<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Center for a Stateless Society &#187; encryption</title>
	<atom:link href="http://c4ss.org/content/tag/encryption/feed" rel="self" type="application/rss+xml" />
	<link>http://c4ss.org</link>
	<description>building public awareness of left-wing market anarchism</description>
	<lastBuildDate>Sat, 24 Jan 2015 03:46:54 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.1</generator>
	<item>
		<title>Missing Comma: Why aren&#8217;t all journalism students learning data security?</title>
		<link>http://c4ss.org/content/28919</link>
		<comments>http://c4ss.org/content/28919#comments</comments>
		<pubDate>Wed, 02 Jul 2014 23:00:39 +0000</pubDate>
		<dc:creator><![CDATA[Juliana Perciavalle]]></dc:creator>
				<category><![CDATA[Missing Comma]]></category>
		<category><![CDATA[Stigmergy - C4SS Blog]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[journalism education]]></category>
		<category><![CDATA[missing comma]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=28919</guid>
		<description><![CDATA[A long, long time ago in 2007, Alysia Santo wrote an article for the Columbia Journalism Review on the incorporation of data security into journalism classes. Since then, we’ve had the Wikileaks debacle, Snowden’s leaks and Manning’s leaks, leading to worldwide state crackdown on journalism: &#8220;I spoke with a number of journalism schools, to see...]]></description>
				<content:encoded><![CDATA[<p>A long, long time ago in 2007, Alysia Santo wrote <a href="http://www.cjr.org/the_news_frontier/teaching_cyber-security.php?page=all">an article for the Columbia Journalism Review</a> on the incorporation of data security into journalism classes. Since then, we’ve had the Wikileaks debacle, Snowden’s leaks and Manning’s leaks, leading to worldwide state crackdown on journalism:</p>
<p style="padding-left: 30px;">&#8220;I spoke with a number of journalism schools, to see how the growing issue of cyber-security was being handled, and found a range of approaches. I turned to my alma mater, Columbia’s Graduate School of Journalism, and spoke with Emily Bell, the director of Columbia’s Tow Center for Digital Journalism, a dual master’s program in journalism and computer science, which is in its first year. She says that issues of cyber security bother her “immensely,” but at this point, most students aren’t receiving detailed instruction about it. The only cyber-security course being taught takes place within the computer science program, which is only offered to the students enrolled in the Tow Center’s double major. Bell says discussions are underway for how to introduce this more broadly to the curriculum.&#8221;</p>
<p>This is great, but not all journalism students want to (or have the means to) go on to graduate school, much less at Columbia, much much less as a double major. Everyone I&#8217;ve spoken to who&#8217;s taken undergraduate journalism or general communications classes said that data security wasn&#8217;t brought up in the classroom.</p>
<p>Now I’ll be honest, as an undergrad, I’m a bit lazy with my data. I’m not reporting on anything particularly hard-hitting or of national interest, so I’m not too worried that anything journalistic on my computer or iPhone is incriminating. Most of what I know about journalistic data security is from my own research and a seminar I attended at the national Society of Professional Journalism conference hosted at Boston College this past April. In only about an hour, the presenters explained TOR, encrypted messaging, email protection, and general data security measures journalists should know about like using burner phones. There&#8217;s no reason these skills shouldn&#8217;t be applied in every undergraduate journalism class. Since I&#8217;m not done with my degree program I&#8217;ll give my school the benefit of the doubt for now, but most students I talk to don&#8217;t even know what TOR is, and that&#8217;s extremely problematic for the future of this field.</p>
<p>A few years after Santo&#8217;s piece, NYU journalism professor Adam Penenberg had this<a href="http://www.cjr.org/behind_the_news/teaching_cybersecurity_in_jsch.php?page=all"> gem of an excuse</a> why not:</p>
<p style="padding-left: 30px;">&#8220;&#8230; the NYU program didn’t require all students to learn comsec [communication security] for the same reason that they didn’t require all students to learn &#8216;how to line up ‘fixers’ in a war-ravaged nation or go undercover with a hidden camera. Only a fraction of students will ever need those skills.'&#8221;</p>
<p>Only a fraction of journalism students need to learn how to protect their information? It should be a no-brainer that any type of data, particularly email or phone correspondence, which journalists use most often, can potentially fall into the wrong hands and become incriminating. Not all students are techies, but modern journalism requires at least a base knowledge of technology, considering most of it is now on the internet. The days of meeting Deep Throat at a parking garage are long gone; although face-to-face conversation is still the most secure method of gaining information, this is not always possible as your sources may be halfway across the globe.</p>
<p>Susan McGregor, Columbia journalism professor offered the best rebuttal:</p>
<p style="padding-left: 30px;">&#8220;As for the question, Does everyone have to learn this stuff? McGregor says, absolutely. Journalists have a collective responsibility; it’s as important as closing and locking the door behind you when you walk into your apartment building. &#8216;You may not be covering the NSA, but a colleague of yours might,&#8217; says McGregor. &#8216;Unless you’re working really on your own, you have a responsibility to protect the person who is vulnerable or may be targeted within your organization by being responsible yourself. If you are not being responsible, you are exposing the people you work with, potentially.'&#8221;</p>
<p>Undergraduate journalism classes usually have a section on media law; my school has a whole required class on it. While of course it&#8217;s important to know how to deal with a lawsuit, wouldn&#8217;t it make sense to learn how to prevent one in the first place? There is concern over making students paranoid, but isn&#8217;t a healthy amount of paranoia necessary in the current security state?</p>
<p>McGregor is right &#8211; if you wouldn&#8217;t leave your apartment door unlocked, you wouldn&#8217;t leave all of your data out in the open fields of the web.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=28919&amp;md5=85ffab95c77d4581ec1991a68a581069" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/28919/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F28919&amp;language=en_GB&amp;category=text&amp;title=Missing+Comma%3A+Why+aren%26%238217%3Bt+all+journalism+students+learning+data+security%3F&amp;description=A+long%2C+long+time+ago+in+2007%2C+Alysia+Santo+wrote+an+article+for+the+Columbia+Journalism+Review+on+the+incorporation+of+data+security+into+journalism+classes.+Since+then%2C+we%E2%80%99ve+had...&amp;tags=data+security%2Cencryption%2Cjournalism+education%2Cmissing+comma%2Cblog" type="text/html" />
	</item>
		<item>
		<title>La Sicurezza su Internet È Responsabilità Nostra</title>
		<link>http://c4ss.org/content/26406</link>
		<comments>http://c4ss.org/content/26406#comments</comments>
		<pubDate>Thu, 17 Apr 2014 11:00:47 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Italian]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hactivism]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Tor]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=26406</guid>
		<description><![CDATA[Man mano che apprendiamo altri dettagli sullo spionaggio governativo, appare sempre più sconsiderato affidare la nostra sicurezza a terze parti. Lo stato vuole informazioni sicure sui suoi soggetti. Fin dal primo censimento in Egitto 5.000 anni fa, gli stati hanno sempre cercato di ottenere informazioni personali sui propri cittadini, soprattutto le tirannie, dove informatori e...]]></description>
				<content:encoded><![CDATA[<p>Man mano che apprendiamo altri dettagli sullo spionaggio governativo, appare sempre più sconsiderato affidare la nostra sicurezza a terze parti.</p>
<p>Lo stato vuole informazioni sicure sui suoi soggetti. Fin dal primo censimento in Egitto 5.000 anni fa, gli stati hanno sempre cercato di ottenere informazioni personali sui propri cittadini, soprattutto le tirannie, dove informatori e polizia segreta raccolgono informazioni su ogni attività potenzialmente sovversiva. Nell’era di internet e dello spionaggio governativo, le agenzie di spionaggio raccolgono informazioni su di noi – per lo più offerta ingenuamente da noi stessi tramite i <a href="http://www.al-monitor.com/pulse/originals/2013/08/hamas-facebook-social-media-activists.html">social media</a> – a livelli che avrebbero reso verde d’invidia l’NKVD di Stalin. Quando finirà tutto ciò non lo sa nessuno; intanto, meno informazioni utili si possono raccogliere e meno efficace è il controllo dello stato su di noi. Per quanto riguarda gli attivisti nel primo mondo, forme di comunicazione private o anonime potrebbe la soluzione ideale per evitare <a href="http://www.theguardian.com/uk/2011/apr/29/royal-wedding-police-criticised-protesters">l’arresto preventivo</a>. In posti come la Siria, poi, diventa una <a href="http://www.bloomberg.com/news/2011-11-03/syria-crackdown-gets-italy-firm-s-aid-with-u-s-europe-spy-gear.html">questione di vita o di morte</a>.</p>
