Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Censorship Your Rights Online

Publius 68

Ukiah writes: "Publius is a Web publishing system that is highly resistant to censorship and provides publishers with a high degree of anonymity. Publius was the pen name used by the authors of the Federalist Papers, Alexander Hamilton, John Jay, and James Madison." Check out the system's home page or a Washington Post story. I just volunteered to host a server, so be sure to load up the system with bootleg Metallica mp3's - your chance to send a Slashdot author to jail, not something you get to do every day...
This discussion has been archived. No new comments can be posted.

Publius

Comments Filter:
  • by Anonymous Coward
    Because censors can pick people at random to prosecute. Without encryption and deniability, a file can be censored by making everyone afraid to post it, even if there's no technical way to wipe it off the whole network.
  • by Anonymous Coward
    Each to their own, i wonder how long it'll be before the fed's or some other place tries to can this puppy.

    Anyway, from a quick read of it, it looks pretty interesting. It's using cryptography and some other smarts based on random file splitting to make sure that the content online is tamperproof, well, close, i think.

    It's a unique idea, i wouldnt try putting one on the network at my work though. Kudos to the guy's who invented it, its creative.

    I wonder if theres going to be any huge freedom of speech rants about this topic.
  • Actually, both the Publius project and Slashdot mentioned this; I'm just surprised they didn't mention their Roman origins, as well.

    Heck, I caught the public interest reference, too, but they didn't even say that. And Virgil was quite the writer.

    ...and even the Apache Project knows how to provide a link for those curious about the Apache people...
    ---
    pb Reply or e-mail; don't vaguely moderate [ncsu.edu].
  • Virgil was Publius Virgilius Maro.

    I'm sure there were many other people named "Publius" at some point in time, but I would venture to say that he is probably the most well-known one, as well as being far older than the others you cite.

    (So why didn't they use "Virgil" as their pen-names? Too obvious? Or "Publico"? Was that the image they wanted?)
    ---
    pb Reply or e-mail; don't vaguely moderate [ncsu.edu].
  • P.S. Why I'm unable to use tag here?

    I always wondered about this myself. I usually ended up using <TT> instead. Of course, that still required me to use breaks.

    --

  • As far as I understand it,
    there are plans for some form of freenet "browser",
    whereby you can read a document on freenet,
    with links in it to other freenet keys/files.
    If the concept is taken to completion,
    you could develop an entire www-type feel to it,
    while maintaining encrypted files and anonymity,
    as in not knowing where the files you're reading are located.
    There is no difference between serving "files,"
    and serving "words." The only difference may be
    an ascii vs: binary file, and even binary files
    can have readable portions.

    My only gripes with freenet's goal are the
    potential slow links (me right now, on isdn),
    and the unique-key system.

  • "We currently have more than enough evidence to show that the races are equal..."

    Define equal as you use it here. Do you suggest that in every way, every black man/woman is equal to every white, japanese, hispanic, etc., etc., etc., man/woman? That obviously is not the case, as even two siblings can be of differing intelligence. More likely, you suggest that the racial averages of intelligence quotient, physical ability, etc., given equal oppurtunity, would be equal across the board. While I honestly doubt this would be true, given more than enough evidence to show that races are not genetically equal (hence that whole issure of color of the skin), here we really have NO evidence. It's difficult to find two people of precisely the same oppurtunity within the same racial group, not to mention across them. Hence our difficulty in defining just how a child should be raised. We really can't claim any physical/mental equality without more information.

  • True, I was basically bickering about the use of "does," instead of what I believe would be better as "will." Freenet is obviously still a work in progress, though it is actually rather usable, if not a bit cryptic at the moment. It would be more usable if there were a few more servers out there at the moment.

  • Let's face it -- a publisher anonymized publishing method isn't needed by the MP3 trading community, and besides, they'd waste it. (From my experiences, and what I've heard/ssen lately, what people are looking for is a receiver anonymized transport. Which already exist, in practical terms; but the newbie MP3 traders aren't using them.)

    Barring the file size limitation, I would say that this system would end up filled with two things:
    1. Unauthorized copies of otherwise available material (i.e. mp3 and pron).
    2. Rants from cranks and kooks.
    On top of that, you'll get paranoid people (and kids) sending things like the bad things they said about so-and-so, or what they did at the Christmas party, or the love poem for the girl they have a crush on.

    Personally, I'd rather see secret CIA reports, or troop movements in Chechnya, or IRA communiques -- but you know that anonymous or not, this stuff is few and far between, compared to the literal junk that kooks, cranks, trolls, and spammers can generate.

    If we can a) manage to get those who have access to sensitive material also access to such a network, and b) manage to overcome their understandable fears, then we could see some good things come out of it. But the mechanism is really the least of our problems.

