preroll music
Herald: I am very happy to introduce this
year’s update on the “State of the Onion”!
This is a talk with about 5 speakers,
so let’s introduce them one by one.
First, Roger. He did it the last talk.
He is the founder of the TOR Project,
applause
MIT Graduate and Top 100 Global Thinkers.
Then we have Jake, a
humble PHD math student
applause
that is in my opinion not a
National Security threat
but a post National Security promise.
We have Mike Perry, and I think
it is enough to say about him,
that the NSA calls him a worthy adversary.
applause
He is also the lead dev
of the TOR Browser.
And then we have Alison Macrina,
a radical, militant librarian.
applause
And last but not least: Shari Steele, the
new Executive Director of the TOR Project.
applause
So without further ado:
This year’s State of the Onion!
applause
Jacob: Alright, it’s a great
honor to be back here again.
And we’re really happy to be able
to introduce so many more faces.
It’s no longer the Roger and Jake
show. That’s very important to us.
Hopefully next year, we won’t
be here, but we’ll still be alive.
So 2015, if I were to express
it in a hand gesture
or with a facial expression, it would
look something like “Ooouuw”.
It was really a year of big changes. Not
all of them were really good changes.
And there were a lot of heavy things
that happened throughout the year.
We won’t even be able to cover all of
them because we only have an hour.
So we want to focus on the
positive things. I would say that
probably the nicest thing is that we are
growing. We’re really, really growing.
Not only growing the network,
but we’re growing the community.
And in some sense we’re expanding
throughout the whole world in terms of
users who are using TOR, what TOR
users are using TOR for, which is
of course extremely important that there
is more and more people just doing
regular things with TOR, protecting
themselves. But then we have of course
lots of specialized things that happen
with the TOR network as well.
We have things like OnionBalance and
Ricochet. Really exciting developments.
And we’ll talk a bit about all of those
things. One of the most unlikely things,
at least when I imagine working
on TOR, say 10 years ago vs. now,
is that we’ve worked with some really
unlikely partners. Some of you know
that I’m not really a big fan of Silicon
Valley, even though I’m from there.
So you know, I sometimes call Facebook
not so nice names, like Stasi-Book.
And part of the reason for that is
because I think it is a little bit weird,
that you report on all your friends
in order to go to parties.
Previously it was to get into the party
and now it is to go to parties.
And yet we worked with them on something.
Because it turns out that sometimes
you have unlikely temporary alliances.
And it turns out that while I personally
may think that they are evil incarnate
in some sense, it is the case that
there is at least one good guy there.
Alec worked on this fantastic RFC7686,
that actually allowed us to help all
Facebook users mitigate some harm.
Which is that if they want to be able
to visit Facebook; and I guess
the reality is that not using Facebook
for a lot of people is sort of like
the “Kill your Television” bumper sticker
of the 90s. For those of you that ever
visited rural America. You know that that
wasn’t like a really successful campaign.
A lot of people have TVs these days
as well. So it’s a little bit like that,
only here we actually built an alternative
where we can mitigate harm.
And that’s really incredibly important
because it mitigates harm in all sorts
of different pieces of software. It
makes it possible for us to talk to
Browser vendors, to DNS resolvers.
And part of this was motivated
by some investigative journalism
that I actually did, where I revealed
XKeyscore rules, where the US
Government’s National Security Agency
was sifting through all of the internet
traffic to look for .onion addresses.
So when they saw a DNS request
for .onion they were actually
learning .onions by harvesting traffic.
And that really motivated me
to want to make it, so that the DNS
resolvers didn’t do that anymore.
It was very important, because one
of my core missions with TOR
is to make that kind of stuff a
lot harder for the spies to do.
And protecting everyday users, even
users who aren’t TOR users, yet.
And that’s very important. So working
with Alec on this has been great,
because the IETF actually
supports this. And now
ICANN will not sell
.onion to anyone.
It’s a special use reserved
name. And that’s incredible!
applause
Roger: OK, so. Is this
thing on? Yes it is, great!
So there are a couple of interesting
graphs, that we’re going to give you,
of usage scenarios, usage
instances over the past year.
So pretty recently we were looking at
the number of people in Russia
using TOR. Russia has been talking about
censoring, talking about all sorts of
oppression steps. And at
the beginning of November,
we moved from 180k people in
Russia each day using TOR
up to almost 400k people. And
this is probably a low estimate.
So many hundreds of thousands
of people for that two week period,
which started with a Russian bomber
getting shot down, were trying to get
news from the rest of the world, rather
than news as Russia wanted to show it
to them. So that’s
kind of a cool event.
Another interesting event: Bangladesh
ended up censoring Facebook
and some other websites and a whole
lot of people switched to using TOR.
I was actually talking to one of the
Facebook people and they have their own
internal statistics about the number of
people connecting over the TOR network
to Facebook. And it would be super
cool to super impose these two graphs.
Our data is public and open
and we like sharing it.
They don’t actually share their data.
But one day it would be really cool
to be able to see both of these
graphs at once, to see users shifting
from reaching Facebook
directly to going over TOR.
The other interesting thing from the
Bangladesh side: I was looking at the
Alexa top websites around the
world and we, torproject.org is
like 8000th in the global
rankings, but at least
for the past couple of weeks
torproject.org has been
300th in Bangladesh. So there are a
whole heck of a lot of people there,
learning about these privacy things
that can get around local censorship.
applause
OK, and then an exciting
other story that we’re
going to touch on briefly, but
it’s an entire talk on its own.
So let me give you a couple
of facts and we’ll go from there.
January of 2014 a hundred
relays showed up
in the TOR network and we weren’t sure
who was running them, but they weren’t
exit relays, so they didn’t seem like
they were such a threat at the time.
Fast forward a while later: The
CERT organization inside CMU
submitted a presentation to
Blackhat on how cool they were
for being able to attack TOR users. And
they talked about how they were going to
talk about individual users
that they de-anonymized
and how cool they were for that.
And I spent a while trying to extract
details from them. And eventually
I learned what their attack was.
And then Nick Mathewson, one of
the other TOR developers decided
to check the TOR network to see if
anybody was actually doing that attack.
I mean it’s CERT, they are the
folks who publicised the phrase
“responsible disclosure”. Surely,
they are not actually undermining
the TOR network and attacking TOR users.
But then it turns out that somebody was
doing the attack. And it was these
100 relays that looked kind of ordinary
and innocuous before that. Then I sent
mail to the CERT people, saying:
“Hey are those relays yours?” And they
went silent. They have never answered any
of my mails since then. So that’s
what we know. It doesn’t look good.
