You are viewing a read-only archive of the Blogs.Harvard network. Learn more.

The Longest Now


Designing life for episodic tyranny | 1: Secure toolchains
Friday November 11th 2016, 6:00 pm
Filed under: Aasw,Blogroll,chain-gang

See also Part 2: social networks

Motivation

Classify your local environment according to how much freedom you have to create and share tools, access those of others, and communicate across secure networks.  
  • In a “Tier 1” environment you have access to all popular security technology, and can build whatever infrastructure you want, entirely within your control.  
  • In a “Tier 2” environment, central network nodes and critical infrastructure all have backdoors and logging, and noone is allowed to distribute strong cryptography that some central group is unable to break.  
  • In a “Tier 3” environment, using secure tools and all but trivial cryptography is illegal – you shouldn’t have anything to hide.  Even talking about such tools may put you on a blacklist.  A central group that enforces the law may also access, modify, or reassign your work and possessions at will.
Say you live in a Tier 1 jurisdiction, which controls land, banks, and physical infrastructure.  Periodically, it shifts for a time to a Tier 3 regime, which may make abrupt changes at any depth in society to suit the fashion of the moment.
 
While in the latter regime, you can’t always trust the law or social norms to preserve
  • Your right to communicate with others
  • Your right to use your own tools and resources
  • The visibility (to you and those around you) of how your rights and tools are changing, if these are taken away

Most infrastructure in such an environment becomes untrustworthy.  Imagine losing trust in AT&T, Google, Symantec, Cisco.  (Even if you trust the people who remain running the system, they might no longer be in full control, or may not be able to inform you if your access was altered, filtered, compromised.)  

What can you do while in a Tier 1 regime to moderate the periods where you have fewer rights?

These are some quick thoughts on the topic, from a recent discussion.  Improvements and other ideas are most welcome.

Technical design decisions to improve resilience:

1.  multi-homing, letting users choose their jurisdiction.  for instance, let you choose from a number of wholly independent services running almost the same stack, each within a different jurisdiction.
  1a.  Be able to choose who hosts your data, tools, funds.  E.g., fix current US-EU policy – give users choice of where data resides and under which laws.
  1b.  Measure: how long it takes to shift key storage / control elements betweeb jurisdictions, copying rather than mirroring any required pieces.  Make it possible to shift on the timescale of expected transition between Tiers.
 
2. Give users advance warning that the threat to their data/account is rising; make it possible to quickly change what is stored [not just what is shared with other users].
2a. Learn explicitly from how banking does this (cf. concerns among many users about funds being frozen, for less-than-fascist conflicts).
 
3. work with telcos to add built-in IP and egress-fuzzing
   3a.  consider what china does: blocking per IP, by each egress point.  harder but possible in the US.
 
4. multi-source hardware, and any other needed ‘raw materials’ at each level of abstraction
  4a.  Both multiple sources w/in a jurisdiction (for the first stages when only some producers have lost control of their own production), and in different jurisdictions.
 
5. have systems that can’t be subverted too quickly: relying on the temporary nature of the fascist trend.  (if it lasts long enough, everything mentioned here can be undone; design to make that take a reasonable amount of time and a lot of humanpower)
  5a.  add meshes – like the electrical grid, that have local robusness. When central management disappears or ‘shuts things off’, local communities can build a smaller-scale replica that uses the physical infrastructure [even if they have to go in and replace control nodes, like generators, by hand]. 
  5b.  make change happen on the lifescale of hardware that has to be replaced.  e.g. a bulk of investment in dumb pipes that have to be replaced or removed by hand.  Systems with high upfront infrastructure costs that are easy to maintain but relatively hard to replace.
 
6. design alternate solutions for each level of the stack that have minimal central requirements.  E.g. fuel-powered USB chargers, gas generators, solar panels, desktop fabs and factories.  Make it easy to produce inferior, but usable, components if the high-economy-of-scale sources dry up.
 
7. keep strong contacts with someone in the existing [government], even when there’s nothing that you need to lobby for. that makes transitions smoother, and you less likely to be surprised by change.  Cf. Idea 3: invest heavily into those social relations.
 
8. distribute end-user tools that let individuals adapt under hostile conditions.  Examples:
  8a.  Ship antennas or power sources flexible enough to be modded.  
  8b.  Allow broadcast updates to the latest version, but allow users to freeze the version at one they support.  
  8c.  Support unblockable rollbacks to earlier revisions: something like a hardware button that rollsback to one of a few previous versions, if you realize you’ve installed malware or controlware.  you can still push updates as agressively as you like, as long as the provider can hint that a new snapshot is useful as risks of overtaking increases.
  8d.  provide some sort of checksum to see if firmware has changed [even with above may be possible for new software to change that option; but users should at least know]

Related ideas

1. consider reasonable steps to degrade control:  
  1a.  starting with increased infra for those who align with government views.  (or decreased for those breaking new / stringent laws)
  1b.  compare how voting is restricted, liquidity is restricted.
 
2. consider: is it better to be asset-heavy or asset-light?  
  2a.  usefulness of land and resources to use, vs. having things that can’t be claimed / revoked. networks rather than assets – land, tools?  
  2b.  compare liquidity of favors to that of funds or items.
 
3. compare current work with regulations/regulators.  in politics, relationships w/in a commission made it valuable to have a rotating door.  Invest in those relations, considering also 2) above – invest before assets are frozen to offset risk.
 
4. compare how US corps plan for inter-state shifts within the country.  Including being flexible enough to move to a new state for favorable regs, or shift ops/people among different centers.
5. Currently there’s network-tracking of IP addresses in malls, &c.  There are tools now that have a ‘War mode’ that randomizes your MAC or other address all the time.  Injecting noise into bluetooth and other tracking is straightforward.
Comments Off on Designing life for episodic tyranny | 1: Secure toolchains







Bad Behavior has blocked 203 access attempts in the last 7 days.