    And besides, if no encryption is 100% uncrackable, and no system is 100% secure, (and no cruise ship is 110% unsinkable, etc.), then it follows that no publishing system will be 100% anonymous.

    (Shame.)
    --
  • I think you mean Wayland Smithers.
  • That's why there's Betty and Billy and Bilbo and ... With 5-8 files XORed together, it's much safer.

    -Dave Turner.
  • It is more or less linking, and with a proper server, it could be linking. Consider a mail bot that accepts emails with the subject:

    URL;URL;...;URL

    The mail bot downloads the files at these URLs, XORs them together, and mails them out to the requestor.

    So, a mailto URL (a link) is enough to get the files.


    -Dave Turner.
  • I don't think in the US a judge can do that - if there's an innocent interpretation, which is easy to arrange. Especially if there's no evidence that Alice and Bob are cooperating. If Alice claims her data is just a 1/nth XOR of part of the bible, and can prove it, she's safe, and her data is safe. Same with Bob. Mathematically, assuming there's no creation dates (important!), there's no way to know who started with random data, and who XORed against it.

    WRT: "Outlaw the system that did this, as it is subversive (which it is!). "
    If we assume a police state, there's no hope for *any system*. If this is illegal, then encryption is illegal, and we're screwed anyhow. Let's focus on finding security holes in the existing legal system, and improving our system when they fix the holes. This hole is, IMHO, unfixable without destroying the presumption of innocence - and then we might as well move to Sweden :)


    -Dave Turner.
  • Yet again a megacorp trying to associate its product with the values for which this country was founded
    An NYU grad student + a couple of bored AT&T Lab guys != Megacorp
  • as long as DeCSS is legal in europe or any other wired country/continent/datahaven, they won't be able to get rid of it.

    //rdj
  • Freenet has a lot to offer. But it's also a different sort of thing, IMHO.

    I see this split as similar to the difference between ftp servers and web servers. Freenet is designed to serve up files without anyone being able to stop it. Publius is intended to serve up words (web pages, in this case) without anyone being able to tell who wrote them.

    I believe there are enough niches for Freenet, Publius, and whole host of other privacy/anonymonity-guaranteeing ideas to coexist.


    Jonathan David Pearce

  • Maybe this project is comissioned by Pink Floyd? I remember the Publius Enigma, the only advise that some guy gave is "keep talking", and I think someone hinted that it had something to do with the internet. Did anyone ever track down that guy who was giving advise to people who claimed he knew the secret?
  • Bootleg Mp3s are fine

    its the studio recordings they don't want you trading
  • Not to get off topic too much, but Lincoln was never against slavery. He was against the <i>spread</i> of slavery. The Civil War was fought not over slavery, but over whether the States had a right to cecede from the Union--not because the states had slavery.
    <p>
    --
    Ececheira
  • has anyone noticed how you go to some web pages and the add at the top displays right away while it takes forever for the rest of the page to load.

    Some part of that's gotta be deliberate!
  • The most important thing, and I can't emphasize this enough, is that these guys have a system. This is not some theoretical, pie-in-the-sky wouldn't-it-be-nice dream, like the XOR business was. They have the details and mechanics of publishing, retrieval, and updating worked out. You may read the paper yourself if you don't believe me.
    Of equal importance is these guys know what they are doing. Avi Rubin has a reputation in the academic crypto community. Crypto is one of those things that every programmer thinks they know enough about it, but it is a very involved and subtle art. It takes years of study and experience to design protocols that can withstand attack from real cryptanalysis.

    Burris

  • After all, it will be very tough for some politician in Washington to come down against an anonymous publishing system that deliberately evokes the Founding Fathers' own belief in the occasional need for anonymity.

    yeah, those pols are pretty gutless, aren't they? I can't stand people who will accept anything as right and good if you can make even a tenuous link to a "founding father".

    IMHO annonimity is respectable only for expressing your own opinions or artistic work. Your own, because people who annonymously "provide" other people's work are screwing the actual authors/creators and opinions because facts provided annonymously are useful only as tips - an idea point for you to launch your own investigation.

    Thought - why exactly was Publis used by the FFs? I can think of a few possible reasons, most of which aren't really related to modern "privacy" concerns.

    -kahuna Burger

  • Hmmm ... well, two of the authors work for ATT, the third is at NYU. But even the two working at ATT doesn't mean that ATT as such has anything to do with this. People tend to work somewhere, most working people work for others or with groups.

    Besides, what is important is Does the concept work?, not what is the source of the idea. The concept has been published, if it looks good implement it. The only attack is ATT patenting it, in which case it does us no good for a number of years.

  • Source Code, by American legal definition, is a means of public speach. As such, DeCSS creators would be protected from lawsuit if they were American. Even the DMCA can't limit the rights of the people as presented by the constiution. Yet.
  • Definitely 11 -- and definitely NOT any shower scenes involving Jon Katz. Not that there's anything wrong with that....
  • "Of course, there's nothing stopping someone from splitting an MP3 into several files, a la Usenet pr0n."

