This is What a a Tor Supporter Looks Like: Susan Landau

by nickm | January 3, 2016

Susan Landau

“Communications metadata is remarkably revelatory. Just knowing what number you communicated with, when, and for how long can reveal whether you are having a flare-up of MS, seeking an abortion, or thinking about growing marijuana plants commercially. All of this comes from the numbers you call, and not what you say. It's why keeping communications metadata private is so important.

“Tor protects such data. It's not just journalists who need such privacy. It's human rights workers (that's why the State Department supports Tor), law-enforcement investigators checking out questionable sites, the businessperson collecting data to make decisions, the worker checking AIDS information or Alcoholics Anonymous over lunch hour on her private device but using her company's ISP. In a world of increasing surveillance, there's increasing need for Tor.

“I first began using Tor regularly in 2012 when I taught a freshman seminar in privacy. For one assignment I asked my students to try Tor and write a customer review. Tor was very clunky then. The fact that you couldn't simultaneously use Tor and the Firefox browser seriously diminished usability for me.

“Tor has much improved. The program runs faster, it is more secure, and there's greater functionality, including the ability to simultaneously use Tor and Firefox. I am delighted, but more is needed. We live in a world of pervasive surveillance, and Tor provides an essential service. Give generously and give often so that we can protect a modicum of private space in our increasingly public world. The privacy you protect may be your own.”

—Susan Landau

Support Tor Today!

Comments

Please note that the comment area below has been archived.

January 03, 2016

Permalink

@ Susan:

Thanks so much for all your work defending privacy!

@ all:

Much of my own thinking has been shaped by a book I recommend to others:

Privacy on the Line: the Politics of Wiretapping and Encryption
Whitfield Diffie and Susan Landau,
MIT Press, 1998

(The same Whitfield Diffie who co-invented the Diffie-Hellman public key encryption scheme.)

As many commentators have pointed out, the arguments from Cryptowars I remain relevant as Cryptowars II plays out.

January 05, 2016

Permalink

@ Susan and Nick:

Anyone fighting in the trenches of CryptoWar II will be intrigued by Glenn Greenwald's decision (apparently after talking to Matthew Green) to unredact a portion of a Snowden leaked document first published in Jun 2013 with a critical portion inked out at the insistence of NSA:

https://theintercept.com/2016/01/04/a-redaction-re-visited-nsa-targeted…
A Redaction Re-Visited: NSA Targeted “The Two Leading” Encryption Chips
Glenn Greenwald
4 Jan 2015

> Prior to publication of the story, the NSA vehemently argued that any reporting of any kind on this program would jeopardize national security by alerting terrorists to the fact that encryption products had been successfully compromised. After the stories were published, U.S. officials aggressively attacked the newspapers for endangering national security and helping terrorists with these revelations.
> ...
> The issue of this specific redaction was raised again by security researchers last month in the wake of news of a backdoor found on Juniper systems, followed by The Intercept’s reporting that the NSA and GCHQ had targeted Juniper. In light of that news, we examined the documents referenced by those 2013 articles with particular attention to that controversial redaction, and decided that it was warranted to un-redact that passage. It reads as follows:

John Young of Cryptome has been arguing for years that *all* the Snowden documents should be published in full, with *no* redactions. I understand by GG has not done that, but I also think all editorial decisions to redact portions should be frequently revisited and reversed as soon as new developments warrant such a step.

I'd love to hear from Edward Snowden, Micah Lee, Matthew Green, Bruce Schneier, Susan, Nick, etc, their thoughts on what additional light if any is shed on the NSA's covert encryption-crippling programs by the newly unredacted portion of the previously published document.

January 05, 2016

Permalink

@ Roger, Nick, Susan:

Nice application of Bayesian reasoning (paper behind a paywall, but the story gives the gist), highly relevant to anyone who generates GPG keys using Tails:

http://phys.org/news/2016-01-evidence-bad.html
Why too much evidence can be a bad thing
Lisa Zyga
4 Jan 2016

> The paradox of unanimity has many other applications beyond the legal arena. One important one that the researchers discuss in their paper is cryptography. Data is often encrypted by verifying that some gigantic number provided by an adversary is prime or composite. One way to do this is to repeat a probabilistic test called the Rabin-Miller test until the probability that it mistakes a composite as prime is extremely low: a probability of 2-128 is typically considered acceptable.
>
> The systemic failure that occurs in this situation is computer failure. Most people never consider the possibility that a stray cosmic ray may flip a bit that in turn causes the test to accept a composite number as a prime. After all, the probability for such an event occurring is extremely low, approximately 10-13 per month. But the important thing is that it's greater than 2-128, so even though the failure rate is so tiny, it dominates over the desired level of security. Consequently, the cryptographic protocol may appear to be more secure than it really is, since test results that appear to indicate a high level of security are actually much more likely to be indicative of computer failure. In order to truly achieve the desirable level of security, the researchers advise that these "hidden" errors must be reduced to as close to zero as possible.
>
> The paradox of unanimity may be counterintuitive, but the researchers explain that it makes sense once we have complete information at our disposal.
>
> "As with most 'paradoxes,' it is not that our intuition is necessarily bad, but that our intuition has been badly informed," Abbott said. "In these cases, we are surprised because we simply aren't generally aware that identification rates by witnesses are in fact so poor, and we aren't aware that bit error rates in computers are significant when it comes to cryptography."

