0:00:00.000,0:00:11.019
preroll music
0:00:11.019,0:00:18.269
Herald: I am very happy to introduce this[br]year’s update on the “State of the Onion”!
0:00:18.269,0:00:23.969
This is a talk with about 5 speakers,[br]so let’s introduce them one by one.
0:00:23.969,0:00:28.529
First, Roger. He did it the last talk.[br]He is the founder of the TOR Project,
0:00:28.529,0:00:35.979
applause[br]MIT Graduate and Top 100 Global Thinkers.
0:00:35.979,0:00:39.059
Then we have Jake, a[br]humble PHD math student
0:00:39.059,0:00:42.410
applause
0:00:42.410,0:00:46.350
that is in my opinion not a[br]National Security threat
0:00:46.350,0:00:51.190
but a post National Security promise.
0:00:51.190,0:00:55.129
We have Mike Perry, and I think[br]it is enough to say about him,
0:00:55.129,0:00:58.700
that the NSA calls him a worthy adversary.
0:00:58.700,0:01:04.909
applause
0:01:04.909,0:01:09.250
He is also the lead dev[br]of the TOR Browser.
0:01:09.250,0:01:14.220
And then we have Alison Macrina,[br]a radical, militant librarian.
0:01:14.220,0:01:21.270
applause
0:01:21.270,0:01:28.040
And last but not least: Shari Steele, the[br]new Executive Director of the TOR Project.
0:01:28.040,0:01:35.500
applause
0:01:35.500,0:01:40.220
So without further ado:[br]This year’s State of the Onion!
0:01:40.220,0:01:45.230
applause
0:01:45.230,0:01:49.490
Jacob: Alright, it’s a great[br]honor to be back here again.
0:01:49.490,0:01:52.640
And we’re really happy to be able[br]to introduce so many more faces.
0:01:52.640,0:01:56.770
It’s no longer the Roger and Jake[br]show. That’s very important to us.
0:01:56.770,0:02:01.430
Hopefully next year, we won’t[br]be here, but we’ll still be alive.
0:02:01.430,0:02:05.660
So 2015, if I were to express[br]it in a hand gesture
0:02:05.660,0:02:10.310
or with a facial expression, it would[br]look something like “Ooouuw”.
0:02:10.310,0:02:15.460
It was really a year of big changes. Not[br]all of them were really good changes.
0:02:15.460,0:02:18.450
And there were a lot of heavy things[br]that happened throughout the year.
0:02:18.450,0:02:22.020
We won’t even be able to cover all of[br]them because we only have an hour.
0:02:22.020,0:02:25.760
So we want to focus on the[br]positive things. I would say that
0:02:25.760,0:02:30.120
probably the nicest thing is that we are[br]growing. We’re really, really growing.
0:02:30.120,0:02:33.200
Not only growing the network,[br]but we’re growing the community.
0:02:33.200,0:02:37.030
And in some sense we’re expanding[br]throughout the whole world in terms of
0:02:37.030,0:02:41.450
users who are using TOR, what TOR[br]users are using TOR for, which is
0:02:41.450,0:02:45.200
of course extremely important that there[br]is more and more people just doing
0:02:45.200,0:02:49.260
regular things with TOR, protecting[br]themselves. But then we have of course
0:02:49.260,0:02:52.100
lots of specialized things that happen[br]with the TOR network as well.
0:02:52.100,0:02:56.290
We have things like OnionBalance and[br]Ricochet. Really exciting developments.
0:02:56.290,0:03:01.060
And we’ll talk a bit about all of those[br]things. One of the most unlikely things,
0:03:01.060,0:03:05.990
at least when I imagine working[br]on TOR, say 10 years ago vs. now,
0:03:05.990,0:03:09.750
is that we’ve worked with some really[br]unlikely partners. Some of you know
0:03:09.750,0:03:17.190
that I’m not really a big fan of Silicon[br]Valley, even though I’m from there.
0:03:17.190,0:03:21.860
So you know, I sometimes call Facebook[br]not so nice names, like Stasi-Book.
0:03:21.860,0:03:24.190
And part of the reason for that is[br]because I think it is a little bit weird,
0:03:24.190,0:03:28.250
that you report on all your friends[br]in order to go to parties.
0:03:28.250,0:03:32.459
Previously it was to get into the party[br]and now it is to go to parties.
0:03:32.459,0:03:35.860
And yet we worked with them on something.
0:03:35.860,0:03:39.680
Because it turns out that sometimes[br]you have unlikely temporary alliances.
0:03:39.680,0:03:43.490
And it turns out that while I personally[br]may think that they are evil incarnate
0:03:43.490,0:03:48.470
in some sense, it is the case that[br]there is at least one good guy there.
0:03:48.470,0:03:52.640
Alec worked on this fantastic RFC7686,
0:03:52.640,0:03:58.130
that actually allowed us to help all[br]Facebook users mitigate some harm.
0:03:58.130,0:04:01.540
Which is that if they want to be able[br]to visit Facebook; and I guess
0:04:01.540,0:04:05.280
the reality is that not using Facebook[br]for a lot of people is sort of like
0:04:05.280,0:04:08.590
the “Kill your Television” bumper sticker[br]of the 90s. For those of you that ever
0:04:08.590,0:04:13.470
visited rural America. You know that that[br]wasn’t like a really successful campaign.
0:04:13.470,0:04:18.469
A lot of people have TVs these days[br]as well. So it’s a little bit like that,
0:04:18.469,0:04:22.370
only here we actually built an alternative[br]where we can mitigate harm.
0:04:22.370,0:04:25.400
And that’s really incredibly important[br]because it mitigates harm in all sorts
0:04:25.400,0:04:29.129
of different pieces of software. It[br]makes it possible for us to talk to
0:04:29.129,0:04:32.900
Browser vendors, to DNS resolvers.[br]And part of this was motivated
0:04:32.900,0:04:36.569
by some investigative journalism[br]that I actually did, where I revealed
0:04:36.569,0:04:41.090
XKeyscore rules, where the US[br]Government’s National Security Agency
0:04:41.090,0:04:45.159
was sifting through all of the internet[br]traffic to look for .onion addresses.
0:04:45.159,0:04:49.169
So when they saw a DNS request[br]for .onion they were actually
0:04:49.169,0:04:52.919
learning .onions by harvesting traffic.[br]And that really motivated me
0:04:52.919,0:04:55.779
to want to make it, so that the DNS[br]resolvers didn’t do that anymore.
0:04:55.779,0:05:00.819
It was very important, because one[br]of my core missions with TOR
0:05:00.819,0:05:04.699
is to make that kind of stuff a[br]lot harder for the spies to do.
0:05:04.699,0:05:08.980
And protecting everyday users, even[br]users who aren’t TOR users, yet.
0:05:08.980,0:05:12.300
And that’s very important. So working[br]with Alec on this has been great,
0:05:12.300,0:05:16.169
because the IETF actually[br]supports this. And now
0:05:16.169,0:05:20.190
ICANN will not sell[br].onion to anyone.
0:05:20.190,0:05:24.250
It’s a special use reserved[br]name. And that’s incredible!
0:05:24.250,0:05:31.269
applause
0:05:31.269,0:05:34.599
Roger: OK, so. Is this[br]thing on? Yes it is, great!
0:05:34.599,0:05:37.370
So there are a couple of interesting[br]graphs, that we’re going to give you,
0:05:37.370,0:05:42.490
of usage scenarios, usage[br]instances over the past year.
0:05:42.490,0:05:46.539
So pretty recently we were looking at[br]the number of people in Russia
0:05:46.539,0:05:51.199
using TOR. Russia has been talking about[br]censoring, talking about all sorts of
0:05:51.199,0:05:55.979
oppression steps. And at[br]the beginning of November,
0:05:55.979,0:06:01.219
we moved from 180k people in[br]Russia each day using TOR
0:06:01.219,0:06:05.749
up to almost 400k people. And[br]this is probably a low estimate.
0:06:05.749,0:06:10.159
So many hundreds of thousands[br]of people for that two week period,
0:06:10.159,0:06:14.619
which started with a Russian bomber[br]getting shot down, were trying to get
0:06:14.619,0:06:18.319
news from the rest of the world, rather[br]than news as Russia wanted to show it
0:06:18.319,0:06:22.460
to them. So that’s[br]kind of a cool event.
0:06:22.460,0:06:26.139
Another interesting event: Bangladesh[br]ended up censoring Facebook
0:06:26.139,0:06:30.229
and some other websites and a whole[br]lot of people switched to using TOR.
0:06:30.229,0:06:32.909
I was actually talking to one of the[br]Facebook people and they have their own
0:06:32.909,0:06:37.819
internal statistics about the number of[br]people connecting over the TOR network
0:06:37.819,0:06:42.279
to Facebook. And it would be super[br]cool to super impose these two graphs.
0:06:42.279,0:06:45.749
Our data is public and open[br]and we like sharing it.
0:06:45.749,0:06:49.520
They don’t actually share their data.[br]But one day it would be really cool
0:06:49.520,0:06:53.110
to be able to see both of these[br]graphs at once, to see users shifting
0:06:53.110,0:06:57.259
from reaching Facebook[br]directly to going over TOR.
0:06:57.259,0:07:00.050
The other interesting thing from the[br]Bangladesh side: I was looking at the
0:07:00.050,0:07:04.499
Alexa top websites around the[br]world and we, torproject.org is
0:07:04.499,0:07:08.539
like 8000th in the global[br]rankings, but at least
0:07:08.539,0:07:11.649
for the past couple of weeks[br]torproject.org has been
0:07:11.649,0:07:16.849
300th in Bangladesh. So there are a[br]whole heck of a lot of people there,
0:07:16.849,0:07:22.889
learning about these privacy things[br]that can get around local censorship.
0:07:22.889,0:07:28.289
applause
0:07:28.289,0:07:32.270
OK, and then an exciting[br]other story that we’re
0:07:32.270,0:07:35.900
going to touch on briefly, but[br]it’s an entire talk on its own.
0:07:35.900,0:07:40.439
So let me give you a couple[br]of facts and we’ll go from there.
0:07:40.439,0:07:44.069
January of 2014 a hundred[br]relays showed up
0:07:44.069,0:07:47.699
in the TOR network and we weren’t sure[br]who was running them, but they weren’t
0:07:47.699,0:07:52.159
exit relays, so they didn’t seem like[br]they were such a threat at the time.
0:07:52.159,0:07:57.839
Fast forward a while later: The[br]CERT organization inside CMU
0:07:57.839,0:08:01.929
submitted a presentation to[br]Blackhat on how cool they were
0:08:01.929,0:08:05.939
for being able to attack TOR users. And[br]they talked about how they were going to
0:08:05.939,0:08:09.610
talk about individual users[br]that they de-anonymized
0:08:09.610,0:08:12.990
and how cool they were for that.[br]And I spent a while trying to extract
0:08:12.990,0:08:17.479
details from them. And eventually[br]I learned what their attack was.
0:08:17.479,0:08:21.169
And then Nick Mathewson, one of[br]the other TOR developers decided
0:08:21.169,0:08:25.050
to check the TOR network to see if[br]anybody was actually doing that attack.
