logo

drewdevault.com

[mirror] blog and personal website of Drew DeVault git clone https://hacktivis.me/git/mirror/drewdevault.com.git

Privacy-as-a-hobby.md (8849B)


  1. ---
  2. date: 2016-06-29
  3. # vim: set tw=80
  4. title: Life, liberty, and the pursuit of privacy
  5. layout: post
  6. tags: [privacy]
  7. ---
  8. Privacy is my hobby, and should be a hobby of every technically competent
  9. American. Within the eyes of the law I have a right to secure the privacy of my
  10. information. At least that's the current law - many officials are [trying to
  11. subvert that right](http://www.apple.com/customer-letter/). I figure that we'd
  12. better exercise that right while we have it, so that we know how to keep
  13. exercising it once it's illegal and all the information about it dries up.
  14. One particularly annoying coworker often brings up, "what do you have to hide?"
  15. Though it would defeat the purpose to explain what I'm hiding, let's assume that
  16. what I'm hiding is benign, at least legally speaking. I'm sure you can
  17. understand why I don't want `~/Porn` to be public information should my
  18. equipment be seized after I publish this blog post and an incompetent (or angry)
  19. investigator leaks it. Building secure facilities for housing secrets is fun!
  20. That's true even if there aren't a lot of interesting secrets to hide there.
  21. But the porn folder brings up an interesting point. I'm not ashamed to admit I
  22. have one, but I would be uncomfortable with everyone being able to see it. Or
  23. maybe I'm having an affair (a scandalous proposition for a single guy, I know)
  24. and there are relevant texts are on my cell phone. Perhaps I suck at managing my
  25. finances and the spreadsheets in my documents would tell you so. Maybe I have
  26. embarrassing home videos of bedroom activities on my hard drive[^1]. Maybe
  27. there's evidence that I'm a recovering alcoholic in my files. Maybe I'm a
  28. closeted homosexual and my files prove it, and 10 years from now the homophobes
  29. win and suddenly the country is more hostile to that. Maybe all of this is true
  30. at once!
  31. Keeping these things secret is an important right, and one I intend to exercise.
  32. I don't want to be accused of some crime and have my equipment seized and then
  33. mishandled by incompetent officials and made public. I don't want a jury chosen
  34. to decide if I really stole that pack of gum when I was 8 and then have
  35. unfavorable secrets leaked. Human nature might lead them to look on my case
  36. unfavorably if they found out about all the tentacle porn or erotic Harry
  37. Potter fanfics I've been secretly writing. Maybe an investigator finds something
  38. they don't understand, like a private key, and it ends up being exposed through
  39. the proceedings. Maybe this private key proves that I'm Satoshi Nakamoto[^3] and
  40. my life is threatened when the case is closed because of it.
  41. To the government: **stay the fuck out of my right to encrypt**, or, as I
  42. like to think of it, my right to use math. They will try, again and again, to
  43. take it from us. They must never win.
  44. The second act of this blog post is advice on how to go about securing your
  45. privacy. The crucial bit of advice is that you must strive to understand the
  46. systems you use for privacy and security. Look for their weak spots and be aware
  47. of them. Don't deceive yourself about how secure your systems are.
  48. I try to identify pain points in my security model. Some of them will be hard
  49. to swallow. The first one was Facebook - delete your account[^4] [^5]. I did
  50. this years ago. The second one was harder still - Google. I use an Android
  51. phone running CyanogenMod without Google Play Services. I also don't use GMail
  52. or any Google services (I search with DuckDuckGo and add !sp to use StartPage if
  53. necessary). Another one was not using Windows or OS X. This is easy for me but a
  54. lot of people will bitch and moan about it. A valid privacy & security model
  55. does not include Windows. OS X is an improvement but you'd be better off on
  56. Linux. Even your non-technical family can surely figure out how to use Xubuntu
  57. to surf the web.
  58. I also use browser extensions to subvert tracking and ads. Ad networks have
  59. severely fucked themselves by this point - I absolutely never trust any ads on
  60. the web, and never will, period. Use software like
  61. [uBlock](https://github.com/gorhill/uBlock) to get rid of trackers (and speed
  62. up the web, bonus!). I also block lots of trackers in my /etc/hosts file -
  63. [check this out](https://github.com/StevenBlack/hosts). Also check out
  64. [AdAway](https://free-software-for-android.github.io/AdAway/) for Android.