<p>All’inizio speravo che compagnie come Google sarebbero venute in soccorso implementando potenti sistemi di criptografia; purtroppo sembra sempre più improbabile che imprese in mano agli azionisti e intrecciate con il governo possano offrire servizi sicuri efficacemente. Se è vero che queste compagnie, che fanno grossi profitti e spendono grosse somme in attività lobbistiche, sono le meglio posizionate nella lotta contro lo spionaggio di stato, è anche vero che sono quelle che hanno più da perdere se non tirano dritto.</p>
<p>Lavabit di Ladar Levison <i>era</i> un servizio di email <a href="http://steve.grc.com/2013/08/08/the-lesson-of-lavabit/">quasi sicuro</a>. Ad agosto Levison lo ha chiuso <a href="http://s23.postimg.org/sxz8qgtsr/lavabit_100049551_orig.png">citando interferenze e minacce da parte del governo</a>. Secondo speculazioni terze, Levison aveva ricevuto una lettera della Nsa che chiedeva di ottenere dati sui clienti, probabilmente Edward Snowden. Recentemente si è scoperto che un giudice aveva emesso un ordine rivolto ad ottenere la chiave d’accesso SSL dei servizi offerti da Lavabit. Questa chiave permette una connessione criptata sicura tra utente e server. Il suo possesso dà la possibilità al governo di accedere in tempo reale alle informazioni mandate al sito dagli utenti. Questo a sua volta avrebbe reso possibile il rastrellamento delle credenziali e l’accesso alle email criptate dei 400.000 utenti di Lavabit.</p>
<p>Con suo grande merito, Ladar Levison decise di chiudere Lavabit, negando l’accesso all’archivio in cui sono custoditi i messaggi dei suoi clienti. Il suo rifiuto di principio è un’eccezione. Levison non aveva azionisti a cui rendere conto; solo se stesso e i suoi clienti. Non possiamo aspettarci che grosse imprese come Google, che finge di stare dalla nostra parte mentre in realtà cerca di <a href="http://www.google.com/transparencyreport/userdatarequests/countries/">favorire l’intrusione del governo</a>, decidano di sfidare realmente lo stato. Altri, come la Microsoft, sembrano <a href="http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">entusiasti di collaborare con l’NSA</a> e altre agenzie a tre lettere.</p>
<p>Cosa significa per noi? Siamo condannati ad abbassare la testa? No! Dobbiamo prendere la cosa nelle nostre mani. Ci sono molti sistemi di criptografia gratis, <a href="http://https://it.wikipedia.org/wiki/Open_source">open source</a> e a <a href="http://https://it.wikipedia.org/wiki/Standard_aperto">standard aperto</a>. Da quel che sappiamo, l’NSA è riuscita a penetrare i sistemi criptografati solo tramite la <a href="http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/">coercizione</a> e la <a href="http://www.theverge.com/2013/9/20/4751364/rsa-tells-developers-to-stop-using-encryption-with-suspected-nsa-backdoor">sovversione</a>, non decodificando il codice. Molto probabilmente, <a href="http://https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html">possiamo ancora fidarci della matematica</a>.</p>
<p>Quando un progetto è open source, il suo codice è disponibile allo scrutinio generale. Possiamo esaminarlo, possiamo sapere esattamente come fa quello che fa. La maggior parte di noi non ha le conoscenze tecniche per esaminare il codice di un programma prima di compilarlo, ma ci sono esperti e accademici fidati che <a href="http://https://www.eff.org/press/archives/2008/02/21-0">possono farlo e lo fanno per noi</a>. Così possiamo conoscere i potenziali punti deboli del software di criptografia e capire i limiti delle sua capacità. Quando comunichiamo usando <a href="http://https://it.wikipedia.org/wiki/Pretty_Good_Privacy">PGP</a>, ad esempio, usiamo uno standard aperto. Non abbiamo bisogno di affidare i nostri messaggi ad una compagnia che magari è stata costretta dal governo a compromettere la nostra riservatezza. Con PGP la chiave d’accesso è nelle tue mani; nessun altro può essere costretto a rivelarla. Il <a href="http://c4ss.org/content/19091">progetto Tor</a>, più complesso, non è altrettanto ben definito. Per via della sua natura distribuita, le possibilità di abuso aumentano, ma il progetto è open source e questi possibili abusi sono documentati, e dunque possiamo studiarne i limiti.</p>
<p>La conclusione è che siamo tutti dentro. Se decidiamo di servirci dei servizi offerti dalle grosse compagnie, dobbiamo tenere conto del fatto che potrebbero comprometterci da un momento all’altro: non con la forza bruta ma con la coercizione. Con il <a href="http://https://it.wikipedia.org/wiki/Software_proprietario">software proprietario</a> non c’è modo di valutare e prendere per buone le dichiarazioni dello sviluppatore. E quando usiamo un software open source dobbiamo renderci conto delle sue limitazioni e usarlo di conseguenza.</p>
<p>La sicurezza su internet è responsabilità nostra.</p>
<p><a href="http://pulgarias.wordpress.com/" target="_blank">Traduzione di Enrico Sanna</a>.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=26406&amp;md5=684f2227bf74516d3345d01fff66cdc8" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/26406/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F26406&amp;language=en_GB&amp;category=text&amp;title=La+Sicurezza+su+Internet+%C3%88+Responsabilit%C3%A0+Nostra&amp;description=Man+mano+che+apprendiamo+altri+dettagli+sullo+spionaggio+governativo%2C+appare+sempre+pi%C3%B9+sconsiderato+affidare+la+nostra+sicurezza+a+terze+parti.+Lo+stato+vuole+informazioni+sicure+sui+suoi+soggetti.+Fin+dal...&amp;tags=activism%2Cencryption%2Chactivism%2CItalian%2CNSA%2CPGP%2CPortuguese%2CStateless+Embassies%2Csurveillance%2CTor%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Keeping Your Cryptocurrency Safe</title>
		<link>http://c4ss.org/content/25638</link>
		<comments>http://c4ss.org/content/25638#comments</comments>
		<pubDate>Tue, 01 Apr 2014 21:00:28 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Feature Articles]]></category>
		<category><![CDATA[air gapped]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[cryptocurrencies]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[passphrase]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[Stateless Embassies]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=25638</guid>
		<description><![CDATA[Just over a week ago, Fr33 Aid, an anarchist mutual aid organisation that is centred around supporting volunteers who provide medical and educational services, had it’s Bitcoins stolen from it’s online wallet located at Blockchain.info. Approximately 23 bitcoins were taken, with a value of about 14,500 USD. No small sum. This theft occurred despite reasonable...]]></description>
				<content:encoded><![CDATA[<p>Just over a week ago, <a href="http://www.fr33aid.com/about/">Fr33 Aid</a>, an anarchist mutual aid organisation that is centred around supporting volunteers who provide medical and educational services, had it’s <a href="http://www.fr33aid.com/1511/fr33-aid-bitcoins-stolen/">Bitcoins stolen</a> from it’s online wallet located at <a href="https://blockchain.info/">Blockchain.info</a>.</p>
<p>Approximately 23 bitcoins were taken, with a value of about 14,500 USD. No small sum. This theft occurred despite reasonable safety measures undertaken by Fr33 Aid on the Blockchain.info site. Including the use of two factor authentication. This kind of event is not new. Frequently we are given stories of bitcoins being stolen from people’s wallets. This has happened at <a href="http://www.theverge.com/2014/2/7/5386222/a-string-of-thefts-hit-coinbase-bitcoins-most-reputable-wallet-service">coinbase</a>, it happened to MtGox to the tune of $500 million dollars, which ultimately brought down the exchange, and it also happened to Fr33 Aid’s account at Blockchain.info.</p>
<p>The common theme in all of these is that the wallets were stored in online accounts. Storing ones bitcoins in an online wallet on a third party server is one of a few options that users of the cryptocurrency have. In keeping with my argument that <a href="http://c4ss.org/content/22005">Internet security is our responsibility</a> I will argue that a locally stored wallet should be the option used by those who wish to keep their bitcoins safe.</p>
<p>While there are no shortages of horror stories to be found from people who have lost bitcoins from local storage due to malware or data loss, this can be mitigated and potentially eliminated by following best practices. The issue with online third party storage is that we are required to trust that they are undertaking best practices, in cases such as MtGox, where poor practices were followed, many found out too late.</p>
