everyone wants to make encryption easier. Now, one group of researchers has created a tool intended to make it invisible.

A team from Georgia Tech has designed software that acts as an overlay on Android smartphones communication appslike Gmail or Whatsappand mimics the apps user interfaces. When users type, the text is encrypted automatically before being passed on to the application and transmitted over the internet. Likewise, the interface invisibly decrypts text received from other users of the software. The result, as the researchers describe it, is a transparent window over apps that prevents unencrypted messages from leaving the users device, an invisible communications condom for your smartphones secrets.

The window acts as a proxy between the user and the app. But the beauty of it is that users feel like theyre interacting with the original app without much, if any, change, says Wenke Lee, the Georgia Tech professor who led the developers. Our goal is to make security thats as easy as air. You just breathe and dont even think about it.

The researchers call their prototype Mimesis Aegis, or M-Aegis, Latin for mimicry shield. They plan to present their researchat the Usenix Security conference this week.

For now, theGeorgia Tech team is framing their workas pure academic research. But they also plan to release the software in some form this fall, although it initially will work only with email and chat services like Gmail, Whatsapp, and Facebook. Eventually, they hope to extend the apps abilities to photos and audio, so multiple functions of an Android phone can be effortlessly encrypted within popular apps users already have installed without requiring them to adopt new encryption apps like Textsecure or Silent Circle.

Despite their ambition, M-Aegis prototype is far from a universal smartphone encryption engine: It can only encrypt communications with other M-Aegis users, since both phones must generate encryption keys and exchange them to allow scrambled communications. And the system only works with Android; Apple is more restrictive in controlling how the user interfaces of its iOS apps can be altered.

Aside from those limitations, the researchers claim in their Usenix paper that a lock icon added to encrypted messages will be virtually the only sign that users arent directly accessing an unaltered app. They tested M-Aegis with real emailsusing samples taken from the Enron investigation in the early 2000sand found it took less than a tenth of a second to decrypt even the longest emails on an LG Nexus 4, and at most around one-fifth of a second to encrypt them. They even were able to replicate the search function of the Android Gmail client, thanks to their own encryption system called easily-deployable efficiently-searchable symmetric encryption or EDESE, which allows the search of encrypted files with negligible slowdown.

Despite those impressive crypto claims, early users should be wary of the security of M-Aegiss untested prototype. The Georgia Tech researchers say that for now, they dont plan an open source release of the software, which may prevent the security community from identifying flaws in its privacy protections.

Maintaining the software could also turn out to be cumbersome: Given that the program is designed to exactly mimic the apps its overlaid on, every update to a communications apps interface could require a change to M-Aegis. The researchers wont yet say how they plan to support the appthrough their own volunteer labor or by spinning the technology out into a non-profit project or startup. But Lee downplays the difficulty of keeping up with the apps whose communicationsM-Aegis encrypts. If an update to an app is just to make it look prettier or move things around, that doesnt effect us at all, he says.

For now, Lee admits, the process does require a manual process of assessing new apps and updates to maintain M-Aegiss mimicry of the underlying programs. But eventually, he hopes to automate the analysis of new applications so that they can be pulled underM-Aegiss protective shieldwith minimal human effort. The goal, he says, is a future where privacy-conscious users dont need to give up mainstream cloud-based services. But thanks to invisible encryption strapped onto the apps surfaces, the apps arenonetheless prevented from ever accessing raw data that could be vulnerable to hackers or intelligence agencies.

See the rest here:
This Android Shield Could Encrypt Apps So Invisibly You Forget It’s There

Software engineer fights back against poor internet security

Personal information at risk: A new blog is shaming websites and apps that do not use encryption. Photo: Reuters

The web is fighting back against websites and apps that do not use encryption.

Such services are considered to have good security when they implement a technology known as Transport Layer Securityor Secure Sockets Layer (SSL), which encrypts traffic between an end user and the site. Google, Twitter, Facebook and banks are good examples of this practice.

But many apps and sites implement it incorrectly or do not use it at all, leaving personal information at risk of being seen over unsecured connections, like public Wi-Fi. In such cases, a hacker using "sniffing" tools is able to snoop on the traffic, steal personal information and use it to hack into your online accounts.

Enter HTTP Shaming, a Tumblr blog launched at the weekend that is naming and shaming websites and apps that are not doing the right thing by their users.

Created by US software engineer Tony Webster, the site already lists a number of popular websites and apps that are not doing encryption properly, including Tripit, Scribd and Meetup.

