CryptoParty

Last updated

CryptoParty (Crypto-Party) is a grassroots global endeavour [1] to introduce the basics of practical cryptography such as the Tor anonymity network, I2P, Freenet, key signing parties, disk encryption and virtual private networks to the general public. [2] [3] The project primarily consists of a series of free public workshops.

Contents

History

A flyer for a CryptoParty in Santiago, Chile featuring Alice in Wonderland imagery. SantiagoChileCryptoParty.jpg
A flyer for a CryptoParty in Santiago, Chile featuring Alice in Wonderland imagery.

As a successor to the Cypherpunks of the 1990s, [4] CryptoParty was conceived in late August 2012 by the Australian journalist Asher Wolf in a Twitter post [5] following the passing of the Cybercrime Legislation Amendment Bill 2011 and the proposal of a two-year data retention law in that country, [6] the Cybercrime Legislation Amendment Bill 2011. [7] The DIY, self-organizing movement immediately went viral, [8] with a dozen autonomous CryptoParties being organized within hours in cities throughout Australia, the US, the UK, and Germany. [9] Many more parties were soon organized or held in Chile, The Netherlands, Hawaii, Asia, etc. Tor usage in Australia itself spiked, [10] and CryptoParty London with 130 attendees—some of whom were veterans of the Occupy London movement—had to be moved from London Hackspace to the Google campus in east London's Tech City.

As of mid-October 2012 some 30 CryptoParties have been held globally, some on a continuing basis, and CryptoParties were held on the same day in Reykjavik, Brussels, and Manila. [11]

The first draft of the 442-page CryptoParty Handbook (the hard copy of which is available at cost) was pulled together in three days using the book sprint approach, and was released 2012-10-04 under a CC BY-SA license. [12]

Edward Snowden involvement

In May 2014, Wired reported that Edward Snowden, while employed by Dell as an NSA contractor, organized a local CryptoParty at a small hackerspace in Honolulu, Hawaii on December 11, six months before becoming well known for leaking tens of thousands of secret U.S. government documents. During the CryptoParty, Snowden taught 20 Hawaii residents how to encrypt their hard drives and use the Internet anonymously. The event was filmed by Snowden's then-girlfriend, but the video has never been released online. In a follow-up post to the CryptoParty wiki, [13] Snowden pronounced the event a "huge success." [14]

Media response

CryptoParty has received early messages of support from the Electronic Frontier Foundation [15] and (purportedly) AnonyOps, as well as the NSA whistleblower Thomas Drake, WikiLeaks central editor Heather Marsh, [16] [17] and Wired reporter Quinn Norton. [18] Eric Hughes, the author of A Cypherpunk's Manifesto nearly two decades before, delivered the keynote address, Putting the Personal Back in Personal Computers, at the Amsterdam CryptoParty on 2012-09-27. [19] Marcin de Kaminski, founding member of Piratbyrån which in turn founded The Pirate Bay, regards CryptoParty as the most important civic project in cryptography today, [20] [21] and Cory Doctorow has characterized a CryptoParty as being "like a Tupperware party for learning crypto." [22] Der Spiegel in December 2014 mentioned "crypto parties" in the wake of the Edward Snowden leaks in an article about the NSA. [23]

See also

Related Research Articles

A cypherpunk is one who advocates the widespread use of strong cryptography and privacy-enhancing technologies as a means of effecting social and political change. The cypherpunk movement originated in the late 1980s and gained traction with the establishment of the "Cypherpunks" electronic mailing list in 1992, where informal groups of activists, technologists, and cryptographers discussed strategies to enhance individual privacy and resist state or corporate surveillance. Deeply libertarian in philosophy, the movement is rooted in principles of decentralization, individual autonomy, and freedom from centralized authority. Its influence on society extends to the development of technologies that have reshaped global finance, communication, and privacy practices, such as the creation of Bitcoin and other cryptocurrencies, which embody cypherpunk ideals of decentralized and censorship-resistant money. The movement has also contributed to the mainstreaming of encryption in everyday technologies, such as secure messaging apps and privacy-focused web browsers. The cypherpunk ethos has had a lasting impact on debates around digital rights, surveillance, and personal freedoms in the 21st century. The movement has been active since at least 1990 and continues to inspire initiatives aimed at fostering a more private and secure digital world.

An assassination market is a prediction market where any party can place a bet on the date of death of a given individual. This incentivises assassination of the individual, as parties with advanced knowledge of an assassination plot can profit by betting accurately on the date of the death. Because the payoff is for accurately picking the date rather than performing the assassination, it is substantially more difficult to assign criminal liability.