    Technically, that is true. But I doubt anyone is going to go through the time and trouble to split up their collection of, say, 100 MP3s into (figuratively) 300 zip files when they can just share them via Napster or Gnutella and be done with it.

    --
  • But they did limit the rights of Americans publishing DeCSS, under DMCA &/or UCITA (I get the exact details confused sometimes). So "yet" is "now".

    The rights of the people as outlined in the US Constitution are very limited. The Bill of Rights was a compromise between those who wanted guarantees of rights written into the document, and those who didn't want to imply that the rights not explicitly granted were denied. As such, they wrote two Amendments which explicitely state the (hopefully) obvious: government only has the right to do what it is explicitely ordered to do, and the people have rights to do anything not explicitely disallowed. Those Amendments (listed below) seem to have been ignored this century, except for rare cases when it seemed to serve some other purpose.

    Amendment 9:
    The enumeration in the Constitution of certain rights shall not be construed to deny or disparage others retained by the people.

    Amendment 10: The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.



    Louis Wu

    Thinking is one of hardest types of work.

  • As far as your last comment about tunnelling "... secure data through HTTP" goes, I think ATT&T Labs [att.com] is working on a proxy system [att.com] intended for anonymity. Although, I don't see anything addressing encryption, per se.
  • (maybe a little off topic, but interesting anyway)

    Anyone remembers the Publius - Pink Floyd story at the net, some years ago? Anyone has something new?

    If you want to know what I am talking about, look at Introduction to Publius and the Enigma [www.uio.no].

    Fh

  • For the longest time those who believe in copyright monopolies and those who believe in hardware patent monopolies managed to get along because both are phony peoperty rights, and they didn't want to bring attention to themselves by attacking the other. But the simple fact is that patent monopoly wealth and copyright monopoly wealth are often incompatible as the stint between MS and IBM, and the problems with Apple clearly showed. But now a drastic new turn of events has happened, big patent people like IBM and ATT are turning their backs on copyrights because it is simply more profitable (eg the adoption of Linux suverely reduces software costs, and the unhibited flow of information greatly increases demand for AT&T's networks). This means that all hell will break out soon because the copyright lords have bet trillions of $$ on the assumption that copyrights are a basic property right, and the patent lords stand to loose trillions if copyright monopolies continue. Throw the huge market for embeded devices into the mix, the market pressures to have anonymous and easy to use digital cash, and we have a formula for all hell breaking loose.

    Something similar happened with rail-road and factory technology just before the economic presures of plantations trying to expand and factories trying to get labor boiled over into an outright disaster. There were a lot of smart, rich, and educated people who never saw it comming then - and I doubt they will see it now, but with so much at stake it is bound to happen and there really isn't any turning back. And unfortunately in this case there is no defined north and south - if all hell breaks loose it will be much more localized and much more confusing.

    The best thing to do is just to understand how bad copyrights and patents really are and aviod them whenever you can.

  • I haven't listened to Metallicrap since "Master of Puppets", so I have no mp3s
    of them.

    Salute on the server! God knows that free publication in the modern world is
    starting to get scarce...
  • that's probably why our great founding fathers (and Alex Hamilton) used publius as their nom de plume

  • "because they cannot abide slavery any more than we can abide them"-- Abraham Lincoln on what to do with the freed slaves. IANAR (I am not a racisist) but I'm not so sure about Lincoln.
  • Looks like it ay work , I think I have seen the idea somewhere before though,

    Once again there will be hundreds of 56K modem users signing up and making the service unusable at most times?
    As for getting my Metallica collection........... Go and > /dev/null yourself.

    Nard
  • I totally agree with you on that one, I need something new or interesting to bitch about like errr..errrmmm..... It can have all been done can it?
  • (I vote for 0x40041)

    Specify the set of bit flags that determines the contents and behavior of the scene:

    0x00001 CmdrTaco
    0x00002 Hemos
    0x00004 michael
    0x00008 Jon Katz
    0x00010 Roblimo
    0x00020 Janet Reno
    0x00040 Bill Gates
    0x00080 everyone at Intel
    0x00100 Jack Straw
    0x00200 Metallica
    0x00400 Hemos' new wife
    0x00800 CmdrTaco's gf
    0x01000 Natalie Portman
    0x02000 Cowboy Neal
    0x04000 Whalen Smithers
    0x10000 in a prison shower scene like in "Caged Heat"
    0x20000 in a prison shower scene like in "Cellblock Cumpanions"
    0x40000 in a scene like final of "Red Heat"

    Last three choices seem to be mutually exclusive.

