person:micah lee

    • lien propre:

      Glen Greenwald, Micah Lee - 20190412

      https://theintercept.com/2019/04/11/the-u-s-governments-indictment-of-julian-assange-poses-grave-threats-t

      In April, 2017, Pompeo, while still CIA chief, delivered a deranged speech proclaiming that “we have to recognize that we can no longer allow Assange and his colleagues the latitude to use free speech values against us.” He punctuated his speech with this threat: “To give them the space to crush us with misappropriated secrets is a perversion of what our great Constitution stands for. It ends now.”

      From the start, the Trump DOJ has made no secret of its desire to criminalize journalism generally. Early in the Trump administration, Sessions explicitly discussed the possibility of prosecuting journalists for publishing classified information. Trump and his key aides were open about how eager they were to build on, and escalate, the Obama administration’s progress in enabling journalism in the U.S. to be criminalized.

      Today’s arrest of Assange is clearly the culmination of a two-year effort by the U.S. government to coerce Ecuador — under its new and submissive president, Lenín Moreno — to withdraw the asylum protection it extended to Assange in 2012. Rescinding Assange’s asylum would enable the U.K. to arrest Assange on minor bail-jumping charges pending in London and, far more significantly, to rely on an extradition request from the U.S. government to send him to a country to which he has no connection (the U.S.) to stand trial relating to leaked documents.

      Indeed, the Trump administration’s motive here is clear. With Ecuador withdrawing its asylum protection and subserviently allowing the U.K. to enter its own embassy to arrest Assange, Assange faced no charges other than a minor bail-jumping charge in the U.K. (Sweden closed its sexual assault investigation not because they concluded Assange was innocent, but because they spent years unsuccessfully trying to extradite him). By indicting Assange and demanding his extradition, it ensures that Assange — once he serves his time in a London jail for bail-jumping — will be kept in a British prison for the full year or longer that it takes for the U.S. extradition request, which Assange will certainly contest, to wind its way through the British courts.

      The indictment tries to cast itself as charging Assange not with journalistic activities but with criminal hacking. But it is a thinly disguised pretext for prosecuting Assange for publishing the U.S. government’s secret documents while pretending to make it about something else.

      Whatever else is true about the indictment, substantial parts of the document explicitly characterize as criminal exactly the actions that journalists routinely engage in with their sources and thus, constitutes a dangerous attempt to criminalize investigative journalism.

      The indictment, for instance, places great emphasis on Assange’s alleged encouragement that Manning — after she already turned over hundreds of thousands of classified documents — try to get more documents for WikiLeaks to publish. The indictment claims that “discussions also reflect Assange actively encouraging Manning to provide more information. During an exchange, Manning told Assange that ‘after this upload, that’s all I really have got left.’ To which Assange replied, ‘curious eyes never run dry in my experience.’”

      But encouraging sources to obtain more information is something journalists do routinely. Indeed, it would be a breach of one’s journalistic duties not to ask vital sources with access to classified information if they could provide even more information so as to allow more complete reporting. If a source comes to a journalist with information, it is entirely common and expected that the journalist would reply: Can you also get me X, Y, and Z to complete the story or to make it better? As Edward Snowden said this morning, “Bob Woodward stated publicly he would have advised me to remain in place and act as a mole.”

      Investigative journalism in many, if not most, cases, entails a constant back and forth between journalist and source in which the journalist tries to induce the source to provide more classified information, even if doing so is illegal. To include such “encouragement” as part of a criminal indictment — as the Trump DOJ did today — is to criminalize the crux of investigative journalism itself, even if the indictment includes other activities you believe fall outside the scope of journalism.

      As Northwestern journalism professor Dan Kennedy explained in The Guardian in 2010 when denouncing as a press freedom threat the Obama DOJ’s attempts to indict Assange based on the theory that he did more than passively receive and publish documents — i.e., that he actively “colluded” with Manning:


      The problem is that there is no meaningful distinction to be made. How did the Guardian, equally, not “collude” with WikiLeaks in obtaining the cables? How did the New York Times not “collude” with the Guardian when the Guardian gave the Times a copy following Assange’s decision to cut the Times out of the latest document dump?

      For that matter, I don’t see how any news organisation can be said not to have colluded with a source when it receives leaked documents. Didn’t the Times collude with Daniel Ellsberg when it received the Pentagon Papers from him? Yes, there are differences. Ellsberg had finished making copies long before he began working with the Times, whereas Assange may have goaded Manning. But does that really matter?

