{"id":38184,"date":"2014-09-17T10:47:54","date_gmt":"2014-09-17T14:47:54","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/middle-school-dropout-codes-clever-chat-program-that-foils-nsa-spying\/"},"modified":"2014-09-17T10:47:54","modified_gmt":"2014-09-17T14:47:54","slug":"middle-school-dropout-codes-clever-chat-program-that-foils-nsa-spying","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/middle-school-dropout-codes-clever-chat-program-that-foils-nsa-spying\/","title":{"rendered":"Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying"},"content":{"rendered":"<p><p>    The National Security Agency has    some of the brightest minds working on its sophisticated    surveillance programs, including its metadata collection    efforts. But a new chat program designed by a middle-school    dropoutin his spare time may turn out to be one of the    best solutions to thwart those efforts.  <\/p>\n<p>    Prompted by Edward Snowdens    revelations about the governments intrusive surveillance    activities, loosely knit citizen militias of technologists and    security professionals have cropped up around the world to    develop systems to protect us from government agencies out to    identify us online and grab our communications.  <\/p>\n<p>    John Brooks is now among    them.  <\/p>\n<p>    Brooks, who is just 22 and a    self-taught coder who dropped out of school at 13, was always    concerned about privacy and civil liberties. Four years ago he    began work on a program for encrypted instant messaging that    uses Tor hidden services for the protected transmission of    communications. The program, which he dubbed Ricochet, began as    a hobby. But by the time he finished, he had a full-fledged    desktop client that was easy to use, offered anonymity and    encryption, and even resolved the issue of metadatathe to    and from headers and IP addresses spy agencies use to    identify and track communicationslong before the public was    aware that the NSA was routinely collecting metadata in bulk    for its spy programs. The only problem Brooks had with the    program was that few people were interested in using it.    Although hed made Ricochets code open source, Brooks never    had it formally audited for security and did nothing to promote    it, so few people even knew about it.  <\/p>\n<p>    Ricochet is idiot-proof and    anonymous.  <\/p>\n<p>    Then the Snowden leaks happened    and metadata made headlines. Brooks realized he already had a    solution that resolved a     problem everyone else was suddenly scrambling to fix.    Though ordinary encrypted email and instant messaging protect    the contents of communications, metadata allows authorities to    map relationships between communicants and subpoena service    providers for subscriber information that can help unmask    whistleblowers, journalistss sources and others. Its not just    these kind of people whose privacy is harmed by metadata,    however; in 2012 it was telltale email metadata that    helped unmask former CIA director and war commander General    David Petraeus and unravel his affair with Paula    Broadwall.  <\/p>\n<p>    With metadata suddenly in the    spotlight, Brooks decided earlier this year to dust off his    Ricochet program and tweak it to make it more eleganthe knew    hed still have a problem, however, getting anyone to adopt it.    He wasnt a known name in the security world and there was no    reason anyone should trust him or his program.  <\/p>\n<p>    Enter Invisible.im, a group formed by    Australian security journalist Patrick Gray. Last July, Gray    announced that he was working with HD Moore, developer of the    Metasploit Framework tool used by security researchers to    pen-test systems, and with another respected security    professional who goes by his hacker handle The Grugq, to craft    a secure, open-source encrypted chat program cobbled together    from parts of existing anonymity and messaging systemssuch as    Prosody, Pidgin and Tor. They wanted a system that was highly    secure, user friendly and metadata-free. Gray says his primary    motivation was to protect the anonymity of sources who contact    journalists.  <\/p>\n<p>    At the moment, when sources    contact a journalist, theyre going to leave a metadata trail,    whether its a phone call record or instant message or email    record [regardless of whether or not the content of    their communication is encrypted], he says. And that data is    currently accessible to authorities without a warrant.  <\/p>\n<p>    When Brooks wrote to say hed    already designed a chat program that eliminated metadata, Gray    and his group took a look at the code and quickly dropped their    plan to develop their own tool, in favor of working with Brooks    to develop his.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.wired.com\/c\/35185\/f\/661467\/s\/3e8cffab\/sc\/33\/l\/0L0Swired0N0C20A140C0A90Cnew0Eencrypted0Echat0Eprogram0Ethwarts0Ensa0Eeliminating0Emetadata0C\/story01.htm\/RK=0\/RS=cZZcu.GymaTIXQaeFW_8BQg22u4-\" title=\"Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying\">Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The National Security Agency has some of the brightest minds working on its sophisticated surveillance programs, including its metadata collection efforts. But a new chat program designed by a middle-school dropoutin his spare time may turn out to be one of the best solutions to thwart those efforts. Prompted by Edward Snowdens revelations about the governments intrusive surveillance activities, loosely knit citizen militias of technologists and security professionals have cropped up around the world to develop systems to protect us from government agencies out to identify us online and grab our communications.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/middle-school-dropout-codes-clever-chat-program-that-foils-nsa-spying\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-38184","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/38184"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=38184"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/38184\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=38184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=38184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=38184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}