Five years ago, from her prison cell, trans whistleblower Chelsea Manning sketched out a new way to protect online privacy. Now, she is helping an MIT-affiliated cryptographer bring the next generation of privacy software online.
Chelsea Mannings long blonde hair catches in a cool summer breeze as she turns the corner into Brooklyns Starr Bar, a dimly lit counter-cultural haunt in the heart of the hipster enclave of Bushwick. The 33-year-old best known for leaking hundreds of thousands of top-secret government documents to Julian Assange in 2010, then coming out as a transgender woman, walks past a poster depicting sea turtles, humans and geese merging to form the outline of a dove. Beside the image are the words, Your Nations Cannot Contain Us.
Dressed in a black suit and wearing a silver Omega watch, she makes her way to a small wooden table illuminated by a shaft of sunlight. She orders a coke. Contrary to what one might expect, this whistleblower turned trans-icon looks uncomfortable in the hip surroundings. A fan reverently approaches her and welcomes her back. This is my life, she says after he leaves, expressing both gratitude for the well wishes, and lamenting the loss of her privacy. Im not just famous, Im in the history books.
While serving the longest sentence ever doled out to a whistleblower after she used the privacy protecting Tor Network to anonymously leak 700,000 government documents, she used her time in incarceration to devise a better way to hide the tracks of other online users. Knowing that the non-profit Tor Project she used to send files to Wikileaks had become increasingly vulnerable to the prying eyes of intelligence agencies and law enforcement, she sketched out a new way to hide internet traffic using blockchain, the technology behind bitcoin, to build a similar network, without troublesome government funding. The entire plan was hatched in a military prison, on paper.
The privacy network industry, including the virtual-private networks (VPNs) familiar to many corporate users, generated $29 billion in revenue in 2019, and is expected to triple to $75 billion by 2027. Fixing the known weaknesses of these networks is about more than just protecting future whistleblowers and criminals. Private networks are also vital for big businesses who want to protect trade secrets. Manning thinks that not-for-profit efforts like Tor, which relies on U.S. government funding and a worldwide network of volunteers to run its anonymous servers, arent robust enough. Nonprofits are unsustainable, says Manning casually, sipping from her Coke. They require constant upholding by large capital funds, by large governments.
By January 2017, she was seven-years into a 35-year sentence at Fort Leavenworth, home to the likes of former Army Major Nidal Hasan, who killed 14 fellow soldiers in 2009. As President Barack Obama prepared to leave office, he granted Manning an unconditional commutation of her sentence. Newly tasting freedom, she was contacted by Harry Halpin, the 41-year-old mathematician who worked for World Wide Web inventor Tim Berners-Lee at MIT from 2013 to 2016 helping standardize the use of cryptography across web browsers.
Halpin asked Manning to look for security weaknesses in his new privacy project, which eventually became Nym, a Neuchtel, Switzerland-based crypto startup. Halprin founded Nym in 2018 to send data anonymously around the Internet using the same blockchain technology underlying Bitcoin. To date, Nym has raised some $8.5 million from a group of crypto investors including Binance, Polychain Capital and NGC Ventures. The firm now employs 10 people and is using its latest round of capital to double its team size.
Halpin was impressed by Mannings technical knowledge. More than just a famous leaker who happened to have access to secret documents, Manning struck Halpin as someone with a deep technological understanding of how governments and big business seek to spy on private messages.
Weve very rarely had access to people who really were inside the machine, who can explain what they believe the actual capabilities of these kinds of adversaries are, what kinds of attacks are more likely, says Halpin. Shell help us fix holes in our design.
Born in Oklahoma on December 17, 1987, Manning had her first exposure to network traffic analysis in high school. She and her Welsh mother Susan had moved to Haverfordwest, Wales in 2001, when Manning was 13. In a computer class there, in 2003, she first learned to circumvent blocks put in place by the school to prevent students downloading certain filesand got caught pirating music by Linkin Park, Jay-Z and others. The headmaster had been watching remotely.It was the first moment where it dawned on me, Oh, this is a thing. You can do this.
