Guest User

PM2012: TYLER backup - Version 9887 Saved June 5, 2012

a guest
Jun 5th, 2012
5,412
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 55.39 KB | None | 0 0
  1. > The Secret is there is NO Secret...
  2.  
  3. Version 9887
  4. Saved June 5, 2012
  5.  
  6. "Art is now the only evolutionary-revolutionary power.
  7. Only art is capable of dismantling the repressive social system to build
  8. a SOCIAL ORGANISM AS A WORK OF ART."
  9. Joseph Beuys, 1921-1986
  10.  
  11. Project Mayhem 2012 Artistic Disclaimer: http://pastebin.com/Ux0Uk2em
  12.  
  13. "As everybody knows, it's OBVIOUS that prophecies & MagicK do **NOT** exist:
  14. The best way to predict the future is to CREATE IT."
  15. From: Project Mayhem 2012 TYLER - http://pastebin.com/Wt15GXTn
  16.  
  17. SHALL WE PLAY A GAME?
  18.  
  19. CHESS
  20. POKER
  21. FIGHTER COMBAT
  22. GUERRILLA ENGAGEMENT
  23. DESERT WARFARE
  24. AIR-TO-GROUND ACTIONS
  25. THEATERWIDE TACTICAL WARFARE
  26. THEATERWIDE BIOTOXIC AND CHEMICAL WARFARE
  27. GLOBAL THERMONUCLEAR WAR
  28.  
  29. >: PROJECT MAYHEM 2012_
  30. >:
  31. >:
  32. >:
  33. >:
  34. |=-----------------------------------------------------------------------=|
  35. |=-----------------------------------------------------------------------=|
  36. |=-------------------=[ ]=-------------------=|
  37. |=-------------------=[ WELCOME TO ]=-------------------=|
  38. |=-------------------=[ >:PROJECT MAYHEM 2012 ]=-------------------=|
  39. |=-------------------=[ ]=-------------------=|
  40. |=-------------------=[ First 't was the Gene. ]=-------------------=|
  41. |=-------------------=[ Then 't was the Meme. ]=-------------------=|
  42. |=-------------------=[ Time to Tame the Teme. ]=-------------------=|
  43. |=-------------------=[ ]=-------------------=|
  44. |=-------------------=[ ]=-------------------=|
  45. |=-------------------=[ >:pROjECT MAYhEM 2012 ]=-------------------=|
  46. |=-------------------=[ TROY-ART TECHMEME ]=-------------------=|
  47. |=-------------------=[ 12-12-2012 to 12-21-2012 ]=-------------------=|
  48. |=-------------------=[ ]=-------------------=|
  49. |=-------------------=[ ONE SOLUTION: RE-EVOLUTION. ]=-------------------=|
  50. |=-------------------=[ ]=-------------------=|
  51. |=-------------------=[ TYLER: ]=-------------------=|
  52. |=-------------------=[ ]=-------------------=|
  53. |=---------------=[ Massively Distributed Uncensorable ]=--------------=|
  54. |=--------=[ Collaborative Wiki-P2P Cipherspace Structure ]=-----------=|
  55. |=-----------------------------------------------------------------------=|
  56.  
  57.  
  58. . ..........................................O . ,O ..MMM. . ...................................
  59. . .......................................... MMM.MMM ..=DMMMM ... MZ..............................
  60. .............................................MMMMMMMMMMMMMMMM.MNMMMMMMM,............................
  61. . .....................................M.MMMMMMMMMMMMMMMMMMMMMMMMMM.............................
  62. . ......................................MMMMMMMMMMMMMMMMMMMMMMMMMM=. .. ..........................
  63. .. ..................................MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMI ..........................
  64. . ..................................DMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM .........................
  65. .. ....................................MMMMMMMMMMM. ... . MMMMMMMMMMMM.........................
  66. ......................................MMMMMMMMMN ............ .MMM. ............................
  67. .. ...................................MMMMMMMMMM ...............MM..............................
  68. ......................................M~.MMMMMMZ ................M .............................
  69. .........................................MMMMM .................................................
  70. . .......................................MMM.....MM..MO ... . ...............................
  71. ........................................MMMM ....MMMMMMMD .MMMMMM...............................
  72. .. .....................................MMMM ..... MM,.....MNMM ..............................
  73. . .....................................,MMMM ..................M ...............................
  74. . .......................................MMMMM ........... .......................................
  75. ......................................MMMMMM...........NMMMMZ...................................
  76. . .................................. MMMMMMMMD...........MMM ...................................
  77. .................................. MMMMMMMMMMMM+......$$$$MMM. .................................
  78. .. .................................MM ..NMMMMMMMMMM ...... MM.. M.................................
  79. ...............................M ......M..MMMMMMMMM . MMM~M..$................................
  80. ............................................. MMMMMMMMMMMMMM... . ................................
  81. . .............................................MMMMMMMMM..........................................
  82. ............................................. MMMMMMMM .........................................
  83. ............... MM ...........................MMMMMMMMMMMM ....................................
  84. .............MMMMM.............................DMMMMMMMMMMMM....................................
  85. . .......... MMMMM. ...............................~MMMMMMMMMMMZ..................................
  86. ............MMMMM....................................:MMMMMMMMMMM.................................
  87. ...........MMMMM,...................................... NMMMMMMMMM................................
  88. ........NMMMMM .........................................MMMMMMMM................................
  89. . .........MMMMMM .....................................M. .MMMMMMMMM ..............................
  90. . ........MMMMMM. ....................................MM....MMMMMMMZ .............................
  91. ........MMMMMMMM.................................. MMMM....MMMMMMM .............................
  92. .......MMMMMMMMMMMMMMMMMMMMMM. .....................MMM......MMMMM..............................
  93. . .......~MMMMMMMMMMMMMMMMMMMMMMMMD ...................MMM ....?MMMMM .............................
  94. .......MMMMMMMMMMM ....NMMMMMMMMMMD................MMMM ....NMMMMM .............................
  95. . .....MMMMMMMMMMM ......MMMMMMMMMMMMMMMI.......,MMMMMMMMM ..MMMMMMN..............................
  96. . ......MMMM .MMMM? ...,MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM ... MMMMM ..............................
  97. ....MMM$ ...MMMMM ..MMMMMMMMMM? ...MMMMMMMMMMMMMMMMMM........MMMI...............................
  98. . ....MMM ....MMMMM .MMMMMM7I .................OMMMMMM .........M. ...............................
  99. .... MMMM. .MMMMM .MMMMMM ......................NMM .............................................
  100. . ..MMMMMM . ....?MMMMM .....................................N .................................
  101. ... ..MMMMMMM ..... MMMM .,MMMMM .......................... ..MM ................................
  102. . . ...MMMMMMM......MMMM ...MMMMMM ..........................M .MM?................................
  103. ...MMMMMMM.....NMMM ....MMMMM ............................MD MMM................................
  104. ....MMMMMM ....MMMM. ....MMMMMMO ..........................MMZ:MMM ..............................
