NSA: Please Turn off the Lights When You Leave. Nothing to See Here.

Linux Advocate Dietrich Schmitz shows how the general public can take action to truly protect their privacy using GnuPG with Evolution email. Read the details.

Mailvelope for Chrome: PGP Encrypted Email Made Easy

Linux Advocate Dietrich Schmitz officially endorses what he deems is a truly secure, easy to use PGP email encryption program. Read the details.

Step off Microsoft's License Treadmill to FOSS Linux

Linux Advocate Dietrich Schmitz reminds CIOs that XP Desktops destined for MS end of life support can be reprovisioned with FOSS Linux to run like brand new. Read how.

Bitcoin is NOT Money -- it's a Commodity

Linux Advocate shares news that the U.S. Treasury will treat Bitcoin as a Commodity 'Investment'. Read the details.

Google Drive Gets a Failing Grade on Privacy Protection

Linux Advocate Dietrich Schmitz puts out a public service privacy warning. Google Drive gets a failing grade on protecting your privacy.

Email: A Fundamentally Broken System

Email needs an overhaul. Privacy must be integrated.

Opinion

Cookie Cutter Distros Don't Cut It

Opinion

The 'Linux Inside' Stigma - It's real and it's a problem.

U.S. Patent and Trademark Office Turn a Deaf Ear

Linux Advocate Dietrich Schmitz reminds readers of a long ago failed petition by Mathematician Prof. Donald Knuth for stopping issuance of Software Patents.

Showing posts with label NSA. Show all posts
Showing posts with label NSA. Show all posts

Friday, September 5, 2014

RetroShare: An Essential Privacy Tool Introduction

RetroShare shown running on my Fedora 20 LXDE Desktop


Maybe you feel defeated?  You have that sense of helplessness?

Yout think, "Don't fight it.  We can't win against them.  There is no privacy on the Internet."


Give up?

No.  Don't give up.  Fight back.  There is an easy tool, now, today, at your disposal, which as far as I am concerned is not difficult to install and immediately use that will assure 100% privacy on the Internet.

What tool?  It's shown above running on my desktop.  It's called RetroShare.

You see, the NSA is perfectly happy you use Google's tools, including Drive, Gmail.  They are clear text and there's no difficutly in their getting to that repository if they choose to do so.

On the other hand, the NSA is not happy about tools like RetroShare.  So much so, in fact, they cannot invade your privacy space on Retroshare.  They cannot penetrate the encryption.  Enjoy privacy on your own terms with RetroShare.

RetroShare is a mature product in continual refinement since 2006.  The feature set is robust.  To learn more, check out their wiki, FAQ, and screenshots.

So, go ahead and try RetroShare.  If you get on-line, give me a shout.  I'm here.

RetroShare is open source and free.  Download here.


Watch my screencast: RetroShare: An Essential Privacy Tool



-- Dietrich

Wednesday, May 14, 2014

Edward Snowden Email GPG Encryption Tutorial

English: from http://logo-contest.gnupg.org/su...
English: from http://logo-contest.gnupg.org/subm-6.html, copyright info see http://gnupg.org/misc/logo-contest.en.html (Photo credit: Wikipedia)
by Dietrich Schmitz

Folks, I've been on a privacy jag for over a year now since whistle blower Edward Snowden broke the story of how the NSA monitor everybody's electronic communications (PRISM).

It is understandable that many have been reluctant to start using email encryption.  But there is no risk and if done with strong encryption such as free open source Gnu Privacy Guard (GPG), you can be assured that only your intended recipient will be able to open and read your mail.

So, with that, today I am bringing to your attention a youtube video put up by none other than Edward Snowden himself wherein he provides a step-by-step tutorial of how to encrypt your email with a Windows version of GPG encryption, called GPG4Win.

So, even if you aren't a Windows user per se, you can watch to get a feel for the steps required to set up your public/private key pair and publishing to a key server and how to import a public key from one of your email contacts who has set up encrypted email also.

I use Fedora 20 LXDE with Evolution and GPG.  Once you've created the keys, you don't have to repeat the same process.  It is a 'one-time' affair and then creating and sending email is done with the existing GPG keys in place.

It's not hard after you've done it a few times.  Trust me.  It will make sense.

