Difference between revisions of "Privacy"

From Organic Design wiki
(Private voice & video chat: sylk)
(Related news & views: Digital Authoritarianism: AI Surveillance Signals The Death Of Privacy)
 
(7 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{glossary}}[[File:NothingToSay.jpg|400px|right]]<onlyinclude>[[Privacy]] is the resource that is made available by ''Security'' which in turn is a collection of tools for allowing information and resource to be made available only to selected people or groups. In [[Organic Design]] this means that our [[peer-to-peer]] network must have a good distributed encryption and authentication mechanism in place so that [[trust group]]s can contain private information securely and persistently even when none of the [[member]]s are online.
+
{{glossary}}[[File:SenseVideo.jpg|400px|right]][[File:NothingToSay.jpg|400px|right]]<onlyinclude>[[Privacy]] is the resource that is made available by ''Security'' which in turn is a collection of tools for allowing information and resource to be made available only to selected people or groups. In [[Organic Design]] this means that our [[peer-to-peer]] network must have a good distributed encryption and authentication mechanism in place so that [[trust group]]s can contain private information securely and persistently even when none of the [[member]]s are online.
  
 
Having very good encryption is important because these days more and more sensitive information needs to be stored in a robust distributed way while remaining fully private and under our own control. Examples of such information are passwords and private keys, scanned identification documents, personal correspondence and these days even [[Bitcoin|digital money]].</onlyinclude>
 
Having very good encryption is important because these days more and more sensitive information needs to be stored in a robust distributed way while remaining fully private and under our own control. Examples of such information are passwords and private keys, scanned identification documents, personal correspondence and these days even [[Bitcoin|digital money]].</onlyinclude>
Line 27: Line 27:
 
*[[Jitsi]] ''- our favourite alternative video/voice solution currently!''
 
*[[Jitsi]] ''- our favourite alternative video/voice solution currently!''
 
*[[Big Blue Button]] ''- only available for Ubuntu 16 currently''
 
*[[Big Blue Button]] ''- only available for Ubuntu 16 currently''
 +
*[https://matrix.org Matrix] and [https://element.io Elelemt] ''- Element uses the Matrix network, and both use Jitsi for conferencing''
 
*[https://getsession.org Session] ''- privacy focused IM for all major dekstop and mobile platforms''
 
*[https://getsession.org Session] ''- privacy focused IM for all major dekstop and mobile platforms''
 
*[https://nextcloud.com/talk/ Nextcloud talk]
 
*[https://nextcloud.com/talk/ Nextcloud talk]
 
*[https://tox.chat Tox]
 
*[https://tox.chat Tox]
*[https://matrix.org Matrix] and [https://riot.im Riot] ''- Riot uses the Matrix neetwork, and both use Jitsi for conferencing''
 
 
*[https://threema.ch Threema] ''- see also [https://news.ycombinator.com/item?id=18839731 thread about Threema's security]''
 
*[https://threema.ch Threema] ''- see also [https://news.ycombinator.com/item?id=18839731 thread about Threema's security]''
 
*[https://jami.net/ Jami] ''- available for all desktop and mobile platforms, used to be Ring (not to be confused with the Amazon company [https://www.vice.com/en_us/topic/watching-ourselves Ring Inc.])''
 
*[https://jami.net/ Jami] ''- available for all desktop and mobile platforms, used to be Ring (not to be confused with the Amazon company [https://www.vice.com/en_us/topic/watching-ourselves Ring Inc.])''
Line 40: Line 40:
  
 
== Private communications apps and info ==
 
== Private communications apps and info ==
*[https://keybase.io Keybase] ''- mainly focused at devs, but very secure chat using [https://keybase.io/blog/chat-apps-softer-than-tofu trusted device chains]''
+
*[[PGP]] ''- do it the good ol' fashioned way!''
 +
*[https://matrix.org Matrix] and [https://element.io Elelemt] ''- Element uses the Matrix network, and both use Jitsi for conferencing''
 
**[https://wedistribute.org/2019/03/pattle-is-a-new-im-like-client-for-matrix/ Pattle]
 
**[https://wedistribute.org/2019/03/pattle-is-a-new-im-like-client-for-matrix/ Pattle]
 
*[https://briarproject.org/ Briar]
 
*[https://briarproject.org/ Briar]
 +
*<s>[https://keybase.io Keybase]</s> ''- sold out to Zoom''
 
*[http://www.slate.com/articles/technology/future_tense/2013/02/silent_circle_s_latest_app_democratizes_encryption_governments_won_t_be.html First Silent Circle, now private file transfer from phones]
 