0:08:25.050,0:08:29.099
I mean it’s CERT, they are the[br]folks who publicised the phrase
0:08:29.099,0:08:33.059
“responsible disclosure”. Surely,[br]they are not actually undermining
0:08:33.059,0:08:36.679
the TOR network and attacking TOR users.[br]But then it turns out that somebody was
0:08:36.679,0:08:40.880
doing the attack. And it was these[br]100 relays that looked kind of ordinary
0:08:40.880,0:08:44.759
and innocuous before that. Then I sent[br]mail to the CERT people, saying:
0:08:44.759,0:08:48.540
“Hey are those relays yours?” And they[br]went silent. They have never answered any
0:08:48.540,0:08:54.269
of my mails since then. So that’s[br]what we know. It doesn’t look good.
0:08:54.269,0:08:58.009
One of the key things that we,[br]TOR, have done from here is
0:08:58.009,0:09:01.459
we’ve been working on strengthening[br]the TOR network and getting better
0:09:01.459,0:09:05.389
at recognizing these things. So[br]the core of the attack was that
0:09:05.389,0:09:09.150
they did what’s called a Sybil attack,[br]where you sign up a lot of relays
0:09:09.150,0:09:13.449
and you become too large a fraction of the[br]TOR network. So we’ve been working on
0:09:13.449,0:09:18.339
a lot of ways to recognize that[br]an attack like that is happening,
0:09:18.339,0:09:22.139
and mitigate it, and get rid of it[br]early. For example Philipp Winter
0:09:22.139,0:09:26.819
has a bunch of interesting research[br]areas on recognizing similarity
0:09:26.819,0:09:30.670
between relays. So you can[br]automatically start detecting:
0:09:30.670,0:09:33.920
“Wait a minute, this event[br]happened, where a lot of relays
0:09:33.920,0:09:38.480
are more similar than they should[br]be.” Another example there is:
0:09:38.480,0:09:41.610
We used to say: “Well I don’t[br]know who’s running them,
0:09:41.610,0:09:45.399
but they don’t seem that dangerous. So[br]OK, it’s good to grow the TOR network.”
0:09:45.399,0:09:48.940
Now we’re taking the other[br]approach of “Gosh, that’s weird,
0:09:48.940,0:09:52.470
let’s get rid of them and then[br]we’ll ask questions after that.”
0:09:52.470,0:09:56.009
So we’re trying to be more[br]aggressive, more conservative
0:09:56.009,0:09:59.880
at keeping the TOR network[br]safe from large adversaries.
0:09:59.880,0:10:04.620
Whether they’re government organizations[br]or corporations or individuals.
0:10:04.620,0:10:12.029
Whoever might be attacking it.
0:10:12.029,0:10:17.220
Jacob: We’ve had a few really big[br]changes in the TOR community.
0:10:17.220,0:10:20.610
One of them is that we had[br]an Interim Executive Director
0:10:20.610,0:10:25.930
come on in a sort of quick moment[br]and that’s Roger Dingledine.
0:10:25.930,0:10:28.850
Some of you probably always thought he[br]was the Executive Director the whole time.
0:10:28.850,0:10:33.279
That’s because for a while he was and then[br]he wasn’t. And then he was back again.
0:10:33.279,0:10:37.490
And that change was quite a[br]huge change in that instead of
0:10:37.490,0:10:41.190
working on a lot of anonymity stuff,[br]Roger was doing a lot of bureaucratic
0:10:41.190,0:10:44.519
paperwork which was actually quite[br]sad for the anonymity world, I think.
0:10:44.519,0:10:48.160
He probably reviewed fewer papers[br]and did fewer anonymity things
0:10:48.160,0:10:51.790
this year than ever before.[br]Which is really, really sad.
0:10:51.790,0:10:55.050
But that really lit a fire under us to[br]make sure that we would actually
0:10:55.050,0:10:58.839
change that. To make sure that it was[br]possible to get someone else, who is
0:10:58.839,0:11:02.399
really good at being an Executive Director[br]of the TOR Project, to really lead,
0:11:02.399,0:11:06.459
so that we could have Roger return to[br]not only being an anonymity researcher,
0:11:06.459,0:11:09.240
but also the true Spirit[br]Animal of the TOR Project.
0:11:09.240,0:11:13.440
He doesn’t look like[br]an onion, but in spirit.
0:11:13.440,0:11:19.540
Roger: Slide![br]Jacob: laughing
0:11:19.540,0:11:22.329
Another really big thing that happened[br]is working with Laura Poitras
0:11:22.329,0:11:27.800
over the last many years.[br]She has followed the TOR Project
0:11:27.800,0:11:31.129
– lots of people like to follow the[br]people on the TOR Project –
0:11:31.129,0:11:35.639
but we consented to her following us.[br]And she made a film, “Citizenfour”,
0:11:35.639,0:11:39.000
I think some of you… have[br]any of you seen this film?
0:11:39.000,0:11:45.170
applause[br]Quite amazingly,
0:11:45.170,0:11:48.499
she won an Oscar. Actually, she[br]basically won every film prize.
0:11:48.499,0:11:57.269
applause
0:11:57.269,0:12:01.170
One of the key things is that people[br]in this room that work on Free Software
0:12:01.170,0:12:04.819
were explicitly thanked. If you work[br]on Tails, if you work on GnuPG,
0:12:04.819,0:12:08.649
if you work on SecureDrop,[br]OTR, TOR, …
0:12:08.649,0:12:11.459
She specifically said in[br]the credits of the film:
0:12:11.459,0:12:15.490
This film wouldn’t have been[br]possible without that Free Software.
0:12:15.490,0:12:18.939
Actually making her job and[br]the jobs of her source
0:12:18.939,0:12:22.000
and other people involved…[br]making that possible.
0:12:22.000,0:12:25.750
And so her winning that Oscar[br]in some sense feels like
0:12:25.750,0:12:29.480
closing a really big loop that had[br]been open for a very long time.
0:12:29.480,0:12:33.000
And it’s really great and she,[br]I think, would really wish that she
0:12:33.000,0:12:37.660
could be here today, again. She[br]sends her regards, and she is really,
0:12:37.660,0:12:42.470
really thankful for everybody here that[br]writes Free Software for freedom!
0:12:42.470,0:12:47.909
applause
0:12:47.909,0:12:51.639
Roger: So another exciting event[br]that happened in 2015 is that reddit
0:12:51.639,0:12:55.660
gave us 83.000$. They had some[br]extra profit and they decided
0:12:55.660,0:13:00.839
that they would give it to 10 non-profits[br]chosen from among the Redditer community.
0:13:00.839,0:13:03.839
And there were people who came to me[br]and said: “Hey Roger, you really have to,
0:13:03.839,0:13:06.939
you know, start advocating, start[br]teaching everybody, why TOR should be
0:13:06.939,0:13:10.290
one of them.” And I said: “Oh, I’m[br]busy. Those things never work.
0:13:10.290,0:13:13.810
You know, they’ll choose somebody[br]else.” And so it turns out that we were
0:13:13.810,0:13:18.550
the 10th out of 10 without doing[br]any advocacy work whatsoever
0:13:18.550,0:13:22.509
to the reddit community, which is super[br]cool that they care about us so much.
0:13:22.509,0:13:27.089
Also reddit divided the ten equally. So[br]even though we were the 10th out of 10,
0:13:27.089,0:13:31.200
we got 10% of the donations[br]that they were giving out.
0:13:31.200,0:13:37.870
applause
0:13:37.870,0:13:41.149
Jake: One of the really –[br]I would say one of the oddest things
0:13:41.149,0:13:46.120
about working at the TOR Project for me[br]is that TOR has supported me through
0:13:46.120,0:13:49.629
really crazy times. So when I was[br]being detained by the US Government
0:13:49.629,0:13:54.550
or having my property stolen by fascist[br]pigs in the United States Government’s
0:13:54.550,0:13:59.329
border checkpoints, TOR didn’t fire me.[br]TOR always backed me and always
0:13:59.329,0:14:03.379
kept me safe. And many people often look[br]like they wanted to kill me from stress,
0:14:03.379,0:14:06.389
but often they didn’t, which was nice.[br]Or they didn’t get close enough
0:14:06.389,0:14:10.669
and I could move fast enough. But[br]they were always very helpful. And
0:14:10.669,0:14:14.949
they’ve really helped me to[br]go and do things to speak for
0:14:14.949,0:14:18.430
anonymous users who can’t go[br]other places. And one of the places
0:14:18.430,0:14:22.220
which I was most honored to go in the[br]last year – I was actually scheduled
0:14:22.220,0:14:25.569
to go there with Caspar Bowden, but[br]unfortunately he was ill at the time.
0:14:25.569,0:14:29.899
And as you know, Caspar[br]has since passed away.
0:14:29.899,0:14:32.999
But we were scheduled to go together and[br]TOR was supporting us both, actually,
0:14:32.999,0:14:38.319
to go to this. And it resulted, I believe,
0:14:38.319,0:14:41.519
in a very amazing meeting in[br]Geneva at the United Nations,
0:14:41.519,0:14:45.779
where the special rapporteur actually[br]endorsed TOR and off-the-record messaging
0:14:45.779,0:14:49.729
and encryption programs,[br]and privacy, and free software.
0:14:49.729,0:14:54.680
Saying that they are absolutely essential.[br]And in fact their use should be encouraged
0:14:54.680,0:14:59.629
from a human rights perspective. And in[br]fact the really amazing part about it is
0:14:59.629,0:15:03.649
he didn’t do it only from the perspective[br]of free speech. And this is important,
0:15:03.649,0:15:07.139
because actually there are other rights.[br]And we should think about them.
0:15:07.139,0:15:10.370
So for example the right to form[br]and to hold an idea is a right
0:15:10.370,0:15:14.079
that cannot be abridged. The right[br]to free speech can be abridged
0:15:14.079,0:15:18.589
in many free societies, but what is[br]in your head and how you form it
0:15:18.589,0:15:22.040
is something where… that is not[br]a right that can be abridged.
0:15:22.040,0:15:25.579
And he wrote this in the report. And[br]he, when writing this report with
0:15:25.579,0:15:29.899
many other people, made it very clear that[br]this is something we need to keep in mind.
0:15:29.899,0:15:34.249
That when we talk about private spaces[br]online, where groups may collaborate
0:15:34.249,0:15:37.850
to form ideas, to be able to create[br]a political platform for example,
0:15:37.850,0:15:41.220
to be able to make democratic change,[br]they need to be able to use the internet
0:15:41.220,0:15:46.319
to freely exchange those ideas in a secure[br]and anonymized, encrypted fashion.
0:15:46.319,0:15:50.889
And that helps them to form and to hold[br]ideas. And obviously that helps them later
0:15:50.889,0:15:55.470
to express free speech ideas. And that’s[br]a huge thing to have the United Nations
0:15:55.470,0:16:02.409
endorse basically what many of us in this[br]room have been saying for, well… decades.