    P.S. Why I'm unable to use <pre> tag here?
  • Actually, why encrypt the data at all? A publishing system which is extremely distributed, like gnutella for example, is completely impossible to shut down! How could you ever? If you block ports, why not make a distributed server system that runs via HTTP? My idea is this:

    Everyone who wants to use the data runs a server (there is no separate client, like gnutella). You publish data on your own server, if you are a publisher. Data leaving the server (being read by another person on the network) recieves a lifespan by the original server. The file will die when this time has passed. But once it has left the original server, it can either be downloaded from that server, or from whomever downloaded the data. This way, data is distributed on many sources but is still updatable (web content for example could be given a lifespan of 24 hours or less, as a book could be given infinite lifespan, since it doesn't need to be updated).

    This network would be virtually impossible to shut down (like gnutella is) since no one source can be targetted (there is no need to tag data so that the data knows where it is coming from, it only needs to know how old it is and when it dies).

  • Yep, you definitely proved that last statement....
  • I'm not sure what it is that you wish us to discuss in this thread? Surely both topics of freedom of speech over the Internet and the Mettalicrap vs. Nabster issues have been beaten to death. Seems like an open thread ripe for the trolls, flamers, and bored kids with nothing to do....
  • by Anonymous Coward
    Requests for files are sent from one node to the next, and the files themselves are sent back along the same path. Nodes have no way of knowing whether the machines that send them requests are the original requestors, or are just forwarding from elsewhere. Nodes that receive files have no way to determine whether the sending machine had the file or is just forwarding from elsewhere. Every machine that receives and forwards a file also caches it, so the fact that a machine has a file does not imply that the machine owner knew anything about it. All search keys are hashed with SHA, which becomes the filename, but encrypted by the plaintext searchkey, so the person requesting the file can decrypt it, but all the machines hosting the file have no way to determine the decryption key, other than by trying all possible searchkeys. Barring some pretty expensive types of attacks on particular nodes, you have plausible deniability the whole way.
  • Once you can demonstrate to a judge that these two pieces of information, when run through a computer, create the censored document, most judges will either:
    • Order the destruction of the machine and/or wipe all the data off it.
    • Delete both pieces of data, regardless of "interdependencies" - think of the phrase "reasonable doubt". They don't understand math, they just see what is shown to them.
    • Outlaw the system that did this, as it is subversive (which it is!).

    That's pretty standard for most any country, with the exception being that maybe they won't label it "subversive" in the US - they'll call it a national security risk instead. :\

    The system needs to ensure that brute-forcing the database cannot occur, otherwise interested parties would take that information to the judge and get it removed, and possibly have the service shut down. If, OTOH, brute-forcing wasn't possible, then they could only remove data on an as-discovered basis - making the database a hundredfold more resistant to attack.

  • I did some number crunching on a system like this, and the results aren't encouraging. Here's my (probably broken) math, enclosed in an e-mail to someone who actually knows how to do these kind of calculations...

    First some background..

    If you take a stream of random data, and XOR it with your
    plaintext, and then delete the plaintext, it's still possible
    to recover the plaintext by doing this:

    A ^ B = C - encrypt

    B = A ^ C - decrypt

    Given that, let's assume you create a server filled with
    XOR'd 'packets' - files of a preset size, we'll say 1MB.
    These packets are each assigned a key. Every packet has
    a unique key.

    The system works by allowing you to check in an arbitrary
    number of packets. Once those packets are in the system,
    they begin to be propagated through the network. Important
    point - the network is protocol agnostic - it'll happily
    run over http, ftp, or even finger if you're masochistic.

    Since each packet is identified only by a GUID it's
    impossible to know who created it, or which other piece
    of data it needs to be XOR'd with to recover the plaintext.

    And this is the math problem. In computing, it isn't
    hard to simply brute-force something, and this system is
    no different, except in how the brute force occurs. In
    this case, we would download a complete copy of the database
    and then grab one piece of the data and then sequentially
    XOR it with every other piece of data on the system until
    you find something that looks like plaintext.

    Since each piece of data should, in theory, have a counter-
    component, how many packets need to be in a system before
    decryption via brute-force becomes not feasible? Not
    feasible would be somewhere in the neighborhood of 2^64
    operations, or about 1.8*10^20.

    Unfortunately, I've realized that if someone knows that
    one piece is half of the plaintext, you only need to
    download and XOR every other file in the database once
    to recover the plaintext. So if I had 20GB of data,
    this would amount to a mere 20,480 operations. :( Not
    very strong! In order to make it so that 2^64
    operations would only exhaust .5% of the keyspace,
    it is necessary to have 3.6*10^20 packets in the
    system!

    Doesn't this require about 3,518,437,208,883,200 terabytes
    of storage? I hate math. It shot down a perfectly
    good idea. :) Can you double-check my numbers and make
    sure this is the right conclusion?