  105. . ....MMMMMM ...IMMM .......MMMMMMM...................N .....MMM8MMM...............................
  106. ....MMMMM ....MMM. .......MMMMMMMMM.................MM.....MMMMMMM ..............................
  107. .....MMMMO .... ..........OMMMMMMMMM? ..............MMN...MMMMMMMM...............................
  108. .. ...MMMM...................MMMMMMMMMM$ ...........MMMMMM,MMMMMMMMM7..............................
  109. ...MMMMM .................MMMMMMMMMMM............ZMMMMMMMMMMMMMMM ..............................
  110. ... ...MMMMM,.................MMMMMMMMMMM ..............MMMMMMMMMMMMMM..............................
  111. . ...+MMMMM ................7MMMMMMMMMO ..............MMMMMMMMMMMMMMMM ...........................
  112. ...,MMMMMM .....N ........7MMMMMMMMM ................NMMMMMMMMMMMMMMMM .........................
  113. ....MMMMMMM.....M .........MMMMMMMM~................NMMMMMMMMMMMMMMMMMMM........................
  114. . .......MMMMMMM....MM.........MMMMMMMM ..................MMMMMMMMMMMMMMMMMMM= .....................
  115. .....,MMMMMMM MMM ........MMMMMMMMM..................MMMMMMMMMMMMMMMMMMMMM ....................
  116. . . ......MMMMMMMM .8MM........=MMMMMMMM$ .................+MMMMMMMMMMMMMMMMMMMM....................
  117. .......NMMMMMMM ..MM....... MMMMMMMMM ...............MMMMMMMMMMMMMMMMMMMMMM:..................
  118. . . ......=MMMMMMM+ .MM,.....MM .. MMMMMMM. ............MMMMMMMMMMMMMMM MMMMMMMMI ................
  119. . ...........MMMMM.....MM ..MMM.........+MMMM$.. MMMMMMMMMMMMMMMMMMMM7 ..MMMMMMMM ...............
  120. ...........MMMMM,....DMD MMMMM ......... MMMMMMMMMMMMMMMMMMMMMMMMMMM+ .MMMMMMMMMD...............
  121. . . ...........MMMMMM...,MMMMMMMMMMMMMM.. . MMMMMMMMMMMMMMMMMMMMMMMM .MMMMMMMMMMM. .............
  122. ..............MMMMMM ...MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM IMMMMMMMMMMMM..............
  123. ... ...............MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM.MMMM ..NMMMMMM.............
  124. . .................MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMMM ..NMMMMMM.............
  125. . ..................MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM..MMM ..MMMMMM .............
  126. ... ..................MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM.IMMM ...MMMMM .............
  127. .................... MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM ., .....MMMM...............
  128. .......................MMMMMMMMMMMMMM PROJECT MAYHEM 2012 MMMMMMMMMMMMMM.......MMMM................
  129. .. ...................MMMMMMMMMMMMMMM 12.21.2012 11:11 MMMMMMMMMMMMMMM......MMMM. ...............
  130. . ..................MMMMMMMMMMMMMM THE END OF FEAR MMMMMMMMMMMMMMMM......MMM..................
  131. . ......................MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM ..........................
  132. . .........................MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM~...........................
  133. .......................MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM ...........................
  134. .. .......................MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM: ...........................
  135. .. ...................MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM ............................
  136. ....... ..............MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM ....... ........ ...........
  137.  
  138.  
  139.  
  140. ========================================
  141. NOTE: This is a BACKUP pad only. Please DO NOT use it to brainstorm ideas.
  142. Go to TYLER MAIN PAD at https://pad.telecomix.org/TYLER
  143. Version 9887
  144. Saved June 5, 2012
  145. ==============================================================
  146. IMPORTANT: To anonymize your IPs, you are strongly advised to access this Pad via TOR or buy a VPN (pay with bitcoins), OR get a b0x so that you can tunnel your traffic through an SSH connection.
  147. This pad ( https://pad.telecomix.org/TYLER ) is the MAIN PAD.
  148. BACKUP PADS:
  149. These are BACKUP PADs strictly meant as a security backup.
  150. You SHALL NOT use the BACKUP PADs to brainstorm ideas. IDEAS are shared here. Sharing IDEAS is still not illegal (Universal Declaration of Human Rights, 1948.), yet you are advised to anonymize your IP with TOR.
  151. ALL BACKUP PADs can be accessed via TOR.
  152. The BACKUP PADs are available at:
  153. https://ttbmov2dezfs2fln.onion/p/TYLER (via TOR)
  154. http://pad.fnordig.de/p/TYLER
  155. http://piratenpad.de/p/TYLER
  156. http://notes.occupy.net/p/TYLER
  157. http://wuselpad.ironhide.de/p/TYLER
  158. http://pad.tihlde.org/p/TYLER
  159. http://brownbag.me:9001/p/TYLER
  160. http://pad.tn/p/TYLER
  161. http://dev.ardupad.cc/pad/p/TYLER
  162. http://qikpad.co.uk/p/TYLER
  163. http://beta.publishwith.me/p/TYLER
  164. https://pad.lqdn.fr/p/TYLER
  165. http://pad.planka.nu/p/TYLER
  166. http://typewith.me/p/TYLER
  167. http://beta.primarypad.com/p/TYLER
  168. http://pad.factor.cc/p/TYLER
  169. Latest BACKUP@pastebin:
  170. Version 8637 Saved May 29, 2012 - http://pastebin.com/9F7b3fcf
  171. As an extra security layer, please feel free to keep encrypted local copies of this pad in your PC.
  172. ********************************************************************************************************
  173. ********************************************************************************************************
  174. *** IF YOU INTERPRET *** ANYTHING *** YOU READ ON THE FOLLOWING PAGES ***
  175. *** AS BEING ILLEGAL/forbidden IN YOUR COUNTRY or in your local jurisdiction, then
  176. *** DO NOT DO IT | DO NOT DO IT | DO NOT DO IT ***
  177. ********************************************************************************************************
  178. ********************************************************************************************************
  179.  
  180. Also,
  181.  
  182. |=----------------------------------------------------------------------------------------------------=|
  183. |=----------------------------------------------------------------------------------------------------=|
  184. |=--------=[ ]=--------=
  185. |=--------=[ « Never do anything against Conscience even ]=--------=|
  186. |=--------=[ if the State demands it. » ]=--------=|
  187. |=--------=[ Albert Einstein ]=--------=|
  188. |=----------------------------------------------------------------------------------------------------=|
  189. |=----------------------------------------------------------------------------------------------------=|
  190. The ideally non-violent state will be an ordered anarchy.
  191. That State is the best governed which is governed the least.
  192. — Mahatma Gandhi, Collected works of Mahatma Gandhi, Vol. 79 (PDF), p. 122
  193. ordered anarchy here means:
  194.  
  195. BEE Kind to all and make sure we all leave our egos aside.
  196.  
