PrivacyGroup: Difference between revisions

From Sidiprojects Wiki
Jump to navigation Jump to search
(santa)
m (Undo revision 1311 by David (talk))
Line 1: Line 1:
This page is an effort to maintain an updated collection of important work on privacy. Recommend stuff from this page? Link to us!
This page is an effort to maintain an updated collection of important work on privacy. Recommend stuff from this page? Link to us!


'''Hooray! <strike>100K</strike> 275K views'''
'''Hooray! <strike>100K</strike> <strike>275K</strike> <strike>300K</strike> <strike>350K</strike> 400K views'''
__TOC__
__TOC__


Line 12: Line 12:


== News ==
== News ==
[[File:Santa be good small.png|size=400px|link=https://en.wikipedia.org/wiki/Information_Awareness_Office|frame|[https://en.wikipedia.org/wiki/Information_Awareness_Office The new TIA Office, back for the season!]]]
[[File:Calvin-messing-with-data-2.jpg|size=400px|frame|An early insight from Calvin. [[Calvin_messing_with_data|Click for the rest]] ]]


* [https://lists.zx2c4.com/pipermail/wireguard/2019-December/004704.html Wireguard to be included in the next Linux kernel] <span style="color:RED">NEW</span>
* [https://poets.org/poem/unknown-citizen In honor of privacy week] - A poem by W.H. Auden <span style="color:RED">NEW</span>
* [https://web.archive.org/web/20191202141345/https://vpnpro.com/blog/private-internet-access-announces-merger-with-kape-technologies-in-latin/ Private Internet Access (PIA) is now owned by a company with questionable past] - The company, formerly called Crossrider, was responsible for scads of adware. <span style="color:RED">NEW</span>
* [https://daniel.haxx.se/blog/2021/10/04/post-quantum-curl/ Post Quantum Curl] - Of course, there are other problems with TLS, but this is part of a vanguard of postquantum support (e.g., wireguard, too).<span style="color:RED">NEW</span>
* [https://www.reddit.com/r/privacy/comments/di5rn3/startpage_is_now_owned_by_an_advertising_company/f3wxiia/ Startpage.com is now owned by an advertising company] - Tough to trust them in the future. Consider <strike>searx.me</strike> searx.laquadrature.net (and set "Engines" to not include Google, to avoid errors).  
* [https://events.ccc.de/2021/10/01/absage_praesenz_2021/#english Chaos Communication Congress cancelled] - 37C3 will await winter 2022, due to COVID-19 concerns. (<strike>No word on a possible r2C3</strike> There will be an online event, [https://events.ccc.de/2021/05/03/aktueller-stand-zur-jahresendveranstaltung/ it seems]).
* [https://tutanota.com/blog/posts/australia-surveillance-bill/ Australia passes far-reaching surveillance bill in 24 hours] - Australia is also home to a law backdooring its companies' encryption (e.g., [https://www.atlassian.com/blog/platform/what-is-encryption Atlassian]), which privacy and security experts in the US have fought since the first cryptowars in the 90s.
* [https://appleprivacyletter.com/ 7K people, including some well-known researchers and activists, sign a letter against Apple's client-side monitoring framework] - No "All Writs Act" defense will be possible for Apple with this framework already in place, unlike the Boston Bomber case. Similarly, governments in important markets will see a tempting tool for monitoring dissidents and other forms of social control, and Apple [https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html has a hard time saying no to them].
* [http://hudoc.echr.coe.int/eng?i=001-210077 The Grand Chamber of the European Court of Human Rights has ruled that some of UK mass surveillance law violates Articles 8 and 10 of the Convention] - Nice discussion of relevant domestic (UK), international, and EU law, with a section on comparative law and practice. Applications were made right after the Snowden revelations in 2013; the judgment came in May 2021.
* [https://www.washingtonpost.com/local/legal-issues/daniel-hale-drone-leak-sentence/2021/07/27/7bb46dd6-ee14-11eb-bf80-e3877d9c5f06_story.html Daniel Hale, whistleblower on US drone warfare, sentenced to four years] - Out of eleven prosecutions of leakers under the Espionage Act all-time since 1918, seven have come in the last three administrations.
* [https://www.aclu.org/press-releases/federal-appeals-court-rules-baltimore-aerial-surveillance-program-unconstitutional Wide-area Persistent Surveillance in Baltimore ruled unconstitutional] - Continues the ongoing history not just in Baltimore, but around the country. Search "persistent" on this page.
* [https://blog.archive.org/2021/07/21/reflections-as-the-internet-archive-turns-25/ Internet Archive is 25 years old today!] - A wonderful public service, worthy of a [https://archive.org/donate/ birthday present]
* [https://www.theguardian.com/news/series/pegasus-project Leak shows NSO group's mobile device infection and exfiltration tools are used globally to spy on and harm journalists, judges, political opponents] - 50,000 phones were revealed to have been attacked, but any phone with iOS and Android is vulnerable, including those kept updated.
* [https://www.politico.eu/article/european-parliament-platforms-child-sexual-abuse-reporting-law/ "Chatcontrol" in the EU breaks messenger protections to search for child abuse content] - In the EU privacy is a derogable right; this is a derogation. Too broad, as it scans everybody; and too narrow, as there are plenty of messengers that cannot be broken in this way.
* [https://epic.org/2021/07/federal-court-rejects-challeng-1.html State challenge to Census's privacy protections rejected] - A federal court has rejected Alabama's challenge to the Census's use of Differentially Private mitigation techniques to protect its released data.
* [https://nitter.fdn.fr/alisongrinter/status/1404457754962636804 Reality Winner released from prison] - Winner was charged for revealing the US government's conclusion that Russia had attempted to interfere in the 2016 presidential election. The role of the public interest in truthful revelations by whistleblowers is at the heart of recent controversy over an unprecedented increase in use of the Espionage Act against them.
* [https://iapp.org/media/pdf/resource_center/State_Comp_Privacy_Law.pdf Colorado passes a new privacy law, similar to California and Virginia's] - The link has the state of play in other states.
* [https://bigbrotherawards.de/en/2021 Big brother awards for 2021]
* [https://www.documentcloud.org/documents/20707603-wyden-dod-purchase-americans-data-letters Several DoD agencies appear to be purchasing commercial data that they cannot otherwise obtain on Americans] - This letter is a follow-up letter by Wyden; it implies something interesting in the five responses to his original letter that he was not allowed to share with the public. [https://www.intelligence.senate.gov/hearings/open-hearing-nomination-avril-haines-be-director-national-intelligence DNI Avril Haines's confirmation hearing back in January] included this exchange @01:37:30:
<blockquote style="background-color: lightgrey; border: solid thin grey;">
WYDEN: "Would you agree to inform Americans about any circumstances in which the Intelligence Community purchases their data, and the legal basis for doing it?"
 
