[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:00.00,0:00:11.02,Default,,0000,0000,0000,,{\i1}preroll music{\i0} Dialogue: 0,0:00:11.02,0:00:18.27,Default,,0000,0000,0000,,Herald: I am very happy to introduce this\Nyear’s update on the “State of the Onion”! Dialogue: 0,0:00:18.27,0:00:23.97,Default,,0000,0000,0000,,This is a talk with about 5 speakers,\Nso let’s introduce them one by one. Dialogue: 0,0:00:23.97,0:00:28.53,Default,,0000,0000,0000,,First, Roger. He did it the last talk.\NHe is the founder of the TOR Project, Dialogue: 0,0:00:28.53,0:00:35.98,Default,,0000,0000,0000,,{\i1}applause{\i0}\NMIT Graduate and Top 100 Global Thinkers. Dialogue: 0,0:00:35.98,0:00:39.06,Default,,0000,0000,0000,,Then we have Jake, a\Nhumble PHD math student Dialogue: 0,0:00:39.06,0:00:42.41,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:00:42.41,0:00:46.35,Default,,0000,0000,0000,,that is in my opinion not a\NNational Security threat Dialogue: 0,0:00:46.35,0:00:51.19,Default,,0000,0000,0000,,but a post National Security promise. Dialogue: 0,0:00:51.19,0:00:55.13,Default,,0000,0000,0000,,We have Mike Perry, and I think\Nit is enough to say about him, Dialogue: 0,0:00:55.13,0:00:58.70,Default,,0000,0000,0000,,that the NSA calls him a worthy adversary. Dialogue: 0,0:00:58.70,0:01:04.91,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:01:04.91,0:01:09.25,Default,,0000,0000,0000,,He is also the lead dev\Nof the TOR Browser. Dialogue: 0,0:01:09.25,0:01:14.22,Default,,0000,0000,0000,,And then we have Alison Macrina,\Na radical, militant librarian. Dialogue: 0,0:01:14.22,0:01:21.27,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:01:21.27,0:01:28.04,Default,,0000,0000,0000,,And last but not least: Shari Steele, the\Nnew Executive Director of the TOR Project. Dialogue: 0,0:01:28.04,0:01:35.50,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:01:35.50,0:01:40.22,Default,,0000,0000,0000,,So without further ado:\NThis year’s State of the Onion! Dialogue: 0,0:01:40.22,0:01:45.23,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:01:45.23,0:01:49.49,Default,,0000,0000,0000,,Jacob: Alright, it’s a great\Nhonor to be back here again. Dialogue: 0,0:01:49.49,0:01:52.64,Default,,0000,0000,0000,,And we’re really happy to be able\Nto introduce so many more faces. Dialogue: 0,0:01:52.64,0:01:56.77,Default,,0000,0000,0000,,It’s no longer the Roger and Jake\Nshow. That’s very important to us. Dialogue: 0,0:01:56.77,0:02:01.43,Default,,0000,0000,0000,,Hopefully next year, we won’t\Nbe here, but we’ll still be alive. Dialogue: 0,0:02:01.43,0:02:05.66,Default,,0000,0000,0000,,So 2015, if I were to express\Nit in a hand gesture Dialogue: 0,0:02:05.66,0:02:10.31,Default,,0000,0000,0000,,or with a facial expression, it would\Nlook something like “Ooouuw”. Dialogue: 0,0:02:10.31,0:02:15.46,Default,,0000,0000,0000,,It was really a year of big changes. Not\Nall of them were really good changes. Dialogue: 0,0:02:15.46,0:02:18.45,Default,,0000,0000,0000,,And there were a lot of heavy things\Nthat happened throughout the year. Dialogue: 0,0:02:18.45,0:02:22.02,Default,,0000,0000,0000,,We won’t even be able to cover all of\Nthem because we only have an hour. Dialogue: 0,0:02:22.02,0:02:25.76,Default,,0000,0000,0000,,So we want to focus on the\Npositive things. I would say that Dialogue: 0,0:02:25.76,0:02:30.12,Default,,0000,0000,0000,,probably the nicest thing is that we are\Ngrowing. We’re really, really growing. Dialogue: 0,0:02:30.12,0:02:33.20,Default,,0000,0000,0000,,Not only growing the network,\Nbut we’re growing the community. Dialogue: 0,0:02:33.20,0:02:37.03,Default,,0000,0000,0000,,And in some sense we’re expanding\Nthroughout the whole world in terms of Dialogue: 0,0:02:37.03,0:02:41.45,Default,,0000,0000,0000,,users who are using TOR, what TOR\Nusers are using TOR for, which is Dialogue: 0,0:02:41.45,0:02:45.20,Default,,0000,0000,0000,,of course extremely important that there\Nis more and more people just doing Dialogue: 0,0:02:45.20,0:02:49.26,Default,,0000,0000,0000,,regular things with TOR, protecting\Nthemselves. But then we have of course Dialogue: 0,0:02:49.26,0:02:52.10,Default,,0000,0000,0000,,lots of specialized things that happen\Nwith the TOR network as well. Dialogue: 0,0:02:52.10,0:02:56.29,Default,,0000,0000,0000,,We have things like OnionBalance and\NRicochet. Really exciting developments. Dialogue: 0,0:02:56.29,0:03:01.06,Default,,0000,0000,0000,,And we’ll talk a bit about all of those\Nthings. One of the most unlikely things, Dialogue: 0,0:03:01.06,0:03:05.99,Default,,0000,0000,0000,,at least when I imagine working\Non TOR, say 10 years ago vs. now, Dialogue: 0,0:03:05.99,0:03:09.75,Default,,0000,0000,0000,,is that we’ve worked with some really\Nunlikely partners. Some of you know Dialogue: 0,0:03:09.75,0:03:17.19,Default,,0000,0000,0000,,that I’m not really a big fan of Silicon\NValley, even though I’m from there. Dialogue: 0,0:03:17.19,0:03:21.86,Default,,0000,0000,0000,,So you know, I sometimes call Facebook\Nnot so nice names, like Stasi-Book. Dialogue: 0,0:03:21.86,0:03:24.19,Default,,0000,0000,0000,,And part of the reason for that is\Nbecause I think it is a little bit weird, Dialogue: 0,0:03:24.19,0:03:28.25,Default,,0000,0000,0000,,that you report on all your friends\Nin order to go to parties. Dialogue: 0,0:03:28.25,0:03:32.46,Default,,0000,0000,0000,,Previously it was to get into the party\Nand now it is to go to parties. Dialogue: 0,0:03:32.46,0:03:35.86,Default,,0000,0000,0000,,And yet we worked with them on something. Dialogue: 0,0:03:35.86,0:03:39.68,Default,,0000,0000,0000,,Because it turns out that sometimes\Nyou have unlikely temporary alliances. Dialogue: 0,0:03:39.68,0:03:43.49,Default,,0000,0000,0000,,And it turns out that while I personally\Nmay think that they are evil incarnate Dialogue: 0,0:03:43.49,0:03:48.47,Default,,0000,0000,0000,,in some sense, it is the case that\Nthere is at least one good guy there. Dialogue: 0,0:03:48.47,0:03:52.64,Default,,0000,0000,0000,,Alec worked on this fantastic RFC7686, Dialogue: 0,0:03:52.64,0:03:58.13,Default,,0000,0000,0000,,that actually allowed us to help all\NFacebook users mitigate some harm. Dialogue: 0,0:03:58.13,0:04:01.54,Default,,0000,0000,0000,,Which is that if they want to be able\Nto visit Facebook; and I guess Dialogue: 0,0:04:01.54,0:04:05.28,Default,,0000,0000,0000,,the reality is that not using Facebook\Nfor a lot of people is sort of like Dialogue: 0,0:04:05.28,0:04:08.59,Default,,0000,0000,0000,,the “Kill your Television” bumper sticker\Nof the 90s. For those of you that ever Dialogue: 0,0:04:08.59,0:04:13.47,Default,,0000,0000,0000,,visited rural America. You know that that\Nwasn’t like a really successful campaign. Dialogue: 0,0:04:13.47,0:04:18.47,Default,,0000,0000,0000,,A lot of people have TVs these days\Nas well. So it’s a little bit like that, Dialogue: 0,0:04:18.47,0:04:22.37,Default,,0000,0000,0000,,only here we actually built an alternative\Nwhere we can mitigate harm. Dialogue: 0,0:04:22.37,0:04:25.40,Default,,0000,0000,0000,,And that’s really incredibly important\Nbecause it mitigates harm in all sorts Dialogue: 0,0:04:25.40,0:04:29.13,Default,,0000,0000,0000,,of different pieces of software. It\Nmakes it possible for us to talk to Dialogue: 0,0:04:29.13,0:04:32.90,Default,,0000,0000,0000,,Browser vendors, to DNS resolvers.\NAnd part of this was motivated Dialogue: 0,0:04:32.90,0:04:36.57,Default,,0000,0000,0000,,by some investigative journalism\Nthat I actually did, where I revealed Dialogue: 0,0:04:36.57,0:04:41.09,Default,,0000,0000,0000,,XKeyscore rules, where the US\NGovernment’s National Security Agency Dialogue: 0,0:04:41.09,0:04:45.16,Default,,0000,0000,0000,,was sifting through all of the internet\Ntraffic to look for .onion addresses. Dialogue: 0,0:04:45.16,0:04:49.17,Default,,0000,0000,0000,,So when they saw a DNS request\Nfor .onion they were actually Dialogue: 0,0:04:49.17,0:04:52.92,Default,,0000,0000,0000,,learning .onions by harvesting traffic.\NAnd that really motivated me Dialogue: 0,0:04:52.92,0:04:55.78,Default,,0000,0000,0000,,to want to make it, so that the DNS\Nresolvers didn’t do that anymore. Dialogue: 0,0:04:55.78,0:05:00.82,Default,,0000,0000,0000,,It was very important, because one\Nof my core missions with TOR Dialogue: 0,0:05:00.82,0:05:04.70,Default,,0000,0000,0000,,is to make that kind of stuff a\Nlot harder for the spies to do. Dialogue: 0,0:05:04.70,0:05:08.98,Default,,0000,0000,0000,,And protecting everyday users, even\Nusers who aren’t TOR users, yet. Dialogue: 0,0:05:08.98,0:05:12.30,Default,,0000,0000,0000,,And that’s very important. So working\Nwith Alec on this has been great, Dialogue: 0,0:05:12.30,0:05:16.17,Default,,0000,0000,0000,,because the IETF actually\Nsupports this. And now Dialogue: 0,0:05:16.17,0:05:20.19,Default,,0000,0000,0000,,ICANN will not sell\N.onion to anyone. Dialogue: 0,0:05:20.19,0:05:24.25,Default,,0000,0000,0000,,It’s a special use reserved\Nname. And that’s incredible! Dialogue: 0,0:05:24.25,0:05:31.27,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:05:31.27,0:05:34.60,Default,,0000,0000,0000,,Roger: OK, so. Is this\Nthing on? Yes it is, great! Dialogue: 0,0:05:34.60,0:05:37.37,Default,,0000,0000,0000,,So there are a couple of interesting\Ngraphs, that we’re going to give you, Dialogue: 0,0:05:37.37,0:05:42.49,Default,,0000,0000,0000,,of usage scenarios, usage\Ninstances over the past year. Dialogue: 0,0:05:42.49,0:05:46.54,Default,,0000,0000,0000,,So pretty recently we were looking at\Nthe number of people in Russia Dialogue: 0,0:05:46.54,0:05:51.20,Default,,0000,0000,0000,,using TOR. Russia has been talking about\Ncensoring, talking about all sorts of Dialogue: 0,0:05:51.20,0:05:55.98,Default,,0000,0000,0000,,oppression steps. And at\Nthe beginning of November, Dialogue: 0,0:05:55.98,0:06:01.22,Default,,0000,0000,0000,,we moved from 180k people in\NRussia each day using TOR Dialogue: 0,0:06:01.22,0:06:05.75,Default,,0000,0000,0000,,up to almost 400k people. And\Nthis is probably a low estimate. Dialogue: 0,0:06:05.75,0:06:10.16,Default,,0000,0000,0000,,So many hundreds of thousands\Nof people for that two week period, Dialogue: 0,0:06:10.16,0:06:14.62,Default,,0000,0000,0000,,which started with a Russian bomber\Ngetting shot down, were trying to get Dialogue: 0,0:06:14.62,0:06:18.32,Default,,0000,0000,0000,,news from the rest of the world, rather\Nthan news as Russia wanted to show it Dialogue: 0,0:06:18.32,0:06:22.46,Default,,0000,0000,0000,,to them. So that’s\Nkind of a cool event. Dialogue: 0,0:06:22.46,0:06:26.14,Default,,0000,0000,0000,,Another interesting event: Bangladesh\Nended up censoring Facebook Dialogue: 0,0:06:26.14,0:06:30.23,Default,,0000,0000,0000,,and some other websites and a whole\Nlot of people switched to using TOR. Dialogue: 0,0:06:30.23,0:06:32.91,Default,,0000,0000,0000,,I was actually talking to one of the\NFacebook people and they have their own Dialogue: 0,0:06:32.91,0:06:37.82,Default,,0000,0000,0000,,internal statistics about the number of\Npeople connecting over the TOR network Dialogue: 0,0:06:37.82,0:06:42.28,Default,,0000,0000,0000,,to Facebook. And it would be super\Ncool to super impose these two graphs. Dialogue: 0,0:06:42.28,0:06:45.75,Default,,0000,0000,0000,,Our data is public and open\Nand we like sharing it. Dialogue: 0,0:06:45.75,0:06:49.52,Default,,0000,0000,0000,,They don’t actually share their data.\NBut one day it would be really cool Dialogue: 0,0:06:49.52,0:06:53.11,Default,,0000,0000,0000,,to be able to see both of these\Ngraphs at once, to see users shifting Dialogue: 0,0:06:53.11,0:06:57.26,Default,,0000,0000,0000,,from reaching Facebook\Ndirectly to going over TOR. Dialogue: 0,0:06:57.26,0:07:00.05,Default,,0000,0000,0000,,The other interesting thing from the\NBangladesh side: I was looking at the Dialogue: 0,0:07:00.05,0:07:04.50,Default,,0000,0000,0000,,Alexa top websites around the\Nworld and we, torproject.org is Dialogue: 0,0:07:04.50,0:07:08.54,Default,,0000,0000,0000,,like 8000th in the global\Nrankings, but at least Dialogue: 0,0:07:08.54,0:07:11.65,Default,,0000,0000,0000,,for the past couple of weeks\Ntorproject.org has been Dialogue: 0,0:07:11.65,0:07:16.85,Default,,0000,0000,0000,,300th in Bangladesh. So there are a\Nwhole heck of a lot of people there, Dialogue: 0,0:07:16.85,0:07:22.89,Default,,0000,0000,0000,,learning about these privacy things\Nthat can get around local censorship. Dialogue: 0,0:07:22.89,0:07:28.29,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:07:28.29,0:07:32.27,Default,,0000,0000,0000,,OK, and then an exciting\Nother story that we’re Dialogue: 0,0:07:32.27,0:07:35.90,Default,,0000,0000,0000,,going to touch on briefly, but\Nit’s an entire talk on its own. Dialogue: 0,0:07:35.90,0:07:40.44,Default,,0000,0000,0000,,So let me give you a couple\Nof facts and we’ll go from there. Dialogue: 0,0:07:40.44,0:07:44.07,Default,,0000,0000,0000,,January of 2014 a hundred\Nrelays showed up Dialogue: 0,0:07:44.07,0:07:47.70,Default,,0000,0000,0000,,in the TOR network and we weren’t sure\Nwho was running them, but they weren’t Dialogue: 0,0:07:47.70,0:07:52.16,Default,,0000,0000,0000,,exit relays, so they didn’t seem like\Nthey were such a threat at the time. Dialogue: 0,0:07:52.16,0:07:57.84,Default,,0000,0000,0000,,Fast forward a while later: The\NCERT organization inside CMU Dialogue: 0,0:07:57.84,0:08:01.93,Default,,0000,0000,0000,,submitted a presentation to\NBlackhat on how cool they were Dialogue: 0,0:08:01.93,0:08:05.94,Default,,0000,0000,0000,,for being able to attack TOR users. And\Nthey talked about how they were going to Dialogue: 0,0:08:05.94,0:08:09.61,Default,,0000,0000,0000,,talk about individual users\Nthat they de-anonymized Dialogue: 0,0:08:09.61,0:08:12.99,Default,,0000,0000,0000,,and how cool they were for that.