  197. Keep the PAD strictly technical. We do NOT discuss beliefs/politics here.
  198.  
  199. It is preferred that you do NOT choose a nickname but just edit anonymously or as "PM+random number" each time.
  200.  
  201. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.
  202.  
  203. See http://www.faqs.org/rfcs/rfc2119.html
  204.  
  205. If you AGREE on an item/idea, add a +1 next to it. 1
  206.  
  207. If you DISAGREE on an item/idea, do NOT delete it (this is the main purpose of BRAINSTORMING): EXPLAIN why you disagree and OFFER an alternate solution to it.
  208.  
  209. Resources:
  210. TYLER as described by PM2012: http://pastebin.com/Wt15GXTn
  211. #LETSCODETYLER Call to Hackzion! Code TYLER!:
  212. http://www.youtube.com/watch?v=XnR8wo-1utI - (UPRISING soundtrack)
  213. http://www.youtube.com/watch?v=fKfX9SN0p44 - (Golden Ratio Re-Evolution)
  214. Project Mayhem 2012 'Dangerous Ideas #1 and #2': http://pastebin.com/sLLwJbtz
  215. Dangerous Idea #1 video: http://www.youtube.com/watch?v=EGxDqpOxDkw
  216. Dangerous Idea #1 mp3: http://soundcloud.com/pm2012/dangerous-idea-number-one
  217. Dangerous Idea #3 video: http://www.youtube.com/watch?v=eZnVWH0Ilo0
  218. rEVOLUTIONART2012 vids: http://www.youtube.com/user/rEVOLUTIONART2012/videos
  219. All "Project Mayhem 2012" vids:
  220. http://www.youtube.com/results?search_query=%22Project+Mayhem+2012%22
  221. Tags :
  222. #TYLER
  223. #LETSCODETYLER
  224. #INTYLERWETRUST
  225. #PROJECTMAYHEM2012
  226. #PM2012
  227. #PM2012art
  228. TYLER discussions
  229. tl;dr:
  230. Universal Cryptographic Wrapper (Tor/I2P/Freenet...APIs) + a temporary Trust Authority HiveMind [+Ethical c0de] to keep informational noise to the minimum + a distributed Wiki to sort out and crowdsource all leaks from Conscientious Insiders worldwide (C.I.) =
  231. TYLER
  232. Plan :
  233. - Before June 2012 : Dev' begining
  234. -
  235. -
  236. - November 5th, 2012 : All TYLER CANDIDATES get out of Beta version and their source code, network design diagrams & documentation MUST be released ANONYMOUSLY & into the Public Domain.
  237. This (=this Pad's) one is supposed to be just one TYLER CANDIDATE.
  238. The more TYLER CANDIDATES coded by different coders/groups in STEALTH mode, the better resilience the Project gets.
  239. Remember: a potential Conscientious Insider (CI) has to be able to trust TYLER with his life before deciding to leak sensitive data [through/with/to] it. Hence total transparency code wise is not just a desired feature: TRUST is the CORE of TYLER.
  240. Hence the motto: 'In TYLER we TRUST.'
  241. - November 5th to December 11th: Code Audits. Cypherhacking community agrees on the safest & most TRUSTED #TYLER CANDIDATE.
  242. - December 12th 11:11 UTC: The final TYLER version will be announced and released in the wild.
  243. - December 12th onwards:
  244. "On the 10 days that go from 12-12-2012 to 12-21-2012, the World will see an
  245. unprecedented amount of Corporate, Financial, Military and State leaks that
  246. will have been secretly gathered by millions of CONSCIENTIOUS citizens, vigilants,
  247. whistleblowers and insiders worldwide, dormant cells of a global
  248. 'Fight Club' from all countries, patiently waiting for the time to SWARM
  249. the Egregor's Consciousness in perfect synchrony.
  250. Once TYLER be on the wild and Truths be revealed:
  251. 1. You DO ask questions.
  252. 2. You DO ask questions.
  253. 3. No excuses.
  254. 4. No lies.
  255. 5. You HAVE to trust TYLER: for YOU are the Watchmen."
  256.  
  257. - 12-21-2012 11:11: The End of Fear.
  258. Scholarly Resources:
  259. http://scholar.google.com/
  260. P2P resources:
  261. http://crypto.stanford.edu/~mironov/p2p/
  262. List of Anonymous Networks:
  263. http://kpvz7ki2v5agwt35.onion (TOR)
  264. http://kpvz7ki2v5agwt35.onion.to/wiki/index.php/List_of_Anonymous_Networks (clearnet)
  265. https://secure.wikimedia.org/wikipedia/en/wiki/Anonymous_P2P
  266. https://secure.wikimedia.org/wikipedia/en/wiki/Category:Anonymity_networks
  267. The 'kpvz' links are The Hidden Wiki right? That things down all the time: Mirrors: http://www.reddit.com/r/onions/comments/qm2cw/hidden_wiki_down_here_are_the_mirrors/
  268. Anonymity resources:
  269. Selected Papers in Anonymity
  270. http://freehaven.net/anonbib/date.html
  271. Handbook of Peer-to-Peer Networking
  272. Shen, X.; Yu, H.; Buford, J.; Akon, M. (Eds.)1st Edition., 2010, XLVIII, 1500 p.
  273. "Handbook of Peer-to-Peer Networking-rwt911.pdf"
  274. Torrent hash: C3BA97707C9E3C80019DD55E2207529AB876700D
  275. Crypto Anarchy, Cyber States, And Pirate Utopias, by Peter Ludlow
  276. http://www.scribd.com/doc/44385837/Crypto-Anarchy-Cyber-States-And-Pirate-Utopia
  277. See: http://en.wikipedia.org/wiki/Peter_Ludlow
  278. Whistleblowing resources:
  279. Brian Martin, The Whistleblower's Handbook: How to Be an Effective Resister
  280. (Charlbury, UK: Jon Carpenter; Sydney: Envirobook, 1999). Out of print from 2008.
  281. The Whistleblower's Handbook in pdf, 89 pages, 1.6MB
  282. http://www.bmartin.cc/pubs/99wh.pdf
  283. http://www.bmartin.cc/pubs/99wh.html
  284. Related projects (TYLER CANDIDATES too?):
  285.  
  286. Freehaven (MIT):
  287.  
  288. "The Free Haven Project aims to deploy a system for distributed data storage robust against attempts by powerful adversaries to find and destroy stored data. Free Haven uses a secure mixnet for communication, and it emphasizes distributed, reliable, and anonymous storage over efficient retrieval. Some of the problems Free Haven addresses include providing sufficient accountability without sacrificing anonymity, building trust between servers based entirely on their observed behavior, and providing user interfaces that will make the system easy for end-users. "
  289. http://freehaven.net/overview.html
  290.  
  291. Globaleaks:
  292.  
