Dissidents Seeking Anonymous Web Solutions? 684
DocMurphy asks: "I'm working with some dissidents who are looking for ways to use the Internet from within repressive regimes. Many have in-home Internet access, but think it too risky to participate in pro-freedom activities on home PCs. Internet cafés are also available, but although fairly anonymous, every machine may be infected with keystroke loggers that give governments access to and knowledge of 'banned' sites. Dissidents not only want to remain anonymous themselves, but also wish to not compromise the sites they access. Any suggestions for products/procedures/systems out there making anonymous access & publishing a reality under repressive regime run Internet access?"
wireless (Score:2, Insightful)
Freenet (Score:3, Insightful)
http://freenet.sourceforge.net/ [sourceforge.net]
Re:wireless (Score:4, Insightful)
Connected to what when the government tracks everything and owns/controls all of the nations connectivity?
You may as well have suggested FDDI or gigabit ethernet would solve the problem.
Once you're inside of a 'repressive regime', it's a lot more difficult to circumvent than just pick a new network layer.
Dissidence isn't supposed to be convenient. (Score:5, Insightful)
Just do what they do on the Sopranos: keep it low tech, use payphones, meet in person. If your cause it that important and you need to spread information, may I suggest a major leaflet campaign?
Impossible based on requirement (Score:3, Insightful)
Next Time (Score:2, Insightful)
Re:wireless (Score:5, Insightful)
A. Repressive regimes may not have a lot of unsecured open hotspots.
B. Repressive regimes may not have an abundance of wireless enabled laptops, and possessing one would draw attention.
C. Going from "inside the internet cafe" to "within 150' of the internet cafe" doesn't get you that much. Repressive regimes are pretty good with triangulation.
Re:There is no anonymity on the internet (Score:5, Insightful)
That's an excellent time to risk your life. Rolling over and "playing nice" is exactly what lets oppressive regimes exist.
There is no point (Score:2, Insightful)
Re:write in advance, encrypt and email it (Score:4, Insightful)
One Man's Villan is Another's Man's Hero (Score:2, Insightful)
Seriously (Score:2, Insightful)
Re:Use the Circumventor. (Score:4, Insightful)
You pretty much have hit on the problem.
Even if they can not read your data they will know it is encrypted. That could cause them to notice you.
If you are in a totalitarian country you can not be safe and a dissident. I do wish them luck.
Re:Tor (Score:3, Insightful)
Re:Easy solution (Score:2, Insightful)
Suppose the authorities notice dissident activity from the first external server. If they then determine that I've been making connections to that dissident server, I'll be put under investigation. Yes my data may have been encrypted, but the connection alone is enough to raise suspicion.
However, if I have two external servers, I use the first as a proxy to the second, and use the second to conduct dissident work. Since both servers are beyond the regime's control, they have no way of discovering the connection between them and attributing the dissident activity to me.
Combatting keystroke loggers (Score:3, Insightful)
However, even this will leave you open to IP tracing (should a stream of encrypted traffic raise any flags), as well as wandering busybodies/spies/anyone willing to report your ass for a reward. Just a thought.
Fsking Democrats!!! (Score:2, Insightful)
Re:I do not know if this is valid... (Score:1, Insightful)
It is a network that is based on OpenVPN and Quagga (for BGP routing). The last time someone posted the connect details on slashdot, we were overwhelmed. If you are truly interested though, shoot an email over to that account and someone will shoot you back the instructions.
A variant of Unix or BSD with a dedicated connection is recommended -- but NOT required. The reason being, we would like as many people as possible to be permanent "nodes".
This is NOT freenet. It is fast and _extremely_ reliable.
One last thing, if you send mail to the above address, do it from an account that is NOT tied to you (webmail through a proxy).
Ok, one MORE last thing. Once you are on the Metanet
Re:There is no point (Score:5, Insightful)
Spoken like a true Westerner I'm thinking.
In countries where you can stand up and say your government is a bunch of idiots, there is no harm in not being anonymous.
But if this can lead to prison, death, torture, disappearance, or all sorts of ahem inconvenience cough, then anonymity is what you want.
What good is saying "if you have anything of value to say, be public about it" if everyone is eventually dead and too afraid to say anything?
Sometimes just making sure someone hears the words is important. As is making sure those who need to say 'em are alive to keep saying 'em. Deciding that anything that can't be said out in the open isn't worth saying is probably a real disservice to peoples who absolutely cannot do that.
Re:And the entire internet is public.. (Score:2, Insightful)
They understand the power of crypto, they will outlaw it. That's why the writeup for the article mentioned avoiding the use of personal PCs.
Ask Slashdot (Score:3, Insightful)
Q: (Score:2, Insightful)
A: Only your point of view.
Re:write in advance, encrypt and email it (Score:4, Insightful)
also, try using one of those secure usb key's (lexar has one). and always do boring, mundane stuff while you're at the cafes, even when you go for the main purpose, start up a normal browsing session before you upload anything and flip back to it during the transfer.
Re:Lemme guess... (Score:3, Insightful)
If I may be permitted a tiny flame, I'd suggest that you don't distinguish between statistical statements about groups of people and categorical statements about each member of a group of people. While the latter is fallacious, the former is not. Granted, they are easily confused, and bigots often pretend to say the former when they mean the latter. However, in intelligent discourse, it is important to realize that statistical statements CANNOT be refuted by anecdotes. "The averate 4-year-old can't read" is true, no matter how many gifted four-year-olds you might find.
Re:Q: (Score:4, Insightful)
A: Only your point of view.
I think the difference is bomb/no bomb, and choice of target.
Re:And the entire internet is public.. (Score:5, Insightful)
RAM isn't completely recovery proof.
Now... as for the original question, isn't this what freenet was supposed to be for?
In other words, the site is published by you, but hosted on some other freenet member(s) box.That was the entire point of freenet, to allow for truly anonymous publishing of material.
Oh yea, and don't forget to check the "Post Anonymously" box
Re:Q: (Score:3, Insightful)
Re:American dissidents persecuted by Secret Police (Score:3, Insightful)
Disliking the president is one thing. Hoping for his literal death is something else altogether.
How long would such a person last in Saddam's Iraq, or KJI's North Korea? A 'request' to Fark for their email address? No. A threat to 'our beloved leader' would end up quite a bit nastier than that.
Re:Anything PRIVATE is also NOT safe... (Score:1, Insightful)
Re:And the entire internet is public.. (Score:3, Insightful)
I'd be extra paranoid and make sure to power off the computer, not just reboot it, to be sure all the RAM is reset. If they're super-cunning they could salvage incriminating data from it.
You could also go one step further on the keylogger protection and have your own USB keyboard that you carry around with you. Keylog that!
Re:There is no anonymity on the internet (Score:2, Insightful)
Actually, it is exactly what lets me sit here in front of a Starbucks, in my boyfriend's Lexus, sipping a latte and chatting on his laptop. That and the fact that he couldn't switch from IE to Firefox without three IT consultants - so he is never any the wiser ;) He probably thinks keyloggers are the guys you can't do without if you are cutting down a forest....
ssh is confidential, but easily traced (Score:4, Insightful)
authentication: third parties cannot alter your communication; the party you are talking to is who you expect.
confidentiality: third parties cannot read your communication
tracability: third parties cannot determine who you are and/or with whom you are communicating (i.e. they can't map to meatspace)
The most critical factor for dissidents is tracability.
While ssh provides authentication and encryption, it does NOT, on its own, decrease tracability. Most governments (and in the US, corporations) can easily trace a basic IP connection, even if they can't read or write the traffic on it. Just follow the wire.
Remember: who you talk to can be at least as sensitive as what you say.