<p>Probably the most secure way to protect your bitcoins from online theft is to have it <a href="https://www.schneier.com/blog/archives/2013/10/air_gaps.html" target="_blank">air gapped</a>, ie on a device that is not connected to the internet. An example could be to place your wallet on a thumb drive, and put it in a safe place. If you are using a Linux OS, taking the extra step of encrypting the thumb drive is trivial while formatting the drive. While safe, this is probably best if you are only collecting bitcoins, or if you want to use it to store the majority of your bitcoins while using a secondary wallet for frequent transactions, because while you are still able to be on the receiving end of transactions, you must physically find the thumb drive, and break the air gap before using it. There is also the issue of losing the physical media &#8211; which thumb drives appear especially prone.</p>
<p>A practical middle ground that I endorse is a multi-factor solution that uses a few simple tools to keep your wallet secure from theft and from coin loss. It’s not particularly revolutionary, and these <a href="https://bitcoin.org/en/secure-your-wallet">basic principles</a> are outlined on bitcoin.org. Here is a simple specific example of how to undertake these steps.</p>
<p>This example will be using <a href="https://bitcoin.org/en/choose-your-wallet">Bitcoin Core</a> (formerly Bitcoin-QT) as the wallet program. Though not feature rich, it is simple and secure. When downloading your wallet, always make sure to download from a trusted source. A random website serving you Bitcoin Core may have malware designed to steal your coins with it. Barring a breach of the Bitcoin foundation’s servers, you can be reasonably sure that you are getting the software you asked for from their site. If you are usi<span style="line-height: 1.5em;">ng an older version of Bitcoin-QT, it is good practice to keep your software up to date and install the latest version of Bitcoin Core.</span></p>
<p>When using Bitcoin Core, the first step to securing your wallet is to use the encryption feature in the wallet. This can be accessed from <strong>Settings &gt; Encrypt wallet.</strong></p>
<div style="text-align: center;"><img class="alignnone size-full wp-image-25713" style="line-height: 1.5em;" alt="filebackup2" src="http://c4ss.org/wp-content/uploads/2014/03/filebackup2.png" width="437" height="265" /></div>
<p>Choose a <a href="https://xkcd.com/936/" target="_blank">strong passphrase</a> that you will not forget. If you forget this passphrase, you h<span style="line-height: 1.5em;">ave effectively lost your bitcoins. This feature encrypts your private keys and prevents bitcoins being sent from your address without an authorisation with the passphrase. This means if someone gains physical access to your machine, or an air gapped physical storage, they will be able to see the contents of your wallet, including your address, but they will not be able to steal your coins without breaking the encryption &#8211; which is not trivial.</span></p>
<p>Such a simple feature protects against coin theft, though coin loss presents a far greater risk than theft. So we move on to backing up our wallet. Online storage is far more convenient than physical storage, and less prone to loss. Often these storage solutions are not secure, so when backing up a wallet, an extra level of security is not to be disregarded.</p>
<p>In order to backup your wallet using Bitcoin Core, from the menu go to <strong>File &gt; backup wallet.</strong></p>
<div style="text-align: center;"><a href="http://c4ss.org/wp-content/uploads/2014/03/filebackup.png"><img class="alignnone size-full wp-image-25712" alt="filebackup" src="http://c4ss.org/wp-content/uploads/2014/03/filebackup.png" width="434" height="280" /></a></div>
<p>Choose a save location and save. This creates a copy of your ‘wallet.dat’ which contains your private keys. An extremely secure solution to back this up is to use PGP to encrypt and email the file to yourself. This has a number of advantages, as it obscures the fact that you are even sending a wallet backup, meaning it will be less likely to be targeted by a malicious entity. You can use a keyword in the subject line of the email to make it searchable later, It will automatically time-stamp the email. This is important because right now because you will need to create a new backup if you create a new address within your wallet. If you have mulitple email accounts using PGP, you can automatically have a copy saved in each account.</p>
<p>If you have not yet, but are interested in setting up PGP with your email, you can follow <a href="http://c4ss.org/content/21728">this guide here</a>.</p>
<p>If you do not wish to set up PGP, another solution is to take your wallet.dat and encrypt it with WinRar/Rar. To encrypt a file using Rar, on most machines will involve right clicking on the file and selecting “add to archive”. From here select the <strong>Advanced</strong> tab, and then <strong>Set Password</strong>.</p>
<div style="text-align: center;"><img alt="Archive name and password" src="http://c4ss.org/wp-content/uploads/2014/03/archivebackup.png" width="544" height="879" /></div>
<p>As always, a strong passphrase is crucial. Checking the Obscure file names box will increase security by concealing the existence of the wallet backup from any potential attacker. From here you can take this encrypted compressed file and place it in some online storage such as dropbox, or email it to yourself for safe keeping.</p>
<p>Technologically there is nothing stopping cryptocurrencies from changing the world, bypassing the need for conventional banking systems and flouting government regulation of commerce. We just need some great minds to implement this, and we need people to have the confidence to adopt it.</p>
<p>Following these steps is just one way to conveniently access your wallet while at the same time keeping your Bitcoins safe from theft or loss. The future of crytocurrency is predicated on trust and confidence in the system. Over time, better integrated solutions are likely to be developed for wallet security. In the meantime keeping ourselves safe from loss and theft not only benefits us personally, but also creates better confidence in the concept of cryptocurrencies, and ensures a more robust future for these technologies.</p>
<p>Translations for this article:</p>
<ul>
<li>Portuguese, <a href="http://c4ss.org/content/26042" target="_blank">Como garantir a segurança do seu bitcoin</a>.</li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=25638&amp;md5=471c2d69d3a1c7c6e94b0191f834f305" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/25638/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F25638&amp;language=en_GB&amp;category=text&amp;title=Keeping+Your+Cryptocurrency+Safe&amp;description=Just+over+a+week+ago%2C+Fr33+Aid%2C+an+anarchist+mutual+aid+organisation+that+is+centred+around+supporting+volunteers+who+provide+medical+and+educational+services%2C+had+it%E2%80%99s+Bitcoins+stolen+from+it%E2%80%99s...&amp;tags=air+gapped%2CBitcoin%2Ccryptocurrencies%2CCryptography%2Cencryption%2Cpassphrase%2CPGP%2CPortuguese%2CStateless+Embassies%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Using PGP Encryption To Communicate Privately</title>
		<link>http://c4ss.org/content/21728</link>
		<comments>http://c4ss.org/content/21728#comments</comments>
		<pubDate>Wed, 13 Nov 2013 00:00:13 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Odds & Ends]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[technology]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=21728</guid>
		<description><![CDATA[There are many tools out there that allow you to communicate privately with varying levels of security. PGP (Pretty Good Privacy), specifically the OpenPGP standard, is a well tested and solid method of encrypting emails and messages, before transmission, to ensure that the only person who can read them is the intended recipient. I need...]]></description>
				<content:encoded><![CDATA[<p dir="ltr">There are many tools out there that allow you to communicate privately with varying levels of security. PGP (Pretty Good Privacy), specifically the OpenPGP standard, is a well tested and solid method of encrypting emails and messages, before transmission, to ensure that the only person who can read them is the intended recipient. I need not reiterate the importance of privacy, especially for activists in different regions around the world, including the USA, where domestic spying can and has been used to <a href="http://progressive.org/spying-on-ccupy-activists">attempt to thwart activist groups</a>. PGP is a reliable standard and the one used by <a href="http://www.huffingtonpost.com/2013/06/10/edward-snowden-glenn-greenwald_n_3416978.html" target="_blank">Edward Snowden in his communications with Glenn Greenwald</a>.</p>
<p>PGP relies on what is called “<a href="https://en.wikipedia.org/wiki/Public-key_cryptography" target="_blank">Public Key Cryptography</a>” to cipher and decipher messages. In times gone by, to send cryptographic messages to a recipient, an agreed upon key or method would need to be shared beforehand. This may have required meeting with the recipient in person to establish the &#8220;key&#8221; without fear of interception. If an encrypted letter was likely to be intercepted, it is just as likely that a letter detailing a secret decryption algorithm would be intercepted. This situation is clearly impractical in the current state of mass communication across the world with people you cannot easily meet in person.</p>