Mr Webster is hoping that highlighting poor security in services will result in their owners implementing better security. The engineer is also taking submissions for the blog from members of the public.

"When that traffic goes over an open Wi-Fi network, it's not encrypted unless the website or app is using SSL," Mr Webster said. SSL is displayed as the "s" in https before a web address and is typically accompanied by a golden padlock, but this is not displayed as a symbol in appson smartphones.

"Anyone with network sniffing software can intercept traffic on open wireless networks and, if passwords and personal information is being sent, that attacker now has a lot of ... information that could be used to cause a lot of problems," Mr Webster said.

At the end of the day, he said it was "so easy" to implement encryption that web services should be doing it for the privacy of their users.

Link:
Software engineer fights back against poor internet security

Web fights back against poor security

Personal information at risk: A new blog is shaming websites and apps that do not use encryption. Photo: Reuters

The web is fighting back against websites and apps that do not use encryption.

Such services are considered to have good security when they implement a technology known as Transport Layer Securityor Secure Sockets Layer (SSL), which encrypts traffic between an end user and the site. Google, Twitter, Facebook and banks are good examples of this practice.

But many apps and sites implement it incorrectly or do not use it at all, leaving personal information at risk of being seen over unsecured connections, like public Wi-Fi. In such cases, a hacker using "sniffing" tools is able to snoop on the traffic, steal personal information and use it to hack into your online accounts.

Enter HTTP Shaming, a Tumblr blog launched at the weekend that is naming and shaming websites and apps that are not doing the right thing by their users.

Created by US software engineer Tony Webster, the site already lists a number of popular websites and apps that are not doing encryption properly, including Tripit, Scribd and Meetup.

Mr Webster is hoping that highlighting poor security in services will result in their owners implementing better security. The engineer is also taking submissions for the blog from members of the public.

"When that traffic goes over an open Wi-Fi network, it's not encrypted unless the website or app is using SSL," Mr Webster said. SSL is displayed as the "s" in https before a web address and is typically accompanied by a golden padlock, but this is not displayed as a symbol in appson smartphones.

"Anyone with network sniffing software can intercept traffic on open wireless networks and, if passwords and personal information is being sent, that attacker now has a lot of ... information that could be used to cause a lot of problems," Mr Webster said.

At the end of the day, he said it was "so easy" to implement encryption that web services should be doing it for the privacy of their users.

Read more here:
Web fights back against poor security

Technology Can Make Lawful Surveillance Both Open and Effective

With cryptography, surveillance processes could be open and preserve privacy without undermining their investigative power.

Democracy rests on the principle that legal processes must be open and public. Laws are created through open deliberation by elected bodies; they are open for anyone to read or challenge; and in enforcing them the government must get a warrant before searching a persons private property. For our increasingly electronic society to remain democratic, this principle of open process must follow us into cyberspace. Unfortunately it appears to have been lost in translation.

The NSA, secretly formed after World War II to spy on wartime adversaries, has clung to military-grade secrecy while turning its signals-intelligence weapons on ourselves and our allies. While nominally still a foreign-intelligence agency, the NSA has become a de facto law-enforcement agency by collecting bulk surveillance data within the U.S. and feeding these data to law-enforcement agencies. What walks like a duck and squawks like a duck is usually a duck, and since the NSA has been squawking like a law-enforcement agency, it should be subject to open processes like a law-enforcement agency.

Other agencies have also caught secret surveillance fever. Arguing that phone or Internet users have no expectation of privacy, the FBI secretly uses warrantless subpoenas to obtain bulk cell-tower records affecting hundreds of thousands of users at once, whether investigating bank robberies or harmless urban pranks. Police spy on entire neighborhoods with fake cellular base stations known as StingRays and have deliberately obfuscated warrants to conceal their use of the technology.

All this secrecyand its recent partial unravelinghas harmed our democracy and our economy. But effective surveillance does not require total secrecy. With a policy and technology framework that our team and others have developed, surveillance processes could be made open and privacy-preserving without compromising their effectiveness. Details will be presented today in our paper Catching Bandits and Only Bandits at the Workshop on Free and Open Communications on the Internet.

