Awesome Stuff: Keeping Your Online Activities Private Suddenly More Interesting

from the well,-look-at-that dept

Given all the recent leaks about surveillance lately, we figured this week’s awesome stuff would look at some crowdfunding projects that are a bit more focused on keeping your online activities secret. Startups that actively protect their users privacy from snooping eyes of the government are getting a lot of renewed attention. Search engine DuckDuckGo has seen a massive bump in traffic. Kim Dotcom’s Mega is now working on encrypted email and messaging to go along with its encrypted storage offerings. On the crowdfunding front, we’re seeing a bunch of other privacy-related projects popping up — some with a bit more reasonable plans than others.

  • Deservedly getting a ton of attention this week was the announcement about Heml.is, a new secure messaging app for mobile devices, put together by the same crew of folks who created Flattr, including Peter “brokep” Sunde (also of The Pirate Bay fame), Linus Olsson and Leif Hogberg. These are three very, very smart guys.
    They raised over $150,000 very quickly and then shut down the funding. The project looks pretty cool, though I wish they’d focus on more platforms than just mobile. Also, I’m a tad disappointed that they trotted out that old, silly line “if you’re not paying, you’re the product,” because it’s really misleading, and they should know that. Still, if there are people you can trust to truly focus on thinking about user privacy first, these are the guys. I’m excited to see what they eventually build.
  • HiddenToolbox looks like they’re trying to create a userfriendlish version of TrueCrypt or something similar, such that you can store your documents/files/data secretly, with some additional cool features built in, such as remote self-destruct, a panic shutdown, file shredder and more. Some of it sounds cool feature-wise, but it would be interesting to see if any security experts have really had a chance to stress test their system to find out how secure it really is. There seems to be precious little info on that front.
    They’re not asking for very much money total — just $8,000 — which is so low that it almost sounds suspicious in its own right. Still, they’ve almost reached that amount. Given free products on the market that do much of what they’re promising already, I’m not quite sure it’s worth what they’re charging, but it is interesting to see more attempts to build secure storage options.
  • There are a bunch of anonymous surfing tools out there, but iAnonym is looking to make completely anonymous internet surfing easier. The project looks pretty comprehensive, and (unlike the HiddenToolbox above) they lay out a lot of the details of what they’re trying to do and why it should actually allow for anonymous activities online.
    Unfortunately, it doesn’t look like they’ve received very much attention for the project, which is seeking £25,000, but only has around £1,000 with about two weeks to go.
  • Can’t trust pure software? How about hardware. Adonify is offering a plug and play network device for people to surf the web privately. Unfortunately the video explanation is horrible. I mean this might be the worst crowdfunding video I’ve ever seen. The video quality, the sound quality, the explanation of the product, the dude standing around smoking while the other guy explains what’s going on… it’s all pretty weak. When will people finally learn that a quality video is a pretty key part of a crowdfunding campaign. For what it’s worth, their IndieGoGo page isn’t particularly informative either.
    Given the weaknesses of the video and the description, combined with asking for 100,000€, it’s not too surprising that they’ve raised almost nothing so far, though there’s still well over a month to go.
  • If the Adonify had some problems attracting attention, that appears to go double for Cryptomania, a Swiss company that is trying to crowdfund money for a secure storage and communications platform. They don’t have any video for their product, and they barely explain their product at all. And the crowdfunding awards are for equity in their company, which almost certainly violates public offerings laws in the US and other countries (while other countries do allow equity crowdfunding, and the US is getting there, the rules tend to be rather specific and rather strict — and it doesn’t appear these guys followed any of that). They’re also trying to raise a much larger amount: 250,000€. So far… they’ve made 0€ with less than 3 weeks to go. It seems doubtful they’ll get much more.

Unfortunately, the last two projects especially demonstrate one of the key problems with most tools to protect privacy that are on the market today. They’re designed by engineers and cryptogeeks who very often are not very good at explaining what they do, making it user friendly, or convincing non-geeks why what they’re doing is valuable. The quick success of Heml.is’ funding, combined with the growth of DuckDuckGo are good signs, though. When you can make privacy user-friendly and understandable, people are definitely interested. I’m hoping that the new attention on privacy due to the recent leaks about surveillance will drive more companies to look at ways to do user-friendly, powerful privacy tools. It’s good to see some are already on that path, though they may need some work to improve.