\NAnd I spent a while trying to extract Dialogue: 0,0:08:12.99,0:08:17.48,Default,,0000,0000,0000,,details from them. And eventually\NI learned what their attack was. Dialogue: 0,0:08:17.48,0:08:21.17,Default,,0000,0000,0000,,And then Nick Mathewson, one of\Nthe other TOR developers decided Dialogue: 0,0:08:21.17,0:08:25.05,Default,,0000,0000,0000,,to check the TOR network to see if\Nanybody was actually doing that attack. Dialogue: 0,0:08:25.05,0:08:29.10,Default,,0000,0000,0000,,I mean it’s CERT, they are the\Nfolks who publicised the phrase Dialogue: 0,0:08:29.10,0:08:33.06,Default,,0000,0000,0000,,“responsible disclosure”. Surely,\Nthey are not actually undermining Dialogue: 0,0:08:33.06,0:08:36.68,Default,,0000,0000,0000,,the TOR network and attacking TOR users.\NBut then it turns out that somebody was Dialogue: 0,0:08:36.68,0:08:40.88,Default,,0000,0000,0000,,doing the attack. And it was these\N100 relays that looked kind of ordinary Dialogue: 0,0:08:40.88,0:08:44.76,Default,,0000,0000,0000,,and innocuous before that. Then I sent\Nmail to the CERT people, saying: Dialogue: 0,0:08:44.76,0:08:48.54,Default,,0000,0000,0000,,“Hey are those relays yours?” And they\Nwent silent. They have never answered any Dialogue: 0,0:08:48.54,0:08:54.27,Default,,0000,0000,0000,,of my mails since then. So that’s\Nwhat we know. It doesn’t look good. Dialogue: 0,0:08:54.27,0:08:58.01,Default,,0000,0000,0000,,One of the key things that we,\NTOR, have done from here is Dialogue: 0,0:08:58.01,0:09:01.46,Default,,0000,0000,0000,,we’ve been working on strengthening\Nthe TOR network and getting better Dialogue: 0,0:09:01.46,0:09:05.39,Default,,0000,0000,0000,,at recognizing these things. So\Nthe core of the attack was that Dialogue: 0,0:09:05.39,0:09:09.15,Default,,0000,0000,0000,,they did what’s called a Sybil attack,\Nwhere you sign up a lot of relays Dialogue: 0,0:09:09.15,0:09:13.45,Default,,0000,0000,0000,,and you become too large a fraction of the\NTOR network. So we’ve been working on Dialogue: 0,0:09:13.45,0:09:18.34,Default,,0000,0000,0000,,a lot of ways to recognize that\Nan attack like that is happening, Dialogue: 0,0:09:18.34,0:09:22.14,Default,,0000,0000,0000,,and mitigate it, and get rid of it\Nearly. For example Philipp Winter Dialogue: 0,0:09:22.14,0:09:26.82,Default,,0000,0000,0000,,has a bunch of interesting research\Nareas on recognizing similarity Dialogue: 0,0:09:26.82,0:09:30.67,Default,,0000,0000,0000,,between relays. So you can\Nautomatically start detecting: Dialogue: 0,0:09:30.67,0:09:33.92,Default,,0000,0000,0000,,“Wait a minute, this event\Nhappened, where a lot of relays Dialogue: 0,0:09:33.92,0:09:38.48,Default,,0000,0000,0000,,are more similar than they should\Nbe.” Another example there is: Dialogue: 0,0:09:38.48,0:09:41.61,Default,,0000,0000,0000,,We used to say: “Well I don’t\Nknow who’s running them, Dialogue: 0,0:09:41.61,0:09:45.40,Default,,0000,0000,0000,,but they don’t seem that dangerous. So\NOK, it’s good to grow the TOR network.” Dialogue: 0,0:09:45.40,0:09:48.94,Default,,0000,0000,0000,,Now we’re taking the other\Napproach of “Gosh, that’s weird, Dialogue: 0,0:09:48.94,0:09:52.47,Default,,0000,0000,0000,,let’s get rid of them and then\Nwe’ll ask questions after that.” Dialogue: 0,0:09:52.47,0:09:56.01,Default,,0000,0000,0000,,So we’re trying to be more\Naggressive, more conservative Dialogue: 0,0:09:56.01,0:09:59.88,Default,,0000,0000,0000,,at keeping the TOR network\Nsafe from large adversaries. Dialogue: 0,0:09:59.88,0:10:04.62,Default,,0000,0000,0000,,Whether they’re government organizations\Nor corporations or individuals. Dialogue: 0,0:10:04.62,0:10:12.03,Default,,0000,0000,0000,,Whoever might be attacking it. Dialogue: 0,0:10:12.03,0:10:17.22,Default,,0000,0000,0000,,Jacob: We’ve had a few really big\Nchanges in the TOR community. Dialogue: 0,0:10:17.22,0:10:20.61,Default,,0000,0000,0000,,One of them is that we had\Nan Interim Executive Director Dialogue: 0,0:10:20.61,0:10:25.93,Default,,0000,0000,0000,,come on in a sort of quick moment\Nand that’s Roger Dingledine. Dialogue: 0,0:10:25.93,0:10:28.85,Default,,0000,0000,0000,,Some of you probably always thought he\Nwas the Executive Director the whole time. Dialogue: 0,0:10:28.85,0:10:33.28,Default,,0000,0000,0000,,That’s because for a while he was and then\Nhe wasn’t. And then he was back again. Dialogue: 0,0:10:33.28,0:10:37.49,Default,,0000,0000,0000,,And that change was quite a\Nhuge change in that instead of Dialogue: 0,0:10:37.49,0:10:41.19,Default,,0000,0000,0000,,working on a lot of anonymity stuff,\NRoger was doing a lot of bureaucratic Dialogue: 0,0:10:41.19,0:10:44.52,Default,,0000,0000,0000,,paperwork which was actually quite\Nsad for the anonymity world, I think. Dialogue: 0,0:10:44.52,0:10:48.16,Default,,0000,0000,0000,,He probably reviewed fewer papers\Nand did fewer anonymity things Dialogue: 0,0:10:48.16,0:10:51.79,Default,,0000,0000,0000,,this year than ever before.\NWhich is really, really sad. Dialogue: 0,0:10:51.79,0:10:55.05,Default,,0000,0000,0000,,But that really lit a fire under us to\Nmake sure that we would actually Dialogue: 0,0:10:55.05,0:10:58.84,Default,,0000,0000,0000,,change that. To make sure that it was\Npossible to get someone else, who is Dialogue: 0,0:10:58.84,0:11:02.40,Default,,0000,0000,0000,,really good at being an Executive Director\Nof the TOR Project, to really lead, Dialogue: 0,0:11:02.40,0:11:06.46,Default,,0000,0000,0000,,so that we could have Roger return to\Nnot only being an anonymity researcher, Dialogue: 0,0:11:06.46,0:11:09.24,Default,,0000,0000,0000,,but also the true Spirit\NAnimal of the TOR Project. Dialogue: 0,0:11:09.24,0:11:13.44,Default,,0000,0000,0000,,He doesn’t look like\Nan onion, but in spirit. Dialogue: 0,0:11:13.44,0:11:19.54,Default,,0000,0000,0000,,Roger: Slide!\NJacob: {\i1}laughing{\i0} Dialogue: 0,0:11:19.54,0:11:22.33,Default,,0000,0000,0000,,Another really big thing that happened\Nis working with Laura Poitras Dialogue: 0,0:11:22.33,0:11:27.80,Default,,0000,0000,0000,,over the last many years.\NShe has followed the TOR Project Dialogue: 0,0:11:27.80,0:11:31.13,Default,,0000,0000,0000,,– lots of people like to follow the\Npeople on the TOR Project – Dialogue: 0,0:11:31.13,0:11:35.64,Default,,0000,0000,0000,,but we consented to her following us.\NAnd she made a film, “Citizenfour”, Dialogue: 0,0:11:35.64,0:11:39.00,Default,,0000,0000,0000,,I think some of you… have\Nany of you seen this film? Dialogue: 0,0:11:39.00,0:11:45.17,Default,,0000,0000,0000,,{\i1}applause{\i0}\NQuite amazingly, Dialogue: 0,0:11:45.17,0:11:48.50,Default,,0000,0000,0000,,she won an Oscar. Actually, she\Nbasically won every film prize. Dialogue: 0,0:11:48.50,0:11:57.27,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:11:57.27,0:12:01.17,Default,,0000,0000,0000,,One of the key things is that people\Nin this room that work on Free Software Dialogue: 0,0:12:01.17,0:12:04.82,Default,,0000,0000,0000,,were explicitly thanked. If you work\Non Tails, if you work on GnuPG, Dialogue: 0,0:12:04.82,0:12:08.65,Default,,0000,0000,0000,,if you work on SecureDrop,\NOTR, TOR, … Dialogue: 0,0:12:08.65,0:12:11.46,Default,,0000,0000,0000,,She specifically said in\Nthe credits of the film: Dialogue: 0,0:12:11.46,0:12:15.49,Default,,0000,0000,0000,,This film wouldn’t have been\Npossible without that Free Software. Dialogue: 0,0:12:15.49,0:12:18.94,Default,,0000,0000,0000,,Actually making her job and\Nthe jobs of her source Dialogue: 0,0:12:18.94,0:12:22.00,Default,,0000,0000,0000,,and other people involved…\Nmaking that possible. Dialogue: 0,0:12:22.00,0:12:25.75,Default,,0000,0000,0000,,And so her winning that Oscar\Nin some sense feels like Dialogue: 0,0:12:25.75,0:12:29.48,Default,,0000,0000,0000,,closing a really big loop that had\Nbeen open for a very long time. Dialogue: 0,0:12:29.48,0:12:33.00,Default,,0000,0000,0000,,And it’s really great and she,\NI think, would really wish that she Dialogue: 0,0:12:33.00,0:12:37.66,Default,,0000,0000,0000,,could be here today, again. She\Nsends her regards, and she is really, Dialogue: 0,0:12:37.66,0:12:42.47,Default,,0000,0000,0000,,really thankful for everybody here that\Nwrites Free Software for freedom! Dialogue: 0,0:12:42.47,0:12:47.91,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:12:47.91,0:12:51.64,Default,,0000,0000,0000,,Roger: So another exciting event\Nthat happened in 2015 is that reddit Dialogue: 0,0:12:51.64,0:12:55.66,Default,,0000,0000,0000,,gave us 83.000$. They had some\Nextra profit and they decided Dialogue: 0,0:12:55.66,0:13:00.84,Default,,0000,0000,0000,,that they would give it to 10 non-profits\Nchosen from among the Redditer community. Dialogue: 0,0:13:00.84,0:13:03.84,Default,,0000,0000,0000,,And there were people who came to me\Nand said: “Hey Roger, you really have to, Dialogue: 0,0:13:03.84,0:13:06.94,Default,,0000,0000,0000,,you know, start advocating, start\Nteaching everybody, why TOR should be Dialogue: 0,0:13:06.94,0:13:10.29,Default,,0000,0000,0000,,one of them.” And I said: “Oh, I’m\Nbusy. Those things never work. Dialogue: 0,0:13:10.29,0:13:13.81,Default,,0000,0000,0000,,You know, they’ll choose somebody\Nelse.” And so it turns out that we were Dialogue: 0,0:13:13.81,0:13:18.55,Default,,0000,0000,0000,,the 10th out of 10 without doing\Nany advocacy work whatsoever Dialogue: 0,0:13:18.55,0:13:22.51,Default,,0000,0000,0000,,to the reddit community, which is super\Ncool that they care about us so much. Dialogue: 0,0:13:22.51,0:13:27.09,Default,,0000,0000,0000,,Also reddit divided the ten equally. So\Neven though we were the 10th out of 10, Dialogue: 0,0:13:27.09,0:13:31.20,Default,,0000,0000,0000,,we got 10% of the donations\Nthat they were giving out. Dialogue: 0,0:13:31.20,0:13:37.87,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:13:37.87,0:13:41.15,Default,,0000,0000,0000,,Jake: One of the really –\NI would say one of the oddest things Dialogue: 0,0:13:41.15,0:13:46.12,Default,,0000,0000,0000,,about working at the TOR Project for me\Nis that TOR has supported me through Dialogue: 0,0:13:46.12,0:13:49.63,Default,,0000,0000,0000,,really crazy times. So when I was\Nbeing detained by the US Government Dialogue: 0,0:13:49.63,0:13:54.55,Default,,0000,0000,0000,,or having my property stolen by fascist\Npigs in the United States Government’s Dialogue: 0,0:13:54.55,0:13:59.33,Default,,0000,0000,0000,,border checkpoints, TOR didn’t fire me.\NTOR always backed me and always Dialogue: 0,0:13:59.33,0:14:03.38,Default,,0000,0000,0000,,kept me safe. And many people often look\Nlike they wanted to kill me from stress, Dialogue: 0,0:14:03.38,0:14:06.39,Default,,0000,0000,0000,,but often they didn’t, which was nice.\NOr they didn’t get close enough Dialogue: 0,0:14:06.39,0:14:10.67,Default,,0000,0000,0000,,and I could move fast enough. But\Nthey were always very helpful. And Dialogue: 0,0:14:10.67,0:14:14.95,Default,,0000,0000,0000,,they’ve really helped me to\Ngo and do things to speak for Dialogue: 0,0:14:14.95,0:14:18.43,Default,,0000,0000,0000,,anonymous users who can’t go\Nother places. And one of the places Dialogue: 0,0:14:18.43,0:14:22.22,Default,,0000,0000,0000,,which I was most honored to go in the\Nlast year – I was actually scheduled Dialogue: 0,0:14:22.22,0:14:25.57,Default,,0000,0000,0000,,to go there with Caspar Bowden, but\Nunfortunately he was ill at the time. Dialogue: 0,0:14:25.57,0:14:29.90,Default,,0000,0000,0000,,And as you know, Caspar\Nhas since passed away. Dialogue: 0,0:14:29.90,0:14:32.100,Default,,0000,0000,0000,,But we were scheduled to go together and\NTOR was supporting us both, actually, Dialogue: 0,0:14:32.100,0:14:38.32,Default,,0000,0000,0000,,to go to this. And it resulted, I believe, Dialogue: 0,0:14:38.32,0:14:41.52,Default,,0000,0000,0000,,in a very amazing meeting in\NGeneva at the United Nations, Dialogue: 0,0:14:41.52,0:14:45.78,Default,,0000,0000,0000,,where the special rapporteur actually\Nendorsed TOR and off-the-record messaging Dialogue: 0,0:14:45.78,0:14:49.73,Default,,0000,0000,0000,,and encryption programs,\Nand privacy, and free software. Dialogue: 0,0:14:49.73,0:14:54.68,Default,,0000,0000,0000,,Saying that they are absolutely essential.\NAnd in fact their use should be encouraged Dialogue: 0,0:14:54.68,0:14:59.63,Default,,0000,0000,0000,,from a human rights perspective. And in\Nfact the really amazing part about it is Dialogue: 0,0:14:59.63,0:15:03.65,Default,,0000,0000,0000,,he didn’t do it only from the perspective\Nof free speech. And this is important, Dialogue: 0,0:15:03.65,0:15:07.14,Default,,0000,0000,0000,,because actually there are other rights.\NAnd we should think about them. Dialogue: 0,0:15:07.14,0:15:10.37,Default,,0000,0000,0000,,So for example the right to form\Nand to hold an idea is a right Dialogue: 0,0:15:10.37,0:15:14.08,Default,,0000,0000,0000,,that cannot be abridged. The right\Nto free speech can be abridged Dialogue: 0,0:15:14.08,0:15:18.59,Default,,0000,0000,0000,,in many free societies, but what is\Nin your head and how you form it Dialogue: 0,0:15:18.59,0:15:22.04,Default,,0000,0000,0000,,is something where… that is not\Na right that can be abridged. Dialogue: 0,0:15:22.04,0:15:25.58,Default,,0000,0000,0000,,And he wrote this in the report. And\Nhe, when writing this report with Dialogue: 0,0:15:25.58,0:15:29.90,Default,,0000,0000,0000,,many other people, made it very clear that\Nthis is something we need to keep in mind. Dialogue: 0,0:15:29.90,0:15:34.25,Default,,0000,0000,0000,,That when we talk about private spaces\Nonline, where groups may collaborate Dialogue: 0,0:15:34.25,0:15:37.85,Default,,0000,0000,0000,,to form ideas, to be able to create\Na political platform for example, Dialogue: 0,0:15:37.85,0:15:41.22,Default,,0000,0000,0000,,to be able to make democratic change,\Nthey need to be able to use the internet Dialogue: 0,0:15:41.22,0:15:46.32,Default,,0000,0000,0000,,to freely exchange those ideas in a secure\Nand anonymized, encrypted fashion. Dialogue: 0,0:15:46.32,0:15:50.89,Default,,0000,0000,0000,,And that helps them to form and to hold\Nideas. And obviously that helps them later Dialogue: 0,0:15:50.89,0:15:55.47,Default,,0000,0000,0000,,to express free speech ideas. And that’s\Na huge thing to have the United Nations Dialogue: 0,0:15:55.47,0:16:02.41,Default,,0000,0000,0000,,endorse basically what many of us in this\Nroom have been saying for, well… decades. Dialogue: 0,0:16:02.41,0:16:05.46,Default,,0000,0000,0000,,Roger: So the UN thing is really cool.