{"id":204679,"date":"2017-07-10T19:51:06","date_gmt":"2017-07-10T23:51:06","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/aclus-gillmor-on-privacy-we-pay-for-what-we-value-qa-the-parallax-blog\/"},"modified":"2017-07-10T19:51:06","modified_gmt":"2017-07-10T23:51:06","slug":"aclus-gillmor-on-privacy-we-pay-for-what-we-value-qa-the-parallax-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/aclus-gillmor-on-privacy-we-pay-for-what-we-value-qa-the-parallax-blog\/","title":{"rendered":"ACLU&#8217;s Gillmor on privacy: &#8216;We pay for what we value&#8217; (Q&#038;A) &#8211; The Parallax (blog)"},"content":{"rendered":"<p><p>    SAN FRANCISCOCan something as mundane as modern Web    hosting be used to increase consumer privacy? Daniel    Kahn Gillmor, a senior staff technologist at    the ACLUs Project on Speech, Privacy, and Technology, thinks    so. He also believes that the future of consumer privacy    depends on technology providers taking bolder steps to protect    their users.  <\/p>\n<p>    At a recent conference held here by the     content delivery network company Fastly,    Gillmor spent 20 minutes explaining a set of technology    proposals that a modern Web host like Fastly can undertake to    defend privacywithout burying itself in costly changes.  <\/p>\n<p>    The adversaries who are doing network monitoring tend to    focus on metadata, not on content, he told the crowd of    engineers about the     essential tracking data created when we    write emails, watch cat videos online, or text emojis. The    importance of metadata to surveillance was underscored by    former National Security Agency Director Michael Hayden        in 2014, when he declared, We kill people    based on metadata.  <\/p>\n<p>    Gillmor explained how a content delivery network, or CDN, could    combine new Internet traffic analysis countermeasures and    Domain Name System obfuscation to help prevent spies from    snooping on consumers Internet activities. Gillmors talk was    more of a pitch about what a CDN can do than what Fastly is    actually doing.  <\/p>\n<p>      Daniel Kahn Gillmor. Photo courtesy ACLU.    <\/p>\n<p>    After Gillmors presentation, he and I spoke at length    about three of todays biggest challenges to consumer privacy:    rising costs, responsibilities of private companies to their    users, and struggles to make email more safe and    private.  <\/p>\n<p>    What follows is an edited transcript of our    conversation.  <\/p>\n<p>    Q: There seems to be a growing digital divide over privacy    technology. Whats your perspective?  <\/p>\n<p>    My biggest fear is that were going to accept, as a    society, that privacy is a luxury. You see that already, in    many situations. Someone who can afford a home has more privacy    than someone who cant afford a home. This is not just a    digital-divide thing; its a general situation where people buy    privacy for themselves. Its unjust.  <\/p>\n<p>    Some services people buy are intended to help keep you    off others radar. (And some of them actually are invasive.)    And a lot of people dont even actively consider privacy when    making purchasing decisions. So theres not enough of a market,    in some sense, for privacy-preserving technologies.  <\/p>\n<p>    Which ostensibly privacy-preserving technologies are people    are buying that might actually be compromising them?        Virtual private networks?  <\/p>\n<p>    If you cant afford a VPN, most of your connections are    going out in the clear, which means that your network provider    has an opportunity to surveil you and build profiles about    you.  <\/p>\n<p>    But if everyone gets a VPN, all network traffic would get    concentrated at a few VPN companies instead of at the various    Internet service providers. And you could monitor everybodys    traffic just by monitoring the VPNs, instead of all the    different on-ramps.  <\/p>\n<p>    And if you had a big budget and wanted to do a lot of    monitoring, you could even set up your own VPN and sell access.    Brand and market it, and then maybe Im paying you to harvest    my data.  <\/p>\n<p>    Another consideration: What privacy controls do we have    on existing VPN services we might buy? They should be subject    to the same constraints that we would like to put on the ISPs,    because they are in the position to see all of the different    stuff that we do online. Thats a different perspective than a    network service that you may or may not decide to use.  <\/p>\n<p>    Tor is the exception to this rule because its free and    designed to reduce tracking, right?  <\/p>\n<p>    Theres a bunch of     mythology around Tor. But if you want to    play around with it, its really not that hard. You go    to TorProject.org,    download the browser, and use it to browse the Web.  <\/p>\n<p>    Its a little bit slower than what people usually expect    from a Web browser. But Tor developers have really thought    carefully, not just about how to route network traffic, but    also about what browsers do and how they pass traffic. Tor    really does provide a significant amount of user    privacy.  <\/p>\n<p>      We have a responsibility as engineers to try to fix      the systems people actually use.    <\/p>\n<p>    In dealing with cookies, for example, it uses    double-keyed cookies. The typical browser makes a request,    the origin sends back the page, and the page refers to several    subresources such as images or video. It sends them with    cookies [a small piece of computer data that can track behavior    on the Web], which might come from a third party such as an ad    server.  <\/p>\n<p>    So if I visit a site, make a request from a third-party    server, then visit another site that uses the same third-party    server, that third party can identify me as the same person    because of the identical cookies I send.  <\/p>\n<p>    The Tor browser ensures that the cookies you send    different sites dont match. I think it would be better to just    not send cookies at all, but the Web has evolved such that    there are things like authentication schemes that dont work,    if you dont send any cookies to a third party. This is    something Tor does through its browser. Its independent from    its network traffic obfuscation.  <\/p>\n<p>    If youre interested in getting the most developed set of    privacy preservation tools that have been thought about,    researched, and well implemented, Tor is the place to get it.    As part of the Tor uplift to integrate features from the Tor    browser back into Firefox, Mozilla has added double-keyed    cookies into Firefox as an opt-in. This is a    good example of how collaboration between noncompany technology    providers can add functionality for a wide swath of    users.  <\/p>\n<p>    For instant messaging, people should be using        Signal. And if theyre not using Signal,    they should use     WhatsApp.  <\/p>\n<p>    What about for email?  <\/p>\n<p>    Im involved with an effort to try to do a similar thing    for email called Autocrypt. We    have had email encryption technology available to us for 20    years. But encrypting email is painful.  <\/p>\n<p>    So painful that the creator of email encryption tells    people     to stop using email to send sensitive data.  <\/p>\n<p>    Phil Zimmerman doesnt use it anymore. He says people    should stop using it, but the fact is, that wont happen. And    he knows that.  <\/p>\n<p>    We have a responsibility as engineers to try to fix the    systems people actually use. Its one thing for us to say,    Quit it. And its another thing to say, OK, we get it. You    need email because email works in all these different    ways.  <\/p>\n<p>    I think we have a responsibility to try to clean up some    of our messes, instead of saying, Well, that was a mistake.    All of you idiots who are still doing what we told you was so    cool two years ago need to stop doing it.  <\/p>\n<p>    We need to actually support it. This is a problem that I    call the curse of the deployed base. I take it    seriously.  <\/p>\n<p>      I expect to get a lot of shit, frankly, from some      other members of the encrypted-email community.    <\/p>\n<p>    The Autocrypt project is run by a group of email    developers who are building a consensus around automated    methods to give people some level of encrypted email without    getting in their way.  <\/p>\n<p>    Some of us deeply, intimately know the thousand paper    cuts that come with trying to get encrypted email setup. We    asked, Whats the right way to get around that for the    majority of people? And the answer weve come up with isnt    quite as good as traditional encrypted email, from a security    perspective. But it isnt bad.  <\/p>\n<p>    When someone asks me how to use email encryption, Id    like to one day be able to tell him to use an Autocrypt-capable    mail client, then turn on the Autocrypt feature.  <\/p>\n<p>    From a solutions perspective, we dont necessarily handle    everything correctly. But no one does traditional encrypted    email properly. And encrypted email is a two-way street. If you    want people to be able to do it, the people with whom you    correspond need to also be doing it.  <\/p>\n<p>    I expect to get a lot of shit, frankly, from some other    members of the encrypted-email community. Five years ago, I    would have said Autocrypt sounds dangerous because its not as    strong as we expect. That is, I might have been inclined to    give people shit about aproject like    Autocrypt. However, I think that imperfect e-mail encryption    with a focus on usability will be better protection than what    we currently have, which is actually clear text for everyone,    because no one can be bothered to use difficult e-mail    encryption.  <\/p>\n<p>    How important is it for consumers to understand whos    targeting them?  <\/p>\n<p>    This is the other thing that I feel like we dont have    enough of a developed conversation around. Im a well-off white    guy, working for a powerful nonprofit in the United States.    Were not as powerful as wed like to be, and we obviously    dont win as many of the fights that we would like to win. But    I dont feel that Im personally, necessarily, a target.  <\/p>\n<p>    Other people I talk to might be more targeted. I am    responsible for pieces of infrastructure as a Debian    [Linux] developer that other people rely on.    They might be targeted. I could be targeted because theyre    being targeted.  <\/p>\n<p>    When we talk about threats, we take an individualistic    approach when, in fact, we have a set of interdependencies. You    and I exchange emails, and all of a sudden, someone who wants    access to your emails can go attack my email.  <\/p>\n<p>      We havent yet seen a sufficient shift to companies      treating user data as a responsibility, instead of just as a      future pot of money.    <\/p>\n<p>    It used to be that I would set up a server, and you would    connect to it to view my site. There were network    intermediaries, but no CDN. Now there are both, and the CDNs    privacy is my privacy is your privacy. All of these things are    intermixed.  <\/p>\n<p>    You have to think about the interdependencies that you    have, as well as the threat model of the people who depend on    you. Theres responsible data stewardshipI dont think that    people think about that actively.  <\/p>\n<p>    My hope is that every organization that holds someone    elses data will see that data as a liability to be cared for,    as well as an asset. Most people today see other peoples data    as an asset because it will be useful at some point. Companies    build venture capital on the basis of their user base, and on    the assumption that you can monetize the user base somehow.    