CryptoParty

Last updated

CryptoParty (Crypto-Party) is a grassroots global endeavour [1] to introduce the basics of practical cryptography such as the Tor anonymity network, I2P, Freenet, key signing parties, disk encryption and virtual private networks to the general public. [2] [3] The project primarily consists of a series of free public workshops.

Contents

History

A flyer for a CryptoParty in Santiago, Chile featuring Alice in Wonderland imagery. SantiagoChileCryptoParty.jpg
A flyer for a CryptoParty in Santiago, Chile featuring Alice in Wonderland imagery.

As a successor to the Cypherpunks of the 1990s, [4] CryptoParty was conceived in late August 2012 by the Australian journalist Asher Wolf in a Twitter post [5] following the passing of the Cybercrime Legislation Amendment Bill 2011 and the proposal of a two-year data retention law in that country, [6] the Cybercrime Legislation Amendment Bill 2011. [7] The DIY, self-organizing movement immediately went viral, [8] with a dozen autonomous CryptoParties being organized within hours in cities throughout Australia, the US, the UK, and Germany. [9] Many more parties were soon organized or held in Chile, The Netherlands, Hawaii, Asia, etc. Tor usage in Australia itself spiked, [10] and CryptoParty London with 130 attendees—some of whom were veterans of the Occupy London movement—had to be moved from London Hackspace to the Google campus in east London's Tech City.

As of mid-October 2012 some 30 CryptoParties have been held globally, some on a continuing basis, and CryptoParties were held on the same day in Reykjavik, Brussels, and Manila. [11]

The first draft of the 442-page CryptoParty Handbook (the hard copy of which is available at cost) was pulled together in three days using the book sprint approach, and was released 2012-10-04 under a CC BY-SA license. [12]

Edward Snowden involvement

In May 2014, Wired reported that Edward Snowden, while employed by Dell as an NSA contractor, organized a local CryptoParty at a small hackerspace in Honolulu, Hawaii on December 11, six months before becoming well known for leaking tens of thousands of secret U.S. government documents. During the CryptoParty, Snowden taught 20 Hawaii residents how to encrypt their hard drives and use the Internet anonymously. The event was filmed by Snowden's then-girlfriend, but the video has never been released online. In a follow-up post to the CryptoParty wiki, [13] Snowden pronounced the event a "huge success." [14]

Media response

CryptoParty has received early messages of support from the Electronic Frontier Foundation [15] and (purportedly) AnonyOps, as well as the NSA whistleblower Thomas Drake, WikiLeaks central editor Heather Marsh, [16] [17] and Wired reporter Quinn Norton. [18] Eric Hughes, the author of A Cypherpunk's Manifesto nearly two decades before, delivered the keynote address, Putting the Personal Back in Personal Computers, at the Amsterdam CryptoParty on 2012-09-27. [19] Marcin de Kaminski, founding member of Piratbyrån which in turn founded The Pirate Bay, regards CryptoParty as the most important civic project in cryptography today, [20] [21] and Cory Doctorow has characterized a CryptoParty as being "like a Tupperware party for learning crypto." [22] Der Spiegel in December 2014 mentioned "crypto parties" in the wake of the Edward Snowden leaks in an article about the NSA. [23]

See also

Related Research Articles

A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since at least the late 1980s.

An assassination market is a prediction market where any party can place a bet on the date of death of a given individual, and collect a payoff if they "guess" the date accurately. This would incentivise assassination of individuals because the assassin, knowing when the action would take place, could profit by making an accurate bet on the time of the subject's death. Because the payoff is for accurately picking the date rather than performing the action of the assassin, it is substantially more difficult to assign criminal liability for the assassination.

<span class="mw-page-title-main">Crypto-anarchism</span> Political ideology

Crypto-anarchism or cyberanarchism is a political ideology focusing on protection of privacy, political freedom, and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving information over computer networks. In his 1988 "Crypto Anarchist Manifesto", Timothy C. May introduced the basic principles of crypto-anarchism, encrypted exchanges ensuring total anonymity, total freedom of speech, and total freedom to trade. In 1992, he read the text at the founding meeting of the cypherpunk movement. Most Crypto-anarchists are Anarcho-capitalists but some are Anarcho-mutualists.

Timothy C. May, better known as Tim May was an American technical and political writer, and electronic engineer and senior scientist at Intel. May was also the founder of the crypto-anarchist movement. He retired from Intel in 1986 at age 35 and died of natural causes at his home on December 13, 2018 at age 66.

