Thread: On security and privacy (Internet Citizenship)

  1. #46
    Master Apprentice phantomotap's Avatar
    Join Date
    Jan 2008
    Posts
    5,108
    Ugh. No, just as Mario isn't sure this "hypothetical internet citizenship" will work and throwing it out there anyway, so am I. Discussion... ideas... feel free to ignore if you want...
    O_o

    "Ugh." indeed.

    You just blurted out "Though I'm not sold on this system, I don't know if it could be worse than the situation in real life right now.".

    You gave no indication you were you talking about a different system.

    By the by, what is your suggestion? What is your idea?

    *shrug*

    Seriously, what is the idea you are throwing out if it isn't "A system like Mario proposes that doesn't have all the flaws discussed?"?

    Soma
    “Salem Was Wrong!” -- Pedant Necromancer
    “Four isn't random!” -- Gibbering Mouther

  2. #47
    C++まいる!Cをこわせ!
    Join Date
    Oct 2007
    Location
    Inside my computer
    Posts
    24,654
    Quote Originally Posted by phantomotap View Post
    Seriously, what is the idea you are throwing out if it isn't "A system like Mario proposes that doesn't have all the flaws discussed?"?

    Soma
    I don't even know if I'm throwing ideas out there or just random stuff. I have agenda I'm arguing for, but anyway, what I tried to "say":

    We'd only consider a system "good enough" if it doesn't allow more innocent people to be found guilty than would happen in real life.
    A single "identity" would make it too easy for hackers/crackers/kiddies to leave traces behind that purposefully condemn others (i.e. they leave behind a signature of someone else, hence framing them).
    If this "identity" would be "potentially 1000 identities," it would be very hard for hackers to actually frame someone like that. The idea then is to keep many identities, yet make sure that all identities are properly left behind when the non-expert computer user does something on the web, allowing government agencies to identify these people if they commit a crime. A deterrent, like Mario says.

    This is something that might be considered "acceptable," if it worked. Maybe. Maybe not.
    Will it be harder for government to find the culprit? Absolutely.
    Will it be better than today's system? I don't know.
    Will it lead to a more deterrent factor than today's internet? Maybe. Hopefully?
    Will it lead to more innocent people being found guilty than today's "no citizenship" internet? No idea. Hopefully not.
    Will people find this approach more acceptable than a single identity? I don't know. Probably not.
    Quote Originally Posted by Adak View Post
    io.h certainly IS included in some modern compilers. It is no longer part of the standard for C, but it is nevertheless, included in the very latest Pelles C versions.
    Quote Originally Posted by Salem View Post
    You mean it's included as a crutch to help ancient programmers limp along without them having to relearn too much.

    Outside of your DOS world, your header file is meaningless.

  3. #48
    Registered User MutantJohn's Avatar
    Join Date
    Feb 2013
    Posts
    2,665
    Why don't we just make a hash function for people based on their atomic make-up? Or rather, the atomic make-up of their brains? I'm assuming the wave functions of each individual atom of each person's brain would create a unique wave function, assuming no two brains are identical down to the QM level.

  4. #49
    Master Apprentice phantomotap's Avatar
    Join Date
    Jan 2008
    Posts
    5,108
    I don't even know if I'm throwing ideas out there or just random stuff.
    O_o

    "Ugh."

    If this "identity" would be "potentially 1000 identities," it would be very hard for hackers to actually frame someone like that.
    o_O

    You don't understand many of the complaints in this thread.

    Harming Mario in the process was just an added benefit to a jerk; harming Mario was not the real purpose of my mask. The point of my masquerading as Mario was to hide myself as the source of the crime. A "1000-to-1" relationship just increases the attack surface. A "1000-to-1" relationship actually decreases the chances of my being caught as the true culprit. I couldn't harm someone in particular without a lot of extra effort, but I could still wear someone else as a mask, and I have the benefit that the people enforcing the law may not even be able to resolve my activities to the person I'm wearing as a mask.