<span class="mw-page-title-main">Crypto-anarchy</span> Political ideology

Crypto-anarchy, crypto-anarchism, cyberanarchy or cyberanarchism is a political ideology focusing on the protection of privacy, political freedom, and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving information over computer networks. In his 1988 "Crypto Anarchist Manifesto", Timothy C. May introduced the basic principles of crypto-anarchism, encrypted exchanges ensuring total anonymity, total freedom of speech, and total freedom to trade. In 1992, he read the text at the founding meeting of the cypherpunk movement. Most Crypto-anarchists are anarcho-capitalists but some are anarcho-mutualists.

Timothy C. May, better known as Tim May was an American technical and political writer, and electronic engineer and senior scientist at Intel. May was also the founder of the crypto-anarchist movement. He retired from Intel in 1986 at age 35 and died of natural causes at his home on December 13, 2018 at age 66.

<span class="mw-page-title-main">Matt Blaze</span> American researcher

Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management. He is currently the McDevitt Chair of Computer Science and Law at Georgetown University, and is on the board of directors of the Tor Project.

<span class="mw-page-title-main">Jacob Appelbaum</span> American computer security researcher (born 1983)

Jacob Appelbaum is an American independent journalist, computer security researcher, artist, hacker and teacher. Appelbaum, who earned his PhD from the Eindhoven University of Technology, first became notable for his work as a core member of the Tor Project, a free software network designed to provide online anonymity. But it was Appelbaum's work with WikiLeaks and his journalism at Der Spiegel based on the NSA documents leaked by Edward Snowden that made him famous, status accentuated by his standing-in for Julian Assange at computer security and hacker forums when Assange could no longer travel to the United States. Under the pseudonym "ioerror", Appelbaum was an active member of the Cult of the Dead Cow hacker collective from 2008 to 2016. He was the co-founder of the San Francisco hackerspace Noisebridge with Mitch Altman. He worked for Kink.com and Greenpeace and volunteered for the Ruckus Society and the Rainforest Action Network. He was on the Technical Advisory Board of the Freedom of the Press Foundation.

The Four Horsemen of the Infocalypse refers to those who use the Internet to facilitate crime or (pejoratively) to rhetorical approaches evoking such criminals.

<span class="mw-page-title-main">Tor (network)</span> Free and open-source anonymity network based on onion routing

Tor is a free overlay network for enabling anonymous communication. Built on free and open-source software and more than seven thousand volunteer-operated relays worldwide, users can have their Internet traffic routed via a random path through the network.

<span class="mw-page-title-main">Tails (operating system)</span> Linux distribution for anonymity and privacy

Tails, or "The Amnesic Incognito Live System", is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity against surveillance. It connects to the Internet exclusively through the anonymity network Tor. The system is designed to be booted as a live DVD or live USB and never writes to the hard drive or SSD, leaving no digital footprint on the machine unless explicitly told to do so. It can also be run as a virtual machine, with some additional security risks.

Web search engines are listed in tables below for comparison purposes. The first table lists the company behind the engine, volume and ad support and identifies the nature of the software being used as free software or proprietary software. The second and third table lists internet privacy aspects along with other technical parameters, such as whether the engine provides personalization.

Eric Hughes is an American mathematician, computer programmer, and cypherpunk. He is considered one of the founders of the cypherpunk movement, alongside Timothy C. May and John Gilmore. He is notable for founding and administering the Cypherpunk mailing list, authoring A Cypherpunk's Manifesto, creating and hosting the first anonymous remailer, and coining the motto, "Cypherpunks write code".

<span class="mw-page-title-main">Edward Snowden</span> American whistleblower and former NSA contractor (born 1983)

Edward Joseph Snowden is an American former NSA intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. He became a naturalized Russian citizen in 2022.

<span class="mw-page-title-main">Bullrun (decryption program)</span> Code name of a decryption program run by the NSA

Bullrun is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government Communications Headquarters (GCHQ) has a similar program codenamed Edgehill. According to the Bullrun classification guide published by The Guardian, the program uses multiple methods including computer network exploitation, interdiction, industry relationships, collaboration with other intelligence community entities, and advanced mathematical techniques.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

During the 2010s, international media reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked by ex-NSA contractor Edward Snowden. The documents consist of intelligence files relating to the U.S. and other Five Eyes countries. In June 2013, the first of Snowden's documents were published, with further selected documents released to various news outlets through the year.

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

<span class="mw-page-title-main">ANT catalog</span> Classified catalog of hacking tools by the NSA

The ANT catalog is a classified product catalog by the U.S. National Security Agency (NSA) of which the version written in 2008–2009 was published by German news magazine Der Spiegel in December 2013. Forty-nine catalog pages with pictures, diagrams and descriptions of espionage devices and spying software were published. The items are available to the Tailored Access Operations unit and are mostly targeted at products from US companies such as Apple, Cisco and Dell. The source is believed to be someone different than Edward Snowden, who is largely responsible for the global surveillance disclosures during the 2010s. Companies whose products could be compromised have denied any collaboration with the NSA in developing these capabilities. In 2014, a project was started to implement the capabilities from the ANT catalog as open-source hardware and software.