<p>Public Key Cryptography, or Asymmetric Key Cryptography, is a solution to this problem. First both parties wishing to engage in an encrypted conversation must generated key pairs. Each participant will generate a public and a private key using their PGP software (this only needs to be done once per person). The public key is the <a href="https://en.wikipedia.org/wiki/Cipher" target="_blank">cipher</a>. This is the key used to <a href="https://en.wikipedia.org/wiki/Encryption" target="_blank">encrypt a message</a>. The private key, which is mathematically related to the public key, is used to decipher the message. In reality, a <a href="https://en.wikipedia.org/wiki/Session_key" target="_blank">symmetric session key</a> is generated to encrypt each message. The session key itself is then encrypted with the public key and sent within the message.</p>
<p>How this works, practically,</p>
<ul>
<li><strong>Person A</strong> shares their public key with <strong>Person B</strong>.</li>
<li><strong>Person B</strong> uses this key to encrypt a message and send it back to <strong>Person A</strong>.</li>
<li><strong>Person A</strong> then uses their own private key to decrypt the message.</li>
<li><strong>Person B</strong>&#8216;s public key can be included in the return message or published publicly.</li>
</ul>
<p>The efficacy of modern cryptography relies on the fact that certain mathematical problems are extremely difficult to solve. Such problems used are <a href="http://www.claymath.org/posters/primes/">Prime factorisation</a> and <a href="http://www.linuxjournal.com/content/elliptic-curve-cryptography">elliptic curve relationship</a>; knowing this is not necessarily required to effectively use modern cryptography, but it is worth mentioning for those who may be interested.</p>
<p>A good analogy to this would be <strong>Person A</strong> sending <strong>Person B</strong> a lock-box with just a padlock, but no physical key. <strong>Person B</strong> then places a message inside the lock-box and locks it. From that point onward, <strong>Person A</strong> is the only one able to unlock the box with the key they have in their possession. Using this method, it is safe for anyone to have access one&#8217;s public key because all that it allows someone to do is encrypt messages to for that person. Only by compromising someone’s private key or failing to authenticate who you are communicating with will this secrecy and security be readily broken.</p>
<p dir="ltr">Now that there is a basic understanding of how PGP works, we will go through an easy method to implement it in email communications. Keep in mind that PGP will protect the privacy of communications, but not anonymity. An effective eavesdropper will still be able to know that you, <strong>Person A,</strong> has communicated with <strong>Person B</strong>. They will only be unaware of what is being communicated.</p>
<p>One of the easiest methods of setting up and using PGP is a browser plugin called <em>Mailvelope</em>. This is what I will be covering in the rest of the article. I suggest this because it does not require the installation of software to the PC, as it runs on the browser platform. This along with the fact that PC Email clients are in declining use is why I think <em>Mailvelope</em> is a worthy option. I will also link my public key and email at the end of the article, if you wish to practice sending and receiving encrypted email.</p>
<p dir="ltr"><em>Mailvelope</em> is currently only available for <em>Chrome.</em> It can be downloaded as an extension here: <a href="http://mailvelope.com/">http://mailvelope.com/</a></p>
<p>Once you have <em>Mailvelope</em> added to your browser, a padlock icon will appear in the top right next to the <em>Chrome</em> settings button.</p>
<div style="text-align: center;">
<p><img alt="" src="https://lh4.googleusercontent.com/S6YWne0MBqhLmYkvEWguPOCJxNq6VmGW3aee3Ft9zqojppka5dmQJkL79JXdmiBueVZxnGsE-CS3jXazWV1Xywr34fpIQYC8ReMZA01Yj5qx5evXMq8eMNmX" width="296px;" height="320px;" /></p>
</div>
<p>Left click on it and select &#8220;Options.&#8221; From here we need to generate a public/private key pair. This option will be in the left hand menu button.</p>
<div style="text-align: center;">
<p><img alt="" src="https://lh3.googleusercontent.com/RbVs7p18ZUza1dGFSUK4WX5wkYf7u83xuJd_u8z5hWjFkNqrryfkheyZ6Nqc4g3jP_AWs5A3fvvZ54-A9myKzfzVPPBbQb57B-fUhknbycd13rrMkrRkdZvp" width="624px;" height="501px;" /></p>
</div>
<p>Input your details in the fields provided. Make sure the passphrase you use is <a href="http://xkcd.com/936/" target="_blank">both long and something you can remember</a>. If you forget this passphrase, you will no longer be able to encrypt or decrypt messages using that particular key pair. In the &#8220;Advanced&gt;&gt;&#8221; section, choose a keysize longer than 1024 bit for future&#8217;s sake. Once you have filled in the forms, click &#8220;Submit.&#8221;</p>
<p>Once you have completed this, go to the &#8220;Display Keys&#8221; option in the menu. From here you can &#8220;Export&#8221; your public key. You can choose to send it to another PGP user via email or you can export it as a block of text and shared via other means. Do not give out your private key &#8211; <strong>ever.</strong> Your public key is totally public and can be safely shared far and wide or <a href="http://pgp.mit.edu/" target="_blank">published</a> anywhere without worry &#8211; as promiscuously as you like. All the public key allows someone to do is send a message to you.</p>
<div style="text-align: center;">
<p><img alt="" src="https://lh3.googleusercontent.com/10NHy50kHKvq6CGPE4nV6eZ0ocHJraDnJvkG4K7ZpokctRp0u5u8mKGdnxhP_nqru1W-TiNiBqV4CA6ycimW2IOsbDikcHZCb6GnbrQwmVzRLyucBJ13xS_N" width="591px;" height="361px;" /></p>
</div>
<p>In order to send encrypted messages to others, you must import their public key. You can do this by importing an &#8220;.asc file&#8221; with the public key or copying their public key block. When obtaining someone&#8217;s public key, make sure you have, to the best of your ability, ascertained that who you are speaking to is really who you are speaking to.</p>
<div style="text-align: center;">
<p><img alt="" src="https://lh3.googleusercontent.com/FAri_V3bTJk-pP1762oJALVqFutQZv1Rfn_dH2MlzWMOZfzt6MZ5cR1VxfBItZn90Y4FixUmcr6upGF_wy7y1ylzAannkF8lok-Cz8Vuj0rOYCJBxlAY8BJV" width="624px;" height="425px;" /></p>
<p>&nbsp;</p>
</div>
<p>Now that you have your keys set up and have imported someone else&#8217;s public key, you need to know how to send an email.</p>
<p>Open up your email client. <em>Mailvelope</em> comes configured to support Gmail, Outlook.com, Yahoo Mail and GMX. For this Demonstration I will use Gmail:</p>
<div style="text-align: center;">
<p><img alt="" src="https://lh3.googleusercontent.com/nKvMTPRvMTMZhFWIcX4W0rU467VsXtBJsCtEPkeMCCpePxwU5VQuNQZh19ZljzUuZUO1cLvk35qSDiDnFw6bUGkbXWwhUl0LuPMLR7ZozVOmWslwbSuFMLAa" width="NaN" height="NaN" /></p>
</div>
<p>Go to compose an email. You will immediately notice a new &#8220;pencil and paper button&#8221; inside the compose box. First enter the recipient and subject, then, once you get to the body of the email, click this &#8220;pencil and paper button.&#8221;</p>
<p>Compose the email in the box that opened up &#8211; this prevents clear text email from being automatically saved as draft by your email provider and potentially compromising the secrecy of your message.</p>
<div style="text-align: center;"><a href="http://c4ss.org/wp-content/uploads/2013/11/PGP1Compose.png"><img class="alignnone  wp-image-22487" alt="" src="http://c4ss.org/wp-content/uploads/2013/11/PGP1Compose.png" width="605" height="369" /></a></div>
<p>Once you have written your message, click on the &#8220;padlock button,&#8221; choose the recipient&#8217;s public key from the drop-down menu, click &#8220;Add&#8221; and &#8220;Ok.&#8221; You then press the &#8220;Transfer button&#8221; to move the encrypted text back to the compose box. <em>Note that because PGP encrypts your message with a generated session key, then encrypts the session key with the recipient&#8217;s public key, it is possible to encrypt a message for multiple recipients.</em></p>
<div style="text-align: center;"><a href="http://c4ss.org/wp-content/uploads/2013/11/PGP2addingaddress.png"><img class="alignnone  wp-image-22488" alt="" src="http://c4ss.org/wp-content/uploads/2013/11/PGP2addingaddress.png" width="604" height="370" /></a></div>
<p>An encrypted block of text will look like this:</p>
<blockquote><p>&#8212;&#8211;BEGIN PGP MESSAGE&#8212;&#8211;<br />
Version: OpenPGP.js v.1.20130820<br />
Comment: http://openpgpjs.org<br />
wcBMAxLijeXaycuCAQgAl8n4g5ilhHXKoAqawIxn/bT3i8cZ4HP6JxtCZWWM<br />
rzjX75QFffr3U6OSByqpU+DRBmhd2zG0akzkImUqrkVmQbbZv4vqEpQMMwzh<br />
heX+MuZeUCXKAWTCGfcIMbeXKjpuqbuL0F8NkHeAkqFJ8hcMY8aYX3VtaRbQ<br />