0:16:02.409,0:16:05.459
Roger: So the UN thing is really cool.[br]We’ve also been doing some other
0:16:05.459,0:16:09.879
policy angles. So Steven Murdoch, who[br]is a professor in England and also
0:16:09.879,0:16:14.350
part of the TOR community, has worked[br]really hard at teaching the British folks,
0:16:14.350,0:16:18.490
that their new backdoor laws and[br]their new terrible laws are actually
0:16:18.490,0:16:23.240
not what any reasonable country wants.[br]So he’s put a huge amount of energy into
0:16:23.240,0:16:27.680
basically advocating for freedom for[br]them. And similarly Paul Syverson,
0:16:27.680,0:16:32.569
part of the TOR community, basically[br]ended up writing a post note for the UK
0:16:32.569,0:16:36.790
about how the dark web is[br]misunderstood. See previous talk.
0:16:36.790,0:16:40.680
So we’ve been doing quite a bit[br]of education at the policy level
0:16:40.680,0:16:44.910
to try to teach the world, that encryption[br]is good and safe and worthwhile
0:16:44.910,0:16:50.070
and should be the default[br]around the world.
0:16:50.070,0:16:54.050
Jake: And there is a kind of interesting[br]thing here. Maybe a little contentious
0:16:54.050,0:16:57.279
with some people in the TOR community.[br]But I just wanted to make it really clear.
0:16:57.279,0:17:01.170
We have the TOR Project, which is[br]a non-profit in the United States.
0:17:01.170,0:17:04.569
And we have a much wider TOR[br]community all around the world.
0:17:04.569,0:17:07.950
And in Berlin we have a really, really[br]like an incredible TOR community.
0:17:07.950,0:17:11.380
We have people like Donncha working[br]on OnionBalance. We have people like
0:17:11.380,0:17:14.810
Leif Ryge working on bananaphone. We[br]have all of these different people working
0:17:14.810,0:17:17.970
on all sorts of Free Software. And many[br]of those people don’t actually work
0:17:17.970,0:17:21.240
for the TOR Project. They’re community[br]members, they’re volunteers,
0:17:21.240,0:17:26.010
there is some of privacy students.[br]And so the Renewable Freedom Foundation
0:17:26.010,0:17:30.050
actually funded the creation[br]of a sort of separate space
0:17:30.050,0:17:33.980
in Berlin where people work on these[br]kinds of things, which is not affiliated
0:17:33.980,0:17:38.100
with US Government money. It’s[br]not affiliated with the TOR Project
0:17:38.100,0:17:41.360
as some sort of corporate thing.[br]It’s not a multinational thing.
0:17:41.360,0:17:46.630
It’s really the peer-to-peer version in[br]some sense of what we’ve already had
0:17:46.630,0:17:49.650
in other places. And it’s really great[br]and I wanted to just thank Moritz
0:17:49.650,0:17:54.350
who made that happen and to all the[br]people like Aaron Gibson, and Juris
0:17:54.350,0:17:57.900
who actually put that space together[br]and made it possible. So in Berlin,
0:17:57.900,0:18:01.740
there is a space, not just c-base,[br]not just CCCB, but actually
0:18:01.740,0:18:05.600
a place which is about anonymity.[br]It’s called Zwiebelraum.
0:18:05.600,0:18:09.430
And this is a place in which people are[br]working on this Free Software. And they
0:18:09.430,0:18:12.340
are doing it in an independent manner.[br]And we hope actually that people will
0:18:12.340,0:18:16.400
come together and support that, because[br]we need more spaces like that, that
0:18:16.400,0:18:20.670
are not directly affiliated with the TOR[br]Project, necessarily, but where we have
0:18:20.670,0:18:24.280
an aligned mission about reproduceable[br]builds in Free Software and also
0:18:24.280,0:18:29.300
about anonymity and actually about caring[br]about Free Speech. And actually making
0:18:29.300,0:18:33.110
it happen. And really building spaces[br]like that all around the world. So if you
0:18:33.110,0:18:36.140
have a place in your town where you want[br]to work on those things, we would really
0:18:36.140,0:18:40.340
hope that you will work on building that.[br]I called it “general cipher punkery”.
0:18:40.340,0:18:44.300
I feel like that’s a good description.[br]There’s lots of stuff to be done.
0:18:44.300,0:18:48.940
And now for a Marxist joke: So we[br]discovered the division of labor,
0:18:48.940,0:18:52.570
which was a really important discovery.[br]We’re about 180 years too late,
0:18:52.570,0:18:58.310
but we started to split up where it didn’t[br]go very well, the Marxist asked why.
0:18:58.310,0:19:02.410
Cheers, cheers![br]So the Vegas Teams are really simple.
0:19:02.410,0:19:06.620
Basically we have a bunch of people[br]that previously they did everything.
0:19:06.620,0:19:10.130
And this really doesn’t work. It’s very[br]stressful and it’s very frustrating
0:19:10.130,0:19:14.470
and it leads to people doing lots and[br]lots of things in a very unfocused way.
0:19:14.470,0:19:18.740
And so we split it up! And it actually[br]happened naturally, it was emergent.
0:19:18.740,0:19:24.010
So e.g. Mike Perry, who’s gonna talk[br]about the Applications Team’s work
0:19:24.010,0:19:28.280
in a second here, he was[br]already leading this,
0:19:28.280,0:19:32.370
he was really making this happen. And[br]so we just made it more explicit. And,
0:19:32.370,0:19:36.650
in fact we created a way of communicating[br]and reporting back so that
0:19:36.650,0:19:39.850
you don’t have to, like, drink from the[br]fire hose about absolutely everything
0:19:39.850,0:19:42.430
that’s happening everywhere, but you can[br]sort of tune in to those things, which
0:19:42.430,0:19:46.970
means we get higher-level understandings[br]and that is a really, incredibly useful
0:19:46.970,0:19:49.740
thing that has made us much more[br]productive. And what was part of the
0:19:49.740,0:19:53.500
growing pains of the last year actually[br]was figuring out how to make that work
0:19:53.500,0:19:57.210
because we’re a pretty flat group in terms[br]of a community and a pretty flat group
0:19:57.210,0:20:02.060
in terms of an organization writing[br]Free Software and advocating.
0:20:02.060,0:20:06.500
And so that’s a really incredibly good[br]thing which will come up all the time.
0:20:06.500,0:20:09.770
You’ll hear people talking about the[br]Metrics Team or the Network Team or the
0:20:09.770,0:20:13.650
Applications Team or the Community Team.[br]And that’s what we’re talking about.
0:20:13.650,0:20:17.630
In that sense. So we tried to formalize it[br]and in some ways we may be moving in a
0:20:17.630,0:20:23.840
sort of Debian model a little bit. And[br]we’ll see how that actually goes. So we
0:20:23.840,0:20:28.470
have a really great person here to[br]explain the work of the Metrics Team.
0:20:28.470,0:20:32.350
Roger: OK, so I’m gonna tell you a little[br]bit about what the Metrics Team has been
0:20:32.350,0:20:36.570
working on lately to give you a[br]sense of some of the components
0:20:36.570,0:20:40.890
of the TOR community. So there are 5 or[br]10 people who work on the Metrics Team.
0:20:40.890,0:20:45.350
We actually only pay one-ish of them;[br]so most of them are volunteers
0:20:45.350,0:20:48.980
and that’s… on the one hand that’s great.[br]It’s wonderful that there are researchers
0:20:48.980,0:20:53.750
all around the world who are contributing[br]and helping to visualize and helping to do
0:20:53.750,0:20:57.980
analysis on the data. On the other hand[br]it’s sort of sad that we don’t have a full
0:20:57.980,0:21:02.530
team of full-time people who are working[br]on this all the time. So it’d be great
0:21:02.530,0:21:07.710
to have your assistance[br]working on this. So,
0:21:07.710,0:21:12.430
actually Metrics has been accumulating[br]all sorts of analysis tools
0:21:12.430,0:21:16.990
over the past 5 years. So there are up to[br]30 different little tools. There’s Atlas
0:21:16.990,0:21:22.410
and Globe and Stem and 20-something more[br]which is a challenge to keep coordinated,
0:21:22.410,0:21:26.690
a challenge to keep maintained. So[br]they’ve been working on how to integrate
0:21:26.690,0:21:32.090
these things and make them more[br]usable and maintainable and extensible.
0:21:32.090,0:21:36.370
So one example that they… so they wrote[br]some slides for me to present here.
0:21:36.370,0:21:40.050
One example that they were looking[br]at, to give you an example of how
0:21:40.050,0:21:45.540
this analysis works, is bad relays in the[br]TOR network. So maybe that’s an exit relay
0:21:45.540,0:21:50.520
that runs, but it modifies traffic, or[br]it watches traffic or something.
0:21:50.520,0:21:56.150
Maybe it’s a relay that signs up[br]as a Hidden Service directory
0:21:56.150,0:21:59.970
and then when you publish your[br]onion address to it, it goes to visit it
0:21:59.970,0:22:04.370
or it puts it on a big list or something[br]like that. Or maybe bad relays are Sybils
0:22:04.370,0:22:09.580
who – we were talking earlier about[br]the 2014 attack where a 100 relays
0:22:09.580,0:22:14.750
showed up at once and we, the directory[br]authorities have a couple of ways of
0:22:14.750,0:22:19.500
addressing that relays. One of them is[br]each of the directory authorities can say:
0:22:19.500,0:22:22.670
“That relay needs to get out of the[br]network! We just cut it out of the
0:22:22.670,0:22:27.900
network.” We can also say: “Bad exit!”[br]We can also say: “That relay is no longer
0:22:27.900,0:22:33.240
gonna be used as an exit!” So even though[br]it advertises that it can reach Blockchain
0:22:33.240,0:22:39.320
and other websites, clients choose not to[br]do it that way. So that’s the background.
0:22:39.320,0:22:44.920
One of the tools that Damian wrote a while[br]ago is called Tor-Consensus-Health and it
0:22:44.920,0:22:49.570
looks every hour at the new list of relays[br]in the network and it tries to figure out:
0:22:49.570,0:22:53.000
“Is there something suspicious that[br]just happened at this point?” And in this
0:22:53.000,0:22:57.920
case it looks for a bunch of new relays[br]showing up all at the same time with
0:22:57.920,0:23:04.530
similar characteristics and it sends email[br]to a list. So that’s useful. The second
0:23:04.530,0:23:08.910
piece of the analysis is “OK, what do you[br]do when that happens?” So we get an email
0:23:08.910,0:23:13.960
saying “Hey, 40 new relays showed up,[br]what’s up with that?” So there’s a real
0:23:13.960,0:23:18.790
challenge there to decide: do we allow[br]the TOR network to grow – sounds good –
0:23:18.790,0:23:23.280
or do we wonder who these people are[br]and try to contact them or cut them out of
0:23:23.280,0:23:29.600
the network or constrain what fraction[br]of the network they can become.
0:23:29.600,0:23:35.150
So Philipp Winter also has a[br]visualization, in this case of basically
0:23:35.150,0:23:41.310
which relays were around on a given month.[br]So the X axis is all of the different
0:23:41.310,0:23:46.100
relays in the month and the Y axis is each[br]hour during that month. And they’ve sorted
0:23:46.100,0:23:51.010
the relays here by how much they were[br]present in the given month. And you’ll
0:23:51.010,0:23:55.120
notice the red blocks over there are[br]relays that showed up at the same time
0:23:55.120,0:23:59.320
and they’d been consistently present at[br]the same time since then. So that’s kind
0:23:59.320,0:24:03.070
of suspicious. That’s “Hey, wait a minute,[br]what’s that pattern going on there?”
