At Blockchain-Based Privacy Infrastructure Startup Nym, Chelsea Manning Says Crypto = Privacy (theblockcrypto.com) 57
"I do want to shift the culture away from crypto being associated only with cryptocurrency," Chelsea Manning recently told a digital assets news site named the Block.
In a world where celebrities are coughing up more than half a million dollars for a jpeg of a cartoon ape, Manning says that the sector has "unequivocally" been overrun by greed... She says this has resulted in a huge misunderstanding of crypto by critics, drawing it away from its privacy-focused roots.
"Without cryptography, my entire life history wouldn't have been able to take place," she says. In 2010, Manning, then a soldier in the US Army, used encrypted communication services to disclose classified information to Julian Assange, which was later posted on WikiLeaks.
Now, she's a part of privacy blockchain startup Nym as both a security analyst and serving in a hardware optimization role. The Switzerland-based Nym is a decentralized network that uses blockchain technology to mix and scramble packets of metadata — e.g. your IP address, who you talk to, and when and where.... Manning sees Nym as the successor to privacy tech such as the Tor browser and VPNs.
Tor, however, has been used both as a way for people in unstable countries to access information and by bad actors looking to access dark web marketplaces such as The Silk Road. Nym says that there are disincentives put in place to stop such abuse via the validation and verification of actors running the nodes on the network. And while blockchain technology is often associated with transparency as opposed to privacy, Nym says it is only the nodes of the so-called mixnet that are ledger-based — and none of the data itself is stored on the ledger. Manning and her colleagues at Nym hope that its mixnet can act as the infrastructure upon which applications can be built to create a privacy-focused internet.
By doing this, they hope to foster an alternative to surveillance capitalism — a term coined by academic Shoshana Zuboff to describe the tracking and commodification of personal data shared online for profit by big tech.
"Without cryptography, my entire life history wouldn't have been able to take place," she says. In 2010, Manning, then a soldier in the US Army, used encrypted communication services to disclose classified information to Julian Assange, which was later posted on WikiLeaks.
Now, she's a part of privacy blockchain startup Nym as both a security analyst and serving in a hardware optimization role. The Switzerland-based Nym is a decentralized network that uses blockchain technology to mix and scramble packets of metadata — e.g. your IP address, who you talk to, and when and where.... Manning sees Nym as the successor to privacy tech such as the Tor browser and VPNs.
Tor, however, has been used both as a way for people in unstable countries to access information and by bad actors looking to access dark web marketplaces such as The Silk Road. Nym says that there are disincentives put in place to stop such abuse via the validation and verification of actors running the nodes on the network. And while blockchain technology is often associated with transparency as opposed to privacy, Nym says it is only the nodes of the so-called mixnet that are ledger-based — and none of the data itself is stored on the ledger. Manning and her colleagues at Nym hope that its mixnet can act as the infrastructure upon which applications can be built to create a privacy-focused internet.
By doing this, they hope to foster an alternative to surveillance capitalism — a term coined by academic Shoshana Zuboff to describe the tracking and commodification of personal data shared online for profit by big tech.
Re: Yawn (Score:5, Insightful)
Re: (Score:1)
Re: (Score:2)
It is traitorous to support your own governments war crimes. It is traitorous to excuse your government from doing better.
I'm pretty sure the supporting your own side's war crimes while opposing enemy war crimes is the opposite of being traitorous.
Despicable? Yes. Traitorous? No.
Re: (Score:2)
Not holding your own country to its professed highest standards is betraying your own country. It could not be clearer.
Re: (Score:2)
It is traitorous because it supports the ultimate decline of your own country..
All countries decline. All empires end. No matter whether I wave flags or jump on one leg or hold my breath, this will happen.
Re: (Score:2)
Not waving flags.
The reason why those countries decline is because people don't hold the government to account. The uncritical flag wavers are the ones that lead countries to decline.
Re: (Score:2)
Not waving flags.
Whatever little games you want to play, you can't stop political entropy. I just made that term up, but I bet someone smarter than I has used it before.
The reason why those countries decline is because people don't hold the government to account.
Citation? Isn't corruption (i.e. widespread, direct "involvement" in government) often cited as a reason countries decline?
"Political entropy" sounds even better to me now.
Blockchain has been used as evidence (Score:4, Informative)
Given that people have now been arrested for insider trading *USING THE BLOCKCHAIN AS EVIDENCE* I don't think it provides the promised privacy that is described here. Whether that evidence is admissible, is indeed a debate.
https://www.concordlawschool.edu/blog/news/admissibility-blockchain-digital-evidence/ [concordlawschool.edu]
Re: (Score:3)
Your link says nothing about any insider trading crimes that were committed or any evidence that was obtained through a blockchain...
Remember folks, just because someone throws out a link doesn't mean it has jack to do with shit. Especially here on Slashdot
Anything "disincentivizing abuse" weakens it (Score:2)
Privacy and anonymity only work absolute or not at all. It's like censorship. There isn't "a little bit". As soon as you have something in place that "disincentivizes" the use for a particular purpuse, aka "abuse", you can trivially redefine what "abuse" means and use it against that as well.
