Forget Finding A Needle In A Haystack... How About Actually Finding Haystack
from the security-through-obscurity dept
We recently wrote about Newsweek's coverage of Austin Heap and Haystack, a program he supposedly wrote to help Iranian internet users avoid being spied on by the Iranian government. Some of our commenters questioned the overall legitimacy of the story. It has a very too-perfect Hollywood sort of feel to it -- and some pointed out the fact that no one seems to be able to actually look at Haystack. It sounds like a lot more folks are skeptical of the claims around Haystack as well. Glyn Moody points us to a post by Evgeny Morozov that rips apart the total secrecy around Haystack, to suggest the whole setup is pretty hard to believe.I like Hollywood as much as the next guy -- and yet something just doesn't feel right about Haystack. What really bothers me is that one cannot download and examine their software; as far as the Internet is concerned, Haystack doesn't exist. In fact, Heap says that it is only distributed to trusted contacts inside Iran; putting it online would create a situation where the government could easily get hold of it as well and then reverse-engineer it or ban it or find a way to track its users.He goes on to note that, at the very least, this security by obscurity actually could be quite dangerous for Iranians actually using this program, since it may be giving them a very false sense of security:
So, in essence, the outside public - including Iranians -- are asked to believe that a) Haystack software exists b) Haystack software works c) Haystack software rocks d) the Iranian government doesn't yet have a copy of it, nor do they know that Haystack rocks & works. (And who could fault them for not reading Newsweek? I certainly can't). For someone with my Eastern European sensibilities, that's a lot of stuff to believe in. Even Santa -- we call him Ded Moroz -- appears more plausible in comparison.
To me, it seems like a no-brainer: if you want to distribute technology that may endanger lives, make sure that the technology is secure. The only good way that I know of to make sure that it's secure is to let outsiders test it.Indeed. In retrospect, the Newsweek version of this story had too many holes that should have acted as red flags.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Reader Comments
Subscribe: RSS
View by: Time | Thread
Since less people know about it, less people are likely to test it, and thus, less people are likely to find problems.
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Austin's response
http://blog.austinheap.com/brain-dead-journalism/
[ link to this | view in thread ]
All that's certain is US and Isreal wish to overthrow Iran.
[ link to this | view in thread ]
To quote a wise...dead man...
If this program worked, all it would take for the iranian government to get a copy is to raid a house where they can't see what the user is doing and poof. they can now reverse engineer it.
[ link to this | view in thread ]
I keep looking for a "download" button or link. If his little project isnt open source, then its bullshit and shouldnt be trusted.
[ link to this | view in thread ]
Satndard maxim,..
If a government wants to get hold of anything, we know all too well they will, especially if getting hold of it is supposed to be difficult!
Conversely, if they ain't supposed to lose stuff,... it turns up on the internet!
[ link to this | view in thread ]
Tor
Retroshare
GNUNet
I2P(is java based be warned)
And a lot of others including steganography that is practically undetectable and can be used in any platform securely(i.e. video, image, text, net traffic...).
http://en.wikipedia.org/wiki/Steganography (look in "[edit] Steganography Tools")
[ link to this | view in thread ]
http://www.anonymous-p2p.org/
Some other programs:
Omemo motto "Browse the world's biggest hard drive"
http://www.omemo.com/
http://www.stealthnet.de/ (operational)
http://stegoshare.sourceforge.net/ (operational, high security)
http://osiris.kodeware.net/ (Creation of anonymous websites, soon to be open sourced)
http://netsukuku.freaknet.org/ (the stealth internet, internet overlay that runs on top of the internet and it is anonymous)
http://retroshare.sourceforge.net/
Now why with all the options one has, somebody would trust a newcomer that is secretive?
That raises all kinds of red flags.
[ link to this | view in thread ]