    I'll give you that a "1000-to-1" relationship doesn't cause as much harm to innocent people from my masquerade because the court will not as likely assume guilt from the digital evidence.

    Soma
    “Salem Was Wrong!” -- Pedant Necromancer
    “Four isn't random!” -- Gibbering Mouther

  5. #50
    Master Apprentice phantomotap's Avatar
    Join Date
    Jan 2008
    Posts
    5,108
    Why don't we just make a hash function for people based on their atomic make-up? Or rather, the atomic make-up of their brains? I'm assuming the wave functions of each individual atom of each person's brain would create a unique wave function, assuming no two brains are identical down to the QM level.
    O_o

    I am also a fan of science fiction.

    Wait. Having the hashes of people's brains will probably improve the effectiveness of "satanic mind control frequencies".

    Oh noes!!1!one!

    Soma
    “Salem Was Wrong!” -- Pedant Necromancer
    “Four isn't random!” -- Gibbering Mouther

  6. #51
    C++まいる!Cをこわせ!
    Join Date
    Oct 2007
    Location
    Inside my computer
    Posts
    24,654
    Quote Originally Posted by MutantJohn View Post
    Why don't we just make a hash function for people based on their atomic make-up? Or rather, the atomic make-up of their brains? I'm assuming the wave functions of each individual atom of each person's brain would create a unique wave function, assuming no two brains are identical down to the QM level.
    What part of the job do you want?
    Creating the atomic scanner, the interfacer to the computer, the software the calculates the hash or the protocols?
    Let's get to work!
    Quote Originally Posted by Adak View Post
    io.h certainly IS included in some modern compilers. It is no longer part of the standard for C, but it is nevertheless, included in the very latest Pelles C versions.
    Quote Originally Posted by Salem View Post
    You mean it's included as a crutch to help ancient programmers limp along without them having to relearn too much.

    Outside of your DOS world, your header file is meaningless.

  7. #52
    Master Apprentice phantomotap's Avatar
    Join Date
    Jan 2008
    Posts
    5,108
    Creating the atomic scanner, the interfacer to the computer, the software the calculates the hash or the protocols?
    O_o

    Nope. I'm not sticking my head in any box built by you lot.

    I'll build the scanner.

    Soma
    “Salem Was Wrong!” -- Pedant Necromancer
    “Four isn't random!” -- Gibbering Mouther

  8. #53
    Lurker
    Join Date
    Dec 2004
    Posts
    296
    Quote Originally Posted by phantomotap View Post
    O_o

    In the context of a universal identifier included with all traffic, the guilty party could leave your fingerprints everywhere.

    Convincing a jury that you are innocent because of a lack of physical evidence is at least possible.

    Convincing a jury that you are innocent despite overwhelming digital evidence seems unreasonably difficult.

    Soma
    I think one of the problems is that today it should be that you are innocent until proven guilty, even though that doesn't seem to be exactly true in practice. (For example, online banking and credit cards with chip and pin, there the burden of proof lies on you. You have to prove that you where not negligent.)

    I fear that with a system where they can "prove" that it was you, or at least your credentials that did, something, then the burden of proof would be on you, i.e you would be guilty until you have proven that you are innocent. Which more or less is how things work in dictatorships.

  9. #54
    Lurker
    Join Date
    Dec 2004
    Posts
    296
    Quote Originally Posted by MutantJohn View Post
    Why don't we just make a hash function for people based on their atomic make-up? Or rather, the atomic make-up of their brains? I'm assuming the wave functions of each individual atom of each person's brain would create a unique wave function, assuming no two brains are identical down to the QM level.
    That would be _really_ bad when they figure out how to steal your credentials! :-)

    "Sorry, we have to remove your brain, somebody figured out how to make an imprint of it and used it to steal your identity.

    One of the reasons biometric information doesn't work that well as credentials in practice, pretty hard to revoke once they get stolen.

