PrivacyGroup: Difference between revisions

From Sidiprojects Wiki
Jump to navigation Jump to search
m (→‎News: add PCLOB report info)
(→‎News: ICE will now use Paragon to compromise phones)
 
(28 intermediate revisions by the same user not shown)
Line 7: Line 7:
[[File:Calvin-messing-with-data-2.jpg|size=400px|frame|An early insight from Calvin. [[Calvin_messing_with_data|Click for the rest]] ]]
[[File:Calvin-messing-with-data-2.jpg|size=400px|frame|An early insight from Calvin. [[Calvin_messing_with_data|Click for the rest]] ]]


* [https://invidious.fdn.fr/watch?v=LfFLeA9jyc4 House Committee on the Judiciary Discusses FISA Reauthorization] - 15 years later, far-reaching changes to surveillance brought by the FAA in 2008 originally justified as a temporary response to immediate terrorist threats are up for a third temporary reauthorization. Hearing focus is on FBI. PCLOB aims to provide a report by this summer (@1:26:55).<span style="color:red">NEW</span>
* [https://archive.is/LV4yC ICE gains access to Paragon's mobile device infection and exfiltration tools] - Tools designed to compromise phones and exfiltrate messages from messengers like Signal now available to ICE. <span style="color:red">NEW</span>
* [https://www.wired.com/story/what-lt-col-boz-and-big-techs-enlisted-execs-will-do-in-the-army/ Peter Thiel, other Tech CEOs Commissioned as Lieutenant Colonels] Thiel heads Palantir; see previous item.
* [https://www.snopes.com/news/2025/06/13/citizens-palantir-surveillance-database/ US gov't installs vast surveillance infrastructure with Palantir] - Rationale in [https://www.whitehouse.gov/presidential-actions/2025/03/stopping-waste-fraud-and-abuse-by-eliminating-information-silos/ EO 14243] is "data sharing" across agencies. When surveillance infrastructure is created by the Executive, [https://bookshop.org/p/books/the-last-honest-man-the-cia-the-fbi-the-mafia-and-the-kennedys-and-one-senator-s-fight-to-save-democracy-james-risen/18833451?ean=9780316565141&next=t history] [https://en.wikipedia.org/wiki/Legacy_of_Ashes_(book) has] [https://bookshop.org/p/books/dark-mirror-edward-snowden-and-the-american-surveillance-state-barton-gellman/12116956?ean=9780143110477&next=t shown], repeatedly, that it will be used in increasingly expansive and abusive ways.
* [https://www.theguardian.com/technology/2025/apr/17/google-illegal-monopoly-ad-tech Google again found to be a monopolist] - Judge in case brought by DoJ and coalition of states finds Google liable for “willfully acquiring and maintaining monopoly power” in ad exchanges, paving the way for an argument for a breakup. This adds to separate finding that Google is a monopolist in online search (see below).
* [https://en.wikipedia.org/wiki/Mark_Klein Mark Klein has Died] - Whistleblower at AT&T revealed the information that led to the the Room 641A scandal. Whistleblowers of conscience like Klein, who are "at the coal face" implementing bad policy, are often highly impactful.
* [https://www.nytimes.com/2025/02/12/technology/google-black-history-womens-history.html Google Removes Black History Month, Pride, and Other Cultural Events from Calendar] - [https://framadate.org/abc/en/ Framadate] is an alternative for arranging events with others without endorsing this.
* [https://www.eff.org/deeplinks/2025/01/victory-federal-court-finally-rules-backdoor-searches-702-data-unconstitutional FBI warrantless backdoor searches of 702 data ruled unconstitutional]
* [https://www.pcmag.com/reviews/google-authenticator Google Authenticator a Pretext for Collecting Data] - This is reminiscent of Facebook and Twitter collecting a phone number for multi-factor auth., then using it for marketing (the FTC was not amused).
* [https://www.csoonline.com/article/3562701/chinese-researchers-break-rsa-encryption-with-a-quantum-computer.html New Quantum Attack on Cryptosystems We All Rely On] - The important bit is that 22-bit RSA is broken. The small key used here is not reassuring, given how scaling works with quantum networks.