0:24:03.070,0:24:07.260
So this is a cool way of visualizing and[br]being able to drill down and say:
0:24:07.260,0:24:10.780
“Wait a minute, that pattern right there,[br]something weird just happened.”
0:24:10.780,0:24:14.470
So part of the challenge in general for[br]the Metrics Team is: they have a Terabyte
0:24:14.470,0:24:18.350
of interesting data of what the network[br]has looked like over the years –
0:24:18.350,0:24:23.650
how do you turn that into “Wait a minute,[br]that right there is something mysterious
0:24:23.650,0:24:27.320
that just happened. Let’s look at it[br]more.” So you can look at it from
0:24:27.320,0:24:31.650
the visualization side but you can also[br]– there’s a tool called Onionoo where
0:24:31.650,0:24:35.290
you can basically query it, all sorts[br]of queries in it, it dumps the data
0:24:35.290,0:24:39.940
back on to you. So we’ve got a Terabyte[br]of interesting data out there, what
0:24:39.940,0:24:44.810
the relays are on the network, what[br]sort of statistics they been reporting,
0:24:44.810,0:24:48.930
when they’re up, when they’re down,[br]whether they change keys a lot,
0:24:48.930,0:24:55.080
whether they change IP addresses a lot.[br]So we encourage you to investigate and
0:24:55.080,0:24:59.410
look at these tools etc. So there’s[br]a new website we set up this year
0:24:59.410,0:25:05.180
called CollecTor, collector.torproject.org[br]that has all of these different data sets
0:25:05.180,0:25:09.270
and pointers to all these different[br]libraries and tools etc. that you too
0:25:09.270,0:25:15.030
can use to investigate, graph-visualize[br]etc. So here’s another example.
0:25:15.030,0:25:19.280
At this point we’re looking at the 9[br]directory authorities in the network.
0:25:19.280,0:25:24.620
Each of them votes its opinion about[br]each relay. So whether the relay’s fast,
0:25:24.620,0:25:31.060
or stable, or looks like a good exit or[br]maybe we should vote about “Bad Exit”
0:25:31.060,0:25:35.850
for it. So the grey lines are: all of the[br]directory authorities thought that
0:25:35.850,0:25:41.120
it didn’t deserve the flag and it’s very[br]clear. The green lines are: enough of the
0:25:41.120,0:25:45.310
directory authorities said that the relay[br]should get the flag, also very clear.
0:25:45.310,0:25:49.960
And all the brown and light green etc.[br]in the middle are contradictions.
0:25:49.960,0:25:53.290
That’s where some of the directory[br]authorities said “Yes it’s fast” and some
0:25:53.290,0:25:58.710
of them said “No, it’s not fast”. And this[br]gives us a visualization, a way to see
0:25:58.710,0:26:02.800
whether most of the directory authorities[br]are agreeing with each other.
0:26:02.800,0:26:06.290
We should look at this over time and if[br]suddenly there’s a huge brown area
0:26:06.290,0:26:10.930
then we can say “Wait a minute,[br]something’s going on”, where maybe
0:26:10.930,0:26:15.080
a set of relays are trying to look good to[br]these directory authorities and trying
0:26:15.080,0:26:19.700
not to look good to these. So basically[br]it helps us to recognize patterns
0:26:19.700,0:26:26.070
of weird things going on. So on CollecTor[br]you can find all sorts of data sets
0:26:26.070,0:26:32.690
and you can fetch them and do your[br]analysis of them. And Tor Metrics
0:26:32.690,0:26:38.280
– metrics.torproject.org – has a bunch of[br]examples of this analysis, where you can
0:26:38.280,0:26:42.430
look at graphs of the number of people[br]connecting from different countries, the
0:26:42.430,0:26:46.700
number of relays over time, the number[br]of new relays, the number of bridges,
0:26:46.700,0:26:52.530
users connecting to bridges etc. There[br]are 3 different libraries that help you
0:26:52.530,0:26:56.210
to parse these various data sets. So[br]there’s one in Python, one in Java,
0:26:56.210,0:27:01.160
one in Go; so whichever one of those[br]you enjoy most you can grab and start
0:27:01.160,0:27:07.860
doing analysis. They do weekly or so[br]IRC meetings, so the TOR Metrics Team
0:27:07.860,0:27:11.950
invites you to show up on January 7th[br]and they would love to have your help.
0:27:11.950,0:27:15.340
They have a bunch of really interesting[br]data, they have a bunch of really
0:27:15.340,0:27:21.460
interesting analysis tools and they’re[br]missing curious people. So show up,
0:27:21.460,0:27:25.240
start asking questions about the data, try[br]to learn what’s going on. And you can
0:27:25.240,0:27:28.305
learn more about them, on[br]the Metrics Team, there.
0:27:28.305,0:27:32.055
And then I’m gonna pass it on to Mike.
0:27:32.055,0:27:38.720
applause
0:27:38.720,0:27:43.750
Mike: OK, so Hello everyone! So, I’ll be[br]telling ’bout the Applications Team part
0:27:43.750,0:27:48.600
of the Vegas plan that[br]Jake introduced. Basically,
0:27:48.600,0:27:54.060
the Applications Team was created to[br]bring together all the aspects of TOR
0:27:54.060,0:27:58.500
and the extended community that are[br]working on anything that’s user facing.
0:27:58.500,0:28:02.890
So anything with a user interface that[br]the user will directly interact with,
0:28:02.890,0:28:08.550
that’s an application on[br]either Mobile or Desktop.
0:28:08.550,0:28:13.020
So to start, obviously we had the[br]TOR Browser, that’s sort of like
0:28:13.020,0:28:18.620
a flagship application that most people[br]are familiar with when they think of TOR.
0:28:18.620,0:28:22.990
Recently we’ve added OrFox which is a[br]project by the Guardianproject to port
0:28:22.990,0:28:28.050
the TOR Browser patches to Android[br]and that’s currently in Alpha Status. But
0:28:28.050,0:28:34.190
it’s available on the Guardianproject’s[br]F-Droid Repo. We also have 2 chat clients:
0:28:34.190,0:28:39.020
TorMessenger and Ricochet and both with[br]different security properties. I will be
0:28:39.020,0:28:44.290
getting to it later. So I guess, first[br]off let’s talk about what happened
0:28:44.290,0:28:51.070
in the TOR Browser world in 2015.[br]Basically most of the, or a good deal
0:28:51.070,0:28:56.520
of our work is spent keeping up[br]with the Firefox release treadmill.
0:28:56.520,0:29:01.620
That includes responding[br]to emergency releases,
0:29:01.620,0:29:06.730
auditing changes in the Firefox code[br]base making sure that their features
0:29:06.730,0:29:10.940
adhere to our privacy model and making[br]sure that our releases come out
0:29:10.940,0:29:15.060
the same day as the official[br]Firefox releases so that there’s
0:29:15.060,0:29:20.130
no vulnerability exposure to known[br]vulnerabilities after they’re disclosed.
0:29:20.130,0:29:24.870
That has been a little bit rough to over[br]2015. I believe there is a solid 3..4
0:29:24.870,0:29:29.500
months where it felt like we were doing[br]a release every 2 weeks. Due to either
0:29:29.500,0:29:38.880
log jam or random unassessed[br]vulnerability or any arbitrary
0:29:38.880,0:29:43.620
security issue with Firefox. But we did…[br]despite treading all that water we did
0:29:43.620,0:29:48.710
manage to get quite a bit of work done.[br]As always our work on the browser focuses
0:29:48.710,0:29:54.700
in 3 main areas: privacy, security[br]and usability. Our privacy work is
0:29:54.700,0:30:00.330
primarily focused around making sure that[br]any new browser feature doesn’t enable
0:30:00.330,0:30:05.720
new vectors for 3rd party tracking. So no[br]ways for a 3rd party content resource to
0:30:05.720,0:30:12.570
store state or cookies or blob URIs[br]or some of the newer features.
0:30:12.570,0:30:16.940
There’s a new cash API. These sorts[br]of things need to all be isolated
0:30:16.940,0:30:20.840
to the URL bar domain to prevent 3rd[br]parties from being able to track you.
0:30:20.840,0:30:25.180
From being able to recognize it’s the same[br]you when you log in to Facebook and
0:30:25.180,0:30:31.730
when you visit CNN, and CNN loads[br]the Facebook Like buttons, e.g.
0:30:31.730,0:30:36.530
Additionally we have done a lot of work on[br]fingerprinting defences, the Alpha Release
0:30:36.530,0:30:41.250
ships a set of fonts for the[br]Linux users so that the
0:30:41.250,0:30:45.340
font fingerprinting can be normalized[br]since a lot of Linux users tend to have
0:30:45.340,0:30:49.920
different fonts installed on their[br]systems. As well as tries to normalize
0:30:49.920,0:30:54.380
the font list that allowed for Windows[br]and Mac users where they often get
0:30:54.380,0:30:59.670
additional fonts from 3rd party[br]applications that install them.
0:30:59.670,0:31:05.120
On the security front the major exciting[br]piece is the security slider. So with iSEC
0:31:05.120,0:31:11.810
Partners’ help we did a review of all the[br]Firefox vulnerabilities and categorized
0:31:11.810,0:31:16.680
them based on the component that they were[br]in as well as their prevalence on the web.
0:31:16.680,0:31:21.970
And came up with 4 positions that allow[br]you to choose, basically trade off,
0:31:21.970,0:31:26.080
functionality for vulnerability surface[br]reduction. And this was actually quite
0:31:26.080,0:31:31.870
successful. It turned out that[br]all of the Pwn2own exploits
0:31:31.870,0:31:39.990
against Firefox were actually blocked[br]for non-https sites at medium/high.
0:31:39.990,0:31:46.270
And if you enable the high security[br]level they were blocked for everything.
0:31:46.270,0:31:50.130
We additionally released address[br]sanitizer hardened builds, these are…
0:31:50.130,0:31:54.150
basically should… especially the higher[br]security levels of the security slider
0:31:54.150,0:31:58.810
should protect against various memory[br]safety issues in the browser and also
0:31:58.810,0:32:04.630
help us diagnose issues very rapidly.
0:32:04.630,0:32:10.380
And of course we now sign our Windows[br]packages using a hardware security module
0:32:10.380,0:32:16.850
from DigiCert. The usability improvements[br]were primarily focused around this UI and
0:32:16.850,0:32:21.100
this new Onion Menus you can see if you[br]remember the old menu. There was quite a
0:32:21.100,0:32:24.400
lot more options there. We sort of[br]condensed and consolidated options and
0:32:24.400,0:32:29.490
eliminated and combined as much as we[br]could. An additionally displayed the
0:32:29.490,0:32:37.360
circuit for the current URL bar domain.[br]In 2016 we’ll be focusing mostly on again
0:32:37.360,0:32:41.910
the same 3 areas. Our main goal for[br]privacy is to try and convince Mozilla
0:32:41.910,0:32:48.160
that they want to adopt our idea of[br]isolating 3rd party identifiers at least
0:32:48.160,0:32:52.150
to the point of if the user goes into the[br]Preferences and tries to disable 3rd party
0:32:52.150,0:32:57.860
cookies, will let you do the same thing[br]for DOM storage, Cash, blob URIs,
0:32:57.860,0:33:02.760
worker threads, and all these[br]other sources of shared state.