oVdL5aPzMbS5kPxjtr1OY93dwy1jV7JvrYgpyuk4wpynfS1AfKpn2lDyCQGH<br />
sTxu6yqrJUDnnYrs0TkgLvkPXueggA8+yw7zDd3iQ5P2VeMWHH7EAUa+gFj7<br />
x/M3DtHsGvfdssiPP35PZrglHCsJGCTZScO+Re1M2IxZtnZNHfDU0V9lhX4i<br />
Q9JQAQlHtm8etEXlyvovsXDfIE2SdKgcj1bgx359V+zZsvPNyOtqfYEuyszM<br />
7i65cEqz9GdLGFusSYSFpespUCHC71zFmaHEGcmUpglLIvvX2W4=<br />
=g9Kk<br />
&#8212;&#8211;END PGP MESSAGE&#8212;&#8211;</p></blockquote>
<p>You can now send your message knowing that if intercepted, it will be unreadable.</p>
<p>When you receive an encrypted email, <em>Mailvelope</em> will detect this and overlay a &#8220;padlock and envelope symbol&#8221; over it. Clicking on this &#8220;padlock and envelope symbol&#8221; will prompt you to enter your passkey. Entering this will display the message in clear text for you to read.</p>
<div style="text-align: center;">
<p><img alt="" src="https://lh6.googleusercontent.com/cJ-ES7S7y5kkeKuxyc304hu2XYSwgmuOxJnY3MuLgBeEm_sKUUKdscKtKEd-WEsUHLRpX5qi8bsEtqMS3oy5CM1hbXbnfBDHi3IZvodApMuLlw0izsya8SU-" width="NaN" height="NaN" /></p>
</div>
<p>Now you should be fully capable of using PGP to encrypt and decrypt emails to and from your contacts.</p>
<p>If you wish to test <em>Mailvelope</em> out and don&#8217;t yet know anyone else with PGP set up, I have set up an email account to receive encrypted messages. The Email is: <a href="mailto:williamsheppard101@gmail.com">williamsheppard101@gmail.com</a></p>
<p>My public key can be found on the MIT server: <a href="http://pgp.mit.edu:11371/pks/lookup?op=get&amp;search=0x12E28DE5DAC9CB82">http://pgp.mit.edu:11371/pks/lookup?op=get&amp;search=0x12E28DE5DAC9CB82</a></p>
<p>I will respond to all encrypted emails I receive. <strong>Ensure you include your public key in the email.</strong></p>
<p>Below are a number of other tools that are worth noting, if <em>Mailvelope</em> does not suit your specific habits or setup.</p>
<p><strong>EnigMail for Thunderbird mail client</strong><br />
<a href="https://www.enigmail.net/home/index.php">https://www.enigmail.net/home/index.php</a><br />
A very clean and versatile addon for those who still use local mail clients, once it is set up it is arguably easier to use than mailvelope.</p>
<p><strong>PGP4win</strong><br />
<a href="http://www.gpg4win.org/download.html">http://www.PGP4win.org/download.html</a><br />
Comes with a number of utilities, including the certificate manager Kleopatra, which allows you to import and export encrypted messages, allowing you to copy send encrypted messages over other platforms.</p>
<p><strong>GNU Privacy Guard</strong><br />
<a href="http://www.gnupg.org/download/index.en.html">http://www.gnupg.org/download/index.en.html</a><br />
For Linux users, GPG can be downloaded from the distro&#8217;s repository, or a source package can be downloaded from the website.</p>
<p><strong>GPG Tools</strong><br />
<a href="https://gpgtools.org/">https://gpgtools.org/</a><br />
A PGP suite for Mac users.</p>
<p>Translations for this article:</p>
<ul>
<li>Portuguese, <a href="http://c4ss.org/content/26104" target="_blank">Como usar criptografia PGP para comunicação privada</a>.</li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=21728&amp;md5=b1a01985f7e9c6b08f8485a75eb73e4e" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/21728/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F21728&amp;language=en_GB&amp;category=text&amp;title=Using+PGP+Encryption+To+Communicate+Privately&amp;description=There+are+many+tools+out+there+that+allow+you+to+communicate+privately+with+varying+levels+of+security.+PGP+%28Pretty+Good+Privacy%29%2C+specifically+the+OpenPGP+standard%2C+is+a+well+tested+and...&amp;tags=activism%2Cencryption%2CPGP%2CPortuguese%2CStateless+Embassies%2Ctechnology%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Segurança Na Internet É Responsabilidade Nossa</title>
		<link>http://c4ss.org/content/22502</link>
		<comments>http://c4ss.org/content/22502#comments</comments>
		<pubDate>Tue, 12 Nov 2013 21:00:58 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hacktivism]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Tor]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=22502</guid>
		<description><![CDATA[À medida que ficamos sabendo de cada vez mais detalhes acerca da espionagem do governo, parece cada vez mais temerário confiar nossa segurança a terceiros empresariais. O estado requer que a informação acerca de seus súditos seja útil para os resultados desejados. Desde o primeiro censo no Egito, há mais de 5.000 anos, os estados...]]></description>
				<content:encoded><![CDATA[<p>À medida que ficamos sabendo de cada vez mais detalhes acerca da espionagem do governo, parece cada vez mais temerário confiar nossa segurança a terceiros empresariais.</p>
<p>O estado requer que a informação acerca de seus súditos seja útil para os resultados desejados. Desde o primeiro censo no Egito, há mais de 5.000 anos, os estados buscaram informação pessoal acerca de seus cidadãos, especialmente em estados tirânicos, onde informantes e polícia secreta coletam informação acerca de qualquer e toda atividade potencialmente subversiva. Na era da Internet e do estado espreitador, agências de espionagem coletam informações acerca de nós que fariam a NKVD de Stalin morrer de inveja — muito dela ingenuamente entregue <a href="http://www.al-monitor.com/pulse/originals/2013/08/hamas-facebook-social-media-activists.html" target="_blank">via mídia social</a>. Quando o estado espreitador será extinto depende do palpite de cada um mas, enquanto isso, quanto menos úteis forem os dados coletados a nosso respeito, menos eficaz será o controle do estado sobre nós. Para ativistas, o uso de comunicação privada ou anônima em países do primeiro mundo poderá ser a chave para evitar <a href="http://www.theguardian.com/uk/2011/apr/29/royal-wedding-police-criticised-protesters" target="_blank">prisão preventiva</a>. Em lugares como Síria, torna-se <a href="http://www.bloomberg.com/news/2011-11-03/syria-crackdown-gets-italy-firm-s-aid-with-u-s-europe-spy-gear.html" target="_blank">questão de vida e morte</a>.</p>
<p>Inicialmente eu tive a esperança de que empresas como a Google acorreriam em socorro, por meio da implementação de poderosos sistemas de criptografia; infelizmente parece cada vez mais improvável que corporações comprometidas com acionistas e envolvidas com o governo possam criar, eficazmente, serviços da espécie. Embora essas grandes empresas, com seus alentados lucros e seus orçamentos para lobby, estejam provavelmente na melhor posição para revidar ao estado espreitador, são também as que mais têm a perder se não cooperarem ou fingirem cooperar.</p>
<p>A Lavabit, de Ladar Levison, <em>era</em> serviço de email <a href="http://steve.grc.com/2013/08/08/the-lesson-of-lavabit/" target="_blank">semisseguro</a>. Em agosto, Levison fechou a Lavabit <a href="http://s23.postimg.org/sxz8qgtsr/lavabit_100049551_orig.png" target="_blank">citando ameaças e interferência do governo</a>. Observadores especularam que Levison havia recebido uma Carta de Segurança Nacional exigindo dados de cliente, provavelmente do denunciante da Agência de Segurança Nacional &#8211; NSA Edward Snowden. Recentemente deslacrado documento de tribunal mostra ter sido expedido mandado para obtenção da chave do protocolo de segurança SSL do serviço Lavabit. Tal chave permite conexão segura criptografada entre usuário e servidor. Ter acesso a essa chave daria ao governo acesso em tempo real a informações enviadas ao site pelos usuários. Isso, por sua vez, permitiria ao governo coletar credenciais de login e ter acesso a emails criptografados dos 400.000 clientes da Lavabit.</p>
<p>Muito louvavelmente, Ladar Levison resolveu fechar a Lavabit — negando acesso às comunicações privadamente armazenadas dos clientes da empresa. Esse tipo de postura baseada em princípios éticos não é a regra. Levison não tinha acionistas aos quais prestar contas. Ele respondia a si próprio e a seus clientes. Não podemos esperar que grandes corporações tecnológicas como a Google, que projeta imagem pública de estar do nosso lado e em verdade tenta <a href="http://www.google.com/transparencyreport/userdatarequests/countries/">dar divulgação ao intrometimento do governo</a>, efetivamente enfrente o governo quando compelidas por lei. Outras empresas, como a Microsoft, parecem <a href="http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">entusiasmadas com colaborar com a NSA</a> e outros órgãos governamentais de espionagem.</p>
<p>Ora bem, o que significa tudo isso para nós? Está tudo contra nós? Não! Temos que tomar o problema em nossas próprias mãos. Há uma multidão de projetos livres e de fonte aberta e padrões abertos para criptografia. Do que entendemos, a NSA tem quebrado criptografia por meio de <a href="http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/">coerção</a> e <a href="http://www.theverge.com/2013/9/20/4751364/rsa-tells-developers-to-stop-using-encryption-with-suspected-nsa-backdoor">subversão</a>, não por meio de tentativas de atacar cruamente os números e decifrar os códigos. Muito provavelmente, <a href="https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html">ainda podemos confiar na matemática</a>.</p>