  10. #55
    Registered User
    Join Date
    Jun 2005
    Posts
    6,815
    Quote Originally Posted by MutantJohn View Post
    Why don't we just make a hash function for people based on their atomic make-up? Or rather, the atomic make-up of their brains? I'm assuming the wave functions of each individual atom of each person's brain would create a unique wave function, assuming no two brains are identical down to the QM level.
    Apart from the concerns others have mentioned, the atomic make-up of the brain varies over time anyway. In fact, assuming you stay alive, over 99% of the atoms in your body will be completely replaced (excreted and replaced with another atom that has been ingested or otherwise absorbed by the body) within seven years.

    Statistically, the wave pattern you measure today may well be unique (likelihood near zero of two people having the same pattern) but subsequently measured wave patterns will depart in a manner that is not well understood, let alone readily predictable.


    Even if you manage to overcome these trifling concerns, I'm not sticking my head in any box made by you guys either. Not without a significant trial period, in which YOU stick your head in, and I wait a few years to see the results.
    Last edited by grumpy; 01-12-2015 at 07:08 PM.
    Right 98% of the time, and don't care about the other 3%.

    If I seem grumpy or unhelpful in reply to you, or tell you you need to demonstrate more effort before you can expect help, it is likely you deserve it. Suck it up, Buttercup, and read this, this, and this before posting again.

  11. #56
    Ticked and off
    Join Date
    Oct 2011
    Location
    La-la land
    Posts
    1,728
    Quote Originally Posted by the_jackass View Post
    Then I'll have to look for/design a hat of material that matches energy level of the evil frequencies (idk any physics at this stage but if I'm not wrong photon's energry = h*f right?)
    Electromagnetic radiation exposure effects vary too much from person to person for there to be "evil" EM frequencies. Try chemicals (bisphenol-A and other hormone-like ones especially) and infrasonics (sounds under the hearing range); they are known to work.

    For example, it is common in movie theaters to use infrasonics in the 5-20 Hz range to make people uncomfortable in scary scenes. It works, because human brainwave patterns have a few specific frequencies (that do not vary that much from person to person), whose disruption causes pretty well-known effects.

    Similarly, the bedazzler (nauseating flashlight) works by using flickering lights that disrupt brainwave patterns via our optical inputs, causing nausea et cetera. Such light sources can be used to induce headaches, migraine, and even epileptic attacks.

    (BTW, I hate cyclists who use bright flickering/blinking front lights at night. When tired, I'm very susceptible to the effects, and when walking down the street, having just one such light in my field of view for a full block tends to give me a slight headache (or behind-the-eye ache, if you know what I mean). I've seriously considered building a bedazzler just to get back at them.)

    Strong magnetic fields varying at the 1-13 Hz range could, perhaps (I don't know, and I don't know of any research on this either), be used to induce similar brainwave disruption without the targeted person realizing it.

    A combination of the above techniques -- for example, spiking the local water supply with a tasteless, usually harmless chemical that however increases the susceptibility to the other methods -- is quite possible, and frankly I'd be surprised if it hasn't been extensively tested by the intelligence agencies yet.

    Quote Originally Posted by MutantJohn View Post
    Why don't we just make a hash function for people based on their atomic make-up?
    Because the atomic make-up changes constantly.
    Quote Originally Posted by MutantJohn View Post
    I'm assuming the wave functions of each individual atom of each person's brain would create a unique wave function
    The wave functions for the atoms would be quite hard to measure. The outermost electrons of each atom, or better yet, the electron densities around each neuron, could be measured, however. Even current magnetoencephalography (measuring the the magnetic fields generated by the current flows in the brain) might be precise enough to map individual neurons. Unfortunately, we know that human brains change all your life -- new neurons are produced (not just during adolescense as believed earlier), and others wilt away. So even going a couple of orders of magnitude less precise, from atoms to neurons, would not help much.

    Staying offline for a couple of weeks, or maybe just hitting your head, and not recognized as the same person anymore, is a pretty nasty side effect.