*[http://www.slate.com/articles/technology/future_tense/2013/02/silent_circle_s_latest_app_democratizes_encryption_governments_won_t_be.html First Silent Circle, now private file transfer from phones]
*[[Configure PGP for Email|PGP email]]
 
 
*[http://www.cypherpunks.ca/otr/ Off-the-Record Messaging]
 
*[http://www.cypherpunks.ca/otr/ Off-the-Record Messaging]
 
*[http://code.google.com/p/torchat/ TOR chat]
 
*[http://code.google.com/p/torchat/ TOR chat]
Line 75: Line 76:
  
 
== Related news & views ==
 
== Related news & views ==
 +
*2022-07-23: [https://www.zerohedge.com/political/digital-authoritarianism-ai-surveillance-signals-death-privacy Digital Authoritarianism: AI Surveillance Signals The Death Of Privacy]
 
*2020-04-18: [https://www.coindesk.com/decentralized-protocol-removed-from-eu-contact-tracing-website-with-no-notice Decentralized Protocol Removed From EU Contact Tracing Website Without Notice]
 
*2020-04-18: [https://www.coindesk.com/decentralized-protocol-removed-from-eu-contact-tracing-website-with-no-notice Decentralized Protocol Removed From EU Contact Tracing Website Without Notice]
 
*2020-04-17: [https://www.coindesk.com/btcpay-looks-to-anonymize-bitcoin-transactions-with-payjoin-integration BTCPay Looks to Anonymize Bitcoin Transactions With PayJoin Integration]
 
*2020-04-17: [https://www.coindesk.com/btcpay-looks-to-anonymize-bitcoin-transactions-with-payjoin-integration BTCPay Looks to Anonymize Bitcoin Transactions With PayJoin Integration]
Line 82: Line 84:
 
*2019-11-13: [https://qrius.com/amazons-roadmap-for-alexa-just-may-be-the-scariest-thing-big-tech-is-doing Amazon’s roadmap for Alexa Just May Be the Scariest Thing Big Tech is Doing]
 
*2019-11-13: [https://qrius.com/amazons-roadmap-for-alexa-just-may-be-the-scariest-thing-big-tech-is-doing Amazon’s roadmap for Alexa Just May Be the Scariest Thing Big Tech is Doing]
 
*2019-04-07: [https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ All major browsers except Fierfox and Brave forcing click trackable links]
 
*2019-04-07: [https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ All major browsers except Fierfox and Brave forcing click trackable links]
 +
*2019-01-21: [https://youtu.be/LOulCAz4S0M How to Disappear Completely] ''- great talk by Lilly Ryan about face recognition algorithms''
 
*2019-01-20: [https://www.businessinsider.com/nest-microphone-was-never-supposed-to-be-a-secret-2019-2 Google says the built-in microphone it never told Nest users about was "never supposed to be a secret"]
 
*2019-01-20: [https://www.businessinsider.com/nest-microphone-was-never-supposed-to-be-a-secret-2019-2 Google says the built-in microphone it never told Nest users about was "never supposed to be a secret"]
 
*2019-01-13: [https://ar.al/2019/01/11/i-was-wrong-about-google-and-facebook-theres-nothing-wrong-with-them-so-say-we-all/ Are Google, Facebook, Microsoft and Apple actually pretty cool after all?] ''- Aral Balkan apologises for thinking they might not have our best interests at heart''
 
*2019-01-13: [https://ar.al/2019/01/11/i-was-wrong-about-google-and-facebook-theres-nothing-wrong-with-them-so-say-we-all/ Are Google, Facebook, Microsoft and Apple actually pretty cool after all?] ''- Aral Balkan apologises for thinking they might not have our best interests at heart''
Line 161: Line 164:
 
*[https://www.darkpatterns.org/types-of-dark-pattern Dark Patterns] ''- ways corporate sites trick you into giving away your privacy and power''
 
*[https://www.darkpatterns.org/types-of-dark-pattern Dark Patterns] ''- ways corporate sites trick you into giving away your privacy and power''
 
*[https://njal.la/ Njalla] ''- anonymous domain registration taken seriously''
 
*[https://njal.la/ Njalla] ''- anonymous domain registration taken seriously''
 +
*[https://www.takebackyourpower.net/comprehensive-report-how-smart-meters-invade-privacy/ Comprehensive report on how smart meters invade privacy]
 +
*[https://panopticlick.eff.org/ Panopticlick] ''- EFF site testing your browser's defence against tracking and fingerprinting''
 
[[Category:Philosophy]][[Category:Security]]
 
[[Category:Philosophy]][[Category:Security]]

Latest revision as of 12:36, 23 July 2022

Glossary.svg This page describes a concept which is part of our glossary
SenseVideo.jpg
NothingToSay.jpg

Privacy is the resource that is made available by Security which in turn is a collection of tools for allowing information and resource to be made available only to selected people or groups. In Organic Design this means that our peer-to-peer network must have a good distributed encryption and authentication mechanism in place so that trust groups can contain private information securely and persistently even when none of the members are online.

