On 8/24/19 11:33 PM, Zenaan Harkness
wrote:
On Fri, Aug 23, 2019 at 11:34:53PM -0700, Stephen D. Williams wrote:
For certain common purposes, one would not want anonymity, but pseudonymity
along with certain pairs and groups having true name sharing or reputational
pseudonyms, federated identities, etc.
Messages should have verifiable provenance, protection, and sometimes known chain of evidence.
There should be methods to determine leakers, and similar bad actors.
HA!
SDW-Fed pops up again.
> There should be methods to determine leakers, and similar bad
> actors.
Absolutely precious!
Parody, irony, subterfuge attempt, or plain ole Jewish Chutzpah -
whatever in hell your smokin', there ain't no freedom in it...
Chuckle of the day dept.
I generally don't have time to waste
with you puerile idiots who imagine that they are bullying people
in any meaningful way toward any useful goal at all. But one
message before you two are plonked again.
If you two didn't think so shallowly
and stupidly, you would see that features like "methods to
determine leakers, and similar bad actors" are useful for groups
fearful of illegal or otherwise improper overstep by groups like
the FBI, such as by an undercover mole or false flag agent or
similar. So, as per usual, you completely misunderstood the
implications, arriving at an exactly opposite misunderstanding.
Typical.
You have inspired an additional
feature: Training on a corpus of your rantings to auto-filter
certain people from all future systems and communication as being
the chronic bad actors you are. That would be useful here on the
now long-polluted Cypherpunks. The consistency of your insane
paranoia and verbal diarrhea certainly means that you are trivial
for the authorities to track through any group communication
system.
The FBI had a rocky, messy genesis.
And for too long they did things we now solidly think of as
improper and wrong. They still have made some bad mistakes not
that long ago. There are some misguided laws that they are in
charge of prosecuting. However, they are pretty much all good
people trying to do the right thing in all circumstances. If you
actually did anything useful in life, had a real job, a real
company, or a real family, or if you cared about others at all,
there are plenty of circumstances where you would want the FBI
around to help. That doesn't mean that we, as citizens, shouldn't
expect excellence, oversight, and strict avoidance of abuse and
especially lack of accountability of abuse. And we should protect
our rights in a way that doesn't enable terrorists etc. too much.
At the same time, we should try to find
solutions to problems like, as I call it, the Indian Village
Whatsapp Rumor Killings - what happens when unfettered encrypted
messaging meets impressionable people with not much understanding
of the perils of losing provenance & verification along with
the asymmetry of sensationalist information flow, and how do we
fix it without allowing other problems?
We do have a solution that mostly
works: Centralized unencrypted messaging hubs like Facebook,
Twitter, et al that can be monitored, data mined, correlated,
shared with authorities, etc. It's a bummer if that is the only
workable solution. With enough rules, that can continue to work
most of the time, but it's not optimal. Too bad this channel is
so polluted, by you, that we couldn't work on an alternate
solution. We used to solve problems here.
Solving this properly will involve some
balance of crypto, technology, policy, ethics, law, sociology,
psychology, and economics. If you can't understand how things are
currently working, you're probably not capable of designing a
better alternative. If you think that the FBI / Google / Amazon /
Facebook / Apple are only bad, or are actively trying to spy on
you for immoral & illegitimate purposes, etc., that's probably
not a good sign of your capability or mental health. There is a
difference between 'this is possible' and 'this multi-billion
dollar company would assume they could get away with ______
without any leaks, clearly risking those billions'. Good to
examine and battle over the gray areas, where they do sometimes go
too far. But many are illogically paranoid. A professional level
of security awareness and understanding takes all of that into
account, avoiding paranoia.
sdw
It should be possible to limit DDoS and similar abuse that tries to disable the network; hard to do if everything is anonymous.
Perhaps this could be layered on to bitmessage or a similar but different system.
Stephen
On 8/23/19 12:22 PM, Steven Schear wrote:
The lead developer is Peter Surda.
On Fri, Aug 23, 2019, 5:07 AM Zenaan Harkness <zen@freedbms.net <mailto:zen@freedbms.net>> wrote:
On Tue, Aug 20, 2019 at 09:29:52PM -0000, cypherpunk@danwin1210.me <mailto:cypherpunk@danwin1210.me> wrote:
> Bitmessage - Anonymous, Encrypted, Secure Messaging, Chans, and Broadcasts
> --------------------------------------------------------------------------
>
> There is a uncensorable messaging and discussion network, Bitmessage. It
> is a decentralized and trustless peer-to-peer protocol. It sports a slick
> graphical interface that works like a mail client. The UX is snappy and
> easy even for Grandma. Management of cryptography keys and signing is
> automatic under the hood and is never exposed to the end user. It is an
> order of magnitude easier to use than PGP or GnuPG.
>
> https://bitmessage.org
> https://github.com/Bitmessage/PyBitmessage
>
> Bitmessage works like the old mixnets or remailers but much more securely.
> It is highly resistant to eavesdropping and censorship. The lead developer
> is from the old cypherpunk culture.
>
> Bitmessage has several useful features:
>
> * Connect via Tor
> * Anonymous chans
> * Anonymous broadcasts
> * Anonymous distributed mailing list repeaters
> * Private messaging addresses
> * Automatic management of all cryptography keys
>
> You can run bitmessage in a firejail on Linux for extra extra security.
> We've found only one security hole in over six years of development, and
> we're pretty confident that it is very secure "out of the box" at this
> time.
>
> If you want to help the network please configure a node to accept incoming
> connections to increase the speed and security of the network against
> traffic analysis. The more peers that accept incoming connections the more
> resilient the network becomes.
>
> Please share this resource with all the mailing lists to which you are
> subscribed, with your friends, and on bulletin boards.
>
> I hope to see you on the Bitmessage channel, [chan] cypherpunks.
>
> To subscribe to this chan in Bitmessage, click on the 'Chans' tab, then
> click the 'Add chan' button, then enter the passphrase 'cypherpunks' and
> click OK.
>
> The crypto community has been hijacked by shills who try to control the
> discussion and keep people in the dark about the sad state of privacy.
> There are a lot of pro-law-enforcement shills who are trying to move us
> into back-doored crypto. The "leaders" have hidden agendas. They keep
> rolling out broken cryptography full of security holes (how convenient),
> then tell the rest of us to never roll our own crypto (how inconvenient
> for them), that we should put all our eggs in their leaky basket.
>
> a old cypherpunk
On the face of the above marketing, checking all the right boxes -
that's a good start.
Needs to be at the top of a few bucket lists to review the
architecture, compare, etc.
Thank you for the heads up...
--