<p>Quando um projeto é de fonte aberta, seu código fica aberto para escrutínio. Ele pode ser examinado pormenorizadamente e podemos saber exatamente como faz o que faz. Embora a maioria de nós não tenha conhecimento técnico para examinar o código de programa específico para esquadrinhá-lo antes de compilá-lo, pesquisadores e acadêmicos fidedignos <a href="https://www.eff.org/press/archives/2008/02/21-0">podem fazê-lo e esquadrinhá-los para nós</a>. Portanto, podemos estar cientes de vulnerabilidades em potencial do software de criptografia e saber os limites de suas aptidões. Quando nos comunicamos usando PGP, por exemplo, estamos usando padrão aberto. Não precisamos confiar nossa comunicação a uma empresa que poderá ter sido coagida pelo governo a comprometer nossa privacidade. Com PGP, estamos de posse de nossa<em>chave privada</em> e ninguém outro poderá ser forçado a entregá-la. <a title="Tor: The Onion Router" href="http://c4ss.org/content/19091" target="_blank">O projeto Tor</a>, por causa de sua complexidade, não é tão claro. Por causa de sua natureza distribuída, há mais oportunidades de vulnerabilidade, mas o projeto é de fonte aberta e suas fraquezas em termos de exploração que dele tire proveito estão documentadas e, portanto, temos como entender seus limites.</p>
<p>As conclusões a que temos de chegar são no sentido de que estamos nisso juntos. Se resolvermos usar serviço de empresa que afirme ser tal serviço seguro, teremos de estar cientes de que o serviço poderá ser comprometido a qualquer momento — não por meio de força bruta, mas mediante força coercitiva. Com software de criptografia de fonte fechada não há como avaliar ou confiar nas afirmações do desenvolvedor. Quando usamos software de criptografia de fonte aberta, podemos tornar-nos conhecedores de suas limitações e usá-lo acordemente.</p>
<p>Segurança na Internet é responsabilidade nossa.</p>
<p>Artigo original afixado por <a title="Posts by William Sheppard" href="http://c4ss.org/content/22005" target="_blank">William Sheppard</a><a href="http://c4ss.org/content/22267" target="_blank"> em 26 de outubro de 2013</a>.</p>
<p>Traduzido do inglês por <a href="http://zqxjkv0.blogspot.com.br/2013/11/c4ss-internet-security-is-our.html" target="_blank">Murilo Otávio Rodrigues Paes Leme</a>.</p>
<p>&nbsp;</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=22502&amp;md5=db1731b3190291346dc687c644538b70" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/22502/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F22502&amp;language=en_GB&amp;category=text&amp;title=Seguran%C3%A7a+Na+Internet+%C3%89+Responsabilidade+Nossa&amp;description=%C3%80+medida+que+ficamos+sabendo+de+cada+vez+mais+detalhes+acerca+da+espionagem+do+governo%2C+parece+cada+vez+mais+temer%C3%A1rio+confiar+nossa+seguran%C3%A7a+a+terceiros+empresariais.+O+estado+requer+que...&amp;tags=activism%2Cencryption%2Chacktivism%2CNSA%2CPGP%2CPortuguese%2CStateless+Embassies%2Csurveillance%2CTor%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Internet Security Is Our Responsibility</title>
		<link>http://c4ss.org/content/22005</link>
		<comments>http://c4ss.org/content/22005#comments</comments>
		<pubDate>Sat, 26 Oct 2013 18:00:13 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hactivism]]></category>
		<category><![CDATA[Italian]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[Portuguese]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Tor]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=22005</guid>
		<description><![CDATA[As we learn more and more details regarding government spying, it seems more and more foolhardy to trust our security to third party businesses. The state requires information on its subjects to be effective. From the first census in Egypt more than 5000 years ago, states have sought personal information on their citizens, especially in...]]></description>
				<content:encoded><![CDATA[<p lang="zxx">As we learn more and more details regarding government spying, it seems more and more foolhardy to trust our security to third party businesses.</p>
<p lang="zxx">The state requires information on its subjects to be effective. From the first census in Egypt more than 5000 years ago, states have sought personal information on their citizens, especially in tyrannical states, where informants and secret police gather information on any and all potentially subversive activities. In the age of the Internet and the surveillance state, spy agencies collect information on us that would make Stalin&#8217;s NKVD green with envy &#8212; much of it naively handed over <a href="http://www.al-monitor.com/pulse/originals/2013/08/hamas-facebook-social-media-activists.html" target="_blank">via social media</a>. When the surveillance state will be dismantled is anyone&#8217;s guess, but, in the meantime, the less useful data that can be collected on us the less effective the state&#8217;s control of us. For activists, use of private or anonymous communication in first world countries could be key to avoiding <a href="http://www.theguardian.com/uk/2011/apr/29/royal-wedding-police-criticised-protesters" target="_blank">pre-emptive arrest</a>, In places like Syria, it becomes a <a href="http://www.bloomberg.com/news/2011-11-03/syria-crackdown-gets-italy-firm-s-aid-with-u-s-europe-spy-gear.html" target="_blank">matter of life and death</a>.</p>
<p lang="zxx">Initially, I had hoped companies like Google would come to the rescue by implementing powerful encryption systems; unfortunately it seems less and less likely that corporations beholden to shareholders and intertwined with government can effectively and securely create these services. While these big companies with their large profits and lobbying budgets are probably in the best position to fight back against the surveillance state, they  also have the most to lose if they don&#8217;t play along.</p>
<p lang="zxx">Ladar Levison&#8217;s Lavabit <em>was a</em> <a href="http://steve.grc.com/2013/08/08/the-lesson-of-lavabit/" target="_blank">semi-secure</a> email service. In August, Levison shut down Lavabit <a href="http://s23.postimg.org/sxz8qgtsr/lavabit_100049551_orig.png" target="_blank">citing government threats and interference</a>. Observers speculated that Levison had received a National Security Letter demanding customer data, likely that of NSA whistleblower Edward Snowden. Recently unsealed court document show that a warrant was issued for the private SSL key for the Lavabit service. This key allows a secure encrypted connection between user and server. Having access to this key would give the government real time access to information being sent by users to the site. This in turn would allow them to scoop up log-in credentials and access the encrypted emails of any of Lavabit&#8217;s 400,000 customers.</p>
<p lang="zxx">Much to his credit, Ladar Levison decided to shut down Lavabit &#8212; denying access to the privately stored communications of its customers. This sort of principled stance is unexpected. Levison didn&#8217;t have shareholders to answer to. He answered to himself and his customers. We cannot expect large tech corporations like Google, who put forth the public image of being on our side and actually attempt to <a href="http://www.google.com/transparencyreport/userdatarequests/countries/">publicize government intrusion</a>, to actually defy the government when compelled by law. Other players, such as Microsoft, appear to be <a href="http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">enthusiastic in their collaboration with the NSA</a> and other 3 letter agencies.</p>
<p lang="zxx">So what does this all mean for us? Is it all doom and gloom? No! We have to take this into our own hands. There are a multitude of free and open source projects and open standards for encryption. From what we understand, the NSA has broken encryption through <a href="http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/">coercion</a> and <a href="http://www.theverge.com/2013/9/20/4751364/rsa-tells-developers-to-stop-using-encryption-with-suspected-nsa-backdoor">subversion</a>, not by raw attempts at bashing away at the numbers and cracking the codes. Most likely, <a href="https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html">we can still trust the mathematics</a>.</p>
<p lang="zxx">When a project is open source its code is open to scrutiny. It can be vetted and we can know exactly how it does what it does. While the majority of us do not have the technical know-how to look through the code of a specific program to vet it before compiling it,  trusted researchers and academics <a href="https://www.eff.org/press/archives/2008/02/21-0">can and do vet these for us</a>. Thus we can be aware of potential vulnerabilities of encryption software and know the limits of its capabilities. When we communicate with PGP, for example, we are using an open standard. We do not need to trust our communications to a company that may have been coerced by government to compromise our privacy. With PGP, you are  in possession of your <em>private key</em> and no one else can be made to hand it over. <a title="Tor: The Onion Router" href="http://c4ss.org/content/19091" target="_blank">The Tor project</a>, due to its complexity, is not so clear cut. Because of its distributed nature, there are more opportunities for exploitation, but the project is open source and these potential exploits are documented so we are able to understand its limits.</p>