HAINES: "...I would try to publicize essentially a framework that helps people understand the circumstances under which we do that, and the legal basis that we do that under."
</blockquote>
Wyden's activities since the hearing reflect that Haines's answer to the question about transparency in this area was basically "no." It is unclear whether the framework Haines mentions is in the 2021 [https://www.intelligence.gov/assets/documents/702%20Documents/declassified/Redacted%20Annex%20DODM%205240.01-A(1).pdf SIGINT annex to the DoD Manual S-5240.01-A], since that document is redacted.
 
* [https://motherboard.vice.com/en_us/article/53ddwb/uber-knows-too-much-about-you Uber tracked taxi drivers who went to protests, and fired them]
* [https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/ Remote code execution vulnerability found in Zoom] - Affects the app, not web-based access. Zoom is [https://gist.github.com/dacruz21/dd2480f195f5b48a9ab7af8b41c21404 considered harmful].
* [[Media:google-data-collection.png|Google apps' data collection is embarrassing to them]] - Quietly collecting this much on users' every move works better than doing so openly, so they fought Apple's demand for transparency.
* [https://nitter.net/Ammir/status/1353644795139411970 Signal blocked at the ISP level by Iran] - Centralization is a design weakness, and Signal defends its centralization aggressively. Consider Briar, deltachat, or Matrix chat (which combines many services) instead.
* [[Media:ua-privacy-policy.png|University of Arizona Privacy Statement page is rife with trackers]] - Report a concern [https://privacy.arizona.edu/report here]
* [https://tucson.com/news/local/police-have-right-to-a-suspects-internet-info-without-a-warrant-arizona-supreme-court-rules/article_a15d6061-c993-5dcd-869c-94179759a89e.html AZ Supreme Ct. rules Internet users have no reasonable expectation of privacy for the information available to their ISPs] - No warrant required means the risk to privacy for ordinary, innocent people increases. Fitting a pattern, a case about child exploitation is leveraged for wide impact. See tips below on using Tor or VPNs to secure your information from your ISP.
* [https://apnews.com/article/technology-richmond-virginia-courts-a7962e1893efa9b34b26c972282afb4c 4th Circuit Ct of Appeals to take up challenge to use of Military Wide-Area Persistent Surveillance  technology in Baltimore] - Increasing use of [https://en.wikipedia.org/wiki/Wide-area_motion_imagery WAPS] is mentioned below multiple times; this is part of a history.
* [https://arstechnica.com/?p=1733317 WhatsApp pulls a switcheroo] - Facebook (owner of WhatsApp) now gets your phone number, among other things.
* [[Media:tucson-ring-2-dec.png|Police Departments around Tucson now do have agreements with Ring]] - See below for earlier news on this. An up to date record of police requests for video from private users of Ring doorbells [https://www.google.com/maps/d/embed?mid=1eYVDPh5itXq5acDT9b0BVeQwmESBa4cB&ll=32.849272345586925%2C-111.81079804113006&z=8 here]
* [https://manuals.info.apple.com/MANUALS/1000/MA1976/en_US/device-and-data-access-when-personal-safety-is-at-risk.pdf Apple's official guide to avoiding abuse of iOS features] - Addresses problems of stalking, IPV, and other cases where personal safety is at risk.
* [https://blog.mozilla.org/blog/2020/10/20/mozilla-reaction-to-u-s-v-google/ Mozilla argues against antitrust Google case] - Not mentioned, but by now well-known: Mozilla gets the lion's share of its funding from an arrangement to have Google as the default search engine in Firefox.
* [https://twitter.com/h0t_max/status/1316028532972281856 Key protecting Intel microcode extracted] - These guys used their Intel Management Engine exploit to do it, which is mentioned below from a few years back (they presented it at Blackhat 2017).
* [https://www.justice.gov/opa/pr/justice-department-sues-monopolist-google-violating-antitrust-laws "Justice Department Sues Monopolist Google For Violating Antitrust Laws: Department Files Complaint Against Google to Restore Competition in Search and Search Advertising Markets"] - That's the title. New issues compared to the [https://www.ftc.gov/news-events/press-releases/2013/01/google-agrees-change-its-business-practices-resolve-ftc FTC's look back in 2013], which involved five Attorneys General disjoint from the eleven cited by DoJ.
* [https://lists.gnupg.org/pipermail/gnupg-announce/2020q3/000448.html GPG has an important update] - Affects versions found in most package managers.
* [https://www.congress.gov/bill/116th-congress/senate-bill/3398?q=%7B%22search%22%3A%5B%22EARN+IT%22%5D%7D&s=1&r=4 EARN IT Act passed Senate, introduced into the House] - EARN IT attempts to weaken encryption for US companies who want liability protection under 230; opens politicians who opposite it to the charge they're [https://act.eff.org/action/stop-the-earn-it-bill-before-it-breaks-encryption-a7904e20-2083-4d5e-88ae-44ee5fef7a5d on the side of child predators]. A similar bill, [https://www.congress.gov/bill/116th-congress/senate-bill/4051 the Lawful Access to Encrypted Data Act], is more honest.