0:33:02.760,0:33:07.910
We’re very excited about their work on a[br]multi-process sandbox, additionally even
0:33:07.910,0:33:13.580
application-level sandboxing, it should[br]be… without Mozilla’s sandbox,
0:33:13.580,0:33:18.620
we should still be able to prevent the[br]browser from bypassing TOR using SecComp
0:33:18.620,0:33:22.640
or AppArmor or SeatBelt or one of[br]these other sandboxing technologies.
0:33:22.640,0:33:25.410
We’re looking forward to trying to[br]get that rolled out. And we’re doing
0:33:25.410,0:33:30.500
exploit bounties! We’ll be[br]partnering with HackerOne,
0:33:30.500,0:33:34.080
who’ll be announcing this shortly. The[br]program will start out invite-only
0:33:34.080,0:33:37.200
and then… just, so we can get[br]used to the flow and scale up
0:33:37.200,0:33:41.810
and then we’ll make it public later in the[br]year to basically provide people with
0:33:41.810,0:33:46.560
incentive to review our code to look[br]for vulnerabilities that might be
0:33:46.560,0:33:51.130
specific to our applications. And of[br]course the usual usability improving,
0:33:51.130,0:33:57.470
security, improving installation. And we’d[br]like to improve the censorship and bridges
0:33:57.470,0:34:02.780
ability flow as well hoping to automate[br]the discovery of bridges and inform you
0:34:02.780,0:34:08.639
if your bridges become unreachable.[br]So TOR messenger
0:34:08.639,0:34:13.230
is one of our 2 chat clients, also[br]part of the Applications Team.
0:34:13.230,0:34:17.540
Basically, the goal there was to minimize[br]the amount of configuration that
0:34:17.540,0:34:21.360
the user had to do if they wanted to[br]use one of their existing chat clients
0:34:21.360,0:34:26.780
with TOR and OTR. Now this is based
0:34:26.780,0:34:32.290
on another Mozilla platform – Instantbird[br]which is based on Thunderbird.
0:34:32.290,0:34:38.300
This allows us to share a lot of the[br]TOR Browser configuration codes
0:34:38.300,0:34:42.120
for managing the TOR process and[br]configuring bridges. So the user has a
0:34:42.120,0:34:47.270
very similar configuration[br]experience to the browser
0:34:47.270,0:34:53.139
when they first start it up. It also has[br]some additional memory safety advantages
0:34:53.139,0:34:58.770
– all the protocol parsers are written[br]in Javascript. This basically…
0:34:58.770,0:35:03.660
one of the major things when we[br]were looking at candidates for
0:35:03.660,0:35:08.470
a messaging client was we wanted to avoid[br]the problems of libpurple in the past
0:35:08.470,0:35:11.980
where there’s been a lot of, like, remote[br]code execution vulnerabilities with
0:35:11.980,0:35:16.860
protocol parsing. Now there are some[br]trade-offs here, obviously, when you’re
0:35:16.860,0:35:22.560
dealing with a browser product. You[br]still have a html window rendering
0:35:22.560,0:35:30.090
the messages. But it is XSS filtered and[br]even if an XSS exploit were to get through
0:35:30.090,0:35:34.320
to run Javascript in your messaging[br]window that Javascript would still be
0:35:34.320,0:35:40.030
unprivileged. So they need an additional[br]browser-style exploit. And that filter has
0:35:40.030,0:35:44.270
been reviewed by Mozilla and additionally[br]we’re looking into removing Javascript
0:35:44.270,0:35:48.740
from that messaging window at all.[br]It should be completely possible to just
0:35:48.740,0:35:54.950
display a reduced, slightly less sexy[br]version of the same window at perhaps
0:35:54.950,0:36:00.670
another higher security level without[br]Javascript involved at all in that window.
0:36:00.670,0:36:04.070
So we will hand off to Jake now to[br]describe some of the security properties
0:36:04.070,0:36:06.090
and differences between TOR[br]messenger and Ricochet.
0:36:06.090,0:36:12.220
Jacob: Just to be clear about this: We[br]wanted to sort of echo what Phil Rogaway
0:36:12.220,0:36:16.440
has recently said. He wrote a really[br]wonderful paper quite recently about the
0:36:16.440,0:36:20.910
moral character of cryptographic work and[br]Phil Rogaway for those of you that don’t
0:36:20.910,0:36:24.310
know is one of the sort of like amazing[br]cryptographers, very humble, really
0:36:24.310,0:36:29.990
wonderful man who was really a little bit[br]sad that cryptographers and people
0:36:29.990,0:36:34.890
working on security software don’t take[br]the adversaries seriously. So they use
0:36:34.890,0:36:39.610
Alice and Bob, and Mallory and they have[br]cutie icons and they look very happy.
0:36:39.610,0:36:44.620
We wanted to make it clear what we thought[br]the adversary was. Which is definitely not
0:36:44.620,0:36:53.090
a cutie adversary. When anonymity fails[br]for Muslims that live in Pakistan, or e.g.
0:36:53.090,0:36:56.580
the guys that are giving a talk later[br]today, the CAGE guys, when anonymity fails
0:36:56.580,0:37:01.420
for them they get detained or they get[br]murdered or they end up in Guantanamo Bay
0:37:01.420,0:37:05.480
or other things like that. So it’s a[br]serious thing. And we wanted to talk about
0:37:05.480,0:37:11.400
what that looks like. So e.g. a lot of you[br]use jabber.ccc.de, I guess. Don’t raise
0:37:11.400,0:37:16.530
your hands. You should decentralize. Stop[br]using jabber.ccc.de because we should
0:37:16.530,0:37:20.960
decentralize. But that said if you do,[br]this is sort of what it looks like, right?
0:37:20.960,0:37:24.090
There’s the possibility for targeted[br]attacks when you connect. There’s the
0:37:24.090,0:37:29.080
possibility that the Social Graph e.g. of[br]your buddy list, that that would be on the
0:37:29.080,0:37:32.740
server. It would be possible that there’s[br]a bug on any Jabber server anywhere.
0:37:32.740,0:37:36.380
So of course you know that if you’re using[br]Gmail with Jabber, you know that they are
0:37:36.380,0:37:40.100
prison providers. So if you got a pretty[br]big problem there and the attacker, again,
0:37:40.100,0:37:44.410
is not a cutie attacker, it’s, you know,[br]I like the Grim Reaper, that fit that
0:37:44.410,0:37:48.820
Mike chose, if you like that’s accurate.[br]And now if you see one of the protections
0:37:48.820,0:37:51.770
you’ll have for communicating with your[br]peers is off-the-record messaging. That’s
0:37:51.770,0:37:57.770
basically the thing. But that’s a very[br]slap together protocol in a sense. Because
0:37:57.770,0:38:02.720
it’s hacks on top of hacks. Where you[br]know you compose TOR with Jabber and TLS
0:38:02.720,0:38:05.860
and maybe you still have a certificate[br]authority in there somewhere. Or maybe you
0:38:05.860,0:38:09.550
have a TOR Hidden Service but then your[br]status updates they don’t have any
0:38:09.550,0:38:16.430
encryption at all, for example. Or, again,[br]your roster is an actual thing that
0:38:16.430,0:38:19.110
someone can see, including every time you[br]send a message to those people the server
0:38:19.110,0:38:24.820
sees that. So, that said, TOR messenger is[br]really great because it meets users where
0:38:24.820,0:38:28.930
they already are. Right? So e.g. actually[br]one other point here is if you use a piece
0:38:28.930,0:38:33.420
of software like Adium, there is actually[br]a bug filed against Adium where someone
0:38:33.420,0:38:37.630
said “Please disable logging-by-default[br]because Chelsea Manning went to prison
0:38:37.630,0:38:41.620
because of your logging policy”. And the[br]people working on Adium in this bug report
0:38:41.620,0:38:48.710
basically said: “Good!” That’s horrifying![br]Right? So what if we made it as reasonable
0:38:48.710,0:38:54.590
as possible, as configuration-free as[br]possible using TOR, using OTR, trying to
0:38:54.590,0:38:58.650
remove libpurple which is a whole like…[br]it’s a flock of Zerodays flying in
0:38:58.650,0:39:07.640
formation. Right? So we wanted to kill the[br]bird in a sense but also not we want to
0:39:07.640,0:39:14.360
help provide an incentive for improving.[br]And so that’s where TOR messenger fits.
0:39:14.360,0:39:19.670
But we also want to experiment with next[br]generation stuff. And one of those things
0:39:19.670,0:39:25.120
is written by a really great guy on our[br]community, almost single-handedly, without
0:39:25.120,0:39:30.760
any funding at all, and his name is[br]“special”, that’s actually his name. He’s
0:39:30.760,0:39:37.020
also special. But it’s really nice,[br]because actually, if you solve the problem
0:39:37.020,0:39:40.810
of telling your friend your name, if[br]you’re familiar with the properties of
0:39:40.810,0:39:44.940
Hidden Services where you have a self-[br]authenticating name you know that you’re
0:39:44.940,0:39:47.690
talking to the person that you think you[br]are because you’ve already done a key
0:39:47.690,0:39:51.780
exchange. The important part of the key[br]exchange. And so one of the things that
0:39:51.780,0:39:58.790
you’ll see very clearly is that there is[br]no more server. Right? So there’s no more
0:39:58.790,0:40:05.130
jabber.ccc.de in this picture. So this is[br]a really good example of how we might
0:40:05.130,0:40:09.119
decentralize, actually. It’s an experiment[br]right now but it means no more servers. It
0:40:09.119,0:40:14.500
uses the TOR network’s TOR Hidden Service[br]protocol and everybody actually becomes a
0:40:14.500,0:40:18.720
TOR Hidden Service for chatting with their[br]buddies. And it’s end-to-end encrypted and
0:40:18.720,0:40:23.360
it’s anonymized and of course this means[br]that your Social Graph is a traffic
0:40:23.360,0:40:27.980
analysis problem, it’s no longer a list on[br]a server. And it means your metadata is
0:40:27.980,0:40:32.790
as protected as we currently know how[br]to do in a low-latency anonymity network.
0:40:32.790,0:40:36.480
And in the future one of the really nice[br]things about this is that it will be
0:40:36.480,0:40:41.850
possible – or we think it will be[br]possible – to even make it better in a
0:40:41.850,0:40:46.920
sense, e.g. multiple chats, sending[br]files, sending pictures, in other words,
0:40:46.920,0:40:50.780
everything becomes, instead of a certainty[br]we move it towards probability. And the
0:40:50.780,0:40:52.890
probability is in your favour.