Here's Edward Snowden's youtube tutorial.  Enjoy!  -- Dietrich



Enhanced by Zemanta

Thursday, April 3, 2014

NSA: Please Turn the Lights off When You Leave. Nothing to See Here.

by Dietrich Schmitz


It's all out in the open now. The NSA can 'cherry pick' your private and personal Internet meta data whenever they wish. Right?

Wrong. They cannot.

That is, of course, provided you, the general public, place obstacles in their way which will impede, or, better yet, stop them entirely from peering into your private affairs.

Yes, that's right. You have tools at your disposal which will most assuredly put the kibosh on the NSA. Stop them cold in their tracks. They'll come, discover they can't see anything, and leave.

What is it that will stop them from seeing your private data?:

Gnu Privacy Guard (GnuPG) or, just GPG for short.


Free and Gnu Public Licensed GnuPG is a form of strong encryption which has been deemed by experts, including whistle blower Edward Snowden, as effective in keeping your data from being snooped upon.

I recommend to Linux users free Gnu Public Licensed Evolution email for both personal and business needs. (Image left, Edward Snowden, credit: Flickr user DonkeyHotey)






Evolution email running on my Fedora 20 LXDE Desktop


Evolution is feature-complete, mature (that means stable), and supports GnuPG (OpenPGP) encryption formatted email.

Use it once or twice and I am confident you'll get the hang of it.  It will even use your existing Gmail or other email account with secure TLS POP3/IMAP connectivity.

And, for those eager to install Evolution, here is a good tutorial to get you up to speed quickly.

Need to wrap your mind around GPG? Read more about it here.


Just to give you a visual of what an Evolution created gpg-encrypted gmail looks like 'after the fact' from Gmail's web view -- there's truly nothing to see -- this is what the Google staff and NSA would find:

Evolution GPG-protected email stored on Gmail.  Nothing to see.


And, as always, if you have questions or need help, do not hesitate to contact me.

So, NSA? Please turn off the lights when you leave. Nothing to see here.  Thanks!

-- Dietrich

Enhanced by Zemanta

Thursday, March 27, 2014

Mailvelope for Chrome: PGP Encrypted Email Truly Made Easy

by Dietrich Schmitz



I've spent considerable time researching the question: Is there an easy to use software that will let you email using PGP encryption?

The answer after several days looking, I am happy to report is 'YES'!

The software is an extension for Google Chrome called Mailvelope.

Watch the below video to help you to configure and use Mailvelope.




I am endorsing Mailvelope as the 'easiest' software, 'to date', and can assure you that if you create your PGP with a minimum of 2048-bit key length, the NSA will never be able to read your email. NEVER.

Please take control of your email privacy with Mailvelope.

Questions, concerns, do not hesitate to contact me.

Be well. Be safe. -- Dietrich


Enhanced by Zemanta

Wednesday, November 6, 2013

Google: You've Been Owned. Fix Your F'ing Security

by Dietrich Schmitz


Theatrics.  That's all it is.  We see blustering, cries of 'outrage' by Eric Schmidt in a public reaction of 'surprise' to the fact that the NSA penetrated their firewall and set up camp reading any and all of their 'clear text' data files with impunity.

This same company, prides itself on selling Chromebooks with an unblemished record at Pwnium 2013 of no successful hack which resulted in fully owning the ChromeOS operating system.

How is it that so much effort can be put forth to develop ChromiumOS with a sincere intent to make security a prime order of concern yet Google's data centers store data in clear text?

This isn't being discussed in any of the media stories.

The real 'top dog' priority for Google is advertising revenue.  And, they know full well that if they encrypted the public's data they could no longer parse it to exploit, mine, for advertising purposes and that would put a major choke hold on a part of their revenue stream they so cherish.

The public's trust, good faith, and right to privacy takes a 'back seat' to Google's penchant for profit.  Google is colliding directly with 'Do No Evil' as they continue to change their ways with a clear intent to take major portions of their technology base proprietary

That is the bottom line and there is no clear indication from them policy-wise, one way or another, as to what they plan to do at this point, if at all, other than public 'feel good' talk and expletives from Google Engineers seen in today's news.