* [https://decrypt.co/31906/activists-rally-save-internet-archive-lawsuit-threatens Internet archive sued] - Publishers sue during the pandemic to shut down an organization that tried to help. Thanks a lot, guys!
* [https://www.wbaltv.com/article/baltimore-police-surveillance-plane-starts-flying-recording-everyones-movements/32346318 Military aerial surveillance technology deployed in Baltimore] - High resolution, persistent capture of images of large areas of a city. Developed for use in Fallujah, brought to Dayton, OH and Baltimore, MD [https://www.pbs.org/newshour/nation/baltimore-turns-to-aerial-surveillance-to-combat-homicides pbs coverage], [https://www.wnycstudios.org/podcasts/radiolab/articles/eye-sky Radiolab on the first time this happened], [https://www.pss-1.com/ PSS, a company doing WAPS]
* [https://www.paypal.com/ie/webapps/mpp/ua/third-parties-list List of third parties with which Paypal shares payment information] - Used to be around 600 names; I haven't counted the updated numbers
* [https://www.justsecurity.org/69972/odnis-2019-statistical-transparency-report-the-fbi-violates-fisaagain/ Transparency report about records collected under 702 has been released]
* [https://themarkup.org/coronavirus/2020/04/23/want-to-find-a-misinformed-public-facebooks-already-done-it Facebook makes suckers lists easy] - FB allows targeting based on interest in "pseudoscience," is called out on it, and takes it down, completing a cycle that has repeated many times before (see: targeting "jew hater").
* <strike>[[Media:tucson-ring.png|Police Departments around Tucson appear not to have agreements with Ring]]</strike> - See above
* [https://fas.org/irp/congress/2020_cr/usaf-ext.html 77 day extension passed for the USA FREEDOM Reauthorization Act] kicks the can to May 31st.
* [https://www.nytimes.com/2019/10/08/us/politics/fbi-fisa-court.html Recent dust-up over FBI access to databases of records collected under 702].
* [https://lists.zx2c4.com/pipermail/wireguard/2019-December/004704.html Wireguard to be included in the next Linux kernel]
* [https://web.archive.org/web/20191202141345/https://vpnpro.com/blog/private-internet-access-announces-merger-with-kape-technologies-in-latin/ Private Internet Access (PIA) is now owned by a company with questionable past] - The company, formerly called Crossrider, was responsible for scads of adware.
* [https://www.reddit.com/r/privacy/comments/di5rn3/startpage_is_now_owned_by_an_advertising_company/f3wxiia/ Startpage.com is now owned by an advertising company] - Tough to trust them in the future. Consider search.disroot.org
* [https://www.devever.net/~hl/cloudflare The trouble with Cloudflare]. Blocks Tor, blocks bots (even good ones), MiTMs connections and can break TLS. Unknown history with DHS following overtures to Cloudflare's previous incarnation, Project Honeypot.
* [https://www.devever.net/~hl/cloudflare The trouble with Cloudflare]. Blocks Tor, blocks bots (even good ones), MiTMs connections and can break TLS. Unknown history with DHS following overtures to Cloudflare's previous incarnation, Project Honeypot.
* [https://www.dropbox.com/privacy2019 Dropbox has updated their privacy policy] Check it out if you use it (I don't, when I can avoid it).
* [https://www.dropbox.com/privacy2019 Dropbox has updated their privacy policy] Check it out if you use it (I don't, when I can avoid it).
Line 79: Line 125:
* [https://www.openbsd.org OpenBSD] - Great documentation, elegant base system, fast response to security bugs. Great for firewalls , for example, but also more and more suitable for general use.
* [https://www.openbsd.org OpenBSD] - Great documentation, elegant base system, fast response to security bugs. Great for firewalls , for example, but also more and more suitable for general use.
* Debian:  
* Debian:  
** the machine-id is a [https://www.npmjs.com/package/node-machine-id ''more'' stable identifier] than other things that could be used as stable identifiers. There are other ways to identify a machine, of course, but this one is stable and easy to get in a variety of ways. Resetting it is no big deal, though! Follow [[Resetting_machine_id_on_debian|these instructions]]. Devuan, a systemd-free fork of Debian, [https://git.devuan.org/devuan-packages/dbus/commit/fa87b166962f3464278ae8ec76e102bd225a511e patched this]. The instructions here assume systemd). <span style="color:RED">NEW</span>
** the machine-id is a [https://www.npmjs.com/package/node-machine-id ''more'' stable identifier] than other things that could be used as stable identifiers. There are other ways to identify a machine, of course, but this one is stable and easy to get in a variety of ways. Resetting it is no big deal, though (and can be done without the "unpredictable consequences" mentioned without explanation in the link)! Follow [[Resetting_machine_id_on_debian|these instructions]]. Devuan, a systemd-free fork of Debian, [https://git.devuan.org/devuan-packages/dbus/commit/fa87b166962f3464278ae8ec76e102bd225a511e patched this]. The instructions here assume systemd).


