(no title)
steenreem | 7 years ago
I imagine a system where you publish news using your device (a mobile phone), and encrypted in a way so that only a small group of other devices, which you have explicitly trusted in an earlier step, can decrypt it, allowing only them to trace that the news came from you.
Then those trusted devices will decrypt and re-encrypt the news in such that they can forward it with only their trusted devices. When a device receives news from another, then it won't know whether the sender published that news, or is merely forwarding it.
Because all communication between devices is encrypted, a device can not be confirmed to be using this system, except by a device who he trusts.
When a device is compromised, he will only be able to see if another device is part of the system, if that device has trusted him. Also the compromised device will be able to read news shared to him, but he won't be able to see what device that news originates from.
To make sure that readers can filter news based on what publishers they like, there is the concept of a publisher.
Apart from news, devices can also share publishers. An publisher is a name plus public key. The creator of the publisher has the private key with which he can encrypt news (even before it encrypted for sharing), allowing readers of that news, who have the publisher's public key, to verify that the news came from that publisher. If a publisher is shared with a device while the device already knows a publisher with the same public key, then the device must chose which publisher to keep and which to delete.
Tuna-Fish|7 years ago
Declare use and possession of it illegal. Randomly search for it among people who they think might have it. Once they find people using it, they punish them very harshly, and widely publicize the consequences of using such a system. Then people will stop using it, because CPC is more than willing to ratchet up the penalties and enforcement until that happens. Up to summary death penalty and massive dragnets where military descends on an area to search every device they find. (The fact that everyone knows they would go that far means they'd never have to.)
There are no technical solutions to tyranny. You can think of such a system working because you live in a country where there is likely a constitution that prevents governments from banning apps they don't like without any actual real justification, and where there are laws that prevent anything you have from being seized for inspection just because the people doing the inspection feel like it.
There is plenty of dissent of all kinds in China. But the locals would never do something so brazen as to start using an app specifically designed to make their communication uncensorable. Because that would be a direct challenge to the state, and the state has a very well documented, extremely blood-soaked history of winning direct challenges through applying brute force.
Instead, the dissent uses the officially approved channels, and stays near the officially approved limits.
anon57325|7 years ago
Just look at how the US government handled the Liberty Dollar.
It would be even easier now with National Security Letters and Secret Courts. Heck, look what happened to Lavabit.
DevX101|7 years ago
In such a case, bad state actors would not be able to decipher the message, but they could determine that you attempted to send an unlawful message.
US had stringent regulations on high levels of cryptography until recently, so the U.S. isn't immune to this train of thought either. https://en.wikipedia.org/wiki/Export_of_cryptography_from_th...
Macuyiko|7 years ago
All these armchair technical solutions are nice to conjure up, but at the end of the day it's not the technical aspect which is the challenge.
apatters|7 years ago
(Bonus fact: Radio Free Asia contributed most of the initial funding for the development of the Signal protocol!)
eiaoa|7 years ago
My sense is that analog methods are the best response to authoritarian regimes; and the best way to prepare for the advent of one is to familiarize yourself with analog spy trade-craft (and analog response to digital spying, like disguise).
Speaking of which, does anyone have any non-fiction book recommendations about analog spycraft and responses to authoritarianism? Things like how to do dead drops, samizdat, clandestine distribution of literature and the like?
anon57325|7 years ago
wcoenen|7 years ago
China attempts to detect and block such TOR connections. It's an arms race of detection heuristics vs traffic obfuscation.
abc-xyz|7 years ago
flap|7 years ago
hevi_jos|7 years ago
Technology without people does not work. Specially in China: http://imgs.xkcd.com/comics/security.png Most devices in China cheap enough are compromised as they are manufactured by the Government, the channel is compromised. The apps are compromised, social media is compromised.
You can trust no body but your family, as simple as that, not even your family as the Government can blackmail them.
EliRivers|7 years ago
Tangentially, should it be impossible? We can all imagine scenarios where we might think that actually some information should be withheld or erased.
claudiawerner|7 years ago
wnscooke|7 years ago
unknown|7 years ago
[deleted]
dangerboysteve|7 years ago