\NWe’ve also been doing some other Dialogue: 0,0:16:05.46,0:16:09.88,Default,,0000,0000,0000,,policy angles. So Steven Murdoch, who\Nis a professor in England and also Dialogue: 0,0:16:09.88,0:16:14.35,Default,,0000,0000,0000,,part of the TOR community, has worked\Nreally hard at teaching the British folks, Dialogue: 0,0:16:14.35,0:16:18.49,Default,,0000,0000,0000,,that their new backdoor laws and\Ntheir new terrible laws are actually Dialogue: 0,0:16:18.49,0:16:23.24,Default,,0000,0000,0000,,not what any reasonable country wants.\NSo he’s put a huge amount of energy into Dialogue: 0,0:16:23.24,0:16:27.68,Default,,0000,0000,0000,,basically advocating for freedom for\Nthem. And similarly Paul Syverson, Dialogue: 0,0:16:27.68,0:16:32.57,Default,,0000,0000,0000,,part of the TOR community, basically\Nended up writing a post note for the UK Dialogue: 0,0:16:32.57,0:16:36.79,Default,,0000,0000,0000,,about how the dark web is\Nmisunderstood. See previous talk. Dialogue: 0,0:16:36.79,0:16:40.68,Default,,0000,0000,0000,,So we’ve been doing quite a bit\Nof education at the policy level Dialogue: 0,0:16:40.68,0:16:44.91,Default,,0000,0000,0000,,to try to teach the world, that encryption\Nis good and safe and worthwhile Dialogue: 0,0:16:44.91,0:16:50.07,Default,,0000,0000,0000,,and should be the default\Naround the world. Dialogue: 0,0:16:50.07,0:16:54.05,Default,,0000,0000,0000,,Jake: And there is a kind of interesting\Nthing here. Maybe a little contentious Dialogue: 0,0:16:54.05,0:16:57.28,Default,,0000,0000,0000,,with some people in the TOR community.\NBut I just wanted to make it really clear. Dialogue: 0,0:16:57.28,0:17:01.17,Default,,0000,0000,0000,,We have the TOR Project, which is\Na non-profit in the United States. Dialogue: 0,0:17:01.17,0:17:04.57,Default,,0000,0000,0000,,And we have a much wider TOR\Ncommunity all around the world. Dialogue: 0,0:17:04.57,0:17:07.95,Default,,0000,0000,0000,,And in Berlin we have a really, really\Nlike an incredible TOR community. Dialogue: 0,0:17:07.95,0:17:11.38,Default,,0000,0000,0000,,We have people like Donncha working\Non OnionBalance. We have people like Dialogue: 0,0:17:11.38,0:17:14.81,Default,,0000,0000,0000,,Leif Ryge working on bananaphone. We\Nhave all of these different people working Dialogue: 0,0:17:14.81,0:17:17.97,Default,,0000,0000,0000,,on all sorts of Free Software. And many\Nof those people don’t actually work Dialogue: 0,0:17:17.97,0:17:21.24,Default,,0000,0000,0000,,for the TOR Project. They’re community\Nmembers, they’re volunteers, Dialogue: 0,0:17:21.24,0:17:26.01,Default,,0000,0000,0000,,there is some of privacy students.\NAnd so the Renewable Freedom Foundation Dialogue: 0,0:17:26.01,0:17:30.05,Default,,0000,0000,0000,,actually funded the creation\Nof a sort of separate space Dialogue: 0,0:17:30.05,0:17:33.98,Default,,0000,0000,0000,,in Berlin where people work on these\Nkinds of things, which is not affiliated Dialogue: 0,0:17:33.98,0:17:38.10,Default,,0000,0000,0000,,with US Government money. It’s\Nnot affiliated with the TOR Project Dialogue: 0,0:17:38.10,0:17:41.36,Default,,0000,0000,0000,,as some sort of corporate thing.\NIt’s not a multinational thing. Dialogue: 0,0:17:41.36,0:17:46.63,Default,,0000,0000,0000,,It’s really the peer-to-peer version in\Nsome sense of what we’ve already had Dialogue: 0,0:17:46.63,0:17:49.65,Default,,0000,0000,0000,,in other places. And it’s really great\Nand I wanted to just thank Moritz Dialogue: 0,0:17:49.65,0:17:54.35,Default,,0000,0000,0000,,who made that happen and to all the\Npeople like Aaron Gibson, and Juris Dialogue: 0,0:17:54.35,0:17:57.90,Default,,0000,0000,0000,,who actually put that space together\Nand made it possible. So in Berlin, Dialogue: 0,0:17:57.90,0:18:01.74,Default,,0000,0000,0000,,there is a space, not just c-base,\Nnot just CCCB, but actually Dialogue: 0,0:18:01.74,0:18:05.60,Default,,0000,0000,0000,,a place which is about anonymity.\NIt’s called Zwiebelraum. Dialogue: 0,0:18:05.60,0:18:09.43,Default,,0000,0000,0000,,And this is a place in which people are\Nworking on this Free Software. And they Dialogue: 0,0:18:09.43,0:18:12.34,Default,,0000,0000,0000,,are doing it in an independent manner.\NAnd we hope actually that people will Dialogue: 0,0:18:12.34,0:18:16.40,Default,,0000,0000,0000,,come together and support that, because\Nwe need more spaces like that, that Dialogue: 0,0:18:16.40,0:18:20.67,Default,,0000,0000,0000,,are not directly affiliated with the TOR\NProject, necessarily, but where we have Dialogue: 0,0:18:20.67,0:18:24.28,Default,,0000,0000,0000,,an aligned mission about reproduceable\Nbuilds in Free Software and also Dialogue: 0,0:18:24.28,0:18:29.30,Default,,0000,0000,0000,,about anonymity and actually about caring\Nabout Free Speech. And actually making Dialogue: 0,0:18:29.30,0:18:33.11,Default,,0000,0000,0000,,it happen. And really building spaces\Nlike that all around the world. So if you Dialogue: 0,0:18:33.11,0:18:36.14,Default,,0000,0000,0000,,have a place in your town where you want\Nto work on those things, we would really Dialogue: 0,0:18:36.14,0:18:40.34,Default,,0000,0000,0000,,hope that you will work on building that.\NI called it “general cipher punkery”. Dialogue: 0,0:18:40.34,0:18:44.30,Default,,0000,0000,0000,,I feel like that’s a good description.\NThere’s lots of stuff to be done. Dialogue: 0,0:18:44.30,0:18:48.94,Default,,0000,0000,0000,,And now for a Marxist joke: So we\Ndiscovered the division of labor, Dialogue: 0,0:18:48.94,0:18:52.57,Default,,0000,0000,0000,,which was a really important discovery.\NWe’re about 180 years too late, Dialogue: 0,0:18:52.57,0:18:58.31,Default,,0000,0000,0000,,but we started to split up where it didn’t\Ngo very well, the Marxist asked why. Dialogue: 0,0:18:58.31,0:19:02.41,Default,,0000,0000,0000,,Cheers, cheers!\NSo the Vegas Teams are really simple. Dialogue: 0,0:19:02.41,0:19:06.62,Default,,0000,0000,0000,,Basically we have a bunch of people\Nthat previously they did everything. Dialogue: 0,0:19:06.62,0:19:10.13,Default,,0000,0000,0000,,And this really doesn’t work. It’s very\Nstressful and it’s very frustrating Dialogue: 0,0:19:10.13,0:19:14.47,Default,,0000,0000,0000,,and it leads to people doing lots and\Nlots of things in a very unfocused way. Dialogue: 0,0:19:14.47,0:19:18.74,Default,,0000,0000,0000,,And so we split it up! And it actually\Nhappened naturally, it was emergent. Dialogue: 0,0:19:18.74,0:19:24.01,Default,,0000,0000,0000,,So e.g. Mike Perry, who’s gonna talk\Nabout the Applications Team’s work Dialogue: 0,0:19:24.01,0:19:28.28,Default,,0000,0000,0000,,in a second here, he was\Nalready leading this, Dialogue: 0,0:19:28.28,0:19:32.37,Default,,0000,0000,0000,,he was really making this happen. And\Nso we just made it more explicit. And, Dialogue: 0,0:19:32.37,0:19:36.65,Default,,0000,0000,0000,,in fact we created a way of communicating\Nand reporting back so that Dialogue: 0,0:19:36.65,0:19:39.85,Default,,0000,0000,0000,,you don’t have to, like, drink from the\Nfire hose about absolutely everything Dialogue: 0,0:19:39.85,0:19:42.43,Default,,0000,0000,0000,,that’s happening everywhere, but you can\Nsort of tune in to those things, which Dialogue: 0,0:19:42.43,0:19:46.97,Default,,0000,0000,0000,,means we get higher-level understandings\Nand that is a really, incredibly useful Dialogue: 0,0:19:46.97,0:19:49.74,Default,,0000,0000,0000,,thing that has made us much more\Nproductive. And what was part of the Dialogue: 0,0:19:49.74,0:19:53.50,Default,,0000,0000,0000,,growing pains of the last year actually\Nwas figuring out how to make that work Dialogue: 0,0:19:53.50,0:19:57.21,Default,,0000,0000,0000,,because we’re a pretty flat group in terms\Nof a community and a pretty flat group Dialogue: 0,0:19:57.21,0:20:02.06,Default,,0000,0000,0000,,in terms of an organization writing\NFree Software and advocating. Dialogue: 0,0:20:02.06,0:20:06.50,Default,,0000,0000,0000,,And so that’s a really incredibly good\Nthing which will come up all the time. Dialogue: 0,0:20:06.50,0:20:09.77,Default,,0000,0000,0000,,You’ll hear people talking about the\NMetrics Team or the Network Team or the Dialogue: 0,0:20:09.77,0:20:13.65,Default,,0000,0000,0000,,Applications Team or the Community Team.\NAnd that’s what we’re talking about. Dialogue: 0,0:20:13.65,0:20:17.63,Default,,0000,0000,0000,,In that sense. So we tried to formalize it\Nand in some ways we may be moving in a Dialogue: 0,0:20:17.63,0:20:23.84,Default,,0000,0000,0000,,sort of Debian model a little bit. And\Nwe’ll see how that actually goes. So we Dialogue: 0,0:20:23.84,0:20:28.47,Default,,0000,0000,0000,,have a really great person here to\Nexplain the work of the Metrics Team. Dialogue: 0,0:20:28.47,0:20:32.35,Default,,0000,0000,0000,,Roger: OK, so I’m gonna tell you a little\Nbit about what the Metrics Team has been Dialogue: 0,0:20:32.35,0:20:36.57,Default,,0000,0000,0000,,working on lately to give you a\Nsense of some of the components Dialogue: 0,0:20:36.57,0:20:40.89,Default,,0000,0000,0000,,of the TOR community. So there are 5 or\N10 people who work on the Metrics Team. Dialogue: 0,0:20:40.89,0:20:45.35,Default,,0000,0000,0000,,We actually only pay one-ish of them;\Nso most of them are volunteers Dialogue: 0,0:20:45.35,0:20:48.98,Default,,0000,0000,0000,,and that’s… on the one hand that’s great.\NIt’s wonderful that there are researchers Dialogue: 0,0:20:48.98,0:20:53.75,Default,,0000,0000,0000,,all around the world who are contributing\Nand helping to visualize and helping to do Dialogue: 0,0:20:53.75,0:20:57.98,Default,,0000,0000,0000,,analysis on the data. On the other hand\Nit’s sort of sad that we don’t have a full Dialogue: 0,0:20:57.98,0:21:02.53,Default,,0000,0000,0000,,team of full-time people who are working\Non this all the time. So it’d be great Dialogue: 0,0:21:02.53,0:21:07.71,Default,,0000,0000,0000,,to have your assistance\Nworking on this. So, Dialogue: 0,0:21:07.71,0:21:12.43,Default,,0000,0000,0000,,actually Metrics has been accumulating\Nall sorts of analysis tools Dialogue: 0,0:21:12.43,0:21:16.99,Default,,0000,0000,0000,,over the past 5 years. So there are up to\N30 different little tools. There’s Atlas Dialogue: 0,0:21:16.99,0:21:22.41,Default,,0000,0000,0000,,and Globe and Stem and 20-something more\Nwhich is a challenge to keep coordinated, Dialogue: 0,0:21:22.41,0:21:26.69,Default,,0000,0000,0000,,a challenge to keep maintained. So\Nthey’ve been working on how to integrate Dialogue: 0,0:21:26.69,0:21:32.09,Default,,0000,0000,0000,,these things and make them more\Nusable and maintainable and extensible. Dialogue: 0,0:21:32.09,0:21:36.37,Default,,0000,0000,0000,,So one example that they… so they wrote\Nsome slides for me to present here. Dialogue: 0,0:21:36.37,0:21:40.05,Default,,0000,0000,0000,,One example that they were looking\Nat, to give you an example of how Dialogue: 0,0:21:40.05,0:21:45.54,Default,,0000,0000,0000,,this analysis works, is bad relays in the\NTOR network. So maybe that’s an exit relay Dialogue: 0,0:21:45.54,0:21:50.52,Default,,0000,0000,0000,,that runs, but it modifies traffic, or\Nit watches traffic or something. Dialogue: 0,0:21:50.52,0:21:56.15,Default,,0000,0000,0000,,Maybe it’s a relay that signs up\Nas a Hidden Service directory Dialogue: 0,0:21:56.15,0:21:59.97,Default,,0000,0000,0000,,and then when you publish your\Nonion address to it, it goes to visit it Dialogue: 0,0:21:59.97,0:22:04.37,Default,,0000,0000,0000,,or it puts it on a big list or something\Nlike that. Or maybe bad relays are Sybils Dialogue: 0,0:22:04.37,0:22:09.58,Default,,0000,0000,0000,,who – we were talking earlier about\Nthe 2014 attack where a 100 relays Dialogue: 0,0:22:09.58,0:22:14.75,Default,,0000,0000,0000,,showed up at once and we, the directory\Nauthorities have a couple of ways of Dialogue: 0,0:22:14.75,0:22:19.50,Default,,0000,0000,0000,,addressing that relays. One of them is\Neach of the directory authorities can say: Dialogue: 0,0:22:19.50,0:22:22.67,Default,,0000,0000,0000,,“That relay needs to get out of the\Nnetwork! We just cut it out of the Dialogue: 0,0:22:22.67,0:22:27.90,Default,,0000,0000,0000,,network.” We can also say: “Bad exit!”\NWe can also say: “That relay is no longer Dialogue: 0,0:22:27.90,0:22:33.24,Default,,0000,0000,0000,,gonna be used as an exit!” So even though\Nit advertises that it can reach Blockchain Dialogue: 0,0:22:33.24,0:22:39.32,Default,,0000,0000,0000,,and other websites, clients choose not to\Ndo it that way. So that’s the background. Dialogue: 0,0:22:39.32,0:22:44.92,Default,,0000,0000,0000,,One of the tools that Damian wrote a while\Nago is called Tor-Consensus-Health and it Dialogue: 0,0:22:44.92,0:22:49.57,Default,,0000,0000,0000,,looks every hour at the new list of relays\Nin the network and it tries to figure out: Dialogue: 0,0:22:49.57,0:22:53.00,Default,,0000,0000,0000,,“Is there something suspicious that\Njust happened at this point?” And in this Dialogue: 0,0:22:53.00,0:22:57.92,Default,,0000,0000,0000,,case it looks for a bunch of new relays\Nshowing up all at the same time with Dialogue: 0,0:22:57.92,0:23:04.53,Default,,0000,0000,0000,,similar characteristics and it sends email\Nto a list. So that’s useful. The second Dialogue: 0,0:23:04.53,0:23:08.91,Default,,0000,0000,0000,,piece of the analysis is “OK, what do you\Ndo when that happens?” So we get an email Dialogue: 0,0:23:08.91,0:23:13.96,Default,,0000,0000,0000,,saying “Hey, 40 new relays showed up,\Nwhat’s up with that?” So there’s a real Dialogue: 0,0:23:13.96,0:23:18.79,Default,,0000,0000,0000,,challenge there to decide: do we allow\Nthe TOR network to grow – sounds good – Dialogue: 0,0:23:18.79,0:23:23.28,Default,,0000,0000,0000,,or do we wonder who these people are\Nand try to contact them or cut them out of Dialogue: 0,0:23:23.28,0:23:29.60,Default,,0000,0000,0000,,the network or constrain what fraction\Nof the network they can become. Dialogue: 0,0:23:29.60,0:23:35.15,Default,,0000,0000,0000,,So Philipp Winter also has a\Nvisualization, in this case of basically Dialogue: 0,0:23:35.15,0:23:41.31,Default,,0000,0000,0000,,which relays were around on a given month.