====censorship resistance====
====censorship resistance====
* [https://www.psiphon3.com/en/index.html Psiphon] - I don't know how good this is yet. [https://www.youtube.com/watch?v=XSX-y7sW4Iw Here's] a contributor talking about it at the latest CCC.  
* [https://www.psiphon3.com/en/index.html Psiphon] - I don't know how good this is yet. [https://www.youtube.com/watch?v=XSX-y7sW4Iw Here's] a contributor talking about it at a previous CCC.  


* [https://getlantern.org/faq/index.html Lantern] - I don't know how good this is yet
* [https://getlantern.org/faq/index.html Lantern] - I don't know how good this is yet
* Tor (see below)
* Tor (see below)
* [https://mullvad.net Mullvad VPN] -- A good vpn. [https://blog.privacytools.io/choosing-a-vpn/ Update: Privacytools.io agrees].  
* [https://mullvad.net Mullvad VPN] -- A good vpn. Update: they've been [https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/ audited by Cure53], with good results.
* [https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits OpenVPN's latest version was audited, which helps with trustworthiness] -- If you run your own VPN (which is easy), this is a good reason to make sure you're using 2.4.2 or better (I had to compile from source, as the packages aren't up to date).
* [https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits OpenVPN's latest version was audited, which helps with trustworthiness] -- If you run your own VPN (which is easy), this is a good reason to make sure you're using 2.4.2 or better (I had to compile from source, as the packages aren't up to date). Update: [https://www.wireguard.com/ Wireguard] is a better choice, nowadays.


====anonymous browsing====
====anonymous browsing====
Line 97: Line 143:
* [https://www.torproject.org/projects/torbrowser.html.en Tor Browser for everyday] Use a second installation of the Tor Browser for everyday browsing without connecting to tor. Very actively maintained (better than regular FF); works great. Why do this? A big reason is TB has much, much better fingerprinting protection.  
* [https://www.torproject.org/projects/torbrowser.html.en Tor Browser for everyday] Use a second installation of the Tor Browser for everyday browsing without connecting to tor. Very actively maintained (better than regular FF); works great. Why do this? A big reason is TB has much, much better fingerprinting protection.  
** Related: Tor is one of the few browsers to block the prolongation attack that allows tracking using TLS. Test it [https://www.ssllabs.com/ssltest/viewMyClient.html here], (check under "Protocol Details" to see if "Sessions tickets" is yes.)
** Related: Tor is one of the few browsers to block the prolongation attack that allows tracking using TLS. Test it [https://www.ssllabs.com/ssltest/viewMyClient.html here], (check under "Protocol Details" to see if "Sessions tickets" is yes.)
** A fun and useful thing to do is build your own browser to scratch your own itch. For example, if you don't like some CAs after the DarkMatter fiasco, you might rip them out (just saying). It's unfortunately kind of annoying to figure out how to do it, but fortunately I've already done that: see [[TorBrowserHackingTheNextGeneration|here]].