      Most of the reports about the Assange indictment today have falsely suggested that the Trump DOJ discovered some sort of new evidence that proved Assange tried to help Manning hack through a password in order to use a different username to download documents. Aside from the fact that those attempts failed, none of this is new: As the last five paragraphs of this 2011 Politico story demonstrate, that Assange talked to Manning about ways to use a different username so as to avoid detection was part of Manning’s trial and was long known to the Obama DOJ when they decided not to prosecute.

      There are only two new events that explain today’s indictment of Assange: 1) The Trump administration from the start included authoritarian extremists such as Sessions and Pompeo who do not care in the slightest about press freedom and were determined to criminalize journalism against the U.S., and 2) With Ecuador about to withdraw its asylum protection, the U.S. government needed an excuse to prevent Assange from walking free.

      A technical analysis of the indictment’s claims similarly proves the charge against Assange to be a serious threat to First Amendment press liberties, primarily because it seeks to criminalize what is actually a journalist’s core duty: helping one’s source avoid detection. The indictment deceitfully seeks to cast Assange’s efforts to help Manning maintain her anonymity as some sort of sinister hacking attack.

      The Defense Department computer that Manning used to download the documents which she then furnished to WikiLeaks was likely running the Windows operating system. It had multiple user accounts on it, including an account to which Manning had legitimate access. Each account is protected by a password, and Windows computers store a file that contains a list of usernames and password “hashes,” or scrambled versions of the passwords. Only accounts designated as “administrator,” a designation Manning’s account lacked, have permission to access this file.

      The indictment suggests that Manning, in order to access this password file, powered off her computer and then powered it back on, this time booting to a CD running the Linux operating system. From within Linux, she allegedly accessed this file full of password hashes. The indictment alleges that Assange agreed to try to crack one of these password hashes, which, if successful, would recover the original password. With the original password, Manning would be able to log directly into that other user’s account, which — as the indictment puts it — “would have made it more difficult for investigators to identify Manning as the source of disclosures of classified information.”

      Assange appears to have been unsuccessful in cracking the password. The indictment alleges that “Assange indicated that he had been trying to crack the password by stating that he had ‘no luck so far.’”

      Thus, even if one accepts all of the indictment’s claims as true, Assange was not trying to hack into new document files to which Manning had no access, but rather trying to help Manning avoid detection as a source. For that reason, the precedent that this case would set would be a devastating blow to investigative journalists and press freedom everywhere.

      Journalists have an ethical obligation to take steps to protect their sources from retaliation, which sometimes includes granting them anonymity and employing technical measures to help ensure that their identity is not discovered. When journalists take source protection seriously, they strip metadata and redact information from documents before publishing them if that information could have been used to identify their source; they host cloud-based systems such as SecureDrop, now employed by dozens of major newsrooms around the world, that make it easier and safer for whistleblowers, who may be under surveillance, to send messages and classified documents to journalists without their employers knowing; and they use secure communication tools like Signal and set them to automatically delete messages.

      But today’s indictment of Assange seeks to criminalize exactly these types of source-protection efforts, as it states that “it was part of the conspiracy that Assange and Manning used a special folder on a cloud drop box of WikiLeaks to transmit classified records containing information related to the national defense of the United States.”

      The indictment, in numerous other passages, plainly conflates standard newsroom best practices with a criminal conspiracy. It states, for instance, that “it was part of the conspiracy that Assange and Manning used the ‘Jabber’ online chat service to collaborate on the acquisition and dissemination of the classified records, and to enter into the agreement to crack the password […].” There is no question that using Jabber, or any other encrypted messaging system, to communicate with sources and acquire documents with the intent to publish them, is a completely lawful and standard part of modern investigative journalism. Newsrooms across the world now use similar technologies to communicate securely with their sources and to help their sources avoid detection by the government.

      The indictment similarly alleges that “it was part of the conspiracy that Assange and Manning took measures to conceal Manning as the source of the disclosure of classified records to WikiLeaks, including by removing usernames from the disclosed information and deleting chat logs between Assange and Manning.”

