David Gessel
Xabber now uses Orbot: OTR+Tor
As of Sept 30 2013, Xabber added Orbot support. This is a huge win for chat security. (Gibberbot has done this for a long time, but it isn’t as user-friendly or pretty as Xabber and it is hard to convince people to use it).
The combination of Xabber and Orbot solves the three most critical problems in chat privacy: obscuring what you say via message encryption, obscuring who you’re talking to via transport encryption, and obscuring what servers to subpoena for at least the last information by onion routing. OTR solves the first and Tor fixes the last two (SSL solves the middle one too, though Tor has a fairly secure SSL ciphersuite, who knows what that random SSL-enabled chat server uses – “none?”)
There’s a fly in the ointment of all this crypto: we’ve recently learned a few entirely predictable (and predicted) things about how communications are monitored:
1) All communications are captured and stored indefinitely. Nothing is ephemeral; neither a phone conversation nor an email, nor the web sites you visit. It is all stored and indexed should somebody sometime in the future decide that your actions are immoral or illegal or insidious or insufficiently respectful this record may be used to prove your guilt or otherwise tag you for punishment; who knows what clever future algorithms will be used in concert with big data and cloud services to identify and segregate the optimal scapegoat population for whatever political crises is thus most expediently deflected. Therefore, when you encrypt a conversation it has to be safe not just against current cryptanalytic attacks, but against those that might emerge before the sins of the present are sufficiently in the past to exceed the limitations of whatever entity is enforcing whatever rules. A lifetime is probably a safe bet. YMMV.
2) Those that specialize in snooping at the national scale have tools that aren’t available to the academic community and there are cryptanalytic attacks of unknown efficacy against some or all of the current cryptographic protocols. I heard someone who should know better poo poo the idea that the NSA might have better cryptographers than the commercial world because the commercial world pays better, as if the obsessive brilliance that defines a world-class cryptographer is motivated by remuneration. Not.
But you can still do better than nothing while understanding that a vulnerability to the NSA isn’t likely to be an issue for many, though if PRISM access is already being disseminated downstream to the DEA, it is only a matter of time before politically affiliated hate groups are trolling emails looking for evidence of moral turpitude with which to tar the unfaithful. Any complacency that might be engendered by not being a terrorist may be short lived. Enjoy it while it lasts.
And thus (assuming you have an Android device) you can download Xabber and Orbot. Xabber supports real OTR, not the fake-we-stole-your-acronym-for-our-marketing-good-luck-suing-us “OTR” (they did, but that link is gone now) that Google hugger-muggers and carom–shotts you into believing your chats are ephemeral with (of course they and all their intelligence and commercial data mining partners store your chats, they just make it harder for your SO to read your flirty transgressions). Real OTR is a fairly strong, cryptographically secured protocol that transparently and securely negotiates a cryptographic key to secure each chat, which you never know and which is lost forever when the chat is over. There’s no open community way to recover your chat (that is, the NSA might be able to but we can’t). Sure, your chat partner can screen shot or copy-pasta the chat, but if you trust the person you’re chatting with and you aren’t a target of the NSA or DEA, your chat is probably secure.
But there’s still a flaw. You’re probably using Google. So anyone can just go to Google and ask them who you were chatting with, for how long, and about how many words you exchanged. The content is lost, but there’s a lot of meta-data there to play with.
So don’t use gchat if you care about that. It isn’t that hard to set up a chat server.
But maybe you’re a little concerned that your ISP not know who you’re chatting with. Given that your ISP (at the local or national level) might have a bluecoat device and could easily be man-in-the-middling every user on their network simultaneously, you might have reason to doubt Google’s SSL connection. While OTR still protects the content of your chat, an inexpensive bluecoat device renders the meta information visible to whoever along your coms path has bought one. This is where Tor comes in. While Google will still know (you’re still using Google even after they lied to you about PRISM and said, in court, that nobody using Gmail has any reasonable expectation of privacy?) your ISP (commercial or national) is going to have a very hard time figuring out that you’re even talking to Google, let alone with whom. Even the fact that you’re using chat is obscured.
So give Xabber a try. Check out Orbot, the effortless way to run it over Tor. And look into alternatives to cloud providers for everything you do.