* Changing search providers in Firefox and Tor Browser without 'search addons" etc. is an indefensible PITA. Here's how to do it: if you have rid yourself of the cruft that is the separate search bar to the right of the address bar---as all people of sound mind and good will have done---then temporarily add it in using the 'Customize...' option (right-click on an empty area to the right of the tabs to see 'Customize...', drag the search bar next to the address bar). Now go to a search engine site---currently I like searx, one instance is searx.me---, and click the magnifying glass icon with the green plus, then click "add 'searx.me'). Now go to your preferences (Edit->preferences, or Alt-E, N if you don't have a menu bar) and set your default search provider to the new one you added. Finally do the customize rigamaroll again, but drag the superfluous search bar off. Wasn't that easy?!  
* Changing search providers in Firefox and Tor Browser without 'search addons" etc. is an indefensible PITA. Here's how to do it: if you have rid yourself of the cruft that is the separate search bar to the right of the address bar---as all people of sound mind and good will have done---then temporarily add it in using the 'Customize...' option (right-click on an empty area to the right of the tabs to see 'Customize...', drag the search bar next to the address bar). Now go to a search engine site---currently I like searx, one instance is searx.me---, and click the magnifying glass icon with the green plus, then click "add 'searx.me'). Now go to your preferences (Edit->preferences, or Alt-E, N if you don't have a menu bar) and set your default search provider to the new one you added. Finally do the customize rigamaroll again, but drag the superfluous search bar off. Wasn't that easy?!  
Line 105: Line 152:
''these all work with Tor Browser, Icecat, or (vanilla) Firefox.''
''these all work with Tor Browser, Icecat, or (vanilla) Firefox.''


* [https://git.shivering-isles.com/sheogorath/firefox-floc-extension Firefox extension spoofing Google's FLoC!] - FLoC's cohort IDs can be correlated to identify users. Rather than having server operators send an opt-out header, do your part as a user and send a random ID! (Note: Requires resetting the User-Agent to Chromium). <span style="color:RED">NEW</span>
* Try blackhole-ing tracking domains with [[:File:Trackers_for_hosts_file.txt|this handy list]], formatted for ready inclusion in your /etc/hosts file from the trackers listed in the [https://etip.exodus-privacy.eu.org/ Exodus ETIP] (shoutout to the Yale Privacy Project contributions). Now visit a site and watch the 0B transfers flow.
* Random Agent Spoofer (blocks a variety of fingerprinting attacks)
* Random Agent Spoofer (blocks a variety of fingerprinting attacks)
* RequestPolicy (By Justin Samuel and Beichuan Zhang, of University of Arizona!)
* RequestPolicy (By Justin Samuel and Beichuan Zhang, of University of Arizona!)
Line 125: Line 174:


====facial recognition====
====facial recognition====
* [https://github.com/Shawn-Shan/fawkes Fawkes] - Change your pictures imperceptibly to foil facial recognition. <span style="color:RED">NEW</span>
* [http://www.zachblas.info/works/facial-weaponization-suite/ Facial Weaponization Suite] - More privacy protest than technical countermeasure. "Collective masks" from aggregated face data of participants in workshops.
* [http://www.zachblas.info/works/facial-weaponization-suite/ Facial Weaponization Suite] - More privacy protest than technical countermeasure. "Collective masks" from aggregated face data of participants in workshops.
* [https://www.theguardian.com/technology/2017/jan/04/anti-surveillance-clothing-facial-recognition-hyperface Hyperface] Much like Glamouflage, designed to drive up false alarms in facial recognition. <span style="color:RED">Update: <strike>available in August.</strike> Delayed, with no deadline given</span>
* [https://www.theguardian.com/technology/2017/jan/04/anti-surveillance-clothing-facial-recognition-hyperface Hyperface] Much like Glamouflage, designed to drive up false alarms in facial recognition. <span style="color:RED">Update: <strike>available in August.</strike> Delayed, with no deadline given</span>
Line 130: Line 180:
* [https://faavo.jp/sabae/project/726 Privacy Visor] - Can be purchased by [mailto:mami.n@nissey-sabae.co.jp emailing this address at Nissey Co., Ltd].
* [https://faavo.jp/sabae/project/726 Privacy Visor] - Can be purchased by [mailto:mami.n@nissey-sabae.co.jp emailing this address at Nissey Co., Ltd].
* [https://cvdazzle.com/ CV Dazzle]  
* [https://cvdazzle.com/ CV Dazzle]  
** [https://observers.france24.com/en/20200214-russian-artists-facial-recognition-makeup-arrested Russian artists are still trying to use this]. Does not work on human cops, who arrest them.
* [http://www.technofle.sh/ Glamouflage]
* [http://www.technofle.sh/ Glamouflage]
* [https://www.betabrand.com/mens-reflective-flashback-hoodie-jacket.html Flashback]
* [https://www.betabrand.com/mens-reflective-flashback-hoodie-jacket.html Flashback]
====chat====
* [https://matrix.org/bridges/ Matrix combines a zillion services into one] - Not just more private, but more convenient. IRC, Slack, Signal, SMS, WhatsApp, Mastodon, Twitter, Discord, Tox, iMessage, and many more. Contact me if you'd like to use my instance, which supports many bridges.
* [https://dustri.org/b/time-to-sunset-otr.html OTR is not a great idea] - OTR became well known after a few high-profile uses, but nowadays it's not a great idea. Biggest problem is forward secrecy, especially since quantum computing is not a question of if, but when. I disagree with one of the article's alternatives, Signal, since it's centralized and coerce-able, but some OMEMO implementations are OK (more on that soon).