TextSecure was an encrypted messaging application for Android that was developed from 2010 to 2015. It was a predecessor to Signal and the first application to use the Signal Protocol, which has since been implemented into WhatsApp and other applications. TextSecure used end-to-end encryption to secure the transmission of text messages, group messages, attachments and media messages to other TextSecure users.

Attempts, unofficially dubbed the "Crypto Wars", have been made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption by national intelligence agencies, especially the National Security Agency (NSA).

Sarah Jamie Lewis is an anonymity and privacy researcher with published research in the fields of deanonymization and e-voting. She also has a special interest in the privacy protocols of sex toys. She has been cited in academic research regarding the security and ethics considerations associated with this technology.

<i>Permanent Record</i> (autobiography) Book by Edward Snowden

Permanent Record is a 2019 autobiography by Edward Snowden, whose revelations sparked a global debate about surveillance. It was published on September 17, 2019, by Metropolitan Books, an imprint of Henry Holt and Company. The book describes Snowden's childhood as well as his tenure at the Central Intelligence Agency and National Security Agency and his motivations for the leaking of highly classified information in 2013 that revealed global surveillance programs. Snowden also discusses his views on authoritarianism, democracy, and privacy. The writer Joshua Cohen is credited by Snowden for "helping to transform my rambling reminiscences and capsule manifestoes into a book."

References

  1. "Privacy in Ubuntu 12.10: Full Disk Encryption | Electronic Frontier Foundation". Eff.org. 2012-11-06. Retrieved 2013-02-20.
  2. Pauli, Darren (2012-09-04). "Cryptoparty goes viral". Scmagazine.com.au. Retrieved 2012-09-26.
  3. "The Woman Behind CryptoParty". Radio Free Europe/Radio Liberty. Rferl.org. 27 November 2012. Retrieved 2013-02-20.
  4. "CryptoParty Like It's 1993". Techdirt. 2012-10-11. Retrieved 2013-02-20.
  5. "Asher Wolf on Twitter". Twitter. Retrieved 2016-11-01.
  6. "Your Data Is Safe With Nicola Roxon". Newmatilda.com. Archived from the original on 2012-09-19. Retrieved 2012-09-26.
  7. "Cybercrime Legislation Amendment Bill 2011 – Parliament of Australia". Aph.gov.au. Retrieved 2012-09-26.
  8. "Ain't no party like a cryptoparty: privacy goes viral". YouTube. 2012-09-21. Retrieved 2012-09-26.
  9. Küchemann, Fridtjof. "Crypto Partys: Eins ist unsicher: Unsere Daten - Debatten". Faz.net. FAZ. Retrieved 2013-02-20.
  10. "Tor Metrics Portal: Users". Metrics.torproject.org. Archived from the original on 2014-02-22. Retrieved 2013-02-20.
  11. "Cryptoparties Teach Data Privacy To The Public | Cryptoparty Sydney | SBS World News". Sbs.com.au. Archived from the original on 2012-10-18. Retrieved 2013-02-20.
  12. "CryptoParty Like It's 1993". Techdirt. 2012-10-11. Retrieved 2013-02-20.
  13. "Snowden's Post in the CryptoParty Wiki". 2012. Retrieved 2015-03-01.
  14. Poulsen, Kevin (2014-05-21). "Snowden's First Move Against the NSA Was a Party in Hawaii". Wired. Retrieved 2014-05-21.
  15. Schoen, Seth (2013-12-28). "2013 in Review: Encrypting the Web Takes A Huge Leap Forward". Electronic Frontier Foundation. Retrieved 2014-05-29.
  16. Marsh, Heather (2012-09-22). "CryptoParty Melbourne". GeorgieBC's Blog. Retrieved September 22, 2012.
  17. "cryptoparty's stream on SoundCloud". Soundcloud.com. 2012-09-23. Retrieved 2013-02-20.
  18. "cryptoparty's sounds on SoundCloud". Soundcloud.com. 2012-09-23. Retrieved 2013-02-20.
  19. "Twitter / DrWhax: I might as well reveal the". Twitter.com. 2012-09-27. Retrieved 2013-02-20.
  20. "Cryptoparty-Bewegung: Die Cypherpunks sind zurück". Der Spiegel. 2012-10-09. Retrieved 2013-02-20.
  21. "Google Translate" . Retrieved 2013-02-20.
  22. Doctorow, Cory (2012-10-12). "CryptoParty: like a Tupperware party for learning crypto". Boing Boing. Retrieved 2013-02-20.
  23. /inside-the-nsa-s-war-on-internet-security