<span class="mw-page-title-main">Ian Goldberg</span> Cryptographer

Ian Avrum Goldberg is a cryptographer and cypherpunk. He is best known for breaking Netscape's implementation of SSL, and for his role as chief scientist of Radialpoint, a Canadian software company. Goldberg is currently a professor at the Faculty of Mathematics of the David R. Cheriton School of Computer Science within the University of Waterloo, and the Canada Research Chair in Privacy Enhancing Technologies. He was formerly Tor Project board of directors chairman, and is one of the designers of off the record messaging.

<span class="mw-page-title-main">Matt Blaze</span> American researcher

Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management. He is currently the McDevitt Chair of Computer Science and Law at Georgetown University, and is on the board of directors of the Tor Project.

<span class="mw-page-title-main">Jacob Appelbaum</span> American computer security researcher and journalist (born 1 April 1983)

Jacob Appelbaum is an American independent journalist, computer security researcher, artist, and hacker.

The Four Horsemen of the Infocalypse refers to those who use the Internet to facilitate crime or (pejoratively) to rhetorical approaches evoking such criminals.

<span class="mw-page-title-main">Tails (operating system)</span> Linux distribution for anonymity and privacy

Tails, or "The Amnesic Incognito Live System", is a security-focused Debian-based Linux distribution aimed at preserving Internet privacy and anonymity. It connects to the Internet exclusively through the anonymity network Tor. The system is designed to be booted as a live DVD or live USB and never writes to the hard drive or SSD, leaving no digital footprint on the machine unless explicitly told to do so. It can also be run as a virtual machine, with some additional security risks.

Web search engines are listed in tables below for comparison purposes. The first table lists the company behind the engine, volume and ad support and identifies the nature of the software being used as free software or proprietary software. The second and third table lists internet privacy aspects along with other technical parameters, such as whether the engine provides personalization.

Eric Hughes is an American mathematician, computer programmer, and cypherpunk. He is considered one of the founders of the cypherpunk movement, alongside Timothy C. May and John Gilmore. He is notable for founding and administering the Cypherpunk mailing list, authoring A Cypherpunk's Manifesto, creating and hosting the first anonymous remailer, and coining the motto, "Cypherpunks write code".

<span class="mw-page-title-main">Edward Snowden</span> American whistleblower and former NSA contractor (born 1983)

Edward Joseph Snowden is an American and naturalized Russian citizen who was a computer intelligence consultant and whistleblower who leaked highly classified information from the National Security Agency (NSA) in 2013 when he was an employee and subcontractor. His disclosures revealed numerous global surveillance programs, many run by the NSA and the Five Eyes intelligence alliance with the cooperation of telecommunication companies and European governments and prompted a cultural discussion about national security and individual privacy.

<span class="mw-page-title-main">Bullrun (decryption program)</span> Code name of a decryption program run by the NSA

Bullrun is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government Communications Headquarters (GCHQ) has a similar program codenamed Edgehill. According to the Bullrun classification guide published by The Guardian, the program uses multiple methods including computer network exploitation, interdiction, industry relationships, collaboration with other intelligence community entities, and advanced mathematical techniques.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States. In addition to a trove of U.S. federal documents, Snowden's cache reportedly contains thousands of Australian, British, Canadian and New Zealand intelligence files that he had accessed via the exclusive "Five Eyes" network. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably The New York Times, the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L'espresso (Italy), NRC Handelsblad, Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

<span class="mw-page-title-main">ANT catalog</span> Classified catalog of hacking tools by the NSA

The ANT catalog is a classified product catalog by the U.S. National Security Agency (NSA) of which the version written in 2008–2009 was published by German news magazine Der Spiegel in December 2013. Forty-nine catalog pages with pictures, diagrams and descriptions of espionage devices and spying software were published. The items are available to the Tailored Access Operations unit and are mostly targeted at products from US companies such as Apple, Cisco and Dell. The source is believed to be someone different than Edward Snowden, who is largely responsible for the global surveillance disclosures since 2013. Companies whose products could be compromised have denied any collaboration with the NSA in developing these capabilities. In 2014, a project was started to implement the capabilities from the ANT catalog as open-source hardware and software.

<span class="mw-page-title-main">FISA Improvements Act</span>

The FISA Improvements Act is a proposed act by Senator Dianne Feinstein, Chair of the Senate Intelligence Committee. Prompted by the disclosure of NSA surveillance by Edward Snowden, it would establish the surveillance program as legal, but impose some limitations on availability of the data. Opponents say the bill would codify warrantless access to many communications of American citizens for use by domestic law enforcement.