One of the key things that we,
TOR, have done from here is
we’ve been working on strengthening
the TOR network and getting better
at recognizing these things. So
the core of the attack was that
they did what’s called a Sybil attack,
where you sign up a lot of relays
and you become too large a fraction of the
TOR network. So we’ve been working on
a lot of ways to recognize that
an attack like that is happening,
and mitigate it, and get rid of it
early. For example Philipp Winter
has a bunch of interesting research
areas on recognizing similarity
between relays. So you can
automatically start detecting:
“Wait a minute, this event
happened, where a lot of relays
are more similar than they should
be.” Another example there is:
We used to say: “Well I don’t
know who’s running them,
but they don’t seem that dangerous. So
OK, it’s good to grow the TOR network.”
Now we’re taking the other
approach of “Gosh, that’s weird,
let’s get rid of them and then
we’ll ask questions after that.”
So we’re trying to be more
aggressive, more conservative
at keeping the TOR network
safe from large adversaries.
Whether they’re government organizations
or corporations or individuals.
Whoever might be attacking it.
Jacob: We’ve had a few really big
changes in the TOR community.
One of them is that we had
an Interim Executive Director
come on in a sort of quick moment
and that’s Roger Dingledine.
Some of you probably always thought he
was the Executive Director the whole time.
That’s because for a while he was and then
he wasn’t. And then he was back again.
And that change was quite a
huge change in that instead of
working on a lot of anonymity stuff,
Roger was doing a lot of bureaucratic
paperwork which was actually quite
sad for the anonymity world, I think.
He probably reviewed fewer papers
and did fewer anonymity things
this year than ever before.
Which is really, really sad.
But that really lit a fire under us to
make sure that we would actually
change that. To make sure that it was
possible to get someone else, who is
really good at being an Executive Director
of the TOR Project, to really lead,
so that we could have Roger return to
not only being an anonymity researcher,
but also the true Spirit
Animal of the TOR Project.
He doesn’t look like
an onion, but in spirit.
Roger: Slide!
Jacob: laughing
Another really big thing that happened
is working with Laura Poitras
over the last many years.
She has followed the TOR Project
– lots of people like to follow the
people on the TOR Project –
but we consented to her following us.
And she made a film, “Citizenfour”,
I think some of you… have
any of you seen this film?
applause
Quite amazingly,
she won an Oscar. Actually, she
basically won every film prize.
applause
One of the key things is that people
in this room that work on Free Software
were explicitly thanked. If you work
on Tails, if you work on GnuPG,
if you work on SecureDrop,
OTR, TOR, …
She specifically said in
the credits of the film:
This film wouldn’t have been
possible without that Free Software.
Actually making her job and
the jobs of her source
and other people involved…
making that possible.
And so her winning that Oscar
in some sense feels like
closing a really big loop that had
been open for a very long time.
And it’s really great and she,
I think, would really wish that she
could be here today, again. She
sends her regards, and she is really,
really thankful for everybody here that
writes Free Software for freedom!
applause
Roger: So another exciting event
that happened in 2015 is that reddit
gave us 83.000$. They had some
extra profit and they decided
that they would give it to 10 non-profits
chosen from among the Redditer community.
And there were people who came to me
and said: “Hey Roger, you really have to,
you know, start advocating, start
teaching everybody, why TOR should be
one of them.” And I said: “Oh, I’m
busy. Those things never work.
You know, they’ll choose somebody
else.” And so it turns out that we were
the 10th out of 10 without doing
any advocacy work whatsoever
to the reddit community, which is super
cool that they care about us so much.
Also reddit divided the ten equally. So
even though we were the 10th out of 10,
we got 10% of the donations
that they were giving out.
applause
Jake: One of the really –
I would say one of the oddest things
about working at the TOR Project for me
is that TOR has supported me through
really crazy times. So when I was
being detained by the US Government
or having my property stolen by fascist
pigs in the United States Government’s
border checkpoints, TOR didn’t fire me.
TOR always backed me and always
kept me safe. And many people often look
like they wanted to kill me from stress,
but often they didn’t, which was nice.
Or they didn’t get close enough
and I could move fast enough. But
they were always very helpful. And
they’ve really helped me to
go and do things to speak for
anonymous users who can’t go
other places. And one of the places
which I was most honored to go in the
last year – I was actually scheduled
to go there with Caspar Bowden, but
unfortunately he was ill at the time.
And as you know, Caspar
has since passed away.
But we were scheduled to go together and
TOR was supporting us both, actually,
to go to this. And it resulted, I believe,
in a very amazing meeting in
Geneva at the United Nations,
where the special rapporteur actually
endorsed TOR and off-the-record messaging
and encryption programs,
and privacy, and free software.
Saying that they are absolutely essential.
And in fact their use should be encouraged
from a human rights perspective. And in
fact the really amazing part about it is
he didn’t do it only from the perspective
of free speech. And this is important,
because actually there are other rights.
And we should think about them.
So for example the right to form
and to hold an idea is a right
that cannot be abridged. The right
to free speech can be abridged
in many free societies, but what is
in your head and how you form it
is something where… that is not
a right that can be abridged.
And he wrote this in the report. And
he, when writing this report with
many other people, made it very clear that
this is something we need to keep in mind.
That when we talk about private spaces
online, where groups may collaborate
to form ideas, to be able to create
a political platform for example,
to be able to make democratic change,
they need to be able to use the internet
to freely exchange those ideas in a secure
and anonymized, encrypted fashion.
And that helps them to form and to hold
ideas. And obviously that helps them later
to express free speech ideas. And that’s
a huge thing to have the United Nations
endorse basically what many of us in this
room have been saying for, well… decades.
Roger: So the UN thing is really cool.
We’ve also been doing some other
policy angles. So Steven Murdoch, who
is a professor in England and also
part of the TOR community, has worked
really hard at teaching the British folks,
that their new backdoor laws and
their new terrible laws are actually
not what any reasonable country wants.
So he’s put a huge amount of energy into
basically advocating for freedom for
them. And similarly Paul Syverson,
part of the TOR community, basically
ended up writing a post note for the UK
about how the dark web is
misunderstood. See previous talk.
So we’ve been doing quite a bit
of education at the policy level
to try to teach the world, that encryption
is good and safe and worthwhile
and should be the default
around the world.
Jake: And there is a kind of interesting
thing here. Maybe a little contentious
with some people in the TOR community.