* [https://fingfx.thomsonreuters.com/gfx/legaldocs/gdpzmaxjxvw/United%20States%20v%20Google%2020240805.pdf Google violated antitrust law with search monopoly] - Google "is a monopolist, and it has acted as one to maintain its monopoly," U.S. District Judge Amit Mehta said. This might explain why Google holds [https://www.reuters.com/legal/us-judge-rules-google-broke-antitrust-law-search-case-2024-08-05/ 90-95% of the search market], despite [https://mashable.com/article/google-search-low-quality-research plummeting search quality] (see also item immediately below).
* [https://www.justice.gov/d9/2023-11/417581.pdf DOJ Public Filing of Internal Google Emails Shows Push for "Engagement Hacking" at Expense of User Experience] -- "There was a good reason our founders separated search from ads. Are you guys signing up for this?"  (p. 7). They did sign up for it, and the former head of Ads is now head of Search.
* [https://yewtu.be/watch?v=YRDnmUtfj2k FISA Reform Bill Debated in House Rules Committee] - FISA may not be renewed at all, after revelations of over 278K illegal queries of US persons from the FBI, including searches for political protestors and supporters of congressional candidates. This hearing is about keeping FISA, but reforming it. HPSCI members, who are partly responsible for the failure of oversight, argue against a warrant requirement.
* [https://www.naag.org/policy-letter/coalition-of-43-states-urge-ftc-to-strengthen-online-privacy-and-safety-protections-for-americas-youth/ 43 state Attorneys General join a letter urging strengthened privacy protection for children] - This is a response to the FTC's request for comments on COPPA, which the AGs and the FTC both enforce.
* [https://www.intelligence.senate.gov/hearings/open-hearing-nomination-hearing-lieutenant-general-timothy-d-haugh-us-air-force-be-director Haugh nomination hearings for Director of NSA] @ 01:02:22 Timothy Haugh affirms that the NSA will not weaken encryption technology used by Americans. In written response submitted later, Haugh also says weak standard for search of 702 data for Americans is fine, need not be strengthened to probable cause like EO 12,333 data.
* [https://www.extremetech.com/gaming/intels-gpu-drivers-now-collect-telemetry-including-how-you-use-your-computer Intel GPU drivers collect telemetry] - Includes information on which websites you visit, "how you use your computer," and on "other devices in your computing environment." NVIDIA does the same thing, without an opt-out.
* [https://thehackernews.com/2023/07/tetraburst-5-new-vulnerabilities.html TETRA standard for radio communications encryption has had serious flaws for years] - Article notes reliance on the standard across government, but does not mention secure radio's importance to [https://www.reuters.com/article/us-mexico-telecoms-cartels-specialreport-idUSKCN24G1DN drug cartels ]. Disclosure was held back since the flaws' discovery in 2021.
* [https://daringfireball.net/linked/2020/04/04/facebook-nso-group Facebook solicited NSO Group for tools to track its users] - Facebook offered a VPN, then sought to analyze web traffic from those who used it.
* [https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/ Gigabyte motherboard manufacturer caught with firmware backdoor] - Continues tradition of [https://en.wikipedia.org/wiki/Lenovo#Lenovo_Service_Engine Lenovo] and [https://web.archive.org/web/20230517150913/https://www.bloomberg.com/features/2021-supermicro/ Supermicro].
* [https://internetfreedom.in/14-mobile-apps-banned/ Indian Gov't Bans 14 Mobile Messaging Apps] - Scope of the ban across India is unclear. List includes Briar, [https://element.io/blog/india-bans-flagship-client-for-the-matrix-network/?ref=internetfreedom.in Element], and Threema.
* [https://invidious.fdn.fr/watch?v=LfFLeA9jyc4 House Committee on the Judiciary Discusses FISA Reauthorization] - 15 years later, far-reaching changes to surveillance brought by the FAA in 2008 originally justified as a temporary response to immediate terrorist threats are up for a third temporary reauthorization. Hearing focus is on FBI. PCLOB aims to provide a report by this summer (@1:26:55).