<p lang="zxx">The conclusions we must draw is that we are in this together. If we decide to use corporate service that claim to be secure, we must be aware that they could be compromised at any time &#8212; not through brute force, but coercive force. With closed source encryption software, there is no way to evaluate or trust the developer&#8217;s claims. When we use open source encryption software we must make ourselves aware of its limitations and use it accordingly.</p>
<p lang="zxx">Internet security is our responsibility.</p>
<p>Translations for this article:</p>
<ul>
<li>Portuguese, <a href="http://c4ss.org/content/22502" target="_blank">Segurança Na Internet É Responsabilidade Nossa</a>.</li>
<li>Italian, <a href="http://c4ss.org/content/26406" target="_blank">La Sicurezza su Internet È Responsabilità Nostra</a>.</li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=22005&amp;md5=3bf3b15a706a898a9aa2a25cec4269f8" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/22005/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F22005&amp;language=en_GB&amp;category=text&amp;title=Internet+Security+Is+Our+Responsibility&amp;description=As+we+learn+more+and+more+details+regarding+government+spying%2C+it+seems+more+and+more+foolhardy+to+trust+our+security+to+third+party+businesses.+The+state+requires+information+on+its...&amp;tags=activism%2Cencryption%2Chactivism%2CItalian%2CNSA%2CPGP%2CPortuguese%2CStateless+Embassies%2Csurveillance%2CTor%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Tor: The Onion Router</title>
		<link>http://c4ss.org/content/19091</link>
		<comments>http://c4ss.org/content/19091#comments</comments>
		<pubDate>Tue, 21 May 2013 18:05:12 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Odds & Ends]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[internet freedom]]></category>
		<category><![CDATA[liberty]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=19091</guid>
		<description><![CDATA[What is Tor? How does it work? And why should you use it? With the ever expanding surveillance systems being employed in the United States and around the world, the ability to use the internet anonymously is becoming increasingly important, especially for activists, or anyone who is not okay with your Search Engine provider, ISP...]]></description>
				<content:encoded><![CDATA[<p><strong>What is Tor? How does it work? And why should you use it?</strong></p>
<p>With the ever expanding surveillance systems being employed in the United States and around the world, the ability to use the internet anonymously is becoming increasingly important, especially for activists, or anyone who is not okay with your Search Engine provider, ISP (Internet Service Provider) and your government knowing everything about your internet use. Here, I will go into brief detail about the technical aspects of Tor, give reasons why you should use Tor and finally guide you through the installation of the Tor browser and how to contribute to the network by setting up a relay.</p>
<p><strong>What is Tor?</strong></p>
<p>Tor, formally an acronym for &#8220;<a href="https://www.torproject.org/index.html.en" target="_blank">The Onion Router</a>&#8220;, is a distributed proxy network designed to provide anonymity on the web. Much like a <a href="https://ssd.eff.org/tech/vpn" target="_blank">VPN</a> (Virtual Private Networks). Tor encrypts your traffic and bounces it through a number of relays before arriving at it&#8217;s destination. Preventing third parties from being able to see what you are sending through the network, and where your traffic initially came from. Tor can also be used for servers, to anonymize the physical location of websites, and those who visit them.</p>
<p><strong>How does it work?</strong></p>
<p>There are a number of very in depth resources that explain in a lot of detail how the network works, this is not that. This is a brief guide to introduce you to the concept of onion routing, and if you wish to learn further, there will be a number of links included.</p>
<p>When you attempt to contact a website using the Tor Browser, the Tor client randomly selects 3 nodes from the network. The client then encrypts a message to be sent to the final recipient (e.g a website you want to visit). The encrypted message is sent to the first node, the first node then peels off an initial layer of encryption, revealing where to send the message to the second node, this process is repeated until it reaches the third and final node, also known as the &#8220;exit relay&#8221;, where the message is unencrypted and sent to the final recipient. The effect of this is to obscure your <a href="http://news.cnet.com/8301-13554_3-10042206-33.html" target="_blank">IP address</a> from the destination server by providing multiple barriers between you and the server. Keep in mind however, personal information that you choose to give to a website, such as in a sign up form, is treated like any other data by the website, it can be looked at by an administrator, or subpoenaed by Law Enforcement, Tor works most effectively if you keep your information private as well as anonymous.</p>
<p><strong>Why should you use it?</strong></p>
<p>Increasingly, governments around the world have become preoccupied with what is known as <a href="http://www.cato.org/publications/commentary/beware-total-information-awareness" target="_blank">Total Information Awareness</a>, the ability to track every piece of digital information that we create: financial transactions, instant messages, email, web history, etc. This information can be used to intimidate, <a href="http://www.democracynow.org/2012/4/20/we_do_not_live_in_a" target="_blank">harass</a>, or even <a href="http://www.sfgate.com/politics/article/Lawmakers-blast-Yahoo-executives-for-helping-3301322.php" target="_blank">jail dissidents</a>, journalists and those who may pose some form of nuisance to the government. Many nations have <a href="http://www.techspot.com/news/47410-iran-blocks-websites-in-anticipation-of-green-revolution-anniversary.html" target="_blank">strong controls</a> on what people can search for and view on the internet. Tor allows for the <a href="http://news.cnet.com/8301-13578_3-57375166-38/tor-anonymity-project-looks-to-help-iranians-sidestep-net-ban/" target="_blank">bypassing of these filters</a>, and has been especially useful in Iran, a nation which enjoys extremely high usage of the Tor network.</p>
<p>In the short term, there is little we can do to stop this encroaching surveillance state. But we are able to protect ourselves and others by obscuring as much data as possible. Tor is one such solution. The more people who use Tor, among other things, to browse the web, when they feel it necessary, the less useful our data will be to the government. The more of us who run relays for the Tor network, the faster the system will function for those who need to use it.</p>
<p><strong>Setup</strong></p>
<p>In recent times, attention has been paid to making the use of Tor extremely easy for the less technically proficient, with minimal setup required. The Tor browser bundle can be downloaded from here:</p>
<ul>
<li><a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a></li>
</ul>
<p>This will install the components needed to use the Tor network, including a modified version of <em><a href="http://www.mozilla.org/en-US/firefox/new/" target="_blank">Firefox</a></em> specifically configured for Tor and <a href="https://www.torproject.org/projects/vidalia.html.en" target="_blank">Vidalia</a>, a graphical front-end that will allow you to configure your Tor settings, including setting up a relay to contribute to the network.</p>
<p>If you do not feel the need to use the Tor browser on your system, but wish to set up a Tor relay, the package can be downloaded by following <a href="https://www.torproject.org/download/download.html.en" target="_blank">this link</a>, choosing your operating system, then choosing the Tor Relay Bundle. This will be especially useful on desktop computers, or dedicated computers that run constantly. While a temporary relay does not harm the network, a permanent one is much more useful. When you run a relay from your system, you will be making the Tor network larger and faster. By adding a node, you make the network more distributed, providing for more robust anonymity. You are also spreading the traffic load, increasing the speed of the network.</p>
<p>The Tor Relay bundle can be downloaded from here:</p>
<ul>
<li><a href="https://www.torproject.org/download/download.html.en" target="_blank">https://www.torproject.org/download/download.html.en</a> &#8211; Choose your operating system, then &#8220;Tor Relay Bundle&#8221;.</li>
</ul>