But I just wanted to make it really clear.
We have the TOR Project, which is
a non-profit in the United States.
And we have a much wider TOR
community all around the world.
And in Berlin we have a really, really
like an incredible TOR community.
We have people like Donncha working
on OnionBalance. We have people like
Leif Ryge working on bananaphone. We
have all of these different people working
on all sorts of Free Software. And many
of those people don’t actually work
for the TOR Project. They’re community
members, they’re volunteers,
there is some of privacy students.
And so the Renewable Freedom Foundation
actually funded the creation
of a sort of separate space
in Berlin where people work on these
kinds of things, which is not affiliated
with US Government money. It’s
not affiliated with the TOR Project
as some sort of corporate thing.
It’s not a multinational thing.
It’s really the peer-to-peer version in
some sense of what we’ve already had
in other places. And it’s really great
and I wanted to just thank Moritz
who made that happen and to all the
people like Aaron Gibson, and Juris
who actually put that space together
and made it possible. So in Berlin,
there is a space, not just c-base,
not just CCCB, but actually
a place which is about anonymity.
It’s called Zwiebelraum.
And this is a place in which people are
working on this Free Software. And they
are doing it in an independent manner.
And we hope actually that people will
come together and support that, because
we need more spaces like that, that
are not directly affiliated with the TOR
Project, necessarily, but where we have
an aligned mission about reproduceable
builds in Free Software and also
about anonymity and actually about caring
about Free Speech. And actually making
it happen. And really building spaces
like that all around the world. So if you
have a place in your town where you want
to work on those things, we would really
hope that you will work on building that.
I called it “general cipher punkery”.
I feel like that’s a good description.
There’s lots of stuff to be done.
And now for a Marxist joke: So we
discovered the division of labor,
which was a really important discovery.
We’re about 180 years too late,
but we started to split up where it didn’t
go very well, the Marxist asked why.
Cheers, cheers!
So the Vegas Teams are really simple.
Basically we have a bunch of people
that previously they did everything.
And this really doesn’t work. It’s very
stressful and it’s very frustrating
and it leads to people doing lots and
lots of things in a very unfocused way.
And so we split it up! And it actually
happened naturally, it was emergent.
So e.g. Mike Perry, who’s gonna talk
about the Applications Team’s work
in a second here, he was
already leading this,
he was really making this happen. And
so we just made it more explicit. And,
in fact we created a way of communicating
and reporting back so that
you don’t have to, like, drink from the
fire hose about absolutely everything
that’s happening everywhere, but you can
sort of tune in to those things, which
means we get higher-level understandings
and that is a really, incredibly useful
thing that has made us much more
productive. And what was part of the
growing pains of the last year actually
was figuring out how to make that work
because we’re a pretty flat group in terms
of a community and a pretty flat group
in terms of an organization writing
Free Software and advocating.
And so that’s a really incredibly good
thing which will come up all the time.
You’ll hear people talking about the
Metrics Team or the Network Team or the
Applications Team or the Community Team.
And that’s what we’re talking about.
In that sense. So we tried to formalize it
and in some ways we may be moving in a
sort of Debian model a little bit. And
we’ll see how that actually goes. So we
have a really great person here to
explain the work of the Metrics Team.
Roger: OK, so I’m gonna tell you a little
bit about what the Metrics Team has been
working on lately to give you a
sense of some of the components
of the TOR community. So there are 5 or
10 people who work on the Metrics Team.
We actually only pay one-ish of them;
so most of them are volunteers
and that’s… on the one hand that’s great.
It’s wonderful that there are researchers
all around the world who are contributing
and helping to visualize and helping to do
analysis on the data. On the other hand
it’s sort of sad that we don’t have a full
team of full-time people who are working
on this all the time. So it’d be great
to have your assistance
working on this. So,
actually Metrics has been accumulating
all sorts of analysis tools
over the past 5 years. So there are up to
30 different little tools. There’s Atlas
and Globe and Stem and 20-something more
which is a challenge to keep coordinated,
a challenge to keep maintained. So
they’ve been working on how to integrate
these things and make them more
usable and maintainable and extensible.
So one example that they… so they wrote
some slides for me to present here.
One example that they were looking
at, to give you an example of how
this analysis works, is bad relays in the
TOR network. So maybe that’s an exit relay
that runs, but it modifies traffic, or
it watches traffic or something.
Maybe it’s a relay that signs up
as a Hidden Service directory
and then when you publish your
onion address to it, it goes to visit it
or it puts it on a big list or something
like that. Or maybe bad relays are Sybils
who – we were talking earlier about
the 2014 attack where a 100 relays
showed up at once and we, the directory
authorities have a couple of ways of
addressing that relays. One of them is
each of the directory authorities can say:
“That relay needs to get out of the
network! We just cut it out of the
network.” We can also say: “Bad exit!”
We can also say: “That relay is no longer
gonna be used as an exit!” So even though
it advertises that it can reach Blockchain
and other websites, clients choose not to
do it that way. So that’s the background.
One of the tools that Damian wrote a while
ago is called Tor-Consensus-Health and it
looks every hour at the new list of relays
in the network and it tries to figure out:
“Is there something suspicious that
just happened at this point?” And in this
case it looks for a bunch of new relays
showing up all at the same time with
similar characteristics and it sends email
to a list. So that’s useful. The second
piece of the analysis is “OK, what do you
do when that happens?” So we get an email
saying “Hey, 40 new relays showed up,
what’s up with that?” So there’s a real
challenge there to decide: do we allow
the TOR network to grow – sounds good –
or do we wonder who these people are
and try to contact them or cut them out of
the network or constrain what fraction
of the network they can become.
So Philipp Winter also has a
visualization, in this case of basically
which relays were around on a given month.
So the X axis is all of the different
relays in the month and the Y axis is each
hour during that month. And they’ve sorted
the relays here by how much they were
present in the given month. And you’ll
notice the red blocks over there are
relays that showed up at the same time
and they’d been consistently present at
the same time since then. So that’s kind
of suspicious. That’s “Hey, wait a minute,
what’s that pattern going on there?”
So this is a cool way of visualizing and
being able to drill down and say:
“Wait a minute, that pattern right there,
something weird just happened.”