  65. These changes help to remove your need to trust that corporate interests will
  66. be good stewards of your private information. This is very important - no amount
  67. of encryption will help you if you give Google a GPS map of your every move[^6]
  68. and your search history[^7] and information about basically every page on the
  69. internet you visit[^8]. And all of your emails and contacts and appointments on
  70. your calendar. Google can be subpoenaed or subverted[^9] and many other
  71. companies won't even try[^10] to keep your data secret even when they aren't
  72. legally compelled to. I like this image from Maciej Cegłowski's excellent
  73. talk[^11] on website obesity about the state of most websites:
  74. ![](https://sr.ht/ks75.jpg)
  75. When you give all of this information to Google, Facebook, and others, you're
  76. basically waiving your fifth amendment[^12] rights.
  77. Once you do have control of your information, there are steps you should take to
  78. keep it secure. The answer is encryption. I use
  79. [dm-crypt](https://wiki.archlinux.org/index.php/Dm-crypt) which allows me to
  80. encrypt my entire hard drive on Linux. I'm prompted for a password on boot and
  81. then everything proceeds (and I've never noticed any performance issues, for the
  82. record).
  83. I also do most of my mobile computing on a laptop running libreboot[^13] with
  84. 100% open source software. The weak point here is that if your hardware is
  85. compromised and you don't know it, they could steal your password. One possible
  86. solution is keeping your boot partition and perhaps another key on a flash
  87. drive, but this doesn't fully solve the problem. I suggest looking into things
  88. like case intrusion detection and working on being aware of it when your
  89. hardware is messed with.
  90. I mentioned earlier that my phone is running CyanogenMod without any of the
  91. Google apps. The weak point here is the radio, which is very insecure and likely
  92. riddled with vulnerabilities. I intend to build my own phone soon with a
  93. Raspberry Pi, where I can have more control over this - things like being able
  94. to disconnect power to the radio or disconnect the microphone when not in use
  95. will help.
  96. I also self host my email, which was a huge pain in the ass to set up, but is
  97. lovely now that I have it. At some point I intend to write a better mail server
  98. to make this easier. I use opportunistic PGP encryption for my emails, but I
  99. send depressingly few encrypted emails like this due to poor adoption (follow me
  100. on [keybase](https://keybase.io/sircmpwn)? I'll give you an invitation if you
  101. send me an encrypted email asking for one!)
  102. If you have any questions about how to implement any of this, help identifying
  103. the weaknesses in your setup, or anything else, please feel free to reach out to
  104. me via email ([sir@cmpwn.com](mailto:sir@cmpwn.com)+[F4EA1B88](/publickey.txt))
  105. or [Twitter](https://twitter.com/sircmpwn) or whatever. Good luck sticking it to
  106. the man!
  107. [^1]: [ICloud leaks of celebrity photos](https://en.wikipedia.org/wiki/ICloud_leaks_of_celebrity_photos)
  108. [^3]: The secretive inventor of Bitcoin. I'm not Satoshi, if you were wondering.
  109. [^4]: [Click this](https://www.facebook.com/help/delete_account?rdrhc) to do so
  110. [^5]: "But I liiiiike Facebook and it let's me keep up with my frieeeends..." There's no privacy model that includes Facebook and works. Give up. [Read this](https://stallman.org/facebook.html) and try to ignore the childish language and see the tangible evidence instead.
  111. [^6]: If you have location services enabled on your phone, [here's a map of everywhere you've been](https://maps.google.com/locationhistory/). Enjoy!
  112. [^7]: [Here's all of your searches](https://myactivity.google.com/myactivity). You can delete the history here, supposedly. I bet it doesn't unfeed that history to your personal advertising neural network at Google.
  113. [^8]: Google Adsense and Google Analytics are present on basically every website. I'm positive they're writing it down somewhere when you hit a page with those on it. Facebook certainly is, too.
  114. [^9]: Remember [PRISM](https://en.wikipedia.org/wiki/PRISM)?
  115. [^10]: [Like AT&T, for example](http://www.pbs.org/newshour/rundown/report-att-cooperated-extensively-nsa-sharing-billions-phone-email-records/)
  116. [^11]: [The Website Obesity Crisis](http://idlewords.com/talks/website_obesity.htm)
  117. [^12]: That's the right to remain silent. Come on, you should know this.
  118. [^13]: [libreboot](https://libreboot.org/) is an open source BIOS. I got my laptop from [minifree](https://minifree.org/), which directly supports the libreboot project with their profits.