Apple and Fingerprints

Anyone who’s been following Irreal lately is painfully aware that the NSA scandals have kicked my paranoia into hyperdrive. Still, there are limits. Apple’s recent announcement of their fingerprint reader on the iPhone 5S has provoked those poor souls even more inflicted than I into paroxysms of suspicion that the NSA is plotting to steal their fingerprints.

Fortunately, my pal Watts has an excellent post that assuages their concerns and debunks the whole foolish notion. Watts explains how the system actually works and why this really is tinfoil hat thinking. If you’re an Apple user and worried about the technology or you just want an entertaining read, head over to Coyote Tracks and enjoy.

If you want some additional technical details, which corroborate what Watts says, there’s a nice description of the technology over at Quora.

Update: have → has

Posted in General | Tagged | Leave a comment

Trusting Microsoft

If you’re a Microsoft user and at all concerned about the security of your computers, you need to read this BoingBoing story about Microsoft’s cooperation with numerous 3-letter government agencies. If ever there were an argument for open source, here it is.

I love my Apple systems and I haven’t seen much about Apple doing this sort of thing but it does give me pause. If nothing else, it makes sense to use third party (open source) applications for full disk encryption and other security measures. It’s pretty clear that it’s foolish to trust any vendor large enough to be worth the government’s attention. If this sort of thing worries you too, check out Prism Break for some alternatives.

Posted in General | Tagged | Leave a comment

Bastien Guerry on Org Mode

I just stumbled across this video by Bastien Guerry on Org Mode. It’s a couple of years old but is an excellent introduction to Org Mode and pretty much up to date. If you’re wondering what Org Mode is all about or if you should take the plunge, this is an good place to find out more.

Guerry is one of the heroes of Org Mode. He took over the maintainer role from the Org Father, Carsten Dominik, for some time and is still active in its development. He’s an interesting guy as you can see from this excellent interview with Sacha Chua. Guerry has a surprising background for someone who has been so instrumental in the development of Org Mode.

The video is just short of an hour so block out some time if you’re interested. As regular readers know, I’m a longtime Org Mode user but I still learned a couple of things I didn’t know. Org Mode is like Emacs in miniature: there’s always something new to learn, even in the elementary stuff. Well worth your time if you’re at all interested in Org Mode or think you should be.

Posted in General | Tagged , | Leave a comment

The Perfect GPG Pair

If the NSA scandals are making you paranoid—and they should—one of the first steps you should take is to install email encryption software. Every time you read an article recommending the use of encryption software, the author inevitably remarks that it’s “hard” or “tricky” to set up GPG or PGP. That isn’t true. Really. Even your Mom can do. In the case of OS X, you just download GPG Tools and install it in the usual way. Other operating systems have similar packages.

If you’re extra paranoid and have a C compiler available, you can download GnuPG and compile it yourself. Of course, unless you’re a cryptography expert, in which case you already know all this, you’re still trusting GnuPG’s authors to implement the crypto correctly and not insert any weaknesses or backdoors. Since GnuPG is open source and lots of people who are crypto experts are looking at the source code, this seems an acceptable risk. As a practical matter, what better choices do you have?

That brings us to generating the keys that you use for encryption and signing. GnuPG walks you through that process and you don’t have to understand any of the technical details; just follow the prompts and choose the defaults. If you want to generate the strongest possible keys, Alex Cabal has an excellent post on Creating the Perfect GPG Keypair. Cabal walks you through the key generation process and tells you what choice you should make at each step to ensure a strong keypair.

Cabal also explains how to limit the inconvenience of a lost or compromised key. This is mostly for laptop users who may have their computer lost or stolen. On the other hand, your keys should be protected by a strong password so you may or may not want to take this additional step.

If you’ve been thinking about setting up email encryption or want to strengthen your current keys and encryption as much as possible, head on over and read Cabal’s post. It’s a good resource and shows you what to do even if you don’t understand the technical details of the crypto.

Posted in General | Tagged | 2 Comments

Why It Matters: A Story From Sweden

I ended my Dinner With General Alexander post with the observation that when the Government collects data, regardless of the stated rationale, there will inevitably be mission creep that sees the data being used in new, unintended ways and that it always leads to abuse. If that sounded hyperbolic to you, consider this article from Rick Falkvinge over at Falkvinge & Co. on Infopolicy.

Sweden, in 1975, started requiring that hospitals take a blood sample from every newborn child. This was specifically to test for and track Phenylketonuria, a genetic disease that can have severe consequences. The samples were preserved to enable research into the disease. Taken is isolation, this seems like a perfectly reasonable program. Help research into a dangerous genetic disease and track those that are susceptible to it. Unfortunately, the iron law of data abuse had a perfectly predictable outcome.

As early as 1998 the police began accessing this data to facilitate investigation of criminal cases. As I’ve said before, I’m an American and view these things through American eyes but this would be blatantly illegal here. It’s very hard to compel DNA from a suspect in America. I would imagine that Europe, with its more robust privacy laws, would have similar restrictions. Yet here we are with the Government seizing DNA data from individuals who had no opportunity to object to its collection.

If the data is there, anyone with an interest in exploiting it will demand access. The only way to prevent this is to prevent the collection of the data in the first place. We are, of course, way beyond that now. Our only recourse is to demand that the Government stop collecting it and destroy what it already has.