So part of the challenge in general for
the Metrics Team is: they have a Terabyte
of interesting data of what the network
has looked like over the years –
how do you turn that into “Wait a minute,
that right there is something mysterious
that just happened. Let’s look at it
more.” So you can look at it from
the visualization side but you can also
– there’s a tool called Onionoo where
you can basically query it, all sorts
of queries in it, it dumps the data
back on to you. So we’ve got a Terabyte
of interesting data out there, what
the relays are on the network, what
sort of statistics they been reporting,
when they’re up, when they’re down,
whether they change keys a lot,
whether they change IP addresses a lot.
So we encourage you to investigate and
look at these tools etc. So there’s
a new website we set up this year
called CollecTor, collector.torproject.org
that has all of these different data sets
and pointers to all these different
libraries and tools etc. that you too
can use to investigate, graph-visualize
etc. So here’s another example.
At this point we’re looking at the 9
directory authorities in the network.
Each of them votes its opinion about
each relay. So whether the relay’s fast,
or stable, or looks like a good exit or
maybe we should vote about “Bad Exit”
for it. So the grey lines are: all of the
directory authorities thought that
it didn’t deserve the flag and it’s very
clear. The green lines are: enough of the
directory authorities said that the relay
should get the flag, also very clear.
And all the brown and light green etc.
in the middle are contradictions.
That’s where some of the directory
authorities said “Yes it’s fast” and some
of them said “No, it’s not fast”. And this
gives us a visualization, a way to see
whether most of the directory authorities
are agreeing with each other.
We should look at this over time and if
suddenly there’s a huge brown area
then we can say “Wait a minute,
something’s going on”, where maybe
a set of relays are trying to look good to
these directory authorities and trying
not to look good to these. So basically
it helps us to recognize patterns
of weird things going on. So on CollecTor
you can find all sorts of data sets
and you can fetch them and do your
analysis of them. And Tor Metrics
– metrics.torproject.org – has a bunch of
examples of this analysis, where you can
look at graphs of the number of people
connecting from different countries, the
number of relays over time, the number
of new relays, the number of bridges,
users connecting to bridges etc. There
are 3 different libraries that help you
to parse these various data sets. So
there’s one in Python, one in Java,
one in Go; so whichever one of those
you enjoy most you can grab and start
doing analysis. They do weekly or so
IRC meetings, so the TOR Metrics Team
invites you to show up on January 7th
and they would love to have your help.
They have a bunch of really interesting
data, they have a bunch of really
interesting analysis tools and they’re
missing curious people. So show up,
start asking questions about the data, try
to learn what’s going on. And you can
learn more about them, on
the Metrics Team, there.
And then I’m gonna pass it on to Mike.
applause
Mike: OK, so Hello everyone! So, I’ll be
telling ’bout the Applications Team part
of the Vegas plan that
Jake introduced. Basically,
the Applications Team was created to
bring together all the aspects of TOR
and the extended community that are
working on anything that’s user facing.
So anything with a user interface that
the user will directly interact with,
that’s an application on
either Mobile or Desktop.
So to start, obviously we had the
TOR Browser, that’s sort of like
a flagship application that most people
are familiar with when they think of TOR.
Recently we’ve added OrFox which is a
project by the Guardianproject to port
the TOR Browser patches to Android
and that’s currently in Alpha Status. But
it’s available on the Guardianproject’s
F-Droid Repo. We also have 2 chat clients:
TorMessenger and Ricochet and both with
different security properties. I will be
getting to it later. So I guess, first
off let’s talk about what happened
in the TOR Browser world in 2015.
Basically most of the, or a good deal
of our work is spent keeping up
with the Firefox release treadmill.
That includes responding
to emergency releases,
auditing changes in the Firefox code
base making sure that their features
adhere to our privacy model and making
sure that our releases come out
the same day as the official
Firefox releases so that there’s
no vulnerability exposure to known
vulnerabilities after they’re disclosed.
That has been a little bit rough to over
2015. I believe there is a solid 3..4
months where it felt like we were doing
a release every 2 weeks. Due to either
log jam or random unassessed
vulnerability or any arbitrary
security issue with Firefox. But we did…
despite treading all that water we did
manage to get quite a bit of work done.
As always our work on the browser focuses
in 3 main areas: privacy, security
and usability. Our privacy work is
primarily focused around making sure that
any new browser feature doesn’t enable
new vectors for 3rd party tracking. So no
ways for a 3rd party content resource to
store state or cookies or blob URIs
or some of the newer features.
There’s a new cash API. These sorts
of things need to all be isolated
to the URL bar domain to prevent 3rd
parties from being able to track you.
From being able to recognize it’s the same
you when you log in to Facebook and
when you visit CNN, and CNN loads
the Facebook Like buttons, e.g.
Additionally we have done a lot of work on
fingerprinting defences, the Alpha Release
ships a set of fonts for the
Linux users so that the
font fingerprinting can be normalized
since a lot of Linux users tend to have
different fonts installed on their
systems. As well as tries to normalize
the font list that allowed for Windows
and Mac users where they often get
additional fonts from 3rd party
applications that install them.
On the security front the major exciting
piece is the security slider. So with iSEC
Partners’ help we did a review of all the
Firefox vulnerabilities and categorized
them based on the component that they were
in as well as their prevalence on the web.
And came up with 4 positions that allow
you to choose, basically trade off,
functionality for vulnerability surface
reduction. And this was actually quite
successful. It turned out that
all of the Pwn2own exploits
against Firefox were actually blocked
for non-https sites at medium/high.
And if you enable the high security
level they were blocked for everything.
We additionally released address
sanitizer hardened builds, these are…
basically should… especially the higher
security levels of the security slider
should protect against various memory
safety issues in the browser and also
help us diagnose issues very rapidly.
And of course we now sign our Windows
packages using a hardware security module
from DigiCert. The usability improvements
were primarily focused around this UI and
this new Onion Menus you can see if you
remember the old menu. There was quite a
lot more options there. We sort of
condensed and consolidated options and
eliminated and combined as much as we
could. An additionally displayed the
circuit for the current URL bar domain.
In 2016 we’ll be focusing mostly on again
the same 3 areas. Our main goal for
privacy is to try and convince Mozilla
that they want to adopt our idea of
isolating 3rd party identifiers at least
to the point of if the user goes into the
Preferences and tries to disable 3rd party
cookies, will let you do the same thing
for DOM storage, Cash, blob URIs,
worker threads, and all these
other sources of shared state.
We’re very excited about their work on a
multi-process sandbox, additionally even
application-level sandboxing, it should
be… without Mozilla’s sandbox,
we should still be able to prevent the
browser from bypassing TOR using SecComp
or AppArmor or SeatBelt or one of
these other sandboxing technologies.