We propose an openness principlesomethingwe believe is necessary to constrain electronic surveillance in a healthy democracy. In brief, any surveillance process that collects or handles bulk data or metadata about users not specifically targeted by a warrant must be subject to public review and should use strong encryption to safeguard the privacy of innocent users. Only after law-enforcement agencies identify people whose actions justify closer investigation and demonstrate probable cause via an authorized electronic warrant can they gain access to unencrypted surveillance data or employ secret analysis processes. The details of an investigation need not be public, but the data collection process would bewhat information was collected, from whom, and how it was encrypted, stored, searched, and decrypted. This is no different in principle from the way the police traditionally use an open process to obtain physical search warrants without publicly revealing the target or details of their investigation.

Technology we have developed could allow law enforcement to enact this approach without hampering their work. In fact it could even enhance it. As we have argued before and have now demonstrated, modern cryptography could enable agencies to find and surgically extract warrant-authorized data about persons of interest like needles in a haystack of encrypted data, while guarding both the secrecy of the investigation and the privacy of innocent users whose data comprise the haystack. The NSA was aware of this option but, shielded from public scrutiny, chose a more invasive path. Our design ensures that no sensitive data may be decrypted without the use of multiple keys held by independent authorities, such as the law-enforcement agency, the authorizing judge, and a legislative oversight body.

Our approach can target not just known but unknown users. In the case of bank robbers known as the High Country Bandits, the FBI intercepted cell-tower records of 150,000 people to find one criminal who had carried a cell phone to three robbery sites. Using our encrypted metadata search system, the FBI could have quickly extracted the bandits number without obtaining data on about 149,999 innocent bystanders. The same system could discover unknown associates of known targets. This and many other cryptographic methods could facilitate the legitimate pursuit of criminals and terrorists while protecting our privacy.

Secrecy-obsessed agencies will fret that open processes like those we propose might help terrorists evade surveillance. But its better to risk a few criminals being slightly better informed than to risk the privacy and trust of everyone. When intelligence leaders lie to Congress and spy on their overseers, we must ask whether the existential threat to our society is hiding in rocky caves or in Beltway offices. With the right technology, we can have both strong national security and strong privacy.

Bryan Ford is an associate professor of computer science at Yale University, where he leads the Decentralized/Distributed Systems research group.

Continued here:
Technology Can Make Lawful Surveillance Both Open and Effective

BlackBerry forms new business unit

;

BlackBerry Ltd. has created a new business unit that will combine some of its most innovative technology, including QNX embedded software, Certicom cryptography applications and its patent portfolio.

WATERLOO, Ont. BlackBerry Ltd. has created a new business unit that will combine some of its most innovative technology, including QNX embedded software, Certicom cryptography applications and its patent portfolio.

The unit, to be called BlackBerry Technology Solutions, will be headed by Sandeep Chennakeshu, who has previously been president of Ericsson Mobile Platforms and chief technology officer of Sony-Ericsson.

Combining all these assets into a single business unit led by Sandeep will create operational synergies and new revenue streams, furthering our turnaround strategy, said John Chen, BlackBerrys executive chairman and chief executive officer.

QNX is a formerly independent Ottawa-based company with software used by the automotive industry for information-entertainment systems. Certicom was a formerly independent Toronto-area company that has advanced security software.

BTS will also include BlackBerrys Project Ion, which is an application platform focused on machine-to-machine Internet technology, Paratek antenna tuning technology and about 44,000 patents.

Chennakeshu has 25 years of experience in research, product development, and intellectual property licensing in the wireless, electronics and semiconductor industries. He has 73 patents to his name.

The Canadian Press, 2014

See more here:
BlackBerry forms new business unit

Julian Assange to leave Ecuadorian Embassy in London – CNN.com

By Faith Karimi, CNN

updated 7:41 AM EDT, Mon August 18, 2014

STORY HIGHLIGHTS

(CNN) -- WikiLeaks founder Julian Assange said he'll leave the Ecuadorian Embassy in London "soon" after living there for two years to avoid extradition to Sweden.

"I can confirm I am leaving the embassy soon, but not for the reason you might think," Assange said at a news conference Monday.

He did not provide additional details but said he is suffering from health problems and would leave "when conditions are right."

However, WikiLeaks said, "his departure is not imminent."

Ecuador's foreign minister, who sat next to him, said his freedom is long overdue.

"The situation must come to an end ... two years is too long," Ricardo Patino said. "It is time to free Julian Assange. It is time for his human rights to be respected."

Swedish authorities want to question him over allegations that he raped one woman and sexually molested another.

