My upcoming CryptoCape and Internet Privacy talks

I’m excited to help kickoff Loveland CreatorSpace (LCS), a new hacker space in Loveland, Colorado, with a presentation and a class!

LCS Show and Tell Kickoff

On Wednesday, November 13th, LCS will be hosting a show and tell kickoff event.  The location and list of presenters are still TBD, but there will be mix of hackers, makers, and creators showing off their projects.  Yours truly will be giving an introduction to the BeagleBone Black and my CryptoCape.

RSVP on Meetup.

LCS’ first class, open to the public: Internet Privacy & Tor

I’m honored to start LCS’ impressive class offerings with a workshop on Wednesday, November 20th at RoadNarrows RoboticsPractical Internet Privacy with Tor.  I’ll provide an overview Tor and show you how to download and run the Tor Browser Bundle.

If you want a more technical details on Tor, the best information is at the Tor Project Website.  If you would like to hear me attempt to explain Tor, you can view my slides or watch this screencast.  But honestly, this presentation from one of Tor founder’s, Roger Dingledine, is much better.

RSVP on Meetup

Follow LCS

If you are in the area, come out and check out the awesome creators at LCS at these two events.

You can follow LCS on FacebookTwitterand Google+.

Privacy in Art, Fiction, and Film

In my seminar class, Privacy in Electronic Society, I recorded a presentation exploring the “I’ve Got Nothing to Hide” argument.  It starts with a summary of “I’ve Got Nothing to Hide” and Other
Misunderstands of Privacy
by Daniel J. Solove.

Then I cite examples of privacy in other media:

It’s a 26 minute presentation (127MB zipped .mov file or stream from Google Drive) and you can also download the slides.

For class, I’ll be moderating an online discussion, but for the rest of the world, I’ll facilitate a discussion on this post as well!  Think of it like a mini-Coursera 😉

 

The NSA wiretapped the cow and got the milk for free

Today three major news agencies, the New York Times, the Guardian, and ProPublic released details of the most intrusive NSA activity to-date.  The NSA and the GCHQ, the British version of the NSA, have “been looking for ways into protected traffic of popular Internet companies: Google, Yahoo, Facebook and Hotmail.”  Microsoft apparently handed over pre-encryption access to Outlook e-mail, Skype and SkyDrive.  Companies have also put back doors into hardware and software products at the request of the NSA.

The NSA and the companies who allowed the back doors have broken the public’s trust.  It’s time we take back the Internet.  As usual, the Electronic Frontier Foundation has an excellent summary on this issue and a list of actions you can take.  This is a two-pronged attack.  First, we should petition our elected officials, which is very easy to do from the EFF’s take action site.  Second, if the companies don’t stand up for their users, you can vote with your feet and leave their feudal system.  I don’t use Microsoft, Yahoo, or Facebook, but I do use Google and Apple.  While Google has claimed there are no back doors, Google is also asking permission from the Government to tell the public about what it does provide.  That sounds like a Kafka novel to me and I think I’m going looking for a new email provider.  Apple lost me when I had to ask permission to install applications.  In the writing of this post, I discovered something new about myself; I don’t like asking permission for things 🙂 .

But also we should step-up your defense. Bruce Schneier published a list of recommendations to maintain (some) control over privacy and security online.  Read the article for the details, but the short list is:

  • Hide in the network. (i.e. use Tor)
  • Encrypt your communications. (use HTTPS Everywhere)
  • Assume that while your computer can be compromised, it would take work and risk on the part of the NSA so it probably isn’t.
  • Be suspicious of commercial encryption software, especially from large vendors.
  • Try to use public-domain encryption that has to be compatible with other implementations.

For those looking for a more complete software list, check out PRISM Break.

Lastly, Bruce Schneier closed with this call-to-arms:

To the engineers, I say this: we built the internet, and some of us have helped to subvert it. Now, those of us who love liberty have to fix it.

A simple and inexpensive way to do accomplish this is to go buy a $45 Beaglebone Black and set it up as a Tor relay and help grow the Tor network.  You can follow my instructions to set this up and have a low-power, freedom protecting, Tor relay.

Of course, you can also join the EFF too or get the t-shirt that the NSA tried to censor, just for fun.