Introducing JackPair – A New Hardware Tool to Encrypt Cellphone Conversations

Screen Shot 2014-09-05 at 3.07.22 PMWell, I’m not actually introducing JackPair at all. The creators of the device have had their project on Kickstarter for quite some time now, but it just passed its funding goal today (it had a $35,000 goal and has already raised close to $45,000 as of publication). Congrats guys!

While encryption between cell phones is already available via apps you can download, there are several reasons I have decided to highlight the project. First, I tend to focus quite a bit on all the things going wrong in the world, so when something comes across my screen that is encouraging and should be supported, I try to mention it. Second, I was really inspired by the description of the project, which contained an added personal touch by the creator when he describes growing up in authoritarian Taiwan. Third, while there appear to be other methods to achieve similar goals, this could serve as user friendly option for the non tech savvy amongst us. Finally, security guru Bruce Schneier seems to be impressed by the device.

Read more

Like this post?
Donate bitcoins: 35DBUbbAQHTqbDaAc5mAaN6BqwA2AxuE7G


Follow me on Twitter.

War on Encryption: Highlighting Two Crucial Articles on the Latest NSA Revelations

While most of the media, including the alternative media, has been focused primarily on our psychopathic leaders’ attempt to drag us into a Syrian civil war alongside al-Qaeda, some really crucial new information has been released about the NSA from the Snowden documents.

Specifically, we now know the lengths to which the NSA has fought to make encryption useless. Disturbingly, there was a debate about all of this in the 1990’s. Back then the NSA, with the help of the Clinton administration, attempted to install a backdoor into all encryption called a “Clipper Chip.” This was shot down, but the NSA went ahead and did it covertly anyway. This is the type of total unconstitutional slime we are dealing with.

The most absurd part of the recent revelations is the realization that the NSA isn’t actually cracking most of the encryption due to smarts or math, but rather by coercing major technology companies to allow them unfettered access. Part of this coercion unsurprisingly revolves around generous monetary payoffs to “grease the surveillance wheels” courtesy of a hefty Black Budget.

The first highlighted article is from yesterday’s New York Times. The information is so devastating to the already battered reputation of the criminal NSA that according to the paper:

Intelligence officials asked The Times and ProPublica not to publish this article, saying it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful privacy tools.

Some key excepts below:

Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.

Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth.

The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.

Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip.

“And they went and did it anyway, without telling anyone,” Mr. Kocher said. He said he understood the agency’s mission but was concerned about the danger of allowing it unbridled access to private information.

Intelligence officials asked The Times and ProPublica not to publish this article, saying it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful privacy tools.

The full extent of the N.S.A.’s decoding capabilities is known only to a limited group of top analysts from the so-called Five Eyes: the N.S.A. and its counterparts in Britain, Canada, Australia and New Zealand. Only they are cleared for the Bullrun program, the successor to one called Manassas — both names of an American Civil War battle. A parallel GCHQ counterencryption program is called Edgehill, named for the first battle of the English Civil War of the 17th century.

Think about the fact that they named these programs after Civil War battles. What does that tell us about how they view “the people” in relation to government?

Read more

Like this post?
Donate bitcoins: 35DBUbbAQHTqbDaAc5mAaN6BqwA2AxuE7G


Follow me on Twitter.

Tor Usage Doubles Globally in the Wake of Snowden Revelations

I recently mentioned Tor in my article highlighting The Silk Road, the online illegal substances marketplace that you must run Tor to access and where the only currency accepted is Bitcoin. As we have seen with statistics showing tremendous growth in alternative search engines, technology users worldwide have indeed adjusted their habits in the wake of Edward Snowden’s NSA revelations. We now learn from the Daily Dot that:

Edward Snowden’s revelations about National Security Agency data monitoring sent Internet users scrambling for ways to regain their privacy.

Since Snowden came forward with details about the NSA’s PRISM program in June, the number of global Tor users has doubled. Tor is a open source network by which users obscure their online activity by navigating a network of computer relays. In the U.S., the number of users has grown by more than 75 percent.

Tor1

Tor2

Graphs via metrics.torproject.org

Maybe that’s why Americans, far and away, lead the rates of average daily usage. Americans account for 17.54 percent of daily Tor traffic—the only nation to account for more than 10 percent.

Read more

Like this post?
Donate bitcoins: 35DBUbbAQHTqbDaAc5mAaN6BqwA2AxuE7G


Follow me on Twitter.

Introducing Strongbox: Aaron Swartz’s Last Project

I remain haunted by the death of Aaron Swartz.  In fact, his passing is still one of the first things I mention to people when I want to provide an example of how out of control and drunk on power the government is.  The incredible accomplishments he achieved in his short life are nothing short of extraordinary, and the fact the feds mercilessly attacked him and drove him to suicide epitomizes the unfortunate rapid decline of our culture and civilization. Amazingly, Aaron continues to bless the world with gifts from his brilliant mind even after his passing.  In this case I am referring to Strongbox, an encrypted and more secure way of providing information to journalists.  It was a project Aaron was working on with Kevin Poulsen before his death and was launched by the New Yorker a few days ago.  From Techdirt:

The New Yorker has announced a new anonymous document sharing system called Strongbox, that will allow people to anonymously and securely submit documents to reporters from the New Yorker. Other publications have tried to set up something like this — often inspired by Wikileaks — but for the most part, they’ve been full of security holes, sometimes big and serious ones. What may be more interesting than the fact that this system is being set up is the story behind it. It’s based on DeadDrop, an open source system that was put together by Aaron Swartz and Kevin Poulsen. 

Read more

Like this post?
Donate bitcoins: 35DBUbbAQHTqbDaAc5mAaN6BqwA2AxuE7G


Follow me on Twitter.