\NSo the X axis is all of the different Dialogue: 0,0:23:41.31,0:23:46.10,Default,,0000,0000,0000,,relays in the month and the Y axis is each\Nhour during that month. And they’ve sorted Dialogue: 0,0:23:46.10,0:23:51.01,Default,,0000,0000,0000,,the relays here by how much they were\Npresent in the given month. And you’ll Dialogue: 0,0:23:51.01,0:23:55.12,Default,,0000,0000,0000,,notice the red blocks over there are\Nrelays that showed up at the same time Dialogue: 0,0:23:55.12,0:23:59.32,Default,,0000,0000,0000,,and they’d been consistently present at\Nthe same time since then. So that’s kind Dialogue: 0,0:23:59.32,0:24:03.07,Default,,0000,0000,0000,,of suspicious. That’s “Hey, wait a minute,\Nwhat’s that pattern going on there?” Dialogue: 0,0:24:03.07,0:24:07.26,Default,,0000,0000,0000,,So this is a cool way of visualizing and\Nbeing able to drill down and say: Dialogue: 0,0:24:07.26,0:24:10.78,Default,,0000,0000,0000,,“Wait a minute, that pattern right there,\Nsomething weird just happened.” Dialogue: 0,0:24:10.78,0:24:14.47,Default,,0000,0000,0000,,So part of the challenge in general for\Nthe Metrics Team is: they have a Terabyte Dialogue: 0,0:24:14.47,0:24:18.35,Default,,0000,0000,0000,,of interesting data of what the network\Nhas looked like over the years – Dialogue: 0,0:24:18.35,0:24:23.65,Default,,0000,0000,0000,,how do you turn that into “Wait a minute,\Nthat right there is something mysterious Dialogue: 0,0:24:23.65,0:24:27.32,Default,,0000,0000,0000,,that just happened. Let’s look at it\Nmore.” So you can look at it from Dialogue: 0,0:24:27.32,0:24:31.65,Default,,0000,0000,0000,,the visualization side but you can also\N– there’s a tool called Onionoo where Dialogue: 0,0:24:31.65,0:24:35.29,Default,,0000,0000,0000,,you can basically query it, all sorts\Nof queries in it, it dumps the data Dialogue: 0,0:24:35.29,0:24:39.94,Default,,0000,0000,0000,,back on to you. So we’ve got a Terabyte\Nof interesting data out there, what Dialogue: 0,0:24:39.94,0:24:44.81,Default,,0000,0000,0000,,the relays are on the network, what\Nsort of statistics they been reporting, Dialogue: 0,0:24:44.81,0:24:48.93,Default,,0000,0000,0000,,when they’re up, when they’re down,\Nwhether they change keys a lot, Dialogue: 0,0:24:48.93,0:24:55.08,Default,,0000,0000,0000,,whether they change IP addresses a lot.\NSo we encourage you to investigate and Dialogue: 0,0:24:55.08,0:24:59.41,Default,,0000,0000,0000,,look at these tools etc. So there’s\Na new website we set up this year Dialogue: 0,0:24:59.41,0:25:05.18,Default,,0000,0000,0000,,called CollecTor, collector.torproject.org\Nthat has all of these different data sets Dialogue: 0,0:25:05.18,0:25:09.27,Default,,0000,0000,0000,,and pointers to all these different\Nlibraries and tools etc. that you too Dialogue: 0,0:25:09.27,0:25:15.03,Default,,0000,0000,0000,,can use to investigate, graph-visualize\Netc. So here’s another example. Dialogue: 0,0:25:15.03,0:25:19.28,Default,,0000,0000,0000,,At this point we’re looking at the 9\Ndirectory authorities in the network. Dialogue: 0,0:25:19.28,0:25:24.62,Default,,0000,0000,0000,,Each of them votes its opinion about\Neach relay. So whether the relay’s fast, Dialogue: 0,0:25:24.62,0:25:31.06,Default,,0000,0000,0000,,or stable, or looks like a good exit or\Nmaybe we should vote about “Bad Exit” Dialogue: 0,0:25:31.06,0:25:35.85,Default,,0000,0000,0000,,for it. So the grey lines are: all of the\Ndirectory authorities thought that Dialogue: 0,0:25:35.85,0:25:41.12,Default,,0000,0000,0000,,it didn’t deserve the flag and it’s very\Nclear. The green lines are: enough of the Dialogue: 0,0:25:41.12,0:25:45.31,Default,,0000,0000,0000,,directory authorities said that the relay\Nshould get the flag, also very clear. Dialogue: 0,0:25:45.31,0:25:49.96,Default,,0000,0000,0000,,And all the brown and light green etc.\Nin the middle are contradictions. Dialogue: 0,0:25:49.96,0:25:53.29,Default,,0000,0000,0000,,That’s where some of the directory\Nauthorities said “Yes it’s fast” and some Dialogue: 0,0:25:53.29,0:25:58.71,Default,,0000,0000,0000,,of them said “No, it’s not fast”. And this\Ngives us a visualization, a way to see Dialogue: 0,0:25:58.71,0:26:02.80,Default,,0000,0000,0000,,whether most of the directory authorities\Nare agreeing with each other. Dialogue: 0,0:26:02.80,0:26:06.29,Default,,0000,0000,0000,,We should look at this over time and if\Nsuddenly there’s a huge brown area Dialogue: 0,0:26:06.29,0:26:10.93,Default,,0000,0000,0000,,then we can say “Wait a minute,\Nsomething’s going on”, where maybe Dialogue: 0,0:26:10.93,0:26:15.08,Default,,0000,0000,0000,,a set of relays are trying to look good to\Nthese directory authorities and trying Dialogue: 0,0:26:15.08,0:26:19.70,Default,,0000,0000,0000,,not to look good to these. So basically\Nit helps us to recognize patterns Dialogue: 0,0:26:19.70,0:26:26.07,Default,,0000,0000,0000,,of weird things going on. So on CollecTor\Nyou can find all sorts of data sets Dialogue: 0,0:26:26.07,0:26:32.69,Default,,0000,0000,0000,,and you can fetch them and do your\Nanalysis of them. And Tor Metrics Dialogue: 0,0:26:32.69,0:26:38.28,Default,,0000,0000,0000,,– metrics.torproject.org – has a bunch of\Nexamples of this analysis, where you can Dialogue: 0,0:26:38.28,0:26:42.43,Default,,0000,0000,0000,,look at graphs of the number of people\Nconnecting from different countries, the Dialogue: 0,0:26:42.43,0:26:46.70,Default,,0000,0000,0000,,number of relays over time, the number\Nof new relays, the number of bridges, Dialogue: 0,0:26:46.70,0:26:52.53,Default,,0000,0000,0000,,users connecting to bridges etc. There\Nare 3 different libraries that help you Dialogue: 0,0:26:52.53,0:26:56.21,Default,,0000,0000,0000,,to parse these various data sets. So\Nthere’s one in Python, one in Java, Dialogue: 0,0:26:56.21,0:27:01.16,Default,,0000,0000,0000,,one in Go; so whichever one of those\Nyou enjoy most you can grab and start Dialogue: 0,0:27:01.16,0:27:07.86,Default,,0000,0000,0000,,doing analysis. They do weekly or so\NIRC meetings, so the TOR Metrics Team Dialogue: 0,0:27:07.86,0:27:11.95,Default,,0000,0000,0000,,invites you to show up on January 7th\Nand they would love to have your help. Dialogue: 0,0:27:11.95,0:27:15.34,Default,,0000,0000,0000,,They have a bunch of really interesting\Ndata, they have a bunch of really Dialogue: 0,0:27:15.34,0:27:21.46,Default,,0000,0000,0000,,interesting analysis tools and they’re\Nmissing curious people. So show up, Dialogue: 0,0:27:21.46,0:27:25.24,Default,,0000,0000,0000,,start asking questions about the data, try\Nto learn what’s going on. And you can Dialogue: 0,0:27:25.24,0:27:28.30,Default,,0000,0000,0000,,learn more about them, on\Nthe Metrics Team, there. Dialogue: 0,0:27:28.30,0:27:32.06,Default,,0000,0000,0000,,And then I’m gonna pass it on to Mike. Dialogue: 0,0:27:32.06,0:27:38.72,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:27:38.72,0:27:43.75,Default,,0000,0000,0000,,Mike: OK, so Hello everyone! So, I’ll be\Ntelling ’bout the Applications Team part Dialogue: 0,0:27:43.75,0:27:48.60,Default,,0000,0000,0000,,of the Vegas plan that\NJake introduced. Basically, Dialogue: 0,0:27:48.60,0:27:54.06,Default,,0000,0000,0000,,the Applications Team was created to\Nbring together all the aspects of TOR Dialogue: 0,0:27:54.06,0:27:58.50,Default,,0000,0000,0000,,and the extended community that are\Nworking on anything that’s user facing. Dialogue: 0,0:27:58.50,0:28:02.89,Default,,0000,0000,0000,,So anything with a user interface that\Nthe user will directly interact with, Dialogue: 0,0:28:02.89,0:28:08.55,Default,,0000,0000,0000,,that’s an application on\Neither Mobile or Desktop. Dialogue: 0,0:28:08.55,0:28:13.02,Default,,0000,0000,0000,,So to start, obviously we had the\NTOR Browser, that’s sort of like Dialogue: 0,0:28:13.02,0:28:18.62,Default,,0000,0000,0000,,a flagship application that most people\Nare familiar with when they think of TOR. Dialogue: 0,0:28:18.62,0:28:22.99,Default,,0000,0000,0000,,Recently we’ve added OrFox which is a\Nproject by the Guardianproject to port Dialogue: 0,0:28:22.99,0:28:28.05,Default,,0000,0000,0000,,the TOR Browser patches to Android\Nand that’s currently in Alpha Status. But Dialogue: 0,0:28:28.05,0:28:34.19,Default,,0000,0000,0000,,it’s available on the Guardianproject’s\NF-Droid Repo. We also have 2 chat clients: Dialogue: 0,0:28:34.19,0:28:39.02,Default,,0000,0000,0000,,TorMessenger and Ricochet and both with\Ndifferent security properties. I will be Dialogue: 0,0:28:39.02,0:28:44.29,Default,,0000,0000,0000,,getting to it later. So I guess, first\Noff let’s talk about what happened Dialogue: 0,0:28:44.29,0:28:51.07,Default,,0000,0000,0000,,in the TOR Browser world in 2015.\NBasically most of the, or a good deal Dialogue: 0,0:28:51.07,0:28:56.52,Default,,0000,0000,0000,,of our work is spent keeping up\Nwith the Firefox release treadmill. Dialogue: 0,0:28:56.52,0:29:01.62,Default,,0000,0000,0000,,That includes responding\Nto emergency releases, Dialogue: 0,0:29:01.62,0:29:06.73,Default,,0000,0000,0000,,auditing changes in the Firefox code\Nbase making sure that their features Dialogue: 0,0:29:06.73,0:29:10.94,Default,,0000,0000,0000,,adhere to our privacy model and making\Nsure that our releases come out Dialogue: 0,0:29:10.94,0:29:15.06,Default,,0000,0000,0000,,the same day as the official\NFirefox releases so that there’s Dialogue: 0,0:29:15.06,0:29:20.13,Default,,0000,0000,0000,,no vulnerability exposure to known\Nvulnerabilities after they’re disclosed. Dialogue: 0,0:29:20.13,0:29:24.87,Default,,0000,0000,0000,,That has been a little bit rough to over\N2015. I believe there is a solid 3..4 Dialogue: 0,0:29:24.87,0:29:29.50,Default,,0000,0000,0000,,months where it felt like we were doing\Na release every 2 weeks. Due to either Dialogue: 0,0:29:29.50,0:29:38.88,Default,,0000,0000,0000,,log jam or random unassessed\Nvulnerability or any arbitrary Dialogue: 0,0:29:38.88,0:29:43.62,Default,,0000,0000,0000,,security issue with Firefox. But we did…\Ndespite treading all that water we did Dialogue: 0,0:29:43.62,0:29:48.71,Default,,0000,0000,0000,,manage to get quite a bit of work done.\NAs always our work on the browser focuses Dialogue: 0,0:29:48.71,0:29:54.70,Default,,0000,0000,0000,,in 3 main areas: privacy, security\Nand usability. Our privacy work is Dialogue: 0,0:29:54.70,0:30:00.33,Default,,0000,0000,0000,,primarily focused around making sure that\Nany new browser feature doesn’t enable Dialogue: 0,0:30:00.33,0:30:05.72,Default,,0000,0000,0000,,new vectors for 3rd party tracking. So no\Nways for a 3rd party content resource to Dialogue: 0,0:30:05.72,0:30:12.57,Default,,0000,0000,0000,,store state or cookies or blob URIs\Nor some of the newer features. Dialogue: 0,0:30:12.57,0:30:16.94,Default,,0000,0000,0000,,There’s a new cash API. These sorts\Nof things need to all be isolated Dialogue: 0,0:30:16.94,0:30:20.84,Default,,0000,0000,0000,,to the URL bar domain to prevent 3rd\Nparties from being able to track you. Dialogue: 0,0:30:20.84,0:30:25.18,Default,,0000,0000,0000,,From being able to recognize it’s the same\Nyou when you log in to Facebook and Dialogue: 0,0:30:25.18,0:30:31.73,Default,,0000,0000,0000,,when you visit CNN, and CNN loads\Nthe Facebook Like buttons, e.g. Dialogue: 0,0:30:31.73,0:30:36.53,Default,,0000,0000,0000,,Additionally we have done a lot of work on\Nfingerprinting defences, the Alpha Release Dialogue: 0,0:30:36.53,0:30:41.25,Default,,0000,0000,0000,,ships a set of fonts for the\NLinux users so that the Dialogue: 0,0:30:41.25,0:30:45.34,Default,,0000,0000,0000,,font fingerprinting can be normalized\Nsince a lot of Linux users tend to have Dialogue: 0,0:30:45.34,0:30:49.92,Default,,0000,0000,0000,,different fonts installed on their\Nsystems. As well as tries to normalize Dialogue: 0,0:30:49.92,0:30:54.38,Default,,0000,0000,0000,,the font list that allowed for Windows\Nand Mac users where they often get Dialogue: 0,0:30:54.38,0:30:59.67,Default,,0000,0000,0000,,additional fonts from 3rd party\Napplications that install them. Dialogue: 0,0:30:59.67,0:31:05.12,Default,,0000,0000,0000,,On the security front the major exciting\Npiece is the security slider. So with iSEC Dialogue: 0,0:31:05.12,0:31:11.81,Default,,0000,0000,0000,,Partners’ help we did a review of all the\NFirefox vulnerabilities and categorized Dialogue: 0,0:31:11.81,0:31:16.68,Default,,0000,0000,0000,,them based on the component that they were\Nin as well as their prevalence on the web. Dialogue: 0,0:31:16.68,0:31:21.97,Default,,0000,0000,0000,,And came up with 4 positions that allow\Nyou to choose, basically trade off, Dialogue: 0,0:31:21.97,0:31:26.08,Default,,0000,0000,0000,,functionality for vulnerability surface\Nreduction. And this was actually quite Dialogue: 0,0:31:26.08,0:31:31.87,Default,,0000,0000,0000,,successful. It turned out that\Nall of the Pwn2own exploits Dialogue: 0,0:31:31.87,0:31:39.99,Default,,0000,0000,0000,,against Firefox were actually blocked\Nfor non-https sites at medium/high. Dialogue: 0,0:31:39.99,0:31:46.27,Default,,0000,0000,0000,,And if you enable the high security\Nlevel they were blocked for everything. Dialogue: 0,0:31:46.27,0:31:50.13,Default,,0000,0000,0000,,We additionally released address\Nsanitizer hardened builds, these are… Dialogue: 0,0:31:50.13,0:31:54.15,Default,,0000,0000,0000,,basically should… especially the higher\Nsecurity levels of the security slider Dialogue: 0,0:31:54.15,0:31:58.81,Default,,0000,0000,0000,,should protect against various memory\Nsafety issues in the browser and also Dialogue: 0,0:31:58.81,0:32:04.63,Default,,0000,0000,0000,,help us diagnose issues very rapidly. Dialogue: 0,0:32:04.63,0:32:10.38,Default,,0000,0000,0000,,And of course we now sign our Windows\Npackages using a hardware security module Dialogue: 0,0:32:10.38,0:32:16.85,Default,,0000,0000,0000,,from DigiCert. The usability improvements\Nwere primarily focused around this UI and Dialogue: 0,0:32:16.85,0:32:21.10,Default,,0000,0000,0000,,this new Onion Menus you can see if you\Nremember the old menu. There was quite a Dialogue: 0,0:32:21.10,0:32:24.40,Default,,0000,0000,0000,,lot more options there. We sort of\Ncondensed and consolidated options and Dialogue: 0,0:32:24.40,0:32:29.49,Default,,0000,0000,0000,,eliminated and combined as much as we\Ncould. An additionally displayed the Dialogue: 0,0:32:29.49,0:32:37.36,Default,,0000,0000,0000,,circuit for the current URL bar domain.