* [https://www.c-span.org/video/?c5060858/user-clip-wyden-asks-intel-leaders-purchase-american-data ODNI To Release Report on US Intel Practice Of Purchasing Data Collected by Private Companies] - Data in question includes sensitive data on Americans. DNI Avril Haines convened a panel on the issue, which produced the report. No word on the "framework" Haines proposed at her confirmation hearing when asked about the same issue (see below).
* [https://www.c-span.org/video/?c5060858/user-clip-wyden-asks-intel-leaders-purchase-american-data ODNI To Release Report on US Intel Practice Of Purchasing Data Collected by Private Companies] - Data in question includes sensitive data on Americans. DNI Avril Haines convened a panel on the issue, which produced the report. No word on the "framework" Haines proposed at her confirmation hearing when asked about the same issue (see below).
* [https://liliputing.com/google-prepares-to-help-you-find-your-android-phone-even-when-its-powered-off/ Google plans to locate your phone even when it is powered off] - Snowden revelations revealed [http://www.washingtonpost.com/world/national-security/nsa-growth-fueled-by-need-to-target-terrorists/2013/07/21/24c93cf4-f0b1-11e2-bed3-b9b6fe264871_story.html the NSA has been able to do this] since at least September 2004. When Privacy International investigated it then, Android's head of security said it might be accomplished by compromising the baseband firmware (he  had previously worked at NSA). ([https://invidious.kavin.rocks/N6Rxc7NgHwU?t=1379 here], at 23:51)
* [https://liliputing.com/google-prepares-to-help-you-find-your-android-phone-even-when-its-powered-off/ Google plans to locate your phone even when it is powered off] - Snowden revelations revealed [http://www.washingtonpost.com/world/national-security/nsa-growth-fueled-by-need-to-target-terrorists/2013/07/21/24c93cf4-f0b1-11e2-bed3-b9b6fe264871_story.html the NSA has been able to do this] since at least September 2004. When Privacy International investigated it then, Android's head of security said it might be accomplished by compromising the baseband firmware (he  had previously worked at NSA). ([https://invidious.kavin.rocks/N6Rxc7NgHwU?t=1379 here], at 23:51)
Line 300: Line 319:
* [https://www.youtube.com/watch?v=P7FXF7aTZc0 Inspection (Check One)] Calling the meek and the humble. Inspection!  
* [https://www.youtube.com/watch?v=P7FXF7aTZc0 Inspection (Check One)] Calling the meek and the humble. Inspection!  
* [https://www.youtube.com/watch?v=7CqOYM7cCX8 Mejores Dias (Better Days)] Stego used to encourage hostages of FARC. "Escucha este mensaje, hermano." Followed by "19 people rescued. You are next. Cheer up" in Morse code (1:29 - 1:52)
* [https://www.youtube.com/watch?v=7CqOYM7cCX8 Mejores Dias (Better Days)] Stego used to encourage hostages of FARC. "Escucha este mensaje, hermano." Followed by "19 people rescued. You are next. Cheer up" in Morse code (1:29 - 1:52)
* [[:File:Under_surveillance_newest.mp3|A recent edition of Under Surveillance! Great radio show]] - Now as a single mp3.<span style="color:RED">NEW (19 Jan 2023)</span> Older shows are [[:File:Under_surveillance_latest.tar.gz|here]]. Script is [[get_under_surveillance_script|available too]] if you want to get it for yourself.  
* [[:File:Under_surveillance_newest.mp3|A recent edition of Under Surveillance! Great radio show]] - Now as a single mp3.<span style="color:RED">NEW (12 April 2024, starts at 4:49)</span> Older shows are [[:File:Under_surveillance_latest.tar.gz|here]]. Script is [[get_under_surveillance_script|available too]] if you want to get it for yourself.  
* [https://www.youtube.com/watch?v=5V_jyGNaY5g Octopus's Garden (Raffi version)]  
* [https://www.youtube.com/watch?v=5V_jyGNaY5g Octopus's Garden (Raffi version)]  
* [https://www.youtube.com/watch?v=7YvAYIJSSZY Somebody's Watching me (Rockwell)]   
* [https://www.youtube.com/watch?v=7YvAYIJSSZY Somebody's Watching me (Rockwell)]   
* [https://www.youtube.com/watch?v=U_H4b7-eZNM 3:7:8 (Emergency Broadcast Network, or EBN)]
* [https://www.youtube.com/watch?v=U_H4b7-eZNM 3:7:8 (Emergency Broadcast Network, or EBN)]