By 2008 Mannings interest in whats called network traffic analysis first brought her to The Onion Router (Tor), a volunteer network of computers that sits on top of the internet and helps hide a users identity. The non-profit organization leveraged something called onion routing which hides messages beneath layers of encryption. Each message is only decipherable by a different member of the network, which routes the message to the next router, ensuring only the sender and receiver can decipher it all. Ironically, the network colloquially known as the Dark Web, and used by Manning to send classified documents to WikiLeaks, was developed by the U.S. government to protect spies and other government agents operating online.
At around the same time Manning discovered Tor, she joined the U.S. Army. As a young intelligence analyst her job was to sort through classified databases in search of tactical patterns. After becoming disillusioned with what she learned about the fighting in Iraq and Afghanistan, she plugged into her computer, put in her headphones, and loaded a CD with music from another of her favorite musicians: Lady Gaga. Instead of listening to the album though, she erased it and downloaded what would eventually be known as the largest single leak in U.S. history, ranging from sensitive diplomatic cables to video showing U.S. soldiers killing civilians, including two Reuters journalists.
In prison she studied carpentry, but she never stopped exploring her earlier vocation. Im a certified carpenter, she says. But when I wasnt doing that, I would read a lot of cryptography papers. In 2016, she was visited in prison by Yan Zhu, a physicist from MIT who would later go on to become chief security officer of Brave, a privacy-protecting internet browser that pays users in cryptocurrency in exchange for agreeing to see ads.
She and Zhu were concerned with vulnerabilities they saw in Tor, including its dependence on the good will of governments and academic institutions. In 2020 53% of its $5 millionfundingcame from the US government and 27% came from other Western governments, tax-subsidized non-profits, foundations and companies. Worse, in their opinion, the technology to break privacy was being funded at a higher rate than the technology to protect it.
As the dark web, or Tor, and VPN, and all these other services became more prolific, the tools to do traffic analysis had dramatically improved, says Manning. And theres sort of been a cold war thats been going on between the Tor project developers, and a number of state actors and large internet service providers. In 2014 the FBI learned how to decipher Tor data. By 2020 a single user reportedly controlled enough Tor nodes to steal bitcoin transactions initiated over the network.
Using two lined pieces of composition paper from the prison commissary, Manning drew a schematic for Zhu of what she called, Tor Plus. Instead of just encrypting the data she proposed to inject the information equivalent of noise into network communications. In the margins of the document she even postulated that blockchain, the technology popularized by bitcoin, could play a role. In the notes below she wrote the words: New Hope.
Then, this February Halpin woke her up late one night with an encrypted text message asking her to take a look at a paper describing Nym. Developed completely separately from Mannings jailhouse sketch, the paper detailed an almost identical system disguising real messages with white noise. A hybrid of the decentralized Tor that relies on donor support, and a corporate owned VPN that requires trusting a company, this network promised the best of both worlds. Organized as a for-profit enterprise, Nym would pay people and organizations running the network in cryptocurrency. The next day I cleared my schedule, she says. By July shed signed a contract with Nym to run a security audit that could eventually include a closer look at the code, the math, and the defensive scenarios against government attacks.
Unlike Tor, which uses the onion router to obscure data sent on a shared network, Nym uses whats called a mix network, or mixnet, that not only shuffles the data, but alternates the methods by which the data is shuffled making it nearly impossible to reassemble.
Imagine you have a deck of cards, says Manning. Whats really unique here is that whats being done is that you are taking essentially a deck of cards, and you are taking a bunch of other decks of cards, and you are shuffling those decks of cards as well.
And, as it, turns out, not every government is comfortable using a privacy network largely funded by the U.S. government. Despite Halpins commitment to build a network that doesnt require government funding to operate, in July Nym accepteda 200,000 euro grant from the European Commission, to help get it off the ground.
Knowing that Wikileaks had become increasingly vulnerable to prying eyes from intelligence agencies and law enforcement, she sketched out a new way to hide internet traffic using blockchain, the technology behind bitcoin.
The problem is that there was never a financial model that made any sense to build this technology, says Halpin. There was no interest from users, venture capital, and big companies. And now youre seeing what we consider a once in a lifetime alignment of the stars, where theres interest in privacy from venture capital. Theres an interest in privacy for users. Theres interest in privacy from companies. And most of the interest from the venture capital side and the company side, and the user side has been driven by cryptocurrency. And this was not the case even five years ago.