  293. http://globaleaks.org/ & http://wiki.globaleaks.org
  294. https://github.com/globaleaks/
  295. According to ProjectPlan-08.05.2012.pdf ( See: https://github.com/globaleaks/advocacy/blob/master/ProjectPlan-08.05.2012.pdf?raw=true )
  296. "Effort estimation: The total effort to fully implement the overall project is forecasted to be 1292 days of activity (a couple of solar years at least)."
  297. (note: unless pushed really hard, Globaleaks wouldn't make it by November 5th, 2012)
  298. See: http://en.wikipedia.org/wiki/GlobaLeaks
  299.  
  300. TELEX:
  301.  
  302. "Telex is a new approach to circumventing Internet censorship that is intended to help citizens of repressive governments freely access online services and information. The main idea behind Telex is to place anticensorship technology into the Internet's core network infrastructure, through cooperation from large ISPs. Telex is markedly different from past anticensorship systems, making it easy to distribute and very difficult to detect and block."
  303. Paper: Telex: Anticensorship in the Network Infrastructure
  304. By Eric Wustrow, Scott Wolchok, Ian Goldberg and J. Alex Halderman
  305. To appear in Proc. of the 20th USENIX Security Symposium, August 2011.
  306. https://telex.cc/
  307. (note: TELEX has a very interesting approach on using Public Key Steganography to circumvent censorship.
  308. http://scholar.google.com/scholar?q=public+key+steganography
  309. See also:
  310. http://www.phrack.org/issues.html?id=6&issue=49 - Project LOKI
  311. http://www.phrack.org/issues.html?issue=51&id=6 - Project LOKI2. The Implementation.)
  312. What :
  313. TYLER is described as a:
  314. "Massively Distributed Uncensorable & Collaborative Wiki-P2P Cipherspace Structure"
  315. Reference: http://pastebin.com/Wt15GXTn
  316. Why :
  317.  
  318. "[Any leaking platform dependant of easyly identifiable human beings] puts the role of the Editor in great personal danger and in risk of being 'totally incapacitated' —CIA's term to refer to Daniel Ellsberg— by potential enemies while it dramatically slows down the
  319.  
  320. release process.
  321.  
  322.  
  323. By its own nature, WikiLeaks mirror servers are limited in numbers, and
  324.  
  325. very much resource-hungry during media peaks.
  326.  
  327. Being limited in numbers means that they are prone to attack, DDoS,
  328. international IP bans, governmental inclusion in blacklists... etc. etc.
  329. These are single point of failure that threaten the infrastructure of the
  330. whole system.
  331.  
  332. TYLER aims to circumvent these issues."
  333.  
  334. To help Mr. Obama to fulfill his promises and to make them extensible to the whole of society. World. Wide.
  335.  
  336. The Obama-Biden Ethics Plan, November 2008 read like this:
  337. ____________________________________________________________________
  338.  
  339. Protect Whistleblowers:
  340.  
  341. "Often the best source of information about waste, fraud, and abuse in
  342. government is an existing government employee committed to public
  343. integrity and willing to speak out. Such acts of courage and patriotism,
  344. which can sometimes save lives and often save taxpayer dollars, SHOULD
  345. BE ENCOURAGED rather than stifled. We need to empower federal employees
  346. as watchdogs of wrongdoing and partners in performance.
  347. Barack Obama will strengthen whistleblower laws to protect federal workers who expose waste, fraud, and abuse of authority in government. Obama will ensure
  348. that federal agencies expedite the process for reviewing whistleblower
  349. claims and whistleblowers have full access to courts and due process."
  350.  
  351. Via: http://change.gov/agenda/ethics_agenda/
  352. ____________________________________________________________________
  353. Reference: http://pastebin.com/Wt15GXTn
  354. How[Principles] :
  355. --> We have to propose some constant "laws" for TYLER :
  356. - EVERYONE SHOULD BE ABLE TO SEND data throught the network
  357. - EVERYONE SHOULD BE ABLE TO READ data throught the network
  358. - ALL data SHOULD BE sent ANONYMOUSLY
  359. - ALL data SHOULD BE readed ANONYMOUSLY
  360. - ALL data MUST pass an ETHICAL CODE VALIDATION by a majority (3 out of 5 OR 4/7 OR 5/9 OR 6/11?) of positive KARMA JUDGES randomly chosen within those currently logged on and available within the HIVEMIND (=random, distributed & temporary TRUST 'AUTHORITY', hence no risk of being abused by 'permanent' powers, hence the "Power corrupts; absolute power corrupts absolutely" common to hierarchies is successfully solved.)
  361. - ALL data sent SHOULD BE stored somewhere in the network, even if no verification was procedeed.
  362. - ALL data belongs to everyone/nobody after sending
  363. - ALL trusted/accepted data* SHOULD PERSIST in the network, even if a people of a small group of people wants to delete it.
  364. - ALL trusted/accepted data* SHOULD BE EASILY REACHABLE, using keywords, a public key / Secure Hash Algorithm / Magnet URI scheme.
  365. - ALL trusted/accepted data* SHOULD BE EASILY CONTEXTUALIZED within a distributed Wiki that mimics Wikipedia structure. i.e.: [TYLER]/wiki/Company_Name
  366. See "Distributed-wiki" project http://trac.i2p2.de/wiki/gsoc/ideas/apps/distributed-wiki
  367. See: Wooki Wiki: decentralized wiki on P2P network http://wooki.sourceforge.net/
  368.  
  369. KISS Principle: Keep It Simple, Stupid!
  370.  
  371. "We need to design an USER-FRIENDLY software, so with a really simple interface that anyone non-computer-savvy can use and which works on all operating systems (including Android, ou iOS)."
  372. See: http://en.wikipedia.org/wiki/KISS_principle
  373.  
  374. Main goals for TYLER: SIMPLICITY, SAFETY & TRUST.
  375.  
  376. A Conscentious insider has to be able to trust TYLER with his life before deciding to use it to leak their sensitive information on corruption and illegal deeds.
  377. If a choice between Anonymity & speed has to be made, speed will always come second.
  378. TYLER is also described as an "EXTREMELY SIMPLE interface, so that anyone can do it."
  379. A Conscentious insider has to be able to trust TYLER with his life before deciding to use it to leak their sensitive information on corruption and illegal deeds. +1
  380.  
  381. Kerckhoffs's principle:
  382.  
  383. In cryptography, Kerckhoffs's principle (also called Kerckhoffs's Desiderata, Kerckhoffs's assumption, axiom, or law) was stated by Auguste Kerckhoffs in the 19th century:
  384. A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.
  385. Kerckhoffs's principle was reformulated (perhaps independently) by Claude Shannon as:
  386. "The enemy knows the system."
  387. In that form, it is called Shannon's maxim. In contrast to "security through obscurity," it is widely embraced by cryptographers.
  388. http://en.wikipedia.org/wiki/Kerckhoffs%27s_principle
  389.  
  390. ERRORISM is fine: Goal is not "perfection" but to MOVE UPWARDS the spiral.
  391.  
  392. "To avoid stalling, we won't aim at 'perfection': errors happen...Everything is OK!