Most of the time, that means sharing data.  <\/p>\n<p>    We havent yet seen a sufficient shift to companies    treating user data as a responsibility, instead of just as a    future pot of money. How do we ensure that organizations in    this middleman position take that responsibility seriously? We    can try to hold them publicly accountable. We can say, Look,    we understand you have access to this data, and we want you to    be transparent about whom you leak it to. Or give it    to.  <\/p>\n<p>    Ive been happy to see large companies make a standard    operating procedure of documenting all the times theyve had    data requested by government agencies, but I dont think its    adequate. It doesnt cover who theyve actually sent data to in    commercial relationships.  <\/p>\n<p>    A big challenge to the effort to protect consumers from    hacking and spying is the effort to encrypt metadata. Where    does it stand today?  <\/p>\n<p>    Its complicated by a lot of factors.  <\/p>\n<p>    First, what looks like content to some layers of the    communications stack might look like metadata to other layers.    For example, in an email, there is a header that says To, and    a header that says From. From one perspective, the entire    email is content. From another, the To and the From are    metadata. Some things are obviously content, and some things    are obviously metadata, but theres a vast gray area in the    middle.  <\/p>\n<p>    When youre talking about metadata versus content, it    helps to be able to understand that the network operates on all    these different levels. And the idea of encrypting metadata    doesnt necessarily fit the full bill.  <\/p>\n<p>    In terms of the size and timing of packets, for example,    say you sent K bytes to me. You cannot encrypt the number. But    you can obfuscate it.  <\/p>\n<p>    Take profile pictures. If youre serving up a cache of    relatively static data like avatars, you can serve every avatar    at the same size.  <\/p>\n<p>    Can you essentially hide other forms of metadata that cant    be encrypted?  <\/p>\n<p>    You can obfuscate an Internet    Protocol address.  <\/p>\n<p>    When I send you traffic over IP, the metadata at the IP    layer is the source and destination address. If you encrypted    the destination address, the traffic wouldnt reach the    destination. So somebody has to see some of the metadata    somewhere. And practically, realistically, I have no hope of    encrypting, or protecting, the sending address. But maybe I    dont need to present the source address.  <\/p>\n<p>    Whether youre padding existing traffic to hide the size of    the information transferred, or making changes to how domain    name servers operate, what are the associated costs? Additional    traffic isnt free, right?  <\/p>\n<p>    Its hard to measure some of the costs. But youd measure    padding to defend against traffic analysis in terms of    throughput.  <\/p>\n<p>    Imagine that your DNS was already encrypted. We know how    to do it; we have the specification for it. Are we talking    about an extra 5 percent of traffic? Or are we talking about an    extra 200 percent or 2,000 percent of traffic? And if were    talking about DNS, whats the proportion of that traffic    relative to the proportion of all of the other traffic?  <\/p>\n<p>    DNS traffic is peanuts compared to one streamed episode    of House of Cards.  <\/p>\n<p>    Some traffic analysis savant will come along and say, We    found a way to attack your padding scheme, which is great.    Thats how the science advances. But it might cost your    adversary two to three times more to decipher, because of the    padding.  <\/p>\n<p>    If we step back from that, lets ask about other costs.    Have you looked at the statistics for network traffic with an    ad blocker versus no ad blocker?  <\/p>\n<p>    Your browser pulls significantly less traffic, if it    doesnt pull ads. And yet, as a society, we seem to have    decided that the default should be to pull a bunch of ads.    Weve decided that the traffic cost of advertising, which is    more likely to be privacy-invasive, is worth paying.  <\/p>\n<p>    So yes, metadata padding will cost something. Im not    going to pretend that it doesnt, but we pay for what we    value.  <\/p>\n<p>    And if we dont value privacy, and thus dont pay for it,    there will be a series of consequences. As a society, well be    less likely to dissent. Well be more likely to stagnate. And,    if we feel boxed in by surveillance, well be less likely to    have a functioning democracy.  <\/p>\n<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.the-parallax.com\/2017\/07\/10\/aclus-gillmor-privacy-qa\/\" title=\"ACLU's Gillmor on privacy: 'We pay for what we value' (Q&A) - The Parallax (blog)\">ACLU's Gillmor on privacy: 'We pay for what we value' (Q&A) - The Parallax (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> SAN FRANCISCOCan something as mundane as modern Web hosting be used to increase consumer privacy? Daniel Kahn Gillmor, a senior staff technologist at the ACLUs Project on Speech, Privacy, and Technology, thinks so.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/aclus-gillmor-on-privacy-we-pay-for-what-we-value-qa-the-parallax-blog\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-204679","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/204679"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=204679"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/204679\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=204679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=204679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=204679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}