  • No Fascists at HOPE
    https://medium.com/@nofashathope/statement-no-fascists-at-hope-c6873a64cc94

    On Saturday, 2600 and HOPE Conference organizers refused to remove fascist and white nationalist disruptors from HOPE 2018 — including a man who appeared to be carrying a concealed weapon and who bragged about marching in the #UniteTheRight white nationalist rally in Charlottesville. HOPE claims to provide a “harassment-free conference experience for everyone,” however, on multiple occasions when the fascist attendees were reported to security for intimidation and harassment, HOPE security refused to intervene and even defended their presence at the event. The fascist attendees menaced other conference goers, cornering them, following them down the street, and threatening them; one even called the police on a conference attendee in retaliation for grabbing his hat. Following numerous complaints, HOPE finally expelled one white nationalist (with a full refund), but allowed all of the other fascists to remain at the conference and intimidate attendees.

    HOPE’s Code of Conduct states that anyone can attend the conference “regardless of race, class, gender identity or expression, age, ethnicity, religion, political beliefs, disability, sexual orientation, personal appearance, or education level, text editor choice, and other aspects.” But creating space for fascists obviates the possibility of free speech. White nationalists are interested in violence, not speech, and allowing them into our community creates a chilling effect on all other participants’ freedom of expression. This is especially true for people who belong to marginalized groups that fascists often target for violence, such as people of color, trans and queer folks, and people with disabilities. In the past, HOPE has been criticized for providing a platform to speakers accused of stalking and sexual assault. Will they also be known as an organization that allows space for Nazis and fascists as well?

    Due to the events that were witnessed today we, the undersigned, are vocalizing our anger and outrage at the organizers and security staff for refusing to remove these fascist disruptors. We are left without faith in the mechanism designed to protect our expression, community-building, and physical well-being. Let this document rest as a declaration of no confidence in HOPE’s code of conduct mechanism at the time of writing, and, more importantly, rejecting any instances of fascism, nationalism, racist dogma and symbolism in our space.

    Organizations:

    Black Movement Law Project
    Digital Freedom Initiative
    Four Thieves Vinegar Collective
    Lucy Parsons Labs
    Riseup.net
    t4tech
    Technology Action Project

    Individuals:

    AJ Bahnken
    Barrett Brown
    Benjamin Rupert
    Bill Budington
    Bryce Vickery
    Caroline Sinders
    Chelsea E. Manning
    Chelsea H. Komlo
    Cooper Quintin
    Harlo Holmes
    Jan C. Rose
    Matthew Finkel
    Micah Lee
    Mixæl S Laufer
    Nima Fatemi
    R. Fox
    William Gillis
    Yael Grauer

    and many more who have decided to remain anonymous.

    https://itsgoingdown.org/statement-no-fascists-at-hope
    https://twitter.com/RiotDoge/status/1020722488404299777
    https://www.csoonline.com/article/3237591/security/captain-crunch-aka-john-draper-banned-from-defcon-for-sexual-misconduct.h

    #antifa #Alt-Righ #hackers #hopeconf #2600

  • How scientists can protect their data from the Trump administration
    (Micah Lee, Feb 2017)

    Very comprehensive text (just like his previous one on how to secure your communication https://seenthis.net/messages/569133) on the technologies of BitTorrent and how you can use it to share your data, on Tor Onion services and how to host hidden websites with it, and about OnionShare and how to use it to share data without colleagues without leaving a trace.

    https://theintercept.com/2017/02/01/how-scientists-can-protect-their-data-from-the-trump-administration

    some scientists have already begun trying to preserve government data they worry will be deleted, altered, or removed, and many are preparing to march on Washington to protest Trump’s dangerous science denialism.

    If you’re an American scientist who’s worried that your data might get censored or destroyed by Trump’s radically anti-science appointees, here are some technologies that could help you preserve it, and preserve access to it.

    – You can use a file-sharing technology called BitTorrent to ensure that your data always remains available to the public, with no simple mechanism for governments to block access to it.

    – You can use Tor onion services — sometimes referred to as the dark web — to host websites containing your data, research, and discussion forums that governments can’t block access to — and that keep your web server’s physical location obscure.

    – And you can use OnionShare, an open source tool that I developed, to securely and privately send datasets to your colleagues to hold onto in case something happens to your copy, without leaving a trace.

    #privacy
    #Tor
    #BitTorrent
    #OnionShare

  • Ed Snowden taught me to smuggle secrets past incredible danger. Now I teach you.
    (Micah Lee, Oct 2014)

    – Explains how Poitras and Snowden set up a secure communication channel using anonymous e-mail, Tor Browser, GPG, and tweeting the figerprint.