Filed Under: , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Awesome Stuff: Keeping Your Online Activities Private Suddenly More Interesting”

Subscribe: RSS Leave a comment
22 Comments
Anonymous Coward says:

Invasion of privacy

It’s not just about the NSA’s monitoring, either. Microsoft routinely scans its users’ private SkyDrive folders for images depicting nudity and content believed to be illegal or infringing.

There ought to be a law barring service providers from monitoring the content of private folders in any capacity, but in the meantime I guess encryption will have to do.

tqk (profile) says:

Re: Invasion of privacy

There ought to be a law barring service providers from monitoring the content of private folders in any capacity, but in the meantime I guess encryption will have to do.

No, there are laws requiring, eg. landlords, to ensure their property isn’t used for illegal purposes. Encryption is the correct solution for this. Alternatively, don’t leave your stuff in The Cloud.

Anonymous Coward says:

Re: Re: Invasion of privacy

I don’t know about other countries, but there aren’t any laws in the United States requiring cloud service providers to screen for nudity online like Microsoft does with SkyDrive (nudity of any kind will automatically raise a red flag, even for paintings and pictures of naked adults). They do have to report child pornography if and when they find it, but they don’t have to screen for it, nor do they have to screen for things like copyright infringement and artistic nudity.

It’s really quite simple: Cloud storage providers should not be allowed to go looking through people’s files, be it manually or automatically. If there’s cause to go looking, then let it be handled by law enforcement. Otherwise, keep out.

Baneki (profile) says:

Re: The Glorious Power of FUD...

The thing is, if I was running the NSA and I wanted to make sure folks didn’t use effective, widely-available, proven encryption tools to protect themselves from my multi-billion-dollar dragnet surveillance machine, what would I do..?

Oh, wait. I’d just spread a meme that it was useless to try to use encryption. That all encryption is super-secretly “backdoored” anyway. And that it was useless to try to protect yourself, because the NSA has super-magical powers that transcend the reality of our universe and its mathematics. And that anyone who says otherwise is a secret NSA stooge – so don’t trust anyone who offers counter-FUD. It’s a hermetically sealed, self-reinforcing circle of bleh.

So if folks bought into my FUD, and spread it, I’d cut out a big chunk of the most effective resistance out there. Because FUD works… well, it works if people aren’t willing to take the time and effort to actually dig out facts. Hunting down and testing facts is, admittedly, alot more work than just engaging in fatalistic FUD, but on the upside it’s not pathetically defeatist.

Just sayin’…

Anonymous Anonymous Coward says:

Compiling Compilers

I read the other day (maybe here) about someone inserting a back door through the compiler, and someone else suggesting that the entire Linux kernel should be audited. I am not a programmer, but do have some understanding of how things work. One could audit the source code of anything but could not be sure of it if they did not know the compiler was compromised.

Here is where I get stuck. What compiles the source code for the compiler? Is it just written in Assembly Language (machine code for those who don’t know), or is there a compiler compiler? What processes would be necessary to KNOW that the compiler one uses is clean?

Once one knows that the compiler is clean, and that the source code for whatever package you are compiling is clean, then you might have clean software.

Then we need to take a look at the hardware, and all of the drivers used by whatever system.

Odd thought. Do software companies agree to this shit because they know that they will be employed for a long time cleaning it up? What makes them think they might be trusted to do such a cleanup. Looking at you Microshaft!

Anonymous Coward says:

Re: Compiling Compilers

“What compiles the source code for the compiler?”

It’s called a “cross compiler”, which can run on one platform but produce machine code for another platform. Of course you could just use a different compiler (or an earlier version of the compiler you are compiling) to compile your newest version of your compiler on the same platform.

Anonymous Anonymous Coward says:

Re: Re: Compiling Compilers

I guess I may not have been clear enough. One of the articles stated that (roughly) the creator of a compiler put code in the compiler that automatically installed a back door, even if that code was removed from the source code, the compiler would re-insert it.

How does one now trust any compiler?

John Fenderson (profile) says:

Re: Re: Re: Compiling Compilers

How does one now trust any compiler?

The same way you trust any other piece of software: you audit the source code. The ability to insert backdoor code is a bit limited — it has to be tailored to compiling a particular application. You couldn’t really do this in such a way that it would insert a backdoor in everything. In the example you’re talking about, it was when compiling the login application. So you’d be fine by compiling the compiler using an entirely different compiler. Or bootstrapping the compilation process.