====other tools====
====other tools====
Line 155: Line 211:
* [https://epic.org/privacy/tools.html EPIC privacy-related tools]
* [https://epic.org/privacy/tools.html EPIC privacy-related tools]
* [https://ssd.eff.org/en/module/problem-mobile-phones Surveillance Self Defense (EFF)]
* [https://ssd.eff.org/en/module/problem-mobile-phones Surveillance Self Defense (EFF)]
* [https://www.eff.org/deeplinks/2016/08/how-keep-your-whatsapp-data-whatsapp Opt out of datasharing by Whatsapp before the deadline!] NOTE: Whatsapp allows your messages to be intercepted without your knowledge. See [[#News]] above.
* <strike>[https://www.eff.org/deeplinks/2016/08/how-keep-your-whatsapp-data-whatsapp Opt out of datasharing by Whatsapp before the deadline!]</strike> All new users of WhatsApp are automatically sharing much more. FB announced that around now (May 2021) it will share even more personal data than before. Almost any other messenger is a better choice.
* [http://cdsds.arizona.edu/ Center for Digital Society and Data Studies] -- UA's center emphasizing digital rights.  
* [https://tacticaltech.org/projects/all Tactical Technology Collective] -- Toolkits and guides for digital security and privacy. Includes guides for Human Rights defenders. Security-in-a-box toolkit has a few inclusions that could be improved, including unhardened Tor, and Firefox rather than Icecat.
* [https://tacticaltech.org/projects/all Tactical Technology Collective] -- Toolkits and guides for digital security and privacy. Includes guides for Human Rights defenders. Security-in-a-box toolkit has a few inclusions that could be improved, including unhardened Tor, and Firefox rather than Icecat.
* [https://www.accessnow.org/ Access Now] Defending and extending digital rights of at risk users around the world.
* [https://www.accessnow.org/ Access Now] Defending and extending digital rights of at risk users around the world.
Line 195: Line 250:
==Videos==
==Videos==


* [https://invidio.us/watch?v=Nd7exbDzU1c Edward Snowden talks to Glenn Greenwald about privacy in the age of COVID-19]
* [https://www.c-span.org/video/?c4470916/mike-rogers-view-privacy Older video of Mike Rogers, then-Chairman of the House Permanent Select Committee on Intelligence, explaining that if you don't know your privacy was violated, it wasn't.]
* [https://www.c-span.org/video/?c4470916/mike-rogers-view-privacy Older video of Mike Rogers, then-Chairman of the House Permanent Select Committee on Intelligence, explaining that if you don't know your privacy was violated, it wasn't.]
* [https://www.youtube.com/watch?v=pulE1baI_mI Soghoian (erstwhile technologist at the ACLU) on the privacy implications of endpoint hacking]
* [https://www.youtube.com/watch?v=pulE1baI_mI Soghoian (erstwhile technologist at the ACLU) on the privacy implications of endpoint hacking]
Line 207: Line 263:


==Miscellaneous==
==Miscellaneous==
* Especially since the pandemic started, there has been an increase in workplace surveillance. Don't buy gewgaws [https://sidiprojects.us/jiggy.mp4 if you don't have to!]<span style="color:RED">NEW</span>
* [https://www.wired.com/1999/04/the-spam-that-started-it-all/ Two Arizonan lawyers' role in the history of spam]
* [https://www.wired.com/1999/04/the-spam-that-started-it-all/ Two Arizonan lawyers' role in the history of spam]
* [https://webtransparency.cs.princeton.edu/webcensus/ A thorough, well-executed study of web tracking (updated monthly?). Worth a look.]
* [https://webtransparency.cs.princeton.edu/webcensus/ A thorough, well-executed study of web tracking (updated monthly?). Worth a look.]
Line 216: Line 273:


===Privacy theme music!===
===Privacy theme music!===
* [https://www.digitalviolence.org/#/soundmachine Brian Eno sonically renders the dataset on the use of tools by NSO Group]
* [[:File:MF_DOOM.m4a|MF DOOM, the subtle and obscure, has died]] - From ''Metaphorical Villainy'': "'Villain' represents that anybody can wear the mask---could be male, female, any race/so-called race ... it's about where you're coming from, from your heart. What is your message; what have you got to say? That's mainly why I chose to bring the mask into the fold." [[:File:Mince_Meat.m4a|(a stranger, who speaks to you in vocals)]]
* [http://anonradio.net:8000/anonradio aNONradio] - Lots of variety, brought to you by [https://sdf.org/?welcome Super Dimension Fortress].
* [https://invidious.snopyta.org/watch?v=bEShy2QIj4U Wireless fantasy - Ussachevsky]
* [https://invidio.us/watch?v=EzG_tmsm3X8 Headhunter - Front 242] - (Not egghunter)
* [[:File:Negativland_more_data.m4a|More Data - Negativland]] - Negativland!
* [[:File:Negativland_more_data.m4a|More Data - Negativland]] - Negativland!
* [https://www.youtube.com/watch?v=P7FXF7aTZc0 Inspection (Check One)] Calling the meek and the humble. Inspection!  
* [https://www.youtube.com/watch?v=P7FXF7aTZc0 Inspection (Check One)] Calling the meek and the humble. Inspection!  
* [https://www.youtube.com/watch?v=7CqOYM7cCX8 Mejores Dias (Better Days)] Stego used to encourage hostages of FARC. "Escucha este mensaje, hermano." Followed by "19 people rescued. You are next. Cheer up" in Morse code (1:29 - 1:52)
* [https://www.youtube.com/watch?v=7CqOYM7cCX8 Mejores Dias (Better Days)] Stego used to encourage hostages of FARC. "Escucha este mensaje, hermano." Followed by "19 people rescued. You are next. Cheer up" in Morse code (1:29 - 1:52)
* [[:File:Under_surveillance_latest.tar.gz|A recent edition of Under Surveillance! Great radio show]]
* [[:File:Under_surveillance_latest.tar.gz|A recent edition of Under Surveillance! Great radio show]] - New script is [[get_under_surveillance_script|available too]] if you want to get it yourself
* [https://www.youtube.com/watch?v=5V_jyGNaY5g Octopus's Garden (Raffi version)]  
* [https://www.youtube.com/watch?v=5V_jyGNaY5g Octopus's Garden (Raffi version)]  
* [https://www.youtube.com/watch?v=7YvAYIJSSZY Somebody's Watching me (Rockwell)]   
* [https://www.youtube.com/watch?v=7YvAYIJSSZY Somebody's Watching me (Rockwell)]   
* [https://www.youtube.com/watch?v=U_H4b7-eZNM 3:7:8 (Emergency Broadcast Network, or EBN)]
* [https://www.youtube.com/watch?v=U_H4b7-eZNM 3:7:8 (Emergency Broadcast Network, or EBN)]

Revision as of 20:54, 7 December 2021

This page is an effort to maintain an updated collection of important work on privacy. Recommend stuff from this page? Link to us!

Hooray! 100K 275K 300K 350K 400K views

Calendar

Events in this calendar are to privacy-related events. Click an event for more details, and links. <EventCalendar> namespace = PrivacyGroup_Event aspectratio = 1.35 </EventCalendar>

News

An early insight from Calvin. Click for the rest

WYDEN: "Would you agree to inform Americans about any circumstances in which the Intelligence Community purchases their data, and the legal basis for doing it?"

HAINES: "...I would try to publicize essentially a framework that helps people understand the circumstances under which we do that, and the legal basis that we do that under."

Wyden's activities since the hearing reflect that Haines's answer to the question about transparency in this area was basically "no." It is unclear whether the framework Haines mentions is in the 2021 SIGINT annex to the DoD Manual S-5240.01-A, since that document is redacted.

Tools help

People often tell me they are unsure about which privacy-enhancing technologies to use, and how to set them up. Here are some suggestions.

secure hardware elements

operating systems

  • Qubes ...OK, not an OS... (also here is a brief description of getting wireless networking working)
  • Tails
  • OpenBSD - Great documentation, elegant base system, fast response to security bugs. Great for firewalls , for example, but also more and more suitable for general use.
  • Debian:
    • the machine-id is a more stable identifier than other things that could be used as stable identifiers. There are other ways to identify a machine, of course, but this one is stable and easy to get in a variety of ways. Resetting it is no big deal, though (and can be done without the "unpredictable consequences" mentioned without explanation in the link)! Follow these instructions. Devuan, a systemd-free fork of Debian, patched this. The instructions here assume systemd).

censorship resistance

  • Psiphon - I don't know how good this is yet. Here's a contributor talking about it at a previous CCC.

anonymous browsing

  • Set up an alias, with associated accounts. This is perfectly legal as long as you don't use it for fraud, as Julia Angwin notes in her article for Consumer Reports.
  • Tor -- I suggest subscribing to the RSS feed of the blog of the Tor project to be sure you stay up to date. The hardened version of Tor has been discontinued; the Tor project recommends moving to the sandboxed version for increased security. As of Tor 8.0, the sandboxed Tor is no longer a separate thing; download the experimental version (>8.0) to get the benefits.
  • Also who uses Tor?

browsers

  • Tor Browser for everyday Use a second installation of the Tor Browser for everyday browsing without connecting to tor. Very actively maintained (better than regular FF); works great. Why do this? A big reason is TB has much, much better fingerprinting protection.
    • Related: Tor is one of the few browsers to block the prolongation attack that allows tracking using TLS. Test it here, (check under "Protocol Details" to see if "Sessions tickets" is yes.)
    • A fun and useful thing to do is build your own browser to scratch your own itch. For example, if you don't like some CAs after the DarkMatter fiasco, you might rip them out (just saying). It's unfortunately kind of annoying to figure out how to do it, but fortunately I've already done that: see here.
  • Changing search providers in Firefox and Tor Browser without 'search addons" etc. is an indefensible PITA. Here's how to do it: if you have rid yourself of the cruft that is the separate search bar to the right of the address bar---as all people of sound mind and good will have done---then temporarily add it in using the 'Customize...' option (right-click on an empty area to the right of the tabs to see 'Customize...', drag the search bar next to the address bar). Now go to a search engine site---currently I like searx, one instance is searx.me---, and click the magnifying glass icon with the green plus, then click "add 'searx.me'). Now go to your preferences (Edit->preferences, or Alt-E, N if you don't have a menu bar) and set your default search provider to the new one you added. Finally do the customize rigamaroll again, but drag the superfluous search bar off. Wasn't that easy?!
  • Why not Chrome/Chromium? -- It does have a sandbox, but it is also the most privacy invasive browser (of the major ones). Also Google controls the extensions for it, and they are sometimes unjust.

