TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask a hacker: Top four anti-surveillance apps

83 pointsby nikaialmost 12 years ago

10 comments

einhverfralmost 12 years ago
I think the best apps are yet to be written. I recently wrote a blog post (<a href="http:&#x2F;&#x2F;ledgersmbdev.blogspot.com&#x2F;2013&#x2F;06&#x2F;tangent-design-thougths-about-next-gen.html" rel="nofollow">http:&#x2F;&#x2F;ledgersmbdev.blogspot.com&#x2F;2013&#x2F;06&#x2F;tangent-design-thou...</a>) outlining ways I thought the SSL PKI could be tweaked to make it quite resistant to this sort of eavesdropping.<p>It is still on the HN new feed, if folks want to discuss technical details, but the reason I want to mention it here too is that key management is very hard in a case of resisting surveillance. The current PKI ideas place too much trust in third party certificate authorities (meaning the government can easily pull off man in the middle attacks with the help of network providers if they want, even without your keys), and because each negotiation occurs without context of past ones, there is no way to detect such behavior other than &quot;the CA said watch out&quot; or &quot;this certificate isn&#x27;t even plausible.&quot; Of course you can solve these by enforcing that everyone on your network uses th same local CA that you control but that breaks as soon as you want to talk to someone outside.<p>Building a PKI that can resist such efforts is not trivial and it involves challenging our assumptions. Until we do so however, we will run into all kinds of problem. I may be being paranoid, but it seems like this is a good time to be paranoid.<p>One of the things that SSH gets right is that it takes a diachronic approach to key validation. We should be building this in everywhere and alerting on key changes, while providing a way to ensure that keys can be safely and securely changed without having errors.
评论 #5844741 未加载
IlPeachalmost 12 years ago
I remember the time, about 6 or 7 years ago when I&#x27;ve asked in front of the whole class to the associate professor of the security course, whether building a text messages encryption app would have been a good idea as project for the course. The answer was a smickering &quot;only a drug dealer would be interested in such a thing&quot;.<p>oh man, that hurt... if I only knew a valid point against the &quot;I&#x27;ve got nothing to hide&quot; argument as I do now...
评论 #5844932 未加载
AJ007almost 12 years ago
Read these &quot;Bugs, Caveats, Side Notes&quot; published on the Onion Browser app&#x27;s web site:<p>Major iOS SDK Limitation: Websites using HTML5 &lt;video&gt; tags will leak &lt;video&gt;-related DNS queries and data transfer outside of Tor. This includes YouTube, Vimeo, and any website using iOS-compatible HTML5 video. This is a behavior of the embedded QuickTime player and there is currently no known workaround. (h&#x2F;t to josyw.)<p>iOS SDK Limitation: Javascript cannot be disabled in the `UIWebView`, so script-based detection may identify your device even if User-Agent Spoofing is enabled. iOS SDK Limitation: Related to above, the HTML5 Geolocation API cannot be disabled. The browser will ask you for permission to access your location if a website asks for it via the HTML5 Geolocation API. If you allow this, then said website will (obviously) know your actual current location.<p>That doesn&#x27;t sound remotely safe to me.
klibertpalmost 12 years ago
I would appreciate if someone went and fixed the title to have the word &quot;mobile&quot; in it. I was expecting something very different than I got :)
评论 #5845598 未加载
a3_nmalmost 12 years ago
Sadly, TextSecure and RedPhone are distributed on the Google Play platform, so, if you don&#x27;t want to tie a Google account to your phone or use Android without the proprietary Google applications, you&#x27;re out of luck. (They are not included in the free and open source f-droid repository due to disagreements with the author.)
评论 #5844615 未加载
评论 #5845568 未加载
评论 #5845553 未加载
dave1010ukalmost 12 years ago
If you have an Android phone, I&#x27;d recommend getting an Open Source ROM (so you can verify it is secure) and removing as much proprietary software as possible. I&#x27;d also use Firefox as Chrome for Android isn&#x27;t Open Source (even though Chromium, Blink, etc are).
评论 #5844899 未加载
gasullalmost 12 years ago
For the desktop:<p>- Tor<p>- Bitmessage<p>Bitmessage is specially interesting because it&#x27;s not only encrypted and private, it actually solves the problem of spam and offers 3 kinds of messaging under the same interface: email-like, broadcast messages ala Twitter and chan boards.
dapolealmost 12 years ago
I think the real question should be is there possibly a back door on your mobile os of choice, because it won&#x27;t matter what app you use if your os is already capable of capturing that data system wide.
jiggy2011almost 12 years ago
No iOS suggestions?
评论 #5844968 未加载
评论 #5845180 未加载
评论 #5844843 未加载
评论 #5845226 未加载
评论 #5844828 未加载
buro9almost 12 years ago
<a href="https:&#x2F;&#x2F;silentcircle.com" rel="nofollow">https:&#x2F;&#x2F;silentcircle.com</a> should have a mention too.
评论 #5844927 未加载