  393.  
  394. 'Almost good enough' might be MORE than a 'good enough' mentality. Less Syntactics, More Semantics.
  395.  
  396. 'Evolutionary Computing', 'Adaptative Thinking', 'Dynamically Adhocratic' and 'Mutating problem solving' are key elements here.
  397.  
  398. We don't aim to find the 'best' solution, as there might be infinite ways to achieve a single goal: we aim to MOVE UPWARDS the spiral.
  399.  
  400. Or, in Herman Hesse's words:
  401.  
  402. "We have learned a lot, Siddhartha, there is still much to learn. We are not going around in circles, we are moving UP, the circle is a SPIRAL, we have already ascended many a level."
  403. Taken from: http://pastebin.com/Wt15GXTn
  404. How[Technical] :
  405. - How to ensure that a content is not a bullshit ?
  406. Coding a crowdsourced & karma based "TRUST AUTHORITY" into TYLER's HiveMind.
  407. The users that the HiveMind TRUSTS the most will be those whom be awarded with the most karma. Karma = TRUST.
  408. How do you earn good Karma?
  409.  
  410. By proving that you are a Conscientious Insider (CI).
  411.  
  412. - How?
  413. - By providing semantical authentication:
  414.  
  415. "publish some kind of internal info that only people who might have actually worked in that Company might know, in order to semantically AUTHENTICATE you towards fellow leakers and colleagues.
  416.  
  417. "Then other workers would know that you have actually been there, so your level of TRUST for anything you might have to say about the company would be thumbed up by the very internal people to that company. External people to that company could thumb you up or down, but that wouldn't mean much, for their votes would have much less weight, unless they can prove they have actually worked there by providing a NEW type of environmental/semantical information."
  418. "the users with the highest karma, as they have proved to be reliable, might have more weight in the system, towards thumbing up or down other users"
  419.  
  420. "The karma based "Trust Authority" should be based in "epistemic reliability". That is to say: any leak would pass the filter and be published by default. Yet, there would be an internal karma based ranking for each WikiTYLER contributor that would allow anybody completely foreign to that Company to quickly sort out the leaks based on the "trustability" karma.
  421. A leaker would not only provide the internal evidence on corruption/fraud but would it would be upon them to also disclose if they worked there, for how long and so on. They could also provide information regarding the physical environment / the servers rooms and so on, so that other Conscentious leakers can spot that information and verify it as TRUSTED. They would get, say 100 karma points for each member in the Hivemind that trusts them.
  422. This could be abused by bots / Artificial Intelligence agents / etc., of course. DARPA has been heavyly busy building "social armies". Google their project called "Social Media in Strategic Communication (SMISC)".
  423. See also: Revealed: US spy operation that manipulates social mediaMilitary's 'sock puppet' software creates fake online identities to spread pro-American propaganda.
  424. http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks
  425. More brainstorming here: a possible solution might be to issue semantical challenge-response queries in the way of CREATIVE tasks, in a peer-to-peer way. In other words:
  426. TYLER might include a Hivemind of "validators" that challenge potential leakers to pass
  427. a quick Turing test. See http://en.wikipedia.org/wiki/Turing_test
  428. A candidate leaker might have to solve a certain creative task in order to tell them from a machine. Say, compose a two line poem with the words "lurk" "evolve" and "countdown". Machines cannot understand/solve that. Humans do."
  429. Also: CAPTCHAS challenges can be maliciously proxied to other humans, (i.e.: setup a free image hosting and use the humans that use it to upload images to solve CAPTCHAS that TYLER might present to potential leakers. Hence we MUST NOT trust them to be able to tell the difference between a human and an AI.
  430. Challenges can be CONTEXT based ((= compose a surrealist poem about Fight Club with the words "lurk" "evolve" and "countdown", tell me a joke about TYLER or draw a simple picture of a lion, etc., so that they cannot be meaningfully (=semantically meaningful, context wise) proxied to other humans. Obviously the goal is not that the poem be aesthetically beautiful but that a human can judge that it was actually CREATED by another human. (== #DARE2KREATE)
  431.  
  432. By providing good information (=TRUSTABLE & VERIFIABLE) into TYLER.
  433.  
  434. Reddit-like importance rating?
  435. > The system could choose 5 "judges" randomly:
  436. - Step 1 : A judge receive a query (give query to another if no decision within amount of time?). "Wants to be judge for this doc ?"
  437. - Yes (Goto Step 2)
  438. - No, or timeout (Another judge is choosen randomly)
  439. - Step 2: Chosen person judges the document, YES/NO
  440. - Yes (If 3/5 judges say YES, go to step 3A)
  441. - No (If 3/5 judges say NO, go to step 3B)
  442. - Step 3:
  443. - 3A:
  444. Majority of judges voted yes. Document is accepted, now general users can vote YES or NO in case judges were wrong. Enough negative votes (~100?) remove the document from the main list.
  445. - 3B:
  446. Document is rejected, placed into pile of rejected docs. General users can vote YES or NO in case judges were wrong. Enough positive votes (~100?) make it accepted to the main list. --> Good solution if malicious people suceeds to reject a good document in the rejected list.
  447.  
  448. See:
  449. http://en.wikipedia.org/wiki/Reputation_system
  450. http://en.wikipedia.org/wiki/Collaborative_filtering
  451. http://en.wikipedia.org/wiki/Reputation_management
  452. http://en.wikipedia.org/wiki/Honor_system
  453. - How is "bullshit"=informational noise defined?
  454.  
  455. "DOXA" = Beliefs & opinions. Doxa (δόξα) is a Greek word meaning common belief or popular opinion. See: http://en.wikipedia.org/wiki/Doxa
  456.  
  457. Any information that that doesn't correspond to verifiable and factual data.
  458.  
  459. Scientific method refers to a body of techniques for investigating phenomena, acquiring new knowledge, or correcting and integrating previous knowledge. To be termed scientific, a method of inquiry must be based on gathering empirical and measurable evidence subject to specific principles of reasoning. See http://en.wikipedia.org/wiki/Scientific_method
  460. - Should TYLER be abided by an ETHICAL CODE that the random judges in TYLER's karma based TRUST AUTHORITY will be guided by?
  461. Yes.
  462. With much power comes much responsibility.
  463. Also:
  464. "Every news organization has only its credibility and reputation to rely on."
  465. - What should be TYLER's ETHICAL CODE?
  466. To respect citizens PRIVACY by rejecting to publish information that invades the privacy of individuals.
  467. "Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance." Bruce Schneier
  468. Also, this privacy requirement for citizens MAY not apply precisely to those in power:
  469. "When a man assumes a PUBLIC TRUST,
  470. he should consider himself as PUBLIC PROPERTY."
