ROSC 7: The Cloaked Life

The Thursday after my visit to the sanitarium, I showed up early to the TCM lunch at Jay’s Bar. I brought a legal pad and a pen, sat down, and started making notes.
“You look serious this time, Professor.”
I looked up to see Michele handing me a lunch menu.
“Yeah, I picked up another hard problem, and I want the team to help me with it.”
Michele laughed. “I remember you biting off a lot of hard problems before.”
He couldn’t have been more than a teenager the last time I hung out in the back room with the cypherpunks, but he was right. I had always been a sucker for a hot new project.
I laughed too. “I hate to admit it, Michele, but you’re right. I did. I’ve pretty well gotten over that, but I couldn’t turn away from this one. It’s for people who are pretty badly disabled.”
“You and this group are doing something to help those people?” he asked.
“We are, at least as well as we can.”
Just then a couple sat at the bar and his busboy showed up. He turned to go, but before he did, he said, “I’m very glad you do that.”
Soon the group assembled and I explained my problem: that I had a group of people who, because of their infirmities (or disabilities, or whatever their conditions should be called) couldn’t conduct business the usual way and needed to do it entirely in the digital realm.
“They shouldn’t use their real names,” Nikos was quick to say. “Regardless of what they’re doing. There are a lot of feds skulking around these days, and they can make anyone look like a crook if they want to.”
We all nodded our heads in agreement, and I added, “Yeah, that’s their plan. Pseudonyms only.”
“Good,” Nikos said, adding, “And they have to use encryption… all the time… as a default.”
And that set the table into a near uproar, both of agreement and of disgust with the lack of reason on the darknet.
Johnny’s was the voice I noticed most. He said, “Did you see the details of the dark market takedown last month?”
“What about it?” a couple of them asked.
“The feds pulled more than 10,000 unencrypted emails from the system. Unencrypted, while buying drugs! What the hell were these people thinking? There’s some kind of brain virus at work here.” Then he turned to me. “You have to make them use encryption, and if they don’t, you refuse to teach them. Anything else would be crazy.”
I wrote Thunderbird, GPG and Enigmail on my pad and underlined it twice. Then I turned to Esther, whom I knew would be critical in this. “Do you know how to use these tools?”
“No, not really,” she said.
“All right then; this is step number one. Nothing else happens until everyone is using encryption on a daily basis. It’s not hard, but they have to do it. Without encryption, nothing happens.”
Johnny turned to Esther and said, “I can teach you.”
She agreed.
I had been wondering if Johnny was sweet on Esther, and this convinced me. I hope things can work out between them. And they should; pairing off is simply what young men and women do if you get out of their way and let them. We’re all awkward about it, but it happens nonetheless.
Then Jordan, one of the newer people to our group, jumped in.
“And they must never trust Tor nodes. I’m convinced that the feds run most of them.”
“Of that I’m sure,” I added. “Several years ago – right about the time they went after Silk Road – the number of Tor nodes doubled in a month. That’s when the feds ramped up their search techniques. For a one-time in and out, Tor is probably okay, but to run an ongoing service is asking for trouble. If you get big enough for them to focus on you, they will find you.”
“I2P is better,” Jordan added. “At least the new version that’s in C++, not Java. It requires you to use a command line, but that’s only hard if you think it’s hard.”
I explained to everyone, and especially to Esther, who was doing a nice job of taking notes, that the Invisible Internet Project (properly, I2P) was like Tor, only better and not overrun by feds. It’s the new darknet of choice.
Then Jordan, with surprising elegance for a young man, turned to address Esther and Johnny together. “If you want to set it up, just bring a laptop to one of these lunches and I’ll help; the new version still requires configuration. They’ll make it smoother eventually, but you shouldn’t wait for that.”
They thanked him, and I thought that this was enough techie stuff for the day. So, when the food arrived and the conversation shifted, I backed off and let it.
More next time.

* * * * *

A book that generates comments like these, from actual readers, might be worth your time:

  • I just finished reading The Breaking Dawn and found it to be one of the most thought-provoking, amazing books I have ever read… It will be hard to read another book now that I’ve read this book… I want everyone to read it.
  • Such a tour de force, so many ideas. And I am amazed at the courage to write such a book, that challenges so many people’s conceptions.
  • There were so many points where it was hard to read, I was so choked up.
  • Holy moly! I was familiar with most of the themes presented in A Lodging of Wayfaring Men, but I am still trying to wrap my head around the concepts you presented at the end of this one.

Get it at Amazon ($18.95) or on Kindle: ($5.99)


* * * * *

Paul Rosenberg

11 thoughts on “ROSC 7: The Cloaked Life”

  1. Tor started out breached since it was created by and for the government.
    Since I have a Chromebook, I doubt there would be anything that could escape Google’s stranglehold on Chrome. I’m okay with them seeing everything I do, but I wish they’d pull their spell checker’s head out of its posterior. It would also be good if they could figure out why the washing machine continually slows down on Yahoo, requiring frequent restarts. All the current OSs suck in one way or another.

      1. Do you really think it makes any difference with the Utah Data Center holding everything they can’t decrypt yet, and the Narus machines in a dozen Internet chokepoints? I was running Ubuntu 17.04 on my HP Pavillion until it went into a BIOS loop following the last update. I’ve been thinking about replacing the HDD in my HP 2000 with a SSD and loading the newest LTS, but $952 a month of Social Security only goes so far. The Chromebook has been the most trouble free computer I have ever owned, which is important with all the supporters becoming hyperinsular. If not Ubuntu, what?

        1. – Do you really think it makes any difference with the Utah Data Center
          holding everything they can’t decrypt…
          Yes. It may be a LONG time before they can decrypt. The difference in difficulty between encrypting and decrypting is something like 2 to the 100th power.
          – If not Ubuntu, what?
          Manjaro or Mint

  2. With I2P, does my computer end up trafficking child porn? I don’t need that knock on my door, nor do I want to be helping those people.

      1. That’s a weird question, Paul. I’m raising a reasonable legal and ethical concern.
        Just like Tor, its very nature means I can’t tell what it’s “filled” with.
        But from the IT media it’s my understanding that Tor carries illegal activity – the downside of privacy. That’s believable given what I understand about humans. Not all traffic, of course – don’t strawman me.
        I’m assuming I2P is used similarly.

        1. I didn’t think it was a weird question. I thought yours was a rather extreme assumption. But yes, I2P works a lot like Tor, though I’ve never heard of someone being arrested for pass-through traffic. Still, anything is possible these days.

Comments are closed.