\NIn 2016 we’ll be focusing mostly on again Dialogue: 0,0:32:37.36,0:32:41.91,Default,,0000,0000,0000,,the same 3 areas. Our main goal for\Nprivacy is to try and convince Mozilla Dialogue: 0,0:32:41.91,0:32:48.16,Default,,0000,0000,0000,,that they want to adopt our idea of\Nisolating 3rd party identifiers at least Dialogue: 0,0:32:48.16,0:32:52.15,Default,,0000,0000,0000,,to the point of if the user goes into the\NPreferences and tries to disable 3rd party Dialogue: 0,0:32:52.15,0:32:57.86,Default,,0000,0000,0000,,cookies, will let you do the same thing\Nfor DOM storage, Cash, blob URIs, Dialogue: 0,0:32:57.86,0:33:02.76,Default,,0000,0000,0000,,worker threads, and all these\Nother sources of shared state. Dialogue: 0,0:33:02.76,0:33:07.91,Default,,0000,0000,0000,,We’re very excited about their work on a\Nmulti-process sandbox, additionally even Dialogue: 0,0:33:07.91,0:33:13.58,Default,,0000,0000,0000,,application-level sandboxing, it should\Nbe… without Mozilla’s sandbox, Dialogue: 0,0:33:13.58,0:33:18.62,Default,,0000,0000,0000,,we should still be able to prevent the\Nbrowser from bypassing TOR using SecComp Dialogue: 0,0:33:18.62,0:33:22.64,Default,,0000,0000,0000,,or AppArmor or SeatBelt or one of\Nthese other sandboxing technologies. Dialogue: 0,0:33:22.64,0:33:25.41,Default,,0000,0000,0000,,We’re looking forward to trying to\Nget that rolled out. And we’re doing Dialogue: 0,0:33:25.41,0:33:30.50,Default,,0000,0000,0000,,exploit bounties! We’ll be\Npartnering with HackerOne, Dialogue: 0,0:33:30.50,0:33:34.08,Default,,0000,0000,0000,,who’ll be announcing this shortly. The\Nprogram will start out invite-only Dialogue: 0,0:33:34.08,0:33:37.20,Default,,0000,0000,0000,,and then… just, so we can get\Nused to the flow and scale up Dialogue: 0,0:33:37.20,0:33:41.81,Default,,0000,0000,0000,,and then we’ll make it public later in the\Nyear to basically provide people with Dialogue: 0,0:33:41.81,0:33:46.56,Default,,0000,0000,0000,,incentive to review our code to look\Nfor vulnerabilities that might be Dialogue: 0,0:33:46.56,0:33:51.13,Default,,0000,0000,0000,,specific to our applications. And of\Ncourse the usual usability improving, Dialogue: 0,0:33:51.13,0:33:57.47,Default,,0000,0000,0000,,security, improving installation. And we’d\Nlike to improve the censorship and bridges Dialogue: 0,0:33:57.47,0:34:02.78,Default,,0000,0000,0000,,ability flow as well hoping to automate\Nthe discovery of bridges and inform you Dialogue: 0,0:34:02.78,0:34:08.64,Default,,0000,0000,0000,,if your bridges become unreachable.\NSo TOR messenger Dialogue: 0,0:34:08.64,0:34:13.23,Default,,0000,0000,0000,,is one of our 2 chat clients, also\Npart of the Applications Team. Dialogue: 0,0:34:13.23,0:34:17.54,Default,,0000,0000,0000,,Basically, the goal there was to minimize\Nthe amount of configuration that Dialogue: 0,0:34:17.54,0:34:21.36,Default,,0000,0000,0000,,the user had to do if they wanted to\Nuse one of their existing chat clients Dialogue: 0,0:34:21.36,0:34:26.78,Default,,0000,0000,0000,,with TOR and OTR. Now this is based Dialogue: 0,0:34:26.78,0:34:32.29,Default,,0000,0000,0000,,on another Mozilla platform – Instantbird\Nwhich is based on Thunderbird. Dialogue: 0,0:34:32.29,0:34:38.30,Default,,0000,0000,0000,,This allows us to share a lot of the\NTOR Browser configuration codes Dialogue: 0,0:34:38.30,0:34:42.12,Default,,0000,0000,0000,,for managing the TOR process and\Nconfiguring bridges. So the user has a Dialogue: 0,0:34:42.12,0:34:47.27,Default,,0000,0000,0000,,very similar configuration\Nexperience to the browser Dialogue: 0,0:34:47.27,0:34:53.14,Default,,0000,0000,0000,,when they first start it up. It also has\Nsome additional memory safety advantages Dialogue: 0,0:34:53.14,0:34:58.77,Default,,0000,0000,0000,,– all the protocol parsers are written\Nin Javascript. This basically… Dialogue: 0,0:34:58.77,0:35:03.66,Default,,0000,0000,0000,,one of the major things when we\Nwere looking at candidates for Dialogue: 0,0:35:03.66,0:35:08.47,Default,,0000,0000,0000,,a messaging client was we wanted to avoid\Nthe problems of libpurple in the past Dialogue: 0,0:35:08.47,0:35:11.98,Default,,0000,0000,0000,,where there’s been a lot of, like, remote\Ncode execution vulnerabilities with Dialogue: 0,0:35:11.98,0:35:16.86,Default,,0000,0000,0000,,protocol parsing. Now there are some\Ntrade-offs here, obviously, when you’re Dialogue: 0,0:35:16.86,0:35:22.56,Default,,0000,0000,0000,,dealing with a browser product. You\Nstill have a html window rendering Dialogue: 0,0:35:22.56,0:35:30.09,Default,,0000,0000,0000,,the messages. But it is XSS filtered and\Neven if an XSS exploit were to get through Dialogue: 0,0:35:30.09,0:35:34.32,Default,,0000,0000,0000,,to run Javascript in your messaging\Nwindow that Javascript would still be Dialogue: 0,0:35:34.32,0:35:40.03,Default,,0000,0000,0000,,unprivileged. So they need an additional\Nbrowser-style exploit. And that filter has Dialogue: 0,0:35:40.03,0:35:44.27,Default,,0000,0000,0000,,been reviewed by Mozilla and additionally\Nwe’re looking into removing Javascript Dialogue: 0,0:35:44.27,0:35:48.74,Default,,0000,0000,0000,,from that messaging window at all.\NIt should be completely possible to just Dialogue: 0,0:35:48.74,0:35:54.95,Default,,0000,0000,0000,,display a reduced, slightly less sexy\Nversion of the same window at perhaps Dialogue: 0,0:35:54.95,0:36:00.67,Default,,0000,0000,0000,,another higher security level without\NJavascript involved at all in that window. Dialogue: 0,0:36:00.67,0:36:04.07,Default,,0000,0000,0000,,So we will hand off to Jake now to\Ndescribe some of the security properties Dialogue: 0,0:36:04.07,0:36:06.09,Default,,0000,0000,0000,,and differences between TOR\Nmessenger and Ricochet. Dialogue: 0,0:36:06.09,0:36:12.22,Default,,0000,0000,0000,,Jacob: Just to be clear about this: We\Nwanted to sort of echo what Phil Rogaway Dialogue: 0,0:36:12.22,0:36:16.44,Default,,0000,0000,0000,,has recently said. He wrote a really\Nwonderful paper quite recently about the Dialogue: 0,0:36:16.44,0:36:20.91,Default,,0000,0000,0000,,moral character of cryptographic work and\NPhil Rogaway for those of you that don’t Dialogue: 0,0:36:20.91,0:36:24.31,Default,,0000,0000,0000,,know is one of the sort of like amazing\Ncryptographers, very humble, really Dialogue: 0,0:36:24.31,0:36:29.99,Default,,0000,0000,0000,,wonderful man who was really a little bit\Nsad that cryptographers and people Dialogue: 0,0:36:29.99,0:36:34.89,Default,,0000,0000,0000,,working on security software don’t take\Nthe adversaries seriously. So they use Dialogue: 0,0:36:34.89,0:36:39.61,Default,,0000,0000,0000,,Alice and Bob, and Mallory and they have\Ncutie icons and they look very happy. Dialogue: 0,0:36:39.61,0:36:44.62,Default,,0000,0000,0000,,We wanted to make it clear what we thought\Nthe adversary was. Which is definitely not Dialogue: 0,0:36:44.62,0:36:53.09,Default,,0000,0000,0000,,a cutie adversary. When anonymity fails\Nfor Muslims that live in Pakistan, or e.g. Dialogue: 0,0:36:53.09,0:36:56.58,Default,,0000,0000,0000,,the guys that are giving a talk later\Ntoday, the CAGE guys, when anonymity fails Dialogue: 0,0:36:56.58,0:37:01.42,Default,,0000,0000,0000,,for them they get detained or they get\Nmurdered or they end up in Guantanamo Bay Dialogue: 0,0:37:01.42,0:37:05.48,Default,,0000,0000,0000,,or other things like that. So it’s a\Nserious thing. And we wanted to talk about Dialogue: 0,0:37:05.48,0:37:11.40,Default,,0000,0000,0000,,what that looks like. So e.g. a lot of you\Nuse jabber.ccc.de, I guess. Don’t raise Dialogue: 0,0:37:11.40,0:37:16.53,Default,,0000,0000,0000,,your hands. You should decentralize. Stop\Nusing jabber.ccc.de because we should Dialogue: 0,0:37:16.53,0:37:20.96,Default,,0000,0000,0000,,decentralize. But that said if you do,\Nthis is sort of what it looks like, right? Dialogue: 0,0:37:20.96,0:37:24.09,Default,,0000,0000,0000,,There’s the possibility for targeted\Nattacks when you connect. There’s the Dialogue: 0,0:37:24.09,0:37:29.08,Default,,0000,0000,0000,,possibility that the Social Graph e.g. of\Nyour buddy list, that that would be on the Dialogue: 0,0:37:29.08,0:37:32.74,Default,,0000,0000,0000,,server. It would be possible that there’s\Na bug on any Jabber server anywhere. Dialogue: 0,0:37:32.74,0:37:36.38,Default,,0000,0000,0000,,So of course you know that if you’re using\NGmail with Jabber, you know that they are Dialogue: 0,0:37:36.38,0:37:40.10,Default,,0000,0000,0000,,prison providers. So if you got a pretty\Nbig problem there and the attacker, again, Dialogue: 0,0:37:40.10,0:37:44.41,Default,,0000,0000,0000,,is not a cutie attacker, it’s, you know,\NI like the Grim Reaper, that fit that Dialogue: 0,0:37:44.41,0:37:48.82,Default,,0000,0000,0000,,Mike chose, if you like that’s accurate.\NAnd now if you see one of the protections Dialogue: 0,0:37:48.82,0:37:51.77,Default,,0000,0000,0000,,you’ll have for communicating with your\Npeers is off-the-record messaging. That’s Dialogue: 0,0:37:51.77,0:37:57.77,Default,,0000,0000,0000,,basically the thing. But that’s a very\Nslap together protocol in a sense. Because Dialogue: 0,0:37:57.77,0:38:02.72,Default,,0000,0000,0000,,it’s hacks on top of hacks. Where you\Nknow you compose TOR with Jabber and TLS Dialogue: 0,0:38:02.72,0:38:05.86,Default,,0000,0000,0000,,and maybe you still have a certificate\Nauthority in there somewhere. Or maybe you Dialogue: 0,0:38:05.86,0:38:09.55,Default,,0000,0000,0000,,have a TOR Hidden Service but then your\Nstatus updates they don’t have any Dialogue: 0,0:38:09.55,0:38:16.43,Default,,0000,0000,0000,,encryption at all, for example. Or, again,\Nyour roster is an actual thing that Dialogue: 0,0:38:16.43,0:38:19.11,Default,,0000,0000,0000,,someone can see, including every time you\Nsend a message to those people the server Dialogue: 0,0:38:19.11,0:38:24.82,Default,,0000,0000,0000,,sees that. So, that said, TOR messenger is\Nreally great because it meets users where Dialogue: 0,0:38:24.82,0:38:28.93,Default,,0000,0000,0000,,they already are. Right? So e.g. actually\None other point here is if you use a piece Dialogue: 0,0:38:28.93,0:38:33.42,Default,,0000,0000,0000,,of software like Adium, there is actually\Na bug filed against Adium where someone Dialogue: 0,0:38:33.42,0:38:37.63,Default,,0000,0000,0000,,said “Please disable logging-by-default\Nbecause Chelsea Manning went to prison Dialogue: 0,0:38:37.63,0:38:41.62,Default,,0000,0000,0000,,because of your logging policy”. And the\Npeople working on Adium in this bug report Dialogue: 0,0:38:41.62,0:38:48.71,Default,,0000,0000,0000,,basically said: “Good!” That’s horrifying!\NRight? So what if we made it as reasonable Dialogue: 0,0:38:48.71,0:38:54.59,Default,,0000,0000,0000,,as possible, as configuration-free as\Npossible using TOR, using OTR, trying to Dialogue: 0,0:38:54.59,0:38:58.65,Default,,0000,0000,0000,,remove libpurple which is a whole like…\Nit’s a flock of Zerodays flying in Dialogue: 0,0:38:58.65,0:39:07.64,Default,,0000,0000,0000,,formation. Right? So we wanted to kill the\Nbird in a sense but also not we want to Dialogue: 0,0:39:07.64,0:39:14.36,Default,,0000,0000,0000,,help provide an incentive for improving.\NAnd so that’s where TOR messenger fits. Dialogue: 0,0:39:14.36,0:39:19.67,Default,,0000,0000,0000,,But we also want to experiment with next\Ngeneration stuff. And one of those things Dialogue: 0,0:39:19.67,0:39:25.12,Default,,0000,0000,0000,,is written by a really great guy on our\Ncommunity, almost single-handedly, without Dialogue: 0,0:39:25.12,0:39:30.76,Default,,0000,0000,0000,,any funding at all, and his name is\N“special”, that’s actually his name. He’s Dialogue: 0,0:39:30.76,0:39:37.02,Default,,0000,0000,0000,,also special. But it’s really nice,\Nbecause actually, if you solve the problem Dialogue: 0,0:39:37.02,0:39:40.81,Default,,0000,0000,0000,,of telling your friend your name, if\Nyou’re familiar with the properties of Dialogue: 0,0:39:40.81,0:39:44.94,Default,,0000,0000,0000,,Hidden Services where you have a self-\Nauthenticating name you know that you’re Dialogue: 0,0:39:44.94,0:39:47.69,Default,,0000,0000,0000,,talking to the person that you think you\Nare because you’ve already done a key Dialogue: 0,0:39:47.69,0:39:51.78,Default,,0000,0000,0000,,exchange. The important part of the key\Nexchange. And so one of the things that Dialogue: 0,0:39:51.78,0:39:58.79,Default,,0000,0000,0000,,you’ll see very clearly is that there is\Nno more server. Right? So there’s no more Dialogue: 0,0:39:58.79,0:40:05.13,Default,,0000,0000,0000,,jabber.ccc.de in this picture. So this is\Na really good example of how we might Dialogue: 0,0:40:05.13,0:40:09.12,Default,,0000,0000,0000,,decentralize, actually. It’s an experiment\Nright now but it means no more servers. It Dialogue: 0,0:40:09.12,0:40:14.50,Default,,0000,0000,0000,,uses the TOR network’s TOR Hidden Service\Nprotocol and everybody actually becomes a Dialogue: 0,0:40:14.50,0:40:18.72,Default,,0000,0000,0000,,TOR Hidden Service for chatting with their\Nbuddies. And it’s end-to-end encrypted and Dialogue: 0,0:40:18.72,0:40:23.36,Default,,0000,0000,0000,,it’s anonymized and of course this means\Nthat your Social Graph is a traffic Dialogue: 0,0:40:23.36,0:40:27.98,Default,,0000,0000,0000,,analysis problem, it’s no longer a list on\Na server. And it means your metadata is Dialogue: 0,0:40:27.98,0:40:32.79,Default,,0000,0000,0000,,as protected as we currently know how\Nto do in a low-latency anonymity network. Dialogue: 0,0:40:32.79,0:40:36.48,Default,,0000,0000,0000,,And in the future one of the really nice\Nthings about this is that it will be Dialogue: 0,0:40:36.48,0:40:41.85,Default,,0000,0000,0000,,possible – or we think it will be\Npossible – to even make it better in a Dialogue: 0,0:40:41.85,0:40:46.92,Default,,0000,0000,0000,,sense, e.g. multiple chats, sending\Nfiles, sending pictures, in other words, Dialogue: 0,0:40:46.92,0:40:50.78,Default,,0000,0000,0000,,everything becomes, instead of a certainty\Nwe move it towards probability. And the Dialogue: 0,0:40:50.78,0:40:52.89,Default,,0000,0000,0000,,probability is in your