Re: (Score:2)
I'm reasonably sure that was an attempt to say that it builds in a mechanism to make abuse less profitable. It's always potentially profitable, depending on the potential reward. Making it more expensive stops many actors. But if you're communicating on the internet then there's always a risk that your traffic can be deanonymized, and it's safest to assume that all traffic on all backbone links is monitored and subject to snooping. Clearly nobody is capturing everything, but you can bet every stream (or any
Re: (Score:2)
Privacy and anonymity only work absolute or not at all..
Isn't there some sense of defense in depth? Something where even if you somehow get access to my video feed I'm still wearing my animal mask so my identity is still hidden?
(Particular animal not revealed at this time - privacy.)
Re: (Score:2)
Have we finally found out who's responsible for Norway's entry for the ESC?
Re: (Score:2)
At that time it is pretty much too late. There will be too many clues in the video feed. For example, mains frequency variation and localized distortions are usually not audible but can be detected. Then there can be other clues. Power outlets can be used to localize you within a country or area. Products shown can be used to find out who bought them. Even keyboard sounds can potentially be used to find other instances where the same keyboard was used. You may also give biometric samles like body geometry,
Re: (Score:2)
Re: (Score:2)
The lock on your door needs physical access to attack it and that makes it a high-cost geographically local attack. We are not discussing these in this thread.
Re: (Score:2)
The lock on your door needs physical access to attack it and that makes it a high-cost geographically local attack. We are not discussing these in this thread.
Do have trouble with analogies?
The lock on my door sucks against an intruder who really wants in but keeps the casual burglar out. As you pointed out, there are many clues in a video stream that a casual viewer would not notice. If they were obvious you wouldn't have had to list them all, now, would you? Something doesn't need to completely secure me in every way to secure me in some ways.
Re: (Score:2)
And that is just it. There is no "somewhat insecure" crypto. It either is secure or it is broken. And given that even the NSA has had its hacker tools stolen, any backdoor will sooner or later become available to criminals. Anonymity is a bit different, as it is less of a yes/no question. Anonymity that can only be broken with very high effort and then only for one target is still fine for most things. Anonymity that can be broken on mass-scale is not anonymity at all, because sooner or later the non-honor,
A Blockchain is required in this case, because (Score:4, Insightful)
... they want to get VC funding?
Re: (Score:2)
Just from the summary, my first guess is that the blockchain is used as a directory of commitments to a pseudonym, as in Namecoin, and from there to set up channels through a darknet. Perhaps it gives some sort of reward for running a relay node.
Re:A Blockchain is required in this case, because (Score:5, Interesting)
At a quick glance they appear to be proposing a network similar to Tor, except that the exit nodes are validated via a blockchain. One of the issues with Tor is that whoever runs the exit node can see all the traffic going in and out of it, and if they control enough of them they can start to do pattern analysis to make the Tor network less anonymous.
Of course, with this solution you have to trust that Nym does a good job of vetting node operators, and that their values align with yours.
Re: (Score:1)
Re: (Score:2)
That's why no data goes on the blockchain, only a list of trusted exit nodes.
You might wonder why they don't just have the list served up via HTTPS with a GPG signature to verify it. I'm sure there is a very good explanation.
Re: (Score:2)
This brings up a quandary. You need enough data on the blockchain to protect against double-spending, but if you have too much, it becomes a privacy hazard. Some cryptocurrencies do it right, like Monero.
What a cryptocurrency needs is defense in depth. Tor nodes are one thing (assuming one doesn't burn the network to the ground with added traffic, because exit nodes are rare), but the actual currency needs ring signatures, blinding factors, and other anonymity. This also needs to be combined with a mech
Re: (Score:2)
Of course, you can trust someone else and use their stored blockchain DB... but that pretty much makes decentralization pointless, and at that point, just use PayPal.
Which is literally what happens now and will probably always happen, because end the end, the client-server model is efficient and what the vast majority of users want.
The goal is that if you buy a pack of smokes now with a cryptocurrency, you won't get a letter from your health insurance company a week later wanting a physical with bloodwork, else they charge you smokers rates. Or, 30 years from now, and running for office, people associating the brand of cigs you were using with some unpopular entity. The current blockchain on most cryptocurrencies only invites people to gather data and use the spending habits as a means of blackmail or extortion, so defense in depth is needed. Not just from current day attacks, but from attacks when quantum computers are common.
This and similar reasons are the correct argument for maintaining privacy using E2E encryption with PFS, but the blockchain has no secrecy whatsoever. Once you are associated with a wallet address, you're pretty much exposed just like when the government subpoenas a bank for your transaction records, only now there is no (in the USA) 4th amen
"alternative to surveillance capitalism" (Score:3)
alternative to surveillance capitalism
is that people actually seem to want it.