    – Explains how he got Greenwald to encrypt his computer. (Greenwald didn’t know how to nor how to use GPG, and got neither of them working)

    – Talks about his involvement in the set-up of communications between Snowden, Greenwald and Poitras prior to the revelations.

    https://theintercept.com/2014/10/28/smuggling-snowden-secrets

    I think it’s helpful to show how privacy technologists can work with sources and journalists to make it possible for leaks to happen in a secure way. Securing those types of interactions is part of my job now that I work with Greenwald and Poitras at The Intercept, but there are common techniques and general principles from my interactions with Snowden that could serve as lessons to people outside this organization.

    [...]

    but in his first email to me, Snowden had forgotten to attach his key, which meant I could not encrypt my response. I had to send him an unencrypted email asking for his key first. His oversight was of no security consequence—it didn’t compromise his identity in any way—but it goes to show how an encryption system that requires users to take specific and frequent actions almost guarantees mistakes will be made, even by the best users.

    [...]

    after creating a customized version of Tails for Greenwald, I hopped on my bike and pedaled to the FedEx office on Shattuck Avenue in Berkeley, where I slipped the Tails thumb drive into a shipping package, filled out a customs form that asked about the contents (“Flash Drive Gift,” I wrote), and sent it to Greenwald in Brazil.

    The (comprehensive) 30-page tutorial Micah wrote about using open source tools to communicate securely:

    Encryption Works: How to Protect Your Privacy (And Your Sources) in the Age of NSA Surveillance
    https://freedom.press/news-advocacy/encryption-works-how-to-protect-your-privacy-and-your-sources-in-the-age-

    The whitepaper covers:

    – A brief primer on cryptography, and why it can be trustworthy
    – The security problems with software, and which software you can trust
    – How Tor can be used to anonymize your location, and the problems Tor has when facing global adversaries
    – How the Off-the-Record (OTR) instant message encryption protocol works and how to use it
    – How PGP email encryption works and best practices
    – How the Tails live GNU/Linux distribution can be used to ensure high endpoint security

    https://web.archive.org/web/20130822041429/https://pressfreedomfoundation.org/sites/default/files/encryption_works.pdf
    backup :https://www.docdroid.net/file/download/vk6cwnN/encryption-works.pdf
    HTML version: https://web.archive.org/web/20130727195447/https://pressfreedomfoundation.org/encryption-works

    #Edward_Snowden #Snowden
    #privacy
    #Tails #GPG #PGP

  • S’assurer au mieux que la clé publique #PGP prétendue appartenir à X appartient à X.

    Super article de #Micah_Lee sur l’expérience de chiffrement des communications entre Laura Poitras, Greenwald et Snowden. Pratiquement un #tutorial.

    Ed Snowden Taught Me To Smuggle Secrets Past Incredible Danger. Now I Teach You.

    https://firstlook.org/theintercept/2014/10/28/smuggling-snowden-secrets

  • Pourquoi est-il si difficile de partager des fichiers directement
    http://alireailleurs.tumblr.com/post/90748631939/pourquoi-est-il-si-difficile-de-partager-des-fichiers

    OnionShare est un petit logiciel mis au point par Micah Lee qui créé une connexion directe entre deux utilisateurs, leur permettant de transférer des fichiers, sans avoir à passer par des intermédiaires comme Dropbox ou Mega.

    #Internet #Tor #P2P #EFF #partage #vie_privée

  • Pourquoi est-il si difficile de partager des fichiers directement - Wired
    http://alireailleurs.tumblr.com/post/90748631939

    OnionShare est un petit logiciel mis au point par Micah Lee qui créé une connexion directe entre deux utilisateurs, leur permettant de transférer des fichiers, sans avoir à passer par des intermédiaires comme Dropbox ou Mega. Il fonctionne sous Tor, ce qui signifie qui quiconque interceptant le trafic, laisse l’expéditeur comme le récepteur quasiment anonyme, rapporte Parker Higgins de l’Electronic Frontier Foundation pour Wired. L’idée est venue à Micah Lee suite à sa lecture du livre de Glenn Greenwald, Nul part où se cacher. Mais pourquoi nous a-t-il fallu attendre 2014 pour enfin disposer d’un outil aussi simple, interroge Parker Higgins. Parce que 15 ans d’attaques contre les systèmes #P2P par les lobbies du droit d’auteur et les industries culturelles ont laissé des traces, estime Higgins et ont (...)