    --
    Signal 11
    The makers may make and the users may use, but
    the fixers must fix with but minimal clues
  • All this Alice xor Bob = Secret scheme gets you is Alice and Bob both named equally culpable co-defendants. Is any judge or jury going to believe that Alice's data was just random and by some amazing coincidence, turned out to be the Secret when XOR'd with some other data? You can do a doubly linked list with a single pointer per node and xor tricks, and far from obscuring both nodes, the same data item reveals both pointers. By the time you're in court, you better have a stronger case than Alice's (and against Scientology, you have mountains of case law on your side)
  • Comment removed based on user account deletion
  • Perhaps you've read the following little ditty from the Lincoln-Douglas debates:

    I will say then that I am not, nor ever have been in favor of bringing about in anyway the social and political equality of the white and black races - that I am not nor ever have been in favor of making voters or jurors of negroes, nor of qualifying them to hold office, nor to intermarry with white people; and I will say in addition to this that there is a physical difference between the white and black races which I believe will forever forbid the two races living together on terms of social and political equality. And inasmuch as they cannot so live, while they do remain together there must be the position of superior and inferior, and I as much as any other man am in favor of having the superior position assigned to the white race.

    Not too sure I'd be taking any of his prognostication as gospel...

    Cheers,
    ZicoKnows@hotmail.com

  • Publius, because it's be AT&T researchers, is only for free speech and protecting rights of chinese citizens, unlike of course FreeNet that is only useful to child pornographers and copyright violators. grumble

    Not to dis the usefulness of this type of service, but the press Publius is receiving as opposed to the extremely negative and unresearched press FreeNet has gotten really torques me off.
  • All that is changed so far is the name.
    I run the linux "file" command on anything on my server,
    and decide what I may want to look at for myself.
    The key is hashed, and while there are plans for it,
    no data is yet modified.
    Even then, if the data is stored locally, any
    system-wide encryption can be broken,
    and there will be a mehtod to read locally stored files.

  • Great! But a problem I see is that in a dictatorship like the US (jk sort of). It seems highly likly that simply having the client for a program like this could be punishable. So there needs to be some kind of system for someone to be able to anonymously use the program in the first place, which seems rather impossible. Maby a distrubuted java signed app? :)
  • In my life, I'm starting to really believe in the concept of social evolution. We have no right to judge Lincoln on how we view things today, because the world had not been awakened to the fact that the races are equal. At that moment the world (most of it at least) was still awakening to the fact that people should not be enslaved. If you had proposed to Lincoln that evolution be taught in school, then he probably have opposed it. Lincoln could not have seen 100 years into the future, just like we can't see 100 years into the future. Lincoln's feelings then do not excuse those people who have those feelings now. We currently have more than enough evidence to show that the races are equal, and that there is no rightful postion of authority. I will not support any use of Lincoln's statements in a manner which seeks to excuse racism. To that effect, I don't think that Zico is a racist, just trying to point out that Lincoln was human.
  • Well, I must admit that there are several slashdot authors who could use a stint in the pokey.

    But I'm conflicted here, since you and I are fellow Censorware Project Members [censorware.org], and I'd hate to see a CWP colleague in jail.

    Besides, since IAAL, you'd probably just try to mooch legal services from me, so I guess I'll pass on the opportunity. ;-)

  • The Romans had an interesting way of structuring their names. For men, a name would be composed of individual name, family name, and father's name.

    So Publius Virgilius Maro would have been called Publius, or Publius Virgilius. His father's name would have been Maro Virgilius and whatever Maro's father's name was.

    If Publius Virgilius had any sisters, they would have all had the same name - Virgilia. Yep - the female form of the family name. If there were more than one, they would have had nicknames of some sort, but technically...well...let's just say Roman women didn't have much in the way of name choice.

    Here's another example, from one of the textbooks used in my Latin classes - Quintus Horatius Flaccus. The fifth son of the flabby man. You're probably familiar with 'Horace', right? Same guy. We know he had four older brothers (else why the 'Quintus'?). And any female siblings he had would have all been named 'Horatia'.

    What I don't understand is why people feel they have to shorten or mutilate the Romans' names... I mean, sure, I can understand referring to a person by their surname/family name. But why change it?

    And don't even let me get started on the butchery done to Latin poetry when it's 'translated' into English. So much is lost and changed that reading it in the original Latin is a completely different experience.
  • I maintain a comprehensive list of related projects here [utexas.edu].
  • At the server page, it specifically states that files larger than 100k cannot be stored.

    Of course, there's nothing stopping someone from splitting an MP3 into several files, a la Usenet pr0n.


    ---
    Zardoz has spoken!
  • Doesn't quite work like that. Its about preventing data from being censored. Example: I have the top secret secrets of the secret society (X). Encrypted with random data A gives B.

    I have the noble and heroic story of the noble hero (Y) and the constituition of the contitutional country (Z).

