Pune, India dgplug Meetup: Learn about Privacy, Tor, and FOSS

by kushal | March 26, 2018

 

The Linux Users’ Group of Durgapur is starting a new monthly meetup in Pune, India. The focus of this meetup is about privacy and Free and Open Source Software (FOSS) communities.

The first meetup will happen on 28th March, 2018, from 6PM, in the Cafe Coffee Day shop in Magarpatta City, Pune. The evening will start with a brief introduction of the participants (if they want to introduce themselves). We have the following topics in mind:

  • Threat modeling 101.
  • Passphrases everywhere.
  • Installation and usage of Tor Browser on laptops and mobile phones.
  • How to use your Tor Browser in an efficent way?
  • How can one run a Tor relay?
  • Secure messaging

As this is our initial meetup, we will be focusing more on helping out any new users with Tor. So if you have questions about Tor or want to get started, please join us. We also want to have a discussion about security practices people follow on the internet and in daily life.

Rather than have formal talks, our goal is to share knowledge among ourselves and make sure that we all can learn something from each other.

There is no admission fee nor RSVP required for this event. Please bring your own mobile Internet connection as we don't have any other network available at the venue.

28th March, 2018 @ 18:00 IST
Cafe Coffee Day, 1st Floor Yummy Tummy
Magarpatta City

Join the dgplug mailing list to learn about the upcoming events and discussions.

Comments

Please note that the comment area below has been archived.

March 26, 2018

Permalink

Really good to see Tor Project is working to help people in India use privacy/security/anonymity-enhancing tools effectively.

We haven't heard much about Tor Messenger lately, but as it happens, EFF is just starting a series on SMS privacy concerns:

eff.org
Secure Messaging? More Like A Secure Mess.
Nate Cardozo, Gennie Gebhart, and Erica Portnoy
26 Mar 2018

Facebook scraped call, text message data for years from Android phones [Updated]
Maybe check your data archive to see if Facebook’s algorithms know who you called.
Sean Gallagher
24 Mar 2018

slate.com
Facebook Acknowledges It Has Been Keeping Records of Android Users’ Calls and Texts
Molly Olmstead
26 Mar 2018

> On the same day that the state of Illinois sued Facebook over its alleged misuse of data that allowed Cambridge Analytica to download information on more than 50 million users, Facebook confirmed that it had been collecting and storing call logs and text message metadata for millions of Android users. Last week, one user who downloaded his data to learn what Facebook knew about him in the aftermath of the Cambridge Analytica scandal found that the company had a record of the date, time, duration, and recipient of calls he had made from the past few years.

arstechnica.com
Feds pushing new plan for encrypted mobile device unlocks via court order
"Weakening security makes no sense," top Apple VP tells Ars.
FBI again calls for magical solution to break into encrypted phones
Cyrus Farivar
26 Mar 2018

> a team that includes former Microsoft Chief Software Architect and CTO Ray Ozzie is helping outline a system that would provide police with access to an encrypted device under certain circumstances.

No warrant needed, naturally.

> The scheme would not attempt to access messages scrambled in transit (like those produced by Signal or WhatsApp) or encrypted cloud-based storage (like iCloud or SpiderOak). According to the Times, when a device is encrypted, this proposed system would "generate a special access key that could unlock their data without the owner’s passcode. This electronic key would be stored on the device itself, inside part of its hard drive that would be separately encrypted—so that only the manufacturer, in response to a court order, could open it."
> ...
> Apple Senior Vice President for Software Engineering Craig Federighi [stated] "Proposals that involve giving the keys to customers’ device data to anyone but the customer inject new and dangerous weaknesses into product security. Weakening security makes no sense when you consider that customers rely on our products to keep their personal information safe, run their businesses, or even manage vital infrastructure like power grids and transportation systems. Ultimately protecting someone else’s data protects all of us so we need to move away from the false premise that privacy comes at the cost of security when in truth, it’s a question of security versus security."
>
> Several lawyers and computer scientists reiterated to Ars that creating such a system and compelling companies to implement it could potentially be fraught with numerous problems, both legal and technical. "A hardware-based backdoor would shift the burden onto smartphone users to go through extra inconvenience in order to secure their information," Stanford University legal fellow Riana Pfefferkorn told Ars by email. Pfefferkorn recently wrote a paper on the subject.

Speaking of Public Enemy Number Two (FBI), the revelations keep coming:

https://theintercept.com/2018/03/26/omar-mateen-father-fbi-noor-salman-…
The Father of Pulse Attacker Omar Mateen Was an FBI Informant. Did He Convince the Bureau to Stop Investigating His Son?
Trevor Aaronson
26 Mar 2018

> ...
> After the shooting, then-FBI Director James Comey said federal agents would examine their failures to stop Mateen before he attacked “in an open and honest way and be transparent about it.” The FBI has not disclosed what came of the examination. When The Intercept inquired about it one year after the attack, the FBI answered: “We have no comment.” A motion filed on Sunday may help explain the FBI’s lack of transparency. In it, lawyers for Mateen’s widow, Noor Salman, who is charged with material support and obstruction of justice in connection with the Pulse attack, say Mateen’s father, Seddique Mateen, worked as an FBI informant for 11 years, up to June 2016, when Mateen attacked the nightclub. The prosecution knew this but sought to hide it, Salman’s lawyers say.

No doubt FBI would like to tweet "fake news" but since this is all happening in open court, they will have a hard time convincing anyone that it is (as someone likes to say) "fake, fake, all lies".

Lest anyone forget, one of the more intriguing revelations after the 9/11 attacks was that a major Al Qaeda figure was yet another paid FBI informant. This embarrassing revelation did not cause FBI to scale back its system of neighborhood informants, however--- the agency has continued to greatly expand its informant network. It is not yet clear how close they have yet come to the record set by the Stasi, which turned at least one in every people in the former East Germany into an informant. In both East Germany and the USA, informants denounced their own relatives, although in the Mateen case, it seems that DOJ charged the wife with prior knowledge despite mounds of evidence she knew nothing--- the investigators should have been investigating FBI and the FBI informant at the heart the case all along. But of course, FBI never investigates itself.

But people do forget. Too bad, because this is what allows history to virtually repeat itself:

politico.com
The University That Launched a CIA Front Operation in Vietnam
How the friendship between a Vietnamese politician and an American academic led Michigan State University into a vast experiment in nation-building and pulled America deeper into war.
Eric Scigliano
25 Mar 2018

> A little over 50 years ago, another national scandal overtook Michigan State University, an academic and political cause célèbre that seemed to leave the school indelibly associated with—even, in some quarters, blamed for—nothing less than America’s war in Vietnam. Today the fateful exercise in nation-building and government-and-gown cooperation known as the Michigan State University Advisory Group rates but a footnote in popular histories of the war, if that. Ken Burns’ and Lynn Novick’s recent 18-hour documentary series The Vietnam War does not mention it at all.

Showing the dangers of relying on corporate sponsorship.

I hope readers of this blog will donate to Tor Project and help out in other ways, and that eventually TP will have a firmly established funding from user donations (like EFF and ACLU) and perhaps a no-strings endowment (like Southern Poverty Law Center).