<p>Setting up the browser is simple, just download the file, extract it to the folder of your choice, then click the &#8220;Start Tor Browser&#8221; in the folder. Vidalia should start to run, and once it is connected to the network, the browser will open and will notify you if you are successfully running Tor.</p>
<p>If you wish to run a relay along with the browser, go to &#8220;set up relay&#8221; in Vidalia and check &#8220;relay traffic inside the Tor network (non exit relay)&#8221;, set how much bandwidth you wish to donate and you are good to go.</p>
<p>If you have installed the relay bundle, the relaying option should be set up automatically, and Vidalia will attempt to run whenever you boot your computer. You may wish to run as an exit relay, <strong>but do so at your own risk.</strong> If you run as an exit relay, your IP will be what the destination websites see when someone uses your relay, the traffic runs unencrypted from your connection to the destination, and if someone is using Tor for less than savory purposes; spamming, Wikipedia vandalism, child pornography, etc. You run the risk of having your IP banned from many websites due to actions of others, have your computer seized or even be <a href="http://www.zdnet.com/austrian-man-raided-for-operating-tor-exit-node-7000008133/" target="_blank">arrested by law enforcement</a>. If you wish to run an exit node, please follow <a href="https://blog.torproject.org/running-exit-node" target="_blank">this guide from the Tor Project</a> to mitigate the risks involved. I must emphasize however, these are not issues if you run a relay inside the network, as all traffic you send and receive will be encrypted.</p>
<p>I hope this guide has been useful and convinced those not already using Tor to give it a try. If you do set up a relay, please let us know in the comments section.</p>
<p>There are further resources available for a more in depth look at:</p>
<ul>
<li><a href="https://www.torproject.org/docs/faq.html.en" target="_blank">https://www.torproject.org/docs/faq.html.en</a></li>
<li><a href="https://www.torproject.org/dist/manual/short-user-manual_en.xhtml">https://www.torproject.org/dist/manual/short-user-manual_en.xhtml</a></li>
<li><a href="https://trac.torproject.org/projects/tor/wiki">https://trac.torproject.org/projects/tor/wiki</a></li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=19091&amp;md5=89ebad24b8853cba547768034859b416" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/19091/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F19091&amp;language=en_GB&amp;category=text&amp;title=Tor%3A+The+Onion+Router&amp;description=What+is+Tor%3F+How+does+it+work%3F+And+why+should+you+use+it%3F+With+the+ever+expanding+surveillance+systems+being+employed+in+the+United+States+and+around+the+world%2C+the...&amp;tags=activism%2Cencryption%2Cgovernment%2Cinternet%2Cinternet+freedom%2Cliberty%2Cprivacy%2Csurveillance%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Bitcoin: Roller Coaster of Love</title>
		<link>http://c4ss.org/content/18277</link>
		<comments>http://c4ss.org/content/18277#comments</comments>
		<pubDate>Sat, 13 Apr 2013 23:00:52 +0000</pubDate>
		<dc:creator><![CDATA[Thomas L. Knapp]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[cryptocurrencies]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[market anarchism]]></category>
		<category><![CDATA[money]]></category>
		<category><![CDATA[monopoly]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[united states]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=18277</guid>
		<description><![CDATA[Knapp: Is Bitcoin the end of political government? No, but it's part of the beginning of the end of political government.]]></description>
				<content:encoded><![CDATA[<p>It&#8217;s up, it&#8217;s <a href="http://www.nostate.com/4275/bitcoin-exchange-rate-drops-50-mtgox-fail-and-more/" target="_blank">down</a>. It&#8217;s the future of commerce one day, just another Internet bubble the next. It&#8217;s the end of government-controlled currency and banking &#8230; but wait, the US government&#8217;s Financial Crimes Enforcement Network <a href="http://www.fincen.gov/statutes_regs/guidance/pdf/FIN-2013-G001.pdf" target="_blank">has something to say about that</a>. It&#8217;s <strong>Bitcoin</strong>, and you&#8217;ve almost certainly been hearing about it, even if you&#8217;ve never used it.</p>
<p>As an anarchist, I&#8217;m a big fan of competing currencies, especially competing <em>freed-market</em> currencies not issued by, or subject to direct manipulation by, states. The reasons for that should be obvious: If government can&#8217;t supervise and control the flow of money, it gets a lot harder for it to steal (&#8220;tax&#8221;) part of that money and spend it on killing and enslaving people. So Bitcoin made quite an impression on me, and I&#8217;m still sold on it.</p>
<p>One issue I&#8217;ve come around on is the absence of commodity backing. In the past, I&#8217;ve been of the opinion that to be sound a currency should actually represent a pile of some scarce, homogeneous material (e.g. gold) that&#8217;s valuable for other purposes in addition to constituting a convenient medium of exchange.</p>
<p>The problem with commodity currencies, though, is that those piles of material have to be physically stored. They&#8217;re vulnerable to roving gangs of thieves, including but not limited to government &#8220;law enforcement&#8221; agencies. More than one commodities-based currency has been shut down, or at least yanked into government regulatory schemes, by the scruff of its neck.</p>
<p>Bitcoin is just bits of data; it&#8217;s created by the process of crunching the numbers involved in exchanging it. That drives commodities-based currency aficionados nuts: No pile of gold in a vault. But it also represents a kind of security: No number of jack-booted thugs can break into the vault and take the stuff backing the currency, because there IS no stuff backing the currency. And because the generation and exchange of Bitcoin is distributed and peer-to-peer, governments would pretty much have to shut down the Internet to put a stop to Bitcoin commerce.</p>
<p>Said commerce, however, is not completely immune to government intrusion.</p>
<p>Internet services that facilitate the storage and use of Bitcoin may be vulnerable (and indeed some are trying to &#8220;<a href="https://support.mtgox.com/entries/20490576-Withdrawals-and-Deposits" target="_blank">go legit</a>,&#8221; or else <a href="http://blog.btcbuy.info/2013/04/services-will-be-suspended-today.html" target="_blank">shutting down</a> in the face of government threats).</p>
<p>Contrary to popular belief, Bitcoin is not inherently anonymous. In fact, every last Bitcoin transaction is transparent and publicly viewable. You can use Bitcoin anonymously, but it takes a little work: Don&#8217;t keep your wallet at one of those vulnerable services, generate new addresses for each transaction, anonymize your IP address or work from public Wi-Fi connections, etc. And help is on the way: The good guys are <a href="http://www.forbes.com/sites/andygreenberg/2013/04/12/zerocoin-add-on-for-bitcoin-could-make-it-truly-anonymous-and-untraceable/" target="_blank">working</a> on ways to make Bitcoin commerce more private and secure.</p>
<p>So, why the &#8220;boom and bust?&#8221; The main reason is that Bitcoin&#8217;s user base is still fairly small: &#8220;Buy low, sell high&#8221; traders constitute a large portion of that base and thus have a big effect on price when they decide to take profits, or panic, or sit on their stacks. There are &#8220;forex&#8221; markets in all currencies, of course and the relative values of those currencies fluctuate, but not as much, because for every day trader bouncing back and forth between dollars and euros and yen, there are hundreds or thousands of people using dollars, euros and yen <em>as money</em> to buy cars, concert tickets and bags of potato chips with. As Bitcoin&#8217;s user base grows, and as the proportion of people using it as a medium of exchange grows versus those treating it as an &#8220;investment&#8221; to grab low and dump high, its valuation will probably stabilize quite a bit.</p>
<p>Is Bitcoin the end of political government? No, but it&#8217;s part of the beginning of the end of political government. Hang on. It&#8217;s going to be a heck of a ride.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=18277&amp;md5=a377c8da935077aa4a28893207e10245" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/18277/feed</wfw:commentRss>
		<slash:comments>5</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F18277&amp;language=en_GB&amp;category=text&amp;title=Bitcoin%3A+Roller+Coaster+of+Love&amp;description=It%26%238217%3Bs+up%2C+it%26%238217%3Bs+down.+It%26%238217%3Bs+the+future+of+commerce+one+day%2C+just+another+Internet+bubble+the+next.+It%26%238217%3Bs+the+end+of+government-controlled+currency+and+banking+%26%238230%3B+but+wait%2C+the+US...&amp;tags=Bitcoin%2Ccryptocurrencies%2Cencryption%2Cmarket+anarchism%2Cmoney%2Cmonopoly%2Cpolitics%2Cstate%2Cunited+states%2Cblog" type="text/html" />
	</item>
	</channel>
</rss>