    Y is encrypted with B to give C. Z is encrypted with A to give D.

    The secret society seeks to ban X. Obviously they can't ban A. A isn't part of X. A is an important part of the constitution (Z). They can't ban B. B isn't part of X. B is part of a piece of famous legend (Y). C and D have nothing to do with X, so they're safe. It simply means that no data can be removed because all data is dependent on all other data. Of course, by XORing everything with everything you could find everything thats hidden. But so what? What can you do with it?
  • While I think that the distributed hosting concept could theoretically work, I am scared to set up a server because of the legal ramifications. Even though I have no idea what the system stores on my machine, one of the files could contain copyrighted material or child pornography, and I could theoretically be held responsible.

    In order to fully protect the hosts, the system would need to perform some form of redundant striping across the entire network. That way, I would only have a useless portion of a file along with symbolic links to the locations where the remainder of the file could be downloaded. If I only have part of a file, that is useless without the other portions, then I am doing nothing illegal.
  • I can see it now... the enemies of this system will simply dump HUGE amounts of meaningless data into it, overwhelming the given storage space.
  • Virgil was Publius Virgilius Maro.

    I'm sure there were many other people named "Publius" at some point in time, but I would venture to say that he is probably the most well-known one, as well as being far older than the others you cite.

    The Romans had a very, very limited number of first names, only about 30 in fact. Some of them were stunningly unoriginal; Quintus and Sextus, for instance, literally meant fifth son and sixth son. That means that there were a truly massive number of Romans who were named Publius, like Publius Cornelius Scipio Africanus. In fact, there was a terribly severe degeneracy of full, proper names among the Romans so that many famous Romans wound up with four or even five names in order to be uniquely identified.

    It was very popular in the Revolutionary and post-Revolutionary period to draw deliberate parallels between the colonies/U.S. and Republican Rome. There was a popular comparison between George Washington and Cincinnatus, for instance. The name Publius was probably chosen by the writers of the Federalist papers because of the obvious Roman connotation and because of the similarity between the name Publius and the idea of being in the public interest.

    The people who created the Publius project are the ones who mentioned the use of the name by the writers of the Federalist papers, not the folks at Slashdot. I think that it's a pretty clever idea, as it does a good job of pointing out the need for anonymous publication. After all, it will be very tough for some politician in Washington to come down against an anonymous publishing system that deliberately evokes the Founding Fathers' own belief in the occasional need for anonymity.

  • by Anonymous Coward on Friday June 30, 2000 @03:21AM (#966581)
    Freenet does encrypt files. They are labeled and retrieved by the (SHA) hash of the filename, and encrypted by the plaintext of the filename. So the person retrieving the file can decrypt it, but the server hosting the file has no way to reverse the search key to get the decrypt key. The only way the server can determine what files it stores is for it to hash all known searchkeys and see if any of them match--possible, but infeasible if there are lots of files, certainly provides deniability.

    There is one drawback to splitting files--if you have all the pieces on your machine, it's pretty likely that you intentionally retrieved or posted the file. From a deniability perspective it might be better to have a number of standard sizes for whole files.

  • by jetson123 ( 13128 ) on Friday June 30, 2000 @03:13AM (#966582)
    I think we have seen that information is subject to a lot of restrictions in democracies as well. Cryptography, violent content, politically extreme or "undesirable" content, and sexual content have all been restricted by democratic governments. And technical information, criticism of products and corporate behavior, and other content that businesses don't like get shut down using the legal, patent, trademark, and copyright systems of democracies.

    Something as simple as planning for secure tunnels through HTTP is not going to work because those accesses will stick out like a sore thumb among normal network traffic in restrictive environments. The presumption will simply be that if you use any such mechanisms, you must be doing something bad.

    One way I see to address this problem is to design protocols such that everybody accesses the Web in a way that content is encrypted and distributed. But unless we can engineer a very good business reason for that, it won't happen because it's more expensive and more complex than the simple-minded plain-text HTTP approach being used right now.

  • by SydBarrett ( 65592 ) on Friday June 30, 2000 @12:21AM (#966583)
    I know this may be a bit off topic, but the first thing I thought of when I saw the name "Publius" where the postings to alt.music.pink-floyd a few years back. For those of you who don't know about that:

    http://www.tapscott.com/~robp/enigma.html

    A hoax, maybe, but there are a few odd sound cues in the "Division Bell" album ("the cave" snd the odd counting during "Lost for words"). And during "Another Brick in the Wall pt.2" (from a ealier album) there are sound effects near the end of the song of kids yelling. At 3.47, one kids yells something that sounds like "Enigggggma!". It's wacky, man....