January 05, 2016

Permalink

@ Nick:

I urge Tor Project to take every opportunity to help grow a privacy-enhancing technology industry. The Stanford crypto conference would be a great opportunity for some motivational discussions along these lines.

One type of badly needed consumer technological tool is a well-designed broadband EM scanner (hardware leveraging open source software defined radio software), capable of detecting such should-be-hard-to-miss events as

o someone operating a nearby IMSI catcher ("Stingray"),

o someone flooding your home/office with signals targeting a radar retro-reflector type bug (maybe in your ethernet cables),

o someone trying to jam WiFi communications to/from your IoT devices:

http://arstechnica.com/security/2016/01/comcast-security-flaw-could-hel…
Comcast security flaw could help burglars break into homes undetected
Comcast says industry-standard tech to blame, but will try to fix it.
Jon Brodkin
5 Jan 2016

> A security vendor says it discovered a flaw in Comcast's home security system that could let criminals break into houses undetected by using radio jamming equipment.
> ...
> If the attacker uses this equipment and breaks into a home monitored by Comcast's security system, the Comcast system will continue to report that all sensors are intact and that all doors are closed. No alarm will sound and homeowners won't get the real-time text and e-mail alerts they're supposed to receive when someone breaks into the home. "The amount of time it takes for the sensor to re-establish communications with the base station and correctly report it is in an open state can range from several minutes to up to three hours," Rapid7 wrote.

January 14, 2016

Permalink

http://arstechnica.com/tech-policy/2016/01/bill-aims-to-thwart-strong-c…
Bill aims to thwart strong crypto, demands smartphone makers be able to decrypt
NY assemblyman: "Terrorists will use these encrypted devices" to plan attacks.
Cyrus Farivar
14 Jan 2016

> A New York assemblyman has reintroduced a new bill that aims to essentially disable strong encryption on all smartphones sold in the Empire State.

Bruce Schneier just posted that he is hearing persistent rumors of "serious" bills to be introduced in the federal Congress which will explicitly mandate backdoors, despite opposition from sometimes unlikely figures such as former NSA/CIA director Michael Hayden.

Cryptome has posted the bill currently being considered by the NY State Assembly.

The bill to which Schneier was probably referring is being drafted by NSA proxy senators Dianne Feinstein and Richard Burr:

http://thehill.com/policy/cybersecurity/266354-lawmakers-set-to-introdu…
Lawmakers set to unveil bill for encryption commission
Cory Bennett
19 Jan 2016

> In the upper chamber, Sens. Richard Burr (R-N.C.) and Dianne Feinstein (D-Calif.) — the top two members, respectively, of the Intelligence Committee — are working on their own encryption bill. The Burr-Feinstein legislation would force companies to build their encryption so they could respond to a court order for secured data.

Another NSA proxy, Sen. McCaul, has already introduced a bill which would establish an Encryption Commission, envisioned as a short-term blue ribbon panel which will tell the Senate how to come up with a workable solution. McCaul seems to accept that the people who actually make the technology all keep telling Congress that unicorns do not exist, however much Feinstein/Burr might wish), but in recent months we have seen so many dragnet surveillance bills disguised as something beneficial that US privacy advocates need to be very suspicious. But McCaul may have opened a door for Shari or Roger to try to get a seat on the proposed commission:

> The panel would include tech industry leaders, privacy advocates, academics, law enforcement officials and members of the intelligence community.

The article contains a very significant Freudian slip (by McCaul, not the reporter?):

> Apple recently said it could not comply with such a request because even Apple itself cannot access encrypted data on its devices. Technologists insist companies must be locked out of their own secured data to ensure that everyday digital activities are protected.

Evidently these senators don't think US citizens can be allowed to own their own d-mn data. According to them, the software developer or hardware maker owns our data. This once again shows how very badly Americans need a privacy amendment in the US Constitution.

January 20, 2016

Permalink

@ Susan Landau:

I think you would be very well qualified to sit on the Encryption Commission which has been proposed in the US Senate, and I hope you get an invite:

http://thehill.com/policy/cybersecurity/266354-lawmakers-set-to-introdu…
Lawmakers set to unveil bill for encryption commission
Cory Bennett
19 Jan 2016

I hope Roger/Shari are invited to testify before this Commission.

Concerning the dubious intentions of Sen. McCaul, it would be a huge red flag if the Commission does not include respected privacy advocates, but only NSA proxies.

February 02, 2016

Permalink

Many thanks to Susan Landau, Bruce Scheier, and the other authors of a major new whitepaper arguing against encryption backdoors:

https://cryptome.org/2016/02/dont-panic.pdf
Don’t Panic
Making Progress on the “Going Dark” Debate
February 1, 2016

See also

http://arstechnica.com/tech-policy/2016/02/feds-dont-need-crypto-backdo…
Feds don’t need crypto backdoors to spy—your TV and toothbrush will do
Internet of Things opens government access to real-time, recorded communications.
David Kravets
1 Feb 2016

> The so-called "going dark" problem—which various government officials claim will be the death knell to the US because Silicon Valley won't bake crypto backdoors into its wares—is greatly overblown. That's because crime fighters are not in the dark, at least technologically, and are now presented with a vast array of spy tools at their disposal. Specifically, modern espionage is piggybacking on the Internet of Things (IoT) tools, from televisions to toasters, that enable wanton spying.