TextSecure was an encrypted messaging application for Android that was developed from 2010 to 2015. It was a predecessor to Signal and the first application to use the Signal Protocol, which has since been implemented into WhatsApp and other applications. TextSecure used end-to-end encryption to secure the transmission of text messages, group messages, attachments and media messages to other TextSecure users.

<span class="mw-page-title-main">Crypto Wars</span> Attempts to limit access to strong cryptography

Attempts, unofficially dubbed the "Crypto Wars", have been made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption by national intelligence agencies, especially the National Security Agency (NSA).

<i>Permanent Record</i> (autobiography) Book by Edward Snowden

Permanent Record is a 2019 autobiography by Edward Snowden, whose revelations sparked a global debate about surveillance. It was published on September 17, 2019, by Metropolitan Books, an imprint of Henry Holt and Company. The book describes Snowden's childhood as well as his tenure at the Central Intelligence Agency and National Security Agency and his motivations for the leaking of highly classified information in 2013 that revealed global surveillance programs. Snowden also discusses his views on authoritarianism, democracy, and privacy. The writer Joshua Cohen is credited by Snowden for "helping to transform my rambling reminiscences and capsule manifestoes into a book."

References

  1. "Privacy in Ubuntu 12.10: Full Disk Encryption | Electronic Frontier Foundation". Eff.org. 2012-11-06. Retrieved 2013-02-20.
  2. Pauli, Darren (2012-09-04). "Cryptoparty goes viral". Scmagazine.com.au. Retrieved 2012-09-26.
  3. "The Woman Behind CryptoParty". Radio Free Europe/Radio Liberty. Rferl.org. 27 November 2012. Retrieved 2013-02-20.
  4. "CryptoParty Like It's 1993". Techdirt. 2012-10-11. Retrieved 2013-02-20.
  5. "Asher Wolf on Twitter". Twitter. Retrieved 2016-11-01.
  6. "Your Data Is Safe With Nicola Roxon". Newmatilda.com. Archived from the original on 2012-09-19. Retrieved 2012-09-26.
  7. "Cybercrime Legislation Amendment Bill 2011 – Parliament of Australia". Aph.gov.au. Retrieved 2012-09-26.
  8. "Ain't no party like a cryptoparty: privacy goes viral". YouTube. 2012-09-21. Retrieved 2012-09-26.
  9. Küchemann, Fridtjof. "Crypto Partys: Eins ist unsicher: Unsere Daten - Debatten". Faz.net. FAZ. Retrieved 2013-02-20.
  10. "Tor Metrics Portal: Users". Metrics.torproject.org. Archived from the original on 2014-02-22. Retrieved 2013-02-20.
  11. "Cryptoparties Teach Data Privacy To The Public | Cryptoparty Sydney | SBS World News". Sbs.com.au. Archived from the original on 2012-10-18. Retrieved 2013-02-20.
  12. "CryptoParty Like It's 1993". Techdirt. 2012-10-11. Retrieved 2013-02-20.
  13. "Snowden's Post in the CryptoParty Wiki". 2012. Retrieved 2015-03-01.
  14. Poulsen, Kevin (2014-05-21). "Snowden's First Move Against the NSA Was a Party in Hawaii". Wired. Retrieved 2014-05-21.
  15. Schoen, Seth (2013-12-28). "2013 in Review: Encrypting the Web Takes A Huge Leap Forward". Electronic Frontier Foundation. Retrieved 2014-05-29.
  16. Marsh, Heather (2012-09-22). "CryptoParty Melbourne". GeorgieBC's Blog. Retrieved September 22, 2012.
  17. "cryptoparty's stream on SoundCloud". Soundcloud.com. 2012-09-23. Retrieved 2013-02-20.
  18. "cryptoparty's sounds on SoundCloud". Soundcloud.com. 2012-09-23. Retrieved 2013-02-20.
  19. "Twitter / DrWhax: I might as well reveal the". Twitter.com. 2012-09-27. Retrieved 2013-02-20.
  20. "Cryptoparty-Bewegung: Die Cypherpunks sind zurück". Der Spiegel. 2012-10-09. Retrieved 2013-02-20.
  21. "Google Translate" . Retrieved 2013-02-20.
  22. Doctorow, Cory (2012-10-12). "CryptoParty: like a Tupperware party for learning crypto". Boing Boing. Retrieved 2013-02-20.
  23. /inside-the-nsa-s-war-on-internet-security