  • by Kwikymart ( 90332 ) on Thursday June 29, 2000 @10:21PM (#966584)
    I think this this kind of situation would suit a DeCSS mirror more than whole bunch'o' Metallica mp3s. I think the idea is to have documents (code?), not a whole bunch of mp3s and the ineviable fake britney spears porn pic. This way DeCSS will be 110% impossible to get rid of ;-) (short of the world exploding)
  • by Zaffle ( 13798 ) on Thursday June 29, 2000 @11:57PM (#966585) Homepage Journal

    From my quick read of the article, it appears that although the data is copied onto numerous servers, there is still some list of central servers.

    If, like the gnutella system, it can be total distributed, and no central server(s) (to attack), then it is a good thing(tm). However if like napster or IRC servers, there are a specific list of central servers, which doesn't change often, then there can be points of attack (legal attacks I'm meaning).

    Freenet is (afiak) totaly distributed, and the data is spread accross many many servers (run by clients, like gnutella), which in my opinion is a good thing(tm). Each server can only see that a client is downloading some random chunk, and never sees the entire file. So I can download mp3s without any of the servers I'm getting them from knowing what I'm getting.

    I'm not sure if the content on freenet servers are encrypted at all, so it might be obivous if you have a chunk of a file on your server that has an MP3 header in it, that people getting that chunk are getting an mp3.

    If this system works like freenet, but offers encryption of the content, then that would be a very very good thing(tm).

    The sort of system I'd be looking for is something where:

    Files are split in small chunks, and the chunks are distributed to many servers, with many duplicates (eg serverA and M may host the same chunk of the same file).

    Files stored on the server are encrypted. The key is stored in part with the server. (eg to get the whole key, you need to get the whole file, from different servers

    Its impossible to tell what the name/url of the chunks you have on your server are.

    Totaly distributed (like gnutella), with enough redundancy that almost all files are available online right now.

    May be a pretty difficult system, but as I said, AFIAK, FreeNet is something close to this.

    ---

  • by Dwindlehop ( 62388 ) on Friday June 30, 2000 @05:03AM (#966586) Homepage
    Anyway, this "Eternity service" doesn't have anything like that. Here, Kobrin will say "Is there anything else that this data could have been?" and "Could these have been key shares to any other data?" Alice will have to say "No."

    I believe you're missing the point. After reading the Publius paper [nyu.edu], I have these points to offer:

    • According to the paper, when a server receives its share of the key and data, "At this point, the server has no idea what it is hosting - it simply stores some random data." They are incapable, in fact, of determining what is on their server--they haven't the full crypto key.
    • When a user wishes to retrieve some data, "In our implementation, all of the work is handled by the proxy." Handling this by proxy means that Helena is going to have a much harder time tracking down where the data is kept. If she does, the server will have no record of who publish the secrets, or even knowledge that the secrets were published! Perhaps it is possible to discover on which servers the disparate parts of the secrets are kept. If it is, Helena still will not be able to tell who originally published the secrets.
    • Publius by itself does not provide any sort of connection based anonymity. This means that an adversary eavesdropping on the network segment between the publisher and the Publius servers could determine the publisher's identity. If a server hosting Publius Content keeps a log of all incoming network connections then an adversary can simply examine the log to determine the publisher's IP address. To protect a publisher from these sort of attacks a connection based anonymity tool such as Crowds should be used in conjunction with Publius. (taken from section 5.4 of the paper)
      So, Publius can't defend against that sort of attack, but assuming the publisher does indeed manage to get his data published anonymously, perhaps through the use of anonymizers (which is what Crowds is) or encryption like SSL, his anonymonity cannot be broken. That is the point of this system.

    There's a lot more in this 14 page paper--it's very rich. It particular, it examines the attacks that an adversary could make against Publius and what safeguards could be put in place.

    The most important thing, and I can't emphasize this enough, is that these guys have a system. This is not some theoretical, pie-in-the-sky wouldn't-it-be-nice dream, like the XOR business was. They have the details and mechanics of publishing, retrieval, and updating worked out. You may read the paper yourself if you don't believe me.

    Unfortunately, I'm in no position to evaluate the strength of the crypto here. I would very much like to see someone with knowledge in this area come forward with an opinion after having read the paper.


    Jonathan David Pearce

  • by krystal_blade ( 188089 ) on Friday June 30, 2000 @12:38AM (#966587)
    A couple years ago, I heard a fairly old hacker telling me about privacy and the internet. I had raised concerns about cookies, and the information they contain, or could contain. His response was:

    "The internet was not, and still is not designed for privacy. Your privacy is your problem, so YOU take care of it."

    And he's right. Anonymity, and Privacy go hand in hand. Want to be anonymous? It can be done through YOUR actions. Want privacy? Don't plug in a computer you store your SSN on to the 'net.

    The issue of censorship, and free speech, especially on the internet, is easily remedied. First, know that by posting something on the internet, you create LOGS. And with LOGS, YOU can be found out. As long as you are who you say you are...