  471. Thomas Jefferson
  472. See: The Philosophy behind Freenet, by Ian Clarke
  473. https://freenetproject.org/philosophy.html
  474. See: http://en.wikipedia.org/wiki/Privacy
  475. http://en.wikipedia.org/wiki/Information_privacy
  476. http://en.wikipedia.org/wiki/Internet_privacy
  477. See: http://en.wikipedia.org/wiki/Objectivity_%28journalism%29
  478. http://en.wikipedia.org/wiki/Journalism_ethics_and_standards
  479. http://en.wikipedia.org/wiki/Media_ethics
  480. - How to avoid robots/scripts ?
  481. CAPTCHA or other difficult challenges for machines
  482. Maybe you have to have some sort of invite code or something, that only RATs know?
  483.  
  484. - How to make data available everytime ?
  485. - Duplicate !
  486. - Divide (and conquer)
  487.  
  488. May be there should be some sort of sub-system that is run by m0ds where people with leaks can request an invite code where they can input to upload
  489. WE DON'T WANT SHITTY/NON-VALID LEAKS, the fuck is the point of that?
  490.  
  491. Not trying to create a difference in power or anything, but it is important that the leaks are legitimate. Maybe some sort of proof/logs of the origin of the leaks? Only trusted members should be mods, this system can and will fail if we do not choose wisely.-1
  492. Something else to consider: who gets to be a mod? What if mods become corrupt? Non-mods moderate the mods in that case?-1
  493. Nobody should get to be a mod but, at much, a temporary jury.
  494.  
  495. Reason: in order to minimize abuses by 'Power', we shouldn't rely on 'permanent mods' or in 'trusted members', for, as someone has rightly pointed out, Power corrupts and absolute power corrupts absolutely.
  496. A nice way to minimize 'corruption by power' would be by making that power/authority temporary. I.e.: to issue a temporary ticket/token to a random set of validated humans to act as a temporary jury whose limited mission is to temporarily approve that a certain leak submission passes TYLER's Ethical Code, in order to flag it accordingly.
  497. What happens if leaks cannot be traced to proof? For example, no photo/video/audio/transcribed docs to indicate legitimacy.
  498. That would be fine, yet, that would be flagged in the leak entry, and that would be reflected in a kind of karma for the corresponding TRUST for each leak, according to the validations of the HiveMind.
  499. How [Dev]
  500. Laws :
  501. - Portable (should work without system install)
  502. - Lightweight (30 MB MAX with potential plugins)-1
  503. 30 Mb might be too much. We should consider TYLER to fit steganographically hidden in a non suspicious JPG/PNG or an MP3 (see "Plausible deniability" below) that a potential leaker could either carry with her or download from the net (successfully bypassing all firewall security policies like this), and then unwrap it locally, execute it (inside a sandbox?) and then, once the leaks be uploaded, it would securely delete itself forever. If TYLER is going to be an "extremely simple interface" then it might be only a matter of coding a sort of universal wrapper + a Trust Authority + a distributed Wiki to sort all leaks. So, let's say, 500kb-1Mb MAX?
  504. See discussion below.
  505. - For people without admin (Windows7) i suggest that a guest/normal should be able to use this. ie two points above this one, no sysinstall.
  506. - ! Use I2P : http://www.i2p2.de/ (SAM seems good to easily open anonymous communcations, so I can create/adapt a C/C++ library for V3)
  507. i2p , i think we on t expect I2p
  508. - ? Use Tahoe-LAFS for more large files (video/audio) : https://tahoe-lafs.org
  509. --> But need to preserve anonymity (when i2p is used as the transport layer with tahoe-lafs that solves it more or less [i2p+tahoe exists and is implemented, and deployed]) --> Interesting
  510. http://killyourtv.i2p/tahoe-lafs/ (currently have about 20 nodes inside i2p would be nice to see tyler use it and / or syndie too, see below)
  511. See also : Syndie -> http://syndie.i2p2.de/
  512. - Or ... from scratch ? --> IMO it's better to unify what is existing already with "application layer glue" instead of reinventing cryptographic transports and fragmenting cypherspace further. That would be the case if we use Tor/I2P/Freenet APIs <--- syndie does that for us (or rather it attempts to do so)
  513. Maybe a TOR/i2p network that forces the leaker's ip to be hidden/spoofed. No one should know where the leak came from, only whether it is a real leak of not.
  514. Specifications :
  515. [important stuff missing son i am dissapoint]
  516. Features :
  517. - ability to run live, leaving no forensic trace. (conceal & carry)+1
  518.  
  519. Consider the possibility of the WHOLE system running in RAM memory.
  520.  
  521. See note on TELEX above: they have a very interesting approach on using Public Key Steganography to circumvent censorship.
  522.  
  523. http://scholar.google.com/scholar?q=public+key+steganography
  524. -have self-destruct mode (instant dban of the device it runs off of. (if discovered)
  525. -should masquarade as a common process, as to not alert authorities. (injection technique)
  526. -language translator (global standing)
  527. -have self-check mode upon startup - checks against the source code for a specific number of online users (5 or so). Ensures that the version is not modified, hacked, or a trojan before being allowed onto the hivemind. Automatic hivemind rejection system which will block any modified TYLER. +2
  528.  
  529. - Maybe we should make a whole package that includes:
  530. - a live CD boot for people who need to access files which they wouldn't necessarily be able to access in normal circumstances.
  531. - Maybe we should just make our own distribution of linux aswell, one with TOR/i2p/TYLER etc etc, from that Linux one should be able to access all of the Windows sys files.
  532.  
  533. I you guys want, i can help with this... (I'm not brilliant at network programming.)
  534.  
  535. Think about self discovery. Think about self expression. Think about self sacrifice.
  536.  
  537. Most important: EVERYTHING IS A DOUBLE EDGED SWORD.+1
  538. -
  539.  
  540. Communications:
  541. If a potential leaker inside a protected & firewalled network cannot carry in or out of the company a USB key, the leaker could try to upload it straight to TYLER from inside the company network. But the leaker might have difficulties bypassing firewalls/IDS security policies and so on. Even worse, if he tried to "test" communicating with TYLER, he might be setting off the alarms as a potential leaker about to leak.
  542. There are several ways to bypass firewalls & IDS:
  543. 1. http://en.wikipedia.org/wiki/Covert_channel
  544. "a covert channel is a type of computer security attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy. "
  545. 2. http://en.wikipedia.org/wiki/Timing_channel
  546. "A timing channel is one example of a covert channel for passing unauthorized information, in which one process signals information to another process by modulating its own use of system resources (e.g., central processing unit time) in such a way that this manipulation affects the real response time observed by the second process."
  547. 3. PUBLIC KEY STEGANOGRAPHY. This is a novel and extremely interesting approach. Basically, the client and TYLER negotiate a certain "code" (i.e.: I'm going to send you 11 ICMP packets: that means the firewall is not going to inspect unsuspiciously looking traffic. You only check one every three ICMPs for a certain flag, and we can build and arrange a certain binary code from there. Then we start communicating. (Just a simple example).
  548. No IDS/Firewall can check for this. If implemented properly, this should be virtually undetectable: total stealth mode on.