Posted in General | Tagged | Leave a comment

Schneier on Being Safe

Bruce Schneier, one our best independent security experts, has some useful advice on staying safe from NSA surveillance. He is working with the Guardian and has access to the Snowden documents so he can bring some reasoned analysis to the situation. The short story is that the math behind modern encryption is still sound and that the NSA’s reported “breakthroughs” almost certainly involve attacks on implementations, stealing or coercing the private keys of service providers, and the weakening of crypto standards.

He offers 5 things you can do to keep yourself safe. You can read his advice at the link but the TL;DR is encrypt your data and communications with open source software. The open source part is crucial given that the NSA has reportedly influenced major vendors to build in backdoors or weaknesses. Open source doesn’t provide absolute protection against this, of course, but it does make it much harder to sneak weaknesses into the system.

Schneier’s article is a good recapitulation of where we, as users and NSA targets, stand today and what steps we can take to keep our private matters private. It’s a good read. Recommended.

Posted in General | Tagged | Leave a comment

It Just Gets Better and Better

Glenn Greenwald’s latest article is out at the The Guardian. Despite repeated assurances that Americans’ data are respected and protected it turns out that the NSA is sharing raw intelligence including Americans’ data with Israel. As it happens, I don’t have a problem with Israel and am happy to have them as one of America’s friends. I also don’t have a problem with my pal Bob but that doesn’t mean I want to share all my private data with him. This is yet another example of how out of control the NSA is.

This may seem to be an American-centric problem but, of course, it’s not. The point to take away here is that the NSA has no respect for innocent Americans’ rights and even less for that of those from other countries. As the story at the link makes clear, the NSA’s brethren in those foreigners’ countries are only too happy to cooperate with the NSA and sell out their own citizens.

We must, all of us, insist that our governments knock it off and start respecting our right to privacy. Just whining won’t make it happen, of course, but a recent event here in the US shows us what’s possible. Whatever your feelings about gun control, a successful recall election in Colorado shows what can happen when voters feel the government is ignoring their wishes. We really need to hold our politicians’ feet to the fire and insist they put a stop to spying on their own citizens. Really, why do we even need to say this?

Posted in General | Tagged | Leave a comment

Dvorak on the NSA

John Dvorak is at his hyperbolic best in this piece on the NSA. In it, he throws out red meat for those of us enraged by what the NSA is doing. His take is that the NSA sees Americans as the enemy and that those in congress—the members of the Senate Select Committee on Intelligence and the House Intelligence Committee—are responsible for this and should be thrown out of office.

I often disagree with Dvorak and frequently find him annoying but it’s hard to disagree with what he says here.

Posted in General | Tagged | Leave a comment

Build Your Own Dropbox

As I’ve written many many many times before, if you’re using Dropbox to store sensitive data you absolutely must encrypt it before committing it to Dropbox. I use Dropbox solely to sync my 1Password keychain between devices so the file I’m storing is already encrypted. Many others use Dropbox to keep several sensitive files synchronized between machines so the necessity to encrypt them can be burdensome. I wrote about one way of solving this problem here but Remy Van Elst has a more comprehensive solution.

His idea is to build your own Dropbox clone so that you have complete control over the environment and what happens. Like the solution I linked above, he uses EncFS to encrypt files on the source machine and then syncs them to a server using Git and dvcs-autosync. Van Elst provides comprehensive recipes for doing this with Linux and OS X. Getting it to work on Windows would probably involve some work although I do know that EncFS has been ported to Windows.

It’s a very nice solution and may be perfect for those with special requirements or a distrust of Dropbox/SpiderOak. The main drawbacks that I see are

  1. A central server is needed to mediate the syncing. You can probably get one for about the same price as a paid Dropbox account and storage limits won’t be an issue for anyone with sane requirements.
  2. It can’t sync iOS devices. I’m not sure about Android. If you require files on your mobile devices, this solution may not work for you.

Even if you don’t need your own Dropbox, it’s worth taking a look at the post to see how Van Elst puts everything together (or at least it is if you’re sufficiently geeky).

Posted in General | Tagged | 1 Comment

The War Between NSA and the Tech Industry Begins

Patrick Gray over at Wired wrote an interesting article in which he posits that Tech Companies and Government May Soon Go to War Over Surveillance. His notion is that while tech companies may have been willing to accommodate the NSA or allow themselves to be pushed around before the Snowden revelations they now realize that the subsequent destruction of their users’ trust represents an existential threat. One way of regaining that trust is to put in place robust systems that make NSA surveillance difficult or impossible. By doing this now they put the government in a bind. As Gray remarks, it’s one thing to pass laws prohibiting such changes and quite another to mandate that they be removed from users’ devices It’s pretty clear that the public wouldn’t tolerate the latter.

Now, it would appear that the first shot in that war has been fired. The Washington Post is reporting that Google has accelerated its program to encrypt data as it moves between Google data centers. Before this change, data in flight between the data centers represented rare points of vulnerability. Whatever their previous transgressions, if any, it’s clear that Google is moving at speed to make their users’ data tamper-proof.

When I first read Gray’s article I was a bit skeptical that the war would come to pass. Google’s action gives me hope that maybe it will.

update: represent → represents

Posted in General | Tagged | Leave a comment