    Authors of yesteryear who published anonymously, or under assumed names did so knowing that what they wrote, and stated could possibly be traced back to them. For them, it was a way to express their ideas, without blatantly telling someone who wrote the article.

    The resoures available on the internet today are far greater than those of yesteryear. (Unfortunately, the techniques used to track someone down are better too) Privacy an Anonymity can be obtained through careful planning, thinking, and actions.

    If you want the "net-life" of a spec op, you better damn well start acting like one.

    krystal_blade

  • by Paul Johnson ( 33553 ) on Friday June 30, 2000 @02:27AM (#966588) Homepage
    Then she gets her friend Christine to publish to usenet (or whatever) "Hey look: Alice xor Bob = Secrets!"

    This is the vulnerable point in every such scheme I've seen. The "recipe" which gives you the decrypted data has to be held in an identifiable location, and that location is therefore vulnerable to being shut down. Whilst the law seems pretty undecided on whether HTML linking is equivalent to publication, I'm pretty certain that this much more specialised kind of link is going to be counted as the publication. A better way of describing it might be as the "key" to the data. Either way, thats the weak link in the whole scheme.

    On the subject of the various forms of abuse, any system which can withstand the unfriendly attentions of a dictatorship will be wide open to this kind of abuse, because our police have to abide by civil liberties while those in a dictatorship can ignore them. Hence if you can use it to publish banned data in a dictatorship then you can always use it to publish banned data in a democracy.

    The real way around this problem is to site the servers in democracies and then design protocols to make it very difficult to block access from the dictatorships short of shutting down foreign access altogether. This is probably best done through proxy servers that tunnel secure data through HTTP.

    Paul.

  • by prizog ( 42097 ) <novalis-slashdot@nOSPaM.novalis.org> on Thursday June 29, 2000 @10:21PM (#966589) Homepage
    This won't work. It won't work because there's no deniability.

    Remeber the last anti-censorship system on /.? The XOR-based system? That had deniability. Consider:

    Alice wants to share scientology secrets with the world. Alice looks around, finds Bob's chunk of random data, and XORs the scientology secrets with Bob's data. (In a real situation, she would also use Barry's, Bonnie's, and Billy's, but let's keep it simple). Then she gets her friend Christine to publish to usenet (or whatever) "Hey look: Alice xor Bob = Secrets!"

    Helena Kobrin (scientology lawyer) drags Alice and Bob. Alice says "I put random data up, Bob XORed Scientology secrets with my data." Bob says "I put random data up, Alice XORed Scientology secrets with my data." Mathematically, there's no way to tell who did it. There's also an easy way for both Alice and Bob to show that their data is innocent - just have Charlene and Darlene xor bits of the bible with Alice's and Bob's data, respectively, and say "We were just (independently) trying to get the bible into Iran/China/Libya..."

    Anyway, this "Eternity service" doesn't have anything like that. Here, Kobrin will say "Is there anything else that this data could have been?" and "Could these have been key shares to any other data?" Alice will have to say "No."

    At best, Alice is an ISP - and under the DMCA, she'll have to take it down until it's proved non-infringing (never). In the XOR system, all she needs is Charlene to prove it's innocent.

    That's my 2 cents, anyhow.


    -Dave Turner.
  • At the server page [nyu.edu], it specifically states that files larger than 100k cannot be stored. I quote:
    • Could the Publius Server Software completely fill my disk with Publius Content?
      Yes, the Publius Server could completely fill your disk with Publius Content. For this reason you may want to have Publius Content stored on its own partition or own disk. The Publius Server limits the size of individually published files to 100K.

    (emphasis mine)

    It looks like this was designed to specifically avoid mp3s and pr0n. Probably, they wanted this to be more similar to the original, anonymous federalist papers in that it is more intended for writings that may be offensive to the government of the writers' respective countries. Of course, in the U.S. it will probably just fill up with instructions for bombs and drugs. But one of the prices you pay if you host anonymously is that you take the chaff together with the wheat.
  • by Sir_Winston ( 107378 ) on Friday June 30, 2000 @12:10AM (#966591)
    You're on to something. This would make a great poll:

    Who would you most like to see in jail?

    1) CmdrTaco
    2) Hemos
    3) michael
    4) Jon Katz
    5) Roblimo
    6) Janet Reno
    7) Bill Gates
    8) everyone at Intel
    9) Jack Straw
    10) Metallica
    11) Hemos' new wife, CmdrTaco's gf, and Natalie Portman, in a prison shower scene like in "Caged Heat"
    12) Cowboy Neal and Whalen Smithers, in a prison shower scene like in "Cellblock Cumpanions"

    Of course, poor Jon Katz would win, even though in our hearts we all know we want that prison shower scene with the girls. Except for the ten percent of us who studies say would want to see the Cowboy Neal/Smithers scene... :-)

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...