We’re looking forward to trying to
get that rolled out. And we’re doing
exploit bounties! We’ll be
partnering with HackerOne,
who’ll be announcing this shortly. The
program will start out invite-only
and then… just, so we can get
used to the flow and scale up
and then we’ll make it public later in the
year to basically provide people with
incentive to review our code to look
for vulnerabilities that might be
specific to our applications. And of
course the usual usability improving,
security, improving installation. And we’d
like to improve the censorship and bridges
ability flow as well hoping to automate
the discovery of bridges and inform you
if your bridges become unreachable.
So TOR messenger
is one of our 2 chat clients, also
part of the Applications Team.
Basically, the goal there was to minimize
the amount of configuration that
the user had to do if they wanted to
use one of their existing chat clients
with TOR and OTR. Now this is based
on another Mozilla platform – Instantbird
which is based on Thunderbird.
This allows us to share a lot of the
TOR Browser configuration codes
for managing the TOR process and
configuring bridges. So the user has a
very similar configuration
experience to the browser
when they first start it up. It also has
some additional memory safety advantages
– all the protocol parsers are written
in Javascript. This basically…
one of the major things when we
were looking at candidates for
a messaging client was we wanted to avoid
the problems of libpurple in the past
where there’s been a lot of, like, remote
code execution vulnerabilities with
protocol parsing. Now there are some
trade-offs here, obviously, when you’re
dealing with a browser product. You
still have a html window rendering
the messages. But it is XSS filtered and
even if an XSS exploit were to get through
to run Javascript in your messaging
window that Javascript would still be
unprivileged. So they need an additional
browser-style exploit. And that filter has
been reviewed by Mozilla and additionally
we’re looking into removing Javascript
from that messaging window at all.
It should be completely possible to just
display a reduced, slightly less sexy
version of the same window at perhaps
another higher security level without
Javascript involved at all in that window.
So we will hand off to Jake now to
describe some of the security properties
and differences between TOR
messenger and Ricochet.
Jacob: Just to be clear about this: We
wanted to sort of echo what Phil Rogaway
has recently said. He wrote a really
wonderful paper quite recently about the
moral character of cryptographic work and
Phil Rogaway for those of you that don’t
know is one of the sort of like amazing
cryptographers, very humble, really
wonderful man who was really a little bit
sad that cryptographers and people
working on security software don’t take
the adversaries seriously. So they use
Alice and Bob, and Mallory and they have
cutie icons and they look very happy.
We wanted to make it clear what we thought
the adversary was. Which is definitely not
a cutie adversary. When anonymity fails
for Muslims that live in Pakistan, or e.g.
the guys that are giving a talk later
today, the CAGE guys, when anonymity fails
for them they get detained or they get
murdered or they end up in Guantanamo Bay
or other things like that. So it’s a
serious thing. And we wanted to talk about
what that looks like. So e.g. a lot of you
use jabber.ccc.de, I guess. Don’t raise
your hands. You should decentralize. Stop
using jabber.ccc.de because we should
decentralize. But that said if you do,
this is sort of what it looks like, right?
There’s the possibility for targeted
attacks when you connect. There’s the
possibility that the Social Graph e.g. of
your buddy list, that that would be on the
server. It would be possible that there’s
a bug on any Jabber server anywhere.
So of course you know that if you’re using
Gmail with Jabber, you know that they are
prison providers. So if you got a pretty
big problem there and the attacker, again,
is not a cutie attacker, it’s, you know,
I like the Grim Reaper, that fit that
Mike chose, if you like that’s accurate.
And now if you see one of the protections
you’ll have for communicating with your
peers is off-the-record messaging. That’s
basically the thing. But that’s a very
slap together protocol in a sense. Because
it’s hacks on top of hacks. Where you
know you compose TOR with Jabber and TLS
and maybe you still have a certificate
authority in there somewhere. Or maybe you
have a TOR Hidden Service but then your
status updates they don’t have any
encryption at all, for example. Or, again,
your roster is an actual thing that
someone can see, including every time you
send a message to those people the server
sees that. So, that said, TOR messenger is
really great because it meets users where
they already are. Right? So e.g. actually
one other point here is if you use a piece
of software like Adium, there is actually
a bug filed against Adium where someone
said “Please disable logging-by-default
because Chelsea Manning went to prison
because of your logging policy”. And the
people working on Adium in this bug report
basically said: “Good!” That’s horrifying!
Right? So what if we made it as reasonable
as possible, as configuration-free as
possible using TOR, using OTR, trying to
remove libpurple which is a whole like…
it’s a flock of Zerodays flying in
formation. Right? So we wanted to kill the
bird in a sense but also not we want to
help provide an incentive for improving.
And so that’s where TOR messenger fits.
But we also want to experiment with next
generation stuff. And one of those things
is written by a really great guy on our
community, almost single-handedly, without
any funding at all, and his name is
“special”, that’s actually his name. He’s
also special. But it’s really nice,
because actually, if you solve the problem
of telling your friend your name, if
you’re familiar with the properties of
Hidden Services where you have a self-
authenticating name you know that you’re
talking to the person that you think you
are because you’ve already done a key
exchange. The important part of the key
exchange. And so one of the things that
you’ll see very clearly is that there is
no more server. Right? So there’s no more
jabber.ccc.de in this picture. So this is
a really good example of how we might
decentralize, actually. It’s an experiment
right now but it means no more servers. It
uses the TOR network’s TOR Hidden Service
protocol and everybody actually becomes a
TOR Hidden Service for chatting with their
buddies. And it’s end-to-end encrypted and
it’s anonymized and of course this means
that your Social Graph is a traffic
analysis problem, it’s no longer a list on
a server. And it means your metadata is
as protected as we currently know how
to do in a low-latency anonymity network.
And in the future one of the really nice
things about this is that it will be
possible – or we think it will be
possible – to even make it better in a
sense, e.g. multiple chats, sending
files, sending pictures, in other words,
everything becomes, instead of a certainty
we move it towards probability. And the
probability is in your favour.