Even Tor itself is exploring how to use blockchain to create the next generation of its software. After receiving 26% of its total donations in cryptocurrency last year, the Tor Project received a $670,000 grant from advocates of the zcash cryptocurrency and sold a non-fungible token (NFT) representing the first .onion address for $2 million in May, 2021. Now, Tors cofounder, Nick Mathewsonsays the Seattle-based non-profit is exploring some of the same techniques developed by cryptocurrency companies to create Tor credentials that let users develop a reputation without revealing their identity. What he calls an anonymous blacklistable credential.
If youve got a website, and somebody does something you dont like, you can ban them, says Mathewson. You can ban the person who did that activity without ever finding out what other activities they did or figuring out who you banned.
Though Mathewson is interested in the possibility of using blockchain to upgrade Tor itself, he warns that making privacy infrastructure for-profit could lead to more money being spent on marketing than product development. Our mission is to encourage the use of privacy technology, says Mathewson. I dont really care whether that privacy tool is the one I made or not.
Ironically, the same cryptocurrency culture Halpin says brought so much attention from investors, deterred Manning from getting involved earlier. Though she counts herself among the earliest bitcoin adopters, claiming to have mined cryptocurrency shortly after Satoshi Nakomoto activated it in 2009, she sold her bitcoin last year for decidedly non-monetary reasons.
I am not a fan of the culture around blockchain and cryptocurrency, she says. Theres a lot of large personalities that are very out there like your Elon Musks and whatnot, she says. And its very, like, Oh, were going to get rich off of blockchain. Its verynouveau riche. Like a new-yuppies-bro-culture thats surrounded it. It has gotten a little bit better in some corners. But I think that culture is what Im talking about. Its like Gordon Gekko, but blockchain.
By Michael del Castillo, Forbes Staff
Get the best of Forbes Africa sent straight to your inbox with breaking business news, insights and updates from experts across the continent.
Excerpt from:
Chelsea Manning Is Back, And Hacking Again, Only This Time For A Bitcoin-Based Privacy Startup - Forbes Africa
- Wikileaks: Pictures, Videos, Breaking News [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- WikiLeaks - Official Site [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- WikiLeaks diplomatic cable release shows America's undiplomatic side2432 - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- Anonymous WikiLeaks - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- Anonymous WikiLeaks - Video [Last Updated On: January 22nd, 2014] [Originally Added On: January 22nd, 2014]
- WikiLeaks, drought and Syria [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Wikileaks - Wikileaks [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- TPP Wikileaks Has Released Another Bombshell 17th JAN 2014 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Terabyte Leaks and Political Legitimacy in the U.S. and China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Secret draft of TPP talks on environment show little enforcement measures [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Noam Chomsky on Wikileaks (2013) - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Assange: Wikileaks - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Wikileaks Reveal Secret US Activity in Afghanistan3963 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Wikileaks UFO/USA and Rant - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- ‘Bad Grandpa,’ ‘The Fifth Estate,’ ‘Cloudy’ sequel, ‘Rush’ [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Sam Worthington's Gallipoli drama for the WikiLeaks era [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Film Review | The Fifth Estate [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Freedom Of The Press Foundation Launches To Support WikiLeaks, Increase Transparency - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- FABIO BORGES EXPLICA QUE O É O WIKILEAKS - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- FABIO BORGES FALA SOBRE O WIKILEAKS - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Douglas Murray and Amy Goodman - Wikileaks, Afghanistan, Arab Spring - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- The Fifth Estate [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cumberbatch Opens TIFF With WikiLeaks Drama974 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Julian Assange opens up on Indian Govt's reaction to WikiLeaks - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Reuter Journalisten Zivilisten werden von US Army ermordet Wikileaks - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- June 4 1989 Wikileaks US Cables - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- WikiLeaks: US trying to 'criminalize journalism' over Snowden leaks - Video [Last Updated On: February 7th, 2014] [Originally Added On: February 7th, 2014]
- Rumbatá Beat Band -- Wikileaks (Jaime Rodríguez) (Live @ Bimhuis - Amsterdam) - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Alex Gibney accepts the 2014 Paul Selvin Award for We Steal Secrets: The Story of WikiLeaks - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Security Graph 3D Visualization: WikiLeaks.org - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Russian UFO encounter wikileaks 2014 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- WikiLeaks [Last Updated On: February 16th, 2014] [Originally Added On: February 16th, 2014]