James Robey (profile) says:

Missing a project not like the others; Nametag

Link: Nametag Social

Hello, i’m the researcher and developer behind Nametag, a secure programmable social media service that isn’t on this list, and I began an Indie GoGo campaign this month.

What’s different? Well, it’s the word “programmable” that should stand out – we allow people not only to utilize a facebook-esque infinite scrolling feed interface (for starters), but we let people write entire secure social media applications in the browser – without sending a dram of readable anything to the people running the server, even though you’re using pure HTML!

We allow anyone without programming knowledge to use secure social media.

We allow people who know javascript to expand what the tool can do without revealing anything, even to us

That’s something I feel we need badly. To bring the lowest common denominator of secure programming to web developers, not just crypto-geeks, and do it right.

check out the campaign igg.me/at/nametag
and the site explaining it (with real, runnable demos!) at domalgebra.com

we deserve better. Thanks,

James Robey,
DOM Algebra

Anonymous Coward says:

Re: Missing a project not like the others; Nametag

secure … applications in the browser – without sending a dram of readable anything to the people running the server

Many systems that could be described that way provide only illusory security: the people running the server could (be compelled to) send a modified version of the app to the client, which does the usual crypto in the client and also leaks the user’s key to the server.

Some “browser-based” systems use a trusted browser extension to avoid this exposure, but “pure HTML and Javascript” suggests you don’t take this approach.

Is there a plan to deal with that?

Votre (profile) says:

It's a people problem not a tech problem

The move towards unprecedented levels of communication monitoring isn’t a technical problem – it’s a people problem.

Trying to engage in a never ending cycle of attempting to get around unacceptable and dubiously legal levels of surveillance by technology alone is destined for failure in the long run. We don’t need better cryptography. We need better people in government. People who understand what’s at stake and will give a clear and resounding “NO!” to our Executive Branch next time it asks them for a blank check to override the Constitution.

Suggestion: vote out the of office ALL the people responsible for this debacle while you still have a vote and some marginal say in the matter. Because in another 20 years, we likely won’t have a vote if this trend is allowed to continue.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...
Older Stuff
09:00 Awesome Stuff: Monitor Everything (5)
09:00 Awesome Stuff: Cool Components (1)
12:42 Tech Companies Ask European Commission Not To Wreck The Internet -- And You Can Too (4)
09:00 Awesome Stuff: Play & Listen (1)
09:00 Awesome Stuff: Beyond Chiptunes (12)
09:00 Awesome Stuff: Updated Classics (3)
09:00 Awesome Stuff: Celebrating Cities (1)
09:00 Awesome Stuff: Crafts Of All Kinds (5)
09:00 Awesome Stuff: One Great Knob (13)
09:00 Awesome Stuff: Simple Geeky Toys (2)
09:00 Awesome Stuff: Gadgets For The New Year (18)
09:00 Awesome Stuff: A Post-Holiday Grab Bag (0)
13:34 How Private-Sector Innovation Can Help Those Most In Need (21)
09:00 Awesome Stuff: Towards The Future Of Drones (17)
09:00 Awesome Stuff: Artisanal Handheld Games (5)
09:00 Awesome Stuff: A New Approach To Smartphone VR (5)
09:00 Awesome Stuff: Let's Bore The Censors (37)
09:00 Awesome Stuff: Open Source For Your Brain (2)
09:00 Awesome Stuff: The Final Piece Of The VR Puzzle? (6)
09:00 Awesome Stuff: The Internet... Who Needs It? (15)
09:00 Awesome Stuff: The Light Non-Switch (18)
09:00 Awesome Stuff: 3D Printing And Way, Way More (7)
13:00 Techdirt Reading List: Learning By Doing (5)
12:43 The Stagnation Of eBooks Due To Closed Platforms And DRM (89)
09:00 Awesome Stuff: A Modular Phone For Makers (5)
09:00 Awesome Stuff: Everything On One Display (4)
09:00 Awesome Stuff: Everything Is Still A Remix (13)
09:00 Awesome Stuff: Great Desk Toy, Or Greatest Desk Toy? (6)
09:00 Awesome Stuff: Sleep Hacking (12)
09:00 Awesome Stuff: A Voice-Operated Household Assistant (19)
More arrow