Mike: Yes, additionally, I’ll be working
on various forms of panning for cases like
this to basically increase this high…
the probability that there will be
concurrent traffic at the same time from
multiple TOR clients, which will further
frustrate the discovery of the Social
Graph based on simple traffic analysis
especially for low-traffic cases such as
Ricochet. So just to wrap up that
TOR Applications piece: in 2016 we’re
trying to focus heavily on usability and
gin more people to be able to use TOR,
omitting the barriers to finding TOR,
downloading TOR, being able especially
for censored users, and being able to
install TOR. There’s still some snags,
various difficulties that cause people to
stop at various stages of that process and
we want to try and work for to eliminate
them. We also, of course, want to increase
coordination: share graphics, visual
aesthetics and coordinate the ability to
share the TOR process. And we also want to
create a space for more experimentation,
for more things like Ricochet. There’s
probably a lot more ideas like Ricochet
out there. There could be leverages
of TOR protocol and especially Hidden
Services in creative ways. So we’re
looking to create an official sanctioned
space as part of TOR to give them a home.
And to look for that in the coming
months on the TOR blog.
Jacob: Alright, I just wanted to put in a
picture of a guy wearing a Slayer T-Shirt.
So there it is. That’s Trevor Paglen. Some
of you may remember him from such things
as helping to film Citizenfour, building
Satellites that burn up in space so that
are actually currently on other
satellites. And this on the left is
Leif Ryge, he’s sort of the person that
taught me how to use computers. And he is
an incredible Free Software developer.
Trevor Paglen and myself, and this is
a cube, the Autonomy Cube which we talked
about last year. Because we think that
culture is very important and we think
that it’s important to actually get people
to understand the struggle that exists
right now. So this is installed in a
museum right now in Germany, in the city
of Oldenburg, at the Edith-Russ-Haus. And
it actually opened several months ago,
it’s filled with classified documents, it
has really interesting things to go and
read. I highly encourage you to go and
read. We built a reading room about
anonymity papers, about things that are
happening. About how corporations track
you, and then the entire museum is an
Open-WiFi network that routs you
transparently through TOR. So in Germany
a free open WiFi network that isn’t run by
Freifunk – much respect to them – we
wanted to make it possible for you to just
go and have the ability to bootstrap
yourself anonymously if you needed to. And
also these four boards are Novena boards.
And these Novena boards are Free and Open
Hardware devices made by Bunnie and Sean
in Singapore where you could, if you
wanted to, download the schematics and
fab it yourself. And it’s running the
Debian GNU Linux universal operating
system. And it’s an actual TOR exit node
with absolutely every port allowed. So the
museum’s infrastructure itself on the
city’s internet connection actually is a
TOR exit node for the whole world to be
able to use the internet anonymously.
applause
But the museum’s infrastructure is not
just helping people in Oldenburg, it’s
helping people all around the world to be
able to communicate anonymously and it’s
quite amazing actually because when
cultural institutions stand up for this
we recognize it’s not just a problem of
over-there stand. We have mass-surveillance
and corporate surveillance in the West
and we need to deal with that. Here, by
creating spaces like this. But that said,
we also need to make sure that we create
spaces in people’s minds all around the
world. And I want to introduce to you
someone who’s incredibly awesome, the
most bad-ass radical librarian around,
this is Alison.
Alison is going to talk about…
Alison: …Library Freedom Project! Hi!
Thank you so much! I’m so excited
to be here, it’s my first CCC and I’m on
stage, and it’s very… exciting. So I’m
going to talk to you a little bit about my
organization, Library Freedom Project.
I’m the director and what we do: we have
a partnership with TOR project to do
community outreach around TOR and other
privacy-enhancing technologies. Making
TOR network more strong and making tools
like TOR Browser more ubiquitous and
mainstream, all with the help of a
coalition of radical militant librarians.
So we introduced you to the Library
Freedom Project back in February. We told
you a little bit about the kind of work
that we do, mostly in US libraries,
increasingly internationally. Where
essentially we teach them about tools like
TOR Browser, how to install it on their
local computers, how to teach it into
computer classes that they offer for free
in the library or one-on-one technology
sessions for their community. And we’ve
had a really amazing year since then.
In addition to working with the TOR
project we’re really fortunate to work
with the American Civil Liberties Union
(ACLU). If you’re not familiar with them,
they’re basically… they’re the bad asses
who’ve been suing the US Intelligence
Agencies and Police for about a 100 years.
That is me with 2 people from the ACLU
Massachusetts, Jessy Rossman who is a
surveillance law expert and Kay Croqueford
who is an activist for the ACLU. And
they’re here, if you see that human buy
them a drink and ask them about the
surveillance capabilities of the US Police.
applause
So, it’s really cool! It’s a great
partnership with the ACLU because
basically they can teach why we need to
use tools like TOR Browser. So how to use
them is super-super important but you need
to know about the authorizations, the
programs, all the bad laws and the uses of
them against ordinary people. So, why do
we teach this stuff to librarians? It’s
basically for 2 big reasons. One of them
is that libraries and librarians have an
amazing history of activism around
privacy, fighting surveillance and
fighting censorship in the US where
I live. Librarians were some of the
staunchest opponents of the USA Patriot
Act from the beginning when it was
codified back in 2002. They made T-Shirts
that said “Another hysterical librarian
for Privacy” because of the…
The Attorney General at the time called
them “hysterical” for the fact that they
didn’t want this awful authorization to go
through. And of course then after Snowden
we learned many more things about just
how bad the Patriot Act was. So librarians
were some of the first people to oppose
that. They also have fought back against
National Security Letters which are the US
Government informational requests that
sometimes go to software providers and
other internet services. They have an
attached gag order that basically says:
“You have to give this information about
your users and you can’t tell anyone that
you got it.” Well, libraries got one of
these and fought back against that in one.
applause
They also, all the way back in the 1950s
even, at the height of Anti-Communist
Fervor and FUD, around the time of the
House on American Activities Committee,
librarians came out with this amazing
statement, called the “Freedom to Read”
Statement that I think really is a
beautiful text. It’s about 2 pages long
and it is their commitment to privacy and
democratic ideals made manifest.
And I have a little excerpt from it here.
I’m not gonna read the whole thing to you
’cause I understand I’m all too
pressed for time. But the last line is
my favourite. It says: “Freedom itself is
a dangerous way of life. But it is ours.”
So everybody go and get that tattooed!
You know, on your forehead or whatever.
applause
So, the history of activism is one of the
big things. There’s a second part that
is more practical. Libraries have an
amazing relationship to the local
communities. That doesn’t really exist
anywhere else especially in this era of
privatization and the destruction of
public commons. Libraries have already
free computer classes in many places,
sometimes the only free computer help that
you can get anywhere. They offer free
computer terminals to many people who
don’t have any other computer access.
They’re trusted community spaces, they
already teach about a whole number of
things. So we think they’re really the
ideal location for people to learn about
things like TOR Browser. So it’s been
going really well. This year we have
visited hundreds of different locations.