    Quote Originally Posted by Elysia View Post
    If this "identity" would be "potentially 1000 identities," it would be very hard for hackers to actually frame someone like that. The idea then is to keep many identities, yet make sure that all identities are properly left behind when the non-expert computer user does something on the web, allowing government agencies to identify these people if they commit a crime.
    Actually, the idea -- as I see it -- would be to use the identity marker (or few markers, out of many) left by the criminal, to trace the overall activities of the related identities and devices.

    That is, no "Aha! The packets have your identity, so you must have done it!" moments. (Like we do now: Here is proof that your router was used in sharing this song, so you owe us $150,000. Or you can spend some $10,000 and upwards and fight us in court.)

    Rather, investigation would start with the markers left at the crime scene (i.e. network packet identifiers, if captured, and so on). Then, the investigators would trace the markers back to devices, then see what other markers the devices had used, and this way build a complete picture. For suspects, the reverse is used: starting at the devices they claim they used at the time, you track the markers used, and build complementary pictures. The law enforcement would be responsible for building these connectivity graphs, and their security; the courts would decide if they are compelling enough to judge anyone.

    The problem we currently have is that all features of the online systems we have, from protocols to devices up to and including law enforcement, make it easy to point a finger to a specific end-user, with little relation to reality. Online, you are guilty unless you yourself can prove otherwise; and nobody is going to help you with that.

    For example, spoofing all of the internet base protocols (TCP/IP, UDP/IP, ICMP, for both IPv4 and IPv6 protocols) is trivial: given access to any node between two parties, you can spoof one or the other, without the endpoint knowing. (The endpoints have to do a magic handshake -- some cryptographic operations -- to find out; this is basically what TLS/SSL does. Even at the start, there were suggestions to bake the security in to the protocol, but it was nixed, apparently by the US intelligence/military. OTOH, they did fund and start it with ARPANET, but still.)

    If you have access to the certificates used in TLS/SSL endpoint identification, you can craft a fake certificate, and spoof anyone at the other end into thinking you're somebody else. This has already occurred numerous times, and will occur in the future, too. Even if perfectly secure technically, grabbing a suitable certificate authority employee and forcing them to do it for you (via blackmail or such) is always possible.

    In my opinion, a new identity scheme would start at the bottom level, at the base protocols. It could mean that endpoint-to-endpoint traffic can always be monitored by authorities, while the content transferred could be protected (encrypted). This would be analogous to the real-world traffic scenario: license plates are routinely tracked, but in most countries, car contents are only examined in specific situations by law enforcement. (Perhaps we could even make it so that if a packet is intercepted, the endpoints could always notice -- because that's the way the protocols just worked?)

    Instead of just looking at a "fingerprint" at the scene of a crime -- and each individual would typically have dozens of "fingerprints", at least one per personal device they use --, law enforcement would use the tracking data to build a graph of the fingerprints and related devices, to find out where and who the real culprit might be.


    No, I don't believe anything like the above will come to be within my lifetime. Much, much more important systems, like our global banking system, is much more blatantly skewed against end users, and much easier and cheaper to start fixing, and nobody seems willing to do anything about it. Well, aside from a few hours of chanting and holding up signs with like-minded people a few days every year.

    Even if you are paranoid, does not mean they're not after your assets.

  12. #57
    Master Apprentice phantomotap's Avatar
    Join Date
    Jan 2008
    Posts
    5,108
    In my opinion, a new identity scheme would start at the bottom level, at the base protocols. It could mean that endpoint-to-endpoint traffic can always be monitored by authorities, while the content transferred could be protected (encrypted). This would be analogous to the real-world traffic scenario: license plates are routinely tracked, but in most countries, car contents are only examined in specific situations by law enforcement.
    O_o

    Much like scanners do not prevent me from driving your car when you've left the keys in the ignition, a new protocol will not prevent me from using a device where you have enabled "remember me" features.