There's apps for everything. There's subscription based services for everything. A lot of the things we have apps and services for simply require paper and a pen.
Re: (Score:2)
I very much doubt "People want it". People just don't care.
Apathetic behaviour is so deeply ingrained in the human psyche, that taking advantage of it is incredibly easy.
Re: (Score:3)
Re:"alternative to surveillance capitalism" (Score:4, Interesting)
It's not unreasonable for people to want both convenience and privacy, though it is for them to expect it. We should be building and promoting systems that let them have both. Your online to-do list isn't a problem if it's encrypted on your device, and the client is FOSS and the server is standards-based. The only info you're leaking is that you're accessing it. Is that harmful?
What's more, there are organizations giving away storage that they don't prevent you from using with encrypted files, so I'm not sure why this isn't a thing being pushed harder by the privacy-seeking. Yes e.g. Google wants to monetize your use of Google Drive, but they will let you store files in it for free even when they cannot read the contents.
DOH and ECH so as not to leak which sites (Score:2)
Your online to-do list isn't a problem if it's encrypted on your device, and the client is FOSS and the server is standards-based. The only info you're leaking is that you're accessing it. Is that harmful?
Those pushing for DNS over HTTPS (DOH) and the encrypted ClientHello (ESNI/ECH) extension to TLS 1.3 have probably come up with all sorts of scenarios in which the domain names that you visit can and will be used against you in a judicial or extrajudicial proceeding.
Re: (Score:2)
Those pushing for DNS over HTTPS (DOH) and the encrypted ClientHello (ESNI/ECH) extension to TLS 1.3 have probably come up with all sorts of scenarios in which the domain names that you visit can and will be used against you in a judicial or extrajudicial proceeding.
They don't need it for an extrajudicial proceeding because they're sniffing the backbones. Never forget QWest [wikipedia.org].
It doesn't matter what kind of DNS you're using, unless you're taking extra steps to use one that respects your privacy, you are using one that doesn't.
Re: (Score:2)
It's not unreasonable for people to want both convenience and privacy, though it is for them to expect it.
But what they want is convenience and privacy for free which is less reasonable.
Re: (Score:2)
But what they want is convenience and privacy for free which is less reasonable.
I for one am willing to put in a not inconsiderable amount of work for free in order to see that they can have it, if it's clear what I'm working for, and it's clear that it's worth it. And I know I'm not alone.
Further, I don't think it's an unreasonable expectation. It's so very, very cheap to provide it that they really should have it essentially for free. They might have to pay some costs, but there is so much waste that really there's no justification for them not being able to have this.
To wit, it phys
Re: (Score:3)
"It's not unreasonable for people to want both convenience and privacy"
But it is unreasonable for them to expect convenience and privacy and no price tag. You pay, one way or another. People have proven that they prefer paying in privacy than in money.
Re: (Score:2)
But it is unreasonable for them to expect convenience and privacy and no price tag. You pay, one way or another. People have proven that they prefer paying in privacy than in money.
People have proven that they don't know shit about shit. Most of them aren't even capable of understanding these issues when you explain them using only short, simple words. Some of them are complicated, so they're rightly confusing; some of them are simple, but people willfully defend their own oppression because they've bought into a lie, and are willing to throw good effort (and money!) after bad.
Most people now spend all the time in the browser, literally. That means that application compatibility is re
Re: (Score:2)
Re: (Score:2)
Not enough people will pull out of the surveillance capitalism economy to sink it.
Re: (Score:2)
Privacy (Score:3)
Re: (Score:1)
Most Americans probably do not imagine that their information is captured by ICE’s surveillance
It's literally the opposite (Score:2)
All they're doing is storing an encrypted form of that in a permanent record. And hoping no-one ever cracks the encryption, because there's no deleting of it later - that's the entire point of blockchain.
Re: (Score:2)
I haven't looked into it but it seems like if part of their schtick is anonymity for users and the other part is validation of nodes then there's a big WTF in the middle since nothing stops nodes from logging. It's always been a problem for crypto networks that malicious actors could run nodes. [therecord.media] But if the blockchain is used to track and somehow control who can run a node then maybe it makes sense. You don't want that hidden.
Swing and a Miss (Score:2)
Re: (Score:2)
Lost the swing and became a miss, in this case.
like the guy knows anything about keeping secrets (Score:1)
privacy (say it like a brit) and secrets (say it like a yank) are the same concept. place no trust in a convict, no more than you do in trump or his band of bandits, to do anything right. i have spoken.
Time for a crypto dictionary (Score:1)
This guy is nuts (Score:2)
Ok, this guy maybe did something patriotic, or maybe traitorous. Either way, he is clearly mentally ill, is no real expert on anything, and should just be ignored and allowed to live out his pitiful life in obscurity.
crypto != cryptography, but... (Score:2)
Re: (Score:2)
Really? (Score:1)
God knows Chelsea Manning (Score:2)
is an authority on privacy.