browser tools

these all work with Tor Browser, Icecat, or (vanilla) Firefox.

  • Firefox extension spoofing Google's FLoC! - FLoC's cohort IDs can be correlated to identify users. Rather than having server operators send an opt-out header, do your part as a user and send a random ID! (Note: Requires resetting the User-Agent to Chromium). NEW
  • Try blackhole-ing tracking domains with this handy list, formatted for ready inclusion in your /etc/hosts file from the trackers listed in the Exodus ETIP (shoutout to the Yale Privacy Project contributions). Now visit a site and watch the 0B transfers flow.
  • Random Agent Spoofer (blocks a variety of fingerprinting attacks)
  • RequestPolicy (By Justin Samuel and Beichuan Zhang, of University of Arizona!)
  • NoScript
  • PrivacyBadger (EFF)
  • Self-Destructing Cookies
  • HTTPS Everywhere (EFF)
  • BetterPrivacy (removes LSO's -- supercookies -- which survive normal cleaning of cookie cache)
  • decentraleyes - runs CDN scripts locally, rather than using remote CDNs (which is trackable)
  • Privacy Settings (the plugin) -- Gives quick access to useful privacy settings in the browser, with toggle switches.
  • Update Scanner -- Useful for watching privacy policies for changes (since that is your obligation, as a continuing user of the site. Often such changes are not highlighted; only a new version is posted).

testing for problems

facial recognition

chat

  • Matrix combines a zillion services into one - Not just more private, but more convenient. IRC, Slack, Signal, SMS, WhatsApp, Mastodon, Twitter, Discord, Tox, iMessage, and many more. Contact me if you'd like to use my instance, which supports many bridges.
  • OTR is not a great idea - OTR became well known after a few high-profile uses, but nowadays it's not a great idea. Biggest problem is forward secrecy, especially since quantum computing is not a question of if, but when. I disagree with one of the article's alternatives, Signal, since it's centralized and coerce-able, but some OMEMO implementations are OK (more on that soon).

other tools

  • Standard SKS servers for PGP keys are broken, use Hagrid servers instead - A good one to use to keep your keys up to date (see parcimonie, below) is keys.openpgp.org.
  • Security freeze for great good -- Prevent not just identity theft, but resale of your data by the Credit Reporting Agencies with a security freeze.
  • Keep your PGP keys up to date, privately -- Parcimonie updates your keyring over tor (catching revocations and expirations), at random intervals. It leaves open a connection to tor for a long time, so you may want to run it as a cron job and kill it after some interval.
  • anonymize scanned printouts from printers using tracking dots. From TUD, where lots of useful privacy tools have been created (kudos)
  • Protecting against baseband firmware backdoors, and provider backdoors-- A little outdated, but still full of good stuff. This is a comprehensive approach; for specific tools see below. EDIT: RIP Copperhead OS.
  • Silence SMS/MMS. Recommended -- Mark Zuckerberg says: "many people use Messenger on Android to send and receive SMS texts. Those texts can't be end-to-end encrypted because the SMS protocol is not encrypted." Well, I guess I wouldn't expect much understanding of privacy tech from Mr. Zuckerberg.
  • Noise is just like Signal, but without the hard dependency on Google Play Store. It is therefore better! But Silence is better still...
  • Get an RSS feed reader to keep up to date on privacy-related sites. For example *cough* subscribe to the PrivacyGroup's feed (It's good to use a secure RSS reader. For mobile there is Courier from The Guardian Project).
  • Youtube-dl -- Downloads a variety of streaming formats -- not just for youtube! Can be used with torify (see below) to anonymously view streaming video/audio that otherwise compromises privacy (e.g., flash). Note the version in packages is often not up to date--install the latest with pip to get a version that actually works.
  • Torify -- A SOCKS proxy to the Tor network, and a wrapper to use it, so you can e.g. look up GPG keys, or perform WHOIS queries, anonymously.
  • Get a GPG key
  • installing the latest GPG
  • Get a Gnuk token! -- Good way to do encryption in a protected dedicated device. You can buy them, or build them yourself
  • secure SSH

Other Sites with Tools for Protecting Your Digital Rights

Tools for Making Consent to Privacy Policies More Informed

Why care about privacy?

Anonymity

Giving up privacy

How universities can help

Videos

Miscellaneous

Privacy theme music!