Having very good encryption is important because these days more and more sensitive information needs to be stored in a robust distributed way while remaining fully private and under our own control. Examples of such information are passwords and private keys, scanned identification documents, personal correspondence and these days even digital money.

Many people believe that, if you have nothing to hide, there is nothing to fear from all this scrutiny. But if you resist the urge to pick your nose while others are present, or close the door when you go to the toilet, you are a privacy advocate. "When you realise that your whole life is under view," says the Tory MP David Davis, "it’s inhibiting." (from Can you disappear in surveillance Britain?). For more detailed information on this aspect of privacy, see Debunking a myth: If you have nothing to hide, you have nothing to fear.

Quote.pngIf you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.
— Eric Schmidt (CEO of Google)

Real security a myth?

Security camera--.jpg

There isn't much confidence in real privacy these days with all the rumors and/or facts of "back doors" and quantum computers which can achieve seemingly miraculous computational power. But before getting sucked into all the hype, bear this simple foundation in mind - if two people share a private random block of information used one time only to encrypt a message of the same size, it is mathematically impossible to break, even by quantum computation - it is said to exhibit information theoretic security. It is only the level of organisation required amongst participants that currently makes this method impractical - in practice the network would usually combine this method with traditional methods.

Anonymous search

The DuckDuckGo search engine is a meta-search mechanism that gives the same results as Google, but is cleaner and preserves your privacy. It's a little slower to come up with results, but presents them in a nicer way and uses AJAX to maximise its usability.

VPNs

  • RiseupVPN - based on OpenVPN but zero-conf
  • Green Tunnel - bypasses Deep Packet Inspection systems found in many ISPs which block access to certain websites

Anonymous Internet browsing

Apart from the standard practice of using HTTPS connections when working with private content, it is also important to preserve anonymity - i.e. not giving away any information about the source of the web page requests. We use the Firefox browser with the TorButton add-on. There also another called FoxTor but I haven't tried that one yet. These solutions both use the TOR (The Onion Router) to achieve anonymity.

The add-on is easy enough to install, but I found that I also needed to apt-get install polipo and change the port settings in the TorButton preferences. The HTTP and SSL had to be changed from 8118 to 8123 and the SOCKS from 9050 to 4424. I found the ports that polipo was using with netstat -lp|grep polipo. After installation, you can check if it's working by switching it on and then checking your ip address and its estimated geographical location.

Another useful related addon to Firefox is the User Agent Switcher.

Private voice & video chat

Private communications apps and info

Projects

  • Streisand - very simple to set up reproducible privacy system
  • Me and my shadow - take control of your data
  • NoMoreGoogle.com - alternative privacy-aware apps
  • RiseUp.net - another alternatives sites
  • Cryptocat - open-source web-based private chat
  • ZeroLink - very good looking Bitcoin mixer project
  • Silent Circle - Private comms of email, mobile, voip, IM and teleconferencing, by Dr. Zimmerman and others
  • Retroshare - Open Source cross-platform, private and secure decentralised communication platform. It lets you to securely chat and share files with your friends and family, using a web-of-trust to authenticate peers and OpenSSL to encrypt all communication. RetroShare provides filesharing, chat, messages, forums and channels
  • Waterken
  • GNU Privacy Guard (GPG) - GNU implementation of the OpenPGP standard
  • StrongSwan - IPsec for Linux
  • Onion Pi - TOR on Pi
  • Onionize - Docker container that exposes other selected containers as TOR hidden services
  • prism-break.org - stop reporting your online activities to the US government with these free alternatives to proprietary software
  • Tails - Debian with onion, takeaway style!
  • Private Internet Access (PIA) - VPN provider committed to privacy, no logging and excellent legal support
  • Silent Vault - using voucher-safe to make bitcoin anonymous
  • okTurtles + DNSChain - excellent project addressing issues with HTTPS and certificate authority fraud
  • ZeroNet - decentralised websites using Bitcoin crypto and the BitTorrent network
  • Rifle - more secure and efficient alternative to Tot and I2P underway at MIT
  • MicroG - a libre software alternative to Android making good progress
  • e-Foundation - privacy focused phone OS's

Related news & views

See also