Browse Source

Merge branch 'master' of

# By holger krekel (2) and others
# Via gorhgorh (3) and Dominic Tarr (2)
* 'master' of
  actually add some content to my proposal
  add LEAP talk proposal
  some refinements
  added my talk
  Added edgenet proposal
Jérôme Loï 8 years ago
  1. 13
  2. 34
  3. 31
  4. 51


@ -11,5 +11,16 @@ Can host ppl : n/a
# Viva La Crypto
A gameplan for the crypto-revolution.
A gameplan for the crypto-revolution. The time has for a new internet.
There is the technical questions of how do you build a viable system,
but that is the easy bit. The hard question, is how do we deploy it
to the world, how do we make something that people want to adopt...
And what do we build? what kind of world *could* we create?
To motivate ourselves, we need a utopian vision, but to achieve
_anything_ we need to keep our eyes on the road, and most of all,
build something simple. Dumb even.
This could be science fiction, but instead of writing a book,
we are just gonna build it.


@ -0,0 +1,34 @@
auth-name : Kali Kaneko
tag : privacy, usability, email, vpn, federated system, crypto, mortals, superheros
advance costs : NA
need room : NA
Location : La Paz, Bolivia (traveling around europes maintenant)
Can host ppl : NA
# LEAP Encryption Access Project: Encrypted Communications for Mere Mortals
What if I told you that a regular user can get gpg-encrypted communications
just following a wizard and click-click-click? What if I told you that
her email can be backuped in the cloud, in a way that a server compromise could
not reveal the private data? What about an Encrypted Proxy that's at the same
reasonably secure and easy to use, configure and deloy?
Well, you don't have to trust me. Just come and see it with your own eyes.
At LEAP we are obsessed with making possible for any service provider to easily
deploy secure services and for people to use these services without needing to
learn new software or change their behavior. These services are based on open,
federated standards, but done right: the provider does not have access to the
user’s data, and we use open protocols in the most secure way possible.
On the server side we have created the LEAP Platform, a “provider in a box” set
of complementary packages and server recipes automated to lower the barriers of
entry for aspiring secure service providers. On the client side, we have
created a cross-platform application called Bitmask that automatically
configures itself once a user has selected a provider and which services to
enable. Bitmask provides a local proxy that a standard email client can connect
to, and allows for easy one-click Virtual Private Network (VPN) service.


@ -0,0 +1,31 @@
auth-name : Pieter Hintjens
tag : freedom, privacy, decentralized
advance costs : N
need room : N
Location : Brussels, Belgium
Can host ppl : no, sorry
# edgenet
edgenet lives safely at the edge of the Internet, on our smart phones. It uses mobile WiFi hotspots to create "cells" for exchanging news and content. Cells talk to cells, asynchronously, covering neighborhoods, and cities. edgenet doesn't exist yet. This project is about building it.
# More details
The spy state cannot be voted out of office. It eats laws for breakfast and excretes excuses for breaking them. We will either build a spy-proof Internet, that cannot be banned or controlled, or we accept to become slaves.
These are the three main points of attack on the privacy of our communications:
* The centralized servers where we meet to share information. These can be hacked, or their owners ordered to hand over information. No matter what encryption you use between your PC and the server, data is held unprotected on servers.
* The client PCs and devices where we run our browsers. These are often laden with spyware, or hacked individually when the case needs it, in a "targeted attack."
* The broadband connections across which the clients talk to the servers. Broadband providers record metadata and provide it to the authorities as a matter of course.
If the Web is not safe, and the Deep Web is not safe, what is? There is only one long term answer, and that is a new web that lives "off the grid," treating central websites and broadband connections with the full distrust they deserve.
To build truly secure communities, we must address all three of these weak points. It’s not sufficient to improve our encryption to create a more robust Deep Web. Rather, we need a radical rethink of how we build digital communities in the first place. We need a new kind of Internet, which I’ll call the "edgenet," that is resistant to all threats except targeted attacks.
# Technologies
Open source on open protocols. Slices of edgenet already exist in the ZeroMQ community, mainly Zyre, a clustering library designed for opportunistic WiFi clusters. On October 30 & 31 in Brussels we're organizing a hackathon to push the technology forwards. I'd like to present our work in Paris.


@ -0,0 +1,51 @@
auth-name : holger krekel
tag : decentralization, edges, questions
advance costs : N
need room : Y
Location : Freiburg, Germany
Can host ppl : na
# Secession from the broadcast
It's time to travel to the edges because this is where the interesting stuff
happens. "What is popular" is rarely a question that helps finding edges.
I'd like to recap what i learned in 15 months of my re-juvenated and
re-energized quest into decentralization and what it might mean.
For one, I'd like to forward a question from Gene Youngblood's
[Secession from the broadcast lecture][1]: "how can we create on the
same scale as we can destroy?". Gene suggests we need to move away from
the "audience nation" by becoming "political actors" instead of
"interested spectators of action".
Second, I paraphrase a thought from Adam Ierymenko's [I want to
believe][2]: If full decentralization is technically too hard currently,
can we construct and make use of a "Blind Idiot God" (BIG) instance
which co-ordinates some communication but can not abuse it or even
understand what's going on precisely?
Lastly, I wonder how can we create sustained systems and services if we
don't want the centralized web service cash cow control model?
As Laura Kolbag [3] pointed out recently in Nuernberg, paying
for software might not be so bad if the "free to use" models
mean surveillance and centralized control. And she notes
that design and useability should drive open source developments
instead of features and options.
The edges are where we encounter the others, those who are somehow unlike.
It's a place where i easily run into fears and look for friends. At the edges
there is no central authority suggesting what to think or do next. And
the number of people at the edges is always lower than in the center.
But that's fine, this is how things get moving as i've experienced
myself a number of times now.