Category: FreeBSD • Self-publishing • Technology
Google outrage at ‘NSA hacking’
Outrageous, OUTRAGEOUS I says!
Yeah yeah, the NSA didn’t pay you for the data this time?
Google outrage at ‘NSA hacking’
Category: FreeBSD • Technology
India to Impose eMail Restrictions
The cloud is public and ephemeral. Never trust important data to anyone else’s hardware.
India and Brazil are getting it. Finally.
The USG is still moving data to the cloud. It will be an interesting day when it is realized the US isn’t the only country companies like Google and Amazon do business in that have national security data access requirements.
India to impose email restrictions
Category: Politics • Technology
Protein Ratios in Food Bars
I’ve always been annoyed by the way food nutritional content is reported. It isn’t hard to find a food item with 1,000 calories per serving that claims to be be “high” in iron because it has 5% of the US RDA. The ratio of the RDA of iron to calories would be 1:10. You couldn’t eat enough to get the full allowance of iron in a day and you’d become a human blimp trying.
In an age of obscene abundance, the trick is not so much getting the minimum nutritional value, but getting it at the minimum caloric cost. I looked through some reviews of “good” protein bars and popular ones on Amazon and tabulated the nutritional data in Excel and then computed the ratio of grams of protein to three bad things: kilo-calories, grams of saturated fat, and dollars of cost. Thus, higher values are better. It is interesting to see a huge range in all three values. Sadly, it is common to get closer to the maximum recommended value of saturated fat per day than calories, meaning that eating only enough calories of these “healthy” bars will result in increased risk of disease compared to normal, “unhealthy” food. That’s pretty inexcusable.
I’d like to change the way nutritional labels are printed from hard to read tables presenting only favorable values to simple bar graphs of all basic, essential nutrients, all of which would always be included so that empty calories foods would have a big red block of bar graphs pointing to the left indicating a food that had better be a pleasure to eat to compensate for the lack of nutrition.
But back to food bars: the ratio of protein to calories is a good way to select a food bar for healthy people. Finding one with the best ratio of protein to saturated fat can be important for some people and avoiding the worst ratios is good for everyone. Finding the most protein for your dollar may have merit as well (though prices are just Amazon prices and may vary significantly by outlet).
The Excel table for your editing pleasure protein bars.xlsx
Category: Reviews • Technology
Yahoo account PSA
It seems that if you have a yahoo mail account it either already has or will soon be hacked. There’s some news out there about this…..
Yes, how could you not be sure that when somebody offers to host your personal data for free on their servers that nothing could possib-lie go wrong. Uh, PossibLY go wrong.
Category: Politics • Self-publishing • Technology
posthumous hack
I just got an email from a friend of mine, which might not seem particularly atypical, and this turned out to be hack-spam from his Yahoo account. What was jarring about seeing mail from him in my inbox is that he has been dead for six months.
IRL, we move people to cemeteries or other repositories of the dead and keep our interaction space for the living. On social networks and other digital interaction spaces, there’s no particular cost and some respect shown by leaving the presence of those that have passed as it was when they last touched it. But in time, all social networks will fill with the static presence of the passed on. It may be a little less cheerful to log in to facebook when your friend’s list is dominated by those who can no longer answer a poke.
Category: Odd
A Day Out And About In Basra
A day spent out reviewing alternate sites where unexpected underground obstructions impact construction means a chance to make new friends.
These days the attention we attract is welcome and fun.
-
Recent Posts
- Treegraph.sh a tool for generating pretty file structure graphs 2025 February 28
- FINAL System shutdown after 16 years 2025 February 12
- Adding a feature to MediaWiki WikiEditor formatting 2025 January 18
- Technology democratizes nuclear-grade munitions 2025 January 10
- Optane, a modern technology tragedy (plus FreeBSD nvmecontrol) 2025 January 05
- Electronic Signatures and PDF 2025 January 02
- TB 128 is coming. Lock your doors and hide your wife. 2024 September 04
- Goodbye, Tortuga. 2024 April 25
- A one page home/new tab page with random pictures, time, and weather 2024 April 11
- Putting ccache on a backed RAM disk to speed compiles 2024 March 16
- Categories
- Links
- Search
- Archives
- Post History
March 2025 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31