  549. For a very interesting approach on using Public Key Steganography, check TELEX, already cited above and now here too:
  550.  
  551. TELEX:
  552.  
  553. "Telex is a new approach to circumventing Internet censorship that is intended to help citizens of repressive governments freely access online services and information. The main idea behind Telex is to place anticensorship technology into the Internet's core network infrastructure, through cooperation from large ISPs. Telex is markedly different from past anticensorship systems, making it easy to distribute and very difficult to detect and block."
  554. Paper: Telex: Anticensorship in the Network Infrastructure
  555. By Eric Wustrow, Scott Wolchok, Ian Goldberg and J. Alex Halderman
  556. To appear in Proc. of the 20th USENIX Security Symposium, August 2011.
  557. https://telex.cc/
  558. (note: TELEX has a very interesting approach on using Public Key Steganography to circumvent censorship.
  559. http://scholar.google.com/scholar?q=public+key+steganography
  560. See also:
  561. http://www.phrack.org/issues.html?id=6&issue=49 - Project LOKI
  562. http://www.phrack.org/issues.html?issue=51&id=6 - Project LOKI2. The Implementation.)
  563. Possible "simple solution" for TYLER (following the OSI Model):
  564. Piggyback Syndie
  565. (Application Layer) Tyler, the top layer UI, is in charge of being what the user sees and interacts with, user submits content via the UI and it gets passed to the Presentation Layer where it is packed and prepared for transport
  566. (Presnetation Layer) standardized format with cyptographic signatures, checksums etc used to package content, implementation details, format is not important YET, must be a standardized format.
  567. Details aren't important, but this layer is "our" layer, so the quality of Tyler will depend mainly on theses decisions.
  568.  
  569. (Session Layer) no real need for one?
  570. (Transport Layer) syndie, it is by nature meant to be network agnostic, using the syndie protocol would take away from the hardships of implementing new transports, let syndie care about interfacing with tor, mixmaster, i2p etc.
  571.  
  572.  
  573. tl;dr for yellow stuff:
  574. decide on a common cryptographic format for messages and piggyback on syndie.
  575. Tyler would be the UI that would package and unpackage data in a common cryptographic format that would be transported via syndie
  576. --> Study Syndie : Someone has the source code ?
  577. HOW TO GET SYNDIE SOURCE CODE :+1
  578.  
  579. Prerequistes :
  580. - Have I2P installed on your computer.
  581. - Download "mtn" (Google it, or check-it with your Package management system : apt, pacman, etc)
  582. - Start "mtn" tunnel on your pannel (http://127.0.0.1:7657/i2ptunnel/)
  583.  
  584. mtn is a CVS-like (like git and svn)
  585.  
  586. mtn -d i2p.mtn db init
  587. mtn genkey <mail_or_fake>@mail.i2p
  588. SYNDIE source code is on I2P mtn repo :
  589. With I2P installed (and mtn relay activated) :
  590. mtn -d i2p.mtn pull 127.0.0.1:8998 i2p.syndie
  591. mtn -d i2p.mtn co --branch=i2p.syndie
  592. Data format :
  593. (ideas) We can distinguish two data formats :
  594. - Plain text/html (light)
  595. - Binary files (pdf, videos, audio, etc)
  596.  
  597. - Use PGP signed and encrypted file that can be mounted locally as a file system (TrueCrypt+GPG?) <-- sounds like redundant encryption, multilayer maybe but in the end you'd need to figure out a way to package the keys for multilayer crypto.
  598.  
  599. I.E. vfat partition as a file that was encrypted by gpg.
  600. - Possible problem: cross platform compatibility, (need a good filesystem that every OS can mount. maybe FAT32 since things will not be too large and message size will be an issue due to using transport layers that are slow)
  601.  
  602. rProxy might be useful aswell
  603.  
  604. Features of RProxy:
  605.  
  606.  
  607. HTTP pipe-lining to reduce connection overhead to a downstream (this reduces latency of a full handshake per-request to a downstream)
  608.  
  609. Easily take downstream servers out of rotation.
  610.  
  611. Various methods of load-balancing client-requests to a downstream.
  612.  
  613. Full SSL support:
  614.  
  615. TLS False start
  616.  
  617. x509 verification
  618.  
  619. Certificate caching
  620.  
  621. Session caching
  622.  
  623. All other commonly used SSL options
  624.  
  625. Transparent URI rewriting.
  626.  
  627. Various X-Header configurations including options for added extended TLS fields.
  628.  
  629. Upstream and downstream thresholding (to reduce memory for slow/blocking downstream connections)
  630.  
  631. Per-downstream backlog, and backlog timeout management.
  632.  
  633. Flexible logging configuration.
  634.  
  635. Optional memory optimizations on systems which support mallopt()
  636.  
  637. Very low memory usage with optimal configuration.
  638.  
  639. It’s really @#$@#$r* fast.
  640.  
  641. source code for Rproxy here https://github.com/mandiant/RProxy/downloads
  642. Talk to TYLER when you have an idea so dangerous you can't share it with anyone else
  643. Register TellTyler.com -5
  644. Reason: TYLER doesn't need to depend upon any one site/person, specially not on any dotcom = certainly would be censored. "Distributed" means precisely that.
  645. centralized = bad idea
  646. SPECIFICATIONS :
  647. Interesting eMule specs : http://www.cs.huji.ac.il/labs/danss/presentations/emule.pdf
  648. (good thing to keep in mind with eMule is that they have it on i2p as well)
  649. Use cases (ideas) :
  650. Offline mode :
  651. When an user wants to grab some data, he will launch TYLER from its USB key (ie), and he will choose files/folders to grab.
  652. Files and folder will be locally stored in the USB key (ie), but encrypted by a user-defined password.
  653. Files SHOULD never be unencrypted.
  654. Online mode :
  655. When TYLER is in online mode file sharing is enabled via P2P protocols (we have to abstract I2P/Tor/Freenet layers).
  656. Files or chunks should also be encrypted during transfers.
  657. Example with an I2P transport :
  658. - Local grabbed files/leaks are encrypted with the user password (in a local db)
  659. - When file is sent to another peer, it will be decrypted using user password but immedialty reencrypted depending on the protocol (here, with I2P public key).
  660. - When the receiver receive chunks/file he will decrypt it with peer public key (sender) a immediatly reencrypt it locally with his own password
  661. Any user can choose to decrypt one or some local files with his own password, but I can be dangerous, and should be done only on HIS computer.
  662. TYLER should provide user-friendly interfaces to decrypt files and display them in RAM (not on hard drive disk) for better security.
  663. Proposed cryptogaphic container specs:
  664. PGP signed (optionally encrypted) tar.xz archive with structure as follows:
  665. message/ -- contains the origional file(s) that are sent
  666. manafest.json -- manafest file, contains checksums and metadata(? maybe not needed ?)
  667. reply/ -- holds the pgp signature of each file that is "agreed with"
  668. comments/ -- holds general comments of the origonal files
  669.  