- WIKILEAKS UFO FOOTAGE THAT WAS BANNED. - Video [Last Updated On: February 17th, 2014] [Originally Added On: February 17th, 2014]
- Snowden files show how governments monitor Wikileaks and supporters [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Snowden files show governments monitor Wikileaks and others [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- WikiLeaks now has own search engine [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Spies monitored WikiLeaks visitors in real time, Snowden docs show [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Wikileaks - Soldati americani uccidono innocenti - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Visited WikiLeaks? NSA and GCHQ know about it [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- Julian Assange, Wikileaks and Site Visitors Targeted By NSA - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- Wikileaks on Lencho Leta (TOP Secret) - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- The Dalai Lama Treasure Chest: New Evidence from Wikileaks - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- BBC WikiLeaks The Secret Life of a Superpower Ep 1 - Video [Last Updated On: February 19th, 2014] [Originally Added On: February 19th, 2014]
- NSA Targeted WikiLeaks, Pressured Foreign Countries to Arrest Julian Assange for Publishing [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- Documents Reveal NSA and GCHQ Efforts to Destroy Assange And Track Wikileaks Supporters - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Glenn Greenwald On Surveillance Of Wikileaks - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- We Steal Secrets, la vérité sur Wikileaks - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- WikiLeaks spied on by the NSA and GCHQ - Truthloader - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Tech News Today 946: WikiLeaks Visitors Tracked - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- 'Paranoid, vain and jealous' - the secret life of WikiLeaks founder Julian Assange [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Wikileaks BBC Scandal, how I faked the winner of Chris Evans 500 Words Short Story Contest 2014 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- Julian Assange posed 'no real security threat' to Australia [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- Wikileaks Exposes 9 11 Conspirators - Video [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- [002] Nuclear Plant Whistleblower Fired / Banker Suicides / WikiLeaks Surveillance - Video [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- WikiLeaks Spied On By The NSA And GCHQ - Video [Last Updated On: February 23rd, 2014] [Originally Added On: February 23rd, 2014]
- wikileaks Drone footage 2013 - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- Wikileaks Reveals Saddam And Bush Negotiated Before Kuwait Invasion - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- More Snowden Leaks How The Government Reacted To Wikileaks - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- Amazing Wikileaks Video Of Roswell Grey Alien Unbelievable! - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- More Snowden Leaks: How The Government Reacted To Wikileaks - Video [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- 42 David Duke Wikileaks exposes Zionist Treachery - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Wikileaks Nibiru Planet X new evidence 2014 - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- WikiLeaks' Julian Assange Has Cost The Met Police £5.3m During Ecuador Embassy Stay [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- تطوانيون بإفران و النواحي - Video [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- 'This Week' Transcript: WikiLeaks' Julian Assange [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- WikiLeaks UFO Video Analyzed avi - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- WikiLeaks Cables Foreshadow Russian Instigation of Ukrainian Military Action [Last Updated On: March 2nd, 2014] [Originally Added On: March 2nd, 2014]
- Assange Held Back Wikileaks About U S , Israel - Video [Last Updated On: March 2nd, 2014] [Originally Added On: March 2nd, 2014]
- WikiLeaks Cables Reveal Ukraine's Past Cries For Help; Is Kerry's $1 Billion In Aid Too Late? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Flashback: WikiLeaks Cables Show Ukraine Worried About Russian Incursion in 2006 [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Wikileaks. Film dokumentalny - Video [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Assange: Is Obama wearing pants? [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- SXSW: Julian Assange Says Living in Ecuadorian Embassy Is 'Like Prison' [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- WikiLeaks founder has harsh words for Google, Facebook [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- 'WikiLeaks' Assange hints at more leaks [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- WikiLeaks' Julian Assange talks NSA, hints at more leaks [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- WikiLeaks' Julian Assange: NSA critics got lucky because agency had no PR strategy [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Wikileaks' Assange says group will release new secret data [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Afghan journalist Enayat Najafizada on the burden of releasing WikiLeaks documents - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- The Dalai Lama files from Wikileaks - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]