Latest revision as of 20:15, 2 September 2025

This page is an effort to maintain an updated collection of important work on privacy. Recommend stuff from this page? Link to us!

Hooray! 100K 275K 300K 350K 400K450K500K views (internal page counts were reset)

News

An early insight from Calvin. Click for the rest

WYDEN: "Would you agree to inform Americans about any circumstances in which the Intelligence Community purchases their data, and the legal basis for doing it?"

HAINES: "...I would try to publicize essentially a framework that helps people understand the circumstances under which we do that, and the legal basis that we do that under."

Wyden's activities since the hearing reflect that Haines's answer to the question about transparency in this area was basically "no." It is unclear whether the framework Haines mentions is in the 2021 SIGINT annex to the DoD Manual S-5240.01-A, since that document is redacted.

Tools help

People often tell me they are unsure about which privacy-enhancing technologies to use, and how to set them up. Here are some suggestions.

secure hardware elements

operating systems

  • Qubes ...OK, not an OS... (also here is a brief description of getting wireless networking working)
  • Tails
  • OpenBSD - Great documentation, elegant base system, fast response to security bugs. Great for firewalls , for example, but also more and more suitable for general use.
  • Debian:
    • the machine-id is a more stable identifier than other things that could be used as stable identifiers. There are other ways to identify a machine, of course, but this one is stable and easy to get in a variety of ways. Resetting it is no big deal, though (and can be done without the "unpredictable consequences" mentioned without explanation in the link)! Follow these instructions. Devuan, a systemd-free fork of Debian, patched this. The instructions here assume systemd).

censorship resistance

  • Psiphon - I don't know how good this is yet. Here's a contributor talking about it at a previous CCC.

anonymous browsing

browsers

  • Tor Browser for everyday Use a second installation of the Tor Browser for everyday browsing without connecting to tor. Very actively maintained (better than regular FF); works great. Why do this? A big reason is TB has much, much better fingerprinting protection.
    • Related: Tor is one of the few browsers to block the prolongation attack that allows tracking using TLS. Test it here, (check under "Protocol Details" to see if "Sessions tickets" is yes.)
    • A fun and useful thing to do is build your own browser to scratch your own itch. For example, if you don't like some CAs after the DarkMatter fiasco, you might rip them out (just saying). It's unfortunately kind of annoying to figure out how to do it, but fortunately I've already done that: see here.
  • Changing search providers in Firefox and Tor Browser without 'search addons" etc. is an indefensible PITA. Here's how to do it: if you have rid yourself of the cruft that is the separate search bar to the right of the address bar---as all people of sound mind and good will have done---then temporarily add it in using the 'Customize...' option (right-click on an empty area to the right of the tabs to see 'Customize...', drag the search bar next to the address bar). Now go to a search engine site---currently I like searx, one instance is searx.me---, and click the magnifying glass icon with the green plus, then click "add 'searx.me'). Now go to your preferences (Edit->preferences, or Alt-E, N if you don't have a menu bar) and set your default search provider to the new one you added. Finally do the customize rigamaroll again, but drag the superfluous search bar off. Wasn't that easy?!
  • Why not Chrome/Chromium? -- It does have a sandbox, but it is also the most privacy invasive browser (of the major ones). Also Google controls the extensions for it, and they are sometimes unjust.

browser tools

these all work with Tor Browser, Icecat, or (vanilla) Firefox.