We’ve trained about 2300 librarians in the
US, in Canada and a few other countries,
Australia, UK and Ireland. We held an
amazing conference, you might recognize
this as Noisebridge. Any Noisebridge fans
here? I hope so. Come on, there’s got to
be more Noisebridge fans than that!
Christ! We had an amazing conference in
Noisebridge and actually my co-organizer
is also here, April Glaser, so you can buy
her a drink, she’s right over there. There
has been a huge response from the library
community. They wanna learn about TOR
Browser, they’re so excited that finally
there’s a practical way for them to help
protect their patrons’ privacy. They’ve
cared about this stuff from an ideological
and ethical standpoint for a really long
time, and now they know that there are
tools that they can actually use and
implement in their libraries and teach to
their community to help them take back
their privacy. We’re really lucky that not
only do we get to teach librarians but
occasionally we get invited to visit
the local communities themselves.
So, here we teach how to teach privacy
classes with TOR as a big focus.
But sometimes we get to meet the local
community members themselves. So I want to
show you this picture of a recent visit
that I made to Yonkers, New York. It was
a class just for teens. They’re all
holding TOR stickers if you can see that
and Library Freedom Project stickers.
This is a great picture that sort of is
emblematic of the kind of communities
that we get to visit. Yonkers is one of
the poorest cities in the US. These kids
are… many of them are immigrants, their
parents are immigrants, they face
surveillance and state violence as a
matter of their regular everyday lives.
For them privacy is not just a human
right but it’s sometimes a matter of life
and death. And these kids are just some
of the amazing people that we get to see.
Also, just to give you an idea of how the
public perception around privacy is
shifting in my anecdotal experience:
we had 65 teenagers come to this class!
If you have a teenager or if you’ve been
a teenager you know teenagers don’t show
up for stuff, they don’t do that. 65 kids
came to this! And they were so excited!
This was just the group that was left over
at the end that had so many questions and
wanted more stickers to bring back to
their friends. So it’s pretty cool stuff.
Recently we embarked on a new project
bringing TOR relays into libraries. This
is Nima Fatemi with me, when we set up
our pilot at a library in New Hampshire
which is the state just above where I live
in the United States. And we basically
decided to do this project because we
thought it was a really great continuation
of the work that we were already doing,
teaching and training librarians around
using TOR. We wanted to take a step
further and take the infrastructure that
libraries already have; many of them are
moving to really fast internet, they can
donate an IP address and some bandwidth.
And they… many of them want to do kind
of the next thing to help protect privacy
and not just in their local communities,
as well. They want to help protect
internet freedom everywhere. So we thought
it was a really great sort of next step to
go. So we set up our pilot project in New
Hampshire. It went pretty well, we got a
lot of great press attention, a lot of
really great local and global community
support. We also got the attention of
the Department of Homeland Security.
applause
Basically they contacted the local Police
in this town in New Hampshire and they
said: “You know, this is stupid, and bad,
and criminal and you should shut this
down!” And the library was understandably
shaken by this and temporarily suspended
the operation of the relay. So we
responded by writing a letter, an open
letter from Library Freedom Project, from
TOR project, from ACLU and a broad
coalition of public interest groups and
luminary individuals including the
Electronic Frontier Foundation (EFF), the
Freedom of the Press Foundation, the Free
Software Foundation and all of our other
friends many of whom are in this audience
today. We wrote this letter to the library
basically affirming our commitment to
them, how much we are proud of them for
participating in this project and how much
we wanted them to continue. We put a lot
of nice, you know, ideological, why this
is important, warm fuzzy stuff. We also
got EFF to start a petition for us and
over a weekend we got about 4500
signatures from all over the world, the
library was flooded with emails, calls.
Only one negative one. Just one out of
hundreds. And that person was a little
confused, so I’m not even counting that
necessarily. It was like a conspiracy type thing.
So we got this amazing support and this
was all in anticipation of their board
meeting that was gonna happen a few days
later where the board was gonna decide
what to do about the relay. So Nima and I
show up to New Hampshire on a Tuesday
Night and you might imagine what a library
board meeting in rural New Hampshire is
typically like. It was nothing like that.
So we get outside and there’s a protest
happening already. Many people holding
Pro-TOR signs. This was just a glimpse of
it. And the look on my face is because
someone pointed to a very small child and
said: “Alison, look at that child over
there”. This tiny little girl was holding
a sign that said “Dammit Big Brother” and
I was like “I’m done, that’s it, I got to
go home!” So we went into the board
meeting and we were met with about 4 dozen
people and media and a huge amount of
support. Many of the community members
expressed how much they loved TOR, that
this whole incident made them download TOR
and check it out for themselves. Basically
it galvanized this community into a
greater level of support than we even had
when we initially set it up about a month
earlier. People who had no idea that the
library was doing this heard about it
because it got a huge amount of media
attention thanks to a story by Julia
Angwin in ProPublica that broke the news
to everybody and then it just went like
wildfire. So as you might imagine the
relay went back online that night. We were
super-successful. Everybody in the
community was incredibly excited about it
and supportive. And what has happened now
is that this community has sort of… like
I said they’ve been galvanized to support
TOR even more. The library has now allowed
at some of their staff time and travel
budget to help other libraries in the area
set up TOR relays. They’re speaking about
TOR…
applause
Thank you!
They’re speaking about TOR at conferences.
And this has really caught on in the
greater library community as well. So I
mentioned already the kind of success that
we’ve had at Library Freedom Project in
teaching tools like TOR Browser and
getting folks to bring us in for trainings.
This is even bigger than that! Libraries
are now organizing their, you know, staff
training days around, you know, “Should we
participate in the TOR relay project?” or
“How can we do this best?”, “What’s the
best angle for us?” So we’re really
excited to do announce that we’re gonna
be continuing the relay project at scale.
Nima Fatemi, who is now also in this
picture again, I’m really sad that he
can’t be here, he is wonderful and
essential to this project. But he will now
be able to travel across the US and we
hope to go a little further opening up
more relays in libraries. We’re gonna
continue teaching, of course, about TOR
Browser and other privacy-enhancing Free
Software. We’re now gonna incorporate some
other TOR services, so we’re really
excited to bring “Let’s Encrypt” into
libraries. And while we’re there, why not
run a Hidden Service on the library’s web
server. Among many other things. The other
goals for Library Freedom Project: to take
this to a much more international level.