favour. Dialogue: 0,0:40:52.89,0:41:00.00,Default,,0000,0000,0000,,Mike: Yes, additionally, I’ll be working\Non various forms of panning for cases like Dialogue: 0,0:41:00.00,0:41:04.14,Default,,0000,0000,0000,,this to basically increase this high…\Nthe probability that there will be Dialogue: 0,0:41:04.14,0:41:10.00,Default,,0000,0000,0000,,concurrent traffic at the same time from\Nmultiple TOR clients, which will further Dialogue: 0,0:41:10.00,0:41:13.72,Default,,0000,0000,0000,,frustrate the discovery of the Social\NGraph based on simple traffic analysis Dialogue: 0,0:41:13.72,0:41:21.94,Default,,0000,0000,0000,,especially for low-traffic cases such as\NRicochet. So just to wrap up that Dialogue: 0,0:41:21.94,0:41:29.23,Default,,0000,0000,0000,,TOR Applications piece: in 2016 we’re\Ntrying to focus heavily on usability and Dialogue: 0,0:41:29.23,0:41:34.95,Default,,0000,0000,0000,,gin more people to be able to use TOR,\Nomitting the barriers to finding TOR, Dialogue: 0,0:41:34.95,0:41:40.11,Default,,0000,0000,0000,,downloading TOR, being able especially\Nfor censored users, and being able to Dialogue: 0,0:41:40.11,0:41:45.10,Default,,0000,0000,0000,,install TOR. There’s still some snags,\Nvarious difficulties that cause people to Dialogue: 0,0:41:45.10,0:41:49.56,Default,,0000,0000,0000,,stop at various stages of that process and\Nwe want to try and work for to eliminate Dialogue: 0,0:41:49.56,0:41:53.32,Default,,0000,0000,0000,,them. We also, of course, want to increase\Ncoordination: share graphics, visual Dialogue: 0,0:41:53.32,0:42:00.90,Default,,0000,0000,0000,,aesthetics and coordinate the ability to\Nshare the TOR process. And we also want to Dialogue: 0,0:42:00.90,0:42:04.54,Default,,0000,0000,0000,,create a space for more experimentation,\Nfor more things like Ricochet. There’s Dialogue: 0,0:42:04.54,0:42:08.81,Default,,0000,0000,0000,,probably a lot more ideas like Ricochet\Nout there. There could be leverages Dialogue: 0,0:42:08.81,0:42:12.15,Default,,0000,0000,0000,,of TOR protocol and especially Hidden\NServices in creative ways. So we’re Dialogue: 0,0:42:12.15,0:42:16.13,Default,,0000,0000,0000,,looking to create an official sanctioned\Nspace as part of TOR to give them a home. Dialogue: 0,0:42:16.13,0:42:21.28,Default,,0000,0000,0000,,And to look for that in the coming\Nmonths on the TOR blog. Dialogue: 0,0:42:21.28,0:42:26.60,Default,,0000,0000,0000,,Jacob: Alright, I just wanted to put in a\Npicture of a guy wearing a Slayer T-Shirt. Dialogue: 0,0:42:26.60,0:42:31.38,Default,,0000,0000,0000,,So there it is. That’s Trevor Paglen. Some\Nof you may remember him from such things Dialogue: 0,0:42:31.38,0:42:36.15,Default,,0000,0000,0000,,as helping to film Citizenfour, building\NSatellites that burn up in space so that Dialogue: 0,0:42:36.15,0:42:41.03,Default,,0000,0000,0000,,are actually currently on other\Nsatellites. And this on the left is Dialogue: 0,0:42:41.03,0:42:45.55,Default,,0000,0000,0000,,Leif Ryge, he’s sort of the person that\Ntaught me how to use computers. And he is Dialogue: 0,0:42:45.55,0:42:49.05,Default,,0000,0000,0000,,an incredible Free Software developer.\NTrevor Paglen and myself, and this is Dialogue: 0,0:42:49.05,0:42:52.64,Default,,0000,0000,0000,,a cube, the Autonomy Cube which we talked\Nabout last year. Because we think that Dialogue: 0,0:42:52.64,0:42:57.22,Default,,0000,0000,0000,,culture is very important and we think\Nthat it’s important to actually get people Dialogue: 0,0:42:57.22,0:43:01.50,Default,,0000,0000,0000,,to understand the struggle that exists\Nright now. So this is installed in a Dialogue: 0,0:43:01.50,0:43:06.47,Default,,0000,0000,0000,,museum right now in Germany, in the city\Nof Oldenburg, at the Edith-Russ-Haus. And Dialogue: 0,0:43:06.47,0:43:10.81,Default,,0000,0000,0000,,it actually opened several months ago,\Nit’s filled with classified documents, it Dialogue: 0,0:43:10.81,0:43:14.00,Default,,0000,0000,0000,,has really interesting things to go and\Nread. I highly encourage you to go and Dialogue: 0,0:43:14.00,0:43:18.06,Default,,0000,0000,0000,,read. We built a reading room about\Nanonymity papers, about things that are Dialogue: 0,0:43:18.06,0:43:22.99,Default,,0000,0000,0000,,happening. About how corporations track\Nyou, and then the entire museum is an Dialogue: 0,0:43:22.99,0:43:27.73,Default,,0000,0000,0000,,Open-WiFi network that routs you\Ntransparently through TOR. So in Germany Dialogue: 0,0:43:27.73,0:43:32.52,Default,,0000,0000,0000,,a free open WiFi network that isn’t run by\NFreifunk – much respect to them – we Dialogue: 0,0:43:32.52,0:43:36.87,Default,,0000,0000,0000,,wanted to make it possible for you to just\Ngo and have the ability to bootstrap Dialogue: 0,0:43:36.87,0:43:43.03,Default,,0000,0000,0000,,yourself anonymously if you needed to. And\Nalso these four boards are Novena boards. Dialogue: 0,0:43:43.03,0:43:47.73,Default,,0000,0000,0000,,And these Novena boards are Free and Open\NHardware devices made by Bunnie and Sean Dialogue: 0,0:43:47.73,0:43:51.22,Default,,0000,0000,0000,,in Singapore where you could, if you\Nwanted to, download the schematics and Dialogue: 0,0:43:51.22,0:43:55.99,Default,,0000,0000,0000,,fab it yourself. And it’s running the\NDebian GNU Linux universal operating Dialogue: 0,0:43:55.99,0:44:01.35,Default,,0000,0000,0000,,system. And it’s an actual TOR exit node\Nwith absolutely every port allowed. So the Dialogue: 0,0:44:01.35,0:44:06.78,Default,,0000,0000,0000,,museum’s infrastructure itself on the\Ncity’s internet connection actually is a Dialogue: 0,0:44:06.78,0:44:13.62,Default,,0000,0000,0000,,TOR exit node for the whole world to be\Nable to use the internet anonymously. Dialogue: 0,0:44:13.62,0:44:20.34,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:44:20.34,0:44:24.17,Default,,0000,0000,0000,,But the museum’s infrastructure is not\Njust helping people in Oldenburg, it’s Dialogue: 0,0:44:24.17,0:44:28.83,Default,,0000,0000,0000,,helping people all around the world to be\Nable to communicate anonymously and it’s Dialogue: 0,0:44:28.83,0:44:31.83,Default,,0000,0000,0000,,quite amazing actually because when\Ncultural institutions stand up for this Dialogue: 0,0:44:31.83,0:44:35.96,Default,,0000,0000,0000,,we recognize it’s not just a problem of\Nover-there stand. We have mass-surveillance Dialogue: 0,0:44:35.96,0:44:40.85,Default,,0000,0000,0000,,and corporate surveillance in the West\Nand we need to deal with that. Here, by Dialogue: 0,0:44:40.85,0:44:45.55,Default,,0000,0000,0000,,creating spaces like this. But that said,\Nwe also need to make sure that we create Dialogue: 0,0:44:45.55,0:44:49.25,Default,,0000,0000,0000,,spaces in people’s minds all around the\Nworld. And I want to introduce to you Dialogue: 0,0:44:49.25,0:44:55.38,Default,,0000,0000,0000,,someone who’s incredibly awesome, the\Nmost bad-ass radical librarian around, Dialogue: 0,0:44:55.38,0:44:58.83,Default,,0000,0000,0000,,this is Alison.\NAlison is going to talk about… Dialogue: 0,0:44:58.83,0:45:03.13,Default,,0000,0000,0000,,Alison: …Library Freedom Project! Hi!\NThank you so much! I’m so excited Dialogue: 0,0:45:03.13,0:45:09.29,Default,,0000,0000,0000,,to be here, it’s my first CCC and I’m on\Nstage, and it’s very… exciting. So I’m Dialogue: 0,0:45:09.29,0:45:12.75,Default,,0000,0000,0000,,going to talk to you a little bit about my\Norganization, Library Freedom Project. Dialogue: 0,0:45:12.75,0:45:18.40,Default,,0000,0000,0000,,I’m the director and what we do: we have\Na partnership with TOR project to do Dialogue: 0,0:45:18.40,0:45:23.44,Default,,0000,0000,0000,,community outreach around TOR and other\Nprivacy-enhancing technologies. Making Dialogue: 0,0:45:23.44,0:45:28.26,Default,,0000,0000,0000,,TOR network more strong and making tools\Nlike TOR Browser more ubiquitous and Dialogue: 0,0:45:28.26,0:45:35.54,Default,,0000,0000,0000,,mainstream, all with the help of a\Ncoalition of radical militant librarians. Dialogue: 0,0:45:35.54,0:45:40.04,Default,,0000,0000,0000,,So we introduced you to the Library\NFreedom Project back in February. We told Dialogue: 0,0:45:40.04,0:45:43.52,Default,,0000,0000,0000,,you a little bit about the kind of work\Nthat we do, mostly in US libraries, Dialogue: 0,0:45:43.52,0:45:48.93,Default,,0000,0000,0000,,increasingly internationally. Where\Nessentially we teach them about tools like Dialogue: 0,0:45:48.93,0:45:54.67,Default,,0000,0000,0000,,TOR Browser, how to install it on their\Nlocal computers, how to teach it into Dialogue: 0,0:45:54.67,0:45:59.08,Default,,0000,0000,0000,,computer classes that they offer for free\Nin the library or one-on-one technology Dialogue: 0,0:45:59.08,0:46:04.35,Default,,0000,0000,0000,,sessions for their community. And we’ve\Nhad a really amazing year since then. Dialogue: 0,0:46:04.35,0:46:08.47,Default,,0000,0000,0000,,In addition to working with the TOR\Nproject we’re really fortunate to work Dialogue: 0,0:46:08.47,0:46:12.47,Default,,0000,0000,0000,,with the American Civil Liberties Union\N(ACLU). If you’re not familiar with them, Dialogue: 0,0:46:12.47,0:46:16.48,Default,,0000,0000,0000,,they’re basically… they’re the bad asses\Nwho’ve been suing the US Intelligence Dialogue: 0,0:46:16.48,0:46:22.71,Default,,0000,0000,0000,,Agencies and Police for about a 100 years.\NThat is me with 2 people from the ACLU Dialogue: 0,0:46:22.71,0:46:27.55,Default,,0000,0000,0000,,Massachusetts, Jessy Rossman who is a\Nsurveillance law expert and Kay Croqueford Dialogue: 0,0:46:27.55,0:46:31.00,Default,,0000,0000,0000,,who is an activist for the ACLU. And\Nthey’re here, if you see that human buy Dialogue: 0,0:46:31.00,0:46:35.07,Default,,0000,0000,0000,,them a drink and ask them about the\Nsurveillance capabilities of the US Police. Dialogue: 0,0:46:35.07,0:46:37.98,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:46:37.98,0:46:43.30,Default,,0000,0000,0000,,So, it’s really cool! It’s a great\Npartnership with the ACLU because Dialogue: 0,0:46:43.30,0:46:48.58,Default,,0000,0000,0000,,basically they can teach why we need to\Nuse tools like TOR Browser. So how to use Dialogue: 0,0:46:48.58,0:46:52.26,Default,,0000,0000,0000,,them is super-super important but you need\Nto know about the authorizations, the Dialogue: 0,0:46:52.26,0:46:57.37,Default,,0000,0000,0000,,programs, all the bad laws and the uses of\Nthem against ordinary people. So, why do Dialogue: 0,0:46:57.37,0:47:01.77,Default,,0000,0000,0000,,we teach this stuff to librarians? It’s\Nbasically for 2 big reasons. One of them Dialogue: 0,0:47:01.77,0:47:06.47,Default,,0000,0000,0000,,is that libraries and librarians have an\Namazing history of activism around Dialogue: 0,0:47:06.47,0:47:11.45,Default,,0000,0000,0000,,privacy, fighting surveillance and\Nfighting censorship in the US where Dialogue: 0,0:47:11.45,0:47:16.09,Default,,0000,0000,0000,,I live. Librarians were some of the\Nstaunchest opponents of the USA Patriot Dialogue: 0,0:47:16.09,0:47:20.35,Default,,0000,0000,0000,,Act from the beginning when it was\Ncodified back in 2002. They made T-Shirts Dialogue: 0,0:47:20.35,0:47:25.87,Default,,0000,0000,0000,,that said “Another hysterical librarian\Nfor Privacy” because of the… Dialogue: 0,0:47:25.87,0:47:29.72,Default,,0000,0000,0000,,The Attorney General at the time called\Nthem “hysterical” for the fact that they Dialogue: 0,0:47:29.72,0:47:33.40,Default,,0000,0000,0000,,didn’t want this awful authorization to go\Nthrough. And of course then after Snowden Dialogue: 0,0:47:33.40,0:47:37.37,Default,,0000,0000,0000,,we learned many more things about just\Nhow bad the Patriot Act was. So librarians Dialogue: 0,0:47:37.37,0:47:40.80,Default,,0000,0000,0000,,were some of the first people to oppose\Nthat. They also have fought back against Dialogue: 0,0:47:40.80,0:47:45.06,Default,,0000,0000,0000,,National Security Letters which are the US\NGovernment informational requests that Dialogue: 0,0:47:45.06,0:47:49.75,Default,,0000,0000,0000,,sometimes go to software providers and\Nother internet services. They have an Dialogue: 0,0:47:49.75,0:47:53.06,Default,,0000,0000,0000,,attached gag order that basically says:\N“You have to give this information about Dialogue: 0,0:47:53.06,0:47:56.43,Default,,0000,0000,0000,,your users and you can’t tell anyone that\Nyou got it.” Well, libraries got one of Dialogue: 0,0:47:56.43,0:47:58.90,Default,,0000,0000,0000,,these and fought back against that in one.\N{\i1}applause{\i0} Dialogue: 0,0:47:58.90,0:48:05.64,Default,,0000,0000,0000,,They also, all the way back in the 1950s\Neven, at the height of Anti-Communist Dialogue: 0,0:48:05.64,0:48:10.79,Default,,0000,0000,0000,,Fervor and FUD, around the time of the\NHouse on American Activities Committee, Dialogue: 0,0:48:10.79,0:48:13.51,Default,,0000,0000,0000,,librarians came out with this amazing\Nstatement, called the “Freedom to Read” Dialogue: 0,0:48:13.51,0:48:18.91,Default,,0000,0000,0000,,Statement that I think really is a\Nbeautiful text. It’s about 2 pages long Dialogue: 0,0:48:18.91,0:48:26.08,Default,,0000,0000,0000,,and it is their commitment to privacy and\Ndemocratic ideals made manifest. Dialogue: 0,0:48:26.08,0:48:29.31,Default,,0000,0000,0000,,And I have a little excerpt from it here.\NI’m not gonna read the whole thing to you Dialogue: 0,0:48:29.31,0:48:32.50,Default,,0000,0000,0000,,’cause I understand I’m all too\Npressed for time. But the last line is Dialogue: 0,0:48:32.50,0:48:37.60,Default,,0000,0000,0000,,my favourite. It says: “Freedom itself is\Na dangerous way of life. But it is ours.” Dialogue: 0,0:48:37.60,0:48:40.96,Default,,0000,0000,0000,,So everybody go and get that tattooed!\NYou know, on your forehead or whatever. Dialogue: 0,0:48:40.96,0:48:44.15,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:48:44.15,0:48:49.49,Default,,0000,0000,0000,,So, the history of activism is one of the\Nbig things. There’s a second part that Dialogue: 0,0:48:49.49,0:48:52.42,Default,,0000,0000,0000,,is more practical. Libraries have an\Namazing relationship to the local Dialogue: 0,0:48:52.42,0:48:56.86,Default,,0000,0000,0000,,communities. That doesn’t really exist\Nanywhere else especially in this era of Dialogue: 0,0:48:56.86,0:49:01.65,Default,,0000,0000,0000,,privatization and the destruction of\Npublic commons. Libraries have already Dialogue: 0,0:49:01.65,0:49:05.52,Default,,0000,0000,0000,,free computer classes in many places,\Nsometimes the only free computer help that Dialogue: 0,0:49:05.52,0:49:10.61,Default,,0000,0000,0000,,you can get anywhere. They offer free\Ncomputer terminals to many people who Dialogue: 0,0:49:10.61,0:49:14.48,Default,,0000,0000,0000,,don’t have any other computer access.