Google.  You've been owned real bad and at the Public's expense.  It's time for you to fix your F'ing security.  I think you just might have screwed the pooch this time.

-- Dietrich
Enhanced by Zemanta

Thursday, October 31, 2013

Tyranny Will Gain a Foothold if People of Good Conscience Remain Silent

by Dietrich Schmitz

A good Friend, +Yie-Ming Chen wrote in a Google Plus post of mine today:

"All tyranny needs to gain a foothold is for people of good conscience to remain silent." - Edmund Burke 
Tyranny is at our door knocking.  Today's news included a story in the Washington Post NSA Infiltrates links to Google, Yahoo, worldwide, Snowden documents say(Image credit: Washington Post)

Another revelation has been made that the NSA have been camping out on the inside of the Google cloud firewall, cherry picking data -- yours -- like taking candy from a baby -- the method for how the NSA exploit to break through the front-end SSL server is documented in slides like the one shown above.

Sadly, the data fest has been going on for quite some time and Google and Yahoo officially disclaim any knowledge that such activities have been occurring.

It's too bad because the entire cloud behind the firewall has been 'clear text' as shown in the above slide, which means your data isn't encrypted and directly human readable.

Why hasn't Google taken steps to protect your Drive data with encryption?

The truth of the matter is: MONEY

Advertising revenue is obtained by parsing your documents and positioning adverts in the gutter margins as users of Google services like Drive and Gmail go about their daily business.  If Google were to encrypt your data, then they could not read it and run adverts any more.   

It is outrageous that Google chose not to take action because of this and I would suspect the same pertains for Yahoo.

This is a major error of negligence and abrogation of responsibility on the part of Google to protect the public's right to privacy.

The technology has been available right along which is now routinely used by other cloud services like SpiderOak, Wuala, and Kim Dot Com's Mega to encrypt the entire data stream of data space in the cloud.  It's not difficult to implement and even SpiderOak have now offered their own software framework, Crypton.io, for Developers to implement Zero-Knowledge Encryption (ZKE) at any Cloud ISP.

This is no longer an option.  ZKE should be considered a mandate and, as such, consumers and businesses should insist upon having it or boycott using the respective Cloud ISP's services.  If we all insist on it, we will have power in numbers and can have an effect on the outcome hopefully in a positive way.

The benefit to the user of rented Cloud data space employing ZKE is that all data stored in the Cloud is first encrypted locally (in the memory space of the user's PC) and a private key is maintained locally by the user not physically present on the Cloud data drive.  This makes the data on the Cloud transparent and as such the ISP will have Zero Knowledge of what is being stored other than an encrypted byte stream written to a block level drive.

With ZKE for a third party to request access would then require their serving the owner of said data with a warrant before viewing the personal and privately protected information.  Good citizens presented with a warrant will comply and unlock their data if the warrant is justified by a Court Judge as having 'probable cause' for issuance.  That has always been historically the case up to 9/11 but with the Patriot Act, the erosion of the U.S. Constitution was begun.

Today, some twelve years hence, the degree to which the law has been disregarded is allowing unobstructed intrusion into all corners of our private electronic communications.

I am drawing the line here.  Google must take steps immediately to adopt ZKE for all of their media storage used by consumers and businesses or I will no longer support and use any of their services whatsoever.

They have two weeks to come up with a clear public plan to protect the public's data from unwarranted access or I will end it.  Boycott Google Cloud services if they fail to act.

 -- Dietrich 
Enhanced by Zemanta

Feeling Paranoid? Take Your Meds: RetroShare

by Dietrich Schmitz
(Originally published: August 12, 2013)

Feeling paranoid? Take your meds: RetroShare

It's therapeudic!

RetroShare is not circumventable by the NSA or any other agency.

Enjoy fool-proof privacy-assured communication with your dear and closest Friends and Family, including chat, audio/video calls, spamless-email and file sharing.



RetroShare is a peer-to-peer encrypted, decentralized (cannot be taken down like MegaUpload) system where you choose only those you deem to be 'known' friends with whom to explicitly share your Friend-to-Friend (F2F) RSA 2048-bit encryption key.

The NSA 'hate' RetroShare. It's open source and free and replicated on mirror servers around the globe so agencies cannot block its use by the general public who wish to maintain their 'right to privacy'.