So if you want to do this in your country,
you know your librarian, put them in touch
with us. You can follow our progress on
LibraryFreedomProject.org or
@libraryfreedom on Twidder. And we’re
always sort of posting on Tor Blog about
stuff that’s going on with us, so…
Thank you so much for letting me tell you
about it. It’s really a pleasure to be
here!
applause
Jacob: So, that’s a really tough act to
follow! But we’re very pressed for time
now. And we want to make sure that we can
tell you two big things. And one of them
is that, as you know, we were looking for
an Executive Director because our Spirit
Animal, Roger,…
Roger: Slide…
Jacob: Right… He couldn’t do it all. And
in fact we needed someone to help us. And
we needed someone to help us who has the
respect not only of the community here but
the community, basically, all around the
world. And we couldn’t think of a better
person, in fact, when we came up with a
list of people. The person that we ended
up with was the Dream Candidate for a
number of the people in the TOR Project
and around the world. And so, I mean, I
have to say that I’m so excited, I’m so
excited that we have her as our Executive
Director. I used to think that our ship
was going to sink, that we would all go to
prison, and that may still happen, the
second part. But the first part, for sure,
is not going to happen. We found someone
who I believe will keep the TOR Project
going long after all of us are dead and
buried. Hopefully, not in shallow graves.
So, this is Shari Steele!
applause
Shari: Hi!
applause
Thanks! Thanks, it’s actually so fun to be
back in this community. And I wasn’t gone
for very long. I had so much for
retirement. It didn’t work out for me.
But, that’s OK, I’m really excited. I have
had – we’re so tight on time – so I want
to just tell you there are 2 big mandates
that I was given when I first was hired.
And one is: Help build a great
infrastructure so that TOR Project is
sustainable. Working on that! The other
thing is: Money! We need to diversify our
funding sources, as everybody knows here.
The Government funding has been really
difficult for us specifically because it’s
all restricted. And so it limits the kinds
of things we want to do. When you get the
developers in a room blue-skying about the
things that they want to do, it’s
incredible! Really, really brilliant
people who want to do great things but
they’re really limited when the funding
says they have to do particular things. So
we happen to be doing our very first ever
crowd funding campaign right now. I want
to give a shout out to Katina Bishop who
is here somewhere and who is running
the campaign for us and is just doing an
amazing job. As of last count which is a
couple of days ago, we had over 3000
individual donors and over 120.000 Dollars
which is incredible for our very first
time when we didn’t even really have a
mechanism in place to be collecting this
money, even. So, it’s really great! And I
wanna also say we have a limited number
of these T-Shirts that I brought in a
suitcase from Seattle. So, and they’re
gonna be available, if you come down to
the Wau Holland booth at the Noisy Square.
Come talk with us! Give a donation!
We’re doing a special: it’s normally a
100 Dollar donation to get a shirt, but
for the conference we’ll do, for 60 Euro
you can get a shirt and it would be great
you’d be able to show your support. And
you can also donate online if you don’t
wanna do that here. That’s the URL. And
to end, we’d like to have a
word from Down Under!
Video starts
Video Intro Violin Music
Good Day to you! Fellow Members of the
Intergalactic Resistance against Dystopian
bastardry! It is I, George Orwell, with an
urgent message from Planet Earth, as it
embarks on a new orbit. Transmitting via
the Juice Channeling Portal. Our time is
short. So let’s get straight to the point.
Shall we? This transmission goes out to
all you internet citizens. Denizens of
the one remaining free frequency. In whose
hands rests the fate of humanity.
Lord… f_ckin’ help us!
typewriter typing sounds
When I last appeared to you, I warned you
noobs: You must not lose the Internet! Now
before I proceed, let us clarify one
crucial thing. The Internet is not Virtual
Reality, it is actual Reality.
typewriter typing sounds
Are you still with me? Good. Now ask
yourselves: Would you let some fascist
dictate with whom you can and cannot
communicate? Because that’s what happens
every time a government blacklists a
website domain. Would you let anyone force
you to get all your information from cable
TV? That’s effectively the case if you
allow corporations to kill Net Neutrality.
typewriter typing sounds
Would you let the Thought Police install
telescreens in your house, monitor and
record everything you do, every time you
move, every word you’ve read, to peer into
the most private nook of all, your head?
BECAUSE THAT’S WHAT HAPPENS when
you let your governments monitor the net
and enact mandatory data-retention laws!
smashing sounds
If you answered “No” to all those
questions, then we can safely deduce
that terms like “Online”, “IRL” and “in
Cyberspace” are Newspeak. They confuse the
truth: There is no “Cybersphere”. There
is only life. Here. It follows that if you
have an oppressive Internet, you have
an oppressive society, too. Remember:
online is real life…
typewriter typing sounds
Your Digital Rights are no different from
everyday human rights! And don’t give me
that BS that you don’t care about
Privacy because you have nothing to hide.
That’s pure Doublethink. As comrade
Snowden clearly explained, that’s like
saying you don’t care about Free Speech
because you have nothing to say!
Stick that up your memory
holes and smoke it, noobs!
Pigs Arse, the portal is closing, I’m
losing you! I’ll leave you with a new tool
to use. I assume you’ve all been fitted
with one of these spying devices. Well,
here’s an app you can use in spite of
this. It’s called Signal, and, yes, it’s
free and simple. Install it and tell all
your contacts to mingle then all your
calls and texts will be encrypted. So even
if Big Brother sees them the c_nt won’t be
able to read them. Hahaa! Now that’s
a smartphone! Our time is up!
typewriter typing sounds
Until the next transmission. Heed the
words of George Orwell. Or
should I say: George TORwell?
typewriter typing sounds
Remember, just as I went to Spain to fight
the dirty fascists you can come to Onion
land and fight Big Brother’s filthy
tactics. If you’re a Pro run a node and
strengthen the code. Or if you’re in the
Outer Party and can afford it, send TOR
some of your dough. Special Salute to
all my comrades, the “State of the Onion”.
Happy Hacking! Now go forth and
f_ck up Big Brother. That mendacious
motherf_cking, c_ck-sucking bastard
son of a corporatist b_tch…
Video Outro Music
applause
Jacob: So, I think that’s all the time
that we have. Thank you very much for
coming. And thank you all
for your material support.
applause
Herald: Unfortunately we won’t have time
for a Q&A. But I heard that some of the
crew will now go to the Wau Holland booth
at Noisy Square down in the Foyer and
might be ready to answer
questions there. If you have any.
postroll music
Subtitles created by c3subtitles.de
in 2016. Join and help us!