  • Firefox extension spoofing Google's FLoC! - FLoC's cohort IDs can be correlated to identify users. Rather than having server operators send an opt-out header, do your part as a user and send a random ID! (Note: Requires resetting the User-Agent to Chromium).
  • Try blackhole-ing tracking domains with this handy list, formatted for ready inclusion in your /etc/hosts file from the trackers listed in the Exodus ETIP (shoutout to the Yale Privacy Project contributions). Now visit a site and watch the 0B transfers flow.
  • Random Agent Spoofer (blocks a variety of fingerprinting attacks)
  • RequestPolicy (By Justin Samuel and Beichuan Zhang, of University of Arizona!)
  • NoScript
  • PrivacyBadger (EFF)
  • Self-Destructing Cookies
  • HTTPS Everywhere (EFF)
  • BetterPrivacy (removes LSO's -- supercookies -- which survive normal cleaning of cookie cache)
  • decentraleyes - runs CDN scripts locally, rather than using remote CDNs (which is trackable)
  • Privacy Settings (the plugin) -- Gives quick access to useful privacy settings in the browser, with toggle switches.
  • Update Scanner -- Useful for watching privacy policies for changes (since that is your obligation, as a continuing user of the site. Often such changes are not highlighted; only a new version is posted).

testing for problems

facial recognition

chat

  • Matrix combines a zillion services into one - Not just more private, but more convenient. IRC, Slack, Signal, SMS, WhatsApp, Mastodon, Twitter, Discord, Tox, iMessage, and many more. Contact me if you'd like to use my instance, which supports many bridges.
  • OTR is not a great idea - OTR became well known after a few high-profile uses, but nowadays it's not a great idea. Biggest problem is forward secrecy, especially since quantum computing is not a question of if, but when. I disagree with one of the article's alternatives, Signal, since it's centralized and coerce-able, but some OMEMO implementations are OK (more on that soon).

other tools

  • Standard SKS servers for PGP keys are broken, use Hagrid servers instead - A good one to use to keep your keys up to date (see parcimonie, below) is keys.openpgp.org.
  • Security freeze for great good -- Prevent not just identity theft, but resale of your data by the Credit Reporting Agencies with a security freeze.
  • Keep your PGP keys up to date, privately -- Parcimonie updates your keyring over tor (catching revocations and expirations), at random intervals. It leaves open a connection to tor for a long time, so you may want to run it as a cron job and kill it after some interval.
  • anonymize scanned printouts from printers using tracking dots. From TUD, where lots of useful privacy tools have been created (kudos)
  • Protecting against baseband firmware backdoors, and provider backdoors-- A little outdated, but still full of good stuff. This is a comprehensive approach; for specific tools see below. EDIT: RIP Copperhead OS.
  • Silence SMS/MMS. Recommended -- Mark Zuckerberg says: "many people use Messenger on Android to send and receive SMS texts. Those texts can't be end-to-end encrypted because the SMS protocol is not encrypted." Well, I guess I wouldn't expect much understanding of privacy tech from Mr. Zuckerberg.
  • Noise is just like Signal, but without the hard dependency on Google Play Store. It is therefore better! But Silence is better still...
  • Get an RSS feed reader to keep up to date on privacy-related sites. For example *cough* subscribe to the PrivacyGroup's feed (It's good to use a secure RSS reader. For mobile there is Courier from The Guardian Project).
  • Youtube-dl -- Downloads a variety of streaming formats -- not just for youtube! Can be used with torify (see below) to anonymously view streaming video/audio that otherwise compromises privacy (e.g., flash). Note the version in packages is often not up to date--install the latest with pip to get a version that actually works.
  • Torify -- A SOCKS proxy to the Tor network, and a wrapper to use it, so you can e.g. look up GPG keys, or perform WHOIS queries, anonymously.
  • Get a GPG key
  • installing the latest GPG
  • Get a Gnuk token! -- Good way to do encryption in a protected dedicated device. You can buy them, or build them yourself
  • secure SSH

Other Sites with Tools for Protecting Your Digital Rights

Tools for Making Consent to Privacy Policies More Informed

Why care about privacy?

Anonymity

Giving up privacy

How universities can help

Videos

Miscellaneous

Privacy theme music!