Versions are available for Windows, Mac, Linux, and BSD Unix.

Privacy. It's your right. Own it with RetroShare.

Website link:

http://retroshare.sourceforge.net/

Be safe. -- Dietrich
Enhanced by Zemanta

Sunday, September 15, 2013

Is NIST History?

by Dietrich Schmitz


In my last story, Is OpenSSL's Cryptography Broken?, I reported the ongoing developments surrounding a suspect security problem with the implementation of openssl.

The story, unfortunately, continues to unfold with suspicion now turning to confirmation in a NY Times report that the NSA inserted altered random number generator code into the Dual Eliptic Curve Deterministic Random Bit Generator so as to predict private key encoding and provide a 'backdoor' entry point mechanism.  (Image credit: fearlessmen.com)

Despite strong denials coming from the National Institute of Standards and Technology (NIST) who oversaw the development of the Eliptic Curve Cryptography (ECC) standard, many now are left having a strong distrust of the agency.  From a The Register story NIST publicly responded:
The US National Institute of Standards and Technology (NIST) has vehemently denied accusations that it deliberately weakened encryption standards to help the NSA's monitoring activities.
"We want to assure the IT cybersecurity community that the transparent, public process used to rigorously vet our standards is still in place," said NIST in a statement.
"NIST would not deliberately weaken a cryptographic standard. We will continue in our mission to work with the cryptographic community to create the strongest possible encryption standards for the U.S. government and industry at large."
The statement from NIST said that working with the NSA was 'standard operating procedure' and required by law.  In an attempt to throw a 'wet blanket' on the bonfire, NIST has reopened the standard for public comment.

Regardless, one outspoken Developer, Bruce Schnierer, said in a podcast:
NIST took a big credibility hit unfortunately. There are good people there doing good work but we don't know which of their standards are tainted, we don't know how much collaboration there is with the NSA. 
And unfortunately because trust is lost when they get up and say the NSA doesn't affect our standards we don't believe them. We need a way to get back trust.
In other news the IETF offered up a 'fool-proof' plan to PRISM-proof the Internet.

What is the take-away?


Cryptography standards have all now been put into question in addition to the public relations disaster that confronts NIST.

Whether or not NIST will recover remains to be seen as it is quite likely that all cryptography standards will require rigorous audits.

In the meantime, the prevailing perception is that many cryptographic standards have been compromised and privacy is not assured by virtue of their use on the Internet.  As such, it will take a significant amount of time to pragmatically review each standard and thoroughly vet code before a level of confidence in these needed privacy measures will be restored.

And, the question of whether or not trust should be placed in agencies such as NIST is now the main focus and primary concern.  Is NIST history?  Only time will tell.

-- Dietrich


Enhanced by Zemanta

Tuesday, September 10, 2013

Is OpenSSL's Cryptography Broken?

by Dietrich Schmitz

Last month, in early August, a colleague Friend of mine, +Scott Doty contacted me.  He expressed his concern regarding Red Hat's implementation of OpenSSL.

The issue brought to my attention by Scott concerns a specific bugzilla ticket which was opened in 2007 and has never been addressed.

I offered Scott to reach out to Red Hat's public relations the same day he contacted me.  The answer returned the following day was essentially a 'no comment' and that I should refer to the comments section on the ticket -- deemed to be 'self-explanatory'.  If you take the time to review the ticket, you'll see where Scott appended his own comments in the August time frame toward the bottom.  It's fairly long.

Red Hat had absolutely no intention of fixing the bug, specifically, regarding the treatment of the Elliptic Curve Cryptography implementation in OpenSSL, and according to the comments on the ticket they felt ECC was patent encumbered.

Yet, in other sources on the Internet, one can find reference to a 'work-around' which would avoid any IP infringement issues.  Quoting from Wikipedia.org's ECC page:

"...However, according to RSA Laboratories, "in all of these cases, it is the implementation technique that is patented, not the prime or representation, and there are alternative, compatible implementation techniques that are not covered by the patents."[3] Additionally,Daniel J. Bernstein has stated that he is "not aware of" patents that cover the Curve25519 elliptic curve Diffie–Hellman algorithm or its implementation.[4] RFC 6090, published in February 2011, documents ECC techniques, some of which were published so long ago that even if they were patented any such patents for these previously published techniques would now be expired...."