0:40:52.890,0:41:00.000
Mike: Yes, additionally, I’ll be working[br]on various forms of panning for cases like
0:41:00.000,0:41:04.140
this to basically increase this high…[br]the probability that there will be
0:41:04.140,0:41:10.000
concurrent traffic at the same time from[br]multiple TOR clients, which will further
0:41:10.000,0:41:13.720
frustrate the discovery of the Social[br]Graph based on simple traffic analysis
0:41:13.720,0:41:21.940
especially for low-traffic cases such as[br]Ricochet. So just to wrap up that
0:41:21.940,0:41:29.230
TOR Applications piece: in 2016 we’re[br]trying to focus heavily on usability and
0:41:29.230,0:41:34.950
gin more people to be able to use TOR,[br]omitting the barriers to finding TOR,
0:41:34.950,0:41:40.110
downloading TOR, being able especially[br]for censored users, and being able to
0:41:40.110,0:41:45.100
install TOR. There’s still some snags,[br]various difficulties that cause people to
0:41:45.100,0:41:49.560
stop at various stages of that process and[br]we want to try and work for to eliminate
0:41:49.560,0:41:53.320
them. We also, of course, want to increase[br]coordination: share graphics, visual
0:41:53.320,0:42:00.900
aesthetics and coordinate the ability to[br]share the TOR process. And we also want to
0:42:00.900,0:42:04.540
create a space for more experimentation,[br]for more things like Ricochet. There’s
0:42:04.540,0:42:08.810
probably a lot more ideas like Ricochet[br]out there. There could be leverages
0:42:08.810,0:42:12.150
of TOR protocol and especially Hidden[br]Services in creative ways. So we’re
0:42:12.150,0:42:16.130
looking to create an official sanctioned[br]space as part of TOR to give them a home.
0:42:16.130,0:42:21.280
And to look for that in the coming[br]months on the TOR blog.
0:42:21.280,0:42:26.600
Jacob: Alright, I just wanted to put in a[br]picture of a guy wearing a Slayer T-Shirt.
0:42:26.600,0:42:31.380
So there it is. That’s Trevor Paglen. Some[br]of you may remember him from such things
0:42:31.380,0:42:36.150
as helping to film Citizenfour, building[br]Satellites that burn up in space so that
0:42:36.150,0:42:41.030
are actually currently on other[br]satellites. And this on the left is
0:42:41.030,0:42:45.550
Leif Ryge, he’s sort of the person that[br]taught me how to use computers. And he is
0:42:45.550,0:42:49.050
an incredible Free Software developer.[br]Trevor Paglen and myself, and this is
0:42:49.050,0:42:52.640
a cube, the Autonomy Cube which we talked[br]about last year. Because we think that
0:42:52.640,0:42:57.220
culture is very important and we think[br]that it’s important to actually get people
0:42:57.220,0:43:01.500
to understand the struggle that exists[br]right now. So this is installed in a
0:43:01.500,0:43:06.470
museum right now in Germany, in the city[br]of Oldenburg, at the Edith-Russ-Haus. And
0:43:06.470,0:43:10.810
it actually opened several months ago,[br]it’s filled with classified documents, it
0:43:10.810,0:43:14.000
has really interesting things to go and[br]read. I highly encourage you to go and
0:43:14.000,0:43:18.060
read. We built a reading room about[br]anonymity papers, about things that are
0:43:18.060,0:43:22.990
happening. About how corporations track[br]you, and then the entire museum is an
0:43:22.990,0:43:27.730
Open-WiFi network that routs you[br]transparently through TOR. So in Germany
0:43:27.730,0:43:32.520
a free open WiFi network that isn’t run by[br]Freifunk – much respect to them – we
0:43:32.520,0:43:36.869
wanted to make it possible for you to just[br]go and have the ability to bootstrap
0:43:36.869,0:43:43.030
yourself anonymously if you needed to. And[br]also these four boards are Novena boards.
0:43:43.030,0:43:47.730
And these Novena boards are Free and Open[br]Hardware devices made by Bunnie and Sean
0:43:47.730,0:43:51.220
in Singapore where you could, if you[br]wanted to, download the schematics and
0:43:51.220,0:43:55.990
fab it yourself. And it’s running the[br]Debian GNU Linux universal operating
0:43:55.990,0:44:01.350
system. And it’s an actual TOR exit node[br]with absolutely every port allowed. So the
0:44:01.350,0:44:06.780
museum’s infrastructure itself on the[br]city’s internet connection actually is a
0:44:06.780,0:44:13.619
TOR exit node for the whole world to be[br]able to use the internet anonymously.
0:44:13.619,0:44:20.340
applause
0:44:20.340,0:44:24.170
But the museum’s infrastructure is not[br]just helping people in Oldenburg, it’s
0:44:24.170,0:44:28.830
helping people all around the world to be[br]able to communicate anonymously and it’s
0:44:28.830,0:44:31.830
quite amazing actually because when[br]cultural institutions stand up for this
0:44:31.830,0:44:35.960
we recognize it’s not just a problem of[br]over-there stand. We have mass-surveillance
0:44:35.960,0:44:40.850
and corporate surveillance in the West[br]and we need to deal with that. Here, by
0:44:40.850,0:44:45.550
creating spaces like this. But that said,[br]we also need to make sure that we create
0:44:45.550,0:44:49.250
spaces in people’s minds all around the[br]world. And I want to introduce to you
0:44:49.250,0:44:55.380
someone who’s incredibly awesome, the[br]most bad-ass radical librarian around,
0:44:55.380,0:44:58.830
this is Alison.[br]Alison is going to talk about…
0:44:58.830,0:45:03.130
Alison: …Library Freedom Project! Hi![br]Thank you so much! I’m so excited
0:45:03.130,0:45:09.290
to be here, it’s my first CCC and I’m on[br]stage, and it’s very… exciting. So I’m
0:45:09.290,0:45:12.750
going to talk to you a little bit about my[br]organization, Library Freedom Project.
0:45:12.750,0:45:18.400
I’m the director and what we do: we have[br]a partnership with TOR project to do
0:45:18.400,0:45:23.440
community outreach around TOR and other[br]privacy-enhancing technologies. Making
0:45:23.440,0:45:28.260
TOR network more strong and making tools[br]like TOR Browser more ubiquitous and
0:45:28.260,0:45:35.540
mainstream, all with the help of a[br]coalition of radical militant librarians.
0:45:35.540,0:45:40.040
So we introduced you to the Library[br]Freedom Project back in February. We told
0:45:40.040,0:45:43.520
you a little bit about the kind of work[br]that we do, mostly in US libraries,
0:45:43.520,0:45:48.930
increasingly internationally. Where[br]essentially we teach them about tools like
0:45:48.930,0:45:54.669
TOR Browser, how to install it on their[br]local computers, how to teach it into
0:45:54.669,0:45:59.080
computer classes that they offer for free[br]in the library or one-on-one technology
0:45:59.080,0:46:04.350
sessions for their community. And we’ve[br]had a really amazing year since then.
0:46:04.350,0:46:08.470
In addition to working with the TOR[br]project we’re really fortunate to work
0:46:08.470,0:46:12.470
with the American Civil Liberties Union[br](ACLU). If you’re not familiar with them,
0:46:12.470,0:46:16.480
they’re basically… they’re the bad asses[br]who’ve been suing the US Intelligence
0:46:16.480,0:46:22.710
Agencies and Police for about a 100 years.[br]That is me with 2 people from the ACLU
0:46:22.710,0:46:27.550
Massachusetts, Jessy Rossman who is a[br]surveillance law expert and Kay Croqueford
0:46:27.550,0:46:31.000
who is an activist for the ACLU. And[br]they’re here, if you see that human buy
0:46:31.000,0:46:35.070
them a drink and ask them about the[br]surveillance capabilities of the US Police.
0:46:35.070,0:46:37.980
applause
0:46:37.980,0:46:43.300
So, it’s really cool! It’s a great[br]partnership with the ACLU because
0:46:43.300,0:46:48.580
basically they can teach why we need to[br]use tools like TOR Browser. So how to use
0:46:48.580,0:46:52.260
them is super-super important but you need[br]to know about the authorizations, the
0:46:52.260,0:46:57.369
programs, all the bad laws and the uses of[br]them against ordinary people. So, why do
0:46:57.369,0:47:01.770
we teach this stuff to librarians? It’s[br]basically for 2 big reasons. One of them
0:47:01.770,0:47:06.470
is that libraries and librarians have an[br]amazing history of activism around
0:47:06.470,0:47:11.450
privacy, fighting surveillance and[br]fighting censorship in the US where
0:47:11.450,0:47:16.090
I live. Librarians were some of the[br]staunchest opponents of the USA Patriot
0:47:16.090,0:47:20.350
Act from the beginning when it was[br]codified back in 2002. They made T-Shirts
0:47:20.350,0:47:25.869
that said “Another hysterical librarian[br]for Privacy” because of the…
0:47:25.869,0:47:29.720
The Attorney General at the time called[br]them “hysterical” for the fact that they
0:47:29.720,0:47:33.400
didn’t want this awful authorization to go[br]through. And of course then after Snowden
0:47:33.400,0:47:37.369
we learned many more things about just[br]how bad the Patriot Act was. So librarians
0:47:37.369,0:47:40.800
were some of the first people to oppose[br]that. They also have fought back against
0:47:40.800,0:47:45.060
National Security Letters which are the US[br]Government informational requests that
0:47:45.060,0:47:49.750
sometimes go to software providers and[br]other internet services. They have an
0:47:49.750,0:47:53.060
attached gag order that basically says:[br]“You have to give this information about
0:47:53.060,0:47:56.430
your users and you can’t tell anyone that[br]you got it.” Well, libraries got one of
0:47:56.430,0:47:58.900
these and fought back against that in one.[br]applause
0:47:58.900,0:48:05.640
They also, all the way back in the 1950s[br]even, at the height of Anti-Communist
0:48:05.640,0:48:10.790
Fervor and FUD, around the time of the[br]House on American Activities Committee,
0:48:10.790,0:48:13.509
librarians came out with this amazing[br]statement, called the “Freedom to Read”
0:48:13.509,0:48:18.910
Statement that I think really is a[br]beautiful text. It’s about 2 pages long
0:48:18.910,0:48:26.080
and it is their commitment to privacy and[br]democratic ideals made manifest.
0:48:26.080,0:48:29.310
And I have a little excerpt from it here.[br]I’m not gonna read the whole thing to you
0:48:29.310,0:48:32.500
’cause I understand I’m all too[br]pressed for time. But the last line is
0:48:32.500,0:48:37.600
my favourite. It says: “Freedom itself is[br]a dangerous way of life. But it is ours.”
0:48:37.600,0:48:40.960
So everybody go and get that tattooed![br]You know, on your forehead or whatever.
