Forget Finding A Needle In A Haystack… How About Actually Finding Haystack
from the security-through-obscurity dept
We recently wrote about Newsweek’s coverage of Austin Heap and Haystack, a program he supposedly wrote to help Iranian internet users avoid being spied on by the Iranian government. Some of our commenters questioned the overall legitimacy of the story. It has a very too-perfect Hollywood sort of feel to it — and some pointed out the fact that no one seems to be able to actually look at Haystack. It sounds like a lot more folks are skeptical of the claims around Haystack as well. Glyn Moody points us to a post by Evgeny Morozov that rips apart the total secrecy around Haystack, to suggest the whole setup is pretty hard to believe.
I like Hollywood as much as the next guy — and yet something just doesn’t feel right about Haystack. What really bothers me is that one cannot download and examine their software; as far as the Internet is concerned, Haystack doesn’t exist. In fact, Heap says that it is only distributed to trusted contacts inside Iran; putting it online would create a situation where the government could easily get hold of it as well and then reverse-engineer it or ban it or find a way to track its users.
So, in essence, the outside public – including Iranians — are asked to believe that a) Haystack software exists b) Haystack software works c) Haystack software rocks d) the Iranian government doesn’t yet have a copy of it, nor do they know that Haystack rocks & works. (And who could fault them for not reading Newsweek? I certainly can’t). For someone with my Eastern European sensibilities, that’s a lot of stuff to believe in. Even Santa — we call him Ded Moroz — appears more plausible in comparison.
He goes on to note that, at the very least, this security by obscurity actually could be quite dangerous for Iranians actually using this program, since it may be giving them a very false sense of security:
To me, it seems like a no-brainer: if you want to distribute technology that may endanger lives, make sure that the technology is secure. The only good way that I know of to make sure that it’s secure is to let outsiders test it.
Indeed. In retrospect, the Newsweek version of this story had too many holes that should have acted as red flags.
Comments on “Forget Finding A Needle In A Haystack… How About Actually Finding Haystack”
Developing in secrecy has never been a good idea to begin with, and you should most likely be suspicious of such system, as it implies that not a lot of people know about it.
Since less people know about it, less people are likely to test it, and thus, less people are likely to find problems.
Total agreement. Cryptographers’ Dilemma, totally.
You guys might be interested in Austin’s response:
All that's certain is US and Isreal wish to overthrow Iran.
Can’t drop context; “danger” of Iran is being hyped exactly as was Iraq. That raises likelihood that Haystack is created by a spy agency. But even assuming Heap is on his own, he’s playing into the overthrow plan, from which no good will come.
To quote a wise...dead man...
“One does not simply walk into mordor…”
If this program worked, all it would take for the iranian government to get a copy is to raid a house where they can’t see what the user is doing and poof. they can now reverse engineer it.
Austin’s rebuttal is very interesting and I cant help but wonder what the hell this guy is doing wasting time slaying dragons in warcraft.
I keep looking for a “download” button or link. If his little project isnt open source, then its bullshit and shouldnt be trusted.
If it sounds too good to be true, it probably is!
If a government wants to get hold of anything, we know all too well they will, especially if getting hold of it is supposed to be difficult!
Conversely, if they ain’t supposed to lose stuff,… it turns up on the internet!
Most other projects are open source and well suited for the task why bother with something so suspicious?
I2P(is java based be warned)
And a lot of others including steganography that is practically undetectable and can be used in any platform securely(i.e. video, image, text, net traffic…).
http://en.wikipedia.org/wiki/Steganography (look in “ Steganography Tools”)
Great resource for anonymous networks although is more focused on P2P.
Some other programs:
Omemo motto “Browse the world’s biggest hard drive”
http://stegoshare.sourceforge.net/ (operational, high security)
http://osiris.kodeware.net/ (Creation of anonymous websites, soon to be open sourced)
http://netsukuku.freaknet.org/ (the stealth internet, internet overlay that runs on top of the internet and it is anonymous)
Now why with all the options one has, somebody would trust a newcomer that is secretive?
That raises all kinds of red flags.