Alright, so it struck Scott as being odd that such a bug was laying around collecting dust, and I agreed.

In the meantime, we have seen a series of news releases with Snowden giving out new information.  One of the claims has been that the capability of NSA to penetrate presumed to be secure cryptography standards has become much improved to such an extent that they are now collecting information flowing over SSL with impunity and have broken a few other cryptographic standards, purportedly.  I say this only because it's Snowden's word vs. the NSA and the NSA is completely 'mum' on the topic.

The sensational news story "Report: NSA Can Break Internet Encryption"arrived last week and created quite a stir.  The title is a carefully crafted wording.  Naturally, it is quite an unsettling thought to have all presumed Internet security breached, but the story's author hedged a bit at the end of his story saying:
"...Despite the NSA's ability to crack web encryption with these means, Wired's Kim Zetter notes that "these methods don’t involve cracking the algorithms and the math underlying the encryption, but rather rely upon circumventing and otherwise undermining encryption." 
And Snowden himself said during a Q&A with The Guardian in June that cryptography works. 
"Properly implemented strong crypto systems are one of the few things that you can rely on," he said...."
Now, the distinction to be made ties into the title of the story -- namely that, provided that an 'implementation' of strong cryptography coded 'properly' with no side-effect bugs cannot be hacked.

Put another way, bug-laden cryptography can result in weakening of the underlying cipher's strength and so can potentially be cracked.

This would seem to suggest that the NSA have found defects in various cryptographic standards, or, by whatever means, have introduced themselves intentionally crafted bugs in such a way to induce such weakening, thereby achieving their end-goal to crack encryption methodologies.

This led me to think more about OpenSSL and that languishing buzilla ticket.  Just yesterday, I had an exchange with +Jan Wildeboer to whom I regularly communicate, usually on Google Plus.  I broached the matter of the Red Hat OpenSSL bugzilla ECC ticket with him and curiously enough, today, he cc'd me with this Google Plus post (thank you Jan):





Mike Hearn

Shared publicly  -  10:29 AM
A few days ago Bruce Schneier, who has reviewed the leaked Snowden documents, warned against the use of elliptic curve cryptography on the grounds that it requires users to agree on curve parameters and he no longer trusts the parameters to not have back doors. Specifically he's talking about the NIST curves. NIST is a US organisation that was previously widely respected and considered trustworthy.

However, his warning seemed to be based more on general conservatism than any specific intelligence cleaned from the leaked documents. We know the NSA has tried to subvert the standards setting process and we know they may have advanced mathematical attacks that the public doesn't know about. ECC requires various constants to be agreed on globally for an instantiation to be used. Hence, the concern.

But that isn't specific evidence. Unfortunately, today I  learned (via Gregory Maxwell) that the process for selecting the "random" curve parameters appears on the surface to be completely implausible. The parameters are the output of SHA1, which should be good if the seed was selected in a reproducible manner. But they were not. The seeds are extremely large constants with no explanations of where they came from. That smells very strongly of something that might be hacked.

It gets better. It turns out that these constants are not only unexplainable but were actually generated by an employee of the NSA. And it turns out that the IEEE working group that worked on standards for ECC was actually holding its meetings on the NSA campus and its membership therefore had to be approved by the NSA as well.

At this point it is fair to assume that the NIST SECG curves should be abandoned for all uses. Bitcoin uses secp256k1 which was not selected in the same way and is more likely to be OK, and besides the NSA is unlikely to care about stealing peoples wallets (we don't use ECC for secrecy, just authenticity). And luckily academics like djb and Tanja Lange have created new variants of ECC independently of the NSA which are technically better anyway. But the upgrade process away from the SEC curves is going to be a pain.


So, that's quite interesting.  It would now appear that ECC is borked and quite possibly has been so for quite some time, thanks to the handy-work of the NSA.

The cat is now out of the bag.  I am now wondering how many other cryptographic standards need a thorough audit and scrubbing of any questionable code and fixing of languishing bugs?

-- Dietrich
Enhanced by Zemanta