0:48:40.960,0:48:44.150
applause
0:48:44.150,0:48:49.490
So, the history of activism is one of the[br]big things. There’s a second part that
0:48:49.490,0:48:52.420
is more practical. Libraries have an[br]amazing relationship to the local
0:48:52.420,0:48:56.859
communities. That doesn’t really exist[br]anywhere else especially in this era of
0:48:56.859,0:49:01.650
privatization and the destruction of[br]public commons. Libraries have already
0:49:01.650,0:49:05.520
free computer classes in many places,[br]sometimes the only free computer help that
0:49:05.520,0:49:10.609
you can get anywhere. They offer free[br]computer terminals to many people who
0:49:10.609,0:49:14.480
don’t have any other computer access.[br]They’re trusted community spaces, they
0:49:14.480,0:49:18.400
already teach about a whole number of[br]things. So we think they’re really the
0:49:18.400,0:49:24.310
ideal location for people to learn about[br]things like TOR Browser. So it’s been
0:49:24.310,0:49:31.010
going really well. This year we have[br]visited hundreds of different locations.
0:49:31.010,0:49:36.230
We’ve trained about 2300 librarians in the[br]US, in Canada and a few other countries,
0:49:36.230,0:49:43.150
Australia, UK and Ireland. We held an[br]amazing conference, you might recognize
0:49:43.150,0:49:47.630
this as Noisebridge. Any Noisebridge fans[br]here? I hope so. Come on, there’s got to
0:49:47.630,0:49:50.470
be more Noisebridge fans than that![br]Christ! We had an amazing conference in
0:49:50.470,0:49:54.050
Noisebridge and actually my co-organizer[br]is also here, April Glaser, so you can buy
0:49:54.050,0:49:58.540
her a drink, she’s right over there. There[br]has been a huge response from the library
0:49:58.540,0:50:02.290
community. They wanna learn about TOR[br]Browser, they’re so excited that finally
0:50:02.290,0:50:06.910
there’s a practical way for them to help[br]protect their patrons’ privacy. They’ve
0:50:06.910,0:50:12.000
cared about this stuff from an ideological[br]and ethical standpoint for a really long
0:50:12.000,0:50:15.980
time, and now they know that there are[br]tools that they can actually use and
0:50:15.980,0:50:19.090
implement in their libraries and teach to[br]their community to help them take back
0:50:19.090,0:50:25.400
their privacy. We’re really lucky that not[br]only do we get to teach librarians but
0:50:25.400,0:50:29.590
occasionally we get invited to visit[br]the local communities themselves.
0:50:29.590,0:50:33.770
So, here we teach how to teach privacy[br]classes with TOR as a big focus.
0:50:33.770,0:50:37.460
But sometimes we get to meet the local[br]community members themselves. So I want to
0:50:37.460,0:50:41.850
show you this picture of a recent visit[br]that I made to Yonkers, New York. It was
0:50:41.850,0:50:46.050
a class just for teens. They’re all[br]holding TOR stickers if you can see that
0:50:46.050,0:50:50.369
and Library Freedom Project stickers.[br]This is a great picture that sort of is
0:50:50.369,0:50:54.130
emblematic of the kind of communities[br]that we get to visit. Yonkers is one of
0:50:54.130,0:50:59.160
the poorest cities in the US. These kids[br]are… many of them are immigrants, their
0:50:59.160,0:51:02.790
parents are immigrants, they face[br]surveillance and state violence as a
0:51:02.790,0:51:07.970
matter of their regular everyday lives.[br]For them privacy is not just a human
0:51:07.970,0:51:12.520
right but it’s sometimes a matter of life[br]and death. And these kids are just some
0:51:12.520,0:51:16.820
of the amazing people that we get to see.[br]Also, just to give you an idea of how the
0:51:16.820,0:51:21.230
public perception around privacy is[br]shifting in my anecdotal experience:
0:51:21.230,0:51:25.890
we had 65 teenagers come to this class![br]If you have a teenager or if you’ve been
0:51:25.890,0:51:30.359
a teenager you know teenagers don’t show[br]up for stuff, they don’t do that. 65 kids
0:51:30.359,0:51:34.340
came to this! And they were so excited![br]This was just the group that was left over
0:51:34.340,0:51:38.420
at the end that had so many questions and[br]wanted more stickers to bring back to
0:51:38.420,0:51:44.300
their friends. So it’s pretty cool stuff.[br]Recently we embarked on a new project
0:51:44.300,0:51:50.150
bringing TOR relays into libraries. This[br]is Nima Fatemi with me, when we set up
0:51:50.150,0:51:55.390
our pilot at a library in New Hampshire[br]which is the state just above where I live
0:51:55.390,0:52:02.040
in the United States. And we basically[br]decided to do this project because we
0:52:02.040,0:52:05.500
thought it was a really great continuation[br]of the work that we were already doing,
0:52:05.500,0:52:10.080
teaching and training librarians around[br]using TOR. We wanted to take a step
0:52:10.080,0:52:13.690
further and take the infrastructure that[br]libraries already have; many of them are
0:52:13.690,0:52:19.490
moving to really fast internet, they can[br]donate an IP address and some bandwidth.
0:52:19.490,0:52:24.430
And they… many of them want to do kind[br]of the next thing to help protect privacy
0:52:24.430,0:52:27.750
and not just in their local communities,[br]as well. They want to help protect
0:52:27.750,0:52:31.720
internet freedom everywhere. So we thought[br]it was a really great sort of next step to
0:52:31.720,0:52:35.480
go. So we set up our pilot project in New[br]Hampshire. It went pretty well, we got a
0:52:35.480,0:52:39.130
lot of great press attention, a lot of[br]really great local and global community
0:52:39.130,0:52:44.550
support. We also got the attention of[br]the Department of Homeland Security.
0:52:44.550,0:52:49.610
applause
0:52:49.610,0:52:53.100
Basically they contacted the local Police[br]in this town in New Hampshire and they
0:52:53.100,0:52:57.160
said: “You know, this is stupid, and bad,[br]and criminal and you should shut this
0:52:57.160,0:53:02.640
down!” And the library was understandably[br]shaken by this and temporarily suspended
0:53:02.640,0:53:09.210
the operation of the relay. So we[br]responded by writing a letter, an open
0:53:09.210,0:53:13.440
letter from Library Freedom Project, from[br]TOR project, from ACLU and a broad
0:53:13.440,0:53:17.000
coalition of public interest groups and[br]luminary individuals including the
0:53:17.000,0:53:21.109
Electronic Frontier Foundation (EFF), the[br]Freedom of the Press Foundation, the Free
0:53:21.109,0:53:24.350
Software Foundation and all of our other[br]friends many of whom are in this audience
0:53:24.350,0:53:28.720
today. We wrote this letter to the library[br]basically affirming our commitment to
0:53:28.720,0:53:32.359
them, how much we are proud of them for[br]participating in this project and how much
0:53:32.359,0:53:36.830
we wanted them to continue. We put a lot[br]of nice, you know, ideological, why this
0:53:36.830,0:53:41.520
is important, warm fuzzy stuff. We also[br]got EFF to start a petition for us and
0:53:41.520,0:53:46.270
over a weekend we got about 4500[br]signatures from all over the world, the
0:53:46.270,0:53:51.659
library was flooded with emails, calls.[br]Only one negative one. Just one out of
0:53:51.659,0:53:55.770
hundreds. And that person was a little[br]confused, so I’m not even counting that
0:53:55.770,0:54:03.230
necessarily. It was like a conspiracy type thing.[br]So we got this amazing support and this
0:54:03.230,0:54:06.880
was all in anticipation of their board[br]meeting that was gonna happen a few days
0:54:06.880,0:54:12.150
later where the board was gonna decide[br]what to do about the relay. So Nima and I
0:54:12.150,0:54:16.270
show up to New Hampshire on a Tuesday[br]Night and you might imagine what a library
0:54:16.270,0:54:20.770
board meeting in rural New Hampshire is[br]typically like. It was nothing like that.
0:54:20.770,0:54:26.270
So we get outside and there’s a protest[br]happening already. Many people holding
0:54:26.270,0:54:32.070
Pro-TOR signs. This was just a glimpse of[br]it. And the look on my face is because
0:54:32.070,0:54:35.740
someone pointed to a very small child and[br]said: “Alison, look at that child over
0:54:35.740,0:54:39.120
there”. This tiny little girl was holding[br]a sign that said “Dammit Big Brother” and
0:54:39.120,0:54:45.650
I was like “I’m done, that’s it, I got to[br]go home!” So we went into the board
0:54:45.650,0:54:52.980
meeting and we were met with about 4 dozen[br]people and media and a huge amount of
0:54:52.980,0:54:57.859
support. Many of the community members[br]expressed how much they loved TOR, that
0:54:57.859,0:55:03.790
this whole incident made them download TOR[br]and check it out for themselves. Basically
0:55:03.790,0:55:07.590
it galvanized this community into a[br]greater level of support than we even had
0:55:07.590,0:55:12.119
when we initially set it up about a month[br]earlier. People who had no idea that the
0:55:12.119,0:55:15.660
library was doing this heard about it[br]because it got a huge amount of media
0:55:15.660,0:55:20.859
attention thanks to a story by Julia[br]Angwin in ProPublica that broke the news
0:55:20.859,0:55:26.130
to everybody and then it just went like[br]wildfire. So as you might imagine the
0:55:26.130,0:55:29.920
relay went back online that night. We were[br]super-successful. Everybody in the
0:55:29.920,0:55:34.920
community was incredibly excited about it[br]and supportive. And what has happened now
0:55:34.920,0:55:41.099
is that this community has sort of… like[br]I said they’ve been galvanized to support
0:55:41.099,0:55:46.520
TOR even more. The library has now allowed[br]at some of their staff time and travel
0:55:46.520,0:55:51.920
budget to help other libraries in the area[br]set up TOR relays. They’re speaking about
0:55:51.920,0:55:57.010
TOR…[br]applause
0:55:57.010,0:55:59.900
Thank you![br]They’re speaking about TOR at conferences.
0:55:59.900,0:56:05.300
And this has really caught on in the[br]greater library community as well. So I
0:56:05.300,0:56:08.450
mentioned already the kind of success that[br]we’ve had at Library Freedom Project in
0:56:08.450,0:56:12.520
teaching tools like TOR Browser and[br]getting folks to bring us in for trainings.
0:56:12.520,0:56:17.630
This is even bigger than that! Libraries[br]are now organizing their, you know, staff
0:56:17.630,0:56:21.920
training days around, you know, “Should we[br]participate in the TOR relay project?” or
0:56:21.920,0:56:27.110
“How can we do this best?”, “What’s the[br]best angle for us?” So we’re really
0:56:27.110,0:56:31.590
excited to do announce that we’re gonna[br]be continuing the relay project at scale.