    #surveillance

    • PS : après quelques difficultés au démarrage, à cause d’un réglage bizarre de mot de passe qui traînait dans Vidalia, ça marche chez moi.

    • Merci pour ces pistes.

      Ces partages sont d’un chiant !

      Pour simplement faire aimer ou faire connaitre, on est obligé d’enfreindre la loi !

      Et la production, je connais, je ponds de temps en temps un ouvrage scientifique (le genre imbitable) : ca sert à mettre de l’ordre dans ses idées, se faire plaisir mais surtout pas à gagner de l’argent !

      En tant que « consommateur » de produits culturels, je laisse chaque mois des fortunes en spectacles, concerts etc.

      Là, on est obligé de ruser avec les flics qui ont vraiment autre chose à faire. Ca me met en rogne.

      J’avais penser à du Dropbox. Mais ils verrouillent les partages, ce qui veut dire qu’ils fouinent.

      J’ai pris un compte sur hubiC, je ne sais pas si vous avez des echos sur ce fournisseur...

      Et des plateformes comme Diaspora* ou Seenthis sont finalement attaquables à cause de ce que l’on peut poster.

      Je me demande d’ailleurs comment tumblr peut s’en sortir : on peut mettre tout ce qu’on veut, ils ont l’air de s’en foutre et ne subissent pas d’attaques à ma connaissance.

      Allez-y pour les idées ! Je vais boire un café pour me calmer.

    • Oui, j’utilise aussi hubiC (essentiellement pour des sauvegardes chiffrées). Aujourd’hui ça fonctionne bien. C’est aussi pratique pour partager rapidement un fichier (30 jours maximum, renouvelable). Mais (ou en plus, c’est selon) c’est du cloud et du cloud français.

      Pour tumblr, ils ont quand même viré de (courts) extraits de films que j’avais pu y mettre. Donc c’est pas satisfaisant non plus. Le partage de vidéos « intégrables » est LE problème pour lequel je n’ai pas encore trouvé de solutions (une piste serait http://mediagoblin.org).

    • J’ai pas tout compris mais :

      Anonymous P2P inside browsers, no installation, compatible with torrents. Encrypted and untrackable - Stream, Download, exchange private data
      http://www.peersm.com

      [D]e nos jours, on ne peut pas facilement échanger des informations sans passer par un tiers qui pourrait utiliser ces informations à notre insu.

      Mais ce n’est pas le seul problème, la plupart des systèmes ne protégent pas votre vie privée et n’empêchent pas d’être suivi ou espionné, ceux le permettant sont généralement inaccessibles en terme d’utilisation pour tout un chacun.

      [...]

      C’est pourquoi nous avons fait Peersm, Peersm permet d’échanger anonymement des informations sur internet ou entre les personnes directement à partir de son navigateur, l’information est alors distribuée dans les navigateurs, les clients Peersm, le réseau bittorent et peut être partagée entre les personnes, la différence étant par rapport aux systèmes P2P courant que personne ne sait ce que vous avez et ce que vous faites..

  • Switch to HTTPS Now, For Free
    https://konklone.com/post/switch-to-https-now-for-free?hn

    Most certificates cost money, but at Micah Lee’s suggestion, I used StartSSL. They’re who the EFF uses, and their basic certificates for individuals are free. (They’ll ask you to pay for a higher level certificate if your site is commercial in nature.) The catch is that their website is difficult to use at first — especially if you’re new to the concepts and terminology behind SSL certificates (like me). Fortunately, it’s not actually that hard; it’s just a lot of small steps.

  • Projet open-source de lanceur pour Tor Browser Bundle de Micah Lee
    http://neosting.net/logiciels/projet-lanceur-tor-browser-bundle-micah-lee.html

    Voilà un projet que je souhaite réellement partager et relayer. Micah Lee, directeur technique de la fondation freedomofpress et développeur web à l’Electronic Frontier Foundation (EFF) veut proposer un lanceur dont le but est d’installer et de mettre à jour TBB quasi ... #debian #lanceur #open-source #tor #tor-browser-bundle #ubuntu

    @fil Tu es mon mentor :D Peut-être bien à relayer.