\NThey’re trusted community spaces, they Dialogue: 0,0:49:14.48,0:49:18.40,Default,,0000,0000,0000,,already teach about a whole number of\Nthings. So we think they’re really the Dialogue: 0,0:49:18.40,0:49:24.31,Default,,0000,0000,0000,,ideal location for people to learn about\Nthings like TOR Browser. So it’s been Dialogue: 0,0:49:24.31,0:49:31.01,Default,,0000,0000,0000,,going really well. This year we have\Nvisited hundreds of different locations. Dialogue: 0,0:49:31.01,0:49:36.23,Default,,0000,0000,0000,,We’ve trained about 2300 librarians in the\NUS, in Canada and a few other countries, Dialogue: 0,0:49:36.23,0:49:43.15,Default,,0000,0000,0000,,Australia, UK and Ireland. We held an\Namazing conference, you might recognize Dialogue: 0,0:49:43.15,0:49:47.63,Default,,0000,0000,0000,,this as Noisebridge. Any Noisebridge fans\Nhere? I hope so. Come on, there’s got to Dialogue: 0,0:49:47.63,0:49:50.47,Default,,0000,0000,0000,,be more Noisebridge fans than that!\NChrist! We had an amazing conference in Dialogue: 0,0:49:50.47,0:49:54.05,Default,,0000,0000,0000,,Noisebridge and actually my co-organizer\Nis also here, April Glaser, so you can buy Dialogue: 0,0:49:54.05,0:49:58.54,Default,,0000,0000,0000,,her a drink, she’s right over there. There\Nhas been a huge response from the library Dialogue: 0,0:49:58.54,0:50:02.29,Default,,0000,0000,0000,,community. They wanna learn about TOR\NBrowser, they’re so excited that finally Dialogue: 0,0:50:02.29,0:50:06.91,Default,,0000,0000,0000,,there’s a practical way for them to help\Nprotect their patrons’ privacy. They’ve Dialogue: 0,0:50:06.91,0:50:12.00,Default,,0000,0000,0000,,cared about this stuff from an ideological\Nand ethical standpoint for a really long Dialogue: 0,0:50:12.00,0:50:15.98,Default,,0000,0000,0000,,time, and now they know that there are\Ntools that they can actually use and Dialogue: 0,0:50:15.98,0:50:19.09,Default,,0000,0000,0000,,implement in their libraries and teach to\Ntheir community to help them take back Dialogue: 0,0:50:19.09,0:50:25.40,Default,,0000,0000,0000,,their privacy. We’re really lucky that not\Nonly do we get to teach librarians but Dialogue: 0,0:50:25.40,0:50:29.59,Default,,0000,0000,0000,,occasionally we get invited to visit\Nthe local communities themselves. Dialogue: 0,0:50:29.59,0:50:33.77,Default,,0000,0000,0000,,So, here we teach how to teach privacy\Nclasses with TOR as a big focus. Dialogue: 0,0:50:33.77,0:50:37.46,Default,,0000,0000,0000,,But sometimes we get to meet the local\Ncommunity members themselves. So I want to Dialogue: 0,0:50:37.46,0:50:41.85,Default,,0000,0000,0000,,show you this picture of a recent visit\Nthat I made to Yonkers, New York. It was Dialogue: 0,0:50:41.85,0:50:46.05,Default,,0000,0000,0000,,a class just for teens. They’re all\Nholding TOR stickers if you can see that Dialogue: 0,0:50:46.05,0:50:50.37,Default,,0000,0000,0000,,and Library Freedom Project stickers.\NThis is a great picture that sort of is Dialogue: 0,0:50:50.37,0:50:54.13,Default,,0000,0000,0000,,emblematic of the kind of communities\Nthat we get to visit. Yonkers is one of Dialogue: 0,0:50:54.13,0:50:59.16,Default,,0000,0000,0000,,the poorest cities in the US. These kids\Nare… many of them are immigrants, their Dialogue: 0,0:50:59.16,0:51:02.79,Default,,0000,0000,0000,,parents are immigrants, they face\Nsurveillance and state violence as a Dialogue: 0,0:51:02.79,0:51:07.97,Default,,0000,0000,0000,,matter of their regular everyday lives.\NFor them privacy is not just a human Dialogue: 0,0:51:07.97,0:51:12.52,Default,,0000,0000,0000,,right but it’s sometimes a matter of life\Nand death. And these kids are just some Dialogue: 0,0:51:12.52,0:51:16.82,Default,,0000,0000,0000,,of the amazing people that we get to see.\NAlso, just to give you an idea of how the Dialogue: 0,0:51:16.82,0:51:21.23,Default,,0000,0000,0000,,public perception around privacy is\Nshifting in my anecdotal experience: Dialogue: 0,0:51:21.23,0:51:25.89,Default,,0000,0000,0000,,we had 65 teenagers come to this class!\NIf you have a teenager or if you’ve been Dialogue: 0,0:51:25.89,0:51:30.36,Default,,0000,0000,0000,,a teenager you know teenagers don’t show\Nup for stuff, they don’t do that. 65 kids Dialogue: 0,0:51:30.36,0:51:34.34,Default,,0000,0000,0000,,came to this! And they were so excited!\NThis was just the group that was left over Dialogue: 0,0:51:34.34,0:51:38.42,Default,,0000,0000,0000,,at the end that had so many questions and\Nwanted more stickers to bring back to Dialogue: 0,0:51:38.42,0:51:44.30,Default,,0000,0000,0000,,their friends. So it’s pretty cool stuff.\NRecently we embarked on a new project Dialogue: 0,0:51:44.30,0:51:50.15,Default,,0000,0000,0000,,bringing TOR relays into libraries. This\Nis Nima Fatemi with me, when we set up Dialogue: 0,0:51:50.15,0:51:55.39,Default,,0000,0000,0000,,our pilot at a library in New Hampshire\Nwhich is the state just above where I live Dialogue: 0,0:51:55.39,0:52:02.04,Default,,0000,0000,0000,,in the United States. And we basically\Ndecided to do this project because we Dialogue: 0,0:52:02.04,0:52:05.50,Default,,0000,0000,0000,,thought it was a really great continuation\Nof the work that we were already doing, Dialogue: 0,0:52:05.50,0:52:10.08,Default,,0000,0000,0000,,teaching and training librarians around\Nusing TOR. We wanted to take a step Dialogue: 0,0:52:10.08,0:52:13.69,Default,,0000,0000,0000,,further and take the infrastructure that\Nlibraries already have; many of them are Dialogue: 0,0:52:13.69,0:52:19.49,Default,,0000,0000,0000,,moving to really fast internet, they can\Ndonate an IP address and some bandwidth. Dialogue: 0,0:52:19.49,0:52:24.43,Default,,0000,0000,0000,,And they… many of them want to do kind\Nof the next thing to help protect privacy Dialogue: 0,0:52:24.43,0:52:27.75,Default,,0000,0000,0000,,and not just in their local communities,\Nas well. They want to help protect Dialogue: 0,0:52:27.75,0:52:31.72,Default,,0000,0000,0000,,internet freedom everywhere. So we thought\Nit was a really great sort of next step to Dialogue: 0,0:52:31.72,0:52:35.48,Default,,0000,0000,0000,,go. So we set up our pilot project in New\NHampshire. It went pretty well, we got a Dialogue: 0,0:52:35.48,0:52:39.13,Default,,0000,0000,0000,,lot of great press attention, a lot of\Nreally great local and global community Dialogue: 0,0:52:39.13,0:52:44.55,Default,,0000,0000,0000,,support. We also got the attention of\Nthe Department of Homeland Security. Dialogue: 0,0:52:44.55,0:52:49.61,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:52:49.61,0:52:53.10,Default,,0000,0000,0000,,Basically they contacted the local Police\Nin this town in New Hampshire and they Dialogue: 0,0:52:53.10,0:52:57.16,Default,,0000,0000,0000,,said: “You know, this is stupid, and bad,\Nand criminal and you should shut this Dialogue: 0,0:52:57.16,0:53:02.64,Default,,0000,0000,0000,,down!” And the library was understandably\Nshaken by this and temporarily suspended Dialogue: 0,0:53:02.64,0:53:09.21,Default,,0000,0000,0000,,the operation of the relay. So we\Nresponded by writing a letter, an open Dialogue: 0,0:53:09.21,0:53:13.44,Default,,0000,0000,0000,,letter from Library Freedom Project, from\NTOR project, from ACLU and a broad Dialogue: 0,0:53:13.44,0:53:17.00,Default,,0000,0000,0000,,coalition of public interest groups and\Nluminary individuals including the Dialogue: 0,0:53:17.00,0:53:21.11,Default,,0000,0000,0000,,Electronic Frontier Foundation (EFF), the\NFreedom of the Press Foundation, the Free Dialogue: 0,0:53:21.11,0:53:24.35,Default,,0000,0000,0000,,Software Foundation and all of our other\Nfriends many of whom are in this audience Dialogue: 0,0:53:24.35,0:53:28.72,Default,,0000,0000,0000,,today. We wrote this letter to the library\Nbasically affirming our commitment to Dialogue: 0,0:53:28.72,0:53:32.36,Default,,0000,0000,0000,,them, how much we are proud of them for\Nparticipating in this project and how much Dialogue: 0,0:53:32.36,0:53:36.83,Default,,0000,0000,0000,,we wanted them to continue. We put a lot\Nof nice, you know, ideological, why this Dialogue: 0,0:53:36.83,0:53:41.52,Default,,0000,0000,0000,,is important, warm fuzzy stuff. We also\Ngot EFF to start a petition for us and Dialogue: 0,0:53:41.52,0:53:46.27,Default,,0000,0000,0000,,over a weekend we got about 4500\Nsignatures from all over the world, the Dialogue: 0,0:53:46.27,0:53:51.66,Default,,0000,0000,0000,,library was flooded with emails, calls.\NOnly one negative one. Just one out of Dialogue: 0,0:53:51.66,0:53:55.77,Default,,0000,0000,0000,,hundreds. And that person was a little\Nconfused, so I’m not even counting that Dialogue: 0,0:53:55.77,0:54:03.23,Default,,0000,0000,0000,,necessarily. It was like a conspiracy type thing.\NSo we got this amazing support and this Dialogue: 0,0:54:03.23,0:54:06.88,Default,,0000,0000,0000,,was all in anticipation of their board\Nmeeting that was gonna happen a few days Dialogue: 0,0:54:06.88,0:54:12.15,Default,,0000,0000,0000,,later where the board was gonna decide\Nwhat to do about the relay. So Nima and I Dialogue: 0,0:54:12.15,0:54:16.27,Default,,0000,0000,0000,,show up to New Hampshire on a Tuesday\NNight and you might imagine what a library Dialogue: 0,0:54:16.27,0:54:20.77,Default,,0000,0000,0000,,board meeting in rural New Hampshire is\Ntypically like. It was nothing like that. Dialogue: 0,0:54:20.77,0:54:26.27,Default,,0000,0000,0000,,So we get outside and there’s a protest\Nhappening already. Many people holding Dialogue: 0,0:54:26.27,0:54:32.07,Default,,0000,0000,0000,,Pro-TOR signs. This was just a glimpse of\Nit. And the look on my face is because Dialogue: 0,0:54:32.07,0:54:35.74,Default,,0000,0000,0000,,someone pointed to a very small child and\Nsaid: “Alison, look at that child over Dialogue: 0,0:54:35.74,0:54:39.12,Default,,0000,0000,0000,,there”. This tiny little girl was holding\Na sign that said “Dammit Big Brother” and Dialogue: 0,0:54:39.12,0:54:45.65,Default,,0000,0000,0000,,I was like “I’m done, that’s it, I got to\Ngo home!” So we went into the board Dialogue: 0,0:54:45.65,0:54:52.98,Default,,0000,0000,0000,,meeting and we were met with about 4 dozen\Npeople and media and a huge amount of Dialogue: 0,0:54:52.98,0:54:57.86,Default,,0000,0000,0000,,support. Many of the community members\Nexpressed how much they loved TOR, that Dialogue: 0,0:54:57.86,0:55:03.79,Default,,0000,0000,0000,,this whole incident made them download TOR\Nand check it out for themselves. Basically Dialogue: 0,0:55:03.79,0:55:07.59,Default,,0000,0000,0000,,it galvanized this community into a\Ngreater level of support than we even had Dialogue: 0,0:55:07.59,0:55:12.12,Default,,0000,0000,0000,,when we initially set it up about a month\Nearlier. People who had no idea that the Dialogue: 0,0:55:12.12,0:55:15.66,Default,,0000,0000,0000,,library was doing this heard about it\Nbecause it got a huge amount of media Dialogue: 0,0:55:15.66,0:55:20.86,Default,,0000,0000,0000,,attention thanks to a story by Julia\NAngwin in ProPublica that broke the news Dialogue: 0,0:55:20.86,0:55:26.13,Default,,0000,0000,0000,,to everybody and then it just went like\Nwildfire. So as you might imagine the Dialogue: 0,0:55:26.13,0:55:29.92,Default,,0000,0000,0000,,relay went back online that night. We were\Nsuper-successful. Everybody in the Dialogue: 0,0:55:29.92,0:55:34.92,Default,,0000,0000,0000,,community was incredibly excited about it\Nand supportive. And what has happened now Dialogue: 0,0:55:34.92,0:55:41.10,Default,,0000,0000,0000,,is that this community has sort of… like\NI said they’ve been galvanized to support Dialogue: 0,0:55:41.10,0:55:46.52,Default,,0000,0000,0000,,TOR even more. The library has now allowed\Nat some of their staff time and travel Dialogue: 0,0:55:46.52,0:55:51.92,Default,,0000,0000,0000,,budget to help other libraries in the area\Nset up TOR relays. They’re speaking about Dialogue: 0,0:55:51.92,0:55:57.01,Default,,0000,0000,0000,,TOR…\N{\i1}applause{\i0} Dialogue: 0,0:55:57.01,0:55:59.90,Default,,0000,0000,0000,,Thank you!\NThey’re speaking about TOR at conferences. Dialogue: 0,0:55:59.90,0:56:05.30,Default,,0000,0000,0000,,And this has really caught on in the\Ngreater library community as well. So I Dialogue: 0,0:56:05.30,0:56:08.45,Default,,0000,0000,0000,,mentioned already the kind of success that\Nwe’ve had at Library Freedom Project in Dialogue: 0,0:56:08.45,0:56:12.52,Default,,0000,0000,0000,,teaching tools like TOR Browser and\Ngetting folks to bring us in for trainings. Dialogue: 0,0:56:12.52,0:56:17.63,Default,,0000,0000,0000,,This is even bigger than that! Libraries\Nare now organizing their, you know, staff Dialogue: 0,0:56:17.63,0:56:21.92,Default,,0000,0000,0000,,training days around, you know, “Should we\Nparticipate in the TOR relay project?” or Dialogue: 0,0:56:21.92,0:56:27.11,Default,,0000,0000,0000,,“How can we do this best?”, “What’s the\Nbest angle for us?” So we’re really Dialogue: 0,0:56:27.11,0:56:31.59,Default,,0000,0000,0000,,excited to do announce that we’re gonna\Nbe continuing the relay project at scale. Dialogue: 0,0:56:31.59,0:56:35.27,Default,,0000,0000,0000,,Nima Fatemi, who is now also in this\Npicture again, I’m really sad that he Dialogue: 0,0:56:35.27,0:56:38.93,Default,,0000,0000,0000,,can’t be here, he is wonderful and\Nessential to this project. But he will now Dialogue: 0,0:56:38.93,0:56:45.68,Default,,0000,0000,0000,,be able to travel across the US and we\Nhope to go a little further opening up Dialogue: 0,0:56:45.68,0:56:49.38,Default,,0000,0000,0000,,more relays in libraries. We’re gonna\Ncontinue teaching, of course, about TOR Dialogue: 0,0:56:49.38,0:56:53.78,Default,,0000,0000,0000,,Browser and other privacy-enhancing Free\NSoftware. We’re now gonna incorporate some Dialogue: 0,0:56:53.78,0:56:58.16,Default,,0000,0000,0000,,other TOR services, so we’re really\Nexcited to bring “Let’s Encrypt” into Dialogue: 0,0:56:58.16,0:57:01.49,Default,,0000,0000,0000,,libraries. And while we’re there, why not\Nrun a Hidden Service on the library’s web Dialogue: 0,0:57:01.49,0:57:06.28,Default,,0000,0000,0000,,server. Among many other things. The other\Ngoals for Library Freedom Project: to take Dialogue: 0,0:57:06.28,0:57:11.65,Default,,0000,0000,0000,,this to a much more international level.