0:56:31.590,0:56:35.270
Nima Fatemi, who is now also in this[br]picture again, I’m really sad that he
0:56:35.270,0:56:38.930
can’t be here, he is wonderful and[br]essential to this project. But he will now
0:56:38.930,0:56:45.680
be able to travel across the US and we[br]hope to go a little further opening up
0:56:45.680,0:56:49.380
more relays in libraries. We’re gonna[br]continue teaching, of course, about TOR
0:56:49.380,0:56:53.780
Browser and other privacy-enhancing Free[br]Software. We’re now gonna incorporate some
0:56:53.780,0:56:58.160
other TOR services, so we’re really[br]excited to bring “Let’s Encrypt” into
0:56:58.160,0:57:01.489
libraries. And while we’re there, why not[br]run a Hidden Service on the library’s web
0:57:01.489,0:57:06.280
server. Among many other things. The other[br]goals for Library Freedom Project: to take
0:57:06.280,0:57:11.650
this to a much more international level.[br]So if you want to do this in your country,
0:57:11.650,0:57:15.590
you know your librarian, put them in touch[br]with us. You can follow our progress on
0:57:15.590,0:57:19.690
LibraryFreedomProject.org or[br]@libraryfreedom on Twidder. And we’re
0:57:19.690,0:57:22.950
always sort of posting on Tor Blog about[br]stuff that’s going on with us, so…
0:57:22.950,0:57:26.480
Thank you so much for letting me tell you[br]about it. It’s really a pleasure to be
0:57:26.480,0:57:40.520
here![br]applause
0:57:40.520,0:57:45.060
Jacob: So, that’s a really tough act to[br]follow! But we’re very pressed for time
0:57:45.060,0:57:48.740
now. And we want to make sure that we can[br]tell you two big things. And one of them
0:57:48.740,0:57:52.040
is that, as you know, we were looking for[br]an Executive Director because our Spirit
0:57:52.040,0:57:56.550
Animal, Roger,…[br]Roger: Slide…
0:57:56.550,0:58:01.730
Jacob: Right… He couldn’t do it all. And[br]in fact we needed someone to help us. And
0:58:01.730,0:58:05.869
we needed someone to help us who has the[br]respect not only of the community here but
0:58:05.869,0:58:10.709
the community, basically, all around the[br]world. And we couldn’t think of a better
0:58:10.709,0:58:15.380
person, in fact, when we came up with a[br]list of people. The person that we ended
0:58:15.380,0:58:19.440
up with was the Dream Candidate for a[br]number of the people in the TOR Project
0:58:19.440,0:58:24.260
and around the world. And so, I mean, I[br]have to say that I’m so excited, I’m so
0:58:24.260,0:58:28.040
excited that we have her as our Executive[br]Director. I used to think that our ship
0:58:28.040,0:58:32.300
was going to sink, that we would all go to[br]prison, and that may still happen, the
0:58:32.300,0:58:39.609
second part. But the first part, for sure,[br]is not going to happen. We found someone
0:58:39.609,0:58:44.379
who I believe will keep the TOR Project[br]going long after all of us are dead and
0:58:44.379,0:58:50.510
buried. Hopefully, not in shallow graves.[br]So, this is Shari Steele!
0:58:50.510,0:58:58.540
applause
0:58:58.540,0:59:00.740
Shari: Hi![br]applause
0:59:00.740,0:59:05.400
Thanks! Thanks, it’s actually so fun to be[br]back in this community. And I wasn’t gone
0:59:05.400,0:59:08.650
for very long. I had so much for[br]retirement. It didn’t work out for me.
0:59:08.650,0:59:14.289
But, that’s OK, I’m really excited. I have[br]had – we’re so tight on time – so I want
0:59:14.289,0:59:18.000
to just tell you there are 2 big mandates[br]that I was given when I first was hired.
0:59:18.000,0:59:22.320
And one is: Help build a great[br]infrastructure so that TOR Project is
0:59:22.320,0:59:27.330
sustainable. Working on that! The other[br]thing is: Money! We need to diversify our
0:59:27.330,0:59:31.330
funding sources, as everybody knows here.[br]The Government funding has been really
0:59:31.330,0:59:35.680
difficult for us specifically because it’s[br]all restricted. And so it limits the kinds
0:59:35.680,0:59:41.430
of things we want to do. When you get the[br]developers in a room blue-skying about the
0:59:41.430,0:59:44.900
things that they want to do, it’s[br]incredible! Really, really brilliant
0:59:44.900,0:59:48.040
people who want to do great things but[br]they’re really limited when the funding
0:59:48.040,0:59:52.960
says they have to do particular things. So[br]we happen to be doing our very first ever
0:59:52.960,0:59:59.010
crowd funding campaign right now. I want[br]to give a shout out to Katina Bishop who
0:59:59.010,1:00:03.450
is here somewhere and who is running[br]the campaign for us and is just doing an
1:00:03.450,1:00:09.779
amazing job. As of last count which is a[br]couple of days ago, we had over 3000
1:00:09.779,1:00:15.090
individual donors and over 120.000 Dollars[br]which is incredible for our very first
1:00:15.090,1:00:18.820
time when we didn’t even really have a[br]mechanism in place to be collecting this
1:00:18.820,1:00:24.540
money, even. So, it’s really great! And I[br]wanna also say we have a limited number
1:00:24.540,1:00:31.070
of these T-Shirts that I brought in a[br]suitcase from Seattle. So, and they’re
1:00:31.070,1:00:36.160
gonna be available, if you come down to[br]the Wau Holland booth at the Noisy Square.
1:00:36.160,1:00:39.619
Come talk with us! Give a donation![br]We’re doing a special: it’s normally a
1:00:39.619,1:00:46.310
100 Dollar donation to get a shirt, but[br]for the conference we’ll do, for 60 Euro
1:00:46.310,1:00:50.320
you can get a shirt and it would be great[br]you’d be able to show your support. And
1:00:50.320,1:00:56.869
you can also donate online if you don’t[br]wanna do that here. That’s the URL. And
1:00:56.869,1:01:01.109
to end, we’d like to have a[br]word from Down Under!
1:01:01.109,1:01:05.079
Video starts
1:01:05.079,1:01:09.859
Video Intro Violin Music
1:01:09.859,1:01:15.030
Good Day to you! Fellow Members of the[br]Intergalactic Resistance against Dystopian
1:01:15.030,1:01:20.550
bastardry! It is I, George Orwell, with an[br]urgent message from Planet Earth, as it
1:01:20.550,1:01:25.670
embarks on a new orbit. Transmitting via[br]the Juice Channeling Portal. Our time is
1:01:25.670,1:01:30.290
short. So let’s get straight to the point.[br]Shall we? This transmission goes out to
1:01:30.290,1:01:35.420
all you internet citizens. Denizens of[br]the one remaining free frequency. In whose
1:01:35.420,1:01:40.869
hands rests the fate of humanity.[br]Lord… f_ckin’ help us!
1:01:40.869,1:01:42.869
typewriter typing sounds
1:01:42.869,1:01:48.560
When I last appeared to you, I warned you[br]noobs: You must not lose the Internet! Now
1:01:48.560,1:01:54.140
before I proceed, let us clarify one[br]crucial thing. The Internet is not Virtual
1:01:54.140,1:02:00.450
Reality, it is actual Reality.[br]typewriter typing sounds
1:02:00.450,1:02:05.420
Are you still with me? Good. Now ask[br]yourselves: Would you let some fascist
1:02:05.420,1:02:09.180
dictate with whom you can and cannot[br]communicate? Because that’s what happens
1:02:09.180,1:02:13.700
every time a government blacklists a[br]website domain. Would you let anyone force
1:02:13.700,1:02:18.490
you to get all your information from cable[br]TV? That’s effectively the case if you
1:02:18.490,1:02:24.800
allow corporations to kill Net Neutrality.[br]typewriter typing sounds
1:02:24.800,1:02:29.160
Would you let the Thought Police install[br]telescreens in your house, monitor and
1:02:29.160,1:02:34.010
record everything you do, every time you[br]move, every word you’ve read, to peer into
1:02:34.010,1:02:37.880
the most private nook of all, your head?[br]BECAUSE THAT’S WHAT HAPPENS when
1:02:37.880,1:02:42.540
you let your governments monitor the net[br]and enact mandatory data-retention laws!
1:02:42.540,1:02:48.200
smashing sounds
1:02:48.200,1:02:52.480
If you answered “No” to all those[br]questions, then we can safely deduce
1:02:52.480,1:02:59.600
that terms like “Online”, “IRL” and “in[br]Cyberspace” are Newspeak. They confuse the
1:02:59.600,1:03:05.040
truth: There is no “Cybersphere”. There[br]is only life. Here. It follows that if you
1:03:05.040,1:03:09.380
have an oppressive Internet, you have[br]an oppressive society, too. Remember:
1:03:09.380,1:03:11.490
online is real life…[br]typewriter typing sounds
1:03:11.490,1:03:15.950
Your Digital Rights are no different from[br]everyday human rights! And don’t give me
1:03:15.950,1:03:20.089
that BS that you don’t care about[br]Privacy because you have nothing to hide.
1:03:20.089,1:03:24.570
That’s pure Doublethink. As comrade[br]Snowden clearly explained, that’s like
1:03:24.570,1:03:28.730
saying you don’t care about Free Speech[br]because you have nothing to say!
1:03:28.730,1:03:32.970
Stick that up your memory[br]holes and smoke it, noobs!
1:03:32.970,1:03:37.650
Pigs Arse, the portal is closing, I’m[br]losing you! I’ll leave you with a new tool
1:03:37.650,1:03:42.689
to use. I assume you’ve all been fitted[br]with one of these spying devices. Well,
1:03:42.689,1:03:46.420
here’s an app you can use in spite of[br]this. It’s called Signal, and, yes, it’s
1:03:46.420,1:03:50.660
free and simple. Install it and tell all[br]your contacts to mingle then all your
1:03:50.660,1:03:54.520
calls and texts will be encrypted. So even[br]if Big Brother sees them the c_nt won’t be
1:03:54.520,1:04:00.490
able to read them. Hahaa! Now that’s[br]a smartphone! Our time is up!
1:04:00.490,1:04:04.230
typewriter typing sounds[br]Until the next transmission. Heed the
1:04:04.230,1:04:09.740
words of George Orwell. Or[br]should I say: George TORwell?
1:04:09.740,1:04:14.870
typewriter typing sounds
1:04:14.870,1:04:19.609
Remember, just as I went to Spain to fight[br]the dirty fascists you can come to Onion
1:04:19.609,1:04:24.089
land and fight Big Brother’s filthy[br]tactics. If you’re a Pro run a node and
1:04:24.089,1:04:28.180
strengthen the code. Or if you’re in the[br]Outer Party and can afford it, send TOR
1:04:28.180,1:04:33.720
some of your dough. Special Salute to[br]all my comrades, the “State of the Onion”.
1:04:33.720,1:04:38.109
Happy Hacking! Now go forth and[br]f_ck up Big Brother. That mendacious
1:04:38.109,1:04:42.539
motherf_cking, c_ck-sucking bastard[br]son of a corporatist b_tch…
1:04:42.539,1:04:52.910
Video Outro Music
1:04:52.910,1:05:00.999
applause
1:05:00.999,1:05:05.410
Jacob: So, I think that’s all the time[br]that we have. Thank you very much for
1:05:05.410,1:05:08.760
coming. And thank you all[br]for your material support.
1:05:08.760,1:05:35.370
applause
1:05:35.370,1:05:41.720
Herald: Unfortunately we won’t have time[br]for a Q&A. But I heard that some of the
1:05:41.720,1:05:49.940
crew will now go to the Wau Holland booth[br]at Noisy Square down in the Foyer and
1:05:49.940,1:05:54.790
might be ready to answer[br]questions there. If you have any.
1:05:54.790,1:05:59.330
postroll music
1:05:59.330,1:06:05.881
Subtitles created by c3subtitles.de[br]in 2016. Join and help us!