    I'm not trying to harp on the issue. The individual technical problems with the security layer are not that difficult to diminish. Take a look at something Mario said "I'd prefer if we discussed our privacy on different grounds other than government control of its citizens.". In a similar way, I'd prefer if we discussed security in terms of education and behavior.

    The protocols have problems. The implementations have bugs. I'm not saying that these issues can't be improved.

    A more important issue is how many people think of security as someone else's problem. I can't even get developers to stop forcing an association between address, displayed name, and actual user/login identifier. (I ranted for days about the Facebook policy regarding real names. I donated what I could to the lawsuit.) Do you have any idea how much of an issue forcing email as displayed login is at some sites? (Social media support sites are great fishing.) Many clients of social media don't even have the option of not publishing identifiable information. Don't even get me started on monetizing private information; the mindbogglingly huge number of sites requiring a Facebook account just to read information is insane, but the people who happy to throw the information at every one of those sites is truly disturbing.

    Better tools would be great, but we are having a difficult time just convincing people to use the ones we already have available, and teaching people to effectively use the tools seems impossible.

    An entirely new set of mandatory technologies will not solve the people problem.

    Soma
    “Salem Was Wrong!” -- Pedant Necromancer
    “Four isn't random!” -- Gibbering Mouther

  13. #58
    Lurker
    Join Date
    Dec 2004
    Posts
    296
    Quote Originally Posted by Nominal Animal View Post
    No, I don't believe anything like the above will come to be within my lifetime. Much, much more important systems, like our global banking system, is much more blatantly skewed against end users, and much easier and cheaper to start fixing, and nobody seems willing to do anything about it. Well, aside from a few hours of chanting and holding up signs with like-minded people a few days every year.
    One of the reasons this will not change is because some of the time those in charge want the system to work so that you can be anonymous and the next day they don't.

    A good example is the way the US praised the way people where able to use the internet to set up a resistance in Syria and leak/get information out through anonymous channels. They said something to the effect of "being able to be anonymous are important for people living in dictatorships and under oppressive regimes". A few weeks later the Snowden incident happens. And from that point onward anonymity is something bad. (Not to bash on the US, it was the only example that came to me at the moment.)

    For me one of the biggest issues is that the reason anonymity on the net is feared is because most governments have so many skeletons in the closet. And most of the information that is classified is classified because it would be a great embarrassment if it came to light.

  14. #59
    Registered User MutantJohn's Avatar
    Join Date
    Feb 2013
    Posts
    2,665
    All the atoms changing in your brain is more secure though. It is like changing the password on your home computer constantly.

  15. #60
    Master Apprentice phantomotap's Avatar
    Join Date
    Jan 2008
    Posts
    5,108
    All the atoms changing in your brain is more secure though. It is like changing the password on your home computer constantly.
    O_o

    By that logic, randomly filing bits from your house key is "more secure".

    o_O

    Of course, in both cases the lock isn't configured for access by changed key so...

    I guess you are right. No one would have access. That is an extremely secure system.

    Soma
    “Salem Was Wrong!” -- Pedant Necromancer
    “Four isn't random!” -- Gibbering Mouther

Popular pages Recent additions subscribe to a feed

Similar Threads

  1. web browser privacy
    By std10093 in forum General Discussions
    Replies: 7
    Last Post: 09-20-2012, 06:05 AM
  2. Freedom Internet Security
    By BestGameMovie in forum Tech Board
    Replies: 3
    Last Post: 06-03-2005, 09:28 PM
  3. E-mail privacy?
    By kermi3 in forum A Brief History of Cprogramming.com
    Replies: 5
    Last Post: 07-04-2004, 07:45 AM
  4. Just Privacy
    By luckygold6 in forum Game Programming
    Replies: 2
    Last Post: 04-25-2003, 09:05 PM
  5. Norton Internet Security
    By MethodMan in forum Tech Board
    Replies: 9
    Last Post: 12-22-2002, 06:02 PM