\NSo if you want to do this in your country, Dialogue: 0,0:57:11.65,0:57:15.59,Default,,0000,0000,0000,,you know your librarian, put them in touch\Nwith us. You can follow our progress on Dialogue: 0,0:57:15.59,0:57:19.69,Default,,0000,0000,0000,,LibraryFreedomProject.org or\N@libraryfreedom on Twidder. And we’re Dialogue: 0,0:57:19.69,0:57:22.95,Default,,0000,0000,0000,,always sort of posting on Tor Blog about\Nstuff that’s going on with us, so… Dialogue: 0,0:57:22.95,0:57:26.48,Default,,0000,0000,0000,,Thank you so much for letting me tell you\Nabout it. It’s really a pleasure to be Dialogue: 0,0:57:26.48,0:57:40.52,Default,,0000,0000,0000,,here!\N{\i1}applause{\i0} Dialogue: 0,0:57:40.52,0:57:45.06,Default,,0000,0000,0000,,Jacob: So, that’s a really tough act to\Nfollow! But we’re very pressed for time Dialogue: 0,0:57:45.06,0:57:48.74,Default,,0000,0000,0000,,now. And we want to make sure that we can\Ntell you two big things. And one of them Dialogue: 0,0:57:48.74,0:57:52.04,Default,,0000,0000,0000,,is that, as you know, we were looking for\Nan Executive Director because our Spirit Dialogue: 0,0:57:52.04,0:57:56.55,Default,,0000,0000,0000,,Animal, Roger,…\NRoger: Slide… Dialogue: 0,0:57:56.55,0:58:01.73,Default,,0000,0000,0000,,Jacob: Right… He couldn’t do it all. And\Nin fact we needed someone to help us. And Dialogue: 0,0:58:01.73,0:58:05.87,Default,,0000,0000,0000,,we needed someone to help us who has the\Nrespect not only of the community here but Dialogue: 0,0:58:05.87,0:58:10.71,Default,,0000,0000,0000,,the community, basically, all around the\Nworld. And we couldn’t think of a better Dialogue: 0,0:58:10.71,0:58:15.38,Default,,0000,0000,0000,,person, in fact, when we came up with a\Nlist of people. The person that we ended Dialogue: 0,0:58:15.38,0:58:19.44,Default,,0000,0000,0000,,up with was the Dream Candidate for a\Nnumber of the people in the TOR Project Dialogue: 0,0:58:19.44,0:58:24.26,Default,,0000,0000,0000,,and around the world. And so, I mean, I\Nhave to say that I’m so excited, I’m so Dialogue: 0,0:58:24.26,0:58:28.04,Default,,0000,0000,0000,,excited that we have her as our Executive\NDirector. I used to think that our ship Dialogue: 0,0:58:28.04,0:58:32.30,Default,,0000,0000,0000,,was going to sink, that we would all go to\Nprison, and that may still happen, the Dialogue: 0,0:58:32.30,0:58:39.61,Default,,0000,0000,0000,,second part. But the first part, for sure,\Nis not going to happen. We found someone Dialogue: 0,0:58:39.61,0:58:44.38,Default,,0000,0000,0000,,who I believe will keep the TOR Project\Ngoing long after all of us are dead and Dialogue: 0,0:58:44.38,0:58:50.51,Default,,0000,0000,0000,,buried. Hopefully, not in shallow graves.\NSo, this is Shari Steele! Dialogue: 0,0:58:50.51,0:58:58.54,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:58:58.54,0:59:00.74,Default,,0000,0000,0000,,Shari: Hi!\N{\i1}applause{\i0} Dialogue: 0,0:59:00.74,0:59:05.40,Default,,0000,0000,0000,,Thanks! Thanks, it’s actually so fun to be\Nback in this community. And I wasn’t gone Dialogue: 0,0:59:05.40,0:59:08.65,Default,,0000,0000,0000,,for very long. I had so much for\Nretirement. It didn’t work out for me. Dialogue: 0,0:59:08.65,0:59:14.29,Default,,0000,0000,0000,,But, that’s OK, I’m really excited. I have\Nhad – we’re so tight on time – so I want Dialogue: 0,0:59:14.29,0:59:18.00,Default,,0000,0000,0000,,to just tell you there are 2 big mandates\Nthat I was given when I first was hired. Dialogue: 0,0:59:18.00,0:59:22.32,Default,,0000,0000,0000,,And one is: Help build a great\Ninfrastructure so that TOR Project is Dialogue: 0,0:59:22.32,0:59:27.33,Default,,0000,0000,0000,,sustainable. Working on that! The other\Nthing is: Money! We need to diversify our Dialogue: 0,0:59:27.33,0:59:31.33,Default,,0000,0000,0000,,funding sources, as everybody knows here.\NThe Government funding has been really Dialogue: 0,0:59:31.33,0:59:35.68,Default,,0000,0000,0000,,difficult for us specifically because it’s\Nall restricted. And so it limits the kinds Dialogue: 0,0:59:35.68,0:59:41.43,Default,,0000,0000,0000,,of things we want to do. When you get the\Ndevelopers in a room blue-skying about the Dialogue: 0,0:59:41.43,0:59:44.90,Default,,0000,0000,0000,,things that they want to do, it’s\Nincredible! Really, really brilliant Dialogue: 0,0:59:44.90,0:59:48.04,Default,,0000,0000,0000,,people who want to do great things but\Nthey’re really limited when the funding Dialogue: 0,0:59:48.04,0:59:52.96,Default,,0000,0000,0000,,says they have to do particular things. So\Nwe happen to be doing our very first ever Dialogue: 0,0:59:52.96,0:59:59.01,Default,,0000,0000,0000,,crowd funding campaign right now. I want\Nto give a shout out to Katina Bishop who Dialogue: 0,0:59:59.01,1:00:03.45,Default,,0000,0000,0000,,is here somewhere and who is running\Nthe campaign for us and is just doing an Dialogue: 0,1:00:03.45,1:00:09.78,Default,,0000,0000,0000,,amazing job. As of last count which is a\Ncouple of days ago, we had over 3000 Dialogue: 0,1:00:09.78,1:00:15.09,Default,,0000,0000,0000,,individual donors and over 120.000 Dollars\Nwhich is incredible for our very first Dialogue: 0,1:00:15.09,1:00:18.82,Default,,0000,0000,0000,,time when we didn’t even really have a\Nmechanism in place to be collecting this Dialogue: 0,1:00:18.82,1:00:24.54,Default,,0000,0000,0000,,money, even. So, it’s really great! And I\Nwanna also say we have a limited number Dialogue: 0,1:00:24.54,1:00:31.07,Default,,0000,0000,0000,,of these T-Shirts that I brought in a\Nsuitcase from Seattle. So, and they’re Dialogue: 0,1:00:31.07,1:00:36.16,Default,,0000,0000,0000,,gonna be available, if you come down to\Nthe Wau Holland booth at the Noisy Square. Dialogue: 0,1:00:36.16,1:00:39.62,Default,,0000,0000,0000,,Come talk with us! Give a donation!\NWe’re doing a special: it’s normally a Dialogue: 0,1:00:39.62,1:00:46.31,Default,,0000,0000,0000,,100 Dollar donation to get a shirt, but\Nfor the conference we’ll do, for 60 Euro Dialogue: 0,1:00:46.31,1:00:50.32,Default,,0000,0000,0000,,you can get a shirt and it would be great\Nyou’d be able to show your support. And Dialogue: 0,1:00:50.32,1:00:56.87,Default,,0000,0000,0000,,you can also donate online if you don’t\Nwanna do that here. That’s the URL. And Dialogue: 0,1:00:56.87,1:01:01.11,Default,,0000,0000,0000,,to end, we’d like to have a\Nword from Down Under! Dialogue: 0,1:01:01.11,1:01:05.08,Default,,0000,0000,0000,,{\i1}Video starts{\i0} Dialogue: 0,1:01:05.08,1:01:09.86,Default,,0000,0000,0000,,{\i1}Video Intro Violin Music{\i0} Dialogue: 0,1:01:09.86,1:01:15.03,Default,,0000,0000,0000,,Good Day to you! Fellow Members of the\NIntergalactic Resistance against Dystopian Dialogue: 0,1:01:15.03,1:01:20.55,Default,,0000,0000,0000,,bastardry! It is I, George Orwell, with an\Nurgent message from Planet Earth, as it Dialogue: 0,1:01:20.55,1:01:25.67,Default,,0000,0000,0000,,embarks on a new orbit. Transmitting via\Nthe Juice Channeling Portal. Our time is Dialogue: 0,1:01:25.67,1:01:30.29,Default,,0000,0000,0000,,short. So let’s get straight to the point.\NShall we? This transmission goes out to Dialogue: 0,1:01:30.29,1:01:35.42,Default,,0000,0000,0000,,all you internet citizens. Denizens of\Nthe one remaining free frequency. In whose Dialogue: 0,1:01:35.42,1:01:40.87,Default,,0000,0000,0000,,hands rests the fate of humanity.\NLord… f_ckin’ help us! Dialogue: 0,1:01:40.87,1:01:42.87,Default,,0000,0000,0000,,{\i1}typewriter typing sounds{\i0} Dialogue: 0,1:01:42.87,1:01:48.56,Default,,0000,0000,0000,,When I last appeared to you, I warned you\Nnoobs: You must not lose the Internet! Now Dialogue: 0,1:01:48.56,1:01:54.14,Default,,0000,0000,0000,,before I proceed, let us clarify one\Ncrucial thing. The Internet is not Virtual Dialogue: 0,1:01:54.14,1:02:00.45,Default,,0000,0000,0000,,Reality, it is actual Reality.\N{\i1}typewriter typing sounds{\i0} Dialogue: 0,1:02:00.45,1:02:05.42,Default,,0000,0000,0000,,Are you still with me? Good. Now ask\Nyourselves: Would you let some fascist Dialogue: 0,1:02:05.42,1:02:09.18,Default,,0000,0000,0000,,dictate with whom you can and cannot\Ncommunicate? Because that’s what happens Dialogue: 0,1:02:09.18,1:02:13.70,Default,,0000,0000,0000,,every time a government blacklists a\Nwebsite domain. Would you let anyone force Dialogue: 0,1:02:13.70,1:02:18.49,Default,,0000,0000,0000,,you to get all your information from cable\NTV? That’s effectively the case if you Dialogue: 0,1:02:18.49,1:02:24.80,Default,,0000,0000,0000,,allow corporations to kill Net Neutrality.\N{\i1}typewriter typing sounds{\i0} Dialogue: 0,1:02:24.80,1:02:29.16,Default,,0000,0000,0000,,Would you let the Thought Police install\Ntelescreens in your house, monitor and Dialogue: 0,1:02:29.16,1:02:34.01,Default,,0000,0000,0000,,record everything you do, every time you\Nmove, every word you’ve read, to peer into Dialogue: 0,1:02:34.01,1:02:37.88,Default,,0000,0000,0000,,the most private nook of all, your head?\NBECAUSE THAT’S WHAT HAPPENS when Dialogue: 0,1:02:37.88,1:02:42.54,Default,,0000,0000,0000,,you let your governments monitor the net\Nand enact mandatory data-retention laws! Dialogue: 0,1:02:42.54,1:02:48.20,Default,,0000,0000,0000,,{\i1}smashing sounds{\i0} Dialogue: 0,1:02:48.20,1:02:52.48,Default,,0000,0000,0000,,If you answered “No” to all those\Nquestions, then we can safely deduce Dialogue: 0,1:02:52.48,1:02:59.60,Default,,0000,0000,0000,,that terms like “Online”, “IRL” and “in\NCyberspace” are Newspeak. They confuse the Dialogue: 0,1:02:59.60,1:03:05.04,Default,,0000,0000,0000,,truth: There is no “Cybersphere”. There\Nis only life. Here. It follows that if you Dialogue: 0,1:03:05.04,1:03:09.38,Default,,0000,0000,0000,,have an oppressive Internet, you have\Nan oppressive society, too. Remember: Dialogue: 0,1:03:09.38,1:03:11.49,Default,,0000,0000,0000,,online is real life…\N{\i1}typewriter typing sounds{\i0} Dialogue: 0,1:03:11.49,1:03:15.95,Default,,0000,0000,0000,,Your Digital Rights are no different from\Neveryday human rights! And don’t give me Dialogue: 0,1:03:15.95,1:03:20.09,Default,,0000,0000,0000,,that BS that you don’t care about\NPrivacy because you have nothing to hide. Dialogue: 0,1:03:20.09,1:03:24.57,Default,,0000,0000,0000,,That’s pure Doublethink. As comrade\NSnowden clearly explained, that’s like Dialogue: 0,1:03:24.57,1:03:28.73,Default,,0000,0000,0000,,saying you don’t care about Free Speech\Nbecause you have nothing to say! Dialogue: 0,1:03:28.73,1:03:32.97,Default,,0000,0000,0000,,Stick that up your memory\Nholes and smoke it, noobs! Dialogue: 0,1:03:32.97,1:03:37.65,Default,,0000,0000,0000,,Pigs Arse, the portal is closing, I’m\Nlosing you! I’ll leave you with a new tool Dialogue: 0,1:03:37.65,1:03:42.69,Default,,0000,0000,0000,,to use. I assume you’ve all been fitted\Nwith one of these spying devices. Well, Dialogue: 0,1:03:42.69,1:03:46.42,Default,,0000,0000,0000,,here’s an app you can use in spite of\Nthis. It’s called Signal, and, yes, it’s Dialogue: 0,1:03:46.42,1:03:50.66,Default,,0000,0000,0000,,free and simple. Install it and tell all\Nyour contacts to mingle then all your Dialogue: 0,1:03:50.66,1:03:54.52,Default,,0000,0000,0000,,calls and texts will be encrypted. So even\Nif Big Brother sees them the c_nt won’t be Dialogue: 0,1:03:54.52,1:04:00.49,Default,,0000,0000,0000,,able to read them. Hahaa! Now that’s\Na smartphone! Our time is up! Dialogue: 0,1:04:00.49,1:04:04.23,Default,,0000,0000,0000,,{\i1}typewriter typing sounds{\i0}\NUntil the next transmission. Heed the Dialogue: 0,1:04:04.23,1:04:09.74,Default,,0000,0000,0000,,words of George Orwell. Or\Nshould I say: George TORwell? Dialogue: 0,1:04:09.74,1:04:14.87,Default,,0000,0000,0000,,{\i1}typewriter typing sounds{\i0} Dialogue: 0,1:04:14.87,1:04:19.61,Default,,0000,0000,0000,,Remember, just as I went to Spain to fight\Nthe dirty fascists you can come to Onion Dialogue: 0,1:04:19.61,1:04:24.09,Default,,0000,0000,0000,,land and fight Big Brother’s filthy\Ntactics. If you’re a Pro run a node and Dialogue: 0,1:04:24.09,1:04:28.18,Default,,0000,0000,0000,,strengthen the code. Or if you’re in the\NOuter Party and can afford it, send TOR Dialogue: 0,1:04:28.18,1:04:33.72,Default,,0000,0000,0000,,some of your dough. Special Salute to\Nall my comrades, the “State of the Onion”. Dialogue: 0,1:04:33.72,1:04:38.11,Default,,0000,0000,0000,,Happy Hacking! Now go forth and\Nf_ck up Big Brother. That mendacious Dialogue: 0,1:04:38.11,1:04:42.54,Default,,0000,0000,0000,,motherf_cking, c_ck-sucking bastard\Nson of a corporatist b_tch… Dialogue: 0,1:04:42.54,1:04:52.91,Default,,0000,0000,0000,,{\i1}Video Outro Music{\i0} Dialogue: 0,1:04:52.91,1:05:00.100,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,1:05:00.100,1:05:05.41,Default,,0000,0000,0000,,Jacob: So, I think that’s all the time\Nthat we have. Thank you very much for Dialogue: 0,1:05:05.41,1:05:08.76,Default,,0000,0000,0000,,coming. And thank you all\Nfor your material support. Dialogue: 0,1:05:08.76,1:05:35.37,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,1:05:35.37,1:05:41.72,Default,,0000,0000,0000,,Herald: Unfortunately we won’t have time\Nfor a Q&A. But I heard that some of the Dialogue: 0,1:05:41.72,1:05:49.94,Default,,0000,0000,0000,,crew will now go to the Wau Holland booth\Nat Noisy Square down in the Foyer and Dialogue: 0,1:05:49.94,1:05:54.79,Default,,0000,0000,0000,,might be ready to answer\Nquestions there. If you have any. Dialogue: 0,1:05:54.79,1:05:59.33,Default,,0000,0000,0000,,{\i1}postroll music{\i0} Dialogue: 0,1:05:59.33,1:06:05.88,Default,,0000,0000,0000,,Subtitles created by c3subtitles.de\Nin 2016. Join and help us!