Excerpt from:
Julian Assange to leave Ecuadorian Embassy in London - CNN.com

Julian Assange Plans To Leave Ecuadorian Embassy

WikiLeaks founder Julian Assange announced on Monday that he plans to leave the Ecuadorian embassy in London where he has been in exile for two years.

"I am leaving the embassy soon," Assange, 43, said during a press conference, "but perhaps not for the reasons the Murdoch press are saying at the moment."

Assange has been fighting an international legal battle against extradition since WikiLeaks published classified diplomatic and military information in 2010 and his arrest in Britain that same year.

Assange took refuge in the embassy in 2012 and is facing an arrest warrant in Sweden over allegations he sexually assaulted two women, CNN reported. He denies being charged with the crime of rape or even being accused of it by two female former WikiLeaks volunteers.

"No woman has done so," he said. "In fact, the women in Sweden explicitly deny having done that."

Assange also said his health has suffered during his time at the embassy, due to the fact that he has been unable to leave.

"As you can imagine, being detained in various ways in this country without charge for four years and in this embassy for two years which has no outside area, therefore no sunlight... it is an environment in which any healthy person would find themselves soon enough with certain difficulties they would have to manage," Assange said.

If Assange steps foot outside of the embassy, he will likely be arrested, Sky News reported. He also fears that Sweden will then extradite him to America to face trial for one of the largest leaks of classified information in U.S. history.

"There has been two years of great uncertainty and a lack of legal protection," Ecuadorian Foreign Minister Ricardo Patino said during the press conference. "This situation must come to an end. Two years is simply too long."

Go here to read the rest:
Julian Assange Plans To Leave Ecuadorian Embassy

Julian Assange suffers from heart condition after two …

Julian Assange has developed a potentially life-threatening heart condition and other health problems while living inside the Ecuadorian embassy, but cannot leave to be hospitalized, according to a report.

The WikiLeaks founder, who has been holed up in the embassy in London since June 2012, is suffering from arrhythmia, a potential fatal irregular heartbeat, as well as a chronic lung condition and high blood pressure, a source told the Mail on Sunday.

Vitamin D deficiency caused by lack of sunlight is also damaging his health and could lead to further problems down the road, including weakened bones and diabetes.

The Ecuadorian embassy has reportedly asked the Foreign Office for permission to transport Assange to the hospital, but the request was denied.

Assange is wanted for questioning in Sweden regarding an investigation into alleged sexual misconduct.

He has denied the allegations and said going to Stockholm would likely mean subsequent extradition to the U.S., where he is under investigation for publishing leaked, classified documents.

In an interview with the Mail on Sunday, the former hacker complained about the money going towards his constant policing.

Why are they burning 240,000 ($400,600) a month on me which could be better spent on hospital beds, meals for the needy or teachers salaries? he said. The Metropolitan Police Service has now spent in excess of 7 million (almost $11.7 million) on guarding the embassy, which is a ridiculous waste of taxpayers money.

vtaylor@nydailynews.com

ON A MOBILE DEVICE? CLICK HERE TO WATCH THE VIDEO.

View original post here:
Julian Assange suffers from heart condition after two ...

WikiLeaks’ Assange hopes to exit London embassy if UK lets …

By Kylie MacLellan

LONDON Mon Aug 18, 2014 11:27am EDT

1 of 5. WikiLeaks founder Julian Assange gestures during a news conference at the Ecuadorian embassy in central London August 18, 2014.

Credit: Reuters/John Stillwell/pool

LONDON (Reuters) - WikiLeaks founder Julian Assange, who has spent over two years in Ecuador's London embassy to avoid a sex crimes inquiry in Sweden, said on Monday he planned to leave the building "soon", but Britain signaled it would still arrest him if he tried.

Assange made the surprise assertion during a news conference alongside Ecuador's Foreign Minister Ricardo Patino. But his spokesman played down the chances of an imminent departure, saying the British government would first need to revise its position and let him leave without arrest, something it has repeatedly refused to do.

The 43-year-old Australian fled to the embassy in June 2012 to avoid extradition for questioning in Sweden over sex assault and rape allegations, which he denies.

He says he fears that if extradited to Sweden he would then be handed over to the United States, where he could be tried for one of the largest information leaks in U.S. history.

Assange would be arrested if he exited the London embassy because he has breached his British bail terms.

"I am leaving the embassy soon ... but perhaps not for the reasons that Murdoch press and Sky news are saying at the moment," Assange told reporters at the embassy in central London.

See original here:
WikiLeaks' Assange hopes to exit London embassy if UK lets ...