  670. how it could work:
  671. ~ files can be targeted to a specific set of users if needed
  672. ~ to post a tyler message you post in the given format on the syndie network or any other network.
  673. ~ public key identities can be tallied and tracked, a leaderboard of "identity newness" can be established to keep track of karma.
  674. ~ any user can compute the current karma of a user given that all the posts are still archived.
  675. ~ to +1 a post you'd replay the message and append a pgp signature of each file in the original message that you agree with in the reply folder of the new archive
  676.  
  677. it now looks more like automating a cryptogarphic format with a gui. basically a gpg wrapper using anonymity networks (just like it should be done). It could be done in bourne shell at this point. +1+1
  678. It is good that this be the case, for this way it can benefit from years-long tested projects and technologies such as I2P, Tor, GPG, etc. Actually most of the really delicate work security wise (=cryptography implementation) has been developed already.
  679. If we want TYLER to be an "extremely simple interface" then it might be only a matter of coding a sort of universal wrapper + a Trust Authority + a distributed Wiki to sort all leaks.
  680. This has the added benefit that it could potentially be extremely lightweight. Not only it could fit in a USB key: our goal SHOULD be that it could EVEN fit steganographically hidden inside a non suspicious PNG/JPG image or inside an MP3 that a potential Conscientious Insider (CI) might either carry with her or download from any non-suspicious hosting site and then unwrap locally, execute (inside a sandbox, so that it be untraceable?), leak data and then securely delete forever.+9000
  681. Plausible deniability
  682. i.e.:
  683. "In cryptography and steganography, deniable encryption is encryption that allows its users to convincingly deny that some specific encrypted data exists, that a given piece of data is encrypted, or that they are able to decrypt a given piece of encrypted data[citation needed]. Such denials may or may not be genuine. For example, although suspicions might exist that the data is encrypted, it may be impossible to prove it without the cooperation of the users. If the data is encrypted, the users genuinely may not be able to decrypt it. Deniable encryption serves to undermine an attacker's confidence either that data is encrypted, or that the person in possession of it can decrypt it and provide the associated plaintext.
  684. Normally ciphertexts decrypt to a single plaintext and hence once decrypted, the encryption user cannot claim that he encrypted a different message. Deniable encryption allows its users to decrypt the ciphertext to produce a different (innocuous but plausible) plaintext and insist that it is what they encrypted. The holder of the ciphertext will not have the means to differentiate between the true plaintext, and the bogus-claim plaintext."
  685. See:
  686. http://en.wikipedia.org/wiki/Plausible_deniability
  687. http://en.wikipedia.org/wiki/Deniable_encryption
  688. http://en.wikipedia.org/wiki/Rubberhose_%28file_system%29
  689.  
  690. Syndie route:
  691. PGP Signed archives -> distributed wiki (how)?
  692. IDEA 1: TYLER as an anonymous DVCS
  693. Possible suggestions:
  694. ~ patch files for text ( could mean that tyler could be used to do more than just a wiki it could be a dvcs that holds a wiki)
  695. ~ placing media could be done via inline/included base64 datablobs (could include encryption but that would be client side)
  696.  
  697.  
  698.  
  699. ======================================================
  700.  
  701.  
  702. .. ,IMMMMMMMM+ .
  703. MMMMMMMMMMMMMMMMMMMMMM .
  704. OMMMMMMMMMMMMMMMMMMMMMMMMMMM+.
  705. DMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM+
  706. .MM.MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM.
  707. .M~MMMMMMMMZMMMMMMMMMMMMMMMMMMMMMMMMM
  708. .MMMMMMM . . . . : ZMMMMMMMMMM
  709. .MMMMM+.. ....:MMMMM
  710. +MMMM. M. .MMMM
  711. +MMMM .MMMM.
  712. .MMMM 8MMM
  713. MMMMM. IMMM
  714. .=MMM. .:=MMMMMDO . MMMMMMM,N. .M,.
  715. .MMM. MMMMZMM MMM. MMM.NO.7MM .MM
  716. ZM~ ..ZMI . . :M .
  717. MM. . .. . .
  718. MMMM+. ~$ N I..M.
  719. .MMM ZMMM, MMM ?M~
  720. .$MM. .MMMMMM. . .
  721. IM. . 8.... . .
  722. MMM .MMMM . ....M.. M
  723. .MMMMMMMMMMMMMMM.,MMMMMM.
  724. ZMMMMMM. . MMM .M.
  725. :M.MMMMMMMMMMMDODZMMMMMMMMI.MM.
  726. . MMM.8MMMMMMMMMMMMMMMMMMMMMM 8MMMN .
  727. ..=MMMMMM .7MMMMMMMMMMMMMMMMMMMMI MMMMMMMMM..
  728. . OMMMMMMMMMM? . MMMMMMMMMMMMMMMMMM .MMMMMMMMMMMMMM .
  729. .:MMMMMMMMMMMMMMMMM MMMMMMMMMMMMMMM. .8MMMMMMMMMMMMMMMMMMO..
  730. ..7MMMMMMMMMMMMMMMMMMMMM$ .MM:MMMMMMMMMMM . MMMMMMMMMMMMMMMMMMMMMMMMM.
  731. ..MMMMMMMMMMMMMMMMMMMMMMMMMMM .MMMMMMIDMMMM= .M7. MMMMMMMMMMMMMMMMMMMMMMMMMMMMMM=.
  732. .MMMMMMMMMMMMMMMMMMMMMMMMMMMMMM. MMMMMMMMMMMMMMMMMMM. ?MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMO
  733. MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM. .MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM.
  734. IMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM. MMMMMMMMMMMM . IMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM.
  735. OMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM. .MMMMMMMM. MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM.
  736. .MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM. .OMMMMMMM. .MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM.
  737. +MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM. MMMMMMM. MMMMMMMMM PROJECT MAYHEM 2012 MMMMMMM
  738. ?MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMD MMMMMMMM .MMMMMMMMMMM 12.21.2012 11:11 MMMMMMMM.
  739. MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM. .MMMMMMMMMM. .MMMMMMMMMMM THE END OF FEAR MMMMMMMM
  740. MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMI MMMMM.MMMMMD OMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM7
  741.  
  742.  
  743. |=-----------------------------------------------------------------------=|
  744. |=-------------------=[ ]=------------------=|
  745. |=-------------------=[ "ZOOM BACK CAMERA!!!" ]=------------------=|
  746. |=-------------------=[ ]=------------------=|
  747. |=-------------------=[ Alejandro Jodorowsky. ]=------------------=|
  748. |=-------------------=[ The Holy Mountain, 1973. ]=------------------=|
  749. |=-------------------=[ ]=------------------=|
  750. |=-------------------=[ iMAGIne. aCKt. ]=------------------=|
  751. |=-------------------=[ ]=------------------=|
  752. |=-----------------------------------------------------------------------=|
